Professional Documents
Culture Documents
Hacktivism
Name:Abhishek chatterjee
: Dr Vikas Gandhi
Reg No:11A006
IHL & Human Rights
Submitted To
Faculty of
Batch :2011-16
1 | Page
Abstract
Nonviolence is a weapon of the strong.
Mahatma Gandhi
Satyagraha was most powerful weapon which was used by the Mahatma Gandhi
and many of other revolutionary used this weapon against the British rulers. In
modern world internet is became most powerful forum for people to protest against
the actions of Government or corruption and against injustice.In November 2012,
Central Government amended the section 66(a) of Information Technology Act 2001
for internet censorship. After reacting on action Telecom Minister KapilSibals
personal website has been hacked and defaced allegedly by Anonymous India
group for the minister's stand on Information Technology Act. Hacker hacked the
website of KapilSibal and sent a message that "KapilSibal is the world's biggest
retard. Born with a below 60 IQ he thought he could mess with the Internet and let
the elite of his party suppress freedom of speech."This research paper analyze the
legal various question like whether online protest is similar like other civil
disobedience or fall in category of cyber-crime.
2 | Page
Introduction
The foundations of political protest online (what is traditionally understood by the
term hacktivism) were laid down by the founding parents of the internet based upon
their philosophical and ethical commitment to freedom of speech and their mastery
of their technological sphere.1 But the question arise here what is hacktivism?
Hacktivism is the fusion of hacking and activism; politics and technology. More
specifically, hacktivism is described as hacking for a political cause. In this context,
the term hacker is used in reference to its original meaning. As defined in the New
Hacker's Dictionary, a hacker is "a person who enjoys exploring the details of
programmable systems and how to stretch their capabilities" and one who is capable
of "creatively overcoming or circumventing limitations". 2 Activism is defined as "a
policy of taking direct and militant action to achieve a political or social goal". 3
Therefore, a clinical definition of hacktivism is: a policy of hacking, phreaking or
creating technology to achieve a political or social goal. 4
The Evolution of Hacktivism
Hacktivism is a recombinant initiative comprised of two divergent communities
(hackers and activists). According to Oxford Dictionary hacker is a person who uses
computers to gain unauthorized access to data or informal an enthusiastic and skilful
computer programmer or user.5The hacker ethic formulated by Steven Levy in his
book "Hackers: Heroes of the Computer Revolution" outlines the hacker dogmas: 6
1An overview of the early hacker movement Raymond, E.S. (2002), 'A Brief History of
Hackerdom' http://www.catb.org/~esr/writings/cathedral-bazaar/hackerhistory/ar01s07.htmlThe later hackermovement up to the present growth of the Free
Libre and Open Source movement can be found at
Raymond, E.S. (2000), 'The Revenge of the Hackers'
http://www.catb.org/~esr/faqs/hacker-revenge.html The
ethical hacker ethos is also fully explored at Raymond, E.S., 'How to be a Hacker'
(2001)http://www.catb.org/~esr/faqs/hacker-howto.html
2http://www.hack.gr/jargon/html/H/hacker.html
3http://dictionary.reference.com/search?q=activism
4This definition appeared on the CULT OF THE DEAD COWs now defunct website
http://www.hacktivism.org which is archived here:
http://web.archive.org/web/19981203083935/
5http://oxforddictionaries.com/definition/english/hacker
3 | Page
i.
ii.
iii.
iv.
v.
vi.
6http://mosaic.echonyc.com/~steven/hackers.html
7http://news.cnet.com/8301-27080_3-57406793-245/old-time-hacktivistsanonymous-youve-crossed-the-line/
8http://www.phrack.org/phrack/6/P06-03
9http://www.phrack.org/phrack/14/P14-03
4 | Page
hacktivist incidents to date, but this does not involve the largest number of
participants. The types of tactics used by political cracking include site defacements,
redirects, denial of service attacks, information theft, and sabotage. 15
Political crackers also tend to work alone or in very small groups when carrying out
their attacks.16 Despite working with limited support, the impact of the attacks is not
jeopardized in any manner. A political cracker can still experience a high degree of
political efficacy from their attacks such as defacing a website and attracting
significant media attention.17
The first political cracking focused on hacker-specific issues like the regulation of the
Internet and the prosecution of individual crackers. 18 Today, the focus of political
cracking activities involves international cyber wars between Israelis and
Palestinians, Indians and Pakistanis, and Chinese and American.
One of the more public known political crackers is a group called the Worlds
Fantabulous Defacers (WFD). This group emerged in November 2000 and was
responsible for a significant number of anti-Indian and anti-Israeli defacements over
the next two years (Samuel, 2004). Internet security experts estimated in September
2002 that the number of attacks during November 2001-September 2002 exceeded
400. Many of these attacks were used to attract media attention and promote
awareness of human rights abuses of Muslim populations in either Palestine or
Kashmir.19
2. Performativehacktivism
Performativehacktivism differs from political cracking since its actions consist of
legally ambitious activities from hacktivists with artist-activist backgrounds. 20 Their
hacking activities for political purposes are in the context of a political theatre. This is
15Ibid. p.58
16Ibid. p.63
17Ibid. p 59
18Ibid. p-69
19Science and Technology to Counter Terrorism, Proceedings of an Indo-U.S.
Workshop, National Academy of Sciences, International Strategic and Security
Studies Programme of the National Institute of Advanced Studies, Bangalore,
India, p-38
20http://www.alexandrasamuel.com/dissertation/pdfs/Samuel-Hacktivismentire.pdf p. 71
6 | Page
26http://www.thing.net/~rdom/ecd/ecd.html
27Ibid. p. 82
28http://www.alexandrasamuel.com/dissertation/pdfs/Samuel-Hacktivismentire.pdf p. 96
29Ibid.
8 | Page
The legal risks for political coders vary depending on the type of attacks, but are
generally less serious than those of political crackers and nearly the same as
performativehacktivists. A Norwegian teenager who created the DeCSS software
was indicted in Norway and cannot travel to the United States due to fears of being
prosecuted there. Hacktivismo is an Internet censorship project sponsored by the
cDc that has received tremendous media attention. To mitigate legal risk,
Hacktivismos Board of Directors includes Cindy Cohn, the lawyer for the Electronic
Frontier Foundation.30 The founder of Hacktivismo, Oxblood Ruffin, also has his own
problems to deal with. He states that traveling to China is not an option due to his
past activities.
Peekabooty
Ruffins plan was to develop software that countered the Internet restrictions found in
some countries. Saudi Arabia, Cuba, Tunisia, and China all have state-sponsored
firewalls that limit access to the Internet. 31Peekabooty is software that was
developed to enable users within countries where the web is censored to bypass
those censorship measures.32 The idea behind this software is that users in countries
where websites may be banned will be able to view all websites by accessing the
sites through a different intermediary. Users across the Internet connect to the ad
hoc network of computers running Peekabooty that retrieves the websites and relays
them back to the user. This allows users to bypass firewalls, both national and
corporate, and access any website from their own computers.
Types of attacks used by hacktivists
The different types of hacktivists all have unique tools and type of attacks that they
use to convey their messages or to cause harm. Samuel notes that there are at least
nine distinct forms that include: site defacements, site redirects, denial of service
attacks, information theft, information theft and distribution, site parodies, virtual
sabotage and software development.33 The different types reflect the different
30https://www.eff.org/
31http://www.alexandrasamuel.com/dissertation/pdfs/Samuel-Hacktivismentire.pdf p. 101
32http://www.theregister.co.uk/2001/05/18/censorware_outfit_targets_cdcs_anon
ymity/
33http://www.alexandrasamuel.com/dissertation/pdfs/Samuel-Hacktivismentire.pdf p. 17
9 | Page
political cultures between each form of hacktivism. Denning also notes the use of
email bombs by some hacktivists.34
Site defacements are those acts of hacking websites and replacing the original
content with new content that bears a new message. These attacks carried out by
hacktivists often contain a political message such as criticism of the organization that
is being hacked or some other cause or organization in which the websites
organization is associated with. Site defacements remain the most common form of
hacktivism. One well-known example is in August 1999 where Chinese hackers
defaced several Taiwanese and government websites with pro-Chinese messages.
Denning notes that one message read, Only one China exists and only one China is
needed. 35
Site redirects are similar to site defacements in the sense that users are shown a
website displaying a political message. However, the difference is that the web
server is hacked, changing its addressing so visitors are redirected to an alternative
website that usually contains the political message.
Denial of service attacks (DoS) are powerful in causing harm but are rarely used by
hacktivists. These attacks are designed to prevent users from gaining access to the
systems. This is done through three basic types of attacks: consumption of
computational resources such as bandwidth, disruption of configuration information
such as routing information and disruption of physical network components. A prime
example is in 2001 when Chinese hackers attacked US websites due to a collision
between Chinese and US military planes. Chinese hackers launched DoS attacks on
hundreds of US websites but the impact the minimal.
Information theft involves hacking into websites and stealing information. The goal of
this attack is to publicly embarrass an organization by showing a lack of information
security and sometimes go as far as publicly displaying the stolen information. One
example occurred in 2001 when the World Economic Forums computer system was
infiltrated and conference participants email addresses and travel itineraries were
stolen and sent to a Swiss newspaper.36
Virtual sabotage includes online activities that are designed to manipulate or damage
the information technology of the target. Such sabotage can occur in the form of
viruses and worms that can cause harm by destroying data in the computer system
when infiltrated. The first protest to use a worm occurred when antinuclear hackers
released a worm into the U.S. National Aeronautics and Space Administrations
SPAN network in 1989 (Metac0m, 2003). Scientists that were logging into their
computer systems were greeted with a banner from the WANK worm. John
McMahon, protocol manager with NASAs SPAN office estimated that the worm cost
them up to half a million dollars of wasted time and resources.
Virtual sit-ins involves gathering hundreds to thousands of protesters to
simultaneously reload web pages continually to overload the servers causing them to
crash or slow down.37 This technique depends on the number of participants in order
to succeed with a meaningful impact.
Site parodies involve replicating a target websites appearance or by using a web
address that is confusingly similar to the target website (Samuel, 2004). An example
occurred in 1999 when a group called ark (pronounced art mark) created an
anti-globalization website using the web address http://www.gatt.org. This was meant
to cause confusing between the WTO and GAAT, its predecessor organization. The
result was that the website replicated the appearance of the WTO website except the
content was produced to be highly critical of the WTO. 38
Software development involves creating open source code and distributing it to
hackers in carry out specific political purposes. This type of code is free and allows
users to modify the code and improve upon it in order to maximize the effectiveness
of potential attacks.
Email bombs involve sending thousands of email messages at once, usually
targeted to government policymakers, with the use of automated software. 39 The
result is that the mailbox will overflow, making it impossible for the user to accept or
perhaps locate legitimate email.
Impact of hacktivism on businesses
37Denning, D. E. (2002). Activism, Hacktivism, and Cyberterrorism: The Internet as a
toolinfluencing foreign policy. Retrieved July 18, 2008, from
http://www.rand.org/pubs/monograph_reports/MR1382/MR1382.ch8.pdf
38http://www.alexandrasamuel.com/dissertation/pdfs/Samuel-Hacktivismentire.pdf p. 23
39Denning, D. E. (2002). Activism, Hacktivism, and Cyberterrorism: The Internet as a
toolinfluencing foreign policy. Retrieved July 18, 2008, from
http://www.rand.org/pubs/monograph_reports/MR1382/MR1382.ch8.pdf
11 | P a g e
The growing number of hacktivist acts is causing a concern for many organizations.
The importance is even greater for professional accountants and IT professionals in
assessing the effectiveness of a clients information systems and controls. This
requires an understanding of the impact various attacks can have and the steps to
minimize any damages such as downtime, theft of data and loss of reputation.
Manion and Goodrum states that hacktivism poses a threat at two levels: the private
industry/intellectual property level and the national/government security level. 40 The
authors note that the only entities that truly benefit from the Internet are large
transnational business corporations. Hacktivists often do not wish to cave in or agree
with corporate manipulation, thus, prompting attacks on such targets. Many of these
corporations are clients of the Big 4 accounting firms. Therefore, auditors will need to
be aware of such attacks and ensuring that clients have effective controls in place to
allow them to continuously operate.
For many businesses, the most significant impact from hacktivism is not the potential
downtime from the attacks, but the impact such attacks may have on their reputation
(Anderson, 2008). The attacks can quickly gain media attention so that when attacks
have minimal impact on the organization, the media coverage creates a more
significant problem for the target. Anderson believes that as technology continues to
develop, disruption will increase both in volume and impact. 41 Also, hacktivists will
continue to use public relations as a major weapon in targeting organizations.
While site defacement can severely impact an organizations reputation, it is
responsible for the least amount of damages. 42 Since site defacement is not very
costly, many organizations act economically and do not spend very much to prevent
such attacks. This approach may make financial sense, but many organizations
should still develop a contingency plan to outline the steps necessary to quickly
reverse such attacks.
One of the more devastating attacks is caused by denial of service kits. This poses a
major concern for businesses because it can be difficult to counter such attacks. The
problem is due to the fact that it is difficult to identify whether the increase in traffic is
40Manion, M. &Goodrum, A. (2000). Terrorism or civil disobedience: toward a hacktivist
ethic. ACMDigital Library, 30(2), 14-19.
12 | P a g e
from hackers or whether they are legitimate. 43 A prime example can be a new
product launch by Microsoft that is made available on their website. There are many
users that are against the monopolistic behaviour of the company and so, may time
their attacks during times of increased traffic such as product launches.
In the early 1990s, a few Burmese exiles opposed to the regime in Rangoon began
communicating on the Internet via electronic mail. Among the first was CobanTun, an
exile living in California who redistributed newspaper reports from Bangkok,
Thailand, and other information about Burma on the Usenet system, using an
electronic mailing list called seasia-l.46 The first regular and consistent source of
information on Burma available on the Internet was BurmaNet. It took shape in
Thailand in late 1993, the brainchild of student Douglas Steele. In October 1993, at
the Internet Center at Bangkoks Chulalongkorn University, he perused an online
Usenet newsgroup called soc.culture.thai and Thai newspapers that carried the only
in-depth English-language accounts of events in neighboring Burma. 47 Steele
realized that the Internet could be used to provide information about human rights
43Barnes, S. (2008). The Changing Face of Hacktivism. Retrieved July 18, 2008,
fromhttps://forums.symantec.com/syment/blog/article?message.uid=323368
44http://ncfm.org/libraryfiles/Children/NetworkNetWar/MR1382.ch5.pdf
45Ibid.
46Various interviews and electronic correspondence with Coban Tun.
47http://ncfm.org/libraryfiles/Children/NetworkNetWar/MR1382.ch5.pdf
13 | P a g e
Egyptian Revolution and online ActivismWe use Facebook to schedule the protests, Twitter to coordinate, and YouTube to
tell the world.52The 6 April Youth Movement (Arabic: 6 )is an Egyptian
Facebook group started in Spring 2008 to support the workers in El-Mahalla ElKubra, an industrial town, who were planning to strike on 6 April. Activists called on
participants to wear black and stay home on the day of the strike. Bloggers and
citizen journalists used Facebook, Twitter, Flickr, blogs and other new media tools to
report on the strike, alert their networks about police activity, organize legal
protection and draw attention to their efforts. The New York Times has identified the
movement as the political Facebook group in Egypt with the most dynamic debates.
As of March 2012, it had 325,000 53 predominantly young and educated members,
most of whom had not been politically active before; their core concerns include free
48 Interview with Douglas Steele, Washington, D.C., February 2, 1997; A. Lin
Neumann, The Resistance Network, Wired, January 1996, Vol. 4.01, p. 108.
49 Neumann, The Resistance Network, 1996; Martha FitzSimmon, ed.,
Communicators of Conscience: Humanitarian and Human Rights Organizations
Use of the Internet (New York: The Freedom Forum Media Studies Center, 1994),
p. 25
50 The BurmaNet News, No. 603, January 3, 1997. The full text of BurmaNets daily
newsreports are archived at ftp://Sunsite.unc.edu/pub/academic/politicalscience/freeburma/bnn/.
51http://ncfm.org/libraryfiles/Children/NetworkNetWar/MR1382.ch5.pdf
52 Anonymous Cairo activist, quoted in Nadine
KassemChebib&RabiaMinatullahSohail, The Reasons Social Media Contributed to
the 2011 Egyptian Revolution, International Journal of Business Research and
Management 3 (2011): 139.
14 | P a g e
53https://www.facebook.com/shabab6april
54http://www.bbc.co.uk/news/world-middle-east-12400319
55 Nicholas D. Kristof, Tear Down This Cyberwall! The New York Times, 17 June, 2009.
Accessed 30 October, 2011. http://www.nytimes.com/2009/06/18/opinion/18kristof.html.
56http://www.culturaldiplomacy.org/academy/content/pdf/participantpapers/2012-02-bifef/The_Role_of_Social_Media_in_Political_Mobilisation__Madeline_Storck.pdf
57Arab Social Media Report 2011, 6www.arabsocialmediareport.com/
58Law Commission Report No. 186, Computer Misuse (Cm 819) (HMSO, 1989)
15 | P a g e
Section 2 Intent to commit a further offence- This section pre requires commission of an
offence under section 1 along with the intent to commit, or facilitate the commission of
further offence. Such further offence is any other offence for which punishment is fixed by
law and which may be an offence under any other Act.
R v. Strickland and R v. Woods 60, where the defendants were given six-month jail
sentence for conspiracy to commit offence under Section 1 and 3 of the Computer
Misuse Act , 1990. The defendants activities were said to have caused damage,
valued at 1,23,000 pound to computer system ranging from those of the Polytechnic
of Central London to NASA. The opinion of the Judge was expressed in following
words:
There may be people out there who consider hacking to be harmless but hacking is
not harmless. Computer now, from a central role in our lives containing personal
details..it is essential that the integrity of those system should be protected and
hacking puts that integrity in jeopardy. 61
Thus, such a judicial pronouncement lays stress on the facts that with the increasing
involvement of computer in our lives, hacking can no longer be regarded as a skill or
art; in fact; it is the emerging criminal misconduct. 62
In US too complacency prevailed regarding hacker activities but In 1990, there
came nationwide crackdown on illicit computer hackers, with arrests, criminal
charge, one show trial, several guilty pleas, and huge confiscations of data and
equipment all over the United States.63
The Computer Fraud and Abuse Act, 1986 regulates several criminal activities on the
Net apart from unauthorised access in order to obtain sensitive information such as
defence-related information and financial and consumer credit records, among other
things. Trafficking in passwords for computers used by or for the US government is
also barred.64 The Act in Section 1030 (a)(5)(A) also prohibits the transmission of a
program, information, code or command to a computer system with intent to
59Section 17(1) of the same Act defines function to include alteration or
erasure, copying or moving data, using it or producing output from the computer.
60Southwark Crown Court, March 1993
61 Supra n. 22, 305
62Talat Fatima, Cybercrimes, Eastern Book Company, p. 146.
63B. Sterling, The Hackers Crackdown (1992) xii.
6418 USC S. 1030(a)(6)
16 | P a g e
damage, or cause damage to, or to withhold or deny the use of, a computer,
computer service and network, information, data, or program. Such transmission is
also prohibited if done with reckless disregard of a substantial and unjustifiable risk
of
the
same
effect.65
In India, Information and Technology Act, 2000, the offence is defined separately
defined under Section 66. Section 66 is replaced by a new section by IT
(Amendment) Act, 2008 (10 of 2009). Instead Section (i) and (j) have been inserted
in Section 43 of the Act which reads as follows:
43. Penalty for damage to computer, computer system, etc. 66 - If any person without
permission of the owner or any other person who is incharge of a computer,
computer system or computer network,(a) accesses or secures access to such computer, computer system or computer
network;
(b) downloads, copies or extracts any data, computer data base or information from
such computer, computer system or computer network including information or data
held or stored in any removable storage medium;
(c) introduces or causes to be introduced any computer contaminant or computer
virus into any computer, computer system or computer network;
(d) damages or causes to be damaged any computer, computer system or computer
network, data, computer data base or any other programmes residing in such
computer, computer system or computer network;
(e) disrupts or causes disruption of any computer, computer system or computer
network;
(f) denies or causes the denial of access to any person authorised to access any
computer, computer system or computer network by any means;
(g) provides any assistance to any person to facilitate access to a computer,
computer system or computer network in contravention of the provisions of this Act,
rules or regulations made thereunder;
(h) charges the services availed of by a person to the account of another person by
tampering with or manipulating any computer, computer system, or computer
network, he shall be liable to pay damages by way of compensation not exceeding
65Ibid, S. 1030 (a)(5)(b)
66 The Information Technology Act 2000
17 | P a g e
one crore rupees to the person so affected. Explanation.- For the purposes of this
section,(i) '' computer contaminant'' means any set of computer instructions that are
designed(a) to modify, destroy, record, transmit data or programme residing within a
computer, computer system or computer network; or
(b) by any means to usurp the normal operation of the computer, computer system,
or computer network;
(ii) '' computer data base'' means a representation of information, knowledge, facts,
concepts or instructions in text, image, audio, video that are being prepared or have
been prepared in a formalised manner or have been produced by a computer,
computer ystem or computer network and are intended for use in a computer,
computer system or computer network;
(iii) '' computer virus'' means any computer instruction, information, data or
programme that destroys, damages, degrades or adversely affects the performance
of a computer resource or attaches itself to another computer resource and operates
wh n a programme, data or instruction is executed or some other event takes place
in that computer resource;
(iv) '' damage'' means to destroy, alter, delete, add, modify or rearrange any
computer resource by any means.
66. Hacking with computer system.-67
(1) Whoever with the intent to cause or knowing that he is likely to cause wrongful
loss or damage to the public or any person destroys or deletes or alters any
information residing in a computer resource or diminishes is value or utility or affects
it injuriously by any means, commits hacking.
(2) Whoever commits hacking shall be punished with imprisonment up to three
years, or with fine which may extend up to two lakh rupees, or with both.
Thus the offence of hacking is, through by name, not there in the statement book but
it has been qualified with the necessary mental elements. Section 66 and 43 read
along with Section 24 and 25 of Indian Penal Code.
Section 24- Dishonestly- Whoever does anything with the intention of causing
wrongful gain to one person or wrongful loss to another person, is said to do that
thing "dishonestly". 68
Section 25- " Fraudulently"- A person is said to do a thing fraudulently if he does that
thing with intent to defraud but not otherwise. 69
Basically reason behind read these sections with IT Act that offence is committed
mensrea and actusreaus important element of crime. The offence is constituted
when you are causing wrongful loss or damage to the public or any person .
Online protest and Defamation
A defamatory statement is one which tends to lower the reputation of a person in the
view of right minded people, or leads the claimant to be shunned or avoided. 70 It is a
tort and therefore a civil wrong. There are main two types of defamation: slander
(non-permanent and generally spoken) and libel (permanent and in written form).
First of all, the statement needs to be defamatory in nature, secondly the statement
needs to identify the claimant and thirdly the statement needs to be made (or
published) to at least one person other than the claimant. 71
The question has arisen here that whether the online protest is civil wrong or not?
In Loutchansky v.The Times Newspaper Ltd. 72The Times Newspaper alleged that Mr
Loutchansky was linked to international criminal activities. Mr.Loutchansky
commenced an action based on the publication in hardcopy print, the subsequently
started a second action once the article was placed in the online archive system
operated by the newspaper. The court held that that the making online archives
subject to defamation principles had only a negligible effect on the right of freedom of
expression and that an action could indeed be brought for the second publication
found within the archives.73
The courts in the United Kingdom are aware of this potential and have historically
handed down judgements rejecting the right of an individual to bring an action for
defamation in order to protect free speech in the public interest litigation. 74
There have been many defamation actions brought due to comments placed on the
internet- on media such as message boards, blogs, emails 75 and social networking
sites, including Facebook and Twitter.
In Smith v. ADVFN Plc76 Court decides the question that Whether an individual is
record his voice and then publish on internet. Mr Justice Eadyconsidered that these
types of posting were similar to heated debate in bar; people add their comments
moment. Based on this, his view was this type of posting should be the subject of an
action in slander, rather than libel.77
One of the core facets of the Internet is that to a very large degree people can be
anonymous, either by hiding behind pseudonyms or using a false name. This is an
obvious problem when considering defamation as it seems to allow an individual to
post a defamatory comment on a blog or a message board, without the law being
able to reach them as their identity is hidden. The rights of individual to retain
anonymity while writing offensive or defamatory comments and the action potentially
defamed people may take to rectify the situation was considered by the High Court
decision in Sheffield Wednesday Football Club Limited et al v. Neil Hargreves. 78 The
73This cases follows a long history of the common law allowing actions to be
brought for each libelous publication. See: Duke of Brunswick v. Harmer (1849)
14 QB 185 and Berezovsky v. Michaels (2000) WLR 2004
74See, for instance Derbyshire County Council v. Times Newspapers [1993] AC
534 and R ( on the application of the ProLife Alliance v. BBC [2002] 2 All ER 756.
75The use of an email in defamation action is an interesting consideration. A
person may not commence an action if an email containing a defamatory
statement about him is only sent to him. If that email is sent to elsewhere then a
defamatory action may arise.
76 [2008] EWHC 1797 (QB)
77Ibid. Although curiously in paragraph 108, part of Mr. Justice Eadys conclusion
was that blogging could form the legitimate basis of libel claim. Equally, the case
of Godfrey v. Demon Internet Ltd. (2001) QB 201 (considered below in more
detail) suggested that web content should be the basis of a libel claim.
20 | P a g e
Court follows the principal which was established in the case of Norwich Pharmacal
v. Custom & Exercise Commissioner79 and was explained by Lord Reid as:
..if through no fault of his own a person gets mixed up in the tortuous acts of other
so as to facilitate their wrongdoing, he may incur no personal liability but he comes
under a duty to assist the person who has been wronged by giving him information
and disclosing the identity of the wrongdoersjustice requires that he should
operate co-operate in righting the wrong if he unwittingly facilitated its perpetration. 80
This principal developed in the decision of Mitsui Limited v. Nexen Petroleum UK
Limited81 in which Mr Justice Lightmen introduced three conditions that must be
satisfied prior to the court granting a Norwich Pharmacal Order. Specifically:
1. A wrong must have been carried out or arguably carried out by an ultimate
wrongdoer;
2. There must be need for an order to enable action to be brought against the
ultimate wrongdoer; and
3. The person against whom the order is sought must (a) be mixed up in the
wrongdoing so as to have facilitated it; and (b) be able or likely to be able to
provide the information necessary to enable the ultimate wrongdoer to be
sued.
The judge in the Sheffield case, Richard Parks QC, was of the view that the three
requirements for a Norwich Pharmacal order had been fulfilled in some of the entries
posted on website.
The issue of identity was also considered by the High Court in Author of a Blog v.
Times Newspapers Limited.82 This case concerned a serving police man who was
the author of an anonymous blog. Under the pseudonym Night Jack, the police
officer commented on his experience at work, including details on criminals and the
struggles he faced with police bureaucracy. The court held that there is was no right
to privacy in the publishing of a blog which is available to the public.
Many experts have argued that privacy is actually beneficial for both consumers and
promotes competition in the market. Most Music cds,dvds,games etc are extremely
expensive for people in developing countries or third world countries, also for poorer
people everywhere. Dont they also have a right to leisure and entertainment?
Experts have also argued that piracy doesnt lead to loss in profit, they (corporations)
still make a lot of profit.90
Conclusion
How then to people the limitations to free speech online? It would seem that the
current rights regime cannot do it unless the notion of how and when the human is
the subject of rights is radically rethought or perhaps more accurately the nature of
online person-hood is reconsidered. The ontological vulnerability of the user online
needs to be foregrounded and emphasised as does the increasingly corporate
nature of the Internet. Judicial guidelines need to redefine the boundary between
speech and direct action for the digital age old ideas based on trespass and physical
harm are not suited to the Internet for the reasons we have discussed namely the
lack of public space and a tendency to minimise protest rights.
The La Rue report (A/HRC/17/27) has emphasised that ISPs should adopt terms of
use which promote human rights. This kind of requirement could be used to
invigorate the Internet as a zone of expression.
46. The Special Rapporteur notes that multi-stakeholder initiatives are essential to
deal effectively with issues related to the Internet, and the Global Network Initiative
serves as a helpful example to encourage good practice by corporations. Although
only three corporations, namely Google, Microsoft, and Yahoo!, have participated in
this initiative so far, the Special Rapporteur welcomes their commitment to undertake
a human rights impact assessment of their decisions, including before entering a
foreign market, and to ensure transparency and accountability when confronted with
situations that may undermine the rights to freedom of expression and privacy...
48. More generally, the Special Rapporteur encourages corporations to establish
clear and unambiguous terms of service in line with international human rights norms
and principles, increase transparency of and accountability for their activities, and
continuously review the impact of their services and technologies on the right to
freedom of expression of their users, as well as on the potential pitfalls involved
when they are misused.91
90 http://www.webpronews.com/new-study-finds-that-music-piracy-doesnt-negativelyaffect-sales-2013-03
Users can be educated to enhance their understanding of the right to free speech
afforded to them and how to use it in a legally acceptable manner. Spaces can also
be created where users can set the agenda for protest and information
dissemination, for this to be functional and draw impetus away from other forms of
protest these would need to be truly open spaces where all forms of protest speech
which could fall within the scope of political expression even if they are against the
current government or could if untrue be construed as defamation (one of the
reasons ISPs are cautious about hosting protest cites is the fear of defamation
actions the Rapporteur has already commented on the importance of not using ISPS
as censorship tools or holding them for failing to prevent illegal content.)
Until something is done however, it does seem somewhat anomalous that a sphere
of human activity created entirely by speech acts, has a greatly impaired protection
for free speech.
Bibliography
Article Referred
1. Birnhack M, (2003) 'Acknowledging the Conflict between Copyright Law and
Freedom of Expression under the Human Righs Act', Entertainment Law
Review 24 Bossuyt MJ, (1987)
2. Guide to the TravauxPrparatoires of the International Covenant on Civil and
Political Rights (Dordrecht: M. Nijhoff) Cassel D, (2000)
3. Hactivisim in the Cyberstreetshttp://www.alternet.org/story/9223(accessed
16/1/13) [Originally published as 'Hactivism! Taking It Off the Streets,
Protestors Are Acting Up Online' The San Francisco Bay Guardian Vol. 34 No.
28 (Apr 12-18 2000)]
4. Cellan Jones R, (2011) LulzSec hacking group announces end to cyber
attacks BBC News Reorthttp://www.bbc.co.uk/news/uk-13918458 (accessed
16/1/13)
5. Clarke RA, and Knake R, (2010) Cyber War: The Next Threat to National
Security and What to Do About It (London: HaperCollins)
6. Dahlgren P, (2005) 'The Internet, public spheres and political communication:
dispersion and deliberation' Political Communication Vol.22 147
http://www.cblt.soton.ac.uk/multimedia/PDFs/Internet,%20public%20spheres,
%20political%20communication.pdf
7. Dominguez
R,
(unknown)
'Digital
Zapatismo'
http://www.thing.net/~rdom/ecd/DigZap.html (accessed 16/1/13)
8. 'Electrohippies' (2000) Occasional Paper 1: Client-side Distributed Denial-ofService:
Valid
campaign
tactic
or
terrorist
act?
http://www.fraw.org.uk/projects/electrohippies/archive/op-01.html
(accessed
16/1/13)
24 | P a g e
25 | P a g e