This document summarizes the decline of internet freedom in Hong Kong over recent years. It describes how censorship was previously non-existent but increased after the national security law was passed in 2020. This allowed authorities to order taking down of online content and surveillance. Many websites and apps were blocked or self-censored in response. Real name registration for SIM cards was also introduced, tightening government control over online activities. The future may include further pressure on global internet platforms to censor in Hong Kong as well as local legislation increasing government powers over online speech.
he Contract for the Web was created by representatives from over 80 organizations, representing governments, companies and civil society, and sets out commitments to guide digital policy agendas. To achieve the Contract’s goals, governments, companies, civil society and individuals must commit to sustained policy development, advocacy, and implementation of the Contract text.
Background on cell tower growth, current and developing framework for managing wireless development, planning for the future and negotiating leases and licenses for facilities.
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...APNIC
APNIC General Counsel Craig Ng discusses legal cooperation to overcome jurisdictional and territorial limits in cybercrime investigations at the 33rd TWNIC IP OPM in Taipei, Taiwan, on 5 December 2019.
he Contract for the Web was created by representatives from over 80 organizations, representing governments, companies and civil society, and sets out commitments to guide digital policy agendas. To achieve the Contract’s goals, governments, companies, civil society and individuals must commit to sustained policy development, advocacy, and implementation of the Contract text.
Background on cell tower growth, current and developing framework for managing wireless development, planning for the future and negotiating leases and licenses for facilities.
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...APNIC
APNIC General Counsel Craig Ng discusses legal cooperation to overcome jurisdictional and territorial limits in cybercrime investigations at the 33rd TWNIC IP OPM in Taipei, Taiwan, on 5 December 2019.
Digital security law security of individual or governmentM S Siddiqui
The subject again seems complicated further complicate as cyber security is often conflated with cybercrime, or confused with related but distinct concepts such as cyber-resilience, cyber-warfare and cyber-defense. However, it is taken to mean the protection of digital information systems against attack, either by states or individual hackers.
The proposed law apparently drafted to protect the national interest from possible acts of citizens. It has mixed up the security of individual and nation.
The Internet has become closely associated with freedom of expression and the global economy. Today, it plays a direct or indirect role in almost every aspect of life. Yet many fear the Internet as we have come to know it is at risk, with restrictions forcing fragmentation along political, corporate, or cultural lines. Despite growing concerns about the future of the Internet, discussion surrounding online freedom remains largely mired in a handful of issues: the necessity and appropriateness of government surveillance in the United States, digital privacy in Europe, and censorship in authoritarian states such as China. However, between them, the United States, Europe, and China account for less than half of the world’s Internet users. For much of the rest of the world, any discussion of Internet freedom falls at the complex intersection of political and social liberties, nation-building, security threats, economic development, and resource constraints.
Asia’s biggest developing democracies - India, Indonesia, Bangladesh, the Philippines, and Thailand - account for a quarter of the world’s people, but only about one-tenth of the global online population. The policy decisions these states make going forward will be of considerable importance for the future of the Internet and offer some useful lessons about the limitations and vulnerabilities of the global Internet freedom agenda as it is currently being pursued by the United States and Europe.
From a survey of these countries’ experiences, six broad conclusions or principles can be drawn. First, the online world is an outgrowth of the offline world, rather than a distinct phenomenon. Internet policy cannot be considered in a vacuum, or divorced from other relevant aspects of public policy, such as security, economic policy, or governance. Second, laws, norms, and cultural attitudes related to Internet use vary widely, even among democracies. A one-size-fits-all approach to Internet freedom will not work and may even prove counterproductive. Third, online freedoms and greater security are not inherently at odds with one another in open societies. Discourse that presents a false choice between security and freedom is harmful for both, as well as for state legitimacy and economic growth.
Fourth, while much discussion of Internet freedom frames the issue as a conflict between governments, corporations, and civil society, each sector is divided on the merits of unfettered Internet freedom. Fifth, current legislation pertaining to the Internet in many democratic countries is deeply flawed, even in the context of their own constitutional rights pertaining to freedom of expression. By and large, Internet-related legislation is vague, making implementation arbitrary, and undermining public trust in state institutions. And sixth, users are often not adequately informed of the privileges and restrictions associated with Internet use in their native countries. Policies and initiat
Internet Governance and Open Source SoftwareSeaparo Phala
The presentations seeks to draw linkages between internet governance and open source software initiatives. It also highlights the role of internet rights and OSS in the digital economy.
Newsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently ChangedMeyers Nave
Governor Newsom recently signed three Executive Orders that changed fundamental limitations and requirements of the Brown Act. He signed Executive Order N-25-20 on March 12, Executive Order N-29-20 on March 17, and Executive Order N-35-20 on March 21. Before everyone had figured out the section of the March 12 order that addressed the Brown Act, parts of that section were withdrawn and superseded by the March 17 order and the remaining parts continued in the March 17 order. And then the March 21 order made more changes – all of which relate to the COVID-19 pandemic.
Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
The Federal Communications Commission is considering adopting rules that could limit local governments’ zoning authority and allow wireless-service providers to add facilities to existing buildings, towers, and other structures in public rights-of-way and elsewhere. The wireless industry will likely push the federal agency to adopt rules that will allow them to place and expand facilities with little or no oversight.
How open is the Internet in Singapore? This presentation looks at different factors of openness and lists the relevant regulations and common law principles involved
Cellphone Tower Regulation: Maximizing Revenue While Protecting Local InterestsBest Best and Krieger LLP
Joseph Van Eaton and Gerry Lederer, partners in the BB&K Washington, D.C. office, recently conducted an educational program on regulatory and transactional concerns arising from the siting or collocation of a wireless tower. The presentation focused on the impact of new FCC rules limiting local authority to control modifications of existing wireless facilities on siting regulation and on negotiations for use of public property to place wireless facilities.
Digital security law security of individual or governmentM S Siddiqui
The subject again seems complicated further complicate as cyber security is often conflated with cybercrime, or confused with related but distinct concepts such as cyber-resilience, cyber-warfare and cyber-defense. However, it is taken to mean the protection of digital information systems against attack, either by states or individual hackers.
The proposed law apparently drafted to protect the national interest from possible acts of citizens. It has mixed up the security of individual and nation.
The Internet has become closely associated with freedom of expression and the global economy. Today, it plays a direct or indirect role in almost every aspect of life. Yet many fear the Internet as we have come to know it is at risk, with restrictions forcing fragmentation along political, corporate, or cultural lines. Despite growing concerns about the future of the Internet, discussion surrounding online freedom remains largely mired in a handful of issues: the necessity and appropriateness of government surveillance in the United States, digital privacy in Europe, and censorship in authoritarian states such as China. However, between them, the United States, Europe, and China account for less than half of the world’s Internet users. For much of the rest of the world, any discussion of Internet freedom falls at the complex intersection of political and social liberties, nation-building, security threats, economic development, and resource constraints.
Asia’s biggest developing democracies - India, Indonesia, Bangladesh, the Philippines, and Thailand - account for a quarter of the world’s people, but only about one-tenth of the global online population. The policy decisions these states make going forward will be of considerable importance for the future of the Internet and offer some useful lessons about the limitations and vulnerabilities of the global Internet freedom agenda as it is currently being pursued by the United States and Europe.
From a survey of these countries’ experiences, six broad conclusions or principles can be drawn. First, the online world is an outgrowth of the offline world, rather than a distinct phenomenon. Internet policy cannot be considered in a vacuum, or divorced from other relevant aspects of public policy, such as security, economic policy, or governance. Second, laws, norms, and cultural attitudes related to Internet use vary widely, even among democracies. A one-size-fits-all approach to Internet freedom will not work and may even prove counterproductive. Third, online freedoms and greater security are not inherently at odds with one another in open societies. Discourse that presents a false choice between security and freedom is harmful for both, as well as for state legitimacy and economic growth.
Fourth, while much discussion of Internet freedom frames the issue as a conflict between governments, corporations, and civil society, each sector is divided on the merits of unfettered Internet freedom. Fifth, current legislation pertaining to the Internet in many democratic countries is deeply flawed, even in the context of their own constitutional rights pertaining to freedom of expression. By and large, Internet-related legislation is vague, making implementation arbitrary, and undermining public trust in state institutions. And sixth, users are often not adequately informed of the privileges and restrictions associated with Internet use in their native countries. Policies and initiat
Internet Governance and Open Source SoftwareSeaparo Phala
The presentations seeks to draw linkages between internet governance and open source software initiatives. It also highlights the role of internet rights and OSS in the digital economy.
Newsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently ChangedMeyers Nave
Governor Newsom recently signed three Executive Orders that changed fundamental limitations and requirements of the Brown Act. He signed Executive Order N-25-20 on March 12, Executive Order N-29-20 on March 17, and Executive Order N-35-20 on March 21. Before everyone had figured out the section of the March 12 order that addressed the Brown Act, parts of that section were withdrawn and superseded by the March 17 order and the remaining parts continued in the March 17 order. And then the March 21 order made more changes – all of which relate to the COVID-19 pandemic.
Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
The Federal Communications Commission is considering adopting rules that could limit local governments’ zoning authority and allow wireless-service providers to add facilities to existing buildings, towers, and other structures in public rights-of-way and elsewhere. The wireless industry will likely push the federal agency to adopt rules that will allow them to place and expand facilities with little or no oversight.
How open is the Internet in Singapore? This presentation looks at different factors of openness and lists the relevant regulations and common law principles involved
Cellphone Tower Regulation: Maximizing Revenue While Protecting Local InterestsBest Best and Krieger LLP
Joseph Van Eaton and Gerry Lederer, partners in the BB&K Washington, D.C. office, recently conducted an educational program on regulatory and transactional concerns arising from the siting or collocation of a wireless tower. The presentation focused on the impact of new FCC rules limiting local authority to control modifications of existing wireless facilities on siting regulation and on negotiations for use of public property to place wireless facilities.
Overview of what an IP transition is: the replacement of traditional public switched telephone network with a network based around the IP protocol — a packet-switched v. a circuit switched network. The purpose of the switch is to bring potentially more efficiency and purpose to the network via wireless or wireline — or a combination of both — networks.
Regulation in the place of digital and mobile platformShamseena Zubair
Due to the anonymous nature of the Internet, it is possible to engage into a variety of criminal activities with impunity and people with intelligence, have been grossly misusing this aspect of the Internet to perpetuate criminal activities in cyberspace. Also the numbers of users are increasing rapidly. India, unlike the oppressive regimes in China and Iran, does not closely monitor or censor Internet activity. Government of India promoting new technologies same time it’s also protecting from the new technological problems by its laws and regulations.
ICANN TWNIC TWIGF 2023: Compliance through CompulsionCharles Mok
Compliance through Compulsion: The trend and impact of access restriction becoming a policy tool for compliance
ICANN-APAC TWNIC Engagement Forum 2023 / TWIGF
全球數位威權趨勢及對台灣的挑戰和機遇
Digital Authoritarianism: Global Trends, Challenges and Opportunities for Taiwan
Keynote for Open Culture Foundation
April 8 2023
Taipei, Taiwan
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
2. From freedom to censorship
• Before NSL (2020)
• No official or legal mechanism to censor
• No external firewall or filtering mechanism
• Regional telecom hub for underseas cables and datacenters
• Government attempts to introduce censorship
• 2012: Consultation of Control of Obscene and Indecent Articles
Ordinance
• Proposal for mandatory “operator-level content filtering” withdrawn
after public opposition
• 2016: Copyright Ordinance Amendments
• Criminalization of online derivative works of copyrighted materials
• Withdrawn by government in legislature after filibuster in legislature
3. Can China’s Great Firewall extend to Hong Kong?
• China
• State-owned telecom controls external gateways from 3 coastal cities
with backbone of at least 7 other inland cities (2014)
• China failed to live up to its commitment when joining WTO (2001) for
“ICT and telecom market opening to foreign producers”
• Numerous laws and operational infrastructure to conduct censorship
• Hong Kong’s telecom regime was completely liberalized since 2003
• Buy back incumbent’s external exclusivity license in 1998
• Telecom Ordinance: No limit on number of licenses and foreign
ownership
• No law or censorship infrastructure, until the NSL
• Vibrant civil society, until the NSL
4. How to shut down the Internet in Hong Kong?
• Emergency Regulations Ordinance (Cap. 241)
• (1) On any occasion which the Chief Executive in Council may consider to be an
occasion of emergency or public danger he may make any regulations whatsoever
which he may consider desirable in the public interest.
• (2) Without prejudice to the generality of the provisions of subsection (1), such
regulations may provide for
(a)censorship, and the control and suppression of publications, writings, maps,
plans, photographs, communications and means of communication;
• The ERO was used many times in the last three yers to bypass the legislature
• Telecommunications Ordinance (Cap. 106) Section 13
• 13. Possession of telecommunications stations taken by government in emergencies
• (1) Where, in the opinion of the Governor, an emergency has arisen in which it is
expedient for the public service that the Government should have control over
telecommunications stations, the Governor, by warrant under his hand, may direct
or cause such telecommunications stations as are specified in the warrant to be
taken possession of and to be used for the service of the Government…
5. The decline of trust of Internet freedom
• FireChat during
Hong Kong’s
Umbrella
Movement (2014)
and Taiwan’s
Sunflower
Movement (2014)
6. 2019 Anti-extradition bill protests
• Widespread use of Telegram groups
• Apple App Store removal of apps
8. High Court injunction to censor Internet content (2019.10.31)
• The Police and the Secretary for Justice applied for and was granted a High
Court injunction
• Prohibiting anyone from communicating through “any Internet-based
platform” any materials that “promotes, encourages or incites the use or
threat of violence, intended or likely to cause” bodily injury or property
damage
• Broad and vague scope caused chilling effect on freedom of expression
• Bypass any legislation
• Local civil society applied for discharge or restriction on the injunction
• High Court ruled to continue the injunction with minor amendments to
emphasize the wilfulness of the act
• Injunction was extended and never rescinded
• This can be considered to be the first arbitrary legal weapon against free speech
in Hong Kong
9. National Security Law (2020)
• Mainland law imposed on Hong Kong — not based on Common Law —
targeting against “secession, subversion, terrorism and collusion with
foreign forces”
• Implementation Rules for Article 43 of the Law of the People's Republic of
China on Safeguarding National Security in the Hong Kong SAR:
• A “designated police officer” can order to take down messages or
contention any electronic platform that was deemed “likely to constitute
an offense endangering national security”
• Failure to comply means the service provider may face seizure of their
electronic devices, plus fines and prison terms up to 6 months
• Chief Executive may authorize the police to intercept communications and
conduct surveillance to “prevent and detect offences endangering
national security”
• The universal reach of the law’s extraterritorial power
10. After NSL
• Self censorship
• Removing social media posts or entire profiles
• Closing of many online press outlets
• Media closing
• Apple Daily, StandNews, and many others
• Blocking of websites hosted overseas
• HKChronicles (doxxing of police officers and pro-Beijing figures)
• Taiwan’s Transitional Justice Commission*, Presbyterian Church*, DPP*,
Recruitment Centre of National Armed Force
• 2021 Hong Kong Charter
• June 4th Incident Online Museum
• Hong Kong Watch (UK human rights group)
• Some were later reported to be accessible again (*)
• Real name system for prepaid SIM cards (from March 1 2022)
11. What’s Next?
• Observations
• Contrasts with Taiwan, one of the freest in Asia: Hong Kong’s “One Country One System” reality
• How easy it is to go from free to censorship
• Role of global platforms
• Large commercial presence of Facebook, Google, AWS, Microsoft, etc.
• The government has so far stopped short of openly imposing orders on them to censor
• Very limited underseas cable investment or capacity expansion
• PLCN submarine network etc. redirected to terminate at Taiwan
• Likely a gradual decline of its role as regional telecom and datacenter hub
• Misinformation law
• Imitating Singapore’s POFMA or India’s ITA?
• Make it easier for government to remove any undesirable speech, without invoking NSL
• More pressure on global platforms
• Article 23 local national security law legislation
• Relating to “treason, secession, sedition, subversion against the Central People's Government, or
theft of state secrets” and overseas political ties
• GFW 2.0 — A soft and dynamic firewall?
• More censorship, surveillance and self-censorship; less bandwidth growth, investment and freedom