<div dir="ltr"><div class="gmail_quote">Of likely interest. </div><div class="gmail_quote">Best,</div><div class="gmail_quote">Rebecca<br><br><u></u>


        
        
        
        


<div style="direction:ltr;background:#ddd;font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;font-size:14px;color:#666;text-align:center;margin:0;padding:0">

<table border="0" cellspacing="0" cellpadding="0" bgcolor="#DDDDDD" style="width:100%;background:#dddddd">
        <tbody><tr>
                <td>
                                        <span style="display:none!important">
                                Rebecca MacKinnon posted: "Yesterday I testified at a hearing titled The Evolution of Terrorist Propaganda: The Paris Attack and Social Media convened by the House Foreign Affairs Committee's Subcommittee on Terrorism, Nonproliferation, and Trade. I am not a counter-terrorism exper"                       </span>
                                                <table border="0" cellspacing="0" cellpadding="0" align="center" style="width:100%;padding:10px">
                                <tbody><tr>
                                        <td>
                                                                                                <div style="direction:ltr;max-width:600px;margin:0 auto;overflow:hidden">
                                                        <table border="0" cellspacing="0" cellpadding="0" bgcolor="#ffffff" style="width:100%;background-color:#fff;text-align:left;max-width:1024px;min-width:320px;margin:0 auto">
                                                                <tbody><tr>
                                                                        <td>
                                                                                <table border="0" cellspacing="0" cellpadding="0" height="8" background="http:/s.wordpress.com/i/emails/stripes.gif" style="width:100%;background-image:url(https://ci3.googleusercontent.com/proxy/11QcDxZcDODA8_Zy6SheBzPAnUnq2Wex4YU4AtNFw2U6vkJK-SLbfLrNelvLLXsXQrjcZHdV7FIOlsp_glV2LA=s0-d-e1-ft#http:/s.wordpress.com/i/emails/stripes.gif);background-repeat:repeat-x;background-color:#43a4d0;height:8px">
                                                                                        <tbody><tr>
                                                                                                <td></td>
                                                                                        </tr>
                                                                                </tbody></table>

                                                                                <table border="0" cellspacing="0" cellpadding="0" style="width:100%;color:#08c;font-size:1.6em;background-color:#efefef;border-bottom:1px solid #ddd;margin:0;padding:0">
                                                                                        <tbody><tr>
                                                                                                <td>
                                                                                                        <h2 style="margin:.4em 0 .3em;font-size:1.8em;font-size:16px!important;line-height:1;font-weight:400;color:#464646;font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;margin:5px 20px!important;padding:0">
                                                                                                                New post on <strong>Consent of the Networked</strong>                                                                                                       </h2>
                                                                                                </td>
                                                                                                <td style="text-align:right">
                                                                                                        <img border="0" src="http://s.wordpress.com/i/emails/blavatar-default.png" alt="" style="vertical-align:middle;margin:5px 20px 5px 0;vertical-align:middle">
                                                                                                </td>
                                                                                        </tr>
                                                                                </tbody></table>

                                                                                <table style="width:100%" border="0" cellspacing="0" cellpadding="20" bgcolor="#ffffff">
                                                                                        <tbody><tr>
                                                                                                <td>
                                                                                                        <table style="width:100%" border="0" cellspacing="0" cellpadding="0">
                                                                                                                <tbody><tr>
                                                                                                                        <td valign="top">
                                                                                                                                                                                                                                                                        <table style="width:100%" border="0" cellspacing="0" cellpadding="0">
                                                                                                                                                <tbody><tr>
                                                                                                                                                        <td style="width:60px!important;white-space:nowrap;vertical-align:top">
                                                                                                                                                                <a href="http://consentofthenetworked.com/author/rebeccamackinnon/" style="text-decoration:underline;color:#2585b2;display:block;margin-right:10px" target="_blank"><img border="0" alt="" src="http://2.gravatar.com/avatar/2ab1030dbabe8b130b863864b376ffba?s=50&d=identicon&r=G" height="50" width="50"></a>
                                                                                                                                                        </td>
                                                                                                                                                        <td>
                                                                                                                                                                <h2 style="margin:.4em 0 .3em;font-size:1.8em;font-size:1.6em;color:#555;margin:0;font-size:20px"><a href="http://consentofthenetworked.com/2015/01/28/house-hearing-terror-social-media/" style="text-decoration:underline;color:#2585b2;text-decoration:none!important" target="_blank">How not to kill the Internet when fighting terror</a></h2>
                                                                                                                                                                <span style="color:#888">by <a href="http://consentofthenetworked.com/author/rebeccamackinnon/" style="text-decoration:underline;color:#2585b2;color:#888!important" target="_blank">Rebecca MacKinnon</a></span>
                                                                                                                                                        </td>
                                                                                                                                                </tr>
                                                                                                                                        </tbody></table>
                                                                                                                                
                                                                                                                                <div style="direction:ltr;margin-top:1em;max-width:560px">
                                                                                                                                                                                                                                                                                        <p style="direction:ltr;font-size:14px;line-height:1.4em;color:#444;font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;margin:0 0 1em">Yesterday I testified at a hearing titled <a style="text-decoration:underline;color:#2585b2" href="http://docs.house.gov/Committee/Calendar/ByEvent.aspx?EventID=102855" target="_blank">The Evolution of Terrorist Propaganda: The Paris Attack and Social Media</a> convened by the House Foreign Affairs Committee's Subcommittee on Terrorism, Nonproliferation, and Trade. I am not a counter-terrorism expert but I do have a few things to say about how not to destroy the Internet and violate users' right to freedom of expression and privacy. Below is my five-minute oral testimony as delivered, with links added. A pdf of my more detailed written testimony, along testimony of all other speakers can be found <a style="text-decoration:underline;color:#2585b2" href="http://docs.house.gov/Committee/Calendar/ByEvent.aspx?EventID=102855" target="_blank">here</a>. Video is <a style="text-decoration:underline;color:#2585b2" href="http://www.ustream.tv/recorded/58095566?utm_campaign=t.co&utm_source=ustre.am/:3VLjg&utm_medium=social&utm_content=20150128140018" target="_blank">here</a>.</p>
<blockquote style="font-family:Times,serif;font-size:1.1em;font-style:italic;color:#878787;border-left:3px solid #ccc;padding-left:1em;margin:1em 1em 1em 2em"><p style="direction:ltr;font-size:14px;line-height:1.4em;color:#444;font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;margin:0 0 1em">How do we fight terrorism and violent extremism in the Internet age while not undermining the core principles and freedoms of democratic and open societies?</p>
<p style="direction:ltr;font-size:14px;line-height:1.4em;color:#444;font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;margin:0 0 1em">Terrorists are not the only people who are using social media powerfully and effectively. Yesterday I returned from the Philippines where I participated in a <a style="text-decoration:underline;color:#2585b2" href="http://summit2015.globalvoicesonline.org/" target="_blank">conference</a> of <a style="text-decoration:underline;color:#2585b2" href="http://globalvoicesonline.org/" target="_blank">bloggers, activists, and citizen journalists</a> from all over the world. People who believe in freedom of expression, the open Internet, and multicultural tolerance. Many people connected to this community face serious threats of censorship and <a style="text-decoration:underline;color:#2585b2" href="http://advocacy.globalvoicesonline.org/2015/01/24/global-voices-calls-for-immediate-release-of-jailed-online-media-workers-and-activists/" target="_blank">imprisonment</a> when they write about subjects or advocate policy positions that their governments find threatening. In countries like <a style="text-decoration:underline;color:#2585b2" href="http://www.voanews.com/content/court-adjourns-ethiopian-blogger-trial-15-times/2586428.html%20" target="_blank">Ethiopia</a>, <a style="text-decoration:underline;color:#2585b2" href="https://cpj.org/blog/2014/07/russia-intensifies-restrictions-on-blogs-social-me.php" target="_blank">Russia</a>, Turkey, <a style="text-decoration:underline;color:#2585b2" href="http://www.poynter.org/news/mediawire/250100/mediawireworld-3-journalists-in-egyptian-court-on-world-press-freedom-day/%20" target="_blank">Egypt</a>, <a style="text-decoration:underline;color:#2585b2" href="http://www.amnesty.org/en/for-media/press-releases/morocco-stop-using-terrorism-pretext-imprison-journalists-2014-05-20%20" target="_blank">Morocco</a>, China and elsewhere some have even been <a style="text-decoration:underline;color:#2585b2" href="http://cpj.org/2013/02/attacks-on-the-press-misusing-terror-laws.php%20" target="_blank">charged under broad anti-terror laws</a> that are habitually used as tools to keep incumbent regimes in power.</p>
<p style="direction:ltr;font-size:14px;line-height:1.4em;color:#444;font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;margin:0 0 1em">In response to the tragic massacre in Paris, the French government <a style="text-decoration:underline;color:#2585b2" href="http://www.reuters.com/article/2015/01/22/us-france-security-internet-idUSKBN0KV2EK20150122%20" target="_blank">has called</a> for UN member states to work together on an international legal framework that would place greater responsibility on social networks and other Internet platforms for terrorist use of their services. In addressing the problem of terrorist use of social networking platforms, the United States should adhere to the following principles:</p>
<p style="direction:ltr;font-size:14px;line-height:1.4em;color:#444;font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;margin:0 0 1em"><strong>First, multi-stakeholder policymaking.</strong> The US opposes UN control over Internet governance because many UN member states advocate policies that would make the Internet much less free and open. Instead the US <a style="text-decoration:underline;color:#2585b2" href="http://www.commerce.gov/news/secretary-speeches/2014/10/13/us-secretary-commerce-penny-pritzker-delivers-remarks-internet-co" target="_blank">supports a multi-stakeholder approac</a>h that includes industry, civil society, and the technical community alongside governments in setting policies and technical standards that ensure that the Internet functions globally. In constructing global responses to terrorist use of the Internet we need a multi-stakeholder approach for the same reasons.</p>
<p style="direction:ltr;font-size:14px;line-height:1.4em;color:#444;font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;margin:0 0 1em"><strong>Second, </strong>any national level laws, regulations, or policies aimed at regulating or policing online activities should undergo a<strong> human rights risk assessment process to identify potential negative repercussions for freedom of expression, assembly and privacy</strong>. Governments need to be transparent with the public about the nature and volume of requests being made to companies. Companies need to be able to uphold core principles of freedom of expression and privacy, grounded in international human rights standards. Several major US-based Internet companies have made <a style="text-decoration:underline;color:#2585b2" href="https://globalnetworkinitiative.org//principles/index.php" target="_blank">commitments</a> to uphold these rights as members of the multi-stakeholder Global Network Initiative. <a style="text-decoration:underline;color:#2585b2" href="https://globalnetworkinitiative.org//implementationguidelines/index.php%20" target="_blank">Guidelines</a> for implementing these commitments include: narrowly interpreting government demands to restrict content or grant access to user data or communications; challenging government requests that lack a clear user basis; transparency with users about the types of government requests received and the extent to which the company complies; restricting compliance to the online domains over which the requesting government actually has jurisdiction.</p>
<p style="direction:ltr;font-size:14px;line-height:1.4em;color:#444;font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;margin:0 0 1em"><strong>Third, liability for Internet intermediaries</strong> including social networks for users’ behavior<strong><a style="text-decoration:underline;color:#2585b2" href="https://cdt.org/files/pdfs/CDT-Intermediary-Liability-2012.pdf" target="_blank"> must be kept limited</a>.</strong> Research <a style="text-decoration:underline;color:#2585b2" href="http://unesdoc.unesco.org/images/0023/002311/231162e.pdf" target="_blank">conducted around the world</a> by human rights experts and legal scholars shows <a style="text-decoration:underline;color:#2585b2" href="https://globalnetworkinitiative.org//sites/default/files/Closing%20the%20Gap%20-%20Copenhagen%20Economics_March%202014_0.pdf" target="_blank">clear evidence</a> that when companies are held liable for users’ speech and activity, violations of free expression and privacy can be expected to occur. Limited liability for Internet companies is an <a style="text-decoration:underline;color:#2585b2" href="http://www.apc.org/en/irhr/i-freedom-nz/intermediary-liability" target="_blank">important prerequisite</a> for keeping the Internet open and free.</p>
<p style="direction:ltr;font-size:14px;line-height:1.4em;color:#444;font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;margin:0 0 1em"><strong>Fourth, </strong>development and enforcement of companies’<strong> Terms of Service and other forms of private policing must also undergo human rights risk assessments.</strong> Any new procedures developed by companies to eliminate terrorist activity from their platforms must be accompanied by engagement with key affected stakeholders and at-risk groups.</p>
<p style="direction:ltr;font-size:14px;line-height:1.4em;color:#444;font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;margin:0 0 1em"><strong>Fifth, </strong>in order to prevent abuse and maintain public support for the measures taken, governments as well as companies must provide<strong> effective, accessible channels for grievance and remedy for people whose rights to free expression, assembly, and privacy have been violated.</strong> Thank you for listening and I look forward to your questions.</p>
</blockquote>
<p style="direction:ltr;font-size:14px;line-height:1.4em;color:#444;font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;margin:0 0 1em">The above recommendations were informed by my <a style="text-decoration:underline;color:#2585b2" href="http://consentofthenetworked.com/" target="_blank">years</a> of work on Internet free expression and privacy issues, the Global Network Initiative's <a style="text-decoration:underline;color:#2585b2" href="https://globalnetworkinitiative.org//principles/index.php" target="_blank">principles</a> and <a style="text-decoration:underline;color:#2585b2" href="https://globalnetworkinitiative.org//implementationguidelines/index.php%20" target="_blank">implementation guidelines</a>, standards for Internet and other ICT sector companies currently under development by the <a style="text-decoration:underline;color:#2585b2" href="http://rankingdigitalrights.org/" target="_blank">Ranking Digital Rights</a> project, and a new report published by UNESCO titled <a style="text-decoration:underline;color:#2585b2" href="http://unesdoc.unesco.org/images/0023/002311/231162e.pdf" target="_blank">Fostering Freedom Online: The Role of Internet Intermediaries</a>.</p>
<p style="direction:ltr;font-size:14px;line-height:1.4em;color:#444;font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;margin:0 0 1em">In the Q&A session, in response to a question about why companies don't do a better job of working with the government and others to take down terrorist speech, I tried to remind the committee that we have a bit of a trust deficit between Silicon Valley and the national security community these days. In the wake of Edward Snowden's surveillance revelations, U.S. companies are already under fire for how NSA has used them for surveillance. The lack of trust, accountability and transparency about the relationship between Internet companies and the US government is a barrier to constructive dialogue. If I'd had more time to comment, I would have suggested that <a style="text-decoration:underline;color:#2585b2" href="https://www.eff.org/deeplinks/2015/01/effs-game-plan-ending-global-mass-surveillance#add" target="_blank">an overhaul of this country's surveillance laws</a> might be a good place to start in building trust between companies, government, and Internet users. Calling for back doors and <a style="text-decoration:underline;color:#2585b2" href="http://www.theguardian.com/us-news/2014/oct/16/fbi-director-attacks-tech-companies-encryption" target="_blank">opposing encryption</a> doesn't help either.</p>
<p style="direction:ltr;font-size:14px;line-height:1.4em;color:#444;font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;margin:0 0 1em">Here is the full video:</p>
<div style="direction:ltr;clear:both"></div>                                                                                                                                                                                                                                                                      </div>

                                                                                                                                                                                                                                                                        <div style="direction:ltr;color:#999;font-size:.9em;margin-top:4px;line-height:160%;padding:15px 0 15px;border-top:1px solid #eee;border-bottom:1px solid #eee;overflow:hidden">
                                                                                                                                                <strong><a style="text-decoration:underline;color:#2585b2" href="http://consentofthenetworked.com/author/rebeccamackinnon/" target="_blank">Rebecca MacKinnon</a></strong> | January 28, 2015 at 5:49 pm | Categories: <a style="text-decoration:underline;color:#2585b2" href="http://consentofthenetworked.com/?cat=366160" target="_blank">Globalvoices</a>, <a style="text-decoration:underline;color:#2585b2" href="http://consentofthenetworked.com/?cat=243431321" target="_blank">Ranking Digital Rights</a>, <a style="text-decoration:underline;color:#2585b2" href="http://consentofthenetworked.com/?cat=39484" target="_blank">Speaking</a>, <a style="text-decoration:underline;color:#2585b2" href="http://consentofthenetworked.com/?cat=412" target="_blank">Video</a>
 | URL: <a style="text-decoration:underline;color:#2585b2" href="http://wp.me/p1MwtA-bK" target="_blank">http://wp.me/p1MwtA-bK</a>                                                                                                                                   </div>
                                                                                                                                
                                                                                                                                                                                                                                                </td>
                                                                                                                </tr>
                                                                                                        </tbody></table>
                                                                                                </td>
                                                                                        </tr>
                                                                                </tbody></table>

                                                                                <table border="0" cellspacing="0" cellpadding="20" bgcolor="#efefef" style="width:100%;background-color:#efefef;text-align:left;border-top:1px solid #ddd">
                                                                                        <tbody><tr>
                                                                                                <td style="border-top:1px solid #f3f3f3;color:#888;font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;font-size:14px;background:#efefef">
                                                                                                        <p style="direction:ltr;font-size:14px;line-height:1.4em;color:#444;font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;margin:0 0 1em;font-size:12px;line-height:1.4em;margin:0px 0px 10px 0px">
                                                                                                                <a style="text-decoration:underline;color:#2585b2" href="https://subscribe.wordpress.com/?key=a24955d177de07b83ae459e5982a99e4&email=rmackinnon%40post.harvard.edu&b=0f%3FCQF%25J%7Cg3JaS7qtq7nfJGYq17gF.OyuUjmi%5Bv5Bjg%5Bw_sbU" target="_blank">Unsubscribe</a> to no longer receive posts from Consent of the Networked.<br>
                                                                                                                Change your email settings at <a style="text-decoration:underline;color:#2585b2" href="https://subscribe.wordpress.com/?key=a24955d177de07b83ae459e5982a99e4&email=rmackinnon%40post.harvard.edu" target="_blank">Manage Subscriptions</a>.                                                                                                       </p>

                                                                                                        <p style="direction:ltr;font-size:14px;line-height:1.4em;color:#444;font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;margin:0 0 1em;font-size:12px;line-height:1.4em;margin:0px 0px 0px 0px">
                                                                                                                <strong>Trouble clicking?</strong> Copy and paste this URL into your browser: <br>
                                                                                                                <a style="text-decoration:underline;color:#2585b2" href="http://consentofthenetworked.com/2015/01/28/house-hearing-terror-social-media/" target="_blank">http://consentofthenetworked.com/2015/01/28/house-hearing-terror-social-media/</a>
                                                                                                        </p>
                                                                                                </td>
                                                                                        </tr>
                                                                                </tbody></table>
                                                                        </td>
                                                                </tr>
                                                        </tbody></table>

                                                        <table border="0" cellspacing="0" cellpadding="0" height="3" background="http:/s.wordpress.com/i/emails/stripes.gif" style="width:100%;background-image:url(https://ci4.googleusercontent.com/proxy/JIHX4GezYXGnKizvkzStNW7awp7NoFX6h7tmMdSNg1ZFjWFPDEminceGC_k31RcxOWogKeXEyymZIqoAnG9uaNM=s0-d-e1-ft#http://s.wordpress.com/i/emails/stripes.gif);background-repeat:repeat-x;background-color:#43a4d0;height:3px">
                                                                <tbody><tr>
                                                                        <td></td>
                                                                </tr>
                                                        </tbody></table>
                                                </div>
                                        </td>
                                </tr>
                        </tbody></table>

                        
                                <table width="100%" border="0" cellspacing="0" cellpadding="0" align="center" style="width:100%;padding-bottom:2em;color:#555;font-size:12px;height:18px;text-align:center;font-family:"Helvetica Neue",Helvetica,Arial,sans-serif">
                                        <tbody><tr>
                                                <td align="center">
                                                <a href="http://wordpress.com" style="text-decoration:underline;color:#2585b2;font-size:14px;color:#555!important;text-decoration:none;font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;color:#555!important;font-size:14px;text-decoration:none" target="_blank">Thanks for flying with <img border="0" src="http://s.wordpress.com/i/emails/wp-footericon.png" alt="" style="vertical-align:middle" width="16" height="17"> WordPress.com</a>                                            </td>
                                        </tr>
                                </tbody></table>

                        
                        <br>
                </td>
        </tr>
</tbody></table>

<img alt="" border="0" src="http://pixel.wp.com/b.gif?host=consentofthenetworked.wordpress.com&blog=26340922&post=728&subd=consentofthenetworked&ref=&email=1&email_o=wpcom" width="1" height="1"></div>


</div><br><br clear="all"><div><br></div>-- <br><div class="gmail_signature"><div dir="ltr"><div><span style="font-size:small">Rebecca MacKinnon</span><br style="font-size:small"><span style="font-size:small">Director, </span><a href="http://rankingdigitalrights.org/" style="color:rgb(17,85,204);font-size:small" target="_blank">Ranking Digital Rights</a><span style="font-size:small"> @ New America</span><br style="font-size:small"><span style="font-size:small">Author, </span><a href="http://consentofthenetworked.com/" style="color:rgb(17,85,204);font-size:small" target="_blank">Consent of the Networked</a><span style="font-size:small"> </span><br style="font-size:small"><span style="font-size:small">Co-founder, </span><a href="http://globalvoicesonline.org/" style="color:rgb(17,85,204);font-size:small" target="_blank">Global Voices</a><br style="font-size:small"><span style="font-size:small">Twitter: @rmack</span><br style="font-size:small"><span style="font-size:small">Office: +1-202-596-3343</span><br></div></div></div>
</div>