Gözetim ve Sansür Teknolojinin İnsan Hakları Üzerine Etkisi

Yıl/Year: 2020 • Cilt/Vol: 3 • Sayı/Num: 5 • Güz/Autumn

Gözetim ve Sansür Teknolojinin İnsan Hakları Üzerine Etkisi *

Surveillance and Censorship: The Impact of Technologies on Human Rights

Çeviren: Mehmet ÖZOĞUL

* Bu eser, "European Union, European Parliament, Directorate – General for External Policies, Policy Department (2015, 16 April). Surveillance and censorship: The impact of technologies on human rights (Study). ISBN(pdf): 978-92-823-7024- 7, doi(pdf): 10.2861/035360" adlı İngilizce belgenin "kısmi" çevirisidir.

Öz/Abstract

İnsan hayatı çevrim içi dünyaya geçiş yaptığı gibi insan hakları da bu geçişi devam ettirmelidir. Avrupa Birliği ve diğer aktörlerin önündeki en büyük mücadele ise insan haklarına ait bütün yasaları dünyanın her bir noktasına yaymaktır. Bu rapor ise özünde güvenlik üzerine odaklanarak insan hakları temelli ve insana dair yaklaşımın ülke bazında yapılan güvenlik uygulamalarından daha iyi olacağını tartışır. Bu rapor aynı zamanda dijital çağda insan hakları üzerine sorun yaratan ülkeler ve şirketler hakkında genel bir değerlendirme ortaya koyar. Ayrıca insan haklarına ait çeşitli en bilinen uluslararası hukuk yasalarının ve standartlarının, teknik standartların, iş dünyasına ait yönlendirici ilkelerin, internet prensiplerinin ve politik anlamda girişimlerin listesini tutar ve bu listenin dijital çağdaki insan haklarını rejimi için dönüştürülmesinin son derece hayati olduğunu ortaya koyar. Bu rapor aynı zamanda internet ve insan hakları sorunu üzerine Avrupa Birliği tarafından yakın dönemde alınmış kararların etkilerini analiz eder. Bu rapor, teknolojinin insan hakları üzerine olumlu anlamda etkisini garanti altına almak için Avrupa Birliği içindeki insan hakları ve dijital politikalar üzerine çalışma yapan organların daha iyi bir şekilde birbirine entegre olması ve koordineli çalışmalıdır sonucuna varmaktadır. Aynı zamanda Avrupa Birliği kendi dijital stratejileri haricinde, dijital hakların üçüncü dünya ülkelerinin ulusal yasalarına girmesi için bunları teşvik etmelidir.

As human lives transition online, so do human rights. The main challenge for the European Union and other actors is to transition all human rights to the digital sphere. This report argues that the human rights-based approach can be helpful in focusing discussions about security on individuals rather than states. It provides an overview of countries and companies that pose risks to human rights in the digital sphere. It lists the most relevant international laws and standards, technical standards, business guidelines, Internet principles and policy initiatives that have been crucial in transitioning the human rights regime to the digital sphere. It also analyses the impact of recent EU actions related to Internet and human rights issues. It concludes that different elements of EU strategic policy on human rights and digital policy need be better integrated and coordinated to ensure that technologies have a positive impact on human rights. The report concludes that EU should promote digital rights in national legislation of the third countries, but also in its own digital strategies.

Kaynakça/References

  • Abboud, L., & Maushagen, P., Germany wants a German Internet as spying scandal rankles, Reuters, 2013. Retrieved March 05, 2015, from http://www.reuters.com/article/2013/10/25/us-usa-spying-germany-idUSBRE99O09S2013102.
  • Arce, N., Cyber Attack Bigger Threat Than ISIS, Says U.S. Spy Chief. Tech Times, 2015. Retrieved March 06, 2015, from http://www.techtimes.com/articles/35965/20150227/cyber-attack-bigger-threat-than-isis-says-u-s-spy-chief.htm
  • Bauman, Z., Bigo, D., Esteves, P., Guild, E., Jabri, V., Lyon, D., & Walker, R. B. J., After Snowden: Rethinking the Impact of Surveillance. International Political Sociology, 8(2), 121–144. doi:10.1111/ips.12048, 2014.
  • Bennett, Colin J. Haggerty, K., Security Games: Surveillance and Control at Mega-Events (p.208). Routledge, 2012.
  • Bequelin, N., Jailing of Ilham Tohti Will Radicalize More Uighurs – NYTimes.com, 2014. Retrieved January 14, 2015, from http://www.nytimes.com/2014/09/26/opinion/nicholas-bequelin-china-jailing-of-ilham-tohti-will-radicalize-more-uighurs.html?_r=0
  • Birnbaum, M., Russian blogger law puts new restrictions on Internet freedoms. Washington Post, 2014. Retrieved February 15, 2015, from http://www.washingtonpost.com/world/russian-blogger-law-puts-new-restrictions-on-internetfreedoms/2014/07/31/42a05924-a931-459f-acd2-6d08598c375b_story.html
  • Boonstra, J., & Laruelle, M., EU-US cooperation in Central Asia: parallel lines meet in infinity? EUCAM Policy Brief, 2013.
  • Bowden, C., The US surveillance programmes and their impact on EU citizens’ fundamental rights. Brussels, Belgium, 2013.
  • Cavelty, M. D., From Cyber-Bombs to Political Fallout: Threat Representations with an Impact in the Cyber-Security Discourse. International Studies Review, 2014.
  • Ctizen Lab. Morgan Marquis-Boire, Marczak, Bill Claudio Guarnieri, and J. S.-R., You Only Click Twice: FinFisher’s Global Proliferation – Citizen Lab, 2013. Retrieved January 09, 2015, from https://citizenlab.org/2013/03/you-only-click-twice-finfishers-globalproliferation-2/
  • Culzac, N., Iranians behind Tehran version of “Happy” sentenced to six months in prison and 91 lashes – Middle East – World – The Independent, The Independent, 2014. Retrieved January 14, 2015, from http://www.independent.co.uk/news/world/middle-east/iranians-behind-tehran-version-of-happy-sentenced-to-six-months-in-prison-and-91-lashes-9741014.html
  • Deibert, R. J., Black Code: Censorship, Surveillance, and the Militarisation of Cyberspace. Millennium – Journal of International Studies, 32(3), 501–530. doi:10.1177/03058298030320030801, 2003.
  • Dunn Cavelty, M., Cyber-security and threat politics: US efforts to secure the information age, 2007.
  • Elgin, B., & Silver, V., Syria Crackdown Gets Italy Firm’s Aid With U.S.-Europe Spy Gear -Bloomberg. Bloomberg, 2011.
  • Epstein, G., Online and Off, Information Control Persists in Turkey. Electronic Frontier Foundation, 2013. Retrieved June 24, 2014, from https://www.eff.org/deeplinks/2013/07/online-and-information-control-persists-turkey
  • Feenberg, A., Questioning Technology (p. 264). Routledge, 1999.
  • FIDH, Surveillance Technologies “Made in Europe”. Regulation Needed to Prevent Human Rights Abuses,
  • Finn, P., Cyber Assaults on Estonia Typify a New Battle Tactic. Washington: Washington Post, 2007. Retrieved from http://www.washingtonpost.com/wp-dyn/content/article/2007/05/18/AR2007051802122.html
  • FOC, Freedom Online Coalition: Statement on the Use and Export of Surveillance Technology, 2014. Retrieved January 14, 2015, from https://www.freedomonlinecoalition.com/wp-content/uploads/2014/10/2-FOC-Joint-Statement-on-the-USe-and-Export-of-Surveillance-Technology-October-2014.pdf
  • Freedman, L., Censorship and manipulation of family planning information: an issue of human rights and women’s health. Health and Human Rights: A Reader, 1999.
  • Greenwald, G., No place to hide: Edward Snowden, the NSA, and the US surveillance state, 2014.
  • Hoffmann, B., Civil society in the digital age: how the Internet changes state-society relations in authoritarian regimes. The case of Cuba. In Francesco Cavatorta (Ed.), Civil Society Activism under Authoritarian Rule. A comparative perspective (pp. 219–244). London, New York: Routledge, 2012.
  • Hoffmann, K., The EU in Central Asia: successful good governance promotion? Third World Quarterly, 2010.
  • HRW, Hungary. Human Rights Watch, 2014. Retrieved January 06, 2015, from http://www.hrw.org/europecentral-asia/hungary
  • Jenkins, P. N., Turkey Lifts Two-Month Block on YouTube | TIME, 2014.
  • Jiang, M., Authoritarian informationalism: China’s approach to Internet sovereignty.
  • Forthcoming in P. O’Neil. & R. Rogowski (Eds.), … 30(2), 71–89. doi:10.1353/sais.2010.0006, 2012.
  • Johnson, P., Maillart, T., & Chuang, J., Government Surveillance and Incentives to Abuse Power. In Workshop on the Economics of Information Security (WEIS). Pennsylvania State University, 2014.
  • Kinzelbach, K., The EU’s Human Rights Dialogue with China: Quiet Diplomacy and Its Limits (p. 236). Routledge, 2014. Korff, D., Expert Opinion prepared for the Committee of Inquiry of the Budestag into the SEYES global surveillance systems revealed by Edward Snowden. Berlin, Germany, 2014.
  • La Rue, F., Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, Frank La Rue (A/HRC/23/40). Geneva, 2013.
  • Lab, C., You Only Click Twice: FinFisher’s Global Proliferation – Citizen Lab, 2013. Lab, K., Syrian Malware, the ever-evolving threat, 2014.
  • LaFrance, A., Where Design Choices and Civil Rights Overlap – The Atlantic. The Atlantic, 2015. Retrieved January 14, 2015, from http://www.theatlantic.com/technology/archive/2015/01/where-design-choices-and-civil-rights-overlap/384142/
  • LGBT Technology Partnership, Homosexuality, Internet Censorship and Silence »
  • LGBT Technology Partnership, 2013. Retrieved February 15, 2015, from http://lgbttechpartnership.org/homosexuality-internet-censorship-and-silence/
  • Livingstone, S., Digital Media and Children’s Rights.
  • LSE Media Policy Project, 2014. Retrieved from http://blogs.lse.ac.uk/mediapolicyproject/2014/09/12/sonia-livingstone-digitalmedia-and-childrens-rights/
  • Marczak, B., Guarnieri, C., Marquis-Boire, M., & Scott-Railton, J., Mapping Hacking Team’s “Untraceable” SpywareMapping Hacking Team’s “Untraceable” Spyware, 2014.
  • Marquis-Boire, M., Marczak, B., Guarnieri, C., & Scott-Railton, J., For Their Eyes Only: The Commercialization of Digital Spying, 2014. Retrieved January 14, 2015, from https://citizenlab.org/storage/finfisher/final/fortheireyesonly.pdf
  • Marthews, A., & Tucker, C., Government Surveillance and Internet Search Behavior. SSRN Electronic Journal. doi:10.2139/ssrn.2412564, 2014.
  • Maurer, T., Morgus, R., Skierka, I., & Hohmann, M., Technological Sovereignty: Missing the Point?, 2014. Retrieved January 14, 2015, from http://www.gppi.net/fileadmin/user_upload/media/pub/2014/Maurer-et-al_2014_Tech-Sovereignty-Europe.pdf
  • Maurer, T., Omanovic, E., & Wagner, B., Uncontrolled Global Surveillance: Updating Export Controls to the Digital Age. Washington D.C., 2014.
  • McCarthy, D. R., Open Networks and the Open Door: American Foreign Policy and the Narration of the Internet. Foreign Policy Analysis, 2011.
  • McNamee, J., ENDitorial: Turkish censorship – Swedish built, by royal appointment » EDRi. edri, 2014. Retrieved July 14, 2014, from http://edri.org/enditorial-turkish-censorshipbuilt-sweden-royal-appointment/
  • Milanovic, M., Extraterritorial Application of Human Rights Treaties: Law, Principles, and Policy (p. 276). Oxford University Press, 2011.
  • Mueller, M., Networks and States: The Global Politics of Internet Governance (p. 280). MIT Press, 2010.
  • Mueller, M., Are we in a Digital Cold War. Internet Governance Project. Syracuse, N.Y., 2013.
  • Mueller, M., & Wagner, B., Finding a Formula for Brazil: Representation and Legitimacy in Internet Governance (No. 1). Internet Policy Observatory Working Paper Series, University of Pennsylvania, Annenberg School, 2014.
  • Nyst, C., & Crowe, A., Unmasking the Five Eyes’ global surveillance practices. GISWatch. Johannesberg, 2014.
  • Pasquale, F., The Black Box Society: The Secret Algorithms That Control Money and Information (p. 319). Harvard University Press, 2015.
  • Pillay, N., The right to privacy in the digital age Report of the Office of the United Nations High Commissioner for Human Rights, 2014. Retrieved January 09, 2015, from http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session27/Documents/A.HRC.27.37_en.pdf
  • Rahimi, B., The agonistic social media: cyberspace in the formation of dissent and consolidation of state power in postelection Iran. The Communication Review, 2011.
  • Reporters Without Borders [RSF], Press Freedom Barometer 2014, 2014.
  • Rhoads, C., & Fassihi, F., Iran Vows to Unplug Internet. Wall Street Journal, 2011.
  • RSF. (2014a). Enemies of the Internet. Retrieved February 15, 2015, from http://12mars.rsf.org/2014-en/#slide2
  • RSF. (2014b). Press Freedom Barometer 2014.
  • Scott-Railton, J., & Hardy, S., Malware Attacks Targeting Syrian ISIS Critics. Citizen Lab, 2014. Retrieved January 08, 2015, from https://citizenlab.org/2014/12/malware-attacktargeting-syrian-isis-critics/
  • Tanriverdi, H., Bürgerkrieg in Syrien: Das Internet als Kriegswaffe – Digital – Süddeutsche.de. sueddeutsche.de, 2015. Retrieved January 06, 2015, from http://www.sueddeutsche.de/digital/buergerkrieg-in-syrien-das-internet-wird-als-kriegswaffeeingesetzt-1.2289887
  • Tikk, E., Global Cybersecurity–Thinking About the Niche for NATO. SAIS Review, 30(2), 105–119, 2010.
  • Tufekci, Z., Algorithms in our Midst: Information, Power and Choice when Software is Everywhere. Proceedings of the 18th ACM Conference on Computer …, 2015.
  • Van Eeten, M. J., & Mueller, M., Where is the governance in Internet governance? New Media & Society, 15(5), 720–736. doi:10.1177/1461444812462850, 2012.
  • Wagner, A. Ben, Digital Rights in Turkey, 2014. Retrieved January 09, 2015, from https://cihr.eu/digital-rights-in-turkey/
  • Watt, N., & Wintour, P., Facebook and Twitter have “social responsibility” to help fight terrorism, says David Cameron | World news | The Guardian. The Guardian, 2015. Retrieved March 05, 2015, from http://www.theguardian.com/world/2015/jan/16/cameron-interrupt-terrorists-cybersecurity-cyberattack-threat
  • Whitefield, M., Security concerns could cast a shadow on 2014 World Cup in Brazil | The Miami Herald, 2014. Retrieved January 09, 2015, from http://www.miamiherald.com/news/nation-world/world/americas/article1952843.html
  • Yadron, D., Obama Sides with Cameron in Encryption Fight – Digits – WSJ. Wall Street Journal,2015. Retrieved February 12, 2015, from http://blogs.wsj.com/digits/2015/01/16/obama-sides-with-cameron-in-encryption-fight/
  • York, J. C., Policing Content in the Quasi-Public Sphere. Boston, MA: Open Net Initiative Bulletin. Berkman Center. Harvard University, 2010.
  • Zalnieriute, M., ICANN’s Corporate Responsibility to Respect Human Rights. London, 2015.
  • Zalnieriute, M., & Schneider, T., ICANN’s procedures and policies in the light of human rights, fundamental freedoms and democratic values (pp. 1–49). Strasbourg, 2014.

0