Upload
emma-holt
View
217
Download
1
Embed Size (px)
Citation preview
Raphael Cohen-Almagor
10:01:04 PM 1
Lecture PlanFive sections:IntroductionTerrorRacism and Hate Crime-facilitating speechChild-pornography
10:01:04 PM 2
Lecture PlanEach section is separated by a poemTwo were read during the inaugurations of Bill
ClintonOne was written (but not read) for Barack
Obama for his InaugurationOne was read for the Inauguration of Janet
Napolitano, Governor of the State of Arizona One was written by me for this Inaugural Lecture.I thank Dr. Jane Thomas for reading the poems.
10:01:05 PM 3
My contribution
10:01:05 PM 4
My contribution
10:01:05 PM 5
10:01:05 PM 6
content
circumstances
mannerן
Speaker’sintentions
Relevant TheoriesSocial ResponsibilityMoral panicThe "democratic Catch"IncitementTrue threats Intimidation
10:01:06 PM 7
The InternetThe Internet contains the best products of
humanity
10:01:06 PM 8
10:01:06 PM 9
Ufff…
10:01:06 PM 10
Worse of HumanityUnfortunately, the Internet also contains the
worse products of humanity: Child Pornography, Pedophilia Terror Racism, Hate speech and Holocaust denial Crime-facilitating speech
10:01:07 PM 11
Relevant FactorsHistoryCultureLaw
10:01:07 PM 12
From Sitafa Harden / Glory in the Gathering PlaceFor Barack Obama for his Inauguration
StandMighty Nation, a witness to NationsThat Strength is not a sword, nor Power tyrannyThe Inevitableness of Possibility prevailsThat which we have divulged has made us strongSing! A chorus verse to a redemption songRejoice, child! Rejoice into the MillenniumO hear the People’s voices joining in crescendo!Stand, Mighty Nation, a witness to Nations
That We are One
10:01:07 PM 13
Terror
10:01:07 PM 14
10:01:07 PM 15
10:01:07 PM 16
10:01:08 PM 17
10:01:08 PM 18
September 11, 2001
September 11 and other terrorist operations were facilitated by the Internet.
E-jihad The term E-jihad refers to the way
information technology is applied by groups such as al-Qaeda in order to organize logistics for their campaigns, through the application of email and encrypted files, as well as a means for developing their own strategic intelligence.
10:01:08 PM 19
10:01:08 PM 20
September 11, 2001 Members of Al Qaeda are sending each other
thousands of messages in a password-protected section of agreed-upon websites
Sometimes they simply take over legitimate sites In the wake of September 11, Internet providers
shut down several sites associated with Dr. Sheikh Abdullah Azzam, mentor of bin Laden
Haganah (Defence) Haganah, http://haganah.org/, a US-based
pro-Zionist website run by Aaron Weisburd, tracks down jihadi sites and informs their ISPs that they are hosting a terrorist site, which usually ensures it is closed down immediately. Haganah has shut down more than 700 jihadi sites
10:01:08 PM 21
jihadi websites Most jihadi websites have several sections. The most important and largest is usually the
religion section, which contains fatwas explaining who can be targeted legitimately.
Quranic references to jihad, the different ways jihad can be expressed, aspects of martyrdom, and online doctrinal consultations with religious sages.
10:01:08 PM 22
jihadi websites In the jihad section, would-be recruits are
encouraged to join the battle. Some general advice is given, e.g., the best
routes into Iraq, names and locations of sympathetic mosques in neighbouring countries.
Galleries of martyr portraits are accompanied by their last wills and testaments, often in the form of a video
10:01:08 PM 23
jihadi websites Most sites have IT section where contributors
are urged to share their knowledge and develop new ways of using cyberspace to further the cause of jihad.
The bulletin boards or chat rooms are by far the most popular forums on jihadi websites.
Visitors can add comments or reply to ongoing conversations and debates.
10:01:08 PM 24
jihadi websites Many jihadi sites have a women’s section
where wives and mothers are urged to support their men in jihad and help them in the psychological battle against what one site described as that disease, the weakness which loves life and hates death.
10:01:08 PM 25
Use of Internet by TerroristsProviding Information (English, Arabic,
other languages, according to the audience)
Seeking LegitimacyPropaganda – use of cameras, chat
rooms;Socialization and motivation - use
chatrooms to create virtual community, and motivate people to take violent actions against the West.
Seeking support10:01:08 PM 26
Use of Internet by TerroristsSpreading tactics – the first beheading in
Iraq showed on the Internet motivated copy-cat actions in other countries. Beheading is not part of the culture and tradition in Thailand. The Internet facilitated this knowledge and idea.
Instructions and online manualsPlanning of activities and coordinationTraining how to build bombs – significant
but not as the uses of propaganda and motivation.
10:01:08 PM 27
Use of Internet by TerroristsFacilitation – like us, terrorists use the
Internet to organize their travel, to communicate, to find information.
Most fund raising is done person to person – going to an individual and ask for money. Some Internet sites were used to raise money, but this is not a prevalent phenomenon.
Recruitment – a little bit. Not significantCyber-terrorism
10:01:08 PM 28
From Inaugural Poem/ Maya Angelou 20 January 1993, For Bill Clinton’s Inauguration
There is a true yearning to respond toThe singing River and the wise Rock. So say the Asian, the Hispanic, the JewThe African and Native American, the Sioux,The Catholic, the Muslim, the French, the GreekThe Irish, the Rabbi, the Priest, the Sheikh,The Gay, the Straight, the Preacher,The privileged, the homeless, the Teacher.They hear. They all hearThe speaking of the Tree. Today, the first and last of every Tree
Speaks to humankind. Come to me, here beside the River.
29
RacismSome 70,000 racist and hateful sites
10:01:09 PM 30
10:01:09 PM 31
From Speech to Action Three Aryan supremacists, Benjamin Smith, Richard
Baumhammers, and James W. von Brunn who in 1999, 2000 and 2009 respectively went on racially motivated shooting sprees after being exposed (von Brunn also contributed) to Internet racial propaganda.
Smith regularly visited the World Church of the Creator website, a notorious racist and hateful organization.
He said: "It wasn't really 'til I got on the Internet, read some literature of these groups that… it really all came together.“
The Zundelsite“Women Dined and Danced in Auschwitz”No gas chambers ever existedPeople died in WWII, some were Germans,
some Jews
10:01:09 PM 32
Racism & Holocaust DenialIn Canada, the Zundelsite and other
hateful sites were shut down. Is law the appropriate way to fight against
such speech?Education?What about accessing such material in
libraries and schools?The importance of historical context
10:01:10 PM 33
Historical Context and National BoundariesYahoo! maintained auction sites via which third parties
offered, among other items, Nazi memorabilia for sale. In 2000, anti-hate campaigners based in France
commenced legal proceedings against Yahoo!, alleging violation of French penal laws prohibiting the public display of Nazi “uniforms, insignia or emblems” within French borders.
The Supreme Court of Paris asserted jurisdiction over Yahoo! because its auction sites could be accessed in France;
The court ruled that the US company must “take such measures as will dissuade and render impossible” access to auction sites selling Nazi paraphernalia and any other sites containing pro-Nazi propaganda, and awarded civil damages to the organizations that instigated the action
10:01:10 PM 34
The Council of EuropeThe Council of Europe has adopted a measure that would
criminalize Internet hate speech, including hyperlinks to pages that contain offensive content.
The provision, which was passed in 2002 by the council's decision-making body (the Committee of Ministers), updates the 2001 European Convention on Cybercrime.
10:01:10 PM 35
The Council of EuropeSpecifically, the amendment bans "any written
material, any image or any other representation of ideas or theories, which advocates, promotes or incites hatred, discrimination or violence, against any individual or group of individuals, based on race, colour, descent or national or ethnic origin, as well as religion if used as pretext for any of these factors."
10:01:10 PM 36
American Legal BoundariesTrue Threats, intimidationIncitement to murderHow the Internet is used to scare people?Case law
10:01:11 PM 37
10:01:11 PM 38
Date: Fri, 20 Sep 1996 10:58:55 -0700From: "Mother Fucker (Hates Asians)" <[email protected]> To: {recipient list omitted to protect privacy of individuals}Subject: FUck You Asian ShitHey stupid fucker
As you can see in the name, I hate Asians, including you. If it weren’t for asias [sic] at UCI, it would be a much more popular campus. You are responsible for ALL the crimes that occur on campus. YOU are responsible for the campus being all dirt. YOU ARE RESPONSIBLE. That’s why I want you and your stupid ass comrades to get the fuck out of UCI. IF you don’t I will hunt all of you down and Kill your stupid asses. Do you hear me? I personally will make it my life carreer [sic] to find and kill everyone one [sic] of you personally. OK?????? That’s how determined I am.
Get the fuck out. Mother Fucker (Asian Hater)
Machado
Shutting Down WebsitesJouhari v. Wilson
US Dept. of Housing & Urban Development, Jouhari and Pilar Horton v. Ryan Wilson and ALPHA HQ, July 19, 2000
10:01:11 PM 39
JouhariNext to Jouhari’s picture, the ALPHA HQ
website stated, "Traitors like this should beware, for in our day, they will hung from the neck from the nearest tree or lamp post.“
The website referred to Jouhari's daughter as "mongrel," listed various types of guns, information where to obtain various weapons, and provided a bomb recipe under the picture of Jouhari's office. http://www.hud.gov/utilities/intercept.cfm?/offices/oalj/cases/fha/pdf/wilson.pdf
10:01:11 PM 40
JouhariWilson was charged by the Pennsylvania
Commonwealth's Attorney General with threats, harassment, and ethnic intimidation.
The site was removed from the Internet, and the court issued an injunction against the defendant and his organization barring them from displaying certain messages on the Internet.
10:01:11 PM 41
Planned Parenthood v. American Coalition of Life Activists
10:01:12 PM 42
Legitimate v. Illegitimate Speech
10:01:12 PM 43
The Deadly Dozen
10:01:12 PM 44
The Nuremberg Files
ABORTIONISTS: the baby butchers
Lawson Akpalonu (CA) Ben Graber (FL) Norman M. Neches (DC)
Edward Allred (CA) William Graham (LA) James Newhall (OR)
Kevin W. Alexander (DC) Marshall Grandy (TX) Richard S. Newman (DC)
Eduardo Aquino (TX) Richard P. Green (DC) Mark Nichols (OR)
Gostal Arcelin (FL) Thomas H. Gresinger (VA) Mario Ochoa (TX)
(SEND US MORE NAMES!) David A. Grimes (SEND US MORE NAMES!)
Carl L. Armstrong (OH) Jay M. Grodin (MD, VA) Soo-Young Oh (MD)
Ali Azima (FL) David Gunn (Fl) Tati I. Okereke (NY)
(SEND US MORE NAMES!) R.V. Guggemheim (OR) (SEND US MORE NAMES!)
Fritz Bailey (CA) Tom Gunter (CA) Kathleen A. Olson
Carlos Baldocedas (IL) Moshe Hacamovitch (TX) G.W. Orr (NE)
10:01:12 PM 45
Shutting Down Websites
10:01:12 PM 46
Arguments for and against Shutting Down WebsitesAgainst Shutting Down: Free expressionFutility – mirror sites, different serversSource of information for security officersDifficult to track down sites, hence there is
interest to keep them viableFor Shutting Sites: facilitate criminal
activity;Scope of audience: An American server
cannot be equated to a server in Yemen
10:01:13 PM 47
Shutting Down WebsitesFrom discussions with security
experts I gather this is not the preferred option.
They would like to keep an open eye on such sites
10:01:13 PM 48
From Miller Williams / Of History and Hope
The children. The children. And how does our garden grow? With waving hands -- oh, rarely in a row -- and flowering faces. And brambles, that we can no longer
allow. Who were many people coming together cannot become one people falling apart. Who dreamed for every child an even chance cannot let luck alone turn doorknobs or not. Whose law was never so much of the hand as the head cannot let chaos make its way to the heart.
President Clinton's Inauguration 199710:01:13 PM 49
Crime-Facilitating SpeechAssassination – Hit ManHow to kill your wife
http://powerballplace.blogspot.com/2005/03/how-to-kill-your-wife-and-get-away.html
RapeRape drugsSilencersEncryptionUse of proxisCryptome.org
10:01:13 PM 50
Bomb MakingOn March 23, 1996, the Terrorist's Handbook
was posted on the Web, including instructions on how to make a powerful bomb.
The same bomb was used in the Oklahoma City bombing.
Deputy Assistant Attorney General Robert Litt, of the U.S. Justice Department's Criminal Division, observed that only hours after the Oklahoma City bombing, someone posted on the Internet directions -- including a diagram -- explaining how to construct a bomb of the type that was used in that tragic act of terrorism.
10:01:14 PM 51
10:01:14 PM 52
Crime-Crime-facilitating facilitating SpeechSpeech How to How to become a become a successful successful contractorcontractor??
How to tempt How to tempt kids to bedkids to bed??
Bomb makingBomb making
10:01:14 PM 53
RICE v. PALADIN ENTERPRISES
Paladin Press publishes the book “Hit Man” -1983
Lawrence Horn hires James Perry to kill Horn’s family so he may collect his disabled son’s $2million+ legal settlement
Both Horn and Perry are found guilty of charges against them.
Surviving family sues Paladin Press for aiding and abetting Perry and Horn in the triple murder
10:01:14 PM 54
Publication of books
Should there be limits on books’ publication?
Does the mode of publication make a difference?
Addressing legal lacuna
Cryptome.comCryptome welcomes documents for
publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and secret governance -- open, secret and classified documents
10:01:15 PM 55
US Nuclear Weapons Storage Kwajalein, Marshall Islands
10:01:15 PM 56
Our Children/Raphael Cohen-AlmagorChildren are unconditional LoveChildren are what you see in yourselfBefore the grudges of Life.
Their smile your joyTheir pain your achesTheir present our future. Beautiful fragile snow flakesWhite, pure and trueTreasure like blue deep ocean gem. Treasure before they turn gray and sour upon meeting cold and quiet
Hard surface of life.
10:01:16 PM 57
Beware of the bad bad wolfHe is lurking there all ears and teethCunningly watching before making his move. Sharp eyes to track his preyFine smell to make you prayLucid words just what they expected him to say.
Written for the occasion of this Inaugural Lecture
10:01:16 PM 58
Child PornographyPornographers are always among the first to
recognize and exploit the potential of each new wave of communication technology, from the printing press and early photography to film and video, and now the Internet
Most states prohibit by their criminal law the production, promotion, sale, exhibition, or distribution of photographs or videos of children engaged in any sexual activity
10:01:16 PM 59
Child PornographyThe internet features of accessibility, privacy and
low cost serve to encourage some offences. Child pornography is often used by offenders to
groom children by “normalizing” sexual activity with children and breaking down inhibitions, or to blackmail a child into desired behaviour by threatening to expose their use of pornography.
The saturation of the internet with such material may serve to “normalize” this behaviour and probably makes it easier to objectify children as sexual artifacts.
Pornography is also thought to reinforce a person’s sexual attraction to children
10:01:16 PM 60
Child PornographySocial-networking sites have been shown to
attract sexual predators looking to take advantage of naïve young people.
Launched in 2004, MySpace has swiftly become one of the biggest hits in the history of the Internet.
Crimes as serious as murder and rape have been linked to teens using the site.
There is a strong link between those who collect images and those who molest children
10:01:16 PM 61
IdentityChild pornographers conceal their true
identity by means of proxies, “false flag” addresses, the use of which means that the host site will not be able to identify a visitor’s true IP.
They will never use their own credit card to pay for photos or videos.
Some users succeed in hacking into a pay server, stealing another person’s credit card, but this route is only for the truly ingenious
10:01:17 PM 62
How Child Pornographers Work?A person has a collection of several thousand
child porn imagesHe likes to share themFirst, he obtains a proxy that conceals his name
and location and acquires a new e-mail account under a false name from an anonymous provider, likely in a third world nation: both are easy to do.
With these bogus credentials, he opens an account that permits him to set up a home page on an innocent and aboveboard public server such as angelfire.com,
10:01:17 PM 63
How Child Pornographers Work?Unknown to the provider, the person loads how many
photos he wants The site is of no use to anyone as yet, in that nobody is
likely to stumble across it by accidentOur generous child-pornographer announces the
posting of the series on the Maestro board or one of its counterparts, where the message is read and acknowledged gratefully by other “loli fans”
Duly alerted, consumers then flock to the site advertised, which may be based in any of twenty countries, and then download the pictures. The images will exist at that site only for a few hours before they are removed and the site ceases to exist
10:01:17 PM 64
How Child Pornographers Work?The best way to discover child-pornographers
activity is by discerning a site that suddenly attracts thousands of hits within a few hours
Sometimes money changes hands and videos are sold, but many sites that demand payment for access are bogus, and anyone gullible enough to pay will, if he is lucky, just lose the price of admission; if he is less fortunate, he will have earned a visit from the police.
10:01:17 PM 65
How Child Pornographers Work?In 2009, Swiss police uncovered an internet
child pornography network spanning 78 countries and involving at least 2,000 IP internet addresses.
An inquiry was launched after a tip-off from Interpol about a Swiss website being used as a forum for illegal child pornography films.
The site was officially devoted to hip hop music but was used to access videos of child pornography via secret codes.
10:01:17 PM 66
How Child Pornographers Work?The authorities had been monitoring the
website for some time.Dozens of arrests and several convictions
have been made as a result of the investigation, which began in May 2008.
The site's designer was apparently not aware what it was being used for and was cleared of any involvement in the ring.
10:01:18 PM 67
CollectionsThe vast majority of people who post or
distribute pictures do so out of non-economic motives
The sense for completion or perfection is particularly marked in child porn collecting. Hobbyists seek unbroken series of the various photo shoots such as KG or Tiny Americans, and they pride themselves on their achievement in seeking out and amassing items.
10:01:18 PM 68
EncryptionThe careful child-pornographers use encryption when they exchange images
Without the key, it is very difficult to decode the image
Encryption is the best friend of all people involved in illegal activities: Child-pornographers, terrorists and criminals.
10:01:18 PM 69
RemediesEducationParental SupervisionPhysical-Geographical Control (at home, in libraries)
FiltersDenying LegitimacyISPs Liability
10:01:18 PM 70
RemediesNeed for more youth education (like the Partners Against Hate program),
Promotion of tolerance, Exposing of hate, International cooperation between governments as well as between governments and Internet Service Providers.
10:01:18 PM 71
RemediesBusiness BanInternational Cooperation: Working Group on Internet Governance
Legislation and PrecedentsMonitoring WebsitesRemoving Criminal WebsitesCleaNet
10:01:19 PM 72
RemediesIntroducing a different rationale:
Instead of free highway, social responsibility
10:01:19 PM 73
10:01:19 PM 74
The Threats of the Internet
Global solution for
global problem
Filters
Business ban
Individual/ISPs
Who’s
Responsible
?
From Alberto Ríos/In Us This DaySometimes, we are brutal and dark green.We are the fishhook thorns on the wild cactus.But sometimes as well, we are the sky itself, That great blue living room filled with endless spaceIn every direction there is to see. We are,As things turn out, the answer and the problem
both.Every day we must choose our suit of clothes.
10:01:19 PM 75
We are in a border time,The border between countries, between centuries,The border between yesterday and tomorrow,What we have been and what we are going to be.We are a state of many languages, many cultures.We must translate this into a state with many ideas.Let us choose the best from this treasury of dreams.Let us create a futureWe would want to speak in any language.We should not try to predict the future—Instead, let us make it, and let us make it our own.
Governor 10:01:19 PM 76
On the occasion of the Inauguration of Janet NapolitanoGovernor of the State of Arizona January 2003
Thank you
10:01:20 PM 77