SlideShare a Scribd company logo
1 of 13
Download to read offline
Charles Mok, Global Digital Policy Incubator, Cyber Policy Center, Stanford University. Jan/Feb 2024.
Digital Repression and Techno-
Authoritarianism
Digital Repression/Techno-Authoritarianism
What does it mean to you?
• Censorship
• Disinformation / Propaganda
• Surveillance / Privacy
• Cyberattacks / Cybersecurity — state-sponsored
• Cyber Sovereignty
• Internet Shutdown / Fragmentation
• Trend:
• From defensive to o
ff
ensive
• From local to beyond borders
China’s Great Firewall (GFW)
Digital Repression 1.0
• “Keeping things out,” at
fi
rst
• Technology and laws, but also infrastructural and operational: Total control
• State-controlled telecom sector: from gateways to providers
• Massive human resources for real-time monitoring
• Tackling Web 1.0 to Web 2.0 (user-generated content) to the mobile/social media world
• More proactive surveillance and disinformation
• The future is AI?
• No longer de
fi
ned by boundaries of borders — GFW going global
But the GFW is not for everyone
Calling for GFW 2.0
• Example of Cambodia’s National Internet Gateway (work in progress since 2021)
• Telecom infrastructure control and huge cost to surveil
• Dependency on foreign/global platforms and telcos (except for China)
• The evolution of digital repression is still based on the four pillars of the GFW:
• Technology — The Digital Silk Road
• Law — more speci
fi
c and targeted local laws with global reach
• Infrastructure, and operation — exert control via legal enforcement
Digital Authoritarian Legal Developments
Some examples
• India
• IT Rules amendments 2021 — removal of misinformation, control over platforms
• Digital Personal Data Protection 2023 — to block services on vague grounds
• Telecom Act 2023 - interception of communications for national security
• Singapore
• Protection from Online Falsehoods and Manipulation Act (POFMA) 2019 — content removal and punishment
against “fake news”
• Foreign Interference Countermeasures Act (FICA) 2023 — Heavy
fi
nes and jail terms against those deemed to be
“preparing or planning” to publish “forbidden” information online without declaring foreign involvement;
unprecedented powers of government scrutiny and restrictions on the
fi
nancial a
ff
airs of targeted individuals and
entities.
• The common characteristics: Broad and vague.
Example for even just a civil case
• //The sweeping order comes as a result of legal
action by a group purporting to represent Appin’s
digital training centers — who say their students’
reputations are damaged by Reuters’ allegedly
false reporting. Last month, Additional District
Judge Rakesh Kumar Singh ruled that the story
should be suppressed pending trial.//
• Other media (Wired, Lawfare, Brookings Institute
etc.) removed references or excerpts: //Several of
the U.S. platforms who later removed content
became aware of the disputed allegations not
because they were following Indian legal news, but
after hearing from Khare’s American
fi
rm, Clare
Locke.//
• “Everyone except” The Citizen Lab “complied”
• Beyond laws, think about the power of a
“cooperative” foreign judiciary
The power of a court
Democracies make bad laws too
Global assault on privacy by encryption is led by Western democracies
• UK’s Online Safety Bill has passed in 2023
• Australia proposing “industry standard for Relevant Electronic Services and Designated Internet Services” (2023)
• US laws in Congress:
• EARN IT Act (Eliminating Abusive and Rampant Neglect of Interactive Technologies Act of 2022): To establish
a National Commission on Online Child Sexual Exploitation Prevention, and for other purposes
• STOP CSAM Act (Strengthening Transparency and Obligations to Protect Children Su
ff
ering from Abuse and
Mistreatment Act of 2023)
• KOSA (Kids Online Safety Act of 2022): To protect the safety of children on the internet.
• Autocrats can justify themselves: “Democracies (you guys) do it too.”
• Exception: The EU and the European Parliament, which moved to act against mass surveillance and any ban on
encryption
What’s next? Transnational Digital Repression
Trend 1: In
fl
uencing global technology standards
• China’s e
ff
ort to sponsor and in
fl
uence global technology standard setting bodies:
ITU, IEEE, IETF, etc.
• Attempts to migrate standard-setting and Internet operational powers from multi-
stakeholder bodies such as IEEE, IETF, ICANN etc. to government-led bodies such
as ITU and its subgroups, under the UN
• E
ff
orts are often led via proxies such as Huawei and academic research institutions
• Attempts to set up its own axis of nations and corporations such as the World
Internet Congress to support its vision for more government control for better
“security, safety and harmony” of the future Internet, in the name of national and
global security, anti-terrorism and combatting cybercrime.
Trend 2: Extraterritoriality
• Manufacturing a new legal basis:
Extending global jurisdiction for data
laws, national security laws, etc.
• You’re not “safe anywhere”: A global
chilling e
ff
ect, at the minimum, and
more, wherever you are.
Transnational Digital Repression
Transnational Digital Repression
Trend 3: Taking over the Rule-based World Order
• Not taking it down, but taking it over!
• Case: UN Cybercrime Convention
• Governments cooperating to combat cybercrime (a truly huge problem!), that should be a good thing, right?
• How to de
fi
ne cybercrime? Anything done with a PC or phone, including expressing dissent?
• Broad community concerns: Gender, LGBTQ+, religion, labor, political dissent, etc.
• Power of secret investigation for governments to obtain and share data from global Internet platforms
• How can platforms not comply? The “follow local law” excuse.
• Serious erosion of the basis of MLAT and extradition agreements between countries — actually, bad for combatting
crimes!
• Western governments are quite muted in the convention discussion (except Canada)
• Largely represented by justice and law enforcement branches, not human rights and diplomatic branches
• Lack public awareness — perfect example of a process that excluded the civil society and private sector i.e. the “UN”
The Global Weaponization of Legal and
Technological Means to Limit Online
Freedom and Redefine Truth For
Citizens Anywhere
References
• The Everything, Everywhere Censorship of China (2023)
https://www.freiheit.org/publikation/everything-everywhere-censorship-china
• Internet Impact Brief: Cambodia National Internet Gateway
https://www.internetsociety.org/resources/2022/internet-impact-brief-cambodia-
national-internet-gateway/
• How a Judge in India Prevented Americans From Seeing a Blockbuster Report
https://www.politico.com/news/magazine/2024/01/19/india-judge-reuters-
story-00136339
• Joint Statement on the Proposed Cybercrime Treaty Ahead of the Concluding
Session
https://www.hrw.org/sites/default/
fi
les/media_2024/01/Joint.Advocacy.Statement-
Cybercrime.Convention-Jan.23.2024.pdf
Charles Mok
Global Digital Policy Incubator
Cyber Policy Center
Stanford University
cpmok@stanford.edu

More Related Content

Similar to Digital Repression and Techno-Authoritarianism

Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Wendy Qi
 
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfPhngLinhTrn33
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference Endcode_org
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018Nilima Tariq
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCharles Mok
 
International internet governance
International internet governanceInternational internet governance
International internet governanceJillian York
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetDibussi Tande
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
 
Chinas Great FirewallChina has a population of over 14 bil.pdf
Chinas Great FirewallChina has a population of over 14 bil.pdfChinas Great FirewallChina has a population of over 14 bil.pdf
Chinas Great FirewallChina has a population of over 14 bil.pdfaghsports
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfWAIHIGA K.MUTURI
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESijfcstjournal
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimesijfcstjournal
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxParasSehgal12
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++Roxanne St Ives
 
State of the Internet
State of the InternetState of the Internet
State of the InternetCharles Mok
 
Regulating Code - EUI Workshop
Regulating Code - EUI WorkshopRegulating Code - EUI Workshop
Regulating Code - EUI WorkshopChris Marsden
 

Similar to Digital Repression and Techno-Authoritarianism (20)

Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
 
Internet governance
Internet governanceInternet governance
Internet governance
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
Cyber Crime Challanges
Cyber Crime ChallangesCyber Crime Challanges
Cyber Crime Challanges
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
International internet governance
International internet governanceInternational internet governance
International internet governance
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Chinas Great FirewallChina has a population of over 14 bil.pdf
Chinas Great FirewallChina has a population of over 14 bil.pdfChinas Great FirewallChina has a population of over 14 bil.pdf
Chinas Great FirewallChina has a population of over 14 bil.pdf
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
 
PC213.L3.pdf
PC213.L3.pdfPC213.L3.pdf
PC213.L3.pdf
 
State of the Internet
State of the InternetState of the Internet
State of the Internet
 
Regulating Code - EUI Workshop
Regulating Code - EUI WorkshopRegulating Code - EUI Workshop
Regulating Code - EUI Workshop
 

More from Charles Mok

Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet Charles Mok
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionCharles Mok
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇Charles Mok
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfCharles Mok
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyCharles Mok
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsCharles Mok
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and EthicsCharles Mok
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇Charles Mok
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdfCharles Mok
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdfCharles Mok
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Charles Mok
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldCharles Mok
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsCharles Mok
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and IdentityCharles Mok
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckCharles Mok
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsCharles Mok
 
2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T 2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T Charles Mok
 
2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點Charles Mok
 
在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由Charles Mok
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Charles Mok
 

More from Charles Mok (20)

Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" Laws
 
2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T 2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T
 
2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點
 
在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Digital Repression and Techno-Authoritarianism

  • 1. Charles Mok, Global Digital Policy Incubator, Cyber Policy Center, Stanford University. Jan/Feb 2024. Digital Repression and Techno- Authoritarianism
  • 2. Digital Repression/Techno-Authoritarianism What does it mean to you? • Censorship • Disinformation / Propaganda • Surveillance / Privacy • Cyberattacks / Cybersecurity — state-sponsored • Cyber Sovereignty • Internet Shutdown / Fragmentation • Trend: • From defensive to o ff ensive • From local to beyond borders
  • 3. China’s Great Firewall (GFW) Digital Repression 1.0 • “Keeping things out,” at fi rst • Technology and laws, but also infrastructural and operational: Total control • State-controlled telecom sector: from gateways to providers • Massive human resources for real-time monitoring • Tackling Web 1.0 to Web 2.0 (user-generated content) to the mobile/social media world • More proactive surveillance and disinformation • The future is AI? • No longer de fi ned by boundaries of borders — GFW going global
  • 4. But the GFW is not for everyone Calling for GFW 2.0 • Example of Cambodia’s National Internet Gateway (work in progress since 2021) • Telecom infrastructure control and huge cost to surveil • Dependency on foreign/global platforms and telcos (except for China) • The evolution of digital repression is still based on the four pillars of the GFW: • Technology — The Digital Silk Road • Law — more speci fi c and targeted local laws with global reach • Infrastructure, and operation — exert control via legal enforcement
  • 5. Digital Authoritarian Legal Developments Some examples • India • IT Rules amendments 2021 — removal of misinformation, control over platforms • Digital Personal Data Protection 2023 — to block services on vague grounds • Telecom Act 2023 - interception of communications for national security • Singapore • Protection from Online Falsehoods and Manipulation Act (POFMA) 2019 — content removal and punishment against “fake news” • Foreign Interference Countermeasures Act (FICA) 2023 — Heavy fi nes and jail terms against those deemed to be “preparing or planning” to publish “forbidden” information online without declaring foreign involvement; unprecedented powers of government scrutiny and restrictions on the fi nancial a ff airs of targeted individuals and entities. • The common characteristics: Broad and vague.
  • 6. Example for even just a civil case • //The sweeping order comes as a result of legal action by a group purporting to represent Appin’s digital training centers — who say their students’ reputations are damaged by Reuters’ allegedly false reporting. Last month, Additional District Judge Rakesh Kumar Singh ruled that the story should be suppressed pending trial.// • Other media (Wired, Lawfare, Brookings Institute etc.) removed references or excerpts: //Several of the U.S. platforms who later removed content became aware of the disputed allegations not because they were following Indian legal news, but after hearing from Khare’s American fi rm, Clare Locke.// • “Everyone except” The Citizen Lab “complied” • Beyond laws, think about the power of a “cooperative” foreign judiciary The power of a court
  • 7. Democracies make bad laws too Global assault on privacy by encryption is led by Western democracies • UK’s Online Safety Bill has passed in 2023 • Australia proposing “industry standard for Relevant Electronic Services and Designated Internet Services” (2023) • US laws in Congress: • EARN IT Act (Eliminating Abusive and Rampant Neglect of Interactive Technologies Act of 2022): To establish a National Commission on Online Child Sexual Exploitation Prevention, and for other purposes • STOP CSAM Act (Strengthening Transparency and Obligations to Protect Children Su ff ering from Abuse and Mistreatment Act of 2023) • KOSA (Kids Online Safety Act of 2022): To protect the safety of children on the internet. • Autocrats can justify themselves: “Democracies (you guys) do it too.” • Exception: The EU and the European Parliament, which moved to act against mass surveillance and any ban on encryption
  • 8. What’s next? Transnational Digital Repression Trend 1: In fl uencing global technology standards • China’s e ff ort to sponsor and in fl uence global technology standard setting bodies: ITU, IEEE, IETF, etc. • Attempts to migrate standard-setting and Internet operational powers from multi- stakeholder bodies such as IEEE, IETF, ICANN etc. to government-led bodies such as ITU and its subgroups, under the UN • E ff orts are often led via proxies such as Huawei and academic research institutions • Attempts to set up its own axis of nations and corporations such as the World Internet Congress to support its vision for more government control for better “security, safety and harmony” of the future Internet, in the name of national and global security, anti-terrorism and combatting cybercrime.
  • 9. Trend 2: Extraterritoriality • Manufacturing a new legal basis: Extending global jurisdiction for data laws, national security laws, etc. • You’re not “safe anywhere”: A global chilling e ff ect, at the minimum, and more, wherever you are. Transnational Digital Repression
  • 10. Transnational Digital Repression Trend 3: Taking over the Rule-based World Order • Not taking it down, but taking it over! • Case: UN Cybercrime Convention • Governments cooperating to combat cybercrime (a truly huge problem!), that should be a good thing, right? • How to de fi ne cybercrime? Anything done with a PC or phone, including expressing dissent? • Broad community concerns: Gender, LGBTQ+, religion, labor, political dissent, etc. • Power of secret investigation for governments to obtain and share data from global Internet platforms • How can platforms not comply? The “follow local law” excuse. • Serious erosion of the basis of MLAT and extradition agreements between countries — actually, bad for combatting crimes! • Western governments are quite muted in the convention discussion (except Canada) • Largely represented by justice and law enforcement branches, not human rights and diplomatic branches • Lack public awareness — perfect example of a process that excluded the civil society and private sector i.e. the “UN”
  • 11. The Global Weaponization of Legal and Technological Means to Limit Online Freedom and Redefine Truth For Citizens Anywhere
  • 12. References • The Everything, Everywhere Censorship of China (2023) https://www.freiheit.org/publikation/everything-everywhere-censorship-china • Internet Impact Brief: Cambodia National Internet Gateway https://www.internetsociety.org/resources/2022/internet-impact-brief-cambodia- national-internet-gateway/ • How a Judge in India Prevented Americans From Seeing a Blockbuster Report https://www.politico.com/news/magazine/2024/01/19/india-judge-reuters- story-00136339 • Joint Statement on the Proposed Cybercrime Treaty Ahead of the Concluding Session https://www.hrw.org/sites/default/ fi les/media_2024/01/Joint.Advocacy.Statement- Cybercrime.Convention-Jan.23.2024.pdf
  • 13. Charles Mok Global Digital Policy Incubator Cyber Policy Center Stanford University cpmok@stanford.edu