Government Censorship and Surveillance
February 28, 2023
CS 195, Spring 2023 @ UC Berkeley
Lisa Yan https://eecs.link/cs195
1
LECTURE 07
Why Talk About Censorship and Surveillance?
You operate and live in a society.
You build technology (which does not exist in a vacuum).
2
Quick disclaimer
We will talk a lot about the U.S. and China today.
As always, I welcome you to share your personal thoughts and opinions around such a hotly debated topic.
3
Public Safety vs. Public Surveillance
Public Safety vs. Public Surveillance
China: Overt Surveillance and Export
U.S.: Covert Surveillance
Surveillance Technologies and Local Police
U.S. Tech Corporate Presence in Authoritarian Governments
Closing Thoughts
[Extra] Several Case Studies
4
2022 Freedom on the Net Key Findings
Freedom House (a U.S. funded think tank) publishes a report every year.
Freedom House: Explore the Map
5
FreedomHouse, 2022 [link]
2022 Global Peace Index
Institute for Economics & Peace (an Australian funded think tank) publishes a Global Peace Index every year.
(lower score/5 implies more peaceful country)
Global Peace Index: map
6
Poll Everywhere
What are some of your personal thoughts on the tradeoffs between public safety and government surveillance?
7
🤔
8
China: Overt Surveillance and Export
Public Safety vs. Public Surveillance
China: Overt Surveillance and Export
U.S.: Covert Surveillance
Surveillance Technologies and Local Police
U.S. Tech Corporate Presence in Authoritarian Governments
Closing Thoughts
[Extra] Several Case Studies
9
Power and Control
We live in a world of dramatic power imbalance. Power begets power.
10
The Cautionary Tale of Clark Kerr (LATimes)
State Power
State power is the power of a country to exercise authority within its borders.
“A compulsory political organization with continuous operations will be called a 'state' [if and] insofar as its administrative staff successfully upholds a claim to the monopoly of the legitimate use of physical force in the enforcement of its order.” - Max Weber
Arguably, power is a necessary evil. There are many bad actors out there who can only be compelled, or deterred, by force.
11
Chinese Internet Censorship
Internet access in China is heavily censored.
12
FreedomHouse, 2021 [link]
Chinese Internet Censorship, Covid19, and #我要言论自由
13
NPR, Feb. 2020 [link]
Chinese Internet Censorship
Users face real world penalties for violations.
14
FreedomHouse, 2021 [link]
Export of Surveillance Equipment
“Made in China, Exported to the World: The Surveillance State” [NYTimes, 2019, link]
[The views expressed in this video are those of the authors]
15
Poll Everywhere
What are your immediate thoughts to this video?
16
🤔
17
U.S.: Covert Surveillance
Public Safety vs. Public Surveillance
China: Overt Surveillance and Export
U.S.: Covert Surveillance
Surveillance Technologies and Local Police
U.S. Tech Corporate Presence in Authoritarian Governments
Closing Thoughts
[Extra] Several Case Studies
18
Abuse of Power in the U.S.
Like all powerful countries, the American state has abused its power, both externally and internally.
19
Martin Luther King Jr.
In the 1960s, the FBI was deeply involved in trying to discredit Martin Luther King Jr.
Recommended viewing: Eyes on the Prize, Episode 10, “The Promised Land”:�Kanopy (UCB login)
20
Today
American Intelligence agencies have grown dramatically over the past century.
After 9/11, the power of intelligence�agencies was dramatically increased.
21
The NSA and Edward Snowden
The NSA has a large number of directorates including:
NSA collects information for various reasons:
22
The NSA and Edward Snowden
In 2013, Edward Snowden, an employee of an NSA contractor, leaked a large amount of information about the signals intelligence directorate.
Timeline: BusinessInsider link
23
We will focus on leaks involving the internet.
Some Technical Details About The Internet (SIMPLIFIED!)
The Internet is both software and hardware!
Each level is a combination of dedicated hardware and software.
24
Internet Backbone Cable Interception
2013: Reveal that backbone providers gave free access to GCHQ (UK)/NSA:
25
The Guardian, 2013 [link]
PRISM and MUSCULAR
The PRISM program is a way for the NSA to get information directly from “the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets”
26
MUSCULAR
MUSCULAR was (is?) a program to covertly intercept unencrypted traffic inside Google and Yahoo networks.
27
Some Technical Details About The Internet (SIMPLIFIED!)
The Internet is both software and hardware!
Each level is a combination of dedicated hardware and software.
Data includes both the “actual” data�(like web page contents)
28
Metadata can be as revealing as the actual data!
IPv4 Packets
29
Could be encrypted
Surveillance in the Modern Era
Privacy advocates fear that ubiquitous data collection and dissemination (CCTV, Facebook, Google, mobile networks) have created a world that is at risk of Panopticism.
As Nick Weaver (EECS instructor) noted once upon a time: Reassuring how little abuse there was (e.g. stock trading, political surveillance, etc.).
30
Two takeaways of internet technology
Other incidents worldwide (many accidental):
31
Open Question
How should the federal government balance surveillance with the privacy of its citizens?
32
Breakout [10 minutes]
How should the federal government balance surveillance with the privacy of its citizens?
Padlet:
33
🤔🤔🤔
Attendance Code, 1-minute
34
✅
Attendance closes at the end of lecture.
Please submit your bCourses assignment by ~end of class (5:00pm Pacific).
So far: Why Talk About Censorship and Surveillance?
You operate and live in a society.
You build technology (which does not exist in a vacuum).
35
Up next
Surveillance Technologies and Local Police
Public Safety vs. Public Surveillance
China: Overt Surveillance and Export
U.S.: Covert Surveillance
Surveillance Technologies and Local Police
U.S. Tech Corporate Presence in Authoritarian Governments
Closing Thoughts
[Extra] Several Case Studies
36
Local Police Technologies
Citizen Virtual Patrol (Newark, NJ)
Automatic License Plate Readers:
ShotSpotter
Phone data Stingray,�predictive policing, etc…
37
NPR, 2020 [link]
ACLU, 2015 link
Many of these technologies are developed and maintained by private/for-profit corporations!!!
ShotSpotter
Ultimately, the technology does not particularly infringe on audio privacy.
However, it sets precedents on deployment, regulation, and state-corporate relations.
38
ACLU, 2020 [link]
ShotSpotter deployment
From the ACLU: Police pick neighborhoods based on where most shootings are
39
ACLU, 2020 [link]
U.S. Tech Corporate Presence in Authoritarian Governments
Public Safety vs. Public Surveillance
China: Overt Surveillance and Export
U.S.: Covert Surveillance
Surveillance Technologies and Local Police
U.S. Tech Corporate Presence in Authoritarian Governments
Closing Thoughts
[Extra] Several Case Studies
40
American Companies in China
Websites blocked in China:
Anybody want to guess why Bing is allowed to continue to operate?
The history of Google and China is interesting!
41
China and Google 2006-2010
Before 2010, Google offered a censored search engine at google.cn.
42
Google, 2010 [link]
China and Google 2006-2010
Before 2010, Google offered a censored search engine at google.cn.
43
Google, 2010 [link]
“These attacks and the surveillance they have uncovered--combined with the attempts over the past year to further limit free speech on the web--have led us to conclude that we should review the feasibility of our business operations in China. We have decided we are no longer willing to continue censoring our results on Google.cn, and so over the next few weeks we will be discussing with the Chinese government the basis on which we could operate an unfiltered search engine within the law, if at all. We recognize that this may well mean having to shut down Google.cn, and potentially our offices in China.” [Link]
Two months later, Google decided to end its censored search product and forwarded users to its uncensored Hong Kong search engine google.hk, effectively exiting from the Chinese market. [Link]
44
China and Google? 2018/2019
2018: The Intercept leaked documents that suggested Google may be re-entering the Chinese market. [Link]
45
The Intercept, 2018 [link]
Employee protest
For a long time, Google declined any official comment on this project.
46
The New York Times, 2019 [link]
China and Google 2018/2019: Jack Poulson
Jack Poulson (senior scientist who resigned):
47
The New York Times, 2019 [link]
BREAKOUT Question: ~10 Minutes
What should actions should be taken by an employee who disagrees with the company’s decision to participate in these technologies?
48
🤔🤔🤔
Closing Thoughts
Public Safety vs. Public Surveillance
China: Overt Surveillance and Export
U.S.: Covert Surveillance
Surveillance Technologies and Local Police
U.S. Tech Corporate Presence in Authoritarian Governments
Closing Thoughts
[Extra] Several Case Studies
49
Employee power and Sousveillance
You all have power!!! But harnessing it requires awareness.
Surveillance:
Sousveillance:
50
Attendance Code, 1-minute
51
✅
Attendance closes at the end of lecture.
Please submit your bCourses assignment by ~end of class (5:00pm Pacific).
[Extra] Turkey: A Case Study
Public Safety vs. Public Surveillance
China: Overt Surveillance and Export
U.S.: Covert Surveillance
Surveillance Technologies and Local Police
U.S. Tech Corporate Presence in Authoritarian Governments
Closing Thoughts
[Extra] Several Case Studies
52
Turkey: A Case Study [Bonus Content]
53
"The natural progress of things is for liberty to yield and government to gain ground." - Thomas Jefferson to Edward Carrington, 1788.
From Freedom House (link)
54
2012
2016
Turkey’s “freedom on the net score” has declined from 46 to 66 since 2012.
Government and Politics in Turkey
After World War I and a subsequent war of independence, the Republic of Turkey arose from the ashes of the ancient Ottoman Empire.
Foundation of the government was led by Mustafa Kemal Atatürk.
Three branch government:
The government is deeply secular (non-religious).
55
Recep Tayyip Erdoğan (Source)
In 1998, Istanbul’s mayor Recep Erdoğan was banned from public office and imprisoned for four months as part of a purge of perceived Islamist influence.
In 2001, Erdoğan and others founded a new political party called the “Justice and Development Party” or “A.K. Party”.
56
The AKP and Censorship of the Gezi Park Protests (Source)
Since taking power, the AKP has slowly ratcheted up censorship.
�
57
The AKP and Censorship of a Corruption Scandal (Source)
In early 2014, several recordings were leaked on SoundCloud.
58
Other Internet Bans in Turkey (Source)
59
Censorship in Turkey
Beyond simple censorship and filtering, Turkey has taken harsh actions against its citizens:
60
The Coup
On July 15, 2016, a portion of the Turkish Armed Forces attempted to seize control of the government while Erdogan was away. Physical infrastructure seized by plotters (bridges, airports, parliament, TV media).
Amazing role of social media (Link):
61
The Aftermath
Government response was (naturally) harsh:
62
Erdogan has long sought a rewriting of the constitution of Turkey.
Until this January, did not have the 330 votes needed to rewrite constitution.
Will be interesting to see how internet freedom evolves in Turkey in the coming years.
63
[Extra] TikTok, Huawei, WeChat
Public Safety vs. Public Surveillance
China: Overt Surveillance and Export
U.S.: Covert Surveillance
Surveillance Technologies and Local Police
U.S. Tech Corporate Presence in Authoritarian Governments
Closing Thoughts
[Extra] Several Case Studies
64
U.S. Officials Say Huawei Can Covertly Access Telecom Networks
Wall Street Journal, Feb 2, 2020 by Bojan Pancevski [Source]
65
Donald Trump extends Huawei ban through May 2021
The Verge, May 13, 2020 by Chaim Gartenberg [Source]
66
WeChat threatens American values, but careless ban will make the world less free [WaPo OpEd 9/22]
67
WeChat threatens American values, but a careless ban will make the whole world less free
68
Trump Approves Deal Between Oracle and TikTok
New York Times, September 19, 2020 by Ana Swanson, David McCabe and Erin Griffith [Source]
69
TikTok
What are some potential security threats that TikTok presents?
70
Concerns with TikTok
71
EFF, 2019 [link]
Concerns with TikTok
72
EFF, 2019 [link]
Concerns with TikTok
73
Wired, 2020 [link]
The EFF’s Take on the TikTok Ban
74
EFF, 2019 [link]
The EFF’s Take on the TikTok Ban
75
EFF, 2019 [link]
From “The Progressive Case for a TikTok Sale“
76
Wired, 2020 [link]
From “The Progressive Case for a TikTok Sale“
77
Wired, 2020 [link]
From “The Progressive Case for a TikTok Sale“
78
Wired, 2020 [link]
From “The Progressive Case for a TikTok Sale“
79
Wired, 2020 [link]
Breakout Discussion
Is it reasonable for the United States to require TikTok to be sold lest they be banned from operating in the United States? Should WeChat be banned? How is this different than the Chinese approach to control of private platforms?
80
No disguising proposed TikTok deal is a dirty and underhanded trick
China Daily, September 23, 2020. No author name provided. [Source]
81
TikTok and the USA Today
TikTok Seen Moving Toward U.S. Security Deal, but Hurdles Remain
A draft agreement with the Biden administration to keep the Chinese-owned video app operating in the United States is under review. That could mean more wrangling.
https://www.nytimes.com/2022/09/26/technology/tiktok-national-security-china.html
82
BREAKOUT Question: ~10 Minutes
Should the US try to push TikTok towards being a “US Company”? Is it beneficial for the US to try to push out or exclude Chinese companies?
83
[Extra] More Slides
84
Full Take Audio and Metadata Collection
In 2014, it was revealed that the NSA was recording the audio of nearly every mobile call made in the Bahamas and (probably) Afghanistan (Link, Link)
85
Yahoo Webcam Chat Interception (Link)
In a program codenamed Optic Nerve, the NSA and the UK equivalent (GCHQ) somehow intercepted Yahoo webcam chat videos.
86
Key Leaks by Edward Snowden
PRISM (Link): (the big kahuna), collection of lots of data from major platforms through legal compulsion
EvilOlive (Link): American internet metadata
Calls, emails, texts of Germans (Link)
XKeyScore (Link)
MUSCULAR (Link) - intercepting of data in company’s private data centers (back door version of PRISM)
Cable taps (Link)
Recording of all mobile calls in the Bahamas and Afghanistan (Link)
87
The intelligence coup of the century
Washington Post, Feb 11, 2020 by Greg Miller [Source]
88
Fun read speculating about Crypto AG’s ownership from 2013: Link