Skip to main content

Companies that partner to counter “violent extremism” online must also collaborate to respect rights

Companies that partner to counter “violent extremism” online must also collaborate to respect rights

This week four major tech companies —- Microsoft, YouTube, Facebook, and Twitter —  announced a partnership effort aimed at reducing the amount of “terrorist” content on their platforms. The companies committed to sharing “hashes,” or digital signatures, that will be used to flag images and videos online, to help with removing the content from each of these platforms.
Taking down such content is risky for online expression, and countering violent extremism (CVE) programs must be implemented with great care and precision. We appreciate companies’ concerns and call for consultation regarding important societal and security issues, but they cannot and should not address these problems through private enforcement schemes that fail to meet human rights standards, including for transparency and access to remedy. Doing so would exacerbate existing problems with CVE programs. Embarking on a collaborative program means that all four companies must commit to operating with greater legal clarity and improved transparency regarding how and why they remove content, includingspelling out what happens when they overstep.
There are (at least) three difficult issues here. First, using a hashing method may be a poor fit for dealing with the complexities involved in determining whether content is “extremist” or “terrorism”-related. That’s because the context is important. Companies have used a similar approach to identify and reduce exposure to child sexual exploitation content — content that is illegal to possess or post under any circumstances, across nations. However, when you’re dealing with content that is allegedly “terrorism”-related, where context is critical for determining meaning, the hashing approach could easily lead to removing content that should not be removed. For instance, a reporter, blogger, or citizen journalist might use an image that had been hashed and flagged for potential removal between the companies. Under the proposal, when an image is flagged for removal, it would then undergo human review under company standards.
It’s not clear how companies would apply these standards in practice. As it stands, each company has community standards that are imprecise, with varying definitions for “extremist” or “terrorism”-related content that exist outside of clear legal mandates. It remains impossible to evaluate how those community standards stack up compared to human rights standards without more transparency regarding how, when, and why content is removed.
Finally, it’s disheartening to see these platforms eagerly collaborate when it comes to an initiative for restricting expression, while insisting that they cannot collaborate in the same way to protect users’ rights. The third pillar of the United Nations ‘Ruggie’ Framework on Business & Human Rights says that companies should jointly provide people with access to remedyfor business-related harms. Yet the average user today has no meaningful understanding of how companies enforce terms of service; how to contact companies for appeal when their accounts are suspended or their content gets taken down; or how to prevent their data from being spread and sold across the internet. Companies are claiming that they cannot engage on remedy because they have billions of users, while clearly innovating to “scale up” their capacity to restrict content.
The big picture is disturbing. Under heavy pressure from governments to take action, companies are coming closer to creating what amounts to a private body of law that they alone control. It’s not clear how the collaborative, cross-company CVE program will be administered, and whether/how companies plan to offer people or groups unhappy about their content being hashed and targeted for proscription the appropriate, rights-respecting mechanisms for accountability, transparency, and redress.
Further, this sort of well-meaning joint effort may only scrape out the bottom of the content barrel. It’s creating a mechanism for joint action by some — but notably not all — of the world’s largest internet platforms to remove “terrorism”-related content. It’s possible that the program could be counter-productive, inflaming rather than discouraging extremism. Yet this mechanism, once created, could become a black box difficult to see into, understand, or push back against. Blacklists grow and missions creep. With the often-vague concept of “terrorist” content at its heart, and free expression on the table, this program could bleed in many directions.
Access Now recently published a policy guide on how to evaluate proposals like this to counter “violent extremism” online. The guide maps out a set of high-level principles and provides specific recommendations based on those principles. We are concerned that the CVE program announced by Microsoft, YouTube, Facebook, and Twitter could undermine users’ rights and weaken the human rights law norms that apply in this area. That’s why we created the guide: to help companies and other stakeholders fortify those rights-respecting norms.
As we have noted before, if we do not protect the freedom and openness of our internet, we risk destroying users’ trust, globally. This would play right into the hands of those who wish to inflame conflict and feed extremism. We ask that companies work closely with civil society stakeholders globally to preserve trust and defend rights.

From: accessnow.

Comments

Popular posts from this blog

PROPOSAL FOR INFRASTRUCTURE DEVELOPMENT: TELEMEDICNE IN CROSS RIVER STATE, NIGERIA

Akinremi Peter Taiwo The embracement of information and communication technology had contributed greatly to the development of Nigeria as a whole. ICT infrastructure can be said to be the overall name used to describe all communications hardware and software someone uses as individual, in organization to get work done.  ICT infrastructures are technological tools and resources used to communicate, disseminate, store and manage information effectively.(infoxchange.net) In Nigeria, there are various ICT services which are unfolding as a result of invention of internet and the embracement of information and communication technology by the Government. The development of this great nation depends on the deployment of ICT infrastructure which will lead to various opportunities on her development. Recently, the Government of Cross river state signed  a contract worth N1.1 billion naira to MTN Communication Limited, Nigeria  for  broadband  infrastructure in calabar ( www.crrossrivers

SESSION REPORT ON DIGITAL INCLUSION IN AFRICA AS THE MOST IMPORTANT RIGHT DURING THE INTERNET FREEDOM FORUM, 2018 IN ABUJA BY AKINREMI PETER TAIWO, ACSIS WEST COORDINATOR.

The session seeks to identify the barriers to greater digital inclusion and recommend ways of overcoming these obstacles towards empowering Africans with the transforming power of ICTs. Tope Ogundipe, the Director of Programs with Paradigm Initiative moderated the session. She reflected on the 21% internet penetration in Africa, a figure that reflects the underdevelopment on a continent with a population of around 1.2billion. On the panel were Chioma Agwuegbo from CC Consulting Services (Nigeria), Akinremi Peter Taiwo, a West Africa Coordinator of African Civil Society (Nigeria), Olajumoke Adekeye, a statistician (Nigeria) and Poncelet Ileleji from The Gambia. Chioma, the first speaker listed three key factors that must be met before access would become a priority for the human kind which are Food, Shelter and Clothing. She further looked at how poverty has handicap many Africans in the area of affordability of computers and internet access. Peter, who was the second speaker

FLOOD COULD CAUSE NIGERIA POTENTIAL DAMAGES

FLOOD COULD CAUSE NIGERIA POTENTIAL DAMAGES   Well, little effort has been put in place in order to help combat the unforeseen flood disaster. Among this is awareness to help people prevent these challenges, building of channel for water passage, drainage and evacuating the living and building along the water path. Despite the effort putting in place people still show nonchalant attitude toward flood awareness program. I would still say that if Nigeria experiences more rainfall that is beyond that of 2012, many lives and property worth millions will be destroy as a result of nonchalant attitude of the people, small size of drainage system and low quality of material for building drainage system and inaction of the leaders. The Heavy rain fall experienced by Nigerian cities early 2012 killed 363 and rendered useless over 2,100,000 people as of November, 2012(Reuters, 2012) The cities such as Lagos, Ibadan (oke-ayo and Eleyele), Plateau, Jos, Cross River, Borno, Benue, Kogi, E