As Xeni wrote, Twitter has adopted Google's tactics for coping with legally binding censorship demands: from now on, when it receives a legal demand to censor a tweet, it will only censor that tweet for users in the country from which the demand emanates. Other countries' users will still see it. Users in the censored country will see a notice that material has been censored. Additionally, all censorship demands will be archived at Chillngeffects.org, a clearinghouse that tracks Internet censorship.
In many ways, this is preferable to the existing system, whereby legally enforceable censorship orders would affect all Twitter users. And of course, Twitter only has to honor censorship demands in countries where it has offices and assets; Lower Pottsylvania can require removal of every mention of Glorious Leader, but unless Twitter has an office there, it can safely ignore the orders (JWZ points out
that Twitter has opened offices in many censorious countries and plans to open offices in more that if Twitter expands into censorious countries to attain its goal of one billion users, it will expose itself to more censorship requests, and that this expansion will be profit-driven as well because there's money to be had by setting up local operations there).
It's not a coincidence that Twitter's censorship strategy is similar to Google's -- they were both set up by Alex Macgillivray, a Berkman Fellow and attorney who recently left Google for Twitter.
One interesting difference between Google's censorship handling and Twitter's is the ability of users to directly communicate with one another in a fast and fluid manner. If a tweet is censored in Saudi Arabia, it will be very easy for Saudi users to find non-Saudi users and ask, "What was in that censored message?" and then retweet it.
Among other things, Twitter wants to expand its audience from about 100 million active uses to more than 1 billion.
Reaching that goal will require expanding into more countries, which will mean Twitter will be more likely to have to submit to laws that run counter to the free-expression protections guaranteed under the first amendment in the US.
Twitter able to censor tweets in individual countries
Help wanted: Operations Manager (personable, resourceful, and demonstrates outstanding attention to detail); Civil Liberties Legislative Counsel (advocacy, public speaking, blogging and other social media, media appearances and legislative and regulatory matters related to a variety of high technology public interest legal issues); 2017-19 Frank Stanton Fellowship (recent law school graduates or law students who will […]
M. David Weisman, a magistrate judge in Illinois’s Eastern Division, denied a federal warrant application that would have allowed law enforcement officers to force suspects to unlock their mobile devices with a fingerprint, ruling that the suspects’ Fourth Amendment (undue search and seizure) and Fifth Amendment (self-incrimination) rights protected them from being forced to unlock […]
Texas and Chile have remarkably similar flags (though Chile got theirs first, by a matter of decades) and Texas doesn’t have a Unicode-defined emoji for its flag (just a sprinkling of proprietary ones that do not cross platforms gracefully), so Texans have taken to using the Chilean flag emoji as a shorthand for the longhorn […]
DJI is the world’s leading designer and producer of easy-to-fly drones and aerial photography systems. If you’re a drone enthusiast, you want a DJI. If you know absolutely nothing about drones and think they’re weird, if you win a DJI you’re going to become a drone enthusiast.Enter this giveaway (for free, yes) and you’ll get a […]
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]