<html><head></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; "><div>Hi IG list. This may be of interest to the group. Inputs and feedback are welcome.</div><div>Ron</div><div><br></div><div><br></div><a href="https://citizenlab.org/2013/10/monitoring-information-controls-bali-igf/">https://citizenlab.org/2013/10/monitoring-information-controls-bali-igf/</a><div><br></div><div><h2 class="entry-title" style="font-family: sans-serif, verdana, helvetica; font-size: 23px; clear: both; color: rgb(51, 51, 51); font-style: normal; font-variant: normal; letter-spacing: normal; line-height: 19px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(238, 238, 238); position: static; z-index: auto; ">Monitoring Information Controls During the Bali IGF</h2><p style="color: rgb(51, 51, 51); font-family: sans-serif, verdana, helvetica; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(238, 238, 238); position: static; z-index: auto; "><i>October 21, 2013</i></p><div class="entry-content" style="color: rgb(51, 51, 51); font-family: sans-serif, verdana, helvetica; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(238, 238, 238); position: static; z-index: auto; "><div class="addthis_toolbox addthis_default_style addthis_" addthis:url="https://citizenlab.org/2013/10/monitoring-information-controls-bali-igf/" addthis:title="Monitoring Information Controls During the Bali IGF " style="margin-top: 10px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; "><a class="addthis_button_facebook" style="color: rgb(204, 102, 0); text-decoration: none; "></a><a class="addthis_button_twitter" style="color: rgb(204, 102, 0); text-decoration: none; "></a><a class="addthis_button_email" style="color: rgb(204, 102, 0); text-decoration: none; "></a><a class="addthis_button_pinterest_share" style="color: rgb(204, 102, 0); text-decoration: none; "></a><a class="addthis_button_compact" style="color: rgb(204, 102, 0); text-decoration: none; "></a><a class="addthis_counter addthis_bubble_style" style="color: rgb(204, 102, 0); text-decoration: none; "></a></div><h3>Monitoring Information Controls During the Bali IGF</h3><h3>Introduction</h3><p dir="ltr">On October 22-25, 2013, Indonesia will host the eighth annual Internet Governance Forum (IGF), a multi-stakeholder dialogue on the issues and policies of <a href="http://en.wikipedia.org/wiki/Internet_governance" style="color: rgb(204, 102, 0); text-decoration: none; ">Internet governance</a>. The main theme of this year’s <a href="http://igf2013.or.id/" style="color: rgb(204, 102, 0); text-decoration: none; ">IGF</a> is “Building Bridges: Enhancing Multi-stakeholder Cooperation for Growth and Sustainable Development.”</p><p dir="ltr">This post is the first in a series that will explore online freedom of expression and the state of information controls in Indonesia in the context of their role as host of the IGF, comparing Indonesia’s information controls with similar practices in the region, the rest of the world, and events similar to the IGF. We will also analyze how these practices are driven by Indonesia’s social, political, and cultural context, and the role that international norms play in influencing information controls.</p><p dir="ltr">Major global events are frequently a focal point for the exercise of and contests over information controls, including Internet censorship and surveillance, disruptions to mobile and other communications systems, and tampering with Internet connectivity. Such information controls are often highly dynamic, responding to the changing situation on the ground when information can have the greatest impact. We have called such practices “just-in-time” information controls — denying, disrupting, manipulating or monitoring access to information during important political moments.<sup><a href="https://citizenlab.org/2013/10/monitoring-information-controls-bali-igf/#1" style="color: rgb(204, 102, 0); text-decoration: none; ">1</a></sup> High profile, global events can have significant political, social and economic consequences for host countries, and may come with new security and surveillance measures as a result.<sup><a href="https://citizenlab.org/2013/10/monitoring-information-controls-bali-igf/#2" style="color: rgb(204, 102, 0); text-decoration: none; ">2</a></sup></p><p dir="ltr">Several Citizen Lab researchers and associates who are attending the IGF are participating in the research for these posts, including those who have been situated in Indonesia for some time as part of the civil society stakeholder preparations for the 2013 IGF. Additionally, we are capitalizing on the expertise and input of Indonesian colleagues, including those who are part of the <a href="http://www.cyberstewards.org/" style="color: rgb(204, 102, 0); text-decoration: none; ">Cyber Stewards Network</a>,<sup><a href="https://citizenlab.org/2013/10/monitoring-information-controls-bali-igf/#3" style="color: rgb(204, 102, 0); text-decoration: none; ">3</a></sup> to provide much-needed context and nuance around the analysis presented here. We are also mindful of others who are attending the IGF and are engaging in their own separate monitoring activities, and intend to reference their work as much as possible and when appropriate. Citizen Lab staff working remotely will be providing input into and support for network measurement and legal and policy analysis.</p><p dir="ltr">We frame our analysis with the following topics and questions, which will in turn inform a series of forthcoming posts:</p><h3>Infrastructure and Governance:</h3><p dir="ltr">The application of information controls in a country is highly influenced by the domestic political, economic, and social context in which they are applied. Each country’s communication infrastructure is unique, differentiated by factors such as the number of Internet service providers (ISPs), telecommunication companies, the degree of market competition among them, and the overall level of Internet penetration and growth. In some countries numerous ISPs and a highly competitive market environment can act as a constraint on state-driven information controls, whereas in other countries with fewer ISPs and less democratic regimes, state regulations can be more centrally implemented and sometimes more constraining. International connectivity and upstream peering arrangements can also shape the nature of information controls, as do regional and international governance regimes of which the country may be a member. Most importantly, the regime type of the country in question can have a major influence over the nature of information controls.</p><p dir="ltr">The Indonesian government has traditionally been supportive of ICT development. Internet penetration has <a href="http://www.itu.int/en/ITU-D/Statistics/Documents/statistics/2013/Individuals_Internet_2000-2012.xls" style="color: rgb(204, 102, 0); text-decoration: none; ">increased since the beginning of the century</a>, from less than one percent in 2000 to 15.36 per cent in 2012. Cellular phone penetration has <a href="http://www.itu.int/en/ITU-D/Statistics/Documents/statistics/2013/Mobile_cellular_2000-2012.xls" style="color: rgb(204, 102, 0); text-decoration: none; ">increased at an exponential rate</a> over the same time period, from 1.72 to 115.20 cellular phone subscriptions per 100 inhabitants from 2000 to 2012. The government is planning to <a href="http://www.worldfolio.co.uk/region/asia/indonesia/freddy-tulung-information-and-public-communication-at-mcit-indonesia-n1145" style="color: rgb(204, 102, 0); text-decoration: none; ">increase </a>basic telephone services to thousands of villages across the country and is trying to <a href="http://www.indonesia-investments.com/news/todays-headlines/internet-penetration-in-indonesia-still-low-at-25-but-rising-steadily/item1033" style="color: rgb(204, 102, 0); text-decoration: none; ">increase Internet penetration</a> to the country’s easternmost islands.</p><p dir="ltr">Indonesia has <a href="http://www.apjii.or.id/v2/index.php/read/index-anggota/keanggotaan.html" style="color: rgb(204, 102, 0); text-decoration: none; ">over 250 ISPs</a>. The two largest telecommunications operators, PT Telekom and PT Indosat, were <a href="http://www.lirneasia.net/wp-content/uploads/2008/05/annex-4-indonesia-india-comparative-paper-malik-goswami.pdf" style="color: rgb(204, 102, 0); text-decoration: none; ">partially privatized </a>in the mid-90s after years of state-control, although the government continues to own shares in both companies. As ICT penetration in Indonesia has increased, so have the regulations and laws, some having as their impetus the perceived necessities of dealing with growing cyber crime issues others having to do with content controls. ISPs and telecommunications companies have voiced their concerns that these laws lack clarity and may place burdens on their services.<sup><a href="https://citizenlab.org/2013/10/monitoring-information-controls-bali-igf/#4" style="color: rgb(204, 102, 0); text-decoration: none; ">4</a></sup></p><p dir="ltr">Our post will examine the following questions:</p><ul><li dir="ltr"><p dir="ltr">How is cyberspace constituted in Indonesia?</p></li><li dir="ltr"><p dir="ltr">What is the political economy of Internet governance and use in the country?</p></li><li dir="ltr"><p dir="ltr">How are laws and regulations over the Internet implemented?</p></li><li dir="ltr"><p dir="ltr">What autonomy do ISPs have to implement laws and rules, and what practices inform implementation of controls in Indonesia? How do these practices compare to other countries?</p></li><li dir="ltr"><p dir="ltr">Is the Indonesian government developing a cyber security strategy? What policies does it include, and how will these impact information controls? How have issues of cyber crime been perceived in Indonesia and what have been the institutional and legal responses?</p></li><li dir="ltr"><p dir="ltr">Does the Indonesian government have a “regional” or “foreign policy” for cyberspace?</p></li></ul><h3>Content Controls:</h3><p dir="ltr">Information controls include those whose aim is to control the content accessible to a population, including information posted online. Content controls can include laws and regulations that restrict free speech online or in certain media, as well as technical measures designed to limit access to information — otherwise known as “Internet filtering.” Since 2003, the Citizen Lab, as a founding member of the OpenNet Initiative,<sup><a href="https://citizenlab.org/2013/10/monitoring-information-controls-bali-igf/#5" style="color: rgb(204, 102, 0); text-decoration: none; ">5</a></sup> has conducted testing of Internet filtering in 74 countries, and has <a href="https://opennet.net/blog/2012/04/global-internet-filtering-2012-glance" style="color: rgb(204, 102, 0); text-decoration: none; ">found</a> that of these 74 countries, 42 engage in some form of content filtering. The type of content being filtered varies across countries, and depends on local political, legal, social, and cultural contexts. We employ a multidisciplinary approach that includes technical testing of government mandated Internet censorship policies and practices, field research by regional and country-level experts, as well as analysis of the country’s legal and regulatory filtering framework. The combination of technical investigation with political, social and legal contextual work is essential for understanding both how and why information controls are applied.<sup><a href="https://citizenlab.org/2013/10/monitoring-information-controls-bali-igf/#6" style="color: rgb(204, 102, 0); text-decoration: none; ">6</a></sup> We also aim to determine the specific techniques and, where possible, the products that are used to implement Internet content filtering.</p><p dir="ltr">OpenNet Initiative <a href="https://opennet.net/research/profiles/indonesia" style="color: rgb(204, 102, 0); text-decoration: none; ">testing in 2010</a> on four Indonesian ISPs found that pornographic content, which is illegal under the country’s 2008 Anti-Pornography Law, is heavily filtered. Testing also revealed that Internet filtering across ISPs is unsystematic and inconsistent, with some ISPs blocking more than others and targeting a wider range of content such as anonymizer and circumvention Web sites, and Web sites containing controversial political or religious content. In 2011, smartphone maker BlackBerry <a href="http://online.wsj.com/news/articles/SB10001424052748704881304576093174017705238" style="color: rgb(204, 102, 0); text-decoration: none; ">began censoring</a> pornographic content on their networks in the country following demands by the Indonesian government.</p><p dir="ltr">This research on content controls will be guided by the following questions:</p><ul><li dir="ltr"><p dir="ltr">What content controls are applied in Indonesia?</p></li></ul><ul><li dir="ltr"><p dir="ltr">How are those content controls implemented or carried out?</p></li></ul><ul><li dir="ltr"><p dir="ltr">What do network measurements of Internet accessibility reveal about the scope, scale, and character of information controls in Indonesia?</p></li></ul><ul><li dir="ltr"><p dir="ltr">What restrictions are placed on free expression, both off and online, in Indonesia?</p></li></ul><ul><li dir="ltr"><p dir="ltr">What steps have civil society groups taken in response?</p></li></ul><ul><li dir="ltr"><p dir="ltr">What Internet users, if any, have been targeted for arrest and on what grounds?</p></li></ul><h3>Surveillance and Control:</h3><p dir="ltr">Surveillance is one of the most effective, if less obvious, forms of information control. Governments and private companies engage in surveillance for a wide range of reasons, many of them beneficial for society. For example, surveillance is an essential component of government responses to health crises and natural emergencies, and is a critical component of effective large-scale network management and law enforcement. However, surveillance can also be used to target dissidents and undermine privacy. If surveillance is undertaken without proper accountability, it can lead to the abuse of power. Surveillance of the Internet and other communications is now a huge growth industry, with <a href="http://wikileaks.org/the-spyfiles.html" style="color: rgb(204, 102, 0); text-decoration: none; ">many companies supplying governments with passive and targeted surveillance products and services</a>.</p><p>Past Citizen Lab research has documented the use of surveillance technologies, products, and services in Indonesia. For example, command and control servers for the commercial malware product FinFisher <a href="https://citizenlab.org/2013/03/you-only-click-twice-finfishers-global-proliferation-2/" style="color: rgb(204, 102, 0); text-decoration: none; ">were identified</a> on the Indonesian ISPs PT Telkom, PT Matrixnet Global and Biznet, as were devices which can be used for <a href="https://citizenlab.org/2013/01/planet-blue-coat-mapping-global-censorship-and-surveillance-tools/" style="color: rgb(204, 102, 0); text-decoration: none; ">filtering and surveillance</a> manufactured by the US-headquartered Blue Coat Systems. Indonesia’s Ministry of Defence <a href="http://www.thejakartaglobe.com/news/tni-surveillance-purchase-triggers-concern-in-indonesia/" style="color: rgb(204, 102, 0); text-decoration: none; ">recently signed</a> a USD 6.7 million contract with Gamma TSE to provide undisclosed “wiretapping equipment” for use by the Ministry’s Strategic Intelligence Agency. Gamma TSE is part of the Gamma Group, which includes Gamma Group International, the developer of <a href="https://citizenlab.org/2013/03/you-only-click-twice-finfishers-global-proliferation-2/" style="color: rgb(204, 102, 0); text-decoration: none; ">FinFisher</a>, a “lawful interception” product. Smartphone maker BlackBerry has <a href="http://www.thejakartapost.com/news/2011/09/15/government-asks-rim-open-access-wiretap-blackberry-users.html" style="color: rgb(204, 102, 0); text-decoration: none; ">come under pressure </a>from Indonesian authorities to locate infrastructure within the country as a means of facilitating surveillance of users, although it is not clear what, if any, arrangements have been made between the company and the Indonesian government.</p><p dir="ltr">Our post will examine the following questions:</p><ul><li dir="ltr"><p dir="ltr">What type of surveillance is undertaken by Indonesian authorities?</p></li></ul><ul><li dir="ltr"><p dir="ltr">What oversight and accountability is associated with that monitoring?</p></li></ul><ul><li dir="ltr"><p dir="ltr">What range of equipment, products, services, etc., does Indonesia use to implement surveillance? And how is that surveillance targeted?</p></li></ul><ul><li dir="ltr"><p dir="ltr">Have any special security and surveillance measures been taken for the IGF?</p></li></ul><ul><li dir="ltr"><p dir="ltr">What type of surveillance, if any, exists at the venue and for what purpose?</p></li></ul><h3>IGF Controls:</h3><p>Major global events like the IGF are often a significant focus of international attention and can have important political, economic and social consequences for host countries. Information controls are customarily loosened during the hosting of the IGF event — particularly at the venue itself. At the 2005 World Summit on the Information Society (WSIS) in Tunis, for example, <a href="http://www.nartv.org/2005/11/16/wsis/" style="color: rgb(204, 102, 0); text-decoration: none; ">unfettered access was provided within the conference venue</a>, while filtering remained elsewhere in the country.</p><p>Citizen Lab staff and associates have participated in every IGF since the first meeting was held in Athens in 2006, (as well as the WSIS meetings that preceded it in 2003 and 2005). At the 2005 WSIS meeting in Tunis, Citizen Lab researcher Nart Villeneuve’s presentation on Internet filtering <a href="http://www.nartv.org/2005/11/21/expression-under-repression/" style="color: rgb(204, 102, 0); text-decoration: none; ">was disrupted</a> by Tunisian authorities and nearly cancelled. Our participation in the 2009 IGF in Egypt included having our book launch for the OpenNet Initiative’s Access Controlled <a href="http://news.bbc.co.uk/2/hi/technology/8361849.stm" style="color: rgb(204, 102, 0); text-decoration: none; ">disrupted by United Nations’ officials</a>, following complaints by representatives for the government of China concerning our reference to Tibet and the Great Firewall of China in our published material.</p><p dir="ltr">Our last post will focus on the dynamics surrounding the IGF itself:</p><ul><li dir="ltr"><p dir="ltr">What are the interests of the various Indonesian stakeholders (government, private sector, civil society) in hosting the IGF? What do different stakeholders hope to accomplish? Where do these interests clash? What value does the Indonesian government place in the IGF relative to other international forums, such as ICANN, the ITU, or non-cyberspace related forums like APEC and ASEAN ?</p></li></ul><ul><li dir="ltr"><p dir="ltr">To what extent have Indonesian stakeholders been able to influence and shape the agenda and outcomes of the IGF? How did they prepare for the meeting, and what were the obstacles to overcome in making it happen (e.g., budgetary issues)?</p></li></ul><ul><li dir="ltr"><p dir="ltr">With the IGF underway in Indonesia, what impact does the forum have, if any, on Indonesian information controls and related practices?</p></li></ul><ul><li dir="ltr"><p dir="ltr">How does Internet accessibility in the venue of the forum, or in any other area where attendees may congregate (i.e. hotels, Internet cafes, etc.), compare to that which the average Indonesian user experiences?</p></li></ul><ul><li dir="ltr"><p dir="ltr">How have the stakeholders in Indonesia organized themselves to organize and host the IGF .</p></li></ul><ul><li dir="ltr"><p dir="ltr">What are the political dynamics of the IGF meeting itself?</p></li></ul><ul><li dir="ltr"><p dir="ltr">What were the processes to develop the agenda and program for the meeting — e.g., how did the multi-stakeholder advisory committee develop the key topics, agenda, and structures of the IGF? Which stakeholders held which positions, and who had input?</p></li></ul><ul><li dir="ltr"><p dir="ltr">What were the outcomes?</p></li></ul><h3>Footnotes</h3><p><a name="1" style="color: rgb(204, 102, 0); text-decoration: none; "></a><sup>1</sup> For more background on “just-in-time” content controls, see Masashi Crete-Nishihata and Jillian C. York, “Egypt’s Internet Blackout: Extreme Example of Just-in-time Blocking,” OpenNet Initiative, January 28, 2011,<a href="https://opennet.net/blog/2011/01/egypt%E2%80%99s-internet-blackout-extreme-example-just-time-blocking" style="color: rgb(204, 102, 0); text-decoration: none; ">https://opennet.net/blog/2011/01/egypt%E2%80%99s-internet-blackout-extreme-example-just-time-blocking</a>;<br>and Ronald Deibert and Rafal Rohozinski, “Good for Liberty, Bad for Security? Global Civil Society and the Securitization of the Internet,” in Access Denied: The Practice and Policy of Global Internet Filtering, eds. Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (Cambridge, Massachusetts: MIT Press, 2008), <a href="http://access.opennet.net/wp-content/uploads/2011/12/accessdenied-chapter-6.pdf" style="color: rgb(204, 102, 0); text-decoration: none; ">http://access.opennet.net/wp-content/uploads/2011/12/accessdenied-chapter-6.pdf</a>.<br><a name="2" style="color: rgb(204, 102, 0); text-decoration: none; "></a><sup>2</sup> Russia’s Surveillance State, a joint project between Citizen Lab, Agentura.Ru and Privacy International, has documented the growth of surveillance measures in preparation for the 2014 Sochi Winter Olympics. See Irina Borogan and Andrei Soldatov, “Surveillance at the Sochi Olympics 2014,” <a href="http://Agentura.ru/">Agentura.ru</a>, October 2013, <a href="http://www.agentura.ru/english/projects/Project_ID/sochi" style="color: rgb(204, 102, 0); text-decoration: none; ">http://www.agentura.ru/english/projects/Project_ID/sochi</a>.<br><a name="3" style="color: rgb(204, 102, 0); text-decoration: none; "></a><sup>3</sup> The Cyber Stewards program Cyber Stewards is a global network of organizations and individuals that use evidenced-based research for policy advocacy to ensure and promote a secure and open Internet. We are building bridges between researchers and activists in the global North and South to form a space of peers for collaboration and organization at local, regional, and international levels.<br><a name="4" style="color: rgb(204, 102, 0); text-decoration: none; "></a><sup>4</sup> Mariel Grazella, “ICT Businesses to Tackle Policy at Global Internet Forum,” The Jakata Post, March 02, 2013, available at<a href="http://www.thejakartapost.com/news/2013/03/02/ict-businesses-tackle-policy-global-forum-bali.html" style="color: rgb(204, 102, 0); text-decoration: none; ">http://www.thejakartapost.com/news/2013/03/02/ict-businesses-tackle-policy-global-forum-bali.html</a>.<br><a name="5" style="color: rgb(204, 102, 0); text-decoration: none; "></a><sup>5</sup> The OpenNet Initiative is a collaborative partnership of three institutions: the Citizen Lab at the Munk School of Global Affairs, University of Toronto; the Berkman Center for Internet & Society at Harvard University; and the SecDev Group (Ottawa).<br><a name="6" style="color: rgb(204, 102, 0); text-decoration: none; "></a><sup>6</sup> See Masashi Crete-Nishihata, Ronald J. Deibert, and Adam Senft, “Not by Technical Means Alone: The Multidisciplinary Challenge of Studying Information Controls,” IEEE Internet Computing 17.3 (2013): 34-41.</p><div><br></div></div><div apple-content-edited="true">
<div>Ronald Deibert</div><div>Director, the Citizen Lab </div><div>and the Canada Centre for Global Security Studies</div><div>Munk School of Global Affairs</div><div>University of Toronto</div><div>(416) 946-8916</div><div>PGP: <a href="http://deibert.citizenlab.org/pubkey.txt">http://deibert.citizenlab.org/pubkey.txt</a></div><a href="http://deibert.citizenlab.org/">http://deibert.citizenlab.org/</a><br><a href="http://twitter.com/citizenlab">twitter.com/citizenlab</a><br><a href="mailto:r.deibert@utoronto.ca">r.deibert@utoronto.ca</a><br><br><br>
</div>
<br></div></body></html>