Child Abuse Images and Cleanfeeds: Assessing Internet Blocking Systems
Files in This Item:
|Child_abuse_images_and_Cleanfeeds.pdf||1.23 MB||Adobe PDF||Download|
|Title:||Child Abuse Images and Cleanfeeds: Assessing Internet Blocking Systems||Authors:||McIntyre, T.J.||Permanent link:||http://hdl.handle.net/10197/7594||Date:||2013||Online since:||2016-04-27T14:23:55Z||Abstract:||One of the most important trends in internet governance in recent years has been the growth of internet blocking as a policy tool, to the point where it is increasingly becoming a global norm. This is most obvious in states such as China where blocking is used to suppress political speech; however, in the last decade blocking has also become more common in democracies, usually as part of attempts to limit the availability of child abuse images. Numerous governments have therefore settled on blocking as their 'primary solution' towards preventing such images from being distributed (Villeneuve 2010). Child abuse image blocking has, however, been extremely controversial within the academic, civil liberties and technical communities, and this debate has recently taken on a wider public dimension. At the time of writing, for example, public pressure has forced the German Federal Government to abandon legislation which would have introduced a police run system while the European Parliament has also rejected Commission proposals for mandatory blocking (Baker 2011; Zuvela 2011). Why have these systems been so controversial? Two lines of criticism can be identified, which might be termed the practical and the principled. The practical argument claims that blocking is ineffective, with ill-defined goals and easily evaded by widely available circumvention technologies (see e.g. Callanan et al. 2009). The principled argument, on the other hand, is that blocking systems undermine the norms associated with freedom of expression in democratic societies (Brown 2008). This latter argument stems from the fact that blocking sits at the intersection of three different regulatory trends – the use of technological solutions ('code as law'), a focus on intermediaries and the use of self-regulation in preference to legislation – which individually and all the more so collectively create a risk of invisible and unaccountable 'censorship by proxy' (Kreimer 2006; McIntyre & Scott 2008). This chapter introduces and evaluates these claims by examining three prominent examples of child abuse image blocking – the United Kingdom Internet Watch Foundation ('IWF') Child Abuse Image Content ('CAIC') list, the European Union sponsored CIRCAMP system and United States hash value systems. It discusses the operation of each system and the extent to which the critics' concerns are borne out. It concludes by considering the lessons which might be learned for proposals to extend blocking to other types of content.||Type of material:||Book Chapter||Publisher:||Edward Elgar||Copyright (published version):||2013 Edward Elgar||Keywords:||Internet; Blocking; Censorship; Self-regulation; Co-regulation; Freedom of expression; Freedom of speech||Other versions:||www.e-elgar.com/shop/research-handbook-on-governance-of-the-internet||Language:||en||Status of Item:||Not peer reviewed||Is part of:||Brown, I. (eds.). Research Handbook on Governance of the Internet||ISBN:||9781849805025||This item is made available under a Creative Commons License:||https://creativecommons.org/licenses/by-nc-nd/3.0/ie/|
|Appears in Collections:||Law Research Collection|
Show full item record
Page view(s) 501,288
If you are a publisher or author and have copyright concerns for any item, please email firstname.lastname@example.org and the item will be withdrawn immediately. The author or person responsible for depositing the article will be contacted within one business day.