Page 172 - 4188
P. 172
170
Stronger punishments include taking down the content on a given
site or sanctioning the producers of the contents. Journalists and
bloggers may be harassed, arrested or killed, especially in totalitarian
countries. According to the report of Reporters without borders in 2011
there were 66 journalists killed, 1044 journalists arrested, 199 bloggers
and netizens arrested and 62 bloggers and netizens physically attacked
(Reporters without borders, 2011).
Censorship and surveillance have extended continuously and it is
no more limited in totalitarian countries. Presently, we have 68 countries
subject to Internet censorship (Reporters without borders, 2011).
Freedom House's annual survey (2011) of global political rights and
civil liberties indicated, that conditions of control worsened for the fifth
consecutive year in 2010 (Puddington, 2011). In 2012, the percentage of
the world's population living in countries with a fully free press fell to its
lowest level in a decade - and a decline in press freedom took place
especially in several well-established democracies (Deutch Karlekar &
Dunham, 2012).
Also, there are an increasing number of violations and restrictions
for Internet speech in Europe. 300 of the cases of arrested journalists in
2011 took place in Europe (Reporters without borders, 2011). Internet
censorship has been legalized as well. For example, under the Council of
Europe's cybercrime treaty hate speech is prohibited. As a consequence,
ISPs are responsible to take down a content violating the treaty from a
domestic host - or block such content if it is hosted overseas (Nunziato,
2011).
Censorship and surveillance are intertwined on the internet:
monitoring of users and communication aims at revealing the defined
targets and criminalized contents and other tools and methods of
censorship can be further utilized to take into action. Advanced
surveillance technologies may also function as multipurpose tools. Deep
packet inspection can e.g. the intercept and log Internet traffic, it may be
used for enforcement of copyright, to prioritize limited bandwidth and to
track users' behavior - and these tools can serve different parties and
interests (Dutton et al., 2010). Tools of censorship and surveillance
became this way bound together with the other utilities for network
management. Ubiquitous technologies, which enable locating and
recognition of users and extend data collection to various everyday
activities, intensify the scope and worsen the conditions of data
surveillance and censorship.