A recently leaked European Council proposal
seeks to create a "Great Firewall of Europe," instituted to block sites that depict the abuse of children. As with other censorwalls, it's unlikely that this will performed as intended, since paedophiles will circumvent it with proxies, or by using P2P or email or private websites to trade illegal material. But the creation of a continent-wide network censorship scheme is likely to cause new problems, inviting authorities to shoehorn ever-greater slices of the net into the "illegal" category -- this has already happened in Australia and other countries that have built Chinese-style censorship regimes.
One of the most nuanced and important challenges to the EC proposal has come from MOGiS e.V, a German organization of child-abuse survivors. They've issued a statement condemning the proposal on several grounds: first, that censorship is unlikely to attain its stated goals and will create new harms, and second (and most importantly), that the EC should be turning its attention to making it easier for EU member-states and other nations to actually shut down sites that host images depicting the abuse of children.
Christian Bahls, a spokesperson for the group, says, "Blocking just hides the problem and actually lowers the police's incentive to become active. Also, going after the servers means a small chance of catching the people that put it there in the first
place. Images of child abuse are outlawed all over the world. There is a global consensus that this imagery is illegal and should not be
distributed (see the 193 Interpol members or the 117 signatories to the 'Optional Protocol to the Convention on the Rights of the Child on the
sale of children, child prostitution and child pornography')."
MOGiS e.V. was formed in Germany in 2009 in order to fight censorship proposals there, and now they are extending their work across the EU, along with other anti-censorship groups, to call for meaningful solutions to the abuse of children and to fight against unworkable, dangerous knee-jerk censorship proposals. Their slogan is "Remove, don't block! -- Act, and don't look away!"
Leaked EC censorship proposal (PDF)
MOGiS statement on EC proposal
A group of tech firms will meet today to plan the filing of an amicus brief in support of lawsuit to challenge U.S. President Donald Trump’s “Muslim Ban.” Trump’s order was issued on Friday, and restricts immigration from seven Muslim-majority countries in which Trump has no business interests. Adjacent Muslim-majority nations in which Trump does […]
The World Economic Forum asked “leaders from business, government, academia and nongovernmental and international organizations” to take a survey on the potential risks and benefits of different emerging technologies. They seemed to think the space technologies will have little benefit and pose little risk. Energy capture, storage, and transmission has the great promise and little […]
The graphene temporary tattoo seen here is the thinnest epidermal electronic device ever and according to the University of Texas at Austin researchers who developed it, the device can take some medical measurements as accurately as bulky wearable sensors like EKG monitors. From IEEE Spectrum: Graphene’s conformity to the skin might be what enables the […]
DJI is the world’s leading designer and producer of easy-to-fly drones and aerial photography systems. If you’re a drone enthusiast, you want a DJI. If you know absolutely nothing about drones and think they’re weird, if you win a DJI you’re going to become a drone enthusiast.Enter this giveaway (for free, yes) and you’ll get a […]
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]