Skip to main content

Home/ Future of the Web/ Group items tagged UN

Rss Feed Group items tagged

Paul Merrell

UN Report Finds Mass Surveillance Violates International Treaties and Privacy Rights - ... - 0 views

  • The United Nations’ top official for counter-terrorism and human rights (known as the “Special Rapporteur”) issued a formal report to the U.N. General Assembly today that condemns mass electronic surveillance as a clear violation of core privacy rights guaranteed by multiple treaties and conventions. “The hard truth is that the use of mass surveillance technology effectively does away with the right to privacy of communications on the Internet altogether,” the report concluded. Central to the Rapporteur’s findings is the distinction between “targeted surveillance” — which “depend[s] upon the existence of prior suspicion of the targeted individual or organization” — and “mass surveillance,” whereby “states with high levels of Internet penetration can [] gain access to the telephone and e-mail content of an effectively unlimited number of users and maintain an overview of Internet activity associated with particular websites.” In a system of “mass surveillance,” the report explained, “all of this is possible without any prior suspicion related to a specific individual or organization. The communications of literally every Internet user are potentially open for inspection by intelligence and law enforcement agencies in the States concerned.”
  • Mass surveillance thus “amounts to a systematic interference with the right to respect for the privacy of communications,” it declared. As a result, “it is incompatible with existing concepts of privacy for States to collect all communications or metadata all the time indiscriminately.” In concluding that mass surveillance impinges core privacy rights, the report was primarily focused on the International Covenant on Civil and Political Rights, a treaty enacted by the General Assembly in 1966, to which all of the members of the “Five Eyes” alliance are signatories. The U.S. ratified the treaty in 1992, albeit with various reservations that allowed for the continuation of the death penalty and which rendered its domestic law supreme. With the exception of the U.S.’s Persian Gulf allies (Saudi Arabia, UAE and Qatar), virtually every major country has signed the treaty. Article 17 of the Covenant guarantees the right of privacy, the defining protection of which, the report explained, is “that individuals have the right to share information and ideas with one another without interference by the State, secure in the knowledge that their communication will reach and be read by the intended recipients alone.”
  • The report’s key conclusion is that this core right is impinged by mass surveillance programs: “Bulk access technology is indiscriminately corrosive of online privacy and impinges on the very essence of the right guaranteed by article 17. In the absence of a formal derogation from States’ obligations under the Covenant, these programs pose a direct and ongoing challenge to an established norm of international law.” The report recognized that protecting citizens from terrorism attacks is a vital duty of every state, and that the right of privacy is not absolute, as it can be compromised when doing so is “necessary” to serve “compelling” purposes. It noted: “There may be a compelling counter-terrorism justification for the radical re-evaluation of Internet privacy rights that these practices necessitate. ” But the report was adamant that no such justifications have ever been demonstrated by any member state using mass surveillance: “The States engaging in mass surveillance have so far failed to provide a detailed and evidence-based public justification for its necessity, and almost no States have enacted explicit domestic legislation to authorize its use.”
  • ...5 more annotations...
  • Instead, explained the Rapporteur, states have relied on vague claims whose validity cannot be assessed because of the secrecy behind which these programs are hidden: “The arguments in favor of a complete abrogation of the right to privacy on the Internet have not been made publicly by the States concerned or subjected to informed scrutiny and debate.” About the ongoing secrecy surrounding the programs, the report explained that “states deploying this technology retain a monopoly of information about its impact,” which is “a form of conceptual censorship … that precludes informed debate.” A June report from the High Commissioner for Human Rights similarly noted “the disturbing lack of governmental transparency associated with surveillance policies, laws and practices, which hinders any effort to assess their coherence with international human rights law and to ensure accountability.” The rejection of the “terrorism” justification for mass surveillance as devoid of evidence echoes virtually every other formal investigation into these programs. A federal judge last December found that the U.S. Government was unable to “cite a single case in which analysis of the NSA’s bulk metadata collection actually stopped an imminent terrorist attack.” Later that month, President Obama’s own Review Group on Intelligence and Communications Technologies concluded that mass surveillance “was not essential to preventing attacks” and information used to detect plots “could readily have been obtained in a timely manner using conventional [court] orders.”
  • Three Democratic Senators on the Senate Intelligence Committee wrote in The New York Times that “the usefulness of the bulk collection program has been greatly exaggerated” and “we have yet to see any proof that it provides real, unique value in protecting national security.” A study by the centrist New America Foundation found that mass metadata collection “has had no discernible impact on preventing acts of terrorism” and, where plots were disrupted, “traditional law enforcement and investigative methods provided the tip or evidence to initiate the case.” It labeled the NSA’s claims to the contrary as “overblown and even misleading.” While worthless in counter-terrorism policies, the UN report warned that allowing mass surveillance to persist with no transparency creates “an ever present danger of ‘purpose creep,’ by which measures justified on counter-terrorism grounds are made available for use by public authorities for much less weighty public interest purposes.” Citing the UK as one example, the report warned that, already, “a wide range of public bodies have access to communications data, for a wide variety of purposes, often without judicial authorization or meaningful independent oversight.”
  • The report was most scathing in its rejection of a key argument often made by American defenders of the NSA: that mass surveillance is justified because Americans are given special protections (the requirement of a FISA court order for targeted surveillance) which non-Americans (95% of the world) do not enjoy. Not only does this scheme fail to render mass surveillance legal, but it itself constitutes a separate violation of international treaties (emphasis added): The Special Rapporteur concurs with the High Commissioner for Human Rights that where States penetrate infrastructure located outside their territorial jurisdiction, they remain bound by their obligations under the Covenant. Moreover, article 26 of the Covenant prohibits discrimination on grounds of, inter alia, nationality and citizenship. The Special Rapporteur thus considers that States are legally obliged to afford the same privacy protection for nationals and non-nationals and for those within and outside their jurisdiction. Asymmetrical privacy protection regimes are a clear violation of the requirements of the Covenant.
  • That principle — that the right of internet privacy belongs to all individuals, not just Americans — was invoked by NSA whistleblower Edward Snowden when he explained in a June, 2013 interview at The Guardian why he disclosed documents showing global surveillance rather than just the surveillance of Americans: “More fundamentally, the ‘US Persons’ protection in general is a distraction from the power and danger of this system. Suspicionless surveillance does not become okay simply because it’s only victimizing 95% of the world instead of 100%.” The U.N. Rapporteur was clear that these systematic privacy violations are the result of a union between governments and tech corporations: “States increasingly rely on the private sector to facilitate digital surveillance. This is not confined to the enactment of mandatory data retention legislation. Corporates [sic] have also been directly complicit in operationalizing bulk access technology through the design of communications infrastructure that facilitates mass surveillance. ”
  • The latest finding adds to the growing number of international formal rulings that the mass surveillance programs of the U.S. and its partners are illegal. In January, the European parliament’s civil liberties committee condemned such programs in “the strongest possible terms.” In April, the European Court of Justice ruled that European legislation on data retention contravened EU privacy rights. A top secret memo from the GCHQ, published last year by The Guardian, explicitly stated that one key reason for concealing these programs was fear of a “damaging public debate” and specifically “legal challenges against the current regime.” The report ended with a call for far greater transparency along with new protections for privacy in the digital age. Continuation of the status quo, it warned, imposes “a risk that systematic interference with the security of digital communications will continue to proliferate without any serious consideration being given to the implications of the wholesale abandonment of the right to online privacy.” The urgency of these reforms is underscored, explained the Rapporteur, by a conclusion of the United States Privacy and Civil Liberties Oversight Board that “permitting the government to routinely collect the calling records of the entire nation fundamentally shifts the balance of power between the state and its citizens.”
Gonzalo San Gil, PhD.

¿Pagaré o cierran mi web?: 4 claves para diferenciar Canon AEDE y Comisión Sinde - 0 views

  •  
    "La aprobación de una reforma de la Ley de Propiedad Intelectual que incluye el pago de un canon por parte de editores y agregadores ha ocasionado muchas dudas entre empresas de internet y usuarios, y en no pocas ocasiones se mezclan algunos conceptos ¿Pueden cerrar mi web si enlazo a un medio de información? ¿Pueden bloquear a un agregador donde haya enlaces a noticias? ¿Qué pasa con las webs de enlaces? Carlos Almeida, abogado, aclara conceptos y nos explica cuál es el alcance de la Ley de Propiedad Intelectual Carlos Sánchez Almeida Follow @bufetalmeida - Barcelona"
Gonzalo San Gil, PhD.

Just in time for the Holidays: UN Approves Privacy Resolution in Major Victory for Huma... - 1 views

  •  
    [10:21am | 19 December 2014 | by Deji Olukotun, Peter Micek] "The UN General Assembly formally approved a major resolution on the right to privacy yesterday, by consensus. The resolution spotlights the privacy violations that are enabled by advances in technology, overbearing government surveillance, and corporate complicity. "
  •  
    [10:21am | 19 December 2014 | by Deji Olukotun, Peter Micek] "The UN General Assembly formally approved a major resolution on the right to privacy yesterday, by consensus. The resolution spotlights the privacy violations that are enabled by advances in technology, overbearing government surveillance, and corporate complicity. "
Gonzalo San Gil, PhD.

Copyright: Los derechos humanos como punto de partida - ONG Derechos Digitales - 0 views

  •  
    "¿Desde dónde partimos para construir un modelo de derecho de autor balanceado, que otorgue incentivos para crear y garantías de acceso para el público? Hay a lo menos cuatro principios que se desprenden de declaraciones conjuntas de relatores de libertad de expresión a nivel mundial que nos ayudan a concebir un modelo respetuoso con los derechos humanos."
  •  
    "¿Desde dónde partimos para construir un modelo de derecho de autor balanceado, que otorgue incentivos para crear y garantías de acceso para el público? Hay a lo menos cuatro principios que se desprenden de declaraciones conjuntas de relatores de libertad de expresión a nivel mundial que nos ayudan a concebir un modelo respetuoso con los derechos humanos."
Gonzalo San Gil, PhD.

Un mes después del cierre de Google News, el canon de la AEDE no satisface ni... - 0 views

  •  
    "Transcurrido un mes desde el cierre de Google en España, los efectos no son los mismos para todos los diarios digitales. A los grandes medios online les ha afectado poco, Sin embargo, para dos importantes medios que también se publican en papel, uno de Madrid y otro de Barcelona, sí que ha tenido una mayor incidencia porque obtenían un tráfico de entre el 6% y el 8% procedente de Google News."
Gonzalo San Gil, PhD.

¿ Crisis en El desarrollo del kernel de Linux? - LinuxPreview [# ! Nota.] - 0 views

    • Gonzalo San Gil, PhD.
       
      propaganda contra libertad. la creatividad genera tensión y, su resolución, éxito.
  •  
    "Otro desarrollador del kernel de Linux ha abandonado, citando un ambiente tóxico. Jack Wallen propone el tipo de motivación utilizado por los desarrolladores del kernel podría deshacer un bien muy preciado"
  •  
    "Otro desarrollador del kernel de Linux ha abandonado, citando un ambiente tóxico. Jack Wallen propone el tipo de motivación utilizado por los desarrolladores del kernel podría deshacer un bien muy preciado"
Gonzalo San Gil, PhD.

Cómo los Movimientos de Microsoft afectan el Open Source - LinuxPreview - 0 views

  •  
    "Microsoft es una empresa radicalmente diferente desde que Satya Nadella tomó el control del timón. En tan sólo un corto período de tiempo, se ha transformado de un gigante corporativo cerrada que dominaba el espacio de PC en los años 90, a una empresa que fabrica productos que excitan personas."
  •  
    "Microsoft es una empresa radicalmente diferente desde que Satya Nadella tomó el control del timón. En tan sólo un corto período de tiempo, se ha transformado de un gigante corporativo cerrada que dominaba el espacio de PC en los años 90, a una empresa que fabrica productos que excitan personas."
Gonzalo San Gil, PhD.

El porqué del éxito del Open Source » MuyCanal - 0 views

  •  
    "Cuando Netscape liberó el código fuente de su navegador web en 1998, parecía un movimiento desesperado por una empresa asediada por Microsoft, que terminó vendida un año después a AOL. Actualmente, no pasa una semana sin que una empresa de tecnología anuncie el lanzamiento de una nueva plataforma, aplicación o extensión, junto a su código fuente, bajo licencia libre Open Source."
  •  
    "Cuando Netscape liberó el código fuente de su navegador web en 1998, parecía un movimiento desesperado por una empresa asediada por Microsoft, que terminó vendida un año después a AOL. Actualmente, no pasa una semana sin que una empresa de tecnología anuncie el lanzamiento de una nueva plataforma, aplicación o extensión, junto a su código fuente, bajo licencia libre Open Source."
Gonzalo San Gil, PhD.

Google: Se repite el ridículo español: Europa, más cerca de aprobar su propio... - 0 views

  •  
    "27.08.2016 - 05:00 H. Es como un triste viaje al pasado, una vuelta a la Edad Media. ¿Recuerdan lo que ocurrió hace un par de años cuando España hizo el ridículo a nivel mundial forzando el cierre de Google News en nuestro país? "
  •  
    "27.08.2016 - 05:00 H. Es como un triste viaje al pasado, una vuelta a la Edad Media. ¿Recuerdan lo que ocurrió hace un par de años cuando España hizo el ridículo a nivel mundial forzando el cierre de Google News en nuestro país? "
Paul Merrell

Hey ITU Member States: No More Secrecy, Release the Treaty Proposals | Electronic Front... - 0 views

  • The International Telecommunication Union (ITU) will hold the World Conference on International Telecommunications (WCIT-12) in December in Dubai, an all-important treaty-writing event where ITU Member States will discuss the proposed revisions to the International Telecommunication Regulations (ITR). The ITU is a United Nations agency responsible for international telecom regulation, a bureaucratic, slow-moving, closed regulatory organization that issues treaty-level provisions for international telecommunication networks and services. The ITR, a legally binding international treaty signed by 178 countries, defines the boundaries of ITU’s regulatory authority and provides "general principles" on international telecommunications. However, media reports indicate that some proposed amendments to the ITR—a negotiation that is already well underway—could potentially expand the ITU’s mandate to encompass the Internet.
  • The International Telecommunication Union (ITU) will hold the World Conference on International Telecommunications (WCIT-12) in December in Dubai, an all-important treaty-writing event where ITU Member States will discuss the proposed revisions to the International Telecommunication Regulations (ITR). The ITU is a United Nations agency responsible for international telecom regulation, a bureaucratic, slow-moving, closed regulatory organization that issues treaty-level provisions for international telecommunication networks and services. The ITR, a legally binding international treaty signed by 178 countries, defines the boundaries of ITU’s regulatory authority and provides "general principles" on international telecommunications. However, media reports indicate that some proposed amendments to the ITR—a negotiation that is already well underway—could potentially expand the ITU’s mandate to encompass the Internet. In similar fashion to the secrecy surrounding ACTA and TPP, the ITR proposals are being negotiated in secret, with high barriers preventing access to any negotiating document. While aspiring to be a venue for Internet policy-making, the ITU Member States do not appear to be very open to the idea of allowing all stakeholders (including civil society) to participate. The framework under which the ITU operates does not allow for any form of open participation. Mere access to documents and decision-makers is sold by the ITU to corporate “associate” members at prohibitively high rates. Indeed, the ITU’s business model appears to depend on revenue generation from those seeking to ‘participate’ in its policy-making processes. This revenue-based principle of policy-making is deeply troubling in and of itself, as the objective of policy making should be to reach the best possible outcome.
  • EFF, European Digital Rights, CIPPIC and CDT and a coalition of civil society organizations from around the world are demanding that the ITU Secretary General, the  WCIT-12 Council Working Group, and ITU Member States open up the WCIT-12 and the Council working group negotiations, by immediately releasing all the preparatory materials and Treaty proposals. If it affects the digital rights of citizens across the globe, the public needs to know what is going on and deserves to have a say. The Council Working Group is responsible for the preparatory work towards WCIT-12, setting the agenda for and consolidating input from participating governments and Sector Members. We demand full and meaningful participation for civil society in its own right, and without cost, at the Council Working Group meetings and the WCIT on equal footing with all other stakeholders, including participating governments. A transparent, open process that is inclusive of civil society at every stage is crucial to creating sound policy.
  • ...5 more annotations...
  • Civil society has good reason to be concerned regarding an expanded ITU policy-making role. To begin with, the institution does not appear to have high regard for the distributed multi-stakeholder decision making model that has been integral to the development of an innovative, successful and open Internet. In spite of commitments at WSIS to ensure Internet policy is based on input from all relevant stakeholders, the ITU has consistently put the interests of one stakeholder—Governments—above all others. This is discouraging, as some government interests are inconsistent with an open, innovative network. Indeed, the conditions which have made the Internet the powerful tool it is today emerged in an environment where the interests of all stakeholders are given equal footing, and existing Internet policy-making institutions at least aspire, with varying success, to emulate this equal footing. This formula is enshrined in the Tunis Agenda, which was committed to at WSIS in 2005:
  • 83. Building an inclusive development-oriented Information Society will require unremitting multi-stakeholder effort. We thus commit ourselves to remain fully engaged—nationally, regionally and internationally—to ensure sustainable implementation and follow-up of the outcomes and commitments reached during the WSIS process and its Geneva and Tunis phases of the Summit. Taking into account the multifaceted nature of building the Information Society, effective cooperation among governments, private sector, civil society and the United Nations and other international organizations, according to their different roles and responsibilities and leveraging on their expertise, is essential. 84. Governments and other stakeholders should identify those areas where further effort and resources are required, and jointly identify, and where appropriate develop, implementation strategies, mechanisms and processes for WSIS outcomes at international, regional, national and local levels, paying particular attention to people and groups that are still marginalized in their access to, and utilization of, ICTs.
  • Indeed, the ITU’s current vision of Internet policy-making is less one of distributed decision-making, and more one of ‘taking control.’ For example, in an interview conducted last June with ITU Secretary General Hamadoun Touré, Russian Prime Minister Vladimir Putin raised the suggestion that the union might take control of the Internet: “We are thankful to you for the ideas that you have proposed for discussion,” Putin told Touré in that conversation. “One of them is establishing international control over the Internet using the monitoring and supervisory capabilities of the International Telecommunication Union (ITU).” Perhaps of greater concern are views espoused by the ITU regarding the nature of the Internet. Yesterday, at the World Summit of Information Society Forum, Mr. Alexander Ntoko, head of the Corporate Strategy Division of the ITU, explained the proposals made during the preparatory process for the WCIT, outlining a broad set of topics that can seriously impact people's rights. The categories include "security," "interoperability" and "quality of services," and the possibility that ITU recommendations and regulations will be not only binding on the world’s nations, but enforced.
  • Rights to online expression are unlikely to fare much better than privacy under an ITU model. During last year’s IGF in Kenya, a voluntary code of conduct was issued to further restrict free expression online. A group of nations (including China, the Russian Federation, Tajikistan and Uzbekistan) released a Resolution for the UN General Assembly titled, “International Code of Conduct for Information Security.”  The Code seems to be designed to preserve and protect national powers in information and communication. In it, governments pledge to curb “the dissemination of information that incites terrorism, secessionism or extremism or that undermines other countries’ political, economic and social stability, as well as their spiritual and cultural environment.” This overly broad provision accords any state the right to censor or block international communications, for almost any reason.
  • EFF Joins Coalition Denouncing Secretive WCIT Planning Process June 2012 Congressional Witnesses Agree: Multistakeholder Processes Are Right for Internet Regulation June 2012 Widespread Participation Is Key in Internet Governance July 2012 Blogging ITU: Internet Users Will Be Ignored Again if Flawed ITU Proposals Gain Traction June 2012 Global Telecom Governance Debated at European Parliament Workshop
Gonzalo San Gil, PhD.

Online freedom is a 'human right' that must be protected, says UN | WIRED UK - 0 views

  •  
    "Internet disruption is a "human rights violation", says UN Governments who cut off internet access are denying citizens their rights"
  •  
    "Governments who cut off internet access are denying citizens their rights"
Gonzalo San Gil, PhD.

Diez preguntas sobre la sentencia que dejó sin conexión a un 'pirata' - Tecno... - 0 views

  •  
    "Tras la sentencia de la Audiencia Provincial de Barcelona, que obliga a un operador a cortar la conexión a internet de uno de sus clientes por compartir archivos, surgen infinidad de dudas y preguntas. ¿Puede pasarme a mí? ¿A partir de ahora te puedes quedar sin internet por descargar canciones? ¿Una sentencia como esta te deja sin conexión de por vida? Con la ayuda de un grupo de abogados expertos en propiedad intelectual, HojaDeRouter.com trata de responder estas y otras cuestiones fundamentales ♦"
Gonzalo San Gil, PhD.

Confirman el archivo de una causa contra un sitio de enlaces al no haber deli... - 0 views

  •  
    "P. ROMERO Madrid Actualizado: 05/12/2013 17:48 horas Un juzgado de Bilbao ha confirmado el archivo del caso contra el administrador del sitio web de enlaces Multiestrenos. Según informa el abogado de la defensa, David Bravo, el auto detalla que no existe comunicación pública en la acción de enlazar, un elemento éste imprescindible -al menos con el Código Penal actual- para considerar delictiva la conducta de ofrecer enlaces a descargas."
Gonzalo San Gil, PhD.

Un 40% de empresas bloquea el acceso a redes sociales · ELPAÍS.com - 0 views

  •  
    [ Un 40% de las empresas bloquean el acceso a redes sociales en los puestos de trabajo, según un informe mundial de Cisco. En aquellas empresas que se permite el acceso a redes sociales, los empleados destinan una media de 24 minutos a la navegación. ...] *Las Empresas esán empeñadas en Reprimir todo lo Social...
Gonzalo San Gil, PhD.

Tails: Distribución Linux para el anonimato en la red - 0 views

  •  
    [Todos los días la privacidad de los usuarios se reduce un poco más gracias a los embates que llevan adelante las compañías que manejan grandes cantidades de información y que requieren de la nuestra como para darnos un servicio a cambios. Google, Microsoft, Facebook, Oracle y bueno, casi todo el resto de la internet superficial toma algún rastro de los tantos que dejamos. Si eres de aquellos a los que esto les preocupa y mucho, una distribución Linux para el anonimato en la red es lo que andas buscando. Su nombre, Tails. ]
Gonzalo San Gil, PhD.

Cómo elaborar una estrategia completa en Redes Sociales (I) - 0 views

  •  
    [Existen aún muchas empresas en España que se toman esto de las Redes Sociales como un gasto, un juego, o simplemente deciden no darle la importancia que hay que darle porque lo consideran una pérdida de tiempo. Efectivamente, si te pones a disparar posts a diestro y siniestro sin ton ni son o, como dice Javier Ruiz Robles, dejas a tus sobrinos que lleven las Redes Sociales, no sólo no obtendrás beneficio alguno, si no que te puedes buscar la ruina de tu empresa a base de ensuciar tu imagen online. ...]
Gonzalo San Gil, PhD.

Wikipedia:Asistente para la creación de artículos - Wikipedia, la enciclopedi... - 0 views

  •  
    "Asistente para la creación de artículos ¡Bienvenido(s) al asistente para la creación de artículos de Wikipedia! Este asistente te ayudará durante el proceso de creación de un artículo en Wikipedia. Para la redacción de un artículo válido, has de seguir unos breves pasos. A medida que avances, el siguiente paso será accesible. En esta página, te ayudaremos a utilizar las herramientas necesarias para redactar tus artículos."
Gonzalo San Gil, PhD.

El futuro periodista tiene que ser la combinación de un hacker y un DJ - Clas... - 0 views

  •  
    "¿Cómo tiene que ser el periodista hoy? Para Víctor Sampedro, catedrático de Opinión Pública y autor del libro "El cuarto poder en red", el periodista tiene que tener algo de hacker. Público.es realizó una interesante entrevista y compartimos algunos fragmentos."
Gonzalo San Gil, PhD.

Así es Gradio, la radio de linux - 0 views

  •  
    "Hoy os vamos a presentar algo diferente, se trata de Gradio, un programa que permite acceder a un directorio de radios y escuchar nuestras emisoras favoritas desde nuestro linux, sin depender de ningún navegador de internet."
Gonzalo San Gil, PhD.

Descubre las 10 mejores distribuciones Linux a nivel de seguridad y privacidad - MuySeg... - 0 views

  •  
    "Linux es un sistema operativo utilizado en muchos ámbitos, a pesar de que en el escritorio tiene un protagonismo casi testimonial. Sin embargo se muestra bastante fuerte en otros campos como la seguridad y la privacidad, aportando bastantes distribuciones enfocadas en estas áreas. Aquí mencionaremos las más destacadas, y adelantamos que algunas incorporan herramientas para probar la red y los sistemas de seguridad."
‹ Previous 21 - 40 of 191 Next › Last »
Showing 20 items per page