SlideShare a Scribd company logo
1 of 55
Gatekeepers, beware!
     Netnod 020090917
First: A Story
We often compare
      this:
...to this:
The argument is
    simple
Just as
has no responsibility
        for:
We should not expect
To be responsible for
BUT
”...it is patriotism to
   disregard them”
”a censorship of the press...by allowing every
twopenny postmaster through the country to be
  the judge of what species of intelligence it is
             proper to circulate...”
”...prohibit, under severe penalties the
circulation in the Southern States, through
   the mail, of incendiary publications...”
Lesson:
Let’s hope that the
 Internet does not
 become the mail.
Hypothesis
”Gatekeeper liability
 will increase in the
  next five years”
<item 1 in evidence>
IPRED, Signals
 Intelligence Law,
Data Retention Law.
HADOPI 1-2
<item 2 in evidence>
court cases and
 agency review
<item 3 in evidence>
policy making signals
Trade-related?
   ACTA?
<in summary>
END.
Questions...

• Are there any trends in the other
  direction?

• What will be the economic
  consequences when ISPs internalize
  risk costs?
• How will this affect the net neutrality
  discussions?

More Related Content

Viewers also liked

Visby Final Final
Visby Final FinalVisby Final Final
Visby Final FinalGoogle
 
Vinnova Pre-conference 02009.11.18
Vinnova Pre-conference 02009.11.18Vinnova Pre-conference 02009.11.18
Vinnova Pre-conference 02009.11.18Google
 
Kreativitetsrätt
KreativitetsrättKreativitetsrätt
KreativitetsrättGoogle
 
Framtidensmedier20080410x
Framtidensmedier20080410xFramtidensmedier20080410x
Framtidensmedier20080410xGoogle
 
Chambers And New Media
Chambers And New MediaChambers And New Media
Chambers And New MediaGoogle
 
Population density ap 2014
Population density ap 2014Population density ap 2014
Population density ap 2014SHS Geog
 
Assignment 9 part 2
Assignment 9 part 2 Assignment 9 part 2
Assignment 9 part 2 mariayounes
 
L2 world cities & los angeles or mumbai
L2 world cities & los angeles or mumbaiL2 world cities & los angeles or mumbai
L2 world cities & los angeles or mumbaiSHS Geog
 
L1 ap 2013
L1 ap 2013L1 ap 2013
L1 ap 2013SHS Geog
 
Assignment3 fabiola perez_palma
Assignment3 fabiola perez_palmaAssignment3 fabiola perez_palma
Assignment3 fabiola perez_palmaFabiola Perez
 
Assignment 3
Assignment 3Assignment 3
Assignment 3Cquapp1
 
Year 11 options evening 2013
Year 11 options evening 2013Year 11 options evening 2013
Year 11 options evening 2013SHS Geog
 
Offentlighetsprincipeniinformationssamhället
OffentlighetsprincipeniinformationssamhälletOffentlighetsprincipeniinformationssamhället
OffentlighetsprincipeniinformationssamhälletGoogle
 
Offentlighetsprincipeniinformationssamhället
OffentlighetsprincipeniinformationssamhälletOffentlighetsprincipeniinformationssamhället
OffentlighetsprincipeniinformationssamhälletGoogle
 
Sociala Medier och Sociologer
Sociala Medier och SociologerSociala Medier och Sociologer
Sociala Medier och SociologerGoogle
 
Sse020091125
Sse020091125Sse020091125
Sse020091125Google
 
Internetdagarna om floppar
Internetdagarna om flopparInternetdagarna om floppar
Internetdagarna om flopparGoogle
 
CIO Awards - Framtidens CIO
CIO Awards - Framtidens CIOCIO Awards - Framtidens CIO
CIO Awards - Framtidens CIOGoogle
 
Youth Resiliency & Mental Health Workshop - Dr. Jean Clinton
Youth Resiliency & Mental Health Workshop - Dr. Jean ClintonYouth Resiliency & Mental Health Workshop - Dr. Jean Clinton
Youth Resiliency & Mental Health Workshop - Dr. Jean ClintonBrent MacKinnon
 
Public Service i framtiden
Public Service i framtidenPublic Service i framtiden
Public Service i framtidenGoogle
 

Viewers also liked (20)

Visby Final Final
Visby Final FinalVisby Final Final
Visby Final Final
 
Vinnova Pre-conference 02009.11.18
Vinnova Pre-conference 02009.11.18Vinnova Pre-conference 02009.11.18
Vinnova Pre-conference 02009.11.18
 
Kreativitetsrätt
KreativitetsrättKreativitetsrätt
Kreativitetsrätt
 
Framtidensmedier20080410x
Framtidensmedier20080410xFramtidensmedier20080410x
Framtidensmedier20080410x
 
Chambers And New Media
Chambers And New MediaChambers And New Media
Chambers And New Media
 
Population density ap 2014
Population density ap 2014Population density ap 2014
Population density ap 2014
 
Assignment 9 part 2
Assignment 9 part 2 Assignment 9 part 2
Assignment 9 part 2
 
L2 world cities & los angeles or mumbai
L2 world cities & los angeles or mumbaiL2 world cities & los angeles or mumbai
L2 world cities & los angeles or mumbai
 
L1 ap 2013
L1 ap 2013L1 ap 2013
L1 ap 2013
 
Assignment3 fabiola perez_palma
Assignment3 fabiola perez_palmaAssignment3 fabiola perez_palma
Assignment3 fabiola perez_palma
 
Assignment 3
Assignment 3Assignment 3
Assignment 3
 
Year 11 options evening 2013
Year 11 options evening 2013Year 11 options evening 2013
Year 11 options evening 2013
 
Offentlighetsprincipeniinformationssamhället
OffentlighetsprincipeniinformationssamhälletOffentlighetsprincipeniinformationssamhället
Offentlighetsprincipeniinformationssamhället
 
Offentlighetsprincipeniinformationssamhället
OffentlighetsprincipeniinformationssamhälletOffentlighetsprincipeniinformationssamhället
Offentlighetsprincipeniinformationssamhället
 
Sociala Medier och Sociologer
Sociala Medier och SociologerSociala Medier och Sociologer
Sociala Medier och Sociologer
 
Sse020091125
Sse020091125Sse020091125
Sse020091125
 
Internetdagarna om floppar
Internetdagarna om flopparInternetdagarna om floppar
Internetdagarna om floppar
 
CIO Awards - Framtidens CIO
CIO Awards - Framtidens CIOCIO Awards - Framtidens CIO
CIO Awards - Framtidens CIO
 
Youth Resiliency & Mental Health Workshop - Dr. Jean Clinton
Youth Resiliency & Mental Health Workshop - Dr. Jean ClintonYouth Resiliency & Mental Health Workshop - Dr. Jean Clinton
Youth Resiliency & Mental Health Workshop - Dr. Jean Clinton
 
Public Service i framtiden
Public Service i framtidenPublic Service i framtiden
Public Service i framtiden
 

Similar to Gatekeepers Beware Internet Censorship Risks

286CHAPTER 14CyberlawCHAPTER 15International and.docx
286CHAPTER 14CyberlawCHAPTER 15International and.docx286CHAPTER 14CyberlawCHAPTER 15International and.docx
286CHAPTER 14CyberlawCHAPTER 15International and.docxrhetttrevannion
 
Marsden #Regulatingcode MIT
Marsden #Regulatingcode MITMarsden #Regulatingcode MIT
Marsden #Regulatingcode MITChris Marsden
 
DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetPaul Elliott
 
The Valetta Effect: GDPR enforcement for Gikii Vienna 14 Sept
The Valetta Effect: GDPR enforcement for Gikii Vienna 14 SeptThe Valetta Effect: GDPR enforcement for Gikii Vienna 14 Sept
The Valetta Effect: GDPR enforcement for Gikii Vienna 14 SeptChris Marsden
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
IoT is coming - now what?
IoT is coming - now what?IoT is coming - now what?
IoT is coming - now what?Martin Spindler
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)Felipe Prado
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...Jonathan Care
 
Input on threat images against information society
Input on threat images against information societyInput on threat images against information society
Input on threat images against information societySomerco Research
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 
How to communicate effectively in a cyber attack
How to communicate effectively in a cyber attackHow to communicate effectively in a cyber attack
How to communicate effectively in a cyber attackBen Overlander
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxursabrooks36447
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1MohsinMughal28
 
2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)Felipe Prado
 
2600 v23 n2 (summer 2006)
2600 v23 n2 (summer 2006)2600 v23 n2 (summer 2006)
2600 v23 n2 (summer 2006)Felipe Prado
 
Week 10 Discussion Information Security and Digital Crime and .docx
 Week 10 Discussion Information Security and Digital Crime and .docx Week 10 Discussion Information Security and Digital Crime and .docx
Week 10 Discussion Information Security and Digital Crime and .docxaryan532920
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...Ben Griffith
 

Similar to Gatekeepers Beware Internet Censorship Risks (20)

286CHAPTER 14CyberlawCHAPTER 15International and.docx
286CHAPTER 14CyberlawCHAPTER 15International and.docx286CHAPTER 14CyberlawCHAPTER 15International and.docx
286CHAPTER 14CyberlawCHAPTER 15International and.docx
 
Marsden #Regulatingcode MIT
Marsden #Regulatingcode MITMarsden #Regulatingcode MIT
Marsden #Regulatingcode MIT
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_Net
 
The Valetta Effect: GDPR enforcement for Gikii Vienna 14 Sept
The Valetta Effect: GDPR enforcement for Gikii Vienna 14 SeptThe Valetta Effect: GDPR enforcement for Gikii Vienna 14 Sept
The Valetta Effect: GDPR enforcement for Gikii Vienna 14 Sept
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
IoT is coming - now what?
IoT is coming - now what?IoT is coming - now what?
IoT is coming - now what?
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
 
Cyber2
Cyber2Cyber2
Cyber2
 
Input on threat images against information society
Input on threat images against information societyInput on threat images against information society
Input on threat images against information society
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
How to communicate effectively in a cyber attack
How to communicate effectively in a cyber attackHow to communicate effectively in a cyber attack
How to communicate effectively in a cyber attack
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docx
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
 
2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)
 
2600 v23 n2 (summer 2006)
2600 v23 n2 (summer 2006)2600 v23 n2 (summer 2006)
2600 v23 n2 (summer 2006)
 
Communications
CommunicationsCommunications
Communications
 
Week 10 Discussion Information Security and Digital Crime and .docx
 Week 10 Discussion Information Security and Digital Crime and .docx Week 10 Discussion Information Security and Digital Crime and .docx
Week 10 Discussion Information Security and Digital Crime and .docx
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Gatekeepers Beware Internet Censorship Risks