Vulnerabilities / Threats
3/3/2010
01:28 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Google Urges Anti-Censorship Trade Rules

But lawmakers want companies to take the lead against online censorship.

Faced with technology companies that appear to be unwilling to stand up for human rights, Illinois Senator Dick Durbin on Tuesday said he plans to introduce legislation to force companies "to take reasonable steps to protect human rights or face civil or criminal liability."

Durbin was speaking at the Senate Subcommittee on Human Rights and the Law, which he chairs, on Tuesday. The hearing was attended by representatives of the State Department and the Commerce Department, Princeton University technology policy fellow Rebecca MacKinnon, Iranian blogger Omid Memarian, and Google VP and deputy general counsel Nicole Wong.

Other companies that were invited declined to attend.

The purpose of the hearing was to discuss global Internet freedom, a cause that appears to have gained some support in the U.S. government since Google declared in January that a cyber attack from China had prompted it to re-evaluate its business in the country.

"One of the most pressing challenges posed by the Internet is the censorship of online information," said Vermont Senator Patrick Leahy, also present at the hearing. "For some time now, we have witnessed the troubling efforts of repressive regimes -- such as the governments of China, Iran and North Korea -- to censor, or in some cases eliminate, their citizens' access to information via the Internet. Most Americans are by now very familiar with the troubling reports that the government of China has hacked into the private e-mail accounts of human rights activists. We must address these serious challenges to freedom of expression head-on."

Google is doing that, or at least talking about it. Wong reiterated that Google is "no longer willing to censor our search results in China" and that the company is still reviewing its options.

Yet Durbin showed that Google's willingness to cease censoring search results in China has not translated into action. Google's Chinese Web site, google.cn, he said, still returns censored search results for queries related to the 1989 Tiananmen Square protests, as it did at a similar hearing two years ago.

And he said that Google was not alone in this practice, noting that Microsoft's Bing, Yahoo, and Chinese search engine Baidu also censor search results. In fact, he commended Google for its intention to stop censoring in China and said he looked forward to an update on Google's plans.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7392
Published: 2014-07-22
Gitlist allows remote attackers to execute arbitrary commands via shell metacharacters in a file name to Source/.

CVE-2014-2385
Published: 2014-07-22
Multiple cross-site scripting (XSS) vulnerabilities in the web UI in Sophos Anti-Virus for Linux before 9.6.1 allow local users to inject arbitrary web script or HTML via the (1) newListList:ExcludeFileOnExpression, (2) newListList:ExcludeFilesystems, or (3) newListList:ExcludeMountPaths parameter t...

CVE-2014-3518
Published: 2014-07-22
jmx-remoting.sar in JBoss Remoting, as used in Red Hat JBoss Enterprise Application Platform (JEAP) 5.2.0, Red Hat JBoss BRMS 5.3.1, Red Hat JBoss Portal Platform 5.2.2, and Red Hat JBoss SOA Platform 5.3.1, does not properly implement the JSR 160 specification, which allows remote attackers to exec...

CVE-2014-3530
Published: 2014-07-22
The org.picketlink.common.util.DocumentUtil.getDocumentBuilderFactory method in PicketLink, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 5.2.0 and 6.2.4, expands entity references, which allows remote attackers to read arbitrary code and possibly have other unspecified impact via...

CVE-2014-4326
Published: 2014-07-22
Elasticsearch Logstash 1.0.14 through 1.4.x before 1.4.2 allows remote attackers to execute arbitrary commands via a crafted event in (1) zabbix.rb or (2) nagios_nsca.rb in outputs/.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Where do information security startups come from? More important, how can I tell a good one from a flash in the pan? Learn how to separate ITSec wheat from chaff in this episode.