China's Cyberspace Control Strategy

Total Page:16

File Type:pdf, Size:1020Kb

China's Cyberspace Control Strategy China Papers No. 7 The University of British Columbia China’s Cyberspace Control Strategy: An Overview and Consideration of Issues for Canadian Policy Ronald Deibert February 2010 Canadian International Council Conseil international du Canada www.canadianinternationalcouncil.org www.conseilinternationalducanada.org China Papers No. 7 Abstract China is among the world’s most dynamic countries when it comes to information and community technology research, development and consumer use. It is now the world’s largest national Internet population. China is also the world’s most pervasive filterer of Internet content, engages in widespread electronic surveillance and has been suspected of global cyber-espionage against adversaries abroad. This paper draws upon the experiences of several Canadian-based research and development projects that focus directly upon (and confront) China’s cyberspace control strategy to map out its main features and discuss the challenges they present for Canada. The main part of this paper provides an overview of China’s content filtering, surveillance and information warfare policies and practices. This overview is followed by a consideration of issues for Canada. Like many other countries, Canada depends on economic exchange with China and is home to a large and growing Chinese diaspora community that can be vocal critics of China’s human rights policies. Canada is also the home of some of the leading research and development projects on Internet censorship, surveillance and information warfare that, at times, are antagonistically linked to China. The conclusion considers some of the challenges and opportunities for Canadian interests and presents three recommendations for Canadian policy. Résumé La Chine compte parmi les pays les plus dynamiques en matière de recherche, de développement et de consom- mation des technologies de l’information et communautaires, comme en témoigne notamment sa population Internet nationale, aujourd’hui la plus importante du monde. C’est aussi le pays qui filtre le plus rigoureusement le contenu Internet. Elle pratique en outre la surveillance électronique à grande échelle et est soupçonnée de cyberespionnage à l’encontre de ses adversaires internationaux. Cette étude puise à l’expérience de plusieurs projets de recherche-développement canadiens directement axés sur la stratégie chinoise de contrôle du cyber- space (et la remettant en question) afin de dégager ses principales caractéristiques et les défis qui s’ensuivent pour le Canada. La plus grande partie de l’étude porte sur les politiques et pratiques chinoises touchant le filtrage de contenu, la surveillance et la guerre de l’information. Suit une analyse des enjeux qu’elles soulèvent pour le Canada, qui mise comme de nombreux autres pays sur ses échanges avec la Chine tout en abritant une diaspora chinoise grandissante et parfois très critique à l’égard de la politique chinoise des droits de l’homme. Au Canada se mènent aussi d’importants projets de recherche-développement sur la censure en ligne, la surveillance et la guerre de l’information, dont les résultats impliquent la Chine de façon parfois antagoniste. En conclusion sont présentés certains des défis et possibilités liés aux intérêts canadiens et formulées trois recommandations touchant la politique du Canada. About the Author Ron Deibert received his PhD from the University of British Columbia and is Associate Professor of Political Science and Director of the Citizen Lab at the Munk Centre for International Studies at the University of Toronto. The Citizen Lab is an interdisciplinary research and development hothouse working at the intersection of the Internet, global security and human rights. Deibert is a cofounder and a principal investigator of The Information Warfare Monitor, an OpenNet Initiative, research and advocacy project that examines Internet censorship and surveillance worldwide, and is a cofounder and director of global policy and outreach for Psiphon Incorporated. Deibert has published numerous articles, chapters and three books on issues related technology, media and world politics, and was one of the authors of the Tracking Ghostnet report of alleged Chinese cyber espionage involving over 1200 computers in 103 countries. Deibert’s research has been featured in newspapers, television, and radio shows, including the New York Times, BBC, The Globe and Mail, CBC, CNN, Al Jazeera, WIRED and the Far Eastern Economic Review. He was awarded the University of Toronto Outstanding Teaching Award (2002), the Northrop Frye Distinguished Teaching and Research Award (2002) and was a China Papers No. 7 Ford Foundation research scholar of Information and communication technologies (2002-2004). He was named to the Macleans magazine honour roll as one of 39 Canadians to have helped make the world a better place in 2006, and to Esquire Magazine’s Best and Brightest list of 2007. The opinions expressed in this paper are those of the author and do not necessarily reflect the views of the Canadian International Council, its Senate or its Board of Directors. If you would like to download a copy of this report please visit www.canadianinternationalcouncil.org If you would like to be added to our mailing list or have questions about our publications please contact: [email protected] ISSN 1921-9865 (Online) ISSN 1921-9881 (Print) © 2010 Canadian International Council – 3– China Papers No. 7 Introduction When it comes to Internet censorship, few discussions take place without at least a passing mention of China. Home to the world’s largest Internet population, and one of the world’s most dynamic centers of information and communication technology production and innovation, China has also mounted the world’s most ambitious cyberspace control strategy. Its methods range from regulations and policies to technological filters to co-optation of Internet service providers (ISPs) to state-sponsored psychological and propaganda campaigns to targeted offensive operations in cyberspace. Not surprisingly, its cybersecurity strategy has met with widespread resistance, both from within and beyond China’s borders. Chinese citizens use various programs and methods to evade government filtering and surveillance; many of them are supported by American and European government-directed funds. China is perennially singled out for just about every suspected case of cyber-espionage or denial of service attack against sensitive computer systems in the United States, even when actual evidence is lacking. China’s cyberspace ecosystem is thus characterized by a constant dynamic of control and subversion. This paper draws upon the experiences of several Canadian-based research and development projects [see Box] that focus directly upon (and confront) China’s cyberspace control strategy to map its main features and discuss the challenges they present for Canada. The main part of the paper provides an overview of China’s content filtering, surveillance and information warfare policies and practices. This overview is followed by a consideration of issues for Canada. Like many other countries, Canada depends on economic exchange with China, and is home to a large and growing Chinese diaspora community that can be vocal critics of China’s human rights policies. It is also the home of some of the leading research and development projects on Internet censorship, surveillance and information warfare that, at times, are antagonistically linked to China.1 The conclusion considers some of the challenges and opportunities for Canadian interests and presents three recommendations for Canadian policy. These Canadian-based research and development projects include the OpenNet Initiative (ONI), the Information Warfare Monitor (IWM), and Psiphon. The ONI is a collaborative project led by the Citizen Lab at the Munk Centre for International Studies at the University of Toronto and the Berkman Center for Internet and Society at Harvard University, in partnership with numerous non-governmental organizations worldwide. Using a combination of technical interrogation, data analysis and field research, the aim of the ONI is to document patterns of Internet censorship worldwide. The ONI’s methodology blends “technical Intelligence” that yields quantitative data with field-based contextual research that helps target technical tests and interpret results. The technical data is derived from a suite of software tools that are deployed by researchers in countries under investigation which connect back to databases maintained by the ONI and check accessibility to thousands of websites, keywords and services in English and local languages. Forensic investi- gations of the results, combined with tracing and mapping of network connections, determine what is blocked, where the block is implemented and often the technology that is being used to do the blocking. Country experts then analyze the results and place them in their wider social and political context to give a comprehensive picture of a country’s filtering policies and practices. The ONI has produced three major reports on the state of China’s Internet censorship regime. _______________________________________________________________ 1 See, for example, the CNN interview with the author that presents the release of the Citizen Lab’s Psiphon software as a direct chal- lenge to China, which the author tries to dispel. “Psiphon with Ron Deibert on CNN International,” Youtube, December 1, 2006, http://www.youtube.com/watch?v=4_ADE_uB7SQ (accessed
Recommended publications
  • Ronald J. Deibert
    April 13, 2013 Ronald J. Deibert A. BIOGRAPHICAL INFORMATION 1. PERSONAL Ronald James Deibert, Munk School of Global Affairs, Observatory Site, 313, 416-946-8916 2. DEGREES - Phd 1995 University of British Columbia - Thesis: Hypermedia: Modes of Communication in World Order Transformation Supervisor Professor Mark Zacher. - MA 1990 Queen’s University 3. EMPLOYMENT Professor, Department of Political Science, University of Toronto, 2011-present Associate Professor 2001-2011 Assistant Professor 1996-2001 Director, The Canada Centre for Global Security Studies, 2010-present Director, The Citizen Lab (http://www.citizenlab.org/), 2001-present Vice President, Global Policy and Outreach, Psiphon Inc., 2008-2010 4. HONOURS 2013 – Order of Ontario and Queen Elizabeth II Diamond Jubilee Medal 2013 - Partners in Research Technology Ambassador Award 2013 -Canadian Library Association Award for the Advancement of Intellectual Freedom in Canada 2011 - UNESCO Press Freedom Award (awarded to Citizen Lab) 2010 - Canadian Journalists for Free Expression Vox Libera Award (awarded to Citizen Lab) 2010 - Carolyn Tuohy Award for Public Policy 2002 - University of Toronto Outstanding Teaching Award 2002 - The Northrop Frye Distinguished Teaching and Research Award 2002-2004 - Ford Foundation Research Scholar of Information and Communication Technologies 5. PROFESSIONAL AFFILIATIONS AND ACTIVITIES Editorial Board: International Political Sociology, International Studies Perspectives, Astropolitics, Explorations in Media Ecology; Security Dialogue. Advisory Boards: Human Rights in China, Access Now, Lake Ontario Waterkeepers, Privacy International. Steering Committee, World Movement for Democracy, National Endowment for Democracy B. ACADEMIC HISTORY 6. A. RESEARCH ENDEAVOURS Director, Citizen Lab, 2001-present Director, Canada Centre for Global Security Studies, 2010-present Founder, Principal Investigator, OpenNet Initiative, 2002-present Founder, Principal Investigator, Information Warfare Monitor, 2002-2012 Co-Inventor, Psiphon B.
    [Show full text]
  • Annotated Bibliography Digital Transnational Repression
    Annotated Bibliography Digital Transnational Repression By Noura Al-Jizawi, Siena Anstis, Sophie Barnett, Sharly Chan, Adam Sen, and Ronald J. Deibert Last Updated: May 2021 Copyright Copyright © 2021 Citizen Lab, “Digital transnational Repression,” by Noura Al-Jizawi, Siena Anstis, Sharly Chan, Adam Sen, and Ronald J. Deibert. Licensed under the Creative Commons BY-SA 4.0 (Attribution-ShareAlike Licence) Electronic version first published in 2020 by the Citizen Lab. Citizen Lab engages in research that investigates the intersection of digital technologies, law, and human rights. Document Version: 2.0 New changes in this annual update include: ● Change of terminology from “transnational digital repression” to “digital transnational repression” to align with the discourse ● New summaries collected between October 2020 - May 2021 and added to the document The Creative Commons Attribution-ShareAlike 4.0 license under which this report is licensed lets you freely copy, distribute, remix, transform, and build on it, as long as you: ● give appropriate credit; ● indicate whether you made changes; and ● use and link to the same CC BY-SA 4.0 licence. However, any rights in excerpts reproduced in this report remain with their respective authors; and any rights in brand and product names and associated logos remain with their respective owners. Uses of these that are protected by copyright or trademark rights require the rightsholder’s prior written agreement. 2 Acknowledgements The design of this document is by Mari Zhou. About the Citizen Lab, Munk School of Global Aairs & Public Policy, University of Toronto The Citizen Lab is an interdisciplinary laboratory based at the Munk School of Global Affairs & Public Policy, University of Toronto, focusing on research, development, and high-level strategic policy and legal engagement at the intersection of information and communication technologies, human rights, and global security.
    [Show full text]
  • Local Nets on a Global Network: Filtering and the Internet Governance Problem
    Local Nets on a Global Network: Filtering and the Internet Governance Problem The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation chapter in Jack Balkin et al., The Global Flow of Information Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:4324404 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA Local Nets on a Global Network: Filtering and the Internet Governance Problem John G. Palfrey, Jr.† (Chapter in Jack Balkin et al., The Global Flow of Information) August, 2010 Introduction. More than three dozen states around the world take part in censoring what their citizens can see and do on the Internet. This practice is increasingly widespread, with extensive filtering regimes in place in China, Iran, Burma (Myanmar), Syria, and Uzbekistan. Censorship using technological filters is often coupled with restrictive laws related to what the press can publish, opaque surveillance practices, and severe penalties for people who break the state’s rules of using the Internet. This trend has been emerging since at least 2002. As Internet use overall and the practice of online censorship grow, heads of state and their representatives have been gathering to discuss the broad topic of “Internet governance” at a series of high-profile, global meetings. These meetings have taken the form of periodic World Summits on the Information Society and, more recently, meetings of the Internet Governance Forum.
    [Show full text]
  • October 26, 2018 Access Now Amnesty International Article 19
    October 26, 2018 Access Now Amnesty International Article 19 Center for Democracy and Technology Committee to Protect Journalists Electronic Frontier Foundation Human Rights in China Human Rights Watch Independent Chinese PEN Centre International Service for Human Rights PEN International Privacy International Reporters Without Borders WITNESS Professor Ronald Deibert, Citizen Lab, University of Toronto Rebecca MacKinnon, Ranking Digital Rights Xiao Qiang, Research Scientist, Founder and Director of the Counter-Power Lab, School of Information, University of California at Berkeley Professor Lokman Tsui, The Chinese University of Hong Kong Dear Sirs and Madams, I am writing in regards to your recent letter. We appreciate the opportunity to have met with many of you and your teams and welcome the opportunity to further engage on these important issues. Since our founding, Google has been committed to making the world’s information available to everyone. We believe that knowledge is empowering and that a society with more information is better off than one with less. Providing access to information to people around the world is central to our mission. To further that mission, several years ago we launched our Next Billion Users initiative, dedicated to providing people in emerging markets with customized products and solutions so they can use the power of the internet, including through mobile devices, to better their lives. Many of these innovations have also helped users in economically developed markets, including across much of Europe and in the United States. We have likewise continued to look at ways to serve the 1.4 billion people — including 800 million internet users — who live in China.
    [Show full text]
  • Is There a Link Between Digital Media and Good Governance? What the Academics Say
    Is There a Link Between Digital Media and Good Governance? What the Academics Say A Report to the Center for International Media Assistance By Mary Myers June 19, 2013 The Center for International Media Assistance (CIMA), at the National Endowment for Democracy, works to strengthen the support, raise the visibility, and improve the effectiveness of independent media development throughout the world. The Center provides information, builds networks, conducts research, and highlights the indispensable role independent media play in the creation and development of sustainable democracies. An important aspect of CIMA’s work is to research ways to attract additional U.S. private sector interest in and support for international media development. The Center was one of the of the main nongovernmental organizers of World Press Freedom Day 2011 in Washington, DC. CIMA convenes working groups, discussions, and panels on a variety of topics in the field of media development and assistance. The center also issues reports and recommendations based on working group discussions and other investigations. These reports aim to provide policymakers, as well as donors and practitioners, with ideas for bolstering the effectiveness of media assistance. Marguerite H. Sullivan Senior Director Center for International Media Assistance National Endowment for Democracy 1025 F Street, N.W., 8th Floor Washington, DC 20004 Phone: (202) 378-9700 Fax: (202) 378-9407 Email: [email protected] URL: http://cima.ned.org Design and Layout by Valerie Popper About the Author Mary Myers is a freelance consultant, based in the United Kingdom. Her specialties are media in Africa, radio serving the poor, monitoring and evaluation, and gender issues.
    [Show full text]
  • Supreme Court of the United States
    Nos. 19-416 & 19-453 IN THE Supreme Court of the United States NESTLÉ USA, INC., Petitioner, v. JOHN DOE I, et al., Respondents. –––––––––––––––––––––––––––––– CARGILL, INC., Petitioner, v. JOHN DOE I, et al., Respondents. ON WRITS OF CERTIORARI TO THE UNITED STATES CouRT OF APPEALS FOR THE NINTH CIRcuIT BRIEF OF AMICI CURIAE ACCESS NOW, ARTICLE 19, CENTER FOR LONG-TERM CYBERSECURITY, ELECTRONIC FRONTIER FOUNDATION, PRIVACY INTERNATIONAL AND PROFESSOR RONALD DEIBERT IN SUPPORT OF RESPONDENTS SOPHIA COPE Counsel of Record CINDY COHN ELECTRONic FRONTIER FOUNDATION 815 Eddy Street San Francisco, CA 94109 (415) 436-9333 [email protected] Attorneys for Amici Curiae 298803 i TABLE OF CONTENTS Page TABLE OF CONTENTS..........................i TABLE OF CITED AUTHORITIES ..............iii INTEREST OF AMICI CURIAE ..................1 INTRODUCTION AND SUMMARY OF ARGUMENT ................................5 ARGUMENT....................................7 I. ATS Policy Supports Preserving U.S. Corporate Liability Under the Statute.........7 II. United Nations Policy Supports Preserving U.S. Corporate Liability Under the ATS.......8 III. The Technology Industry Plays a Major Role in Human Rights Abuses Worldwide.....11 A. Researchers Chronicle the Widespread Problem of Technology Companies’ Complicity in Human Rights Abuses .....12 B. American Technology Companies Have Been Complicit in Human Rights Abuses in Foreign Countries............18 ii Table of Contents Page IV. Voluntary Mechanisms for Holding the Technology Industry Accountable for Human Rights Abuses are Inadequate ..............25 A. Limits of Multi-Stakeholder Initiatives ...28 B. OECD Guidelines for Multinational Enterprises ..........................29 C. Global Network Initiative...............33 CONCLUSION .................................35 iii TABLE OF CITED AUTHORITIES Page Cases Balintulo v. Ford Motor Co., 796 F.3d 160 (2d Cir.
    [Show full text]
  • Democratization and Development Alejandro Toledo Thomas Carothers Brian Levy Kenneth Wollack & K
    October 2010, Volume 21, Number 4 $12.00 Democratization and Development Alejandro Toledo Thomas Carothers Brian Levy Kenneth Wollack & K. Scott Hubli Liberation vs. Control in Cyberspace Ronald Deibert & Rafal Rohozinski What Does Democracy Mean? Michael Bratton Tianjian Shi & Jie Lu Larry Diamond Fares Braizat Yun-han Chu & Min-hua Huang April Longley Alley on Yemen’s Multiple Crises Mark Thompson on the Philippines Richard Madsen on Religion in China Nic Cheeseman on African Elections Success Stories from “Emerging Africa” Steven Radelet liberation vs. control: the future of cyberspace Ronald Deibert and Rafal Rohozinski Ronald Deibert is associate professor of political science and director of the Citizen Lab at the Munk School of Global Affairs, University of Toronto. Rafal Rohozinski is a principal with the SecDev Group and former director of the Advanced Network Research Group of the Cam- bridge Security Programme. Together they are the founders of the In- formation Warfare Monitor and the OpenNet Initiative. The following essay is adapted from their Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace (MIT Press, 2010), coedited with John Palfrey and Jonathan Zittrain. Every day there seems to be a new example of the ways in which hu- man ingenuity combines with technology to further social change. For the Green Movement in Iran, it was Twitter; for the Saffron Revolution in Burma, it was YouTube; for the “color revolutions” of the former Soviet Union, it was mobile phones. No matter how restrictive the regu- lations or how severe the repercussions, communities around the world have exhibited enormous creativity in sidestepping constraints on tech- nology in order to exercise their freedoms.
    [Show full text]
  • The Shaping of Power, Rights, and Rule in Cyberspace Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, Editors Access Controlled
    Access Controlled Information Revolution and Global Politics William J. Drake and Ernest J. Wilson III, editors The Information Revolution and Developing Countries Ernest J. Wilson III Human Rights in the Global Information Society Rikke Frank Jørgensen, editor Mobile Communication and Society: A Global Perspective Manuel Castells, Mireia Ferna´ndez-Arde`vol, Jack Linchuan Qiu, and Araba Sey Access Denied: The Practice and Policy of Global Internet Filtering Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, editors Governing Global Electronic Networks: International Perspectives on Policy and Power William J. Drake and Ernest J. Wilson III, editors Working-Class Network Society: Communication Technology and the Information Have-Less in Urban China Jack Linchuan Qiu Transforming Global Information and Communication Markets: The Political Economy of Innovation Peter F. Cowhey and Jonathan D. Aronson Protocol Politics: The Globalization of Internet Surveillance Laura DeNardis Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, editors Access Controlled The Shaping of Power, Rights, and Rule in Cyberspace Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, editors The MIT Press Cambridge, Massachusetts London, England ( 2010 Massachusetts Institute of Technology All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher. For information about special quantity discounts, please email [email protected] This book was set in Stone Serif and Stone Sans on 3B2 by Asco Typesetters, Hong Kong. Printed and bound in the United States of America.
    [Show full text]
  • The Growing Dark Side of Cyberspace ( . . . and What to Do About It)
    Penn State Journal of Law & International Affairs Volume 1 Issue 2 November 2012 The Growing Dark Side of Cyberspace ( . and What To Do About It) Ronald Deibert Follow this and additional works at: https://elibrary.law.psu.edu/jlia Part of the Diplomatic History Commons, History of Science, Technology, and Medicine Commons, International and Area Studies Commons, International Law Commons, International Trade Law Commons, Law and Politics Commons, Political Science Commons, Public Affairs, Public Policy and Public Administration Commons, Rule of Law Commons, Social History Commons, and the Transnational Law Commons ISSN: 2168-7951 Recommended Citation Ronald Deibert, The Growing Dark Side of Cyberspace ( . and What To Do About It), 1 PENN. ST. J.L. & INT'L AFF. 260 (2012). Available at: https://elibrary.law.psu.edu/jlia/vol1/iss2/3 The Penn State Journal of Law & International Affairs is a joint publication of Penn State’s School of Law and School of International Affairs. Penn State Journal of Law & International Affairs 2012 VOLUME 1 NO. 2 THE GROWING DARK SIDE OF CYBERSPACE ( . AND WHAT TO DO ABOUT IT) Ronald Deibert* INTRODUCTION Cyberspace—the global environment of digital communications—surrounds and embodies us entirely, 24 hours a day, 7 days a week. We are always on, always connected: emailing, texting, searching, networking, and sharing are all now as commonplace as eating, breathing, and sleeping. With the emerging “Internet of things,” devices interact online independent of our direct control: our fridges, pacemakers, and automobiles, alive and networking with each other. Governments around the world have seen these technologies as the recipe for social empowerment and development.
    [Show full text]
  • Black Code: Censorship, Surveillance, and the Militarisation of Cyberspace Ronald J
    Millennium - Journal of International Studies http://mil.sagepub.com/ Black Code: Censorship, Surveillance, and the Militarisation of Cyberspace Ronald J. Deibert Millennium - Journal of International Studies 2003 32: 501 DOI: 10.1177/03058298030320030801 The online version of this article can be found at: http://mil.sagepub.com/content/32/3/501 Published by: http://www.sagepublications.com On behalf of: Millennium Publishing House, LSE Additional services and information for Millennium - Journal of International Studies can be found at: Email Alerts: http://mil.sagepub.com/cgi/alerts Subscriptions: http://mil.sagepub.com/subscriptions Reprints: http://www.sagepub.com/journalsReprints.nav Permissions: http://www.sagepub.com/journalsPermissions.nav >> Version of Record - Dec 1, 2003 What is This? Downloaded from mil.sagepub.com at UNIV TORONTO on May 3, 2012 Black Code: Censorship, Surveillance, and the Militarisation of Cyberspace Ronald J. Deibert Conventional wisdom holds that the Internet’s material properties are biased towards openness, and provide the foundation for a global commons of information increasingly beneficial to citizens worldwide. However, pressures from the security and commercial sectors to regulate and control the Internet are beginning to alter its basic material architecture in ways that may undermine not only the activities of global civic networks, but also the long-term prospects for an open global communications environment. As Internet censorship and surveillance becomes more widespread, and as states begin to militarise cyberspace, a radically different environment for global communications is emerging. However, these changes are not uncontested. While not having the influence over Internet security and design issues that security and corporate actors do, a growing number of civil society actors are merging with politically minded computer scientists and engineers to form policy networks and develop ‘hacktivist’ technologies designed to support self- expression, privacy, and security for global civic networks.
    [Show full text]
  • Ronald J. Deibert Associate Professor of Political Science, Director, the Citizen Lab Munk Centre for International Studies, University of Toronto June 18, 2008
    Written Statement of: Ronald J. Deibert Associate Professor of Political Science, Director, the Citizen Lab Munk Centre for International Studies, University of Toronto June 18, 2008 Distinguished members of the Commission: I would like to offer my sincere appreciation for the invitation to appear before the U.S.-China Economic & Security Review Commission. In a world of increasingly urgent global problems, from poverty and environmental degradation to weapons of mass destruction, it is essential that governments recognize and promote an unfettered medium of communication through which citizens around the world can access information of their own choosing, speak freely, and debate and share ideas. The Internet is the closest we have today to such a medium, but its openness and accessibility are very much under threat. Even as the number of Internet users expands worldwide, access to information and freedom of speech are being strangled and degraded by censorship, surveillance, and militarization. Congressional investigation at any level concerning these issues is a very welcome development. My name is Ron Deibert. I am an associate professor of political science and the director of the Citizen Lab at the Munk Centre for International Studies, University of Toronto. The Citizen Lab focuses on advanced research and development at the intersection of the Internet, global security, and human rights. I am one of the founders and principal investigators of the OpenNet Initiative, a collaborative project among the Citizen Lab and the Universities of Harvard, Cambridge, Oxford, as well as numerous non-governmental organizations and individual partners worldwide. The aim of the ONI is to document patterns of Internet censorship and surveillance across the globe.
    [Show full text]
  • Part I Access Contested: Theory and Analysis
    Part I Access Contested: Theory and Analysis 1 Access Contested Toward the Fourth Phase of Cyberspace Controls Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain November 2009, Sharm el-Sheikh, Egypt. At a large conference facility in the middle of a desert landscape, the Internet Governance Forum (IGF) is in full swing. Thousands of attendees from all over the world, lanyards draped over their chests, bags stuffed with papers and books, mingle with each other while moving in and out of conference rooms. Down one hallway of the massive complex, a large banner is placed outside a conference room where a book launch is about to begin. The OpenNet Initiative (ONI) is holding a small reception to mark the release of its latest volume, Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace . As part of the planned proceedings, members of OpenNet Asia plan to show clips of a short documentary they have pro- duced on information controls across Asia. Before the event gets under way, an offi cial from the United Nations— the forum ’ s host — asks to speak to the ONI ’ s Ron Deibert. The offi cial is upset about the distribu- tion of small pamphlets that invite attendees to the book reception, in particular about the reference to Tibet on the back (which he encircles in pen to make his point). He asks that no more such pamphlets be distributed. Deibert reluctantly agrees, since the event is about to begin. But one incident leads quickly to another. An ONI research associate is now carrying the large banner back from the hallway, this time escorted by the same offi cial, another offi cial, and a security guard.
    [Show full text]