By Ismael Peña-López (@ictlogist), 24 October 2012
Main categories: Cyberlaw, governance, rights, e-Government, e-Administration, Politics, Information Society, Meetings, Participation, Engagement, Use, Activism
Other tags: carlos sanchez almeida, comsc, cristina_cullell_march, txarlie
No Comments »
Round table: The defence of the Network, hacktivism and other contributions to the source code of the new movements
Chairs: Cristina Cullell (Universitat Jaume I)
Technological infrastrucures have changed the landscape of participation and activism. There also is a new hacker ethic or hacker culture that promotes sharing, decentralization, openness, etc. Hacking is not based on an expectation of profits, but on personal pleasure or realization, on prestige and recognition: hacking is better understood in a gift-economy rather than a traditional capitalist economy.
Hacking requires net neutrality and an open network to be able to realize its full potential. But is it the Network a common good or a private service? Depending of how the Internet is understood, different ethics apply and different ethics clash one with each other.
Can hacking provide a new framework that is able to design (alternative) solutions for the economic and political crisis?
How is the Internet born? It’s not the outcome of some amateurs, but the outcome of scholars, scholars trying the get the best of their powerful but underused infrastructures (regardless of the fact that they were directly or indirectly financed with military funding). And, in a scholarly way, technology, research, designs and results are openly shared.
But little by little, and fostered by private investors, infrastructure and its open outcomes are increasingly privatised and released with different licenses that allow different uses and “ownerships”. One of these licenses is the GPL, that uses the hegemonic rules and practices to fight them back.
The GPL and the way of working around the GNU not only provided new outcomes (i.e. an operating system) but also new ways of working, of collaborating, of distributing tasks.
Most of the developments that run the Internet or that run over the Internet are built upon this new way of working, and based on two main pillars:
- Low consensus: maximum consensus cannot be achieved; thus, practicality and the lowest common denominator is what applies.
- Running code: things are built upon practice, what is to be applied is what is been worked on, what is being actually coded and run.
This way of working both fits the basic needs of a project and also that dissension can be redirected by means of forking a specific initiative or project. Forking (usually) does not mean splitting a project but actually multiplying it.
[Txarlie implicitly recalls in software what in social movements is called as ‘do-ocracy’: activism by doing, not by representation.] The parallelism between free software and (new) (hack)activism is that decisions are taken in a decentralized way, there is no-one (but many people) deciding what initiative or project is being developed and carried on. In this sense, the 15M works as a free software project and the 25S as a fork of the initial 15M project.
The big difference between the 15M movement (aka Indignados) and the Anti-globalization or Alter-globalization movement is having a strong link with the media corporations, so that the message can get out of the insiders, that outsiders to the movement can connect, be informed, understand or interpret the message, resend it, remix it, etc.
When communication media try to explain the phenomenon of “AcampadaSol” (camps in the Spanish squares), they usually forget the whole landscape and context that leads towards Sol: AcampadaSol is not an isolated event, but the outcome of many micro-events and initiatives that had taken place before. A good explanation of the movement is Ciberactivismo: Las nuevas revoluciones de las multitudes conectadas, by Mario Tascón and Yolanda Quintana.
We need to reflect on the new ways of activism and understand their new role and the role of the Net. And this is an urgent need if citizen movements want to fight back the attacks of governments and corporations to these new ways of activism.
Hacking, new activisms, hacktivisms, etc. came up with new ways to circumvent or to hack the law and were able to raise improved ways of participation and protest. In reaction, legislative bodies are changing the law to prevent such circumvention, most of the times attacking not only new practices but the very core of some human and political rights such a freedom of expression or the right of assembly.
Activists need to set up new tools to circumvent the anti-circumvention laws. Society needs no new elites, but distributed and decentralized power. Society needs more hackers, but not technology hackers, but “society” hackers.
Discussion
Francisco Jurado: Why hacktivism? Why going against the system and not contributing to it? Txarlie: The traditional creators of content, of information, of knowledge (e.g. the academia) are no more able to be the only engines that empower the society. So, it is not exactly a matter of going against something or someone, but contributing to the work of the institutions… despite they wanting it or not. Carlos Sánchez Almeida: sometimes, though, some things need to be fought as they directly attack some human rights or some tools that enable the practice of some humand rights (e.g. P2P technologies).
Marga Padilla: what is the difference between activism P2P and activism Free Culture / Creative Commons? P2P is more based on protocols, on sharing initiatives, and Free Culture / Creative Commons activism is more based on creating more content, more information, and sharing and diffusing it.
Q: What exactly is the Internet? Does the definition determines what is cyberactivism? Txarlie: Internet is a network of computers. The problem is that over this network there are sub-networks that often isolate themselves from the rest of networks. So, when we talk about the Internet we should talk at both levels: the physical network and the logical or social sub-networks that coexist within. Almeida: Internet is a constitution written by hackers, and the Internet is a neutral network: a neutral network lets all bytes flow equally.
Q: Why hacktivism is many times not proud of its own actions? Why anonymity? Why not “full” civil disobedience instead of a rough approximation to civil disobedience? Txarlie: this is not a decision that an individual can take, but that the whole collective have to agree upon. And, at the moment, it seems like collective action on the Net is easier to do this way. It is not a matter of shyness or hiding, but a matter of efficacy (or so perceived efficacy). Almeida: we should differentiate hiding and anonymity or “not full” civil disobedience, from unfair laws and how these turn some legal actions into illegal ones. But, of course, civil disobedience has its consequences and hacktivism has to acknowledge them.
Ismael Peña-López: are we fostering hacktivism or rather cracktivism? If a hacker is someone inside the system and a cracker someone trying to (violently) enter it, are we really trying to change the system from within or to crack it? Where are politicians and parties and NGOs and other institutions in this hacktivism or activism from within? Or is it rather cracktivism? Txarlie: most cracking is useful for hacking, so sometimes there is a need for a prior cracking that enables the hacking that follows. Some institutions need to be cracked first so that then the insiders can hack it from within. Almeida: the best insider is the one that hacks and builds bridges with the outsiders. But this hacker-insider has to assume that they will often fall into civil disobedience and acknowledge the consequences… which they usually don’t. We do not want a switch of elites, but a transformation of the system.
Q: is it fair to use private tools (e.g. Facebook) for hacktivism? Almeida: it is fair because it is the best way to contaminate the system without the system being able to disable it. On the other hand, there is not a single tool for hacktivism, but a toolbox, with several tools to be used at different times and scenarios.
Q: what are the technological and economic requisites of hacktivism? Almeida: activism has to fight against the monopolies of power: economic and political power. This means that (1) activism will never fight in equal conditions but (2) activism does need some economic and political resources (armies march on their stomachs
, Napoleon). It is very important, though, that these resources are transparent and accountable.
Q: the new constitutions that have to be written, shouldn’t they focus more on the procedures and protocols rather than on “content”? Txarlie: opening procedures and protocols is crucial in activism. But content is also important: if there is nothing “constituted” before a “destitution” process, the outcome of such process can be a worst situation than the former. Almeida: more than protocols and content, decision-making has to be very agile, transparent and executive. This is the way to keep constitutions simple but effective. And this includes a good judicial power, efficient, independent, legitimated.
Digital culture, networks and distributed politics in the age of the Internet (2012)
By Ismael Peña-López (@ictlogist), 24 October 2012
Main categories: Cyberlaw, governance, rights, e-Government, e-Administration, Politics, Information Society, Meetings, Participation, Engagement, Use, Activism
Other tags: arnau_monterde, comsc, laura_perez_altable, manuel_castells, marga_padilla
No Comments »
Presentation of the Conference: Manuel Castells
In recent years there have been social movements that address the lack of representativeness and legitimacy of their politicians and governments. Institutions have been emptied of content.
It is not that democracy has ceased to be “democratic”, but many citizens believe so, which is a serious issue. And that is why many citizens look for alternative and more effective ways of participation.
So, what we are witnessing is not a minor protest, but a new pattern of behaviour that leads to change. Change of institutions and forms of institutionalization that should lead to new ways of decision-making that affects people’s lives. It is not (only) about building a new future, but about fixing our present. And it is not (only) about finding new ways of participation, but about designing new democracies.
We should be able to tell the difference between the actual mobilizations that imply occupations, fights with the police and some times some violence, from the ideas that boost these mobilizations. There of course is much debate and disagreement around the way mobilizations take place, but the consensus arises when the debate focus on the reasons and foundations of the mobilizations.
What forms of activism and mobilization in the public space can be carried on so that they affect the public agenda, real politics and decision-making? And this is the field of experimentation that we are witnessing. And what happens when the red line of violence is trespassed, as it implies the death-sentence of the movement.
This is what is at stake and it is very likely to intensify until it finds a solution.
Round table: From wikileaks to the Global Spring. Logics of the Internet in collective action
Chairs: Arnau Monterde
Protests in the Internet have their own specificities, fights in the Internet work, if not different, with their own rules of the game.
So, what is the Internet? What is the cyberspace? In his Declaration of the Independence of Cyberspace, John Perry Barlow defines it as a free non-physical space where physical violence cannot be enforced, where the rules of a material world do not apply any more. Despite the romantic approach of the declaration, it is absolutely true that the cyberspace, or the Internet, does imply many challenges to law and governance as we know them. This feature of an disembodied space implies:
- The Internet can be experienced in many ways depending on the interests that drive action on the Net, interests that are often opposed. Ambiguity is, thus, the very nature of the Internet.
- If a device can work in many ways and its not physical, it cannot be controlled. The Internet, and the messages that go through it, cannot be controlled.
- Last, a very specific thing about the Internet is that we have its code, we know how it works.
What is then at stake is (1) how to control access to this virtual space and, as a consequence, (2) how to control access to virtual goods that are not scarce, that can be freely and costlessly distributed and replicated.
The case of Wikileaks
Wikileaks presents a paradigmatic case of ways to attack the freedom of speech in the Internet, taken as a separate space from “reality”: while Wikileaks was haunted all along cyberspace (attacking their hosting services, their domain names, etc.), newspapers publishing Wikileaks’ documents were not attacked. Why was that so? Was Wikileaks more dangerous on the Net that on paper? Or was it because of the nature of the Internet?
One of the explanations is that while newspapers are usually national and politically-biased, Wikileaks acted internationally, with no political-bias, attacking the core of governments without a political agenda behind (did not want to substitute a government by another, which would have been understood as “fair”), it provided raw data and not just interpreted or mediated information.
Wikileaks is an unfinished device, it needs a solidarity network that “completes” what Wikileaks is providing. Wikileaks contributes to the commons by resigning control. All other nodes in the network acknowledge that Wikileaks is providing wealth to the network, which is good in itself (despite agreement or disagreement on what is specifically providing). Providing content, networking, wealth, is of most value in a network. And it is that value that was attacked.
On the other hand, the Internet is still seen as a lawless space, where the rules and law of the “real world” somewhat do not apply. Freedom of speech, the right to have a name or a website, etc. can be more easily attacked on the Net that on the flesh-and-bones world.
The cyberactivism kit
- Deep professional and technological knowledge.
- Capability to react quickly.
- Deliberate ambiguity, confusion, comfortability with chaos.
- Decentralized information &mash; vs. centralized traditional independent news sources.
The case of Anonymous
Anonymous — a non-organization, with an undefined political goal — can be understood as the reply of the lack of (or violation of) human rights on the Internet. If governments and firms act illegally or a-legally on the Net, Anonymous will do tantamount from the approach of the citizen.
Anonymous can also be understood as the result of the clash of two different rights: the freedom of speech, the freedom to access culture, and copyright.
Anonymous adds to the cyberactivism kit:
- Citizen politics with generic and plain English words
- Aim of anonymization, in the sense of unselfishness.
Laura Pérez Altable (UPF)
Informative flows during the Arab Spring: the case of Tunis
Some examples of digital networks of communication helping social movements:
- Castells labels the Zapatist Movement (1994) as the first informational guerilla: it used international media intensively to both diffuse their message and also to organize themselves around the message.
- The Battle of Seattle (1999) used for the first time the blog to organize and also diffuse their message.
- Iran lived unrests in 2009 against the election of Mahmoud Ahmadinejad where Twitter was broadly used as a tool to organize the protests.
- The Arab Spring (2010–), which witnessed how the message was co-built and co-broadcasted by citizens and corporate media.
- Others: Occuppy Wall Street, YoSoy132, etc.
Sampedro (Opinión pública y democracia deliberativa. Medios, sondeos y urnas. Istmo, Madrid, 2000) states that there are two different public spheres: the central one, where politics and media act, and outer or periferic public spheres that is where citizens act.
The traditional scheme of a political sphere that affects media that affect the public sphere is intercepted by a new actor: the digital networks of communication. These networks intercept the message especially between media and the public sphere, but actually affect all levels and actors in the scheme. With the appearance of the new actor, both the Agenda-Setting Theory and the Gate-Keeping Theory are altered and have to be explained from scratch, now including the new actor. Media are transformed: from being gatekeepers that filter information they turn into gatewatchers that make it visible.
Citizens hack local media and the official discourse of the government by aiming at international media and the international civil society.
Discussion
Q: People on the Internet may not suffer violence in it, but they definitely do outside of it because of their virtual actions. So, it is just partially true that there is no violence in cyberspace. How can this be counteracted? What is disobedience in cyberspace? Marga Padilla: the best way to perform disobedience is by hacking, that is, not going against the law on a straightforward manner, but circumventing it or even using it for one’s own purposes.
Eduard Aibar: The decentralized structure of the Internet is it true or just an illusion? How can the Egyptian government shut the Internet down in a matter of hours? A: While it may be physically possible to shut down the Internet, alternatives to connect to the Net were possible. On the other hand, the social and economical impact of shutting down the Internet implied that shutting it down was not sustainable in the medium-term. Marga Padilla: the best way to avoid Internet shut-downs is the ability to have a plan B by creating mirrors, for which both knowledge and the physical layer are required. Any social movement should have a hacker in their lines: hacking should be in each and every political or citizen agenda.
Digital culture, networks and distributed politics in the age of the Internet (2012)
By Ismael Peña-López (@ictlogist), 10 July 2012
Main categories: Cyberlaw, governance, rights, e-Government, e-Administration, Politics, Information Society, Meetings, News
Other tags: idp, idp2012
No Comments »
The proceedings of the 8th International Conference on Internet, Law & Politics (IDP 2012): Challenges and Opportunities of Online Entertainment. will be free for download in the following days on this page.
Content, besides some minor editing, has followed the originals, so the reader will find both articles in Spanish or English.
To cite this works use, please, any of the following references:
Cerrillo i Martínez, A., Peguera, M., Peña-López, I., Pifarré de Moner, M.J., & Vilasau Solana, M. (coords.) (2012). Retos y oportunidades del entretenimiento en línea. Actas del VIII Congreso Internacional, Internet, Derecho y Política. Universitat Oberta de Catalunya, Barcelona 9-10 Julio, 2012. Barcelona: UOC-Huygens Editorial.
Cerrillo i Martínez, A., Peguera, M., Peña-López, I., Pifarré de Moner, M.J., & Vilasau Solana, M. (coords.) (2012). Challenges and Opportunities of Online Entertainment. Proceedings of the 8th International Conference on Internet, Law & Politics. Universitat Oberta de Catalunya, Barcelona 9-10 July, 2012. Barcelona: UOC-Huygens Editorial.
8th Internet, Law and Politics Conference (2012)
By Ismael Peña-López (@ictlogist), 10 July 2012
Main categories: Cyberlaw, governance, rights, e-Government, e-Administration, Politics, Information Society, Meetings
Other tags: antonio_troncoso, esther_mitjans, idp, idp2012, jose_luis_piñar_mañas, maria_gonzalez
No Comments »
Panel on Privacy On Line
Chairs: José Luis Piñar Mañas. Professor of Administrative Law. Vice-Chancellor of International Relations at CEU San-Pablo University (Madrid). Former Director, Spanish Data Protection Authority..
Antonio Troncoso Reigada. Professor of Constitutional Law. Former Director, Data Protection Authority of the Region of Madrid.
The Internet has a huge potential for participation, especially social media. Freedom of expression has found a perfect platform on the Internet. Thus, minors have not to have their access to the Internet or social networking sites forbidden.
The proliferation of barriers for data protection is creating too many problems for the evolution of the Internet: we need a harmonization of law, not only within the EU but worldwide. Especially now that cloud computing is becoming mainstream.
The regulation framework in the EU is becoming better, but there is a certain lack of democracy, a lack of political and public debate on the issue.
Esther Mitjans. Professor of Constitutional Law, University of Barcelona. Director of the Catalan Data Protection Authority.
In the Internet age, privacy is a very important matter, present everywhere. There is a need for risk management, as these are new territories with new practices that bring with them plenty of risks and hazards. Behaviours of people cause not only risks upon themselves but also upon third parties. Data protection is about the crossroads of all these risks and practices. And we do not have to forget that the Internet does not believe in boundaries, borders and frontiers.
María González, Head of Legal for Spain, Portugal & Greece at Google.
The problem of short-term regulation can affect innovation, economic growth and the evolution of the Internet as a communication (not only business) platform.
Concerning cookies, the industry is now trying to decide what is the best design for opting-in concerning tracing cookies, and that the user is empowered with the control of their own data and privacy.
Regulation has to be based on transparency: all practices related to data protection, public, private and corporate have to be transparent and accountable.
The “physical” location of data is totally irrelevant when they are constantly replicated and transferred. Thus, what matters is demanding liability and responsibility to the firm, but not that these data are kept on a closed box in a specific territory or jurisdiction.
8th Internet, Law and Politics Conference (2012)
By Ismael Peña-López (@ictlogist), 10 July 2012
Main categories: Cyberlaw, governance, rights, e-Government, e-Administration, Politics, Information Society, Meetings
Other tags: andrew_mcdiarmid, christopher_marsden, fernando_galindo_ayuda, idp, idp2012, laszlo_nemeth, maria_gracia_procedda
No Comments »
Communications on Government and Regulatory Policies
Chairs: Agustí Cerrillo Martínez, Senior Lecturer and Dean of the School of Law and Political Science of the Universitat Oberta de Catalunya (UOC).
Guiding Principles for Online Copyright Enforcement.
Andrew McDiarmid, Senior Policy Analyst, Center for Democracy & Technology, Washington, DC (USA); David Sohn, General Counsel, Center for Democracy & Technology (USA).
Since the 2008, in the US there has been a pro-intellectual property regulation process, establishing the IP enforcement coordinator and increasing the resources for government enforcement. Principles for a balanced copyright enforcement:
- Target true bad actors.
- Preserve safe harbours.
- Study the costs and benefits.
- Voluntary initiatives must respect consumer interests.
- Set realistic goals.
- Education and lawful options are essential.
Domain Name-focused enforcement is a blunt instrument: entire sites are affected, including other sites. There are workarounds and it violates safe harbour cases. There is a harm to free expression due to overbreadth. There are risks of evasion.
Internet Co-Regulation and Constitutionalism.
Christopher T. Marsden, Director of the Essex Centre for Comparative and European Law. Senior Lecturer, Essex School of Law (UK).
Regulation:
- Statute backed code, appointed by the Government. Threat of regulatory intervention.
- Approved code, regulated by an independent body. Treat of sanctions.
- Industry code, set by the industry associates. Industry self-interest.
- Unilateral code, set by service providers. Individual self-interest.
Co-regulation (the independent body’s) is more interesting than statutory regulation or self (industry & unilateral) regulation, which are, notwithstanding, the ones that are more common.
Co-regulation says that civil society, the people, should have a formal role in it: multistakeholder-isation, it is a process and not a static model, e.g. the ICANN. This is yet to be enforced by governments and courts.
We need movement towards formal recognition and formalisation of co-regulation: Legislation 2.0
Electronic Democracy, Internet and Governance. A concretion.
Fernando Galindo Ayuda, Catedrático de Filosofía del Derecho, Universidad de Zaragoza.
Access to information: conscious participation of citizens over a specific matter. Governance as politics: the art of ruling in the pursuit of public well-being. The Internet is certainly boosting communication, but is it fostering democracy?
Reviving privacy: the opportunity of cyber-security.
Maria Grazia Porcedda, Research assistant, Department of Law, European University Institute, Florence (Italy).
What is cybercrime?
- Crimes against availability, integrity and confidentiality of computer systems: illegal access and hacking, illegal interception, data interference (malware, botnets, trojans), system interference (DoS, DDoS).
- Computer related: forgery, fraud.
- Content-related crimes: child pornography.
- Copyright infringement.
There are different notions of security and privacy, depending on where the weight is put between privacy and security and what is the approach towards cybercrime. But we can integrate de facto security and privacy. Cybersecurity is about protecting privacy, both by passive measures taken by educated users and by active measures against cybercrime.
PIPA, SOPA, OPEN — The end of piracy or privacy?
László Németh, PhD Student, Institute of Comparative Law, Faculty of Law, University of Szeged (Hungary).
PIPA and SOPA are similar in many ways: against foreign (rogue) sites, domain name seizure, in personam, in rem action, presumption of guilt, voluntary action, etc.
PIPA and SOPA have raised concerns, objections and even protests.
The OPEN act demands the web to be kept open.
We surely now need new global treaties (WIPO, WTO), and in the makings of these treaties the users should be asked for their opinion. Of course, one of the problems of “asking the users” is how to find valid interlocutors. The website KeepTheWebOpen.com includes the feature of commenting on the OPEN Act.
8th Internet, Law and Politics Conference (2012)
By Ismael Peña-López (@ictlogist), 10 July 2012
Main categories: Cyberlaw, governance, rights, e-Government, e-Administration, Politics, Information Society, Meetings
Other tags: david_lindsay, idp, idp2012, lilian_mitrou, maria_dolores_palacios_gonzalez
No Comments »
Communications on the Right to Be Forgotten
Chairs: Mònica Vilasau. Lecturer, School of Law and Political Science (UOC).
The Emerging Right To Be Forgotten In Data Protection Law: Some Conceptual And Legal Problems.
David Lindsay, Associate Professor, Faculty of Law, Monash University, Melbourne (Australia).
When looking at privacy, we have to look before at identity. For instance identity formation in social networking sites or virtual worlds. In liquid societies it seems that we have to compulsory be creating and reinventing our identities. The problem is that what once was used for identity purposes in a given context, if data lasts forever this may pose a problem in the future, when the identity issue is no more relevant and/or the context has changed.
Thus, a right to be forgotten should be the first one of a new group of rights concerning privacy and personal data. Though technological based solutions may not be solutions at all, but social constructs/contracts is what we actually need.
El poder de autodeterminación de los datos personales en Internet.
María Dolores Palacios González, Profesora Titular de Derecho civil, Universidad de Oviedo.
The goal of Law is trying to find a balance between opposing interests.
In the case of personal data explicit consent should be the norm — with the appropriate exceptions when access to data is a necessity and does not go against fundamental rights.
There is a risk of censorship if there is an unbalance towards privacy, and a risk of inefficiency in guaranteeing privacy if there is an unbalance towards freedom of expression.
Naming and Shaming in Greece: Social Control, Law Enforcement and the Collateral Damages of Privacy and Dignity.
Lilian Mitrou, Associate Professor, Department Information and Communication Systems Engineering, University of the Aegean (Greece).
Naming as the disclosure, publication and dissemination of the identity of a person, who is convicted or suspected of crime or tax evasion. Shaming is a private emotional reaction, an individualized experience. A social process of purposefully expressing disapproval and/or contempt with the intention or effect of provoking embarrassment, discomfort, anger and fear.
In Greece it is legal to disclose the identities of sex offenders, and mandatory for tax evaders. This supposes a moral condemnation both of the offensive conduct and the offender, implying social sanctions and serious impacts on the ability of a person to engage in society. Indeed, there is a collision between shaming and presumption of innocence, as usually naming and shaming comes before guiltiness is proven.
There is no statistical or practical evidence that shaming is appropriate, necessary and reasonable in order to achieve deterrent of crime, but there does exist evidence that shaming makes much more difficult social reinsertion.
A right of oblivion comes to hand.
As personal blogs and social media in general are very difficult to target, the goal of regulation and right to forget policies should be search engines.
8th Internet, Law and Politics Conference (2012)