Options for Companies Dealing with Internet Censorship Abroad – by “Lake M”

The border-blurring brought on by the Internet must just be driving oppressive regimes nuts.  How are you supposed to control what information people get their hands on when it’s coming from the other side of the globe at the speed of light from people beyond the reach of your thugs and laws?  Well, many such regimes have adopted the tactics of similarly-minded paranoid conservative parents who don’t know what to make of the Internet.  If the source is beyond their control, they can at least attempt to block it at the point of entry.

This puts the foreign companies providing the content in a bit of a pickle.  They don’t want to lose their market share in the country in question, but they (hopefully) don’t want to facilitate oppression either.  Or, they don’t want to look like they’re facilitating oppression.  In fact, foreign companies are in a better position than citizens of the country in question, since they’re able to use their economic clout to influence policies without the same risks and restrictions that domestic actors face.  So, striking a balance between these concerns is of great importance to the success and reputation of the company as well as the human rights situation in the oppressive country.  Here are some of the options foreign companies have:

Cooperate & Facilitate

Do whatever the oppressive government wants you to.  Stop doing things they want you to stop, and give them the information they demand.

Pros:  You get to continue operating in the country.  Market share and profit and stuff.

Cons:  You’re doing evil, and everyone will hate you for it.  You could also get in legal trouble in the US.

Example: Yahoo!, China, 2004. Pretty much the worst possible way to handle this sort of situation.  In 2004, the Chinese government released a document warning journalists about reporting on sensitive topics because of the looming 15th anniversary of the 1989 Tiananmen Square Protests.  Journalist Shi Tao sent a brief of this document to the Asia Democracy Foundation via his Yahoo! e-mail account.  The Chinese government found out and demanded Yahoo! hand over information about the sender.  Yahoo! did it without even asking what it was for.  As a result, Shi Tao was sentenced to ten years in prison.  Yahoo! was criticized by every human rights organization in the book.  Congress investigated the incident, and later reprimanded Yahoo! for not giving full details to them regarding the incident.  Rep. Tom Lantos (D-CA) told Yahoo! founder Jerry Yang, “While technologically and financially you are giants, morally you are pygmies.”  Yahoo! was sued in the US on behalf of Shi Tao and another journalist, and they settled out of court for an undisclosed sum.  There still exists a campaign to boycott Yahoo! because of this, and I still refrain from using Yahoo! services.  Oh, did I mention they did the same thing two years earlier, resulting in another ten year prison sentence for journalist Wang Xiaoning?  And were complicit in helping to convict Li Zhi and Jiang Lijun, two other government critics?

Bahrain's blocked website page

Example: SmartFilter, Middle East.  McAfee’s SmartFilter software has been used by governments in Tunisia, Sudan, Oman, the UAE, Kuwait, Bahrain, and Saudi Arabia to block certain Internet content from reaching users.  They make no effort to prevent or prohibit governments from using this software, which is allegedly aimed at homes and schools.  The software includes a database of more than 25 million blockable websites in various categories.  Such filtering databases as well as selective algorithms have been shown time and again to be massively flawed in the categories they attribute to various websites.  But, instead of simply inconveniencing a student who wants to research safe sex, AIDS, or religious tolerance (God forbid), it alters the information that can make it to an entire country of Internet users.  The OpenNet Initiative also accused Iran of using SmartFilter, though the US’s embargo against Iran would prohibit the sale or licensing of this software to Iran.  The company has said that Iran pirated their software.  Some say Iran now has its own censorship software.  While McAfee doesn’t market their software to oppressive regimes or for the purpose of mass censorship, some selectivity in who they license their software to or the scale at which they allow it to be implemented wouldn’t be a bad idea.  It wouldn’t stop governments from pirating it, but at least it would help McAfee from appearing complicit in censorship.

Unfortunately, there are way more examples of this response than any of the responses below.

Cooperate Less

Set a limit to your capitulation while acknowledging the authority of the host government as set out by its laws.

Pros:  You might get to continue operating in the country without giving in entirely.  You would also help make it clear that there is a limit to what governments can force foreign Internet companies to do.

Cons:  The government might still prevent you from operating there.  You might not get the benefit of being seen as standing up to oppression.

Example: YouTube, Turkey, 2007. The Turkish government mandated that Turkish telecom providers block access to YouTube because it hosted some videos that were said to insult Mustafa Kemal Atatürk.  Nicole Wong, deputy general counsel of Google, which owns YouTube, decided that Google would block Turkish IP addresses from accessing videos that clearly violated Turkish law.  Later, though, a Turkish prosecutor demanded that Google block users anywhere in the world from accessing such videos.  This is where Google drew the line, and they refused to capitulate to the unreasonable request.  YouTube remained blocked in Turkey until 2010 when Turkey’s Transport Minister, in charge of Internet issues, lifted the ban, proclaiming that “common sense prevailed”.  So, despite the dismay and limited success of the conservative elements that demanded the ban, internal pressure and the realization of YouTube’s importance prevailed.

Move Services Out of the Offending Country

The more of a company’s operations that physically take place within the offending country, the more power the government can assert over the company.  Partnering with local firms presents similar problems.  Locating data storage in particular outside of the country allows in-country users to move their data farther from the reach of their government.  There are few examples of companies making this kind of drastic business change, but the choices companies make before starting business in other countries affect their relationship to freedom of speech controversies in the future.  For example, Google and Microsoft don’t partner with Chinese companies (though they have their own workers in China), whereas Skype and Yahoo do, and the latter companies have lost much more face in controversies surrounding censorship in China.

Pros:  It’s likely that the offending country’s government will block your services anyways, but at least the option is there should they choose to unblock them in the future.  There’s also the advantage of preserving your reputation and being seen as not doing evil.

Cons:  Your services might very well get blocked.  Your local workers or former local workers could face trouble.

Example: Google, China, 2010. When Google discovered hacking attempts targeted at the Gmail accounts of Chinese human rights activists, which would put those activists in great danger, they reacted harshly.  They announced that they would stop censoring search results on Google.cn, which they had previously agreed to do in order to be allowed to start operations in China.  They even went so far as to say that they would shut down their operations in China entirely if the government continued causing problems.  While Hong Kong is technically part of the People’s Republic of China, it operates under radically different laws regarding freedom of speech.  As is often the case with China’s Internet blocking, the accessibility of Google.cn varies by time and location.

Shut Down Services

No longer offer your services to the offending country and its Internet users.

Pros:  You stand your ground, and the offending government will (well…might) think twice before they try to muscle a foreign company again.

Cons:  You’re no longer in that country’s market.  Whatever limited information or services you were able to provide or would be able to provide are no longer available to users in that country.  Your local workers or former local workers could face trouble.

Example: Websense, Yemen, 2009. Websense, like SmartFilter, is web filtering software similar to SmartFilter.  Like SmartFilter, it is not intended or marketed to be a tool for government censorship.  Actually, it was what my high school used to ban naughty (and not so naughty) things.  But, unlike SmartFilter, Websense has an explicit anti-censorship policy under which it “does not sell to governments or Internet Service Providers (ISPs) that are engaged in government-imposed censorship”.  When Websense discovered that the Yemeni ISPs were using their software to implement government-imposed mass censorship, they prohibited Yemeni ISPs from accessing updates to their software.

Ignore the Government

There are a lot of services that presumably carry content that oppressive governments wish to block and have probably requested to have taken down, but controversy rarely arises when companies just ignore those requests.  It may be useful to be linked to free speech and democracy movements, as is the case with Twitter.  Some users will undoubtably find a way to access your website, and it will be much more valuable to them if, when they get there, there is freedom of speech.

Pros:  Like the previous several options, you get some good karma by not giving in to an oppressive government.  You remain in control of your content.  By not engaging the government, the issue may not go any further, and the government may not end up enraged and looking for a way to get revenge or assert its power.

Cons:  You may get blocked.  You may get in legal trouble if you ignore government requests.

Example: Twitter.  Twitter’s strategy is not even engaging with oppressive governments about getting their website unblocked.  They focus more on working on developing ways to circumvent censorship.  As Twitter CEO Evan Williams put it, “The most productive way to fight that is not by trying to engage China and other governments whose very being is against what we are about.”  By continuing to host politically controversial content, Twitter has become central to many opposition movements.  Even though it is at least partially blocked in Iran, many Iranian dissidents communicate using Twitter, and a lot of information makes it out of Iran via Twitter.

I shouldn’t need to explain why it’s bad to help government oppress their citizens.  So I won’t.  But all too often, the moral repercussions of business decisions like these get looked over because they don’t have overt monetary value.  But it’s inextricably linked to reputation, which is inextricably linked to success.  Part of Google’s success is that it is seen as not doing evil.  In a world where people are increasingly wary of big corporations (see: all those “Occupy” movements right now), it’s important that a company be seen as a friend, not an enemy.

Lifting the Veil of Anonymity: Accountability in the Digital Age – by “Andrew C”

Skanks in NYC

In February of 1996, John Perry Barlow issued a rather flowery piece of prose that he called “A Declaration of the Independence of Cyberspace.”  In this Declaration, Perry envisioned an Internet governed by “ethics, enlightened self-interest, and the commonweal” over which the governments of the world would have neither “moral right to rule”, nor “any methods of enforcement.”

Today, Perry’s piece is seriously somewhat dated.  If there’s one thing the last 13 years have shown it’s that, while the internet does in fact have plenty of world-changing applications, it is far from a utopian virtual dimension.  Any independent observer of the internet today would be undoubtedly amused by the notion that, if left to their own devices, internet users will be motivated by some higher sense of ethics.  Rather, it has become increasingly obvious that no amount of idealistic philosophy will change the baser instincts among the less socially inclined among us.  Actually, it would seem that the relative anonymity of the internet has served to increase the willingness of certain people to post hateful, horrible things.

Ironically, that trend plays perfectly into Barlow’s claim that the US government has no right and no enforcement mechanisms with which to control that which happens on the internet.  Quite frankly, yes it does, and yes it can.  The jurisdiction of the US judicial system undoubtedly extends to comments made in cyberspace, and in recent years, users posting anonymously on blogs and forums have come to realize more and more that, while the Communications Decency Act protects providers of online internet service from defamation lawsuits, it does not protect the actual posters of defamatory comments.  As such, people who thought they were posting anonymously on the internet have increasingly found that they can in fact be held responsible for their actions.073008cohen24JD

One of the best examples of this phenomenon is in the case of Liskula Cohen (pictured right), who in January of 2009 sued Google in order to uncover the identity of the owner of the blog “Skanks in NYC,” which was operated by Google.  Cohen, who is a fashion model, had discovered that the anonymous writer of the blog had posted numerous defamatory comments, calling Cohen a “skank,” an “old hag,” and a “a psychotic, lying whore.”  On August 17, 2009, Judge Joan A. Madden of the Supreme Court of the State of New York issued an opinion ordering Google to reveal the name of the blogger.

The court, in a fabulous argument involving the American Heritage Dictionary definition of the words “skank” and “ho,” stated that the descriptions by the blogger of Cohen as a “skank” and a “ho” constituted an assertion that Cohen was sexually promiscuous.  The court ruled that therefore these statements were not opinions but a statement of provable facts.  As such, the court reasoned, if the facts posted by the blogger could be proven to be incorrect, they could most certainly be construed as defamatory to Cohen’s character.  The court essentially ruled that Cohen had enough of a defamation case against the anonymous blogger that it was necessary and proper to compel Google to reveal the blogger’s name.  As such, Cohen is now suing the blogger, who turned out to be 29 year old fashion student Rosemary Port for $3 million.  Not surprisingly, the two had encountered each other before in the fashion scene, and had reportedly had an altercation involving Port’s ex-boyfriend.

In her ruling, Madden rejected the idea that blogs “serve as a modern-day forum for conveying personal opinions, including invective and ranting,” and cited the opinion of a Virginia Court, which stated that “in that the Internet provides a virtually unlimited, inexpensive, and almost immediate means of communication with tens, if not hundreds, of millions of people, the dangers of its misuse cannot be ignored” and that “the protection of the right to communicate anonymously must be balanced against the need to assure that those persons who choose to abuse the opportunities presented by this medium can be made to answer for such transgressions.”  In this argument Madden acknowledged the vast potential of the internet but at the same time asserted that it cannot serve as a lawless abyss of anonymity.  Madden’s argument was that blogs cannot be considered exempt from defamatory lawsuits and that individuals must be held accountable for their actions online.  At the same time though, Madden argued that it is necessary to strike a balance between accountability and the protection of anonymous free speech.

And indeed, this issue is certainly a question of balance.  For her part, Rosemary Port is suing Google for $15 million for revealing her name, claiming that she is being persecuted for her opinions and that Google violated her privacy by revealing her identity.  In the suit Port’s attorney claims that her Constitutional right to anonymous free speech under the first amendment was violated.  In his argument, Port’s attorney compares Port’s anonymous “Skanks in NYC” blog to the Federalist Papers, which were written under pseudonyms, and upon which the very foundation of our society was based. This connection is dubious.

In the end, this issue is a question of where one draws the line.  Is it necessary for global democracy and free speech that Rosemary Port be allowed to call Liskula Cohen a whoring skank without any consequences? I think most people would say probably not.  It’s hard to argue that protecting people like Port from defamation lawsuits was what the Founding Fathers had in mind when they wrote the First Amendment.  It is clear that internet users like Port certainly are not motivated by Barlow’s notion of “ethics, enlightened self-interest, and the commonweal.”  Without a doubt, there are individuals who use the screen of online anonymity to say hateful, disgusting things that can be incredibly harmful.  The Skanks in NYC case does appear to demonstrate however that anonymous posters online are becoming decidedly less anonymous as time goes on.  It is possible that, in the end, the posters of morally reprehensible content online will be just as immediately identifiable and accountable as those who perform morally reprehensible actions in the real world.  However, there is a certain truth to the fact that the internet has provided a vital platform for anonymous free speech and the dissemination of information.  Without a doubt, the internet has provided a way for those who are oppressed or censored to both receive information and to spread the news of their plight. The tradeoff between anonymity and accountability, while necessary to a certain degree, definitely lies on a very slippery slope.  It remains to be seen how far down that slope we as a society are willing to go.

Two Sides, One Coin: Free Speech and Web Vigilantism in China – by “Chuen-Yee C”


One of the most well known cases of web vigilantism in China occurred earlier this year when Jiang Nan jumped 24 floors to her death. Before she committed suicide, she wrote multiple blog entries describing the details of her husband’s affair. Chinese netizens, eager to see justice served, tracked down and publicized photos and personal information of her husband and his lover. Jiang Nan’s husband, Wang Fei, an advertising agency executive, suffered extensive invasion of his privacy and was subsequently fired from his job.  Ironically, this alarming example of a peer-surveillance state in action seems to have its roots in the exercise of free speech.

Despite the staggering changes toward modernization that have occurred, Chinese value systems have yet to modernize in line with the country’s evolving posture toward capitalism and its cooperation with the global economy. There are now an estimated 137 million Internet users in China, and the Internet has had a profound effect on the Chinese way of life and the predominantly traditional values it has embodied for over two thousand years. However, the explicit confrontation between distinctively Chinese values and the Western values of free expression and the free flow of information that drive the Internet has resulted in a dramatic conflict.

Web vigilantism is a common problem rife in all societies with access to the Internet, but is a particularly alarming phenomenon in East Asian countries, especially China. On social networking sites, blogs, and other Web 2.0 platforms, destructive groups can publish sensitive information, from private matters to personal information. These groups often threaten forms of physical violence and send damaging statements about victims to employers and manipulate search engines to highlight those statements for business associates and clients to see.

Incidents of “web lynching” and the “human flesh/renrou search engine” 人肉搜索 in East Asian countries, most notably China, demonstrate the underpinnings of a larger social and cultural problem. Acts of vigilantism on the Internet have destroyed the reputations of victims, corroded their privacy, and impaired victims’ abilities to participate in online and offline activities. The benefits of the Internet have left their mark especially in the realm of economic and financial development, but social harm has resulted from the sudden explosion of traditional values operating on a mass scale. While Confucian principles have deeply shaped both the Chinese hypersocial environment and sense of justice, the Internet has enabled transcendence of traditional social roles and a cost-effective means to collective action. These factors have combined to contribute substantially to the trend of extreme Internet vigilantism, digital witch hunts some have dubbed the “New Red Guard.

The Chinese government’s “pro-morality” stance has not deterred vigilantes and may indeed have worsened the situation. At the same time, most of the government’s efforts to promote “social harmony” on the web lay in mass censoring and filtering mechanisms—efforts that mostly center around limiting the freedom of political speech. In protecting Chinese citizens from each other would it be better to implement a more benign approach by imposing checks through tradition and thought, or does the answer lay in restructuring social norms through the law? China’s unique history and social culture mean that traditional Western approaches may not work and could even worsen the situation.

Wang Fei recently won his suit against the blogger who released his wife’s diary online and the website that published his personal information. This verdict sets an important precedent for future online vigilante victim cases, but China’s current legal system is only able to help victims attain meager compensation on a case-by-case victim; Wang Fei’s total awards totaled less than $1,000USD.  While laws could be reformed to adequately address victim compensation, efforts to control Internet vigilantism in China should also reflect a commitment to reforming citizen behavior online. In order to structure an appropriate solution that minimizes attacks on individual citizens while promoting the use of renrou as a check on political corruption , Chinese legislative and political powers must understand the relationship between China’s hypersocial environment, Confucian and traditional values, and the Internet’s influence on group behavior.

Anonymous Speech: Harmful Enough for Regulation? – by “Marcus M”

The Internet offers users the possibility of anonymity, which allows people to act elusively and namelessly across its vast series of tubes. While online, individuals can use aliases to mask their identities or even to design entire virtual “second lives.” While users do leave their IPs behind, they trust that host sites will safeguard this information, which can be used to reveal their true identities. The power afforded by the Internet’s identity-obscuration has a variety of effects on speech.

One of these effects has been to encourage the expression of otherwise detestable speech. Of the belief that their identities will not be uncovered, individuals may feel enabled by their online anonymity to post material they deem too offensive, provocative, or legally dubious to express in the real world. This effect has manifested itself in countless instances of online hate speech and cyberbullying, both of which can cause tangible harm to their targets. This potential for real harm raises the following question: Can the veil of anonymity enjoyed by Internet users be justifiably removed for the sake of a citizen’s protection?

This is the question posed to the Cook County Circuit Court in a recent case regarding “deeply disturbing” comments made online about the 15-year-old son of Buffalo Grove, IL Village Trustee Lisa Stone. Under the alias “Hipcheck 16,” an individual posted the comments in response to an article written in the Daily Herald on April 6, the day before Village Board elections. Stone went to court to ask Judge Jeffrey Lawrence to give her the identity of Hipcheck 16. The judge did acquire the user’s identity, but he did not relay it to Stone, at least not yet. On November 9, Stone’s attorneys and the anonymous poster’s attorney will present their arguments before the judge, who will then decide whether or not to provide Stone with Hipcheck16’s identity.

ACLU spokesman Ed Yohnka weighed in on the case, saying that anonymous speech is an integral part of our society, and must be protected. Noting the anonymously published texts by Benjamin Franklin and Thomas Paine, Yohnka pointed out the importance of anonymous speech in the early stages of America’s independence. The case would have broad application to online speech rights, since few cases like it have appeared in American courts, and could possibly restrict the ability of citizens to speak anonymously.

But it seems that this point ignores the capacity of the law to draw a distinction between acceptable and unacceptable anonymous speech. The type of speech Yohnka wishes to protect would be legally protected – however nasty, political speech by definition targets the state and its occupants, not fellow private citizens. There do already exist protections for anonymous speech, but these do not cover defamatory and other speech considered illegal in normal circumstances.

The various contributing lawyers seem to neglect Stone’s main concern in seeking Hipcheck16’s true identity. She sees the case as primarily about the “need to protect children from being attacked on the Internet.” This bring to mind the incident last year of a mother posing as a teenage boy on MySpace, who taunted a 14-year-old girl to the extent that she committed suicide.

While certainly an extreme example, this incident demonstrates to me the necessity of at least some laws governing how individuals interact with one another on the Internet. When there is significant, tangible harm done unto a person by another user, I think there should be punitive action taken against that user, beginning, of course, with his identification. The policy behind this would have to be written sufficiently clear as to not deter anonymous speakers in general. Otherwise, the anonymous political speakers whom the ACLU seeks to protect will suffer. What a surprise: a big obstacle is determining the appropriate language for a law.