Tuesday, August 19, 2014

Julian Assange: When Google Met WikiLeaks

Julian Assange's latest book When Google Met WikiLeaks is partially a response to Eric Schmidt and Jared Cohen's The New Digital Age, published on the eve of the Snowden revelations in 2013. The disclosure that that the US government was collecting massive amounts of user data via the major US tech companies somewhat undermined the techno-utopianism of the Google sponsored manifesto. The New Digital Age featured (along with a range of various 'The Future Of ...' topics) some discussion of WikiLeaks and Assange, including some loose logic connecting hackivism with terrorism, questioning the role of WikiLeaks (and Assange in particular) in providing a leaking platform, and vague, untrue assertions about the harm caused by various leaks, and Assange now seeks to correct the record.

When Google Met WikiLeaks consists primarily of a transcript of the long discussions/ interview that took place while Assange was staying at Ellingham Hall whilst under house arrest. Schmidt and Cohen asked Assange to expound on a number of topics, noting that the views would be incorporated in their future book. The book also includes context, Assange's response to claims made in The New Digital Age, and a timeline of events.

This short book is well worth a read, as is Assange's other book Cypherpunks, if you want a chilling view of the future of the internet. Rather than couching everything in pseudo-management speak, Assange spells out the potential threats to the open internet, privacy and free speech.

As Assange notes early on, the involvement of Google in routine metadata harvesting should not come as a surprise to anyone. Google's corporate mission after all is to collect and "organise the world's information and make it universally accessible and useful" and Google obtained NSA funding to develop search tools to make sense of the data it was collecting (39).

The book is an essential read for anyone attempting to understand Assange's philosophy regarding secrecy, leaks and whistleblowing, correcting as it does some of the quotes attributed to him in The New Digital Age.

Both Cypherpunks and When Google Met WikiLeaks will remain largely unread by a public that remains far too blasé about the revelations regarding what is being done with our data. However, they provide thoughtful and knowledgable insights into the challenges of data and surveillance and should be given greater prominence in public analysis of the Big Data issue. Assange is at the forefront of the analysis of these issues and his insights should be given greater prominence given his first hand experiences with whistleblowing, surveillance and the media. Recommended reading for anyone who cares about the 'future of the internet'.

Wednesday, August 13, 2014

CFP: Media & Arts Law Review: Law and Law Breaking in Game of Thrones

The Editors of the Media and Arts Law Review are preparing a Special Issue of the journal which will consider various issues of law and regulation that arise in the HBO TV Series Game of Thrones and the George RR Martin books, upon which the series is based.

Articles should be between 6,000- 8,000 words and may address any area of law that is relevant to an aspect of Game of Thrones. The special issue will be published mid-2015.

Proposals for an article of 500 words and including a brief author bio should be sent to Melissa.dezwart@adelaide.edu.au. The proposal is due 10 October 2014 and acceptance of the proposal will be advised by 20 October 2014.

If the proposal is accepted, a full article suitable for blind double peer review must be submitted by 19 December 2014.

Please contact Melissa.dezwart@adelaide.edu.au if you have any questions.

The Media & Arts Law Review is the only Australian-based journal to focus on a broad range of legal issues affecting cultural life. The Review aims to engage both the academic and practitioner branches of the profession. It has a wide scope, including: communications, copyright, cultural heritage, defamation, digitisation, entertainment, free speech, intellectual property, journalism, privacy and public interest issues. The Media & Arts Law Review publishes independently refereed articles from Australia and overseas, as well as conference reports and book reviews. It also includes a series of regular update reports on media and arts law developments. These offer a snapshot of matters such as case law, legislation, law reform, convention developments, and changes in industry self-regulation. Update reports include coverage of the US, Canada, the UK, the European Union, New Zealand, Australia and some Asian jurisdictions.


Editors: Jason Bosland and Melissa de Zwart

Wednesday, July 30, 2014

Strategic Space Law Program at McGill

The McGill University Institute of Air and Space Law, in partnership with the University of Adelaide Law School, has planned to offer the first ever Strategic Space Law program. The aim of the program is to provide a unique opportunity for lawyers and other professionals in the defence services, international relations, government, international organisations and other entities around the world to understand space law in a strategic context. The program will be run as a one-week intensive, interdisciplinary, interactive workshop (non-assessable) at the Institute of Air and Space Law, McGill University, from 27-31 October 2014. This Brochure provides more details of the program. The Brochure can also downloaded from:
http://www.mcgill.ca/iasl/channels/event/strategic-space-law-intensive-program-237671

Thursday, June 5, 2014

Glenn Greenwald: No Place to Hide

It is one year since the revelations of former NSA contractor Edward Snowden, confirmed our worst fears regarding widespread interception of telephone and internet communications. Those leaks were carefully shepherded to publication according to a carefully planned timetable by Glenn Greenwald and Laura Poitras (together with Ewen MacAskill of The Guardian) in order to ensure that the importance of those disclosures was not lost in the midst of mass information overload. Greenwald's role in the Snowden leaks has not been without personal risk and cost to him (and to his partner David Miranda) and in this book No Place To Hide, he traverses all of these issues: the background to his meeting with Snowden (together with Poitras) and decisions taken regarding content and timing of publications; his own analysis of the leaked material in context; a discussion of the dangers of mass surveillance and threats to privacy and an exploration of what it means to be a journalist in the post 9/11 era, when concerted efforts are made to break down journalists' protections and to discredit whistleblowers as paranoid loners with no sense of social obligation.
Greenwald has written a very readable book which identifies a number of vital questions for our age. He addresses these questions from a multi-jurisdictional perspective, highlighting key differences in particular between US and UK approaches to journalistic protections and freedom of speech. It also provides a fascinating insight into Edward Snowden, the young man prepared to put his whole life on hold (and potentially much worse) to stand up for what he believes in.
Along the way a number of other interesting points are canvassed.
Greenwald begins by outlining the story of the early contacts that were made to him by Snowden and his uncertainty regarding the status and seriousness of this potential source. Contact was delayed by his own lack of understanding of the need for encrypted communications. Once these obstacles were overcome and he travelled to Hong Kong (meanwhile still questioning whether the effort would be wasted) only to be surprised by the serious, well-organised, thoughtful and startlingly young Edward Snowden. This background reinforces the fact that Snowden's act of whistleblowing was no reckless or random act. Here is a man prepared to sacrifice his own freedom to support the ideals of democracy and transparency. He did not seek any personal gain of any kind and was determined to remove himself from the centre of the story, so the focus was not on personality  but rather about his message.
Greenwald makes an interesting aside regarding the role of video games in shaping Snowden's world view (and of course that of others of his generation) through 'moulding political consciousness, moral reasoning, and an understanding of one's place in the world', as well as the central belief in the value of the internet: 'the world in which his mind and personality developed, a place unto itself that offered freedom, exploration, and the potential for intellectual growth and understanding.' This belief in the need to ensure that the internet functions as a place for freedom and individual actualisation lies behind Snowden's motivations to reveal the vast, daily, bulk collection of personal data being undertaken by the NSA and its equivalents in other States, and Greenwald captures and articulates this core belief well.
A key message to take away from Greenwald's book is the ongoing threat to journalistic standards and freedoms: the detention of David Miranda at Heathrow, the raid on The Guardian's offices and smashing of computer hard drives and the repeated demands for Greenwald's prosecution as a 'co-conspirator"should be seen as very serious incursions on the independence and integrity of journalistic freedoms. As Greenwald notes, the smashing of computers and hard drives by The Guardian on the demand of GCHQ staff is bad enough, but what does it mean for the source who has risked his life to bring their contents to light? How do we deal with growing complicity between journalists and politicians?  Particularly chilling were the references to efforts against Anonymous and the 'human network that supports WikiLeaks'. The attacks on Greenwald were derogatory and dangerous and the status of journalistic standards and the continued existence of an independent media remain in question.
Greenwald's book is still shocking for the stories that it reveals about data collection. The clunky power point slides used to train NSA employees and contracts contained in the book are laughable and chilling for their simplistic message of "Collect it All".
This book is vital reading for anyone concerned about the Snowdon revelations and their implications for privacy, but also for those concerned about the future of journalism in the context of whistleblowing, mass surveillance and Big Data.

Thursday, February 13, 2014

A new tort of privacy in the UK: Vidal-Hall, Hann and Bradshaw v Google Inc [2014] EWHC 13 (QB)


Mr Justice Tugendhat recently handed down this decision in the UK High Court (Queen’s Bench Division) recognizing the existence in the UK of a tort of misuse of private information. Recognition of such a tort is the culmination of many years of the UK courts considering how best to deal with issues of what are essentially invasions of privacy, particularly cases dealing with celebrities, and distorting the concept of breach of confidence in order to accommodate such cases.

A number of matters were considered in the case but this note will focus on the key issue of the recognition of a tort of misuse of private information.

This case concerned claims brought by three users of Google in the UK who alleged that Google had misused their private information and acted in breach of confidence and their statutory duties under the Data Protection Act 1998 by tracking and collating information relating to the Claimants' internet usage using the Safari browser in 2011/ 2012, such as which web sites they visited, how frequently they visited the sites, how long they spent on the site and in what order sites were visited. 

The essence of their claim is that Google collected information from their computers, and other internet enabled devices, regarding their browsing habits. Each Claimant specified in a Confidential Schedule their individual personal characteristics, interests, wishes and ambitions, which they used as the basis of the claim that ‘they suffered distress, when they learnt that such matters were forming the basis for advertisements targeted at them, or when they learnt that, as a result of such targeted advertisements, such matters had in fact, or might well have, come to the knowledge of third parties who they had permitted to use their devices, or to view their screens.’ [at 22] The Claimants' damage is based upon the harm caused to them by the fact that their apparent interests (deduced from their browsing habits) were used to target advertising to them which disclosed certain information about them based on those interests as evidenced in their online habits. Those advertisements, and the personal information that they disclosed, may have or had been viewed by third parties viewing the claimants’ devices. [at 23] Tugendhat J noted [at 24] whilst targeted advertisements which merely reveal the employment of the user may not cause any damage ‘if the targeted advertisements apparently reveal other information about the users, whether about their personalities, or their immediate plans or ambitions, then if these matters are sensitive, or related to protected characteristics (eg beliefs), or to secret wishes or ambitions, then the fear that others who see the screen may find out those matters, and act upon what they have seen, may well be worrying and distressing.’ Whilst all of the Claimants claimed acute distress and anxiety, none of them claimed to have suffered any discrimination or other direct harm.

(It should be noted that the conduct engaged in by Google during the relevant time had since been discontinued, due to regulatory sanctions brought by the United States Federal Trade Commission, which were settled in August 2012 and US state based consumer actions brought by US State Attorneys-General on behalf of 37 US states and the District of Columbia).

In order to satisfy the requirements of the service out rules, the Claimants framed their argument on a number of grounds, including tort. With respect to this claim, Google argued that the cause of action based on misuse of private information/ breach of confidence was not a tort, that no significant physical or economic harm was suffered by the Claimants and the act complained of was not committed in the jurisdiction.

The issue of whether the claim was based in tort is of most relevance to the consideration of the evolution of the privacy tort. Tugendhat J asserted [at 58] that it was clear that a claim for breach of confidence is not a claim in tort, Kitetechnology BV v Unicor GmbH Plastmaschinen [1995] FSR at 777-778. [52] However, the position may be different with respect to misuse of private information, as aluded to in Vestergaard Frandsen A/S v Bestnet Europe Ltd [2009] EWHC 1456 (Ch) where Arnold J stated [at 19] that whilst breach of confidence in not a tort (citing Kitetechnology) ‘Misuse of private information may stand in a different position’ (citing Campbell v MGN [2004] 2 AC 457 at [14]).

Tugendhat J then cited directly from Lord Nicholls in Campbell:
‘This cause of action has now firmly shaken off the limiting constraint of the need for an initial confidential relationship. In doing so it has changed its nature. In this country this development was recognized clearly in the judgment of Lord Goff of Chiveley in Attorney-General v Guardian Newspapers Ltd (No 2) [1990] 1 AC 109, 281. Now the law imposes a 'duty of confidence' whenever a person receives information he knows or ought to know is fairly and reasonably to be regarded as confidential. Even this formulation is awkward. The continuing use of the phrase 'duty of confidence' and the description of the information as 'confidential' is not altogether comfortable. Information about an individual's private life would not, in ordinary usage, be called 'confidential'. The more natural description today is that such information is private. The essence of the tort is better encapsulated now as misuse of private information." (emphasis added)’

Tugendhat J then considered the complexity of issues surrounding the recognition of such a tort in the context of other decisions and the question of service out of jurisdiction. He observed that the privacy tort and the equitable action of breach of confidence, although related, should be treated separately, citing Lord Nicholls in OBG Ltd v Allan and Douglas v Hello! [2008] 1 AC 1 at para [255]: "As the law has developed breach of confidence, or misuse of confidential information, now covers two distinct causes of action, protecting two different interests: privacy, and secret ("confidential") information. It is important to keep these two distinct." [at 67] Tugendhat J further bolsters his recognition of the tort of misuse of private information [at 68] noting:
 ‘there have since been a number of cases in which misuse of private information has been referred to as a tort consistently with OBG and these cannot be dismissed as all errors in the use of the words 'tort''

After this consideration Tugendhat J concludes [at 70] ‘that the tort of misuse of private information is a tort within the meaning of ground 3.1(9).’

With respect to the breach of confidence claim however, Tugendhat J concludes that he is ‘bound by the decision in Kitetechnology to hold that the claim for breach of confidence is not a tort.’ [71].

Further consideration was then given to the question as to whether the Claimants had suffered any recognizable and relevant damage.  Tugendhat J concluded that damages for ‘distress are recoverable in a claim for misuse of private information, eg Mosley v New Group Newspapers Ltd [2008] EMLR 679.’ Therefore the Claimants’ claim for damage fell within the requirements of the rules relating to service out.

On the question of whether the information was private, it was submitted on behalf of Google that the information collected about the Claimants browsing habits was anonymous and not private: ‘The aggregation of such information sent to separate websites and advertising services cannot make it private information. One hundred times zero is zero, so one hundred pieces of non-private information cannot become private information when collected together.’ [115] Tugendhat J rejected this approach, noting that Google would not have gone to effort to collect and collate this information unless it resulted in something of value. Further, the fact that Google personnel do not themselves identify or recognize the identity of people from whom the data is collected. At some point the Claimant becomes identifiable as a result of the collation and use of the information, in this case, at the point where the targeted advertisements become visible on their screen by a third party. Tugendhat J conceded that not all of the generated information would give rise to claims of privacy, in the individual cases the particular types of information identified by the Claimants was private information. (‘These are not generic complaints. They are complaints about particular information about particular individuals, displayed on particular occasions (even though the precise dates and times of the occasions are not identified)’ [at 119].

The novel aspect of this case is the final recognition of a separate tort of misuse of private information. This has evolved in the UK as a consequence of the distortion of the breach of confidence action and the UK Human Rights Act, which required a change of approach to the balancing of various interests in the disclosure and protection of personal information. This certainly would not reflect the situation under Australian law, where the privacy tort has evolved no further than the glimmer in the eye of the High Court in Australian Broadcasting Corporation v Lenah Game Meats in 2001. Of course, in Australia the ALRC is still considering the introduction of a tort for serious invasion of privacy.

Tuesday, January 14, 2014

Media & Arts Law Review: December 2013

The new issue of Media & Arts Law Review  (December 2013) is out!

Great articles on a diversity of topics:

Articles by:
Rebecca Giblin: Was the High Court in iiNet right to be chary of a common law graduated response?
Catherine Bond: Commonwealth v WikiLeaks: Fairfax revisited
Susan Corbett: The case for joint ownership of copyright in photographs of identifiable persons
Angela Daly:E-book monopolies and the law

Case note: Michael Douglas: A broad reading of WA's Shield Laws
Hong Kong Media Law Update: Anne Cheung: A Study of Online Forum Liabilities for defamation: Hong Kong Court in Internet Fever in Oriental Press Group Ltd v Fevaworks Solution Ltd

http://www.law.unimelb.edu.au/cmcl/publications/media-and-arts-law-review

Submissions for 2014 can be sent to melissa.dezwart@adelaide.edu.au

Tuesday, December 17, 2013

Oxford-UNSW Copyright Scholars Roundtable: Exceptions reform: fair use for Australia?


A number of copyright scholars enjoyed a day of copyright reform related discussion thanks to Michael Handler (UNSW) and Emily Hudson (Oxford) at UNSW Law School on 17 December 2013. I opened the discussion on the question of fair use, and set out my brief speaking notes below: (A fully developed paper will follow)

The ALRC Final Report on Copyright and the Digital Environment was presented to the Government on 29 November 2013. The Attorney-General, Senator George Brandis has confirmed that the Final Report recommends the introduction a ‘broad flexible exception for fair use’. The full Report must be tabled before Parliament by February 2014 and a Government response to the Report should be forthcoming some time in 2014. However, the Attorney-General has already indicated that he does not support significant changes to the copyright law which would restrict the rights of copyright owners:

‘The government’s response to the ALRC report will be informed by the view that the rights of content owners and content creators ought not to be lessened and that they are entitled to continue to benefit from their intellectual property.’

The question that I would like to ask is why and how the introduction of a fair use exception would in fact lessen the rights of owners or prevent them from continuing to benefit from their intellectual property (in this case copyright)?

Leaving aside the example of the US which has a fair use law and seems to still be enabling copyright owners to make enough money to get by (!), other jurisdictions have more open ended exceptions to copyright, so fair use should not be seen as open slather for unremunerated uses.

Fair use can and should be cast in such a way that it reflects the balance of interests in copyright.

I have been considering the Canadian example: where despite significant legislative reform which declined to introduce a fair use exception, the Supreme Court has re-crafted fair dealing so it is in effect a fair use law.

Such an approach would build upon the decisions of the Canadian Supreme Court in Théberge v. Galerie d’Art du Petit Champlain inc., [2002] 2 S.C.R. 336, 2002 SCC 34  and CCH Canadian Ltd. v. Law Society of Upper Canada, [2004] 1 S.C.R. 339, 2004 SCC 13, which recognized that the Copyright Act contained a ‘balance between promoting the public interest in the encouragement and dissemination of works of the arts and intellect and obtaining a just reward for the creator’ and that this required a recognition of the limits on the rights of the copyright owner clearly articulating fair use as user’s rights.

In Alberta v Canadian Copyright Licensing Agency (one of five copyright cases handed down on 12 July 2012) the Supreme Court held that previews on iTunes were fair dealing, stating that: ‘One of the tools employed to achieve the proper balance between protection and access in the Act is the concept of fair dealing, which allows users to engage in some activities that might otherwise amount to copyright infringement. In order to maintain the proper balance between these interests, the fair dealing provision must not be interpreted restrictively.’

The Court continued:
‘an important goal of fair dealing is to allow users to employ copyrighted works in a way that helps them engage in their own acts of authorship and creativity’.

As Michael Geist has argued, this decision paves the way for a more 'principles based' approach to fair dealing which effectively transforms it into a law more akin to fair use. The Canadian experience may provide a good model for Australian reform in this area.

Therefore I contend that a fair use law may be crafted and interpreted in a way that does not represent a challenge to the rights of owners, but rather better reflects the balance underlying copyright law. The approach articulated above by the Attorney-General should not necessarily prevent the introduction of a fair use style defence.