The Connection Between Wikileaks Censorship And PROTECT IP: Censorship Through Cutting Off Service Providers

The always thought-provoking Yochai Benkler, has a new paper, which, unfortunately (and pointlessly given Benkler’s key points — see update below), is locked up behind an MIT paywall. It explores the “new vector” for censorship found in both the attacks on Wikileaks and the PROTECT IP Act: censorship by forcing service providers to not do business with certain websites. As the abstract notes:

The WikiLeaks affair and proposed copyright bills introduced in the Senate are evidence of a new, extralegal path of attack aimed at preventing access and disrupting the payment systems and advertising of targeted sites. In this model, the attacker may be a government agency seeking to circumvent constitutional constraints on its power or a private company trying to enforce its interests beyond those afforded by procedural or substantive safeguards in the law. The vector of attack runs through the targeted site’s critical service providers, disrupting technical services, such as Domain Name System service, cloud storage, or search capabilities; and business-related services, such as payment systems or advertising. The characteristics that make this type of attack new are that it targets an entire site, rather than aiming for removal or exclusion of specific offending materials; operates through denial of business and financial systems, in addition to targeting technical systems; and systematically harnesses extralegal pressure to achieve results beyond what law would provide or even permit.

As he notes, the law has historically focused on narrowly targeting any attack on speech by removing just the offending works. That’s about the only way that such efforts could line up with the First Amendment (and some may reasonably even argue that point). Yet with government pressure from the likes of Senator Joe Lieberman and the new PROTECT IP Act, they now go for scorched earth policies in which a variety of service providers are suddenly pressured or required to no longer do business with the sites in question. Payment processors, “information location tools,” ad networks and DNS providers are all told they have to cut off the offending site. While the site itself may not be touched, the goal is to effectively starve such sites out, by blocking most reasonable services that such a site needs to exist.

While putting tremendous compliance burdens on those third party service providers, it also goes against the very fundamentals of the First Amendment in that it doesn’t merely seek to stop illegal speech, but takes a broad attack against entire sites. The risk here was clearly laid out earlier this year by over 100 law professors including many of the most respected in the field. The other side has only trotted out one lawyer on their side: Floyd Abrams (who, while famous as a First Amendment lawyer, also does a lot of work with Hollywood). Supporters of this massive threat to the First Amendment keep pretending that as long as they say “Floyd Abrams says it’s fine!” that they can ignore everyone else raising serious and significant First Amendment concerns. The problem, of course, is that even Abrams’ “support” is pretty weak.

In fact, if you read what Abrams actually says(pdf), at points he appears to come out against provisions of PROTECT IP as violating the First Amendment. Such as this:

Any bill providing injunctive relief should be limited to halting infringement and prohibiting future infringement online, not acting as a prior restraint on protected speech in the future. For example, if a site or domain is seized or blocked for infringement, operators must be free to post all their non-infringing content elsewhere, as well as on their original site, once the infringing content is removed.

Except, as we’ve seen with the Puerto 80 case, the government does not allow site operators to repost non-infringing content on their original site at all. Given that Benkler, in the paper above, compares PROTECT IP to the Wikileaks situation, it should equally come as no surprise that Abrams last year ran into some problems for misrepresenting Wikileaks’ actions in trying to support censoring that site.

In the long run, I find it difficult to see how one can be intellectually honest and side with Abrams on these issues, as compared to Benkler, who makes a pretty compelling case that these kinds of attacks on free speech are something to be worried about.

Update: Benkler sends over a link to a non-paywalled version(pdf).

Sourced from TechDirt

 

Advertisements

Activist, Unplugged from the Matrix. Action for Freedom!

Tagged with: , , , ,
Posted in Internet Censorship
4 comments on “The Connection Between Wikileaks Censorship And PROTECT IP: Censorship Through Cutting Off Service Providers
  1. Laura Hamp says:

    Sometimes real, important, critical leaks are not hidden… they are ignored by the media, even the free press in the US.

    I refer to The Expendable Project. This is the leaking for Australian government cables and letters which prove the most horrendous corruption. Lies, hiding critical evidence from a court of law, cover up…. all to avoid the US realizing how unsafe and gangster run their airports were post 9/11.

    This is about the sacrifice of an innocent woman, Schapelle Corby, to slow death in an Indonesian prison. They knew she was innocent. They KNEW it. But they left her. They buried her.

    She is still there, and they are still hiding from their own cables. The Australian media still hide. Read it for yourself in the reports on here:
    http://www.expendable.tv

    Start with the Transit Report. Download the PDF. Head for section 2.4. Then read and read. You will be sickened.

    These are the real and courageous leaks. They are leaks that are not on the radar, when they should be on front pages across the world.

  2. […] The Connection Between Wikileaks Censorship And PROTECT IP: Censorship Through Cutting Off Service P… (censorshipinamerica.com) Share:DiggEmailPrintLike this:LikeBe the first to like this post. […]

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Enter your email address to follow this blog and receive notifications of new posts by email. You have full control over the frequency of emails you receive, and you can unsubscribe at any time. We will NOT share your email address with anyone, ever!

Join 737 other followers

Member of The Internet Defense LeagueBloggers' Rights at EFF
%d bloggers like this: