cybersecurity: hacking, social media, and fake news dr. emily … · 2019-09-18 · cybersecurity:...

22
Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily Laidlaw, Associate Professor, University of Calgary

Upload: others

Post on 07-Jul-2020

12 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily … · 2019-09-18 · Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily Laidlaw, Associate Professor, University

Cybersecurity: Hacking, Social Media, and Fake newsDr. Emily Laidlaw, Associate Professor, University of Calgary

Page 2: Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily … · 2019-09-18 · Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily Laidlaw, Associate Professor, University

Overview

2

Overview of CybersecurityOverview

Locate within the legal landscape

Contextualize

Case study: Platforms/Big Tech

Case Study

Page 3: Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily … · 2019-09-18 · Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily Laidlaw, Associate Professor, University

What is cybersecurity?

3

Page 4: Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily … · 2019-09-18 · Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily Laidlaw, Associate Professor, University

Cybersecurity

Technology: Encryption; Biometrics; Social Media; Blockchain; Internet

of Things; fintech; drones; artificial intelligence; smart devices; robots;

big data.

Stakeholders: Government; Military; Civil Society; Business;

Tech; users; academics

Areas of law: competition law, public law – constitutional, national security; private law –business regulation, tort law,

contracts; criminal law; international law and governance;

jurisdiction; human rights.

Regulatory Issues: platform regulation; fundamental rights; surveillance; Hacking; national

security; cybercrime/warfare; e-commerce; data protection; abuse;

business regulation; reputation; trade.

Page 5: Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily … · 2019-09-18 · Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily Laidlaw, Associate Professor, University

Two key features of cybersecurity regulation

5

Cybersecurity is about technology regulation (how it regulates us and we regulate it).

Cybersecurity is about people.

Page 6: Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily … · 2019-09-18 · Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily Laidlaw, Associate Professor, University

Public/Private Forms of Governance

• A defining feature of modern cybersecurity strategy is public and private partnerships.

• Soft partnerships between businesses and state;

• The Canadian Centre for Cybersecurity

6

Page 7: Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily … · 2019-09-18 · Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily Laidlaw, Associate Professor, University

Platforms and Security

7

Page 8: Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily … · 2019-09-18 · Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily Laidlaw, Associate Professor, University

Altered Videos and Deepfakes

8

Page 9: Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily … · 2019-09-18 · Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily Laidlaw, Associate Professor, University

Law and Platforms

9

Content Regulation

Data protection and privacy

Competition Law

Tort Law

Business Regulation

Page 10: Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily … · 2019-09-18 · Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily Laidlaw, Associate Professor, University

Definition

10

Intermediaries are those that ““Bring together or facilitate transactions between third parties on the internet.” OECD

Internet Information Gatekeeper: “facilitates or hinders deliberation and participation in the forms of meaning making in democratic culture.” Laidlaw

Platforms: social, cultural and market power. Many are “attention merchants” (Tim Wu, 2016).

Page 11: Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily … · 2019-09-18 · Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily Laidlaw, Associate Professor, University

IntermediariesInternet Access Providers

(e.g. Internet Service Providers (ISPs), mobile phone companies, wifi

networks ;

Search Engines (e.g. Google, Bing, Duck Duck

Go)

Social networking providers (e.g. Facebook,

Twitter, Reddit)

Content hosting (e.g. Wikipedia)

Audio-visual platforms (e.g. YouTube, TikTok,

Instagram)

Music Platforms (e.g. Spotify)

E-Commerce intermediaries (e.g. eBay,

Amazon)

Payment systems (e.g. PayPal)

Domain name registrars (e.g. CIRA, GoDaddy)

Application intermediaries (e.g. Apple’s App store,

Google Play)

Publishing services (e.g. Blogger)

Cloud services (e.g. Dropbox)

Shared Economy platforms (e.g. AirBnB,

Taskrabbit, Uber)

Advertising intermediaries (e.g. Google, Facebook)

Content aggregators (e.g. Netflix, Feedly)

Location services (Yelp, Tripadvisor

Crowdsourcing intermediaries

(Change.org, GoFundMe)

Page 12: Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily … · 2019-09-18 · Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily Laidlaw, Associate Professor, University

Models of Liability

12

Strict Liability

• USA s. 230 Communications Decency Act

Broad immunity

• USA Digital Millennium Copyright Act• Europe E-Commerce Directive• Canada common law defamation

Safe Harbour (conditional immunity)

• Canada Copyright Act

Notice-and-notice

Page 13: Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily … · 2019-09-18 · Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily Laidlaw, Associate Professor, University

13

Page 14: Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily … · 2019-09-18 · Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily Laidlaw, Associate Professor, University

Platform Power and Policy

Intermediary liability…

14

is central to innovation policy.

is central to free speech policy.

Is all about data.

exposes a tension between the freedom to conduct business and and their public functions.

is about regulatory design.

Page 15: Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily … · 2019-09-18 · Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily Laidlaw, Associate Professor, University

Current Trends: Techlash

CanadaUSMCA - import s. 230?

House of Commons report – removal of manifestly illegal content etc.

EuropeGermany - NetzDGEurope – Terrorism content; copyright contentUK – Duty of Care modelUK – new Digital Authority

Page 16: Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily … · 2019-09-18 · Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily Laidlaw, Associate Professor, University

Regulating for the Future: Challenges

16

Page 17: Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily … · 2019-09-18 · Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily Laidlaw, Associate Professor, University

Careful about Unintended

Consequences

Hate Speech• Germany’s NetzDG in disarray.• Black Lives Matters Movement content

takedown.• Gab – pushed to dark net.

Page 18: Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily … · 2019-09-18 · Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily Laidlaw, Associate Professor, University

Prompting Corporate

Responsibility at a Price

Content Moderation• As a system of privatized governance.• Who are the ”deciders”?

Page 19: Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily … · 2019-09-18 · Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily Laidlaw, Associate Professor, University

Effective Regulation

DisinformationRecommendation 10, House of Commons, Democracy Under Threat“That the Government of Canada enact legislation imposing a duty on social media platforms to remove manifestly illegal content in a timely fashion, including hate speech, harassment and disinformation, or risk monetary sanctions commensurate with the dominance and significance of the social platform, and allowing for judicial oversight of takedown decisions and a right of appeal.”• Intermediary liability is an important part of

innovation policy.• Techno-legal solutions eg flagging content.• The problem of irrational people and entrenched

beliefs.

Page 20: Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily … · 2019-09-18 · Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily Laidlaw, Associate Professor, University

The role of Technology in

Regulatory Design

Artificial Intelligence, Algorithms and DesignRecommendation 9, House of Commons, Democracy Under Threat“That the Government of Canada enact transparency requirements with respect to algorithms and provide to an existing or a new regulatory body the mandate and the authority to audit algorithms.”• Not yet sophisticated enough assess context.• Designed by Humans.• “Black Box Society” (Frank Pasquale)

Page 21: Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily … · 2019-09-18 · Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily Laidlaw, Associate Professor, University

Where we are at and where we are going

21

We don’t know what we don’t know.

Artificial intelligence and algorithms

Power and Influence

Nimble regulation

Page 22: Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily … · 2019-09-18 · Cybersecurity: Hacking, Social Media, and Fake news Dr. Emily Laidlaw, Associate Professor, University

Emily LaidlawAssociate ProfessorFaculty of LawUniversity of Calgary