SlideShare a Scribd company logo
Censorship, Surveillance and
Cyberthreats in Hong Kong
Charles Mok


Global Digital Policy Incubator, Stanford University


April 12, 2022
From freedom to censorship
• Before NSL (2020)


• No official or legal mechanism to censor


• No external firewall or filtering mechanism


• Regional telecom hub for underseas cables and datacenters


• Government attempts to introduce censorship


• 2012: Consultation of Control of Obscene and Indecent Articles
Ordinance


• Proposal for mandatory “operator-level content filtering” withdrawn
after public opposition


• 2016: Copyright Ordinance Amendments


• Criminalization of online derivative works of copyrighted materials


• Withdrawn by government in legislature after filibuster in legislature
Can China’s Great Firewall extend to Hong Kong?
• China


• State-owned telecom controls external gateways from 3 coastal cities
with backbone of at least 7 other inland cities (2014)


• China failed to live up to its commitment when joining WTO (2001) for
“ICT and telecom market opening to foreign producers”


• Numerous laws and operational infrastructure to conduct censorship


• Hong Kong’s telecom regime was completely liberalized since 2003


• Buy back incumbent’s external exclusivity license in 1998


• Telecom Ordinance: No limit on number of licenses and foreign
ownership


• No law or censorship infrastructure, until the NSL


• Vibrant civil society, until the NSL
How to shut down the Internet in Hong Kong?
• Emergency Regulations Ordinance (Cap. 241)


• (1) On any occasion which the Chief Executive in Council may consider to be an
occasion of emergency or public danger he may make any regulations whatsoever
which he may consider desirable in the public interest.


• (2) Without prejudice to the generality of the provisions of subsection (1), such
regulations may provide for


(a)censorship, and the control and suppression of publications, writings, maps,
plans, photographs, communications and means of communication;


• The ERO was used many times in the last three yers to bypass the legislature


• Telecommunications Ordinance (Cap. 106) Section 13


• 13. Possession of telecommunications stations taken by government in emergencies


• (1) Where, in the opinion of the Governor, an emergency has arisen in which it is
expedient for the public service that the Government should have control over
telecommunications stations, the Governor, by warrant under his hand, may direct
or cause such telecommunications stations as are specified in the warrant to be
taken possession of and to be used for the service of the Government…
The decline of trust of Internet freedom
• FireChat during


Hong Kong’s


Umbrella


Movement (2014)


and Taiwan’s


Sunflower


Movement (2014)
2019 Anti-extradition bill protests
• Widespread use of Telegram groups


• Apple App Store removal of apps
2019 Anti-extradition bill protests
• Doxxing, from both sides, but law


enforcement on one side only
High Court injunction to censor Internet content (2019.10.31)
• The Police and the Secretary for Justice applied for and was granted a High
Court injunction


• Prohibiting anyone from communicating through “any Internet-based
platform” any materials that “promotes, encourages or incites the use or
threat of violence, intended or likely to cause” bodily injury or property
damage


• Broad and vague scope caused chilling effect on freedom of expression


• Bypass any legislation


• Local civil society applied for discharge or restriction on the injunction


• High Court ruled to continue the injunction with minor amendments to
emphasize the wilfulness of the act


• Injunction was extended and never rescinded


• This can be considered to be the first arbitrary legal weapon against free speech
in Hong Kong
National Security Law (2020)
• Mainland law imposed on Hong Kong — not based on Common Law —
targeting against “secession, subversion, terrorism and collusion with
foreign forces”


• Implementation Rules for Article 43 of the Law of the People's Republic of
China on Safeguarding National Security in the Hong Kong SAR:


• A “designated police officer” can order to take down messages or
contention any electronic platform that was deemed “likely to constitute
an offense endangering national security”


• Failure to comply means the service provider may face seizure of their
electronic devices, plus fines and prison terms up to 6 months


• Chief Executive may authorize the police to intercept communications and
conduct surveillance to “prevent and detect offences endangering
national security”


• The universal reach of the law’s extraterritorial power
After NSL
• Self censorship


• Removing social media posts or entire profiles


• Closing of many online press outlets


• Media closing


• Apple Daily, StandNews, and many others


• Blocking of websites hosted overseas


• HKChronicles (doxxing of police officers and pro-Beijing figures)


• Taiwan’s Transitional Justice Commission*, Presbyterian Church*, DPP*,
Recruitment Centre of National Armed Force


• 2021 Hong Kong Charter


• June 4th Incident Online Museum


• Hong Kong Watch (UK human rights group)


• Some were later reported to be accessible again (*)


• Real name system for prepaid SIM cards (from March 1 2022)
What’s Next?
• Observations


• Contrasts with Taiwan, one of the freest in Asia: Hong Kong’s “One Country One System” reality


• How easy it is to go from free to censorship


• Role of global platforms


• Large commercial presence of Facebook, Google, AWS, Microsoft, etc.


• The government has so far stopped short of openly imposing orders on them to censor


• Very limited underseas cable investment or capacity expansion


• PLCN submarine network etc. redirected to terminate at Taiwan


• Likely a gradual decline of its role as regional telecom and datacenter hub


• Misinformation law


• Imitating Singapore’s POFMA or India’s ITA?


• Make it easier for government to remove any undesirable speech, without invoking NSL


• More pressure on global platforms


• Article 23 local national security law legislation


• Relating to “treason, secession, sedition, subversion against the Central People's Government, or
theft of state secrets” and overseas political ties


• GFW 2.0 — A soft and dynamic firewall?


• More censorship, surveillance and self-censorship; less bandwidth growth, investment and freedom
Charles Mok


Visiting Scholar


Global Digital Policy Incubator
@charlesmok


cpmok@stanford.edu

More Related Content

What's hot

NGA legislation in Poland
 NGA legislation in Poland NGA legislation in Poland
NGA legislation in Poland
Jaromir Novak
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
M S Siddiqui
 
Internet Freedom 2.1
Internet Freedom 2.1Internet Freedom 2.1
Internet Freedom 2.1
Dhruva Jaishankar
 
Foi presentation
Foi presentationFoi presentation
Foi presentation
Ernesto Neri
 
Un may 28, 2019
Un may 28, 2019Un may 28, 2019
Un may 28, 2019
ZahidManiyar
 
FirstNet: Recent Developments and Current Uncertainties for Local Governments
FirstNet: Recent Developments and Current Uncertainties for Local GovernmentsFirstNet: Recent Developments and Current Uncertainties for Local Governments
FirstNet: Recent Developments and Current Uncertainties for Local Governments
Best Best and Krieger LLP
 
Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source Software
Seaparo Phala
 
Presentation at IFLA Congress in Cape Town on 18 August 2015
Presentation at IFLA Congress in Cape Town on 18 August 2015Presentation at IFLA Congress in Cape Town on 18 August 2015
Presentation at IFLA Congress in Cape Town on 18 August 2015
Mariya Badeva-Bright
 
Newsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently Changed
Newsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently ChangedNewsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently Changed
Newsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently Changed
Meyers Nave
 
Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa
ICT4Democracy in East Africa
 
Us legislation authorizing wiretapping
Us legislation authorizing wiretappingUs legislation authorizing wiretapping
Us legislation authorizing wiretappingAngela Strudwick
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
Md.Azizul hakim Anik
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
Commonwealth Telecommunications Organisation
 
Broadcast Bill
Broadcast BillBroadcast Bill
Broadcast Bill
Rohitha Sankar
 
FCC Proposes New Rules On Local Wireless Siting
FCC Proposes New Rules On Local Wireless SitingFCC Proposes New Rules On Local Wireless Siting
FCC Proposes New Rules On Local Wireless Siting
Best Best and Krieger LLP
 
Open internet in singapore
Open internet in singaporeOpen internet in singapore
Open internet in singapore
Benjamin Ang
 
History of the regulatory office
History of the regulatory officeHistory of the regulatory office
History of the regulatory office
Cheldy S, Elumba-Pableo
 
Tatoa FCC Threats and Opportunities
Tatoa FCC Threats and OpportunitiesTatoa FCC Threats and Opportunities
Tatoa FCC Threats and Opportunities
Best Best and Krieger LLP
 
FCC Wireless Rulemaking - 2013
FCC Wireless Rulemaking - 2013FCC Wireless Rulemaking - 2013
FCC Wireless Rulemaking - 2013
Best Best and Krieger LLP
 
Cellphone Tower Regulation: Maximizing Revenue While Protecting Local Interests
Cellphone Tower Regulation: Maximizing Revenue While Protecting Local InterestsCellphone Tower Regulation: Maximizing Revenue While Protecting Local Interests
Cellphone Tower Regulation: Maximizing Revenue While Protecting Local Interests
Best Best and Krieger LLP
 

What's hot (20)

NGA legislation in Poland
 NGA legislation in Poland NGA legislation in Poland
NGA legislation in Poland
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
Internet Freedom 2.1
Internet Freedom 2.1Internet Freedom 2.1
Internet Freedom 2.1
 
Foi presentation
Foi presentationFoi presentation
Foi presentation
 
Un may 28, 2019
Un may 28, 2019Un may 28, 2019
Un may 28, 2019
 
FirstNet: Recent Developments and Current Uncertainties for Local Governments
FirstNet: Recent Developments and Current Uncertainties for Local GovernmentsFirstNet: Recent Developments and Current Uncertainties for Local Governments
FirstNet: Recent Developments and Current Uncertainties for Local Governments
 
Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source Software
 
Presentation at IFLA Congress in Cape Town on 18 August 2015
Presentation at IFLA Congress in Cape Town on 18 August 2015Presentation at IFLA Congress in Cape Town on 18 August 2015
Presentation at IFLA Congress in Cape Town on 18 August 2015
 
Newsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently Changed
Newsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently ChangedNewsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently Changed
Newsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently Changed
 
Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa
 
Us legislation authorizing wiretapping
Us legislation authorizing wiretappingUs legislation authorizing wiretapping
Us legislation authorizing wiretapping
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
Broadcast Bill
Broadcast BillBroadcast Bill
Broadcast Bill
 
FCC Proposes New Rules On Local Wireless Siting
FCC Proposes New Rules On Local Wireless SitingFCC Proposes New Rules On Local Wireless Siting
FCC Proposes New Rules On Local Wireless Siting
 
Open internet in singapore
Open internet in singaporeOpen internet in singapore
Open internet in singapore
 
History of the regulatory office
History of the regulatory officeHistory of the regulatory office
History of the regulatory office
 
Tatoa FCC Threats and Opportunities
Tatoa FCC Threats and OpportunitiesTatoa FCC Threats and Opportunities
Tatoa FCC Threats and Opportunities
 
FCC Wireless Rulemaking - 2013
FCC Wireless Rulemaking - 2013FCC Wireless Rulemaking - 2013
FCC Wireless Rulemaking - 2013
 
Cellphone Tower Regulation: Maximizing Revenue While Protecting Local Interests
Cellphone Tower Regulation: Maximizing Revenue While Protecting Local InterestsCellphone Tower Regulation: Maximizing Revenue While Protecting Local Interests
Cellphone Tower Regulation: Maximizing Revenue While Protecting Local Interests
 

Similar to Censorship, Surveillance and Cyber Threats in Hong Kong.pdf

Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
Charles Mok
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
Charles Mok
 
Section 69 Information technology act 2001
Section 69 Information technology act 2001Section 69 Information technology act 2001
Section 69 Information technology act 2001
22010122059
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Charles Mok
 
IP Transition and Net Neutrality: Why Local Governments Should Care
IP Transition and Net Neutrality:Why Local Governments Should CareIP Transition and Net Neutrality:Why Local Governments Should Care
IP Transition and Net Neutrality: Why Local Governments Should Care
Best Best and Krieger LLP
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
Charles Mok
 
Art_19(1)(a)_IT.pdf
Art_19(1)(a)_IT.pdfArt_19(1)(a)_IT.pdf
Art_19(1)(a)_IT.pdf
ASHUTOSHKUMARPANDEY40
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
Himanshu Jawa
 
Holly Raiche - Net Neutrality - ArmIGF2015
Holly Raiche - Net Neutrality - ArmIGF2015Holly Raiche - Net Neutrality - ArmIGF2015
Holly Raiche - Net Neutrality - ArmIGF2015
Arm Igf
 
Lehigh net neutrality colloquium (no video) final
Lehigh net neutrality colloquium (no video)   finalLehigh net neutrality colloquium (no video)   final
Lehigh net neutrality colloquium (no video) final
Don Holloway
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
Swant Anand
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
Dr. Prashant Vats
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
blogzilla
 
Otieno antony rethinking internet shutdown
Otieno antony   rethinking internet shutdownOtieno antony   rethinking internet shutdown
Otieno antony rethinking internet shutdown
Otieno Antony
 
Taking A Look At Net Neutrality
Taking A Look At Net NeutralityTaking A Look At Net Neutrality
Taking A Look At Net Neutrality
Rochelle Schear
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
Wendy Qi
 
International trends in mobile law
International trends in mobile lawInternational trends in mobile law
International trends in mobile law
Jacqueline Fick
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital Evidence
Shahid Jamal Tubrazy
 
Regulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platformRegulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platform
Shamseena Zubair
 
Net Neutrality is Dead, Long Live the Open Internet
Net Neutrality is Dead, Long Live the Open InternetNet Neutrality is Dead, Long Live the Open Internet
Net Neutrality is Dead, Long Live the Open Internet
Cybera Inc.
 

Similar to Censorship, Surveillance and Cyber Threats in Hong Kong.pdf (20)

Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Section 69 Information technology act 2001
Section 69 Information technology act 2001Section 69 Information technology act 2001
Section 69 Information technology act 2001
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
 
IP Transition and Net Neutrality: Why Local Governments Should Care
IP Transition and Net Neutrality:Why Local Governments Should CareIP Transition and Net Neutrality:Why Local Governments Should Care
IP Transition and Net Neutrality: Why Local Governments Should Care
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
 
Art_19(1)(a)_IT.pdf
Art_19(1)(a)_IT.pdfArt_19(1)(a)_IT.pdf
Art_19(1)(a)_IT.pdf
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
Holly Raiche - Net Neutrality - ArmIGF2015
Holly Raiche - Net Neutrality - ArmIGF2015Holly Raiche - Net Neutrality - ArmIGF2015
Holly Raiche - Net Neutrality - ArmIGF2015
 
Lehigh net neutrality colloquium (no video) final
Lehigh net neutrality colloquium (no video)   finalLehigh net neutrality colloquium (no video)   final
Lehigh net neutrality colloquium (no video) final
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Otieno antony rethinking internet shutdown
Otieno antony   rethinking internet shutdownOtieno antony   rethinking internet shutdown
Otieno antony rethinking internet shutdown
 
Taking A Look At Net Neutrality
Taking A Look At Net NeutralityTaking A Look At Net Neutrality
Taking A Look At Net Neutrality
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
International trends in mobile law
International trends in mobile lawInternational trends in mobile law
International trends in mobile law
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital Evidence
 
Regulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platformRegulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platform
 
Net Neutrality is Dead, Long Live the Open Internet
Net Neutrality is Dead, Long Live the Open InternetNet Neutrality is Dead, Long Live the Open Internet
Net Neutrality is Dead, Long Live the Open Internet
 

More from Charles Mok

Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
Charles Mok
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
Charles Mok
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
Charles Mok
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
Charles Mok
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Charles Mok
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
Charles Mok
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
Charles Mok
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
Charles Mok
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
Charles Mok
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
Charles Mok
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
Charles Mok
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
Charles Mok
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
Charles Mok
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
Charles Mok
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
Charles Mok
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" Laws
Charles Mok
 
2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T 2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T
Charles Mok
 
2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點
Charles Mok
 
在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由
Charles Mok
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Charles Mok
 

More from Charles Mok (20)

Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" Laws
 
2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T 2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T
 
2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點
 
在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
 

Recently uploaded

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Censorship, Surveillance and Cyber Threats in Hong Kong.pdf

  • 1. Censorship, Surveillance and Cyberthreats in Hong Kong Charles Mok Global Digital Policy Incubator, Stanford University April 12, 2022
  • 2. From freedom to censorship • Before NSL (2020) • No official or legal mechanism to censor • No external firewall or filtering mechanism • Regional telecom hub for underseas cables and datacenters • Government attempts to introduce censorship • 2012: Consultation of Control of Obscene and Indecent Articles Ordinance • Proposal for mandatory “operator-level content filtering” withdrawn after public opposition • 2016: Copyright Ordinance Amendments • Criminalization of online derivative works of copyrighted materials • Withdrawn by government in legislature after filibuster in legislature
  • 3. Can China’s Great Firewall extend to Hong Kong? • China • State-owned telecom controls external gateways from 3 coastal cities with backbone of at least 7 other inland cities (2014) • China failed to live up to its commitment when joining WTO (2001) for “ICT and telecom market opening to foreign producers” • Numerous laws and operational infrastructure to conduct censorship • Hong Kong’s telecom regime was completely liberalized since 2003 • Buy back incumbent’s external exclusivity license in 1998 • Telecom Ordinance: No limit on number of licenses and foreign ownership • No law or censorship infrastructure, until the NSL • Vibrant civil society, until the NSL
  • 4. How to shut down the Internet in Hong Kong? • Emergency Regulations Ordinance (Cap. 241) • (1) On any occasion which the Chief Executive in Council may consider to be an occasion of emergency or public danger he may make any regulations whatsoever which he may consider desirable in the public interest. • (2) Without prejudice to the generality of the provisions of subsection (1), such regulations may provide for 
 (a)censorship, and the control and suppression of publications, writings, maps, plans, photographs, communications and means of communication; • The ERO was used many times in the last three yers to bypass the legislature • Telecommunications Ordinance (Cap. 106) Section 13 • 13. Possession of telecommunications stations taken by government in emergencies • (1) Where, in the opinion of the Governor, an emergency has arisen in which it is expedient for the public service that the Government should have control over telecommunications stations, the Governor, by warrant under his hand, may direct or cause such telecommunications stations as are specified in the warrant to be taken possession of and to be used for the service of the Government…
  • 5. The decline of trust of Internet freedom • FireChat during 
 Hong Kong’s 
 Umbrella 
 Movement (2014) 
 and Taiwan’s 
 Sunflower 
 Movement (2014)
  • 6. 2019 Anti-extradition bill protests • Widespread use of Telegram groups • Apple App Store removal of apps
  • 7. 2019 Anti-extradition bill protests • Doxxing, from both sides, but law 
 enforcement on one side only
  • 8. High Court injunction to censor Internet content (2019.10.31) • The Police and the Secretary for Justice applied for and was granted a High Court injunction • Prohibiting anyone from communicating through “any Internet-based platform” any materials that “promotes, encourages or incites the use or threat of violence, intended or likely to cause” bodily injury or property damage • Broad and vague scope caused chilling effect on freedom of expression • Bypass any legislation • Local civil society applied for discharge or restriction on the injunction • High Court ruled to continue the injunction with minor amendments to emphasize the wilfulness of the act • Injunction was extended and never rescinded • This can be considered to be the first arbitrary legal weapon against free speech in Hong Kong
  • 9. National Security Law (2020) • Mainland law imposed on Hong Kong — not based on Common Law — targeting against “secession, subversion, terrorism and collusion with foreign forces” • Implementation Rules for Article 43 of the Law of the People's Republic of China on Safeguarding National Security in the Hong Kong SAR: • A “designated police officer” can order to take down messages or contention any electronic platform that was deemed “likely to constitute an offense endangering national security” • Failure to comply means the service provider may face seizure of their electronic devices, plus fines and prison terms up to 6 months • Chief Executive may authorize the police to intercept communications and conduct surveillance to “prevent and detect offences endangering national security” • The universal reach of the law’s extraterritorial power
  • 10. After NSL • Self censorship • Removing social media posts or entire profiles • Closing of many online press outlets • Media closing • Apple Daily, StandNews, and many others • Blocking of websites hosted overseas • HKChronicles (doxxing of police officers and pro-Beijing figures) • Taiwan’s Transitional Justice Commission*, Presbyterian Church*, DPP*, Recruitment Centre of National Armed Force • 2021 Hong Kong Charter • June 4th Incident Online Museum • Hong Kong Watch (UK human rights group) • Some were later reported to be accessible again (*) • Real name system for prepaid SIM cards (from March 1 2022)
  • 11. What’s Next? • Observations • Contrasts with Taiwan, one of the freest in Asia: Hong Kong’s “One Country One System” reality • How easy it is to go from free to censorship • Role of global platforms • Large commercial presence of Facebook, Google, AWS, Microsoft, etc. • The government has so far stopped short of openly imposing orders on them to censor • Very limited underseas cable investment or capacity expansion • PLCN submarine network etc. redirected to terminate at Taiwan • Likely a gradual decline of its role as regional telecom and datacenter hub • Misinformation law • Imitating Singapore’s POFMA or India’s ITA? • Make it easier for government to remove any undesirable speech, without invoking NSL • More pressure on global platforms • Article 23 local national security law legislation • Relating to “treason, secession, sedition, subversion against the Central People's Government, or theft of state secrets” and overseas political ties • GFW 2.0 — A soft and dynamic firewall? • More censorship, surveillance and self-censorship; less bandwidth growth, investment and freedom
  • 12. Charles Mok Visiting Scholar Global Digital Policy Incubator @charlesmok cpmok@stanford.edu