The Internet having become a human right should be coupled with the fundamental rights of choosing not to be connected and be disengaged with no data trail.
In September 2009, Bell Labs set a data transmission speed record at 100 petabits per second, equivalent to 100 billion megabits per second able to transmit 400 DVDs worth of data per second.
According to estimates by the international research firm, Gartner, “By 2020, there will be 25 billion of smart devices, transmitting tiny amounts of data to us, to the cloud and to each other.”
The Internet has grown out of independent networks into a global entity. It now serves as a platform for communication, business, entertainment, education and for many other means as data production, transmission and retention is increasing tremendously globally.
The Internet is just a few decades old, but in a short span of time it has experienced significant changes and presents us with exciting possibilities and questions.
How about the ‘Governance of the Internet’?
The more modern society depends on the Internet, the more crucial the issue of governance of the Internet becomes. The Internet has become a complex socio-technical system that has vested economic and political interests. Nation-states and societies are competing for the establishment of legal frameworks and public policy practices that preserve or expand national interests and social value systems.
Thus the governance of the Internet is no longer the only concern for government and corporates but for all those who use or do not use. Internet governance matters to all of us whether we are among the two billion who are using it or the next billion awaiting to be connected.
I had the opportunity to attend several Internet policy forums at regional and International level to realise that Internet Governance (IG) as a policy discussion and technical coordination of issues related to the exchange of information over the internet is moving increasingly into the public eye.
It is important to state that IG fora produce non-binding discourse as they do not lead to traditional policy outcomes in the form of treaties - which constitutes their main weakness. Nevertheless, the emphasis on open participation and the involvement of non-state actors in local, regional and global Internet policy debates may constitute its strength.
Internet governance for a enables the voices of the marginalised to be heard and conflicting corporates and humanitarian interests can find a compromise.
Attending these fora, among others, the protection of privacy and human rights has been one of my focal points and that of many civil society activists. From Africa to Latin America, human rights activists view Internet governance from the perspective of freedom of expression, privacy and other basic human rights.
This has made me realised that nowadays living in a modern connected society, influencing political and technical infrastructure of the Internet is influencing the civil liberties that are impacted or enacted by this technology.
How about the ‘Right to be Connected’?
It is important that principles of human rights and processes of Internet are equally balanced. A permanent dialogue between technical needs and rights of communities they impact on should be guaranteed in order to defend both human rights and a free and open Internet.
A United Nations report in 2011 has concluded that disconnecting people from the Internet is a human rights violation.
In its preamble, the African Declaration on Internet Rights and Freedoms emphasises that the Internet is an enabling space and resource for the realisation of all human rights, including the right to freedom of expression, the right of access to information, the right of freedom of assembly, the right to freedom of opinion, thought and belief, the right to be free from discrimination in all forms, the right to education, the right to culture and language, and the right of access to socio-economic services.
Access to the web is now a human right.
While I recognise how important the Internet is for the development of Africa, Africans and societies worldwide, I do think that we are sometimes moving too fast in overstating its relevancy or stature in people’s lives.
It is important to note that Internet access cannot be equally considered as a necessity in the day-to-day lives of all habitants of the planet earth and does not even come close to be considered a basic human right by some Americans.
For the vast majority of people living in the United States, Internet use is a given, an expectation, a norm. A Pew Research study reports that there is still a considerable portion of Americans who do not turn to the Internet at all, stating they have no interest in it, did not think it is relevant to their lives or it is too difficult to use.
This year, overall 15 percent of Americans exclude themselves from the Internet. Senior citizens made up a hefty portion of those who do not use the Internet. Thirty-nine percent of those 65 and older say they do not go online, compared with three percent of those ages 18 through 29, according to new data from Pew Research.
Based on location, culture or ethnicity factors: people in rural areas in the United States are around twice as likely as those in urban or suburban locales to never go online. In its latest research based on a series of three polls conducted this year, Pew found that around 20 percent of African Americans and 18 percent of Hispanics say they do not use the Internet, compared with 14 percent of whites and five percent of English-speaking Asian Americans.
Elsewhere, different circumstances still lead to the same realisation. In dense tropical forests in Central Africa and Amazon and in many remote areas, there are people who for generations have preserved their cultures and societies in balanced interaction with highly complex yet now vulnerable ecosystems. For centuries, these people have been marginalised on all fronts either on economic policy, global environmental policies or regional agreements. These communities have been victims to industrialisation, urbanisation and climate change. Now thinking that our modern value system is the best, there is a danger to using the Internet as a new tool of colonisation.
Despite the hype over new technologies, it is important that we come to the realisation that people can and do live without Internet access, and many lead very successful lives. That is a fundamental right to be respected.
Human rights are described as standards of behaviour that are inherent in every human being. They are the core principles underpinning human interaction in society. These include liberty, justice, freedom of religious beliefs and choice.
To me considering the Internet as a human right should also imply that people’s choice ‘Not-Be-Connected’ should be respected. Consequently, forcing them on the network or to use a given technology would overstep their right to culture and that to be free from discrimination at certain extent. In this case, legal recognition of cultural rights of forest-based peoples and remote communities is crucial to the fulfilment of their human rights.
Agree with me that you can live without the Internet. You just won't be part of today's society if you do. It seems to me that these individuals and ‘primitive’ societies still never wanted to be part of it.
How about the 'Right to be Forgotten'?
As the network evolves, Internet governance plays out as cultural politics in a debate about what values and core principles should be preserved.
Corporates in telecommunications and web firms are researching and deploying innovative technologies to provide wide Internet access via balloons and satellites. In a short while, those who could not afford broadband costs will be connected at no cost. Yet, free access does not always come with the freedom to disengage or the ability to erase data trail.
In 2014, a European court sided with a Spanish man attempting to have links to a negative story about him removed from the online search engine Google. Invoking a version of what is known as the ‘right to be forgotten’, the European Union Court of Justice ruled that citizens have the right to ask that links be removed if they contain information that is "inadequate, irrelevant or no longer relevant."
However, critics contend that such a sweeping new right is sure to have unintended consequences - for starters, by potentially depriving the public of useful information. There are also questions as to whether enforcing a right to be forgotten is even practical.
Few days ago, Google said no to French demand to expand right to be forgotten worldwide.
In conclusion, many major web firms are struggling to deal with the fall-outs of applying the same rights across a number of different nations. This clearly shows how the Internet is never been equal and will never be if all stakeholders are not forced to comply, in the ‘right to be forgotten’ case is the private sector whose argument of protecting public useful information hides purely financial strategies that clearly favour corporations needs over individuals or users fundamental rights.
Technological inventions and Internet processes have outgrown national legislations. Having said that, on one hand governments need to play their primary role of enforcing regulations as well as providing infrastructure for economic growth and welfare of its citizens. On the other hand, civil society should lobby and participate in global policy making to uphold rights of citizen over the ever growing influence of the Internet economy in society and multinational corporations. Coordination, strong action and engagement are needed from all stakeholders to ensure that the Internet as a human right is more than just a declaration, and sustainable development needs are in line with the respect of fundamental rights.
Tell me if you disagree. Leave me a comment or a DM on Twitter: @Adam_McKendi
My article was published on the NGO Pulse portal - www.ngopulse.org
Showing posts with label human rights. Show all posts
Showing posts with label human rights. Show all posts
Wednesday, August 5, 2015
Thursday, October 11, 2012
Internet Security – Privacy Is the Exception
"Just because you are not paranoid it does not mean they are not out to get you" - Jacob Appelbaum.
Please let us know - should you have used any of the above tools.
Mobile phones and the Internet allow us to communicate instantly, stay abreast of current events and search for and find information on nearly anything. Telecommunication tools have made us social animals to an extent that we have become insensitive to privacy and carelessly exposed.
The Internet has become indispensable. The question is how should we use it?
I had the opportunity to attend a presentation by Jacob Appelbaum, an independent computer security researcher and hacker. Jacob has worked with Wikileaks and many other avant-guardists IT projects. Jacob’s Wiki is one of the few with a category titled: ‘Investigation and detainment’. I was fascinated to hear that he knows, he’s a ‘suspect’ and permanently under surveillance by security services because of his choice to protect his privacy and that of other human right activists.
Listening to questions during the presentation made me think that some human rights and social activists in Africa may be today in jail because they ignored threats to their privacy and to those involved in their projects. Therefore, it is important civil society members working or training on citizen journalism, social media or human rights advocacy take in consideration security of their members and provide them with alternative tools.
Long story short - allow be to present you some facts before sharing with you a number of tools that we can use to protect our self and those we are communicating with:
- We all leave a data trail every time we log into the Internet
- State run telecommunication monopoly provides State with possibility to intercept communication (Waffle Interception which still passive in many African countries)
- Powerhouse telecommunication companies do sell interceptive devices to oppressive regimes. These Support Contracts must be considered as human right violation
- Any document you send via e-mail is lost, out of your control
- Wireless connections in public places or hotels are just as insecure as tablets and smartphone
- Whoever owns and carries a mobile phone has become a traceable object. The smarter the phone the more data we give away. The truth is iPhone and tablets’ users are more vulnerable understood that these devices can store data about the user without his consent or knowledge
- Privacy include your location, relations, hobbies and communications
- We all have something to hide. Today Internet is saying we must share everything. Privacy has become suspicious.
- Whoever abstains to use a mobile phone or to create a Facebook profile is a ‘suspect’. Privacy is longer the norm but the exception
- New surveillance by government and commercial entities is a threat to society
- ‘Behaviour profiling’ by Google and Amazon can be consider as breach of privacy. How they can read your mind? As we have become dependent of technology – breach of privacy has become moral because it cannot be avoided
- Facebook had complied to US federal law and has provided the US government with data on millions of its users. Now Facebook to data ‘Chat’. Some researches prove a relation between the increase in arrest warrant by police in the USA and provision of users personal data to US intelligence by social media platforms and telecommunication companies
<>If we remove the ability to be identify, we remove the ability to be a target
<>We cannot hide completely but we can use tools that buy us and others time
1. ToR browser is a traffic analysis privacy with secure backup use by human rights activist worldwide
When you use a Tor client, your Internet traffic is routed through Tor’s network. The traffic travels through several randomly selected relays (run by volunteers), before exiting the Tor network and arriving at your destination. This prevents your Internet service provider and people monitoring your local network from viewing the websites you access. It also prevents the websites themselves from knowing your physical location or IP address – they’ll see the IP address and location of the exit node instead. Even the relays don’t know who requested the traffic they’re passing along. All traffic within the Tor network is encrypted.
Tor strength is on using it to download Martus and then, use them together for greater protection.
2. Martus is an open-source technology tool that assists nongovernmental organizations (NGOs) collect information on human rights abuses. Martus cannot recover your data should you lose you log in. Martus and Tor are the most use tools but activists worldwide to protect their messages, browsing, location and identity. Tor and Martus are runned by volunteers.
3. Off The Record (OTR) OTR messaging allows you to have private conversations over instant messaging by providing: Encryption (No one else can read your instant messages); Authentication (You are assured the correspondent is who you think it is); Deniability (The messages you send do not have digital signatures that are checkable by a third party. The messages are authentic and unmodified); Perfect forward secrecy (If you lose control of your private keys, no previous conversation is compromised)
4. Red Phone provides end-to-end encryption for your calls, securing your conversations so that nobody can listen in. - Easy to use available for Google and iPhone.
5. Private GSM provides end-to-end encryption for your message/chat. Available on iPhone.
6. Ostel promotes the use of free, open protocols, standards and software, to power end-to-end secure voice communications on mobile devices, as well as with desktop computers.
7. Gibberbot is a secure chat client capable of firewall and filter circumvention, surveillance blocking and end-to-end encryption. Available for Android phones.
8. Text Secure is a security enhanced text messaging application that serves as a full replacement for the default text messaging application. Available for android phones.
9. Crabgrass is software libre web application designed for social networking, group collaboration and network organizing.
Always remember the followings:
- We are not told the whole truth about platform and social media applications we are using.
- There is privacy by policy and privacy by design. Most telecommunication and Internet platforms show what their policy/T&Cs say but not what their design do. Never trust privacy by policy – if you can, verify their codes to see if they don’t do more than what they say
- Any device/app that can help you access/recover your data when you have lost your password - has total access to your data. Dropbox has become very popular. The fact that it can help you recover your data means it is not 100% secured.
"Internet insecurity is like HIV – none of us is immune. We all need to use ‘active’ protection" says Jacob Appelbaum.
Please let us know - should you have used any of the above tools.
Subscribe to:
Posts (Atom)