Search…
⌃K

Information controls

Overview

The unchecked practice of surveillance capitalism has provided a select few corporations with an unprecedented degree of control over the global flow of information.
In turn, these corporations, along with governments and other high bidders misguided by profit and power, are leveraging these new abilities (and disregarding social norms and consequences) to create and augment increasingly repressive information controls (tools and practices used to restrict the free flow of information via censorship, surveillance, throttling, etc.). Examples of information controls that obstruct democratic processes and slow the spread of democracy include the expansion of unfair government surveillance via irresponsible search platform data collection, and social media platforms acting as accessories to aid misinformation campaigns that increase political polarisation.
Reset is working towards a future in which the mass-scale commodification and misuse of mined personal information no longer come at the expense of digital rights, democracy, and open societies. Even though it is not currently the case, we believe it is in fact possible for a quantified society to exist without information controls being used to repress democratic participation and evolution.
The following is an illustrative list of the type of information controls we often confront in our work. Accordingly, through our Open Calls, we seek to raise civil society's ability to:
  • Understand of how these and related information controls work;
  • Document and prove harm from their misuse;
  • Mitigate those harms;
  • Learn how and when to use them for good; and,
  • Demonstrate that alternatives can exist that don't cause harm.
Information control examples
Deceptive collection of personal information or dark patterns
Misinformation
Spamming, use of bots, or sockpuppetry
Content deletion or moderation
Account deletion or de-platforming
Online harassment or cyber-bullying
Doxing or Leaks
Website and service blocking
Cyber-attacks, content manipulation, or DDOS
Network throttling and shutdowns