SlideShare a Scribd company logo
Censorship, Surveillance and
Cyberthreats in Hong Kong
Charles Mok


Global Digital Policy Incubator, Stanford University


April 12, 2022
From freedom to censorship
• Before NSL (2020)


• No official or legal mechanism to censor


• No external firewall or filtering mechanism


• Regional telecom hub for underseas cables and datacenters


• Government attempts to introduce censorship


• 2012: Consultation of Control of Obscene and Indecent Articles
Ordinance


• Proposal for mandatory “operator-level content filtering” withdrawn
after public opposition


• 2016: Copyright Ordinance Amendments


• Criminalization of online derivative works of copyrighted materials


• Withdrawn by government in legislature after filibuster in legislature
Can China’s Great Firewall extend to Hong Kong?
• China


• State-owned telecom controls external gateways from 3 coastal cities
with backbone of at least 7 other inland cities (2014)


• China failed to live up to its commitment when joining WTO (2001) for
“ICT and telecom market opening to foreign producers”


• Numerous laws and operational infrastructure to conduct censorship


• Hong Kong’s telecom regime was completely liberalized since 2003


• Buy back incumbent’s external exclusivity license in 1998


• Telecom Ordinance: No limit on number of licenses and foreign
ownership


• No law or censorship infrastructure, until the NSL


• Vibrant civil society, until the NSL
How to shut down the Internet in Hong Kong?
• Emergency Regulations Ordinance (Cap. 241)


• (1) On any occasion which the Chief Executive in Council may consider to be an
occasion of emergency or public danger he may make any regulations whatsoever
which he may consider desirable in the public interest.


• (2) Without prejudice to the generality of the provisions of subsection (1), such
regulations may provide for


(a)censorship, and the control and suppression of publications, writings, maps,
plans, photographs, communications and means of communication;


• The ERO was used many times in the last three yers to bypass the legislature


• Telecommunications Ordinance (Cap. 106) Section 13


• 13. Possession of telecommunications stations taken by government in emergencies


• (1) Where, in the opinion of the Governor, an emergency has arisen in which it is
expedient for the public service that the Government should have control over
telecommunications stations, the Governor, by warrant under his hand, may direct
or cause such telecommunications stations as are specified in the warrant to be
taken possession of and to be used for the service of the Government…

Recommended for you

Foi presentation
Foi presentationFoi presentation
Foi presentation

This document discusses successes and failures of freedom of information laws from a global perspective. It finds that while FOI laws have increased government accountability in some countries by up to 20 years after enactment, responsiveness to information requests has remained mixed, with less than half of requests being fully successful. An ideal FOI law has broad coverage of information, narrow exemptions subject to public interest overrides, an independent implementing agency, timely responses, low costs, and penalties for noncompliance. Mexico is highlighted as having a relatively strong FOI law due to factors like its broad public interest test and capable independent oversight agency.

Un may 28, 2019
Un may 28, 2019Un may 28, 2019
Un may 28, 2019

This document summarizes a report by the UN Special Rapporteur on the right to freedom of opinion and expression regarding targeted digital surveillance. The report finds that targeted surveillance of journalists, activists and critics by governments has led to human rights violations like arbitrary detention and even extrajudicial killings. It proposes regulations for the private surveillance industry to help protect human rights and calls for a moratorium on the global sale of surveillance tools until proper safeguards are in place.

united nationpegasus
FirstNet: Recent Developments and Current Uncertainties for Local Governments
FirstNet: Recent Developments and Current Uncertainties for Local GovernmentsFirstNet: Recent Developments and Current Uncertainties for Local Governments
FirstNet: Recent Developments and Current Uncertainties for Local Governments

FirstNet: Recent Developments and Current Uncertainties for Local Governments at 2013 IMLA Mid-Year Seminar

public safetybroadband internet accesstelecommunications
The decline of trust of Internet freedom
• FireChat during


Hong Kong’s


Umbrella


Movement (2014)


and Taiwan’s


Sunflower


Movement (2014)
2019 Anti-extradition bill protests
• Widespread use of Telegram groups


• Apple App Store removal of apps
2019 Anti-extradition bill protests
• Doxxing, from both sides, but law


enforcement on one side only
High Court injunction to censor Internet content (2019.10.31)
• The Police and the Secretary for Justice applied for and was granted a High
Court injunction


• Prohibiting anyone from communicating through “any Internet-based
platform” any materials that “promotes, encourages or incites the use or
threat of violence, intended or likely to cause” bodily injury or property
damage


• Broad and vague scope caused chilling effect on freedom of expression


• Bypass any legislation


• Local civil society applied for discharge or restriction on the injunction


• High Court ruled to continue the injunction with minor amendments to
emphasize the wilfulness of the act


• Injunction was extended and never rescinded


• This can be considered to be the first arbitrary legal weapon against free speech
in Hong Kong

Recommended for you

Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source Software

Seaparo Phala, CIO of the Department of Arts and Culture, gave a presentation on internet governance, open source software, and their linkages. The presentation covered what internet governance is, key issues like access and rights, the African Declaration on Internet Rights and Freedoms, South Africa's policy supporting open source software to promote digital economic growth, and examples of the department's open source initiatives. Phala concluded by encouraging open source communities to engage with the government on further promoting open standards and internet freedom.

declaration on internet rights and freedomsinternetinternet governance
Presentation at IFLA Congress in Cape Town on 18 August 2015
Presentation at IFLA Congress in Cape Town on 18 August 2015Presentation at IFLA Congress in Cape Town on 18 August 2015
Presentation at IFLA Congress in Cape Town on 18 August 2015

This document discusses the lack of free access to legal information in Africa and the work of AfricanLII to address this issue. It notes that without free access, citizens are disempowered and economic development is hindered. AfricanLII partners with legal information institutes in various African countries to make legislation and court decisions openly accessible online. While some successes have been achieved, challenges remain regarding sustainability and gaining widespread acceptance of the principle of free access to law.

african legislationfree access to lawlegla information
Newsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently Changed
Newsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently ChangedNewsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently Changed
Newsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently Changed

Governor Newsom recently signed three Executive Orders that changed fundamental limitations and requirements of the Brown Act. He signed Executive Order N-25-20 on March 12, Executive Order N-29-20 on March 17, and Executive Order N-35-20 on March 21. Before everyone had figured out the section of the March 12 order that addressed the Brown Act, parts of that section were withdrawn and superseded by the March 17 order and the remaining parts continued in the March 17 order. And then the March 21 order made more changes – all of which relate to the COVID-19 pandemic.

brown actexecutive orderscalifornia
National Security Law (2020)
• Mainland law imposed on Hong Kong — not based on Common Law —
targeting against “secession, subversion, terrorism and collusion with
foreign forces”


• Implementation Rules for Article 43 of the Law of the People's Republic of
China on Safeguarding National Security in the Hong Kong SAR:


• A “designated police officer” can order to take down messages or
contention any electronic platform that was deemed “likely to constitute
an offense endangering national security”


• Failure to comply means the service provider may face seizure of their
electronic devices, plus fines and prison terms up to 6 months


• Chief Executive may authorize the police to intercept communications and
conduct surveillance to “prevent and detect offences endangering
national security”


• The universal reach of the law’s extraterritorial power
After NSL
• Self censorship


• Removing social media posts or entire profiles


• Closing of many online press outlets


• Media closing


• Apple Daily, StandNews, and many others


• Blocking of websites hosted overseas


• HKChronicles (doxxing of police officers and pro-Beijing figures)


• Taiwan’s Transitional Justice Commission*, Presbyterian Church*, DPP*,
Recruitment Centre of National Armed Force


• 2021 Hong Kong Charter


• June 4th Incident Online Museum


• Hong Kong Watch (UK human rights group)


• Some were later reported to be accessible again (*)


• Real name system for prepaid SIM cards (from March 1 2022)
What’s Next?
• Observations


• Contrasts with Taiwan, one of the freest in Asia: Hong Kong’s “One Country One System” reality


• How easy it is to go from free to censorship


• Role of global platforms


• Large commercial presence of Facebook, Google, AWS, Microsoft, etc.


• The government has so far stopped short of openly imposing orders on them to censor


• Very limited underseas cable investment or capacity expansion


• PLCN submarine network etc. redirected to terminate at Taiwan


• Likely a gradual decline of its role as regional telecom and datacenter hub


• Misinformation law


• Imitating Singapore’s POFMA or India’s ITA?


• Make it easier for government to remove any undesirable speech, without invoking NSL


• More pressure on global platforms


• Article 23 local national security law legislation


• Relating to “treason, secession, sedition, subversion against the Central People's Government, or
theft of state secrets” and overseas political ties


• GFW 2.0 — A soft and dynamic firewall?


• More censorship, surveillance and self-censorship; less bandwidth growth, investment and freedom
Charles Mok


Visiting Scholar


Global Digital Policy Incubator
@charlesmok


cpmok@stanford.edu

Recommended for you

Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa

The document discusses policy and legal frameworks around freedom of expression in East Africa. It summarizes that while country constitutions protect freedom of expression, some laws limit this freedom. It also discusses issues around access to information, privacy, and internet affordability. The document recommends that governments promote open data, enact right to information laws, harmonize policies, reduce barriers to access, and empower civil society advocacy to strengthen freedom of expression.

policy advocacyictinternet governance
Us legislation authorizing wiretapping
Us legislation authorizing wiretappingUs legislation authorizing wiretapping
Us legislation authorizing wiretapping

The document summarizes the history of US legislation authorizing wiretapping and electronic surveillance. It discusses that wiretapping was originally a felony but was ruled legal by the Supreme Court in 1928. The Omnibus Crime Control and Safe Streets Act of 1968, also known as the Wiretap Act, prohibited unauthorized wiretapping but established procedures for law enforcement to obtain warrants. The Electronic Communications Privacy Act of 1986 extended these protections to electronic communications. The USA PATRIOT Act, passed after 9/11, expanded the surveillance capabilities of law enforcement and intelligence agencies.

Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)

The Digital Security Act 2018 in Bangladesh aims to curb crimes committed digitally such as spreading fake news, slander, and inciting violence. However, critics argue it could undermine media freedom and freedom of expression that are protected by the country's constitution and laws. The act allows the government to monitor digital platforms and restrict content it deems harmful or offensive. International organizations have called for reforming the laws to prevent overreach and protect civil liberties.

dsadigital security actwhat is dsa ?

More Related Content

What's hot

NGA legislation in Poland
 NGA legislation in Poland NGA legislation in Poland
NGA legislation in Poland
Jaromir Novak
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
M S Siddiqui
 
Internet Freedom 2.1
Internet Freedom 2.1Internet Freedom 2.1
Internet Freedom 2.1
Dhruva Jaishankar
 
Foi presentation
Foi presentationFoi presentation
Foi presentation
Ernesto Neri
 
Un may 28, 2019
Un may 28, 2019Un may 28, 2019
Un may 28, 2019
ZahidManiyar
 
FirstNet: Recent Developments and Current Uncertainties for Local Governments
FirstNet: Recent Developments and Current Uncertainties for Local GovernmentsFirstNet: Recent Developments and Current Uncertainties for Local Governments
FirstNet: Recent Developments and Current Uncertainties for Local Governments
Best Best and Krieger LLP
 
Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source Software
Seaparo Phala
 
Presentation at IFLA Congress in Cape Town on 18 August 2015
Presentation at IFLA Congress in Cape Town on 18 August 2015Presentation at IFLA Congress in Cape Town on 18 August 2015
Presentation at IFLA Congress in Cape Town on 18 August 2015
Mariya Badeva-Bright
 
Newsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently Changed
Newsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently ChangedNewsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently Changed
Newsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently Changed
Meyers Nave
 
Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa
ICT4Democracy in East Africa
 
Us legislation authorizing wiretapping
Us legislation authorizing wiretappingUs legislation authorizing wiretapping
Us legislation authorizing wiretapping
Angela Strudwick
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
Md.Azizul hakim Anik
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
Commonwealth Telecommunications Organisation
 
Broadcast Bill
Broadcast BillBroadcast Bill
Broadcast Bill
Rohitha Sankar
 
FCC Proposes New Rules On Local Wireless Siting
FCC Proposes New Rules On Local Wireless SitingFCC Proposes New Rules On Local Wireless Siting
FCC Proposes New Rules On Local Wireless Siting
Best Best and Krieger LLP
 
Open internet in singapore
Open internet in singaporeOpen internet in singapore
Open internet in singapore
Benjamin Ang
 
History of the regulatory office
History of the regulatory officeHistory of the regulatory office
History of the regulatory office
Cheldy S, Elumba-Pableo
 
Tatoa FCC Threats and Opportunities
Tatoa FCC Threats and OpportunitiesTatoa FCC Threats and Opportunities
Tatoa FCC Threats and Opportunities
Best Best and Krieger LLP
 
FCC Wireless Rulemaking - 2013
FCC Wireless Rulemaking - 2013FCC Wireless Rulemaking - 2013
FCC Wireless Rulemaking - 2013
Best Best and Krieger LLP
 
Cellphone Tower Regulation: Maximizing Revenue While Protecting Local Interests
Cellphone Tower Regulation: Maximizing Revenue While Protecting Local InterestsCellphone Tower Regulation: Maximizing Revenue While Protecting Local Interests
Cellphone Tower Regulation: Maximizing Revenue While Protecting Local Interests
Best Best and Krieger LLP
 

What's hot (20)

NGA legislation in Poland
 NGA legislation in Poland NGA legislation in Poland
NGA legislation in Poland
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
Internet Freedom 2.1
Internet Freedom 2.1Internet Freedom 2.1
Internet Freedom 2.1
 
Foi presentation
Foi presentationFoi presentation
Foi presentation
 
Un may 28, 2019
Un may 28, 2019Un may 28, 2019
Un may 28, 2019
 
FirstNet: Recent Developments and Current Uncertainties for Local Governments
FirstNet: Recent Developments and Current Uncertainties for Local GovernmentsFirstNet: Recent Developments and Current Uncertainties for Local Governments
FirstNet: Recent Developments and Current Uncertainties for Local Governments
 
Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source Software
 
Presentation at IFLA Congress in Cape Town on 18 August 2015
Presentation at IFLA Congress in Cape Town on 18 August 2015Presentation at IFLA Congress in Cape Town on 18 August 2015
Presentation at IFLA Congress in Cape Town on 18 August 2015
 
Newsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently Changed
Newsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently ChangedNewsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently Changed
Newsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently Changed
 
Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa
 
Us legislation authorizing wiretapping
Us legislation authorizing wiretappingUs legislation authorizing wiretapping
Us legislation authorizing wiretapping
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
Broadcast Bill
Broadcast BillBroadcast Bill
Broadcast Bill
 
FCC Proposes New Rules On Local Wireless Siting
FCC Proposes New Rules On Local Wireless SitingFCC Proposes New Rules On Local Wireless Siting
FCC Proposes New Rules On Local Wireless Siting
 
Open internet in singapore
Open internet in singaporeOpen internet in singapore
Open internet in singapore
 
History of the regulatory office
History of the regulatory officeHistory of the regulatory office
History of the regulatory office
 
Tatoa FCC Threats and Opportunities
Tatoa FCC Threats and OpportunitiesTatoa FCC Threats and Opportunities
Tatoa FCC Threats and Opportunities
 
FCC Wireless Rulemaking - 2013
FCC Wireless Rulemaking - 2013FCC Wireless Rulemaking - 2013
FCC Wireless Rulemaking - 2013
 
Cellphone Tower Regulation: Maximizing Revenue While Protecting Local Interests
Cellphone Tower Regulation: Maximizing Revenue While Protecting Local InterestsCellphone Tower Regulation: Maximizing Revenue While Protecting Local Interests
Cellphone Tower Regulation: Maximizing Revenue While Protecting Local Interests
 

Similar to Censorship, Surveillance and Cyber Threats in Hong Kong.pdf

Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
Charles Mok
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
Charles Mok
 
Section 69 Information technology act 2001
Section 69 Information technology act 2001Section 69 Information technology act 2001
Section 69 Information technology act 2001
22010122059
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Charles Mok
 
IP Transition and Net Neutrality: Why Local Governments Should Care
IP Transition and Net Neutrality:Why Local Governments Should CareIP Transition and Net Neutrality:Why Local Governments Should Care
IP Transition and Net Neutrality: Why Local Governments Should Care
Best Best and Krieger LLP
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
Charles Mok
 
Art_19(1)(a)_IT.pdf
Art_19(1)(a)_IT.pdfArt_19(1)(a)_IT.pdf
Art_19(1)(a)_IT.pdf
ASHUTOSHKUMARPANDEY40
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
Himanshu Jawa
 
Holly Raiche - Net Neutrality - ArmIGF2015
Holly Raiche - Net Neutrality - ArmIGF2015Holly Raiche - Net Neutrality - ArmIGF2015
Holly Raiche - Net Neutrality - ArmIGF2015
Arm Igf
 
Lehigh net neutrality colloquium (no video) final
Lehigh net neutrality colloquium (no video)   finalLehigh net neutrality colloquium (no video)   final
Lehigh net neutrality colloquium (no video) final
Don Holloway
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
Swant Anand
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
Dr. Prashant Vats
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
blogzilla
 
Otieno antony rethinking internet shutdown
Otieno antony   rethinking internet shutdownOtieno antony   rethinking internet shutdown
Otieno antony rethinking internet shutdown
Otieno Antony
 
Taking A Look At Net Neutrality
Taking A Look At Net NeutralityTaking A Look At Net Neutrality
Taking A Look At Net Neutrality
Rochelle Schear
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
Wendy Qi
 
International trends in mobile law
International trends in mobile lawInternational trends in mobile law
International trends in mobile law
Jacqueline Fick
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital Evidence
Shahid Jamal Tubrazy
 
Regulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platformRegulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platform
Shamseena Zubair
 
Net Neutrality is Dead, Long Live the Open Internet
Net Neutrality is Dead, Long Live the Open InternetNet Neutrality is Dead, Long Live the Open Internet
Net Neutrality is Dead, Long Live the Open Internet
Cybera Inc.
 

Similar to Censorship, Surveillance and Cyber Threats in Hong Kong.pdf (20)

Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Section 69 Information technology act 2001
Section 69 Information technology act 2001Section 69 Information technology act 2001
Section 69 Information technology act 2001
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
 
IP Transition and Net Neutrality: Why Local Governments Should Care
IP Transition and Net Neutrality:Why Local Governments Should CareIP Transition and Net Neutrality:Why Local Governments Should Care
IP Transition and Net Neutrality: Why Local Governments Should Care
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
 
Art_19(1)(a)_IT.pdf
Art_19(1)(a)_IT.pdfArt_19(1)(a)_IT.pdf
Art_19(1)(a)_IT.pdf
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
Holly Raiche - Net Neutrality - ArmIGF2015
Holly Raiche - Net Neutrality - ArmIGF2015Holly Raiche - Net Neutrality - ArmIGF2015
Holly Raiche - Net Neutrality - ArmIGF2015
 
Lehigh net neutrality colloquium (no video) final
Lehigh net neutrality colloquium (no video)   finalLehigh net neutrality colloquium (no video)   final
Lehigh net neutrality colloquium (no video) final
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Otieno antony rethinking internet shutdown
Otieno antony   rethinking internet shutdownOtieno antony   rethinking internet shutdown
Otieno antony rethinking internet shutdown
 
Taking A Look At Net Neutrality
Taking A Look At Net NeutralityTaking A Look At Net Neutrality
Taking A Look At Net Neutrality
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
International trends in mobile law
International trends in mobile lawInternational trends in mobile law
International trends in mobile law
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital Evidence
 
Regulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platformRegulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platform
 
Net Neutrality is Dead, Long Live the Open Internet
Net Neutrality is Dead, Long Live the Open InternetNet Neutrality is Dead, Long Live the Open Internet
Net Neutrality is Dead, Long Live the Open Internet
 

More from Charles Mok

Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
Charles Mok
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
Charles Mok
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
Charles Mok
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
Charles Mok
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Charles Mok
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
Charles Mok
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
Charles Mok
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
Charles Mok
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
Charles Mok
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
Charles Mok
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
Charles Mok
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
Charles Mok
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
Charles Mok
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
Charles Mok
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
Charles Mok
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" Laws
Charles Mok
 
2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T 2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T
Charles Mok
 
2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點
Charles Mok
 
在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由
Charles Mok
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Charles Mok
 

More from Charles Mok (20)

Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" Laws
 
2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T 2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T
 
2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點
 
在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
 

Recently uploaded

Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
Safe Software
 
Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces
Mark Billinghurst
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
BookNet Canada
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
rajancomputerfbd
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
ishalveerrandhawa1
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
UiPathCommunity
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
jackson110191
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
Kief Morris
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
Enterprise Wired
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
SynapseIndia
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
Sally Laouacheria
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
Andrey Yasko
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
Vijayananda Mohire
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
Liveplex
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
Bert Blevins
 
Best Programming Language for Civil Engineers
Best Programming Language for Civil EngineersBest Programming Language for Civil Engineers
Best Programming Language for Civil Engineers
Awais Yaseen
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
Eric D. Schabell
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
Tatiana Al-Chueyr
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Chris Swan
 

Recently uploaded (20)

Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
 
Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
 
Best Programming Language for Civil Engineers
Best Programming Language for Civil EngineersBest Programming Language for Civil Engineers
Best Programming Language for Civil Engineers
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
 

Censorship, Surveillance and Cyber Threats in Hong Kong.pdf

  • 1. Censorship, Surveillance and Cyberthreats in Hong Kong Charles Mok Global Digital Policy Incubator, Stanford University April 12, 2022
  • 2. From freedom to censorship • Before NSL (2020) • No official or legal mechanism to censor • No external firewall or filtering mechanism • Regional telecom hub for underseas cables and datacenters • Government attempts to introduce censorship • 2012: Consultation of Control of Obscene and Indecent Articles Ordinance • Proposal for mandatory “operator-level content filtering” withdrawn after public opposition • 2016: Copyright Ordinance Amendments • Criminalization of online derivative works of copyrighted materials • Withdrawn by government in legislature after filibuster in legislature
  • 3. Can China’s Great Firewall extend to Hong Kong? • China • State-owned telecom controls external gateways from 3 coastal cities with backbone of at least 7 other inland cities (2014) • China failed to live up to its commitment when joining WTO (2001) for “ICT and telecom market opening to foreign producers” • Numerous laws and operational infrastructure to conduct censorship • Hong Kong’s telecom regime was completely liberalized since 2003 • Buy back incumbent’s external exclusivity license in 1998 • Telecom Ordinance: No limit on number of licenses and foreign ownership • No law or censorship infrastructure, until the NSL • Vibrant civil society, until the NSL
  • 4. How to shut down the Internet in Hong Kong? • Emergency Regulations Ordinance (Cap. 241) • (1) On any occasion which the Chief Executive in Council may consider to be an occasion of emergency or public danger he may make any regulations whatsoever which he may consider desirable in the public interest. • (2) Without prejudice to the generality of the provisions of subsection (1), such regulations may provide for 
 (a)censorship, and the control and suppression of publications, writings, maps, plans, photographs, communications and means of communication; • The ERO was used many times in the last three yers to bypass the legislature • Telecommunications Ordinance (Cap. 106) Section 13 • 13. Possession of telecommunications stations taken by government in emergencies • (1) Where, in the opinion of the Governor, an emergency has arisen in which it is expedient for the public service that the Government should have control over telecommunications stations, the Governor, by warrant under his hand, may direct or cause such telecommunications stations as are specified in the warrant to be taken possession of and to be used for the service of the Government…
  • 5. The decline of trust of Internet freedom • FireChat during 
 Hong Kong’s 
 Umbrella 
 Movement (2014) 
 and Taiwan’s 
 Sunflower 
 Movement (2014)
  • 6. 2019 Anti-extradition bill protests • Widespread use of Telegram groups • Apple App Store removal of apps
  • 7. 2019 Anti-extradition bill protests • Doxxing, from both sides, but law 
 enforcement on one side only
  • 8. High Court injunction to censor Internet content (2019.10.31) • The Police and the Secretary for Justice applied for and was granted a High Court injunction • Prohibiting anyone from communicating through “any Internet-based platform” any materials that “promotes, encourages or incites the use or threat of violence, intended or likely to cause” bodily injury or property damage • Broad and vague scope caused chilling effect on freedom of expression • Bypass any legislation • Local civil society applied for discharge or restriction on the injunction • High Court ruled to continue the injunction with minor amendments to emphasize the wilfulness of the act • Injunction was extended and never rescinded • This can be considered to be the first arbitrary legal weapon against free speech in Hong Kong
  • 9. National Security Law (2020) • Mainland law imposed on Hong Kong — not based on Common Law — targeting against “secession, subversion, terrorism and collusion with foreign forces” • Implementation Rules for Article 43 of the Law of the People's Republic of China on Safeguarding National Security in the Hong Kong SAR: • A “designated police officer” can order to take down messages or contention any electronic platform that was deemed “likely to constitute an offense endangering national security” • Failure to comply means the service provider may face seizure of their electronic devices, plus fines and prison terms up to 6 months • Chief Executive may authorize the police to intercept communications and conduct surveillance to “prevent and detect offences endangering national security” • The universal reach of the law’s extraterritorial power
  • 10. After NSL • Self censorship • Removing social media posts or entire profiles • Closing of many online press outlets • Media closing • Apple Daily, StandNews, and many others • Blocking of websites hosted overseas • HKChronicles (doxxing of police officers and pro-Beijing figures) • Taiwan’s Transitional Justice Commission*, Presbyterian Church*, DPP*, Recruitment Centre of National Armed Force • 2021 Hong Kong Charter • June 4th Incident Online Museum • Hong Kong Watch (UK human rights group) • Some were later reported to be accessible again (*) • Real name system for prepaid SIM cards (from March 1 2022)
  • 11. What’s Next? • Observations • Contrasts with Taiwan, one of the freest in Asia: Hong Kong’s “One Country One System” reality • How easy it is to go from free to censorship • Role of global platforms • Large commercial presence of Facebook, Google, AWS, Microsoft, etc. • The government has so far stopped short of openly imposing orders on them to censor • Very limited underseas cable investment or capacity expansion • PLCN submarine network etc. redirected to terminate at Taiwan • Likely a gradual decline of its role as regional telecom and datacenter hub • Misinformation law • Imitating Singapore’s POFMA or India’s ITA? • Make it easier for government to remove any undesirable speech, without invoking NSL • More pressure on global platforms • Article 23 local national security law legislation • Relating to “treason, secession, sedition, subversion against the Central People's Government, or theft of state secrets” and overseas political ties • GFW 2.0 — A soft and dynamic firewall? • More censorship, surveillance and self-censorship; less bandwidth growth, investment and freedom
  • 12. Charles Mok Visiting Scholar Global Digital Policy Incubator @charlesmok cpmok@stanford.edu