Professional Documents
Culture Documents
AN 3110 Internet PowerPoint Lecture
AN 3110 Internet PowerPoint Lecture
AN 3110 Internet PowerPoint Lecture
An IP Address is
like a street
address
WHAT IS AN IP ADDRESS? (IPV6)
IPv6 works like IPv4 but with more addresses
• Allows for
3.40282367x1038 Addresses
• Modern operating systems
support IPv6 and IPv4
• Very few web sites provide
IPv6 service
• Very few ISP’s provide
IPv6 to customers
• Most consumer routers and
modems cannot handle
IPv6
Used to determine IP
Address(s) of domain
names
• Think of it as a phone
book
DNSSEC (Domain
Name System Security
Extensions) was created
prevent falsification
Domain Names are
structured
http://en.wikipedia.org/wiki/Domain_Name_System
DNS (CONTINUED)
DNSSEC
• Makes tampering evident
• OSes, Apps, and DNS servers must be modified to support it
• Fundamentally conflicts with SOPA (Stop Online Piracy Act)
• Comcast customers experienced a blackout of nasa.gov when
NASA administrators incorrectly configured records
URL (UNIFORM RESOURCE LOCATOR)
Where is facebook.com?
Request #1
Router asks ISP DNS Server the
location of “facebook.com”
#2
Where is
facebook.com?
Request #2
ISP DNS Server asks DNS Root Server the
location of “facebook.com”
#3
#3
#3
#2
#2
#1
Where is facebook.com
Request #3
DNS Root Server responds to ISP DNS Server
Response #3
Response #3
#3
Response #3 Response #3:
#3 Facebook.com is at
#3
69.171.224.11
#3
#2
#2
#1
ISP DNS Server responds to Home Router
Response #3
Response #3
#3
Response #2: Response #3 Response #3
Facebook.com is at
#3 #3
69.171.224.11
#3
#2
Response #2
#2
#1
Home Router responds to Computer
Response #3
Response #3
#3
Response #3 Response #3
#3 Response #2 #3
#3
#2
Response #2
#2
#1
Response #1:
Facebook.com is at
69.171.224.11
Web browser connects to 69.171.224.11
Alternate Path
Preferred Path
PURPOSE AND USES OF THE INTERNET
1958: Used flight simulator as central computer for SAGE project which connected radar
installations all over the U.S. and Canada. Considered first computer network.
Ray
Tomlinson:
sends first e-
mail across
ARPANET
• Presidential candidate Jimmy Carter and running mate Walter Mondale use
email to plan campaign events.
http://vermontdailybriefing.com/?p=697 http://som.csudh.edu/cis/lpress/history/arpamaps/
1976
Apple Inc. is founded by Steve Jobs, Steve Wozniak, and
Ronald Wayne
Queen Elizabeth sends her first email. She's the first state
leader to do so.
NSFNET: 1986
http://en.wikipedia.org/wiki/National_Science_Foundation_Network
TIMELINE: 1990
Tim Berners-Lee: a scientist working at CERN, proposes a
hypertext project called the World Wide Web.
<HTML>
<HEAD>
<TITLE>HTML
EXAMPLE</TITLE>
</HEAD>
<BODY>
<P>Content Here</P>
</BODY>
</HTML>
http://en.wikipedia.org/wiki/Google_logo http://en.wikipedia.org/wiki/Paypal
The giant company Google has one of the most complex systems in the world of
data storage today. Not only is the location of many of their sites kept off public
record but the high levels of security prevent even the top CEO’s from taking a
walk through their buildings. If you are really craving to do so though, go ahead on
Google Maps where they set up a tour for us.
TIMELINE: 1999
MySpace.com is launched
Wikipedia Logo
http://en.wikipedia.org/wiki/Wikipedia
TIMELINE: 2002-4
Former systems administrator for the CIA, Snowden later worked for Dell
inside a National Security Agency outpost in Japan, and early in 2013 joined
the Booz Allen Hamilton consulting firm inside the NSA center in Hawaii.
June 2013 Snowden released 1000s of classified documents about many NSA
global surveillance programs with assistance from telecommunication
companies and European governments. Snowden flew to Hong Kong and
then Russia.
Charged with espionage, stealing US government property
German leader Angela Merkel was outraged that her private phone
2013 SNOWDEN NSA WIKILEAKS
Programs MUSCULAR, INCENSOR, PINWALE collected over 14 billion
Records by directly tapping into Google and Yahoo private internet clouds.
NSA employee diagram shows insertion of SSL in server.
FACEBOOK
Largest database of people ever built
Facebook has been accused of selling personal
information from its users to marketing companies
without the knowledge of the Facebook users
They require each user to set their own privacy controls, but
they do very little to advertise when they change the privacy
policies
CONCERNS ABOUT FACEBOOK
2008-10 Complaint from CIPPIC (Canadian Internet Policy and Public
Interest Clinic ). Facebook violates the Personal Information Protection
and Electronic Documents Act.
Alleged 22 violations, including not telling users that their
information is given to third parties for marketing, ads
Facebook default privacy settings allow sharing of personal
information with “everyone”
Even if a person has the highest privacy settings, their information is
shared if friends have lower privacy settings
To use third-party applications, facebook members must share
personal information that the application developer, who may use it
or sell it to marketers, advertisers or data-miners.
Data mining
Facebook supposedly looks through private messages on their site to
sell information to advertisers, marketers, and data-miners (Google
has also been sued for this)
PRIVACY CONCERNS CONTINUED
bank accounts.
The criminal organization could share the information
with scammers and botnet operators.
The criminal organization would have access to cameras
and microphones on your device.
The criminal organization would have access to your
location.
WAYS TO PROTECT YOUR PERSONAL
DATA/INFORMATION
Create different passwords for each website that has your personal data,
such as banks and medical offices
Create complex passwords that are not easy to guess
Set privacy settings as high as possible on devices such as social media
sites and on devices such as cell phones
Do not provide your social security number to doctors or others who
request it but don’t require it
Provide as little personal information as possible to app developers
Only download apps from the Apple app store or the Google Play store and
not directly from the internet
Only allow the use of cookies if the website you are using is considered a
"safe" website, for instance with a URL including https
Change your password at least every 90 days for accounts that have your
personal data stored, such as banks and medical offices
ARGUMENTS OF INTERNET SERVICE PROVIDER
COMPANIES (ISPS) AGAINST REGULATION OF
THEIR PRACTICES
ISPs argue that net neutrality regulations requiring them to provide
equal access and therefore the same prices to all companies would
not allow them to make enough profit to interest investors needed to
expand broadband buildout of fiber optic networks
ISPs argue that open internet regulations requiring them to provide
equal access would require them to lower prices for higher speed
internet and not allow them to make enough profit to continue to
innovate
ISPs argue regulation decreases profits, resulting in lower quality
services
ISPs fear regulation of charges or services would be unreasonable
and a detriment to customers
ISPs claim regulation will decrease competition (but cable co.s are
monopolies in many areas)
PRACTICES OF ISPS THAT THEY FEAR
WOULD BE CURTAILED BY
REGULATION
Internet Service Provider companies (ISPs) want to remain
monopolies
ISPs want to continue extorting companies by slowing service to
them until they pay higher prices
ISPs want to continue charging customers more for faster internet
ISPs want to be able to require use of proprietary websites or
partners while blocking competing websites.
ISPs fear regulation could prevent deals with other companies
ISPs fear regulation that will allow lawsuits against them for
defamation, and hate speech against LGBTQIA, African-
Americans, Latinx immigrants, jews and Muslims that has led to
violence against these groups.
ISPs fear regulation classifying them as publishers who are
responsible for providing accurate news
ISP PRACTICES TO PREVENT
REGULATION
Writing legislation proposed by Republicans prohibiting
the FCC from controlling ISP consumer prices
Lobbying the FCC and legislators
https://readersupportednews.org/news-section2/318-66/56963-major-analysis-of-cops-soci
al-media-accounts-finds-1-in-5-have-posted-racist-violent-content
Anecdotes of claimed Internet Bias against
Republicans that could be computer glitches
Twitter, Facebook, Google, and other popular websites
David Harris Jr. (Conservative commentator)- posted on
Facebook but a photo of a letter that accompanied the video he
posted vanished, and showed up in his feed days later.
Miles Ranger (Owner of Maine motel)- noticed a change on the
Facebook political account Maine for Trump 2020. Posts and
shares from his conservative friends dropped precipitously.
Some of his posts and shares were deleted immediately without
explanation, but some of his posts showed up 5-6 days later.
This might have been the result of checking for Russian bots
3 Conservative Republican House Members (Mark Meadows
NC, Jim Jordan OH & Matt Gaetz FL)- Their names are not
showing up in the drop-down menus in Twitter searches, but it
can still be accessed on a full search result, it is a kind of
“Shadow banning” which is claimed not experienced by
Democrats. A day after the story appeared the problem stopped.
Claimed Internet Bias against Republicans
Is Due to algorithms against controversy, violence,
inflammatory content and conspiracy theories
US Rep. Marsha Blackburn (R) of Tennessee- run an ad for her Senate
bid, “the sale of baby body parts” (fetal-tissue research). Twitter
deemed that “inflammatory” and “likely to evoke a strong negative
reaction” so they did not run the ad but tweeted it out instead.
California House candidate Elizabeth Heng- Twitter and Facebook
initially rejected her ad. It showed a footage of the Cambodian
genocide participant who killed her parents, then escaped. Both
services reversed their decision few days later.
Lack of visibility of these sites in the news feeds from Google News.
But studies of Google News have found that liberals and conservatives
get almost exactly the same stories in their news feeds, all from
reputable professional news outlets like the New York Times and the
Washington Post, which many conservatives consider left-leaning
although they are in fact centrist
The conservative conspiracy theorist Alex Jones is banned on social
media platforms due to his inflammatory hate rhetoric
Social media block controversial, inflammatory and violent content
Problems with Claims of Social Media Bias against
Republicans
To demonstrate bias against Republicans a study is required that
statistically compares the treatment of Republicans and Democrats
on Internet platforms. There may be explanations other than bias.
Social media platforms use automated algorithms that may
accidentally provide mismatches of suggestions such as those
experienced below. In this case the algorithm may make suggestions
based on the statistical information that most DC voters are
Democrats. Algorithms operate on knowledge like statistics.
South Carolina Rep. Jeff Duncan (R) staffer made a Twitter Test account.
Identifying herself only with email address and a phone number with a
202 area code.
She received suggestions to follow:
Democratic politicians
Pundits
Former officials
Journalists Jim Acosta (CNN) & Chuck Todd (NBC)
MANY SCHOLARS WHO STUDY SOCIAL
MEDIA AGREE IT IS NOT BIASED
“It’s a false narrative that conservatives are bearing the brunt of
some kind of campaign against them,” Ari Waldman, director of the
Innovation Center for Law and Technology at New York Law
School, writes in an email. “Platforms also mistakenly ban pictures
of women breastfeeding. They also ban civil rights activists who
post photos in order to protest police brutality. They also ban drag
queens…. Content moderation is simply a difficult business.”
Problems are caused by heavy reliance on technology of algorithms
to make human judgements about inflammatory content to block
Another factor is social media’s clampdown on fake news and
accounts used by Russia to meddle with US elections has resulted in
stricter domestic standards against fake news, conspiracy theories
Social media companies have done a poor job of making clear
what’s acceptable and not acceptable on their sites
In the vacuum due to lack of transparency, conspiracy theories about
social media can emerge that appear plausible
Social media companies are suppressing inflammatory content
PROS OF INTERNET
Increasing connectivity
with people around the Development of larger
world personal networks
Increased sharing of ideas
Faster communication
and information
and spread of
Increased individual and
information
group knowledge Faster exchange of ideas
Increased rate of
increasing the speed of
innovations building on
developing new ideas
each other
and inventions
More diverse, and
Faster dissemination of
therefore democratic,
sources of news
information to followers
in political campaigns
PROS CONTINUED Wikileaks creates
government transparency
Online dating (lots of marriages
now come from online dating previously lacking
sites) Cultures can easily find out
Easier communication between about different cultures
different cultures SPEED! (information can
Online services such as Online
be accessed within seconds)
Banking, Online Shopping, and
Interactive medium.
Online Training. (Convenience)
Ability to Telecommute- (Unlike TV or Radio which
Distance no longer an issue is a passive medium.)
Online College Degrees/Online Directions/Online Maps
Learning or Tutoring (No longer Lost!)
Data Storage on the Cloud
CONS
Rapid spread of computer
viruses and worms Uses a huge amount of
Computer hacking crimes
electricity
Scammers, phishing emails Servers require huge rooms
misrepresented as banks, of computers for storing
etc asking for personal data
information and passwords Cyber bullying leads to
Identity theft from online many suicides
databases Online dating (creepy
Emails misrepresenting people)
themselves as banks etc., Less face-to-face interaction
asking for personal Large-scale centralized data
information and passwords
storage and huge use of
More impersonal and lack
electricity
of social skills
CONS CONTINUED
Becoming Dumber? (When you
can just look up and answer,
why should you need to
understand anything?)
Cheating. Schools have to use Questionable reliability of
preventive measures to keep information, misinformation
students from using the Freedom. People can post
Internet. WHATEVER they want. (How to
Plagiarism/stealing. Anyone build bombs, etc.)
can take what you say and Cost- Have to keep buying newer
claim it is their own if you post technology to use efficiently. (More
it freely on the internet without RAM, more computing power, etc)
protection. TOO much information? Hard to
Child Predators find what you want because you
have to sift through infinite
webpages.
ETHICAL ISSUES
Children need protection from access to everything on the
internet, good or bad
The amount of information that companies and other people can
get from us is astounding; we might not even know that they are
taking the information and photos from facebook pages, etc.
There are many possibilities of becoming addicted parts of the
internet, or radicalized to believe false conspiracy theories.
“Replacement theory” online led a white 18
by President Carter
The Director of National Intelligence and the
Clearview AI, a facial recognition company, has been fined almost $10
million by the UK’s Information Commissioner’s Office (ICO). The
ICO is a data protection watchdog in the UK, and it found that
Clearview AI has been breaching data protection laws by collecting
people’s personal data, including photos, without their consent.
This isn’t the first time that Clearview AI has been fined for this issue.
Italian data protection authorities fined them earlier this year for $21
million.
The ICO’s investigation was carried out with the Australian
information commissioner. John Edwards, the UK’s information
commissioner, will also be meeting with European regulators in
Brussels this week, stating that “international cooperation is essential to
protect people’s privacy rights in 2022”.
THE WALLS ARE CLOSING IN ON
CLEARVIEW AI BY MELISSA HEIKKILÄ MIT
TECHNOLOGY REVIEW 5/24/22
Silkie Carlo, the director of Big Brother Watch, a UK digital rights group,
said this will stop Clearview AI from operating in the UK. She also said that
the UK government should ban facial recognition surveillance.
Even though the US doesn’t have federal data protection laws, action has
been taken against Clearview AI. The ACLU won a settlement in May 2022,
restricting the company from selling their data to most US businesses. Illinois
has a biometric data law, so Clearview AI can’t sell its database to any entity
there for 5 years.
Europe is working on a law that could ban the use of “real-time remote
biometric identification systems”, which includes things like facial
recognition, in public places. It would also restrict law enforcement from
using facial recognition unless it is for crimes such as terrorism or
kidnappings.
Influential data protection watchdogs in the EU have called for the banning of
law enforcement use of web-scraped databases.
APPLE’S 14.5 IOS PRIVACY UPDATE
Apple’s iPhone operating system (iOS) had long been tracking the behavior of its users in
order to sell targeting information to advertisers
While Apple had offered a method for disabling tracking, it was complicated and difficult
for most iPhone users to turn it off, and many of them didn’t even know the level of tracking
that was occurring while they were using their phone
Apple’s recent iOS 14.5 update requires iPhone users to explicitly confirm that they want to
be tracked across the internet
While the update is relatively new and users are slowly upgrading their iOS versions, some
experts estimate that over 90% of iPhone users will opt out of tracking
Apple has received significant pushback from advertisers and data collection businesses
about this change, largely because they have significantly profited on the buying and selling
of consumer data
The data that is collected by tracking software is used to run online advertising’s Real Time
Bidding (RTB) competitive system for online ads, resulting in hundreds of billions of dollars
in revenue each year, but which is also legally questionable – specifically under the EU’s
General Data Protection Regulation (GDPR)
This change in Apple’s iOS will push this issue to the forefront and challenge other tech
companies to address their policies and approaches to tracking, managing, sharing, and
securing users’ private data
Source: https://www.theguardian.com/commentisfree/2021/may/22/if-apple-is-the-only-organisation-capable-of-defending-our-privacy-it-really-is-time-to-worry
PRIVACY ISSUES WITH GOOGLE’S ANDROID OS
As part of a lawsuit brought by the Arizona Attorney General, documents revealed that
Google actively sought to hide or obstruct from users the ability to turn location sharing off
on their Android smartphones
When Google tested versions of its Android OS that made turning off and on location
settings more easily accessible, users took advantage of them and regularly turned off the
functionality
Google considered this behavior a “problem” and sought to hide these settings deep within
the OS, making it harder for users to take control of their private data
Not only did Google force users to opt-in to location sharing with Google in order to use
third-party apps or WIFI functionality, they also made the process of opting out of location
sharing so obscure that not even their own employees understood how to do it
Google also pressured manufacturers to hide location settings in order to prevent users from
turning off location data collection
Google employees suggested that this type of behavior was one reason that Android-based
phones aren’t as popular as the iPhone, as users want to have more control over their data,
especially location-specific information
Source: https://www.businessinsider.com/unredacted-google-lawsuit-docs-detail-efforts-to-collect-user-location-2021-5
SOCIAL NET SPEECH IS
PROTECTED (NEW YORK TIMES ARTICLES)
After some workers were fired for information on their facebook pages,
the Labor Relations Board ruled in 2011 that firing for information on
social media sites is illegal.
New laws allow workers to discuss their workplace in a negative fashion
on Facebook, Twitter, and other social media, which was previously
forbidden
There are restrictions:
The posts cannot be personal vents
They must be aimed at getting better conditions and working toward
helping the employees they work with
One news reporter was fired because, fed up with having no news stories
lately, she posted on Twitter, “You stay homicidal, Tucson,” among other
comments about her disappointment that no one had been killed the
previous night.
The new law did not protect this reporter from being fired because she
was encouraging violence and was venting her feelings, as opposed to
trying to help people in the workforce
THINGS THAT ARE ILLEGAL TO POST OR PARTICIPATE
IN ON SOCIAL MEDIA OR OTHER INTERNET WEBSITES
defamation
Harassing or threatening harm to another person is illegal anywhere
Hate speech slandering a racial or religious group. Slander is illegal.
Perpetrating a fraud is illegal using whatever means
Infringement of Intellectual property law, such as copyright, trademarks
and patents
WHAT IS ILLEGAL UNDER SECTION 230
OF THE 1934 COMMUNICATIONS ACT
Section 230 of the 1996 Communications Decency Act, which amended
the 1934 Communications Act in order to encourage the growth of the
internet, exempts interactive computer services such as social media from
being held accountable for what is posted by content providers, whether
users, or companies providing content such as news or videos.
However, section 230 states that interactive computer services are still
liable for infringements of federal criminal laws; intellectual property laws
protecting copyrights, trademarks and patents; the 1996 Electronic
Communications Privacy Act and similar state laws; and laws against sex
trafficking, prostitution and child pornography. They could also be
prosecuted under the Patriot act for providing assistance to terrorist
organizations if they are allowed to post.
To avoid prosecution, interactive computer services need to block
organizations from posting that are involved in criminal activity, including
sex trafficking, prostitution, child pornography, terrorism, and infringing
intellectual property law.
Protect IP Act – PIPA would give the government the
ability to block access to websites considered to have
stolen content
SOPA – Stop Online Piracy Act – would require search
engines to remove content infringing on copyrights –
notices are put up in case of this.
Hundreds of websites blacked out their sites on January
18th, 2012 to show what would happen if the Senate
passed these bills
Neither bill was passed
GOVERNMENT SUBSIDIES SUPPORTING
THE INTERNET
Government development of ARPANET
1998 – E-Rate provides $2.25 billion yearly subsidies to
promote affordable internet connections for schools and
libraries
2013 – FCC spends $115 million to subsidize broadband
internet providers to extend services to rural parts of the
U.S.
UNDERLYING BELIEFS INVOLVED IN
DEVELOPMENT OF INTERNET
Open access
Free sharing of information
In December 2017 the FCC, chaired by Ajit Pai appointed in 2017, voted 3
Republicans to 2 Democrats to reverse the rules adopted under the Obama
administration. Went into effect June 11, 2018.
BIAS and ISPs again are classified as less regulated information services
under Title I of the 1934 Communications Act.
the general conduct standard was eliminated.
ISPs can offer paid prioritization and can throttle or block access to the
internet for edge providers, etc.
The FTC assumed the major role in taking action against ISPs that undertake
anticompetitive acts or unfair and deceptive practices
ISPs are still subject to enhanced transparency requirements and must
publicly disclose, via a publicly available, easily accessible company website
or through the FCC’s website, information regarding their network
management practices, performance, and commercial terms of service
The Trump Justice Department filed a lawsuit to block California’s state net
neutrality law from taking effect in January 2019.
2018 US SUPREME COURT ENDS FIGHT OVER
OBAMA-ERA NET NEUTRALITY RULES
The new rules, which give ISPs greater power to regulate the content
that customers access, are now the subject of a separate legal fight after
being challenged by many of the groups that backed net neutrality.
US Supreme Court refused a request by the Trump administration and
the telecommunications industry to wipe away a lower court decision
that had upheld Obama-era net neutrality rules aimed at ensuring a free
and open internet, though the justices’ action does not undo the 2017
reversal of the FCC policy.
FCC Commissioner Jessica Rosenworcel, appointed by President
Biden in 2021 to replace Ajit Pai, said President Trump “actually
petitioned the Supreme Court to erase history and wipe out an earlier
court decision upholding open internet policies. But today the Supreme
Court refused to do so.”
Democratic President Obama’s attempt to safeguard equal access to the
internet, was overturned by Republican President Trump, a Republican.
COMPANIES PRO AND CON 2018 FCC REPEAL
OF OBAMA-ERA NET NEUTRALITY RULES
The net neutrality repeal was a win for providers like:
Comcast Corp.
AT&T Inc.
Verizon Communications Inc.
It was opposed by internet companies like:
Facebook Inc.
Amazon.com
Alphabet Inc.
Which have said the repeal could lead to higher costs to
customers.
1934 COMMUNICATIONS ACT SECTION 230
EXEMPTS INTERNET COMPANIES FROM LEGAL
LIABILITY FOR USERS’ POSTED CONTENT
To encourage growth of the internet, Section 230 c.1, was added from the 1996
Communications Decency Act that was Title V of the Telecommunications Act
states:
“No provider or user of an interactive computer service shall be treated as the
publisher or speaker of any information provided by another information content
provider [user or company].”
This means that providers of interactive computer services such as social media
platforms are considered distributors of information from other information content
providers, meaning users or internet companies providing content such as news feeds
or videos, etc. As distributors, the providers of interactive computer services are not
accountable or liable for content on their websites, in contrast to publishers, who are
liable for the accuracy of information that they publish.
Definitions
Interactive computer service: Any information service that provides or enables
access to the internet and ability to post by multiple users
Information content provider: Any person or entity that is responsible, in whole or in
part, for the creation or development of information provided through any interactive
computer service.
1934 COMMUNICATIONS ACT SECTION 230
EXEMPTS INTERNET COMPANIES FROM LEGAL
LIABILITY FOR RESTRICTING ACCESS TO
OBJECTIONABLE CONTENT
“Civil liability. No provider or user of an interactive computer service shall be held
liable on account of— (A) any action voluntarily taken in good faith to restrict access
to or availability of material that the provider or user considers to be obscene, lewd,
lascivious, filthy, excessively violent, harassing, or otherwise objectionable, whether or
not such material is constitutionally protected; or (B) any action taken to enable or
make available to information content providers or others the technical means to
restrict access to material described in paragraph (1).1 (d) Obligations of interactive
computer service. At the time of entering an agreement with a customer for the
provision of interactive computer service, the provider shall notify such customer that
parental control protection computer hardware, software, or filtering services are
commercially available.”
This part of section 230 is called the “Good Samaritan” clause and exempts social
media companies and users such as parents from lawsuits opposing blocking of
objectionable speech over freedom of speech rights in the 1 st amendment of the US
constitution, which don’t apply to private companies such as social media platforms.
Section 230 provides internet service providers safe harbors to operate as
intermediaries of objectionable content without fear of being liable for that content as
long as they take reasonable steps to delete or prevent access to objectionable
content.
WAYS 1934 COMMUNICATIONS ACT SECTION 230
EXEMPTS INTERACTIVE COMPUTER SERVICES
FROM ACCOUNTABILITY FOR WHAT IS POSTED ON
THEIR WEBSITES
Providers of interactive computer services cannot be held accountable for content
posted by users on their platforms because they are considered distributors and NOT
publishers or speakers, who would be responsible for the accuracy of information they
provide.
Providers of interactive computer services cannot be held accountable for content
posted on their platforms by other companies providing content such as newsfeeds or
videos.
Interactive computer services are immune from lawsuits based on claims related to
content published by third-parties (users or companies) using their service.
Interactive computer services are immune from lawsuits for blocking posts or banning
accounts for hateful, inflammatory, violent or obscene language.
Users of an interactive computer service shall not be treated as the publisher or speaker
of any information provided by another information content provider
WHAT IS ILLEGAL UNDER SECTION 230
OF THE 1934 COMMUNICATIONS ACT
Section 230 of the 1996 Communications Decency Act, which amended
the 1934 Communications Act in order to encourage the growth of the
internet, exempts interactive computer services such as social media from
being held accountable for what is posted by content providers, whether
users, or companies providing content such as news or videos.
However, section 230 states that interactive computer services are still
liable for infringements of federal criminal laws; intellectual property laws
protecting copyrights, trademarks and patents; the 1996 Electronic
Communications Privacy Act and similar state laws; and laws against sex
trafficking, prostitution and child pornography. They could also be
prosecuted under the Patriot act for providing assistance to terrorist
organizations if they are allowed to post.
To avoid prosecution, interactive computer services need to block
organizations from posting that are involved in criminal activity, including
sex trafficking, prostitution, child pornography, terrorism, and infringing
intellectual property law.
COURT CASES NARROW SECTION 230
The first major challenge to Section 230 was the 1997 case Zeran v.
AOL, in which a person sued American Online (AOL) for failing to
remove, in a timely manner, libelous ads posted by AOL users that
inappropriately connected his home phone number to the Oklahoma
City federal office building bombing. The court found for AOL and
upheld the constitutionality of Section 230, stating it "creates a federal
immunity to any cause of action that would make service providers
liable for information originating with a third-party user of the service.”
US Naval Academy Law professor Jeff Kosseff contrasted the majority of
cases 2001-2 that upheld website immunity under Section 230; Versus more
than half of 27 cases 2015–2016 that denied the service provider immunity
under section 230. Kosseff asserted the Roommates.com decision was the key
factor that led to this change.
In the 2008 case Fair Housing Council of San Fernando Valley v.
Rommates.com LLC, 521 F.3d 1157, the 9th Circuit Court ruled that the
mandatory questionnaire on the website made Roommates.com a content
provider ineligible for Section 230 protections when they facilitated
discrimination and violated the Fair Housing Act by including gender and
race on profiles of people seeking roommates.
COURT CASES ON SECTION 230
The family of US citizen Nawras Alassaf, who died in 2017 during an ISIS
affiliated attack in Istanbul, sued Twitter, Google and Facebook for failing
to control terrorist content on their sites.
Twitter appealed the lower court decision, claiming it improperly
expanded the scope of the Anti-Terrorism Act, 18 U.S.C. § 2333 to make
the social media companies liable for providing material assistance to a
terrorist organization
The Ninth Circuit Court of Appeals did not consider protections under
Section 230, and affirmed the lower court ruling that stated Twitter,
Google and Facebook could be liable for "aiding and abetting" a
designated foreign terrorist organization in an "act of international
terrorism", on account of recommending such content posted by users,
under Section 2333 of the Antiterrorism and Effective Death Penalty Act
of 1996.Twitter appealed to the US Supreme Court,
In the case of Gonzalez v. Google LLC, the Supreme Court ruled in 2022
that Google was not liable under Section 230 for its YouTube
recommendation options that appeared to promote recruitment videos for
ISIS that led to the death of a U.S. citizen in a 2015 Paris terrorist attack.
THINGS THAT ARE ILLEGAL TO POST OR PARTICIPATE
IN ON SOCIAL MEDIA OR OTHER INTERNET WEBSITES
defamation
Harassing or threatening harm to another person is illegal anywhere
Hate speech slandering a racial or religious group. Slander is illegal.
Perpetrating a fraud is illegal using whatever means
Infringement of Intellectual property laws protecting copyrights,
Viewing the profile of the person who posted the illegal content.
Tracing the IP address of the person who posted the content.
Viewing likes/comments on the illegal content.
Viewing the IP addresses that visited the page with the illegal
content
Viewing the usernames and passwords saved by cookies on
webpages with illegal content
Definition of Internet Cookie: a packet of data, including username
and password, that a computer receives, Saves, and then sends back
without changing or altering it. Saving personal information is
potentially very dangerous. In an ideal world, you never accept the
use of cookies.
THE DANGERS OF BIG CITY
SUBSIDIES
The internet was created with federal funding but was then given to
private companies without any standards for level of service or
prices
Major US internet companies such as Comcast, Verizon and AT&T
have been given federal grants to provide internet service to
underserved areas and have only provided minimal connections to
the internet while pocketing most of the large grants as profits
There are no federal controls on prices charged by ISPs because
they are classified under Title I of the 1934 Communication Act as
information rather than under Title II as telecommunications service
public utilities that have to charge reasonable prices
In Europe the internet is operated by governments that provide
faster speeds at lower prices than in the US
SOURCES
http://computer.howstuffworks.com/internet/basics/internet.htm
http://news.discovery.com/tech/gear-and-gadgets/how-facebook-sells-your-personal-information-1301241.htm
http://www.huffingtonpost.com/2014/01/03/facebook-lawsuit-private-messages_n_4536154.html
http://mashable.com/2006/09/08/facebook-gets-egg-on-its-face-changes-news-feed-feature/
https://www.priv.gc.ca/cf-dc/2009/2009_008_0716_e.asp
http://guycodeblog.mtv.com/2010/10/01/facebook-privacy-identity-theft-data-mining/
http://www.voanews.com/content/wikileaks-organization-sparks-controversy-99311219/122708.html
http://www.cnn.com/2011/US/03/19/wikileaks.ellsberg.manning/
http://guardianlv.com/2013/10/online-dating-becoming-more-popular-than-ever/
http://scoiltalbot.scoilnet.ie/blog/cyber-bullying/
http://online.wsj.com/article/BT-CO-20140219-709059.html
Lloyd, Seth. 2009. Privacy and the Quantum Internet. Scientific American Volume 301 Number 4, Pp. 80-85.
Lazare, Sarah and Ryan Harvey. 2010. WikiLeaks in Baghdad: Soldiers come forward to tell their story. The
Nation, Vol. 291, No.s 7 & 8, Pp. 24-7.
http://inventors.about.com/od/istartinventions/a/internet.htm
http://inventors.about.com/library/blcoindex.htm
http://ops.fhwa.dot.gov/publications/telecomm_handbook/chapter2_01.htm
http://upthehillandthroughthewoods.wordpress.com/2012/11/28/when-the-pulsing-of-light-become-friends/
http://www.pixuffle.net/?p=41
Greenhouse, Steven. 2013. Even if It Enrages Your Boss, Social Net Speech Is Protected. The New York Times.
Greenhouse, Steven. 2010. Company Accused of Firing Over Facebook Post. The New York Times.
http://www.bagnewsnotes.com/files/2013/03/Kuni-Takahashi-Baghdad-03-Lightbox.jpg
http://readersupportednews.org/news-section2/318-66/22352-whats-the-right-path-forward-on-net-neutrality
http://2.bp.blogspot.com/-DDMqAxTOl7Q/USxihknRX7I/AAAAAAAAB50/IC4FM7PiwVY/s1600/world+int
ernet.jpg
http://oliveharveycollegelibraryguides.pbworks.com/f/1337012180/plagiarism.gif
SOURCES
http://www.apa.org/monitor/2008/07-08/ethics.aspx
http://internetsafety1.wikispaces.com/2
http://www.theguardian.com/commentisfree/2012/dec/23/internet-will-oligarchs-control-it
http://taxlady23.com/2013/03/
http://www.fairobserver.com/sites/default/files/imagecache/featured/j.koerber/shutterstock_96754351.jpg
http://beforeitsnews.com/mediadrop/uploads/2014/04/20a113880ffc03656785fbe586c5105ca6b0bcca.jpg
http://graphics8.nytimes.com/images/2013/08/19/opinion/rfd-censor/rfd-censor-sfSpan.jpg
http://www.yops.in/wp-content/uploads/2013/12/easier-communication.png
http://www.oecd.org/media/oecdorg/topics/internet/48405289.jpg
http://www.washingtonpost.com/sf/brand-connect/wp-content/uploads/sites/3/2014/01/Internet1.jpg
http://www.techpolicydaily.com/wp-content/uploads/2013/09/brett-blog-pic.jpg
http://www.nchannel.com/wp-content/uploads/2012/07/amazon-logo.jpg
http://man-and-van.me.uk/wp-content/uploads/ebay_logo_gross.jpg
http://www.the-digital-reader.com/wp-content/uploads/2014/02/Fcc_logo1.gif
http://blog.delicious.com/wp-content/uploads/2013/07/facebook_logo.jpg
https://lh3.googleusercontent.com/-2xGuOStxLDU/TY3sSl13OSI/AAAAAAAABFU/d7qES6IcC6A/s1600/images_
chron_com_photos_2011_01_24_25639322_600xPopupGallery.jpg
http://i.dailymail.co.uk/i/pix/2011/05/27/article-0-0A539A5D000005DC-57_468x286.jpg
http://bpmforreal.files.wordpress.com/2013/02/information-security.jpg
http://www.gyanvihar.org/infra/internet_1.jpg
https://www.evidon.com/sites/default/files/ECPA-scroll_0.png
http://static.ddmcdn.com/gif/quantum-computer-internet-illos-660x433.jpg
http://static.ddmcdn.com/gif/quantum-computer-internet-illos-660x433.jpg
https://d320ze5h7gg57a.cloudfront.net/sites/default/files/imagecache/news_image/files/news_images/
patriotact_infographic_butt_0.jpg
SOURCES
http://www.nytimes.com/2016/06/15/technology/net-neutrality-fcc-appeals-court-ruling.html?_r=0
https://act.credoaction.com/me/update/?t=3&akid=18646.2793229.Rb0Gwy
Belsie, Laurent. Beyond Alex Jones: Twitter and Facebook Face Heat Over Alleged Bias. RSN. 10 September 2018.
https://readersupportednews.org/news-section2/318-66/52209-beyond-alex-jones-twitter-and-facebook-face-heat-over-alleged-bias.
Accessed 12 December 2018
Lakeoff, George. Two Years in, Trump Can Still Count on News Media to Do His Bidding. RSN. 28 October 2018.
https://readersupportednews.org/opinion2/277-75/53065-focus-two-years-in-trump-can-still-count-on-news-media-to-do-his-bidding.
Retrieved 13 December 2018
Timberg & Romm, Tony. Russia Used Every Major Social Media Platform to Help Elect, Support Trump, Report Says. RSN. 17
December 2018. https://readersupportednews.org/news-section2/318-66/53962-russia-used-every-major-social-media-platform-to-
help-elect-support-trump-report-says. Retrieved 19 December 2018
Hurley, Lawrence. US Supreme Courts Ends Fight Over Obama-Era Net Neutrality Rules. 5 November 2018. RSN. https://
readersupportednews.org
/news-section2/318-66/53213-us-supreme-court-ends-fight-over-obama-era-net-neutrality-rules. Retrieved 11 December 2018.
https://www.theguardian.com/commentisfree/2021/may/22/if-apple-is-the-only-organisation-capable-of-defending-our-privacy-it-real
ly-is-time-to-worry
Gross, Grant. 2010. Canadian Law Clinic Files Privacy Complaint Against Facebook. ABC News. IDG News Service.
https://abcnews.go.com/Technology/PCWorld/story?id=4964718
Center for Democracy and Technology. 2018. Cybersecurity and Standards. Tech Explained: The Glossary. July 31. https://cdt.org/insights/tech-explained-the-
glossary/
1. "Supreme Court to hear challenge to law that shields internet companies from lawsuits". USA Today.
2. ^ Robertson, Adi (October 3, 2022). "The Supreme Court will determine whether you can sue platforms for hosting terrorists". The Verge. Retrieved October 4, 2022.
3. ^ McCabe, David (January 19, 2023). "Supreme Court Poised to Reconsider Key Tenets of Online Speech". The New York Times.
: https://act.credoaction.com/me/update/?t=3&akid=18646.2793229.Rb0Gwy