Censorship and the Internet By David Salley Research Paper for INF631 “The censorship method ... is that of handing the job over to some frail and erring mortal man, and making him omnipotent on the assumption that his official status will make him infallible and omniscient.” – George Bernard Shaw Abstract: This paper will explore how the Internet has been breaking down the barriers of government censorship. Because of the vast subject area involved, this paper will concentrate on only three governments; China, Singapore, and the United States, although other countries will be briefly mentioned. The United States was chosen primarily because it’s my own country and has fairly liberal censorship policies concerning the Internet. China and Singapore by contrast, are highly restrictive countries whose governments strive to keep the Information Highway away from its citizens. A. Introduction “The Internet is the largest on-line network in the world. It links a large number of smaller networks set up by universities, industry, nonprofit organizations, and government. While the rapid growth rate inhibits the use of exact numbers, the Internet is believed to connect at least 59,000 computer networks, 2.2 million computers, 159 countries, and 40 million users worldwide.” (Weaver, 1996) “According to one study, the users of the Internet are nearly 90% male, 87% white and with 33% having university level education. Approximately 71% of the users are from North America, 23% European, and 5% from other continents. Users are young with about half of the World Wide Web users being under the age of 30.” (Flynn, 2002) The Internet was originally created by the Advanced Research Project Administration (ARPA) in the late 1960’s as a decentralized data communications network. The decentralization was intentional. If one or two computers, or even an entire section of the Internet were to be destroyed, perhaps from an attack by a foreign country, only the destroyed portion of the Internet would actually be lost. Traffic flow would re-route itself around the damaged portion, so the rest of the network would stay connected. The early Internet was government funded and therefore restricted to non-commercial research facilities. In the mid-1980’s control of the Internet was turned over to the National Science Foundation (NSF). The NSF expanded the connections to include educational institutions and public research corporations such as Digital Equipment Corporation (DEC) and Hewlett Packard. In the early 1990’s the Internet was opened to commercial use and quickly expanded to what we’re familiar with today. (Wikipedia) Where you have free speech and free flow of information, you have those who want to restrict that flow of information. At the 1998 International Federation of Library Associations and Institutions Conference, Jana Varlejs published a table which neatly summarizes who and why. Who Censors? Government Academic Institutions Religious Groups and Institutions Corporations Media Libraries What Pornography, hate speech; terrorist information, e.g. directions for how to make bombs; information from / about regimes felt to be threatening. Hate speech; criticism of administration / faculty; expression judged to be in conflict with institutional policy, good taste, etc. Pornography, in general, expressions thought to deny, contradict, or mock the particular religion espoused. Information thought to be harmful to the company; employee use of electronic resources for “unauthorized communication”. Information that threatens advertisers. Pornography; other information thought to be harmful to children. Why Protect children and citizens; decrease foreign influence; protect political stability; maintain security. How Legislation; licensing / controlling telecommunication; labeling. Institutional responsibility for setting high cultural / social standards; maintaining civility and security. Prevent publication; threaten suspension / dismissal. Responsibility for maintaining moral standards and respect for religious teachings and institutions. Protect trade secrets; preserve image; guard against unproductive or damaging employee behavior. Preserves relationships with sponsors. Respond to community pressure; avoid need to ‘police’ terminals. Law suits; working to eliminate publication and use of information they deem objectionable. Law suits; counterintelligence or disinformation; dismissal / sanctions against offending employees. Refrain from publishing. Filters; contracts specifying online conduct. The European Union paper, “Illegal and Harmful Content on the Internet” probably best sums up the fears of governments about the Internet: National Security (instructions on bomb-making, illegal drug production, terrorist activities); Protection of Minors (violence, pornography); Protection of Human Dignity (incitement to racial hatred or racial discrimination); Economic Security (fraud, instructions on pirating credit cards); Information Security (malicious hacking); Protection of Privacy (unauthorized communication of personal data, electronic harassment); Protection of Reputation (libel, unlawful comparative advertising); Intellectual Property (unauthorized distribution of copyrighted works, software or music); (Hwa Ang, 1997) “Governments seem aware that the controls on the Internet are limited. If so, those who say censorship and other forms of content regulation of the Net are futile miss the point: censorship was never intended to be 100 percent effective. It was intended as a political statement.” (Hwa Ang, 1997) “Several countries filter Internet content at their borders, fearful of alternate political views or external influences. For example, China forbids access to many news sites that have been critical of the country’s domestic policies. Saudi Arabia is currently soliciting content filter vendors to help block access to sites that the government deems inappropriate for political or religious reasons. Germany censors all Nazi-related material. Australia’s laws ban pornography. In addition, Internet censorship repeatedly threatens to cross political boundaries. For example, the U.S. Supreme Court recently rejected France’s request to censor Nazi-related material on Yahoo’s site. Censorship and surveillance also extend into free enterprise, with several companies in the U.S. reportedly blocking access to sites that are not related to conducting business. In addition to blocking sites, many companies routinely monitor their employees’ Web surfing habits.” (Feamster, Infranet) There are two main difficulties to censoring the Internet. The first is that there is no universal agreement as to what should be censored. In the United States, the age of consent is 18. In other countries, it’s as low as 12. So what constitutes ‘child pornography’ in a virtual space that has no geographic location? Americans love their pornography. In a recent study at Carnegie Mellon University (Flynn 2002), it was estimated that over 80% of the stored digitized images on the Internet are pornographic. Yet, in some countries like Saudi Arabia, those same images are forbidden by law as well as culture. The United States enjoys religious freedom. Saudi Arabia forbids all but Islam. The United States permits freedom of speech, even speech that others may find offensive. Some of it is even incorporated into our entertainment. The movie “Raiders of the Lost Ark” uses Nazis as villains. Other countries like Germany and France forbid any reference to Nazis. The second difficulty to censoring the Internet, is that it was designed from the beginning not to be censored. “The Net interprets censorship as damage and simply routes around it.” – John Gilmore, early Internet pioneer (Ebbs, 1997). Even if a government does achieve some success in censorship, there are those who work the Internet to get around such censorship. Mirror sites re-post information from a site that’s been blocked off. Tunneling programming is used to bring censored information to an uncensored URL. Telneting allows long-distance connections to approach the censored site from a different point on the globe. The technology to use the internet is developing far faster than technology that can be used to filter or control it. B. United States – 1. Laws Unlike China and Singapore, the United States relies on regulation for censorship rather than physically blocking access. Most regulations deal with the pornography issue, in an attempt to protect our children. The United States allows far more freedom of speech than other countries allow their citizens. The Federal Communication Commission is in charge of regulating the Internet. “The Supreme Court’s decision Reno v. ACLU that the Internet, like the printing press, is entitled to the highest level of First Amendment protection represents a break with the Supreme Court’s tradition of underestimating the social significance of new media.” (Flynn, 2002) The Electronic Communications Privacy Act (ECPA) [1986] The ECPA regulates interception and monitoring of your e-mail. It’s based on the statues that govern physical postal mail in the United States. It essentially states that there are penalties for unauthorized reading, copying or storage of your e-mail messages. It should be noted that ‘unauthorized’ generally refers to outsiders and not your employer. By providing employees of a company with the means to communicate via electronic means, the employer is authorized to maintain and monitor the system. These privileges are usually spelled out in the employment agreement. The Communications Assistance for Law Enforcement Act (CALEA) [1994] This act required telecommunications providers to make their equipment allow the government to intercept all wire and electronic communications carried by the provider. In 1997, the government created “Carnivore” for the purpose of filtering electronic communications. Because the system was not compatible with Earthlink, a Internet Service Provider, it crashed their system. Earthlink challenged the law in court and lost. The parties arrived at a compromise, Earthlink would use its own software to gather the data for the government. (Horn, 2002) The Communications Decency Act (CDA) [1996] “The CDA was enacted in February 1996. In the same month, a US Court issued a restraining order preventing its enforcement. In June 1996, a panel of federal judges in Philadelphia ruled the CDA unconstitutional. In June 1997, the US Supreme Court struck down the CDA on grounds that it violated the First Amendment.” (Electronic Frontiers Australia) “However, the Communications Decency Act will not stop or deter this unwanted material from being posted. Internet users who reside outside the United States boundaries are not compelled to abide by the CDA and would be free to post their material without penalty.” (Weaver, 1996) “The Supreme Court decision in Sable Communications v. FCC stated that ‘restrictions on speech should use the ‘least restrictive means possible’ Yet according to the CDA something as available as Playboy magazine and as universal as the King James version of the Bible may be banned from the Internet.” (Weaver, 1996) “On June 26, 1997, the United States Supreme Court struck down parts of the Communications Decency Act, ruling that the federal law prohibiting the transmission and display of obscene material to a minor was unconstitutionally broad and a violation of the First Amendment. Reno v. ACLU was hailed as one of the most significant decisions of the century, and the question of regulating sexually-oriented expression on the Internet appeared to be answered.” (Flynn, 2002) Child Online Protection Act (COPA) [1998] “COPA is the sequel to the CDA and aimed to avoid the constitutional defects of the CDA. COPA covers communications that are made for commercial purposes on the World Wide Web. It requires commercial Web publishers to ensure that minors do not access ‘material harmful to minors’ on their Web site.” (Electronic Frontiers Australia) “COPA was enacted on 21 October 1998. On 20 November 1998, the US District Court for the Eastern District of Pennsylvania issued a temporary restraining order against enforcement of the law and subsequently, on 1 February 1999, issued an injunction preventing the government from enforcing the law. On 22 June 2000, the US Court of Appeals for the Third Circuit upheld the lower court’s injunction. The Court stated in its conclusion that ‘Due to current technological limitations, COPA -- Congress' laudatory attempt to achieve its compelling objective of protecting minors from harmful material on the World Wide Web -- is more likely than not to be found unconstitutional as overbroad on the merits.’” (Electronic Frontiers Australia) Children’s Internet Protection Act (CIPA) [2000] Congress passed the CIPA on December 15, 2000. It places restrictions on library funding for libraries that do not install filters to prevent ‘adult’ sites from being accessed via library terminals to protect children. The Supreme Court overturned the decision in 2003. “Since 1996, four U.S. states, New York, New Mexico, Michigan and Virginia have passed Internet censorship legislation restricting/banning online distribution of material deemed ‘harmful to minors’. These laws have been struck down on Constitutional grounds.” (Electronic Frontiers Australia) Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (USA-PATRIOT) [2001] On September 11th, 2001, terrorists struck at the Pentagon and twice at the World Trade Center. A fourth plane, presumed to be heading for the White House was forced down in a field near Pittsburgh. Forty-five days later, on October 26th, the 342 page Patriot Act was passed by Congress. The act ushered in sweeping changes, expanding law enforcement powers, weakening previous legal protections and drastically changing intelligence gathering and electronic surveillance of the Internet. The Patriot Act amends the Foreign Intelligence Surveillance Act (FISA) of 1978. Previously, only records could be subpoenaed. Now ‘all tangible things’ can be seized including books, computer servers, and all forms of information storage systems, (e.g. tape drives, floppies, CDs, cassettes, etc.) The Patriot Act expands the Electronic Communications Privacy Act (ECPA) of 1986. Previously, ISPs were only required to release a subscriber’s name, mailing address, phone number and billing records, including type of service used and time in use. Now, federal agents can demand all web-pages visited and means of payment, (e.g. credit card numbers or bank account numbers) The Cable Communications Policy Act has been altered. ISPs are no longer permitted to inform subscribers that they are under surveillance. The Patriot Act contains a ‘sunset’ provision and most, but not all, of the expanded powers will expire December 31st, 2005. B. United States – 2. Policies “Yes, pedophiles and pornographers use computer networks. They also use telephones and the mail, but nobody would argue that we need to censor or shut down these forms of communication.” (Ebbs, 1997) “While it is commendable of the men and women in congress to seek the protection of minors, we must remember that the responsibility of children lie with their parents and not with the government.” (Weaver, 1996) As part of my research, I surfed the Internet to discover just how much objectionable material I could find. I did not go looking for child pornography out of personal distaste and a desire to not break the law. I had no trouble finding racist material, the Ku Klux Klan website is at (www.kkk.com). Instructions on computer hacking, how to get high, making a pipe bomb, and instructions for assorted misdemeanors were at The Temple of the Screaming Electron (www.totse.com). E-bay publishes a long list of prohibited materials, much of it due to differing regulations between potential buyer and seller locations, such as credit cards, gift coupons, licenses, legal drugs, weapons, alcohol, etc. They also prohibit illegal and offensive items. A quick search on ‘Nazi’ turned up over 2200 items. B. United States – 3. Search Engines and Filters a. Search Engines “One may often glimpse at how a search engine might censor or redistribute information about its competition by looking at how it displays or deletes information about its competition and the competitions corporate affiliations” (Brody, 2000) While search engines are not censored in the strictest sense of the word, it’s important to realize that due to the design of the search engine, the user may not be getting the results they expected. A few salient points: (Brody, 2000) 1.) Web crawlers – There are three major components of a search engine. The user interface, which is the webpage that the user can see; the database index which has web-pages sorted by keyword for quick retrieval and the web-crawlers, multiple small programs which explore the web and bring back content to be added to the index. Each search engine has their own parameters for what the web-crawlers bring back which vary by keyword searched for, number and type of pages brought back, directions for following links. Because of the vastly different designs, it’s possible for a small search engine to bring up results more useful to the user, than a much larger search engine with many more web-crawlers in place. 2.) Departure points – Web-crawlers can bring back different pages, or the same pages with different rankings merely from having started from different departure points. Some robots start from pre-programmed lists of links. Others start from lists of popular sites. Still more will follow links from page to page to page. It’s entirely possible for a web-crawler to miss the exact content the user is looking for if it’s not closely linked to a starting index, or distantly connected to the search path the web-crawlers follow 3.) Web-page Updates – Some search engines rank their pages by ‘freshness’, the most recent renewal date for that particular webpage. While this is an excellent technique if one is trying to follow current events or a news story, it is less well suited for academic papers. Such search techniques tend to disregard unpopular, unusual or historical sites as stale and obsolete information. 4.) Paid Placements – Search engine websites make their profits by accepting sponsorships. A manufacturer of blankets can pay a fee for the keyword ‘blanket’ so that his webpage always appears at the top when a search on ‘blanket’ is done. It should be noted that this technique is simply a variant on buying ad space in a printed magazine. 5.) Popularity Searches – Google, among others, uses a popularity ranking for its searches. The list of websites returned is ranked by the number of other sites linked to them. It assumes that frequently visited sites are more relevant than less popular sites. This may not necessarily be correct. Feedback may result in closed systems of highly inter-related sites that do not contain the information the searcher is looking for. It should be also noted that the system can be manipulated. Thousands of democrats have added links to their personal webpage so that a Google search on ‘miserable failure’ will take the reader to George W. Bush’s official biography on the White House’s website. For a while the phrase ‘weapons of mass destruction’ took the reader to a bogus site (http://www.coxar.pwp.blueyonder.co.uk) however, legitimate news articles have since pushed it out of the number one position. b. Filters "Library use of blocking/filtering software creates an implied contract with parents that their children will not be able to access material on the Internet that they do not wish their children to read or view. Libraries will be unable to fulfill this implied contract, due to the technological limitations of the software, thus exposing themselves to possible legal liability and litigation." (American Library Association, 1997)” (Blalock, 2001) Laura Blalock covered the problems with Internet Filters so well in her article Internet Filters in Public Libraries, that rather than paraphrase her, I’m simply going to cite her list in its entirety. (http://web.utk.edu/~lblalock/567/filtering/filtering.html) “First, none can block graphics-only Web sites, only text-based. Second, none voluntarily tells site owners that a site has been blocked or rated. It is only by accident that an owner--or searcher--would discover that a given site had been targeted. Moreover, there appears to be little recourse legally, and even less in persuading product owners to change their minds. Third, the majority of products refuse to permit their customers to view their preprogrammed stop-lists of words, phrases, sites, and topics deemed objectionable. Indeed, product owners regard their stop-lists as highly valuable commercial trade secrets, and very few products permit customers to disable the stop-list. Fourth, all of them cost money--forever! All are commercial products, and pricing policies vary widely, with United States prices in 1998 starting at $25 for one workstation and $10 per LAN workstation for initial installation, and annual update fees from $30 for one workstation up to $1,500 for 100 workstations and $4,000 for 250. Fifth, none of the products is created through the expertise of credentialed librarians and indexers. Instead, a few products employ a small number of ‘Internet and computer-savvy’ young people for minimum wage, to locate questionable sites. Finally, product owners and their supporters exaggerate the effectiveness of the products, and underestimate the enormous complexity of the task they claim to perform. I charge exaggeration because of 1) the dynamics of the Internet, and 2) the dynamics of human language in indexing itself. Indeed, the magnitude of the task that the producers of filtering and rating software have undertaken is formidable. One estimate of the number of new sites in 1998 in the United States alone was 3,000 per day! And those are Englishlanguage sites only. The Internet is a dynamic phenomenon that leaves product owners shooting at moving targets--speeding targets, actually. A 1998 estimate of the size of the Web was 320 million Web pages currently accessible to casual browsers, a number expected to grow by 1,000% in the next few years. Thousands if not millions of inappropriately blocked sites have been documented in product evaluations by filtering critics. Perhaps the most frequently blocked are any that remotely concern sex. The most well known example was the blocking three or four years ago of just the one word ‘breast’ that resulted in the blocking of all breast cancer sites. One product blocking on ‘sex’ is also reported to have blocked the news group dedicated to Star Trek's Captain Jean-Luc Picard, (alt.sexy.bald.captain). And the NASA Mars exploration site (marSEXplorer). And some two years ago, in its relentless search for dirty words, one product added the word ‘couple’ to its stop-list, with the result that the White House site was blocked because ‘couple’ appeared in a reference to the Clintons and the Gores. This product also blocked the site for Super Bowl XXXI, and a hockey site because of news that a player had been sidelined due to a groin injury. Many products also block any reference to homosexuality, lesbianism, or bisexuality. As a spokesperson stated, ‘We filter anything that has to do with sex. Sexual orientation is about sex by virtue of the fact that it has sex in the name.’ Using this approach, one product prevented access to the entire library Web site of the Archie R. Dykes Medical Library! Why? Because of the term ‘dyke’, a North American slang term for lesbian. But most products do not focus exclusively on sex and violence, however. Many have strong political and ideological motivations. Some block all feminist sites, such as NOW, the National Organization for Women, feminist newsgroups, and sites such as alt.feminism. Also blocked was the Planned Parenthood site. In retaliation for criticism on the Internet, CyberSitter's ‘bad words list’ was revised last year to block access to sites containing the phrase ‘Don't Buy CyberSitter!’ The same product has also blocked the site for Peacefire, a student organization opposing Internet censorship, and the site for The Ethical Spectacle, a Webzine that has criticized the company that owns the product. CyberPatrol has similarly gone to extreme lengths to suppress criticism, blocking any site that opposes it. An example two years ago was the blocking of Web pages pertaining to the 1996 monograph entitled Sex, Laws, and Cyberspace by Jonathan Wallace and Mark Mangan. It has also blocked the Electronic Frontier Foundation archive.” (Blalock, 2001) c. Censorship Avoidance Software Wherever censorship exists, you will find those working to circumvent that same censorship. Techniques for avoiding censorship include, but are not limited to: mirror sites that re-post information from a site that’s been blocked off, tunneling programming that is used to bring censored information to an uncensored URL and telneting that allows long-distance connections to approach the censored site from a different point on the globe. A group of MIT students designed “Infranet” to combat censorship in foreign countries. “We designed Infranet to meet a number of goals. Ordered by priority, the goals are: o Deniability of any Infranet requestor. – It should be computationally intractable to confirm that any individual is intentionally downloading information via Infranet, or to determine what that information might be. o Statistical deniability for the requester – Ideally, an Infranet user’s browsing patterns should be statistically indistinguishable from those of normal Web users. o Responder covertness – Since an adversary will likely block all known Infranet responders, it must be difficult to detect that a Web server is running Infranet simply by watching its behavior. o Communications Robustness – The Infranet channel should be robust in the presence of censorship activities designed to interfere with Infranet communication. o Performance – We seek to maximize the performance of Infranet communication, subject to our other objectives.” (Feamster, Infranet) C. Other Countries While the main focus of this paper examines how the United States, China and Singapore deal with Internet Censorship, this section briefly touches on other countries and the methods that they use for dealing with the Internet that I found interesting. The majority of this material was taken from How Countries are Regulating Internet Content by Peng Hwa Ang (Hwa Ang, 1997) and Internet Censorship: Law and Policy Around the World published by Electronic Frontiers Australia (http://www.efa.org.au) Australia “In April 1999, the Commonwealth Government introduced an Internet censorship bill into Parliament. This bill, if it had been passed without amendments, would have required Internet Service Providers to, among other things, block adults’ access to content on sites outside Australia on threat of fines for non-compliance. Following widespread criticism, the proposed law was amended to include provision for an additional access prevention method other than ISP blocking of overseas hosted material at the server level. The amended law, Broadcasting Services Amendment (Online Services) Act 1999, commenced operation on 1 January 2000.” (EFA) Canada “The Canadian Radio-Television and Telecommunications Commission (CRTC) announced on 17 May 1999 that it will not regulate new media services on the Internet. After conducting an in-depth review under the Broadcasting Act and Telecommunications Act beginning the previous July, the CRTC has concluded that the new media on the Internet are achieving the goals of the Broadcasting Act and are vibrant, highly competitive and successful without regulation. The CRTC is concerned that any attempt to regulate Canadian new media might put the industry at a competitive disadvantage in the global marketplace.” (EFA) Denmark “As of March 2002, Denmark had no law making it a criminal offence to make material that is unsuitable for minors available on the Internet, nor were there any proposals to create such a law. Discussion related to protection of minors was primarily unfolding around the issue of filtering at public libraries.” (EFA) European Union “It is very unlikely the United States would co-operate in the way the Council of Europe would want it to by removing Web content classified as racist by another country’s courts. The Justice Department fought hard to have the racist bits pulled from the cyber-crime convention itself. I can’t imagine they will let freedom of speech be curtailed via the backdoor in this way.” – Angus MacDonald, spokesman for the Council of Europe.” (Meller, 2001) France “Ivar Tallo, an Estonian member of the council, gave the example of a French racist organization establishing a Web site aimed at influencing a French audience, and situating it in the United States solely to take refuge behind the First Amendment.” (Meller, 2001) “In May 2000, a French judge ruled that USA Yahoo! Inc must make it impossible for French users to access sites auctioning race hatred memorabilia. Yahoo said it was technically impossible for it to block Internet users in France from seeing Nazi-related content on its USA Web site and that its French site complied with France’s laws prohibiting advertising Nazi memorabilia. In November 2001, a US District Court ruled that Yahoo does not have to comply with the French court’s order concerning access to its USA site. The Court ruled that the USA First Amendment protects content generated in the US by American companies from being regulated by authorities in countries that have more restrictive laws on freedom of expression.” (EFA) Germany “Germany, which has some of the world’s toughest laws banning race hate propaganda, has conceded defeat to the cross-border reach of the Internet and given up trying to bar access to foreign-based neo-Nazi sites.” (EFA) “Germany recently drafted a ‘multimedia’ law that, among other things, censors pornography and anti-Semitic propaganda. Acts already prohibited in Germany – such as denying the Holocaust, distributing hard-core pornography to minors and conducting fraudulent business – will also be illegal in electronic form” (Hwa Ang, 1997) Malaysia “On 14 February 2002, an article in The Australian reported that the Malaysian government had signaled an intent to require website operators to obtain licenses. According to the article, ‘Steven Gan, editor-in-chief of Malysiakini.com says that the Mahathir government’s plan to require licenses for website operators would effectively silence the only dissenting media voices in a nation with rigid controls over traditional news outlets, especially newspapers.” New Zealand “In 1993, the NZ Films, Videos and Publications Classification Act (FVPCA) was enacted. The definitions in this act are said by regulatory authorities to cover Internet content; ‘publication’ covering text and static images, and ‘film’ covering moving images. However, apparently offence provisions of the act have very rarely, if ever, been enforced to date in relation to online content other than child pornography.” (EFA) Saudi Arabia “Saudi Arabia has a national ban on satellite dishes and has purposely restricted the installation of Internet equipment and sites for fear of losing control of the images and material that Saudi citizens can gain access to” (Flynn, 2002) South Korea “In July 2001, the Internet Content Filtering Ordinance became effective in South Korea. According to media and other reports, the provisions of the ordinance are controversial within South Korea. Previous content filtering provisions that were included in a 2000 bill were not passed by the National Assembly due apparently to the harsh criticism it provoked from civic groups. Recent information on English language web sites regarding the extent and manner of enforcement of the 2001 ordinance is scarce.” (EFA) Sweden “In May 1998, the Swedish Parliament enacted the “Act (1998:112) on Responsibility for Electronic Bulletin Boards”. Electronic bulletin board is defined so as to include storage of data on the Internet, such as web pages, etc. (thereby excluding personal e-mail that is only stored in individuals’ mailboxes). The law places an obligation on service providers who store information (not those who only provide connections to the Internet) to remove or make inaccessible content that is obviously illegal.” (EFA) D. China “China’s data communications network consists of a range of mostly public and some private datacom services. Specifically, China Telecom, Jitong Communications Company (private), China Unicom, China Netcom, and the State Power Corporation are amoung the five largest providers of Internet communications service s in the country.” (LaCharite, 2002) “Licensed ISPs, local police forces, the MII’s Data Communications Bureau (DCB) and ultimately the Ministry of State Security (MSS) computer surveillance teams enforce the national government’s censorship laws.” (LaCharite, 2002) China imposed a new law on cryptography on 31 January 2000. The government expected every company that uses encryption technology to register their technology. (Recio, Firewall) “To finish it all off, the registration for all nine million Internet users in China was to be hand delivered to a small office in an alley in Beijing, to the newly created administration: State Encryption Management Commission.” (Recio, Firewall) “The law is clearly unworkable; there aren’t enough people and the commission just isn’t large enough to handle the paperwork necessary for filing all of the registrations. The government isn’t doing much to enforce these new laws either. So why then would such a law be passed? Selective enforcement that may be used by the government as needed later.” (Recio, Firewall) “While the government connected Internet Society of China (not a chapter of the international Internet Society) has asked ISPs and content creators to sign a pledge that includes self-filtering, few official statements document that government-maintained web filtering exists, much less the criteria employed and thresholds necessary to elicit a block.” (Zittrain, 2003) In their report Empirical Analysis of Internet Filtering in China, Jonathan Zittrain and Benjamin Edelman provide a full listing of some 19,000+ specific Web sites found to be inaccessible from China. “Dissident/Democracy Sites – Of the top 100 sites Google returned, 40 were blocked for a ‘democracy china’ search while 37 ‘dissident china’ sites were blocked, 32 were blocked for ‘freedom china’ and 30 for ‘justice china’. Specific blocked sites included Amnesty International, Human Rights Watch, Hong Kong Voice of Democracy, Direct Democracy Center and dozens of Falun Gong and Falun Dafa sites.” (Zittrain, 2003) “Health – Of the top 100 Google results, 24 were blocked for ‘hunger china’, 23 for ‘famine china’, 21 for ‘aids china’, 19 for ‘sex china’, and 14 for ‘disease china’. Specific blocked sites included AIDS Healthcare Foundation, the Internet Metal Health reference, and the Health in China research project. We also found 139 sites in Yahoo’s health directory categories and subcategories blocked.” (Zittrain, 2003) “Education – Several well known institutions of higher education, including the primary Web servers operated by Caltech, Columbia, MIT, and the University of Virginia were blocked. Non-university sites including the Learning Channel, the Islamic Virtual School, the Music Academy of Zheng, and the Web sites of dozens of public and private primary and secondary schools were also blocked.” (Zittrain, 2003) “News – The BBC News was consistently unreachable. CNN, Time Magazine, PBS, the Miami Herald, and the Philadelphia Inquirer Web sites were unavailable as well. Of Google’s top 100 results for news, 42 were blocked.” (Zittrain, 2003) “Government Sites – Blocked sites included a variety of those operated by governments in Asia and beyond. The entire site of uscourts.gov, including the many federal district and appellate courts in the United States, as well as the United Kingdom’s Court Service and Israel’s Judicial Authority were blocked. The communications sites of various governments were blocked, including the US government’s Voice of America, as well as travel sites for Australia, Israel, Korea, Switzerland, and Wales. Government military department sites were also blocked, including the US Department of Defense, though others remained reachable, such as the CIA.” (Zittrain, 2003) “Religion – Blocked sites included the Asian-American Baptist Church, the Atheist Network, the Catholic Civil Rights League, Feng Shui at Geomancy.net, the Canberra Islamic Centre, the Jewish Federation of Winnipeg, and the Denver Zen Center. We found 1,763 sites in Yahoo’s categories and subcategories pertaining to religion blocked.” (Zittrain, 2003) “The Chinese government and associated network authorities are clearly continuing to experiment with different forms of blocking, indicating that Chinese network filtering is an important instrument of state Internet policy, and one to which significant technical and human resources continue to be devoted.” (Zittrain, 2003) “There does not appear to be any consistency to Beijing’s policies. One of the more recent examples of this is the Chinese government’s willingness to de-list Melbourne’s Age Website and Sydney’s Sydney Morning Herald (SMH) site. The Age’s website had been unavailable via Chinese ISPs for more than a year, while the SMH page was blocked shortly after the Sydney Olympics had come to an end – they are both now considered non-offensive Websites.” (LaCharite, 2002) “China’s Internet population has quadrupled in a span of only a year, totaling 8.1 million as of December 1999, and an estimated 20 million by the end of 2000. With an increase of 1,500 to 15,000 web-sites and 35 million e-mail addresses Beijing will have to struggle to maintain control of the Internet” (Recio, Firewall) “The unstoppable nature of the net and the challenges that it poses for domestic security officials can be evidenced by the fact that over the last eight years China has seen its share of online subscribers increase from three thousand to over twenty-two million.” (LaCharite, 2002) “In June of 1997, Chinese dissidents founded Tunnel, a Chinese language journal of dissent. Tunnel is managed and edited in China. Once an issue is ready to be published, it is secretly delivered to the United States and then emailed to China from an anonymous address. Thus its staff remains safely hidden in cyberspace, and all of its contributors, both in China and abroad, write under pseudonyms.” (LaCharite, 2002) “In China, there are central servers (Internet Service Providers) that through which all of the Internet access for the country flows. These specialized servers are called firewalls. This is the simplest way to block access to websites that Beijing feels are subversive; however, users are still able to access the Internet by making long distance calls to Internet service providers in neighboring countries.” (Recio, Firewall) “However, a Chinese law promulgated in February 1996 bars such international calls. Violators face first a warning, then a fine of up to 15,000 yuan or about US$2,000, equivalent to a year's salary of an average worker in China.” (Recio, Firewall) “A Chinese financial information website called China Finance Information Network (http://www.c.net.cn) suffered a government imposed suspension for 15 days and a fine of $1800 USD. The crime is rumor mongering; the website published an article which accused some local official of corruption.” (Recio, Firewall) “For two weeks CFI Net could not post anything on their website. They could post financial related materials, or any other articles. Most importantly, they could not post any advertisements, which CFI desperately relied on for their revenue.” (Recio, Firewall) “The obvious impact that this suspension had on CFI is immediately apparent: pecuniary. CFI, each day, had about a million page views, from 100,000 daily users. As a result of the suspension, an estimated $120,000 in advertiser spending had been lost in just the first 4 days.” (Recio, Firewall) “It appears that the laws that apply to the Internet are a subset of laws that apply to electronic media. Recently, China passed a law that compelled all economic news services provided by foreign companies, such as Reuters and Knight-Ridder, to be distributed only through the official Xinhua news agency.” (Hwa Ang, 1997) “China has publicly declared that it is looking at Singapore's attempts at media regulation. China's regulations, however, go much further than Singapore's: only the comp and sci newsgroups are allowed; access is through filters and even then using a handful of government-controlled access providers; besides pornography, political and linguistic matters are also censored.” (Recio, Firewall) “There are really only two routes that the Chinese government can take towards the detection of outside propaganda, and exposition of state secrets. They can either, ban the Internet entirely from the country’s computer networks, or become selective gatekeepers for the traffic owing into and out of the Chinese network. The simple solution of isolating the Chinese cyber-space from the rest of the Internet may seem rather simple enough.” (Recio, Firewall) “However, what complicates the isolation scenario is the fact that in order for China to remain aloft in the technological scene, it must keep its cyber-doors open to innovation and the world technological advances. By China isolating itself from the rest of the Internet, it limits innovation and fosters technological stagnation. This, in the end, exacerbates the difficulty of the cyber-border patrol maintenance.” (Recio, Firewall) “The Internet is by far the most effective irritant ever to the differences in countries’ laws; in this case, it’s China’s over-reaction to information physically located within its bounds, but visible to and destined for the entire world.” (Recio, Firewall) “China has the potential to become one of the world’s cyberspace superpowers. However, to fully benefit from the Internet, Beijing will have to seriously consider dismantling many of its restrictive regulations. In many ways the government has already let the information genie out of its bottle. Domestic ISPs are on the increase, many foreign companies are starting to make inroads into China’s lucrative IT&T market, and average monthly income is no longer a determinant to Internet access.” (LaCharite, 2002) E. Singapore “Censorship in Singapore is justified on historical and socio-political grounds. Both the government and the people want it, favoring caution and prevention over liberalism. In line with these desires, the Singapore government has drawn up guidelines for censorship. In practice, however, some of these principles conflict, especially when censorship of the Internet is attempted.” (Hwa Ang, 1996) “From a Western, especially American perspective, censorship is difficult if not impossible to defend. But the position of the Singapore government and indeed even the citizenry is that there are good enough reasons for censorship. First, as there is anecdotal evidence to suggest that media can have negative effects on their consumers, it is therefore wiser to err on the side of caution through censorship. Second, there have been incidents in the past where media reports have caused racial riots and the shedding of blood.” (Hwa Ang, 1996) “Censorship also survives because of the widespread support of Singaporeans, as a recent survey by [Dr. Peng Hwa Ang] found. On a censorship scale of 1 to 7, the three areas where Singaporeans wanted most censorship were materials for the young, news leading to race conflict and racially offensive public expression in that order. Thus, censorship in Singapore is justified on historical as well as socio-political grounds, favoring caution and prevention over liberalism. This position has been systematically articulated by the government and accepted by the people as one of the boundaries within which Singapore society must function.” (Hwa Ang, 1996) “Singapore has adopted a multi-pronged approach to Internet censorship. First the Singapore Broadcasting Authority, which regulates Internet content, has said that the regulations are targeted only at the function of the Internet that is of a broadcast nature. Second, it has adopted the peculiar, perhaps even unique, idea of the class license: certain classes of content are deemed to be automatically licensed provided a code of practice is abided by. In effect, censorship is after, not before, publication. Matters of race, religion and politics are given special attention on the Internet. When the code is breached, the license is revoked.” (Hwa Ang, 1997) “The SBA has the power to impose sanctions, including fines, on licensees who contravene the Code of Practice. The SBA takes a light-touch approach in regulating services on the Internet. For example, licensees [Internet Content Providers and Internet Service Providers] found to be in breach of regulations will be given a chance to rectify the breach before the Authority takes action.” (EFA) “To date, the self-censorship among international companies eager to secure a position in the Singapore market has obviated the need of authorities to exercise much direct control over content. CNN has even gone so far as to alert Singapore Cable Vision (SCV) to potentially sensitive material, as it did before screening coverage of the case involving U.S. teenager Michael Fay, who was found guilty of vandalizing cars in Singapore.” (Rodan, 1998) “The Internet has the ability to explode information onto every user. More information can be gathered and distributed at a faster pace, meaning that the flow of information in circulation increases at an exponential rate. In Singapore, however, the number of censors at work has not kept pace with the explosive growth in the amount of censorable materials.” (Hwa Ang, 1996) “Censorship in Singapore is undertaken by the Censorship Section of the Ministry of Information and the Arts. Figures from the Censorship Section show that the number of censors has increased by 80 percent in the 10 years from 9 in 1983 to 16 in 1993. The amount of materials that the Censorship Section has to vet, however, has increased 400 percent over the same period--from 102,352 in 1983 to 408,863 in 1993. On a per-person basis, the workload has increased five-fold from about 5,500 in 1978 to more than 25,000 in 1993.” (Hwa Ang, 1996) “There are three regulatory regimes for the Internet. First, it could be classified as a telecommunications service because one major use is electronic mail. Second, it could be considered a computer service because one needs a computer to access the Internet. Third, the availability of information through Usenet group and web-sites, where they can reach a wide audience electronically, could qualify the Internet as a broadcasting service. Singapore has chosen the third option: to treat the Internet as a broadcast service. It is to be regulated under the recently-passed Singapore Broadcasting Authority (SBA) Act, which defines broadcasting broadly--in terms of programme transmission to all or part of the public, regardless of the means used.” (Hwa Ang, 1996) “In 1992, the National Computer Board detailed a new strategic statement, IT2000 – A Vision of an Intelligent Island. Under IT2000, it is now planned that all 750,000 households on the island will be connected to a comprehensive computer network by the year 2000 with the compulsory installment of broadband coaxial and optical fiber networks. Households, businesses, schools, libraries, government departments, and statutory authorities will be electronically inter-linked to facilitate shopping and other commercial and official transactions, as well as provide cable and interactive television services and the Internet. A wireless communications network will also afford mobile computer access to information services throughout Singapore. So extensive is the plan that even public space is likely to be wired. It is proposed that television cameras be fitted at corridors, lifts, public parks, car parks, and neighborhood centers for monitoring purposes. The plan was quickly acted on, with more than 100,000 households connected with wiring to support broadband applications before mid 1996.” (Rodan, 1998) “By mid-1996, there were around 200,000 users of the Internet in Singapore. In addition to the 100,000 subscribers, this includes access from the various cyber cafes that have recently sprung up. The government had also set up ten Internet clubs at state-run community centers. With regular use of the Internet involving 5-10 percent, Singapore has a participation rate rivaling the United States and ahead of Australia. But while this is in line with the IT2000 strategy, it nevertheless causes the government some anxiety. The Internet is a web comprising more than 70,000 computer networks connecting an estimated 50 million users in around 130 countries. More than 9,000 newsgroups containing discussions or picture data bases are accessible through the Internet, including sexually and politically explicit material. Yet, in a reference to the flow of ideas, images, and information on the Internet, Senior Minister Lee Kuan Yew contends, ‘The top 3 to 5 percent of a society can handle this free-for-all, this clash of ideas’ For the bulk of the population, however, exposure to this is likely to have destabilizing social and political effects, according to the senior minister.” (Rodan, 1998) “The Singapore government is well aware that it cannot do much to censor the Internet. In fact, as the discussion above as shown, censorship can impact the workings of the Internet and faith of users in the system. But, as the Minister for Information and the Arts has said, the Singapore government will not give up without a fight.” (Hwa Ang, 1996) Bibliography --------------Blalock, Laura Internet Filters in Public Libraries, University of Tennessee, November 26, 2001 http://web.utk.edu/~lblalock/567/filtering/filtering.html Brody, Roberta Illusions of Plenty: The Role of Search Engines in the Structure and Suppression of Knowledge, Queens College, City University of New York. (IEEE Int. Symp. 6-8 Sept. 2000) http://ieeexplore.ieee.org/Xplore/Toclogin.jsp?url=/iel5/7314/19786/00915598.pdf Demac, Donna A. Liberty Denied: The Current Rise of Censorship in America, PEN American Center, New York, 1988 Ebbs, Geoffrey and Rheingold, Howard Censorship on the Information Highway, Internet Research: Electronic Networking Applications and Policy, Vol. 7, No. 1, pg. 59-60, 1997 Electronic Frontiers Australia, Internet Censorship: Law and Policy Around the World, http://www.efa.org.au/Issues/Censor/cens3.html Feamster, Nick; Balazinska, Magdalena; Harfst, Greg; Balakrishnan, Hari; and Karger, David Infranet: Circumventing Web Censorship and Surveillance, MIT Laboratory for Computer Science, http://nms.lcs.mit.edu/projects/infranet Flynn, Thomas R. Secondary Effects, Digital Technology and Free Speech: The Internet and the First Amendment, IEEE 2002 Horn, Kimberly A. Privacy versus Protection: Exploring the Boundaries of Electronic Surveillance in the Internet Age, Fordham Urban Law Journal, August 2002 Hull, Mary E. Censorship in America, ABC-CLIO, Santa Barbara California, 1999 Hwa Ang, Peng How Countries Are Regulating Internet Content, Nanyang Technological University (Singapore), Presented at: INET’97: "The Internet: The Global Frontier" http://www.isoc.org/isoc/whatis/conferences/inet/97/proceedings/B1/B1_3.HTM Hwa Ang, Peng and Nadarajan, Berlinda Censorship and Internet: A Singapore Perspective, Communications of the ACM, Vol. 39, No. 6 (June 1996), pg 72-78 http://doi.acm.org/10.1145/228503.228520 LaCharite, Jason Electronic Decentralization in China: A Critical Analysis of Internet Filtering Policies in the People’s Republic of China, Australian Journal of Political Science, July 1 2002,Vol. 37, No. 2, pp. 333-346 http://taylorandfrancis.metapress.com/index/9YRC4FYJ61KF0JGR.pdf Lee, Laurie Thomas The USA Patriot Act and Telecommunications: Privacy under Attack, Rutgers Computer and Technology Law Journal, 2003 Levinson, Paul Cellphone: The Story of the World’s Most Mobile Medium and How It Has Transformed Everything, MacMillan, New York, 2004 Meller, Paul Europe Moving Toward Ban on Internet Hate Speech, NY Times (November 10, 2001) http://www.nytimes.com/2001/11/10/technology/10CYBE.html Recio, Elmo M. The Great Firewall of China: Cyber-Censorship http://polywog.navpoint.com/sociology/devnat/firewall_of_china Rodan, Garry The Internet and Political Control in Singapore, Political Science Quarterly, Vol. 113, No.1 (Spring 1998), pg 63-89 http://links.jstor.org/sici?sici=00323195%28199821%29113%3A1%3C63%3ATIAPCI%3E2.0CO%3B2-7 Schrader, Alvin M. Internet Filters: Library Access Issues in a Cyberspace World, International Federation of Library Associations 65th Annual Conference, 20-28, August 1999, http://www.ifla.org/faife/papers/others/schrader.htm Schrader, Alvin M. Technology and the Politics of Choice, Odyssey 2002, http://www.learningresources.ab.ca/Freedom.html Varlejs , Jana Who Censors the Internet and Why, International Federation of Library Associations and Institutions Conference: October 14-17, 1998 http://www.ifla.org/faife/papers/riga/varlejs.htm Weaver, Jeanne E. Law and Privacy on the Internet, GLOBECOM '96. 'Communications: The Key to Global Prosperity, Nov. 18-22, 1996, pg. 110-118 http://ieeexplore.ieee.org/xpl/abs_free.jsp?arNumber=586139 Wikipedia (http://en.wickipedia.org) Zittrain , Jonathan and Edelman, Benjamin Empirical Analysis of Internet Filtering in China, Berkman Center for Internet and Society, Research Publication No. 2003-02, April 2003, http://cyber.law.harvard.edu/publications Zittrain , Jonathan and Edelman, Benjamin Internet Filtering in China, IEEE Internet Computing, April 1993, pg. 70-77, http://computer.org/internet