51
HUMAN RIGHTS & TECHNOLOGY Mathias Klang

Human Rights & Technology

Embed Size (px)

Citation preview

Page 1: Human Rights & Technology

HUMAN RIGHTS &

TECHNOLOGY

Mathias Klang

Page 2: Human Rights & Technology

TECHNOLOGY & RIGHTS?Why & What

Page 3: Human Rights & Technology

TECHNOLOGY IS NOT ABOUT DEMOCRACYTechnology = Communication = Society = Democracy

Page 4: Human Rights & Technology

CommunicationCommunication

OrganizationOrganization

ProtestProtest AccessAccess

ReligionReligion

PrivacyPrivacyCultureCulture

EducationEducation

PressPress

Page 5: Human Rights & Technology

THERE ARE NO SIDEWALKS ONLINE

Page 6: Human Rights & Technology

LIFE IS ORGANIZED AROUND TECHNOLOGY……and it always has been….

Page 7: Human Rights & Technology

BY CONTROLLING TECHNOLOGY WE CONTROL SOCIETY

Regulation of technology is the regulation of democracy

Page 8: Human Rights & Technology
Page 9: Human Rights & Technology
Page 10: Human Rights & Technology

SO WHAT?

Page 11: Human Rights & Technology
Page 12: Human Rights & Technology

SO WHAT?

Page 13: Human Rights & Technology

DISRUPTIVE TECHNOLOGYThe disruption occurs when the technology, which is introduced effects the social arrangements around which we build our lives

Page 14: Human Rights & Technology
Page 15: Human Rights & Technology

IMPULSE: CONTROL

Page 16: Human Rights & Technology

ANTIDOTE?Free Software

Page 17: Human Rights & Technology

REGULATIONFrom Command and Control to Fuller & Lessig

Page 18: Human Rights & Technology

WHAT’S WRONG WITH COMMAND AND CONTROL?It relies to heavily upon coercion and cooperation.

Page 19: Human Rights & Technology

ONLINE OFFLINE

“We are forming our own Social Contract. This governance will arise according to the conditions of our world, not yours. Our world is different.” (Barlow 1996)

Page 20: Human Rights & Technology

Regulatory Metaphor

Law

Social RulesContextual & programed

Architecture

Page 21: Human Rights & Technology

Lessig (1999)

Page 22: Human Rights & Technology

CASES

Page 23: Human Rights & Technology

SPEECH & CENSORSHIPCase 1:

Censorship

Page 24: Human Rights & Technology

Information Control

• Local– Client based (software4parents, matewatcher)

• Organizational– Server based

• National– Backbone/gateway based

Censorship

Page 25: Human Rights & Technology

Filtering methods

• Inclusion - whitelist• Exclusion - blacklist• Content analysis

Censorship

Page 26: Human Rights & Technology

Privatizing Censorship

• Non-technical/self censorship– “Public Pledge of Self-Regulation & Professional

Ethics for China Internet Industry”

• Responsibility on the signatories:– Inspect & monitor foreign & domestic sites– Block harmful information

Censorship

Page 27: Human Rights & Technology

SURVEILLANCECase 2:

Surveillance

Page 28: Human Rights & Technology

Integrity

• That the individual shall have full protection in person and in property is a principle as old as the common law; but it has been necessary from time to time to define anew the exact nature and extent of such protection.

• Brandeis & Warren 1890

Surveillance

Page 29: Human Rights & Technology

• Louis Brandeis & Samuel Warren "The Right to Privacy," 4 Harvard Law Review 193-220 (1890-91)

Surveillance

Page 30: Human Rights & Technology

Technology 1888

• 1888 - Kodak nr 1 • First mass produced box • Simple and portable• Shot exposure

Surveillance

Page 31: Human Rights & Technology

Paparazzi (1898)Surveillance

Page 32: Human Rights & Technology

Reklam (1902)

• Robertson v. Rochester Folding Box Co (1902)

• The court did not accept Brandeis & Warrens argument of a “common law” right

Surveillance

Page 33: Human Rights & Technology

Hidden camera 1928

• Execution of Ruth Snyder 1928

Surveillance

Page 34: Human Rights & Technology

SurveillanceSurveillance

Page 35: Human Rights & Technology

Little brothers

A must for anyone who needs to protect their loved ones, home or business!

Surveillance

Page 36: Human Rights & Technology

TARGETING TECHNOLOGYCase 3: The Lufthansa Case

DoS

Page 37: Human Rights & Technology

Denial of Service - examples• 1998 DoS attack against the Mexican president’s

website.• 8,000 hacktivists participated to show their support for

the Zapatistas. • In 2003 the electrohippies antiwar protest disrupted the

PM’s webpage (www.number-10.gov.uk/) causing it to be unavailable on several occasions.

DoS

Page 38: Human Rights & Technology

• Three way handshake (Gibson: www.grc.com)

Denial of Service - technologyDoS

Page 39: Human Rights & Technology

Denial of Service - the players

• The Electrohippies – Practitioners – Now on walkabout

• The Cult of the Dead Cow– Claim the name Hacktivism

DoS

Page 40: Human Rights & Technology

• Accountability: “…we do not try bury our identities from law enforcement authorities any authority could, if it chose to, track us down in a few hours.”

• Popular participation: If people don't vote with their modems (rather than voting with their feet) the action would be an abject failure”

• Symbolism rather than damage

The Arguments: ElectohippiesDoS

Page 41: Human Rights & Technology

The Arguments 2: Dead Cow

• “No rationale, even in the service of the highest ideals, makes them anything other than what they are -- illegal, unethical, and uncivil” (Ruffin 2000).

DoS

Page 42: Human Rights & Technology

SOLIDARITYCase 4: Green Twitter, Location Tehran, Facebook for Monks

Page 43: Human Rights & Technology

Arik Fraimovich (@arikfr)set up helpiranelection.com & seeks support for the protesters in Iran. Support by “greening” the Twitter avatar

Page 44: Human Rights & Technology

ORGANISATION

HSBCFRA & the Bloggquake (bloggbävning)

Page 45: Human Rights & Technology
Page 46: Human Rights & Technology

COMMUNICATIONCase 6

Page 47: Human Rights & Technology
Page 48: Human Rights & Technology
Page 49: Human Rights & Technology
Page 50: Human Rights & Technology
Page 51: Human Rights & Technology

Thank you!