The US Is Jeopardizing the Open Internet


Article by Natalie Dunleavy Campbell & Stan Adams: “Last October, the United States Trade Representative (USTR) abandoned its longstanding demand for World Trade Organization provisions to protect cross-border data flows, prevent forced data localization, safeguard source codes, and prohibit countries from discriminating against digital products based on nationality. It was a shocking shift: one that jeopardizes the very survival of the open internet, with all the knowledge-sharing, global collaboration, and cross-border commerce that it enables.

The USTR says that the change was necessary because of a mistaken belief that trade provisions could hinder the ability of US Congress to respond to calls for regulation of Big Tech firms and artificial intelligence. But trade agreements already include exceptions for legitimate public-policy concerns, and Congress itself has produced research showing that trade deals cannot impede its policy aspirations. Simply put, the US – as with other countries involved in WTO deals – can regulate its digital sector without abandoning its critical role as a champion of the open internet.

The potential consequences of America’s policy shift are as far-reaching as they are dangerous. Fear of damaging trade ties with the US has long deterred other actors from imposing national borders on the internet. Now, those who have heard the siren song of supposed “digital sovereignty” as a means to ensure their laws are obeyed in the digital realm have less reason to resist it. The more digital walls come up, the less the walled-off portions resemble the internet.

Several countries are already trying to replicate China’s heavy-handed approach to data governance. Rwanda’s data-protection law, for instance, forces companies to store data within its border unless otherwise permitted by its cybersecurity regulator – making personal data vulnerable to authorities known to use data from private messages to prosecute dissidents. At the same time, a growing number of democratic countries are considering regulations that, without strong safeguards for cross-border data flows, could have a similar effect of disrupting access to a truly open internet…(More)”.

Private tech, humanitarian problems: how to ensure digital transformation does no harm


Report by Access Now: “People experiencing vulnerability as a consequence of conflict and violence often rely on a small group of humanitarian actors, trusted because of their claims of neutrality, impartiality, and independence from the warring parties. They rely on these humanitarian organisations and agencies for subsistence, protection, and access to basic services and information, in the darkest times in their lives. Yet these same actors can expose them to further harm. Our new report, Mapping Humanitarian Tech: exposing protection gaps in digital transformation programmes, examines the partnerships between humanitarian actors and private corporations. Our aim is to show how these often-opaque partnerships impact the digital rights of the affected communities, and to offer recommendations for keeping people safe…(More)”.

India’s persistent, gendered digital divide


Article by Caiwei Chen: “In a society where women, especially unmarried girls, still have to fight to own a smartphone, would men — and institutional patriarchy — really be willing to share political power?

In September, the Indian government passed a landmark law, under which a third of the seats in the lower house and state assemblies would be reserved for women. Amid the euphoria of celebrating this development, a somewhat cynical question I’ve been thinking about is: Why do only 31% of women own a mobile phone in India compared to over 60% of men? This in a country that is poised to have 1 billion smartphone users by 2026.

It’s not that the euphoria is without merit. Twenty-seven years after the idea was first birthed, the Narendra Modi government was able to excavate the issue out of the deep freeze and breathe it back into life. The execution of the quota will still take a few years as it has been linked to the redrawing of constituency boundaries.

But in the meantime, as women, we should brace ourselves for the pushbacks — small and big — that will come our way.

In an increasingly wired world, this digital divide has real-life consequences.  

The gender gap — between men and women, boys and girls — isn’t only about cellular phones and internet access. This inequity perfectly encapsulates all the other biases that India’s women have had to contend with — from a disparity in education opportunities to overzealous moral policing. It is about denying women power — and even bodily autonomy…(More)”.

Disinformation and Civic Tech Research


Code for All Playbook: “”The Disinformation and Civic Tech Playbook is a tool for people who are interested in understanding how civic tech can help confront disinformation. This guide will help you successfully advocate for, and implement disinfo-fighting tools, programs, and campaigns from partners around the world.

In order to effectively fight misinformation at a societal scale, three stages of work must be completed in sequential order:

  1. Monitor or research media environment (traditional, social, and/or messaging apps) for misinformation
  2. Verify and/or debunk
  3. Reach people with the truth and counter-message falsehoods

These stages ascend from least impactful to most impactful activity.

Researching misinformation in the media environment has no effect whatsoever on its own. Verifying and debunking falsehoods have limited utility unless stage three is also achieved: successfully reaching communities with true information in a way that gets through to them, and effectively counter-messaging the misinformation that spreads so easily.

Unfortunately, the distribution of misinformation management projects to date seems to be the exact inverse of these stages. There has been an enormous amount of work to passively monitor and research media environments for misinformation. There is also a large amount of energy and resources dedicated to verifying and debunking misinformation through traditional fact-checking approaches. Whether because it’s the hardest one to solve or just third in the consecutive sequence, relatively few misinformation management projects have made it to the final stage of genuinely getting through to people and experimenting with effective counter-messaging and counter-engagement (see The Sentinel Project interview for further discussion)…(More)”.

The Secret Solution To Increasing Resident Trust


Report by CivicPlus: “We surveyed over 16,000 Americans to determine what factors most impacted community members in fostering feelings of trust in their local government. We found that residents in communities with digital resident self-service technology are more satisfied with their local government than residents still dependent on analog interactions to obtain government services. Residents in technology-forward communities also tend to be more engaged civic participants…(More)”.

Interoperability Can Save the Open Web


Interview by Michael Nolan: “In his new book The Internet Con: How to Seize the Means of Computation, author Cory Doctorow presents a strong case for disrupting Big Tech. While the dominance of Internet platforms like TwitterFacebook, Instagram, or Amazon is often taken for granted, Doctorow argues that these walled gardens are fenced in by legal structures, not feats of engineering. Doctorow proposes forcing interoperability—any given platform’s ability to interact with another—as a way to break down those walls and to make the Internet freer and more democratic….

Doctorow: At its root, it’s just the ability to use one thing with something else. Use any ink in your printer with any paper, use any socks with your shoes, anyone’s gasoline in your car, put any lightbulb in your light socket. There’s voluntary, mandatory interoperability, where a group of stakeholders get together and they say, “This is the goal we want all of our products to achieve, and we are going to design a framework so that we can make sure that every lightbulb lights up when you stick it in a light socket.” Then there’s the stuff where they’re indifferent: Car companies don’t stop you from putting a little cigarette-lighter-to-USB adapter into your car.

Companies can grow very quickly because tech has got these great network effects, but they also have, because of interoperability, really low switching costs.—Cory Doctorow

Then there’s the third kind of interop, the kind of chewy, interesting, lots-of-rich-Internet-history interop, which is adversarial interoperability, which in the book we call “comcom,” short for competitive compatibility. It’s the interop that’s done against the wishes of the original equipment manufacturer: scraping, reverse engineering, bots, all of that gnarly stuff done in the face of active hostility. This would be like Apple reverse-engineering Microsoft Office and making the iWork suite—Pages, Numbers, and Keynote—so that anyone with a Mac could read any Windows-based office file without having to buy any software from Microsoft.

There are so many examples of this from technology’s history. It’s really the engine of technology…(More)”. 

Reimagining Our High-Tech World


Essay by Mike Kubzansky: “…Channeling the power of technology for the good of society requires a shared vision of an ideal society. Despite the country’s increasing polarization, most Americans agree on the principles of a representative democracy and embrace the three quintessential rights inscribed in the Declaration of Independence—life, liberty, and the pursuit of happiness. Freedom and individual liberty, including freedom of speech, religion, and assembly and the right to privacy, are fundamental to most people’s expectations for this country, as are equality for all citizens, a just legal system, and a strong economy. Widespread consensus also exists around giving children a strong start in life; ensuring access to basic necessities like health care, food, and housing; and taking care of the planet.

By deliberately building a digital tech system guided by these values, society has an opportunity to advance its interests and future-proof the digital tech system for better outcomes.

Such collective action requires a broad conversation about what kind of society Americans want and how digital technology fits into that vision. To initiate this discussion, I suggest five questions philanthropists, technologists, entrepreneurs, policy makers, academics, advocates, movement leaders, students, consumers, investors, and everyone else who has a stake in the nation’s future need to start asking—now….(More)”.

Supporting Safer Digital Spaces


Report by Suzie Dunn, Tracy Vaillancourt and Heather Brittain: “Various forms of digital technology are being used to inflict significant harms online. This is a pervasive issue in online interactions, in particular with regard to technology-facilitated gender-based violence (TFGBV) and technology-facilitated violence (TFV) against LGBTQ+ people. This modern form of violence perpetuates gender inequality and discrimination against LGBTQ+ people and has significant impacts on its targets.

As part of a multi-year research project Supporting a Safer Internet (in partnership with the International Development Research Centre) exploring the prevalence and impacts of TFGBV experienced by women, transgender, gender non-conforming and gender-diverse people, as well as TFV against LGBTQ+ individuals, an international survey was conducted by Ipsos on behalf of the Centre for International Governance Innovation (CIGI). The survey examined the influence of gender and sexual orientation on people’s experiences with online harms, with a focus on countries in the Global South. Data was collected from 18,149 people of all genders in 18 countries.

The special report provides background information on TFGBV and TFV against LGBTQ+ people by summarizing some of the existing research on the topic. It then presents the quantitative data collected on people’s experiences with, and opinions on, online harms. A list of recommendations is provided for governments, technology companies, academics, researchers and civil society organizations on how they can contribute to addressing and ending TFV…(More)”

(Read the Supporting Safer Digital Spaces: Highlights here.; Read the French translation of the Highlights here.)

Digital Freedoms in French-Speaking African Countries


Report by AFD: “As digital penetration increases in countries across the African continent, its citizens face growing risks and challenges. Indeed, beyond facilitated access to knowledge such as the online encyclopedia Wikipedia, to leisure-related tools such as Youtube, and to sociability such as social networks, digital technology offers an unprecedented space for democratic expression. 

However, these online civic spaces are under threat. Several governments have enacted vaguely-defined laws, allowing for random arrests.

Several countries have implemented repressive practices restricting freedom of expression and access to information. This is what is known as “digital authoritarianism”, which is on the rise in many countries.

This report takes stock of digital freedoms in 26 French-speaking African countries, and proposes concrete actions to improve citizen participation and democracy…(More)”

Elon Musk Has Broken Disaster-Response Twitter


Article by Juliette Kayyem: “For years, Twitter was at its best when bad things happened. Before Elon Musk bought it last fall, before it was overrun with scammy ads, before it amplified fake personas, and before its engineers were told to get more eyeballs on the owner’s tweets, Twitter was useful in saving lives during natural disasters and man-made crises. Emergency-management officials have used the platform to relate timely information to the public—when to evacuate during Hurricane Ian, in 2022; when to hide from a gunman during the Michigan State University shootings earlier this month—while simultaneously allowing members of the public to transmit real-time data. The platform didn’t just provide a valuable communications service; it changed the way emergency management functions.

That’s why Musk-era Twitter alarms so many people in my field. The platform has been downgraded in multiple ways: Service is glitchier; efforts to contain misleading information are patchier; the person at the top seems largely dismissive of outside input. But now that the platform has embedded itself so deeply in the disaster-response world, it’s difficult to replace. The rapidly deteriorating situation raises questions about platforms’ obligation to society—questions that prickly tech execs generally don’t want to consider…(More)”