T H E N E T D E L U S Io N E V G E N Y M O R O Zo V

Total Page:16

File Type:pdf, Size:1020Kb

T H E N E T D E L U S Io N E V G E N Y M O R O Zo V 2/C PMS (BLACK + 809) SOFT-TOUCH MATTE LAMINATION + SPOT GLOSS THE NET DELUSION EVGENY MOROZOV POLITICS/TECHNOLOGY $27.95/$35.50 CAN “ Evgeny Morozov is wonderfully knowledgeable about the Internet—he seems “THE REVOLUTION WILL BE TWITTERED!” to have studied every use of it, or every political use, in every country in the declared journalist Andrew Sullivan after world (and to have read all the posts). And he is wonderfully sophisticated and protests erupted in Iran in June 2009. Yet for tough-minded about politics. This is a rare combination, and it makes for a all the talk about the democratizing power powerful argument against the latest versions of technological romanticism. of the Internet, regimes in Iran and China His book should be required reading for every political activist who hopes to are as stable and repressive as ever. In fact, ALEXANDER KRSTEVSKI ALEXANDER change the world on the Internet.” —MICHAEL WALZER, Institute for authoritarian governments are effectively Advanced Study, Princeton using the Internet to suppress free speech, EVGENY MOROZOV hone their surveillance techniques, dissem- is a contributing editor to Foreign Policy “ Evgeny Morozov has produced a rich survey of recent history that reminds us inate cutting-edge propaganda, and pacify and Boston Review and a Schwartz Fellow that everybody wants connectivity but also varying degrees of control over their populations with digital entertain- at the New American Foundation. Morozov content, and that connectivity on its own is a very poor predictor of political ment. Could the recent Western obsession is currently also a visiting scholar at Stan- pluralism.... By doing so, he’s gored any number of sacred cows, but he’s likewise with promoting democracy by digital ford University. He was previously a Yahoo! given us a far more realistic sense of what’s possible in cyberspace—both good means backfire? Fellow at the Institute for the Study of and bad—in the years ahead. Morozov excels at this sort of counter-intuitive Diplomacy at Georgetown University and a analysis, and he instantly recasts a number of foreign policy debates with this In this spirited book, journalist and social fellow at the Open Society Institute in New timely book.” —THOMAS P.M. BARNETT, author, The Pentagon’s New Map, commentator Evgeny Morozov shows that York, where he remains on the board of and senior managing director, Enterra Solutions LLC by falling for the supposedly democratizing the Information Program. Morozov’s writings nature of the Internet, Western do-gooders have appeared in the Economist, Newsweek, “Net Delusion is a brilliant book and a great read. Politicians and pundits have may have missed how it also entrenches the Wall Street Journal, the International hailed the Internet as a revolutionary force that will empower the masses and dictators, threatens dissidents, and makes it Herald Tribune, the Boston Globe, Slate, consign authoritarian governments to the ash-heap of history, but Morozov harder—not easier—to promote democracy. Le Monde, Frankfurter Allgemeine Zeitung, explains why such naïve hopes are sadly misplaced. With a keen eye for detail Buzzwords like “twenty-first-century state- the San Francisco Chronicle, Prospect, Dis- and a probing, skeptical intelligence, he shows that the Web is as likely to distract craft” sound good in PowerPoint presentations, sent, and many other publications. He has as to empower, and that both dictators and dissidents can exploit its novel but the reality is that “digital diplomacy” appeared on CNN, CBS, SkyNews, CBC, Al requires just as much oversight and consid- features. If you thought that Facebook, Twitter, and the World Wide Web “ Evgeny Morozov offers a rare note of wisdom Jazeera International, France 24, Reuters TV, would trigger a new wave of democratic transformations, read this book and eration as any other kind of diplomacy. and common sense, on an issue overwhelmed NPR, BBC Radio 4, and BBC World Service. think again.” —STEPHEN M. WALT, Belfer Professor of International Affairs, Marshaling compelling evidence, Morozov by digital utopians.” —MALCOLM GLADWELL Harvard University shows why we must stop thinking of the Internet and social media as inherently lib- JACKET DESIGN BY PETE GARCEAU erating and why ambitious and seemingly $27.95/$35.50 CAN noble initiatives like the promotion of AVAILABLE AS AN E-BOOK “Internet freedom” might have disastrous implications for the future of democracy as a whole. VISIT WWW.PUBLICAFFAIRSBOOKS.COM SIGN UP FOR OUR NEWSLETTER WWW.PUBLICAFFAIRSBOOKS.COM SPOT GLOSS AREAS INDICATED ON PAGE 2 1586488741-Morozov_Layout 1 10/19/10 10:27 AM Page iii The NET DELUSION The Dark Side of Internet Freedom EVGENY MOROZOV New York 1586488741-Morozov_Layout 1 10/19/10 10:27 AM Page iv Copyright © 2011 by Evgeny Morozov Published in the United States by PublicAffairs™, a member of the Perseus Books Group. All rights reserved. Printed in the United States of America. No part of this book may be reproduced in any manner whatsoever without written permission except in the case of brief quotations embodied in critical articles and reviews. For information, address PublicAffairs, 250 West 57th Street, Suite 1321, New York, NY 10107. PublicAffairs books are available at special discounts for bulk purchases in the U.S. by corporations, institutions, and other organizations. For more information, please contact the Special Markets Department at the Perseus Books Group, 2300 Chestnut Street, Suite 200, Philadelphia, PA 19103, call (800) 810-4145, ext. 5000, or e-mail [email protected]. Designed by Timm Bryson Text set in 11.75 point Arno Pro Library of Congress Cataloging-in-Publication Data Morozov, Evgeny. The net delusion : the dark side of internet freedom / Evgeny Morozov. — 1st ed. p. cm. Includes bibliographical references and index. ISBN 978-1-58648-874-1 (alk. paper) 1. Internet—Political aspects. 2. Internet—Censorship. 3. Computers—Access control. 4. Freedom of information. I. Title. HM851.M665 2011 303.48'33—dc22 2010039066 First Edition 10 9 8 7 6 5 4 3 2 1 1586488741-Morozov_Layout 1 10/19/10 10:27 AM Page 143 chapter six Why the KGB Wants You to Join Facebook magine that you are a target of some deeply mysterious spying oper- ation. While you happily poke your online friends, tweet your break- Ifast plans, and shop for Christmas presents, all your online activity is being secretly reported to an unknown party. Imagine that someone has also broken into your computer and is using it to launch DDoS attacks. They could be targeting Saudi websites about philosophy or dissident Georgian bloggers. You have no idea that your computer is part of this mysterious cyber-army, let alone who is being attacked or why. It’s as if a stranger has been secretly reading your diary and also using it to clobber a passerby. This is precisely what happened to a number of brave activists from Vietnam who in 2009 were protesting the building of a new bauxite mine in their country. (The project is a joint venture between Chalco, a subsidiary of China’s state-run aluminum company Chinalco, and the Vietnamese government.) Their computers were compromised, allow- ing an unknown third party not only to monitor their online activity but also to attack other online targets in Vietnam and elsewhere. But 143 1586488741-Morozov_Layout 1 10/19/10 10:27 AM Page 144 144 The Net Delusion theirs was not a case of basic computer illiteracy, where pressing the wrong button or visiting a weird porn site could surrender months of hard work to a nasty virus. It’s quite likely that the Vietnamese dissi- dents did no such thing, avoiding any suspicious-looking sites and at- tachments. What could have gone wrong? Vietnam, nominally still ruled by a Communist Party, boasts a bur- geoning Internet culture, with antigovernment bloggers mounting fre- quent campaigns about social issues, especially the poorly regulated sprawling urban development. The government, concerned that its tight hold on public life is beginning to loosen, has been trying to re- assert control, preferably without drawing much ire from Vietnam’s trading partners in the West. The authorities, all too keen on harvesting the information benefits of globalization, do not shy away from com- puters or the Internet outright. In April 2010 they embarked on an am- bitious crusade to supply farmers in more than one thousand communes with free computers, so that they could, as one ofcial put it, “contact and consult with . scientists . [about] the current epi- demics on their breeds and seeds.” The government was even kind enough to organize computer training courses for the farmers. Those opposing the government’s paradigm of “modernization at all costs” are unlikely to be invited to attend such courses. In 2009 two of the most vocal blogs that challenged the government, Bauxite Vietnam and Blogosin, became targets of powerful DDoS attacks similar to those launched against Tomaar and Cyxymu. Soon, Bauxite Vietnam was forced down the “digital refugee” route, eventually emerging on a Google-owned blogging service, while the blogger behind Blogosin told his readers that he was quitting blogging altogether to “focus on personal matters.” Those attacks made it quite clear that the Vietnamese government was up-to- date on the rapidly evolving nature of Internet control and wouldn’t stop at just blocking access to particular websites. Most likely, the antimine activists, careful as they were, inadvertently hit a government trap that allowed the secret police to establish remote control over their computers. And what a trap it was: Someone broke into the server that hosted the website of the Vietnamese Professionals Society (VPS), a trusted diaspora organization, and replaced one of the 1586488741-Morozov_Layout 1 10/19/10 10:27 AM Page 145 Why the KGB Wants You to Join Facebook 145 most popular downloads, a simple computer program that facilitated typing in the Vietnamese language, to an almost identical file—“almost” because it also contained a virus.
Recommended publications
  • The Net Delusion: the Dark Side of Internet Freedom
    The Net Delusion: The Dark Side of Internet Freedom http://www.carnegiecouncil.org/resources/transcripts/0349.html/:pf_print... The Net Delusion: The Dark Side of Internet Freedom Evgeny Morozov , Joanne J. Myers Tuesday, January 25, 2011 Introduction Remarks Questions and Answers Introduction JOANNE MYERS: I'm Joanne Myers, director of Public Affairs Programs, and on behalf of the Carnegie Council, I'd like to thank you all for joining us. If you have been following the news out of Tunisia and are interested in the idea of democracy promotion via the Internet, you will find today's discussion to be extremely interesting. The question our speaker will be addressing is about whether the increased The Net Delusion: The Dark use of the Internet and technological innovations such as Twitter, YouTube, and Facebook Side of Internet Freedom have, in reality, brought increased democracy to those under authoritarian rule—or have these new cyber tools actually made things worse? Evgeny Morozov is often described as a gifted young cyber policy scholar who made his way to America from Belarus. He is recognized as the expert on the interaction of digital technology and democracy. In fact, his writings on this topic have reshaped many foreign policy debates and initiated new thinking on the power of the Internet to promote democracy around the world. In writing this book, Mr. Morozov's aim is to bring a dose of realpolitik to discussions about how much of a difference the Net and digital technologies actually make in advancing democracy and freedom. His findings may surprise you.
    [Show full text]
  • 361-Emerald Gottlieb-3611585 BIB 181..191
    REFERENCES Agamben, G. (2015). The use of bodies (A. Kostko, Trans.). Stanford, CA: Stanford University Press. Babe, R. (2010). Cultural studies and political economy: Toward a new integration. Toronto, ON: Lexington Books. Barad, K. (2003). Posthumanist performativity: Toward an understanding of how matter comes to matter. Signs: Journal of Women in Culture and Society, 28(3) (Spring), 801À831. Barad, K. (2007). Meeting the universe half-way. Durham, NC: Duke U. Press. Bataille, G. (1985). Visions of excess (A. Stoekl, Trans.). Minneapolis, MN: University of Minnesota Press. Benjamin, W. (1969). Illuminations (H. Arendt, Trans.). New York, NY: Schocken Books. Bernes, J. (2013). Logistics, counter-logistics and the commu- nist prospect. Endnotes, Vol. 3, Endnotes, London. Retrieved from https://endnotes.org.uk/en/jasper-bernes-logisticscoun- terlogistics-and-the-communist-prospect BIPM Bureau International des Poids et Mesures. (2008). The International System of Units (SI). Paris: STEDI Media. Bratton, B. (2015). The stack. Cambridge, MA: MIT Press. 181 182 References Braverman, H. (1998). Labor and monopoly capital. New York, NY: Monthly Review Press. Bridle, J. (2016). Cloud history, cloud thinking. London: Serpentine Galleries, September 2016. Retrieved from http:// cloudindx.com Brustein, J. (2016). Uber and Lyft want to replace public buses. Bloomberg.com, August 15. Retrieved from https:// www.bloomberg.com/news/articles/2016-08-15/uber-and- lyft-want-to-replace-public-buses Caffentzis, G. (2013). In letters of blood and fire. Oakland, CA: PM Press. Caliskan, A., Bryson, J., & Narayanan, A. (April 14 2017). Semantics derived automatically from language corpora contain human-like biases. Science 356(6334), 183À186. Callinikos, A.
    [Show full text]
  • Surveillance by Intelligence Services: Services: Intelligence by Surveillance
    FREEDOMS FRA Surveillance by intelligence services – Volume II: field perspectives and legal update II: field perspectives – Volume services intelligence by Surveillance Surveillance by intelligence services: fundamental rights safeguards and remedies in the EU Volume II: field perspectives and legal update This report addresses matters related to the respect for private and family life (Article 7), the protection of personal data (Article 8) and the right to an effective remedy and a fair trial (Article 47) falling under Titles II ‘Freedoms’ and VI ‘Justice’ of the Charter of Fundamental Rights of the European Union. Europe Direct is a service to help you find answers to your questions about the European Union Freephone number (*): 00 800 6 7 8 9 10 11 (*) The information given is free, as are most calls (though some operators, phone boxes or hotels may charge you). Photo (cover & inside): © Shutterstock More information on the European Union is available on the internet (http://europa.eu). Luxembourg: Publications Office of the European Union, 2017 FRA – print: ISBN 978-92-9491-766-9 doi:10.2811/15232 TK-04-17-696-EN-C FRA – web: ISBN 978-92-9491-765-2 doi:10.2811/792946 TK-04-17-696-EN-N © European Union Agency for Fundamental Rights, 2017 Reproduction is authorised provided the source is acknowledged. For any use or reproduction of photos or other material that is not under the European Union Agency for Fundamental Rights copyright, permission must be sought directly from the copyright holders. Printed by Imprimerie Centrale in Luxembourg Neither the European Union Agency for Fundamental Rights nor any person acting on behalf of the European Union Agency for Fundamental Rights is responsible for the use that might be made of the following information.
    [Show full text]
  • Tim Wu Tries to Save the Internet the Scholar Who Coined 'Net Neutrality' Fears a Corporate Takeover of the Web
    THE CHRONICLE REVIEW Tim Wu Tries to Save the Internet The scholar who coined 'net neutrality' fears a corporate takeover of the Web. Now he's in a position to fight that. By Marc Parry MARCH 20, 2011 WASHINGTON Mid-February, Tuesday night, a downtown D.C. restaurant. Nursing a pint of Magic Hat in a back booth, Tim Wu struggles to make the transition from one of the loudest lives Jay Primack for The Chronicle Review in academe to his new job as a quietly Tim Wu in his Washington apartment effective federal bureaucrat. The Columbia Law School professor used to be his own boss, CEO of Tim Wu Inc. He made his name by coining the concept of "net neutrality," the notion that network operators shouldn't block or favor certain content. As an essayist based at Slate, he translated technology policy for popular consumption and chronicled an eclectic list of other obsessions: vintage Hondas and Mongolia, weight lifting and yoga, dumplings and hot springs. He broadened his audience this past fall with a sweeping new history of information empires, The Master Switch (Knopf). "He's on the cusp of being enormously influential," says his mentor, Lawrence Lessig, a Harvard Law School professor and copyright-reform advocate. Maybe. But right now Wu is trying to be something else: boring. One day before this dinner interview, the 38-year-old professor reported for duty as a senior adviser at the Federal Trade Commission, a consumer-protection and antitrust- enforcement agency with a mandate to fight business abuses. So he clams up when I ask what must be on the minds of many tech lobbyists in town: Which company scares you the most? "I can't answer that question, now I'm in the FTC," Wu says.
    [Show full text]
  • Report Data Privacy and Data Security 2015
    DATA PrivAcy AnD DATA securiTy rePorT 2015 upDates inDustry 4.0 Botnet seCurity poliCy interConneCtivity seCret CoDe CyBerwar regulation rules CryptograpHy Big Data CyBerspaCe Data proteCtion integrity CyBer DeFense Center Firewall virus proteCtion BasiC rigHts Digitization enCryption Control meCHanism DDos attaCk Data proteCtion oFFiCer rules it seCurity aCt inFormational selF-Determination passworD rules it seCurity HaCker ClouD serviCes eu general Data proteCtion regulation Data minimization selF-Determination emergenCy plan DATA PrivAcy AnD DATA securiTy rePorT 2015 DATA PrivAcy AnD DATA securiTy rePorT 2015 14 The generAl Data ProTecTion regulation sTrengThens The sTrengThs of The euroPeAn iT inDusTry conTenTs 06 A key sTeP TowArDs fAir comPeTiTion Jan Philipp Albrecht, Member of the European The grounDbreAking ruling shAking 16 Parliament SecuriTy for The uP The DigiTAl economy 21 Dr. Thomas Kremer, fourTh inDusTriAl Member of the Board of Management for Data Privacy, revoluTion Legal Affairs and Compliance at Deutsche Telekom Reinhard Clemens, CEO of T-Systems and Member of Deutsche Telekom’s Board of Management and Director of its IT Division 08 Beginning The journey To moDern-day data Policies Dr. Thomas de Maizière, 10 Data securiTy AnD 22 Capturing The mArkeT…. Federal Minister of the Interior PrivAcy Are imPorTAnT eAsy, fAsT AnD secure issues for germAny’s Dr. Ferri Abolhassan, DomesTic inTelligence Member of the Management Board service of T-Systems International Dr. Heinz-Georg Maaßen, President of the BfV 52 Welcome To The zeTTAbyTe Age 27 creating TrusT Anette Bronder, Lothar Schröder, Member of T-Systems Inter- 12 A big sTeP forwArD inTo Deputy Chairman of the Supervisory national’s Board of Manage- The DigiTAl revoluTion Board at Deutsche Telekom and ment and Director of its Vĕra Jurová, Chairman of the Data Protection Digital Division European Commissioner for Justice, Advisory Board Consumers and Gender Equality 18 Europe and its privacy shield Wolfgang Kopf, LL.M.
    [Show full text]
  • The Threat of Surveillance Capitalism
    A DESPROPÓSITO Teknokultura. Revista de Cultura Digital y Movimientos Sociales ISSNe: 1549-2230 http://dx.doi.org/10.5209/TEKN.64984 The threat of surveillance capitalism Chris H. Gray1 Recibido: 7 de julio 2019 / Aceptado: 22 de octubre 2019 Open peer reviews Abstract. Using Shoshana Zuboff’s 2019 book, The Age of Surveillance Capitalism, the essay explores this latest form of capitalism and Zuboff’s claims about its organization. Her arguments are compared and contrasted with David Eggers novel, and the movie that came out of it, called The Circle, as well as other perspectives on capitalism (Marx, Barry Unsworth’s Sacred Hunger) and the current dominance of social media companies (especially Alphabet/Google, Facebook, and Amazon) from Evgeny Morozov, Natasa Dow Schüll, Zeynep Tufekci, Steve Mann and Tim Wu. Zuboff’s description and critique of Surveillance Capitalism is a convincing and important addition to our understanding of the political economy of the early 21st Century and the role of giant monopolistic social media companies in shaping it. Keywords: behavioural surplus; Shoshanna Zuboff; social media. [es] La amenaza del capitalismo de la vigilancia Resumen. A partir del libro de Shoshana Zuboff de 2019, The Age of Surveillance Capitalism, el ensayo explora esta última forma de capitalismo y las afirmaciones de Zuboff sobre su organización. Sus argumentos se comparan y contrastan con la novela de David Eggers, y su adaptación a la gran pantalla en la película El Círculo [The Circle], así como otros analistas del capitalismo (Marx, Barry Unsworth’s Sacred Hunger) y, en particular, del dominio actual de las compañías de redes sociales (especialmente Alphabet/Google, Facebook y Amazon) como Evgeny Morozov, Natasa Dow Schüll, Zeynep Tufekci, Steve Mann y Tim Wu.
    [Show full text]
  • Efficiency and Madness Using Data and Technology Environmental to Solve Social, and Political Problems
    Efficiency and Madness Madness Efficiencyand More and more, digital technologies and data are being relied upon to solve the world’s biggest pro- Efficiency anda M dness blems. Sometimes referred to as ‘technofixes’, these Using Data and Technology to Solve Social, Environmental data-driven technologies are applied to social, and Political Problems political and environmental challenges around the world. But their implementation can create both triumphs and disasters. Using Data and Technology to Solve Solve to Technology and Data Using We need to find a constructive way to critique these technofixes – one that acknowledges both their utopian and dystopian potential and the trade-offs they present. This is a call to action, for techies and non-techies alike, to find new ways of thinking about data-driven technologies and how they are changing our societies. Social, Environmental and Political Problems Political and Social, Environmental Stephanie Hankey and Marek Tuszynski Rz_Cover_Efficiency and Madness.indd 1 02.10.17 11:57 Efficiency and Madness Using Data and Technology to Solve Social, Environmental and Political Problems by Stephanie Hankey & Marek Tuszynski Supported by the Heinrich Böll Foundation With contributions from Etienne Turpin Support by Gary Wright Copy editing by Christy Lange Cover design by Ingo Diekhaus With special thanks to Christine Chemnitz, Susanne Diehr, Lili Fuhr, Jörg Haas, Annette Kraus, Heike Löschmann, Linda Schneider and Barbara Unmüßig. Interior_pages.indd 2 02/10/2017 10:46 Efficiency and Madness Using Data and Technology to Solve Social, Environmental and Political Problems Interior_pages.indd 3 02/10/2017 10:46 Interior_pages.indd 4 02/10/2017 10:46 5 Introduction Technology as Magic and Loss Technologies help us do more with less, they defy boundaries of space, time and self.
    [Show full text]
  • Upholding Citizens' Privacy in the Use Of
    Pace Law Review Volume 37 Issue 1 Fall 2016 Article 10 March 2017 Upholding Citizens’ Privacy in the Use of Stingray Technology: Is New York Behind? Samantha Hazen Elisabeth Haub School of Law at Pace University, [email protected] Follow this and additional works at: https://digitalcommons.pace.edu/plr Part of the Communications Law Commons, Criminal Law Commons, Fourth Amendment Commons, Science and Technology Law Commons, and the State and Local Government Law Commons Recommended Citation Samantha Hazen, Upholding Citizens’ Privacy in the Use of Stingray Technology: Is New York Behind?, 37 Pace L. Rev. 352 (2017) Available at: https://digitalcommons.pace.edu/plr/vol37/iss1/10 This Article is brought to you for free and open access by the School of Law at DigitalCommons@Pace. It has been accepted for inclusion in Pace Law Review by an authorized administrator of DigitalCommons@Pace. For more information, please contact [email protected]. Upholding Citizens’ Privacy in the Use of Stingray Technology: Is New York Behind? Samantha Hazen* I. Introduction The word “Stingray” likely does not resonate with citizens as something other than a marine animal. But in the realm of privacy, the word carries a much different (perhaps more dangerous) meaning. Stingray devices belong to a family of cell-site simulators that track a cell phone user’s location.1 Federal, state, and local agencies purchase these devices and use them during investigations to pinpoint a suspect’s location.2 The devices—which are the size of a briefcase—act as cell phone towers and gather enough identifying information to locate the suspect.3 Despite its obvious advantage of promoting security, the technology also plays a controversial role: detecting and tracking cell phones besides the suspect’s.4 The idea of tracking multiple cell phones in a given region raises privacy * J.D.
    [Show full text]
  • Socialize the Data Centres!
    New Masses, New Media—5 evgeny morozov SOCIALIZE THE DATA CENTRES! Your work traces a distinctive path—unlike that of any other technology critic—from a grounding in the politics of post-Cold War Eastern Europe, via critique of Silicon Valley patter, to socio-historical debates around the rela- tions between the Internet and neoliberalism. What was the background that produced this evolution? was born in 1984, in the Minsk region of Belarus, in a new min- ing town called Soligorsk, founded in the late fifties. More or less the whole labour force was brought in from outside, and there’s little sense of national belonging. My father’s family came from Ithe north of Russia; my mother, who was born near Moscow, arrived in the seventies with a degree in mining from Ukraine. The town is dominated by one huge state-owned enterprise that mines potassium and produces fertilizers which sell very well on the world market: it’s still the most profitable company in Belarus. My entire family worked for it, from grandparents to uncles and aunts. The ussr dissolved when I was seven, and while there may have been all sorts of problems with living in a small city like Soligorsk, they were not linked to the ussr’s disappearance. Under Lukashenko, who came to power when I was ten, Belarus was officially bilingual, but Russian was the dominant language, and growing up in Soligorsk felt just like being in a province of Russia. We were much more connected to events in Moscow than in Minsk. Initially there was no Belarusian television; the national media were not very strong, so the newspapers we got, and most of the tv programmes new left review 91 jan feb 2015 45 46 nlr 91 we watched at home, were Russian.
    [Show full text]
  • Public-Health-V.-Individual-Privacy-In
    1 The COVID-19 Law & Policy Challenge: Public Health vs. Individual Privacy in the Age of Cyber Surveillance Authors: Jamal Aziz Executive Director, RSIL Ayesha Malik Senior Research Associate, RSIL Noor Fatima Research Associate, RSIL 1 Table of Contents 1. Introduction ........................................................................................................................................ 3 2. What is Contact Tracing? .................................................................................................................. 3 3. Process of Contact Tracing ............................................................................................................... 3 4. From Digitizing Contact Tracing to Cyber Surveillance .............................................................. 5 5. Cyber Surveillance and Big Data/AI ............................................................................................... 5 6. Key Countries using Cyber-Surveillance for Coronavirus ............................................................ 6 6.1 Contact Tracing .......................................................................................................................... 6 6.2 Big Data/AI ................................................................................................................................ 7 7. Public Health v. Individual Privacy .................................................................................................. 8 8. Is it Legal? ...........................................................................................................................................
    [Show full text]
  • Revolutions Depend on People, Not on Social Media, and the Internet Both
    By Evgeny Morozov he only place where the Revolutions depend on people, not West is still unabashedly eager to promote democ- racy is in cyberspace. En- on social media, and the Internet thusiastic belief in the lib- e r a t i n g p o w e r o f technology, accompanied both promotes democracy and by the ir resistible urge to Tenlist Silicon Valley start-ups in the thwarts it, says a foreign-policy global fight for freedom, is of grow- ing appeal to many policy makers. In fact, many of them are as upbeat scholar. Cyber-utopians be warned: about the revolutionary potential of the Internet as their colleagues in the Authoritarian regimes are adapting corporate sector were in the 1990s. We shouldn’t give the Internet too much credit, however, and we to the Internet age. should probably give it credit for 18 THE FUTURIST July-August 2011 some of the negative things that are ing the power of the federal govern- racy in the Middle East may succeed. happening. We shouldn’t be biased ment. Authoritarian regimes in Cen- But it will depend on how they work and just look at the brighter side. We tral Asia, for example, have been with the existing challenges. should be more critical in thinking actively promoting a host of e-gov- The revolts were driven by people about its impacts. ernment initiatives. who had economic grievances and The idea that the Internet favors Normally a regime that fights its were politically oppressed. They the oppressed rather than the op- own corruption has more legitimacy turned to the Internet to publicize pressor is marred by what I call with its own people.
    [Show full text]
  • Surveillance Self-Defense: Privacy in the Post-9/11 Mass Surveillance State Nathaniel D
    Southern Illinois University Carbondale OpenSIUC Research Papers Graduate School Spring 4-13-2017 Surveillance Self-Defense: Privacy in the Post-9/11 Mass Surveillance State Nathaniel D. Fortmeyer Southern Illinois University Carbondale, [email protected] Follow this and additional works at: http://opensiuc.lib.siu.edu/gs_rp Recommended Citation Fortmeyer, Nathaniel D. "Surveillance Self-Defense: Privacy in the Post-9/11 Mass Surveillance State." (Spring 2017). This Article is brought to you for free and open access by the Graduate School at OpenSIUC. It has been accepted for inclusion in Research Papers by an authorized administrator of OpenSIUC. For more information, please contact [email protected]. SURVEILLANCE SELF-DEFENSE: PRIVACY IN THE POST-9/11 MASS SURVEILLANCE STATE by Nathaniel Dean Fortmeyer B.A., Southern Illinois University, 2011 B.A., Southern Illinois University, 2013 A Research Paper Submitted in Partial Fulfillment of the Requirements for the Master of Science. Department of Mass Communication and Media Arts In the Graduate School Southern Illinois University Carbondale May 2017 RESEARCH PAPER APPROVAL SURVEILLANCE SELF-DEFENSE: PRIVACY IN THE POST-9/11 MASS SURVEILLANCE STATE By Nathaniel Dean Fortmeyer A Research Paper Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science in the field of Professional Media and Media Management Approved by: Robert Spahr, Chair Graduate School Southern Illinois University Carbondale March 28, 2017 AN ABSTRACT OF THE RESEARCH PAPER OF NATHANIEL DEAN FORTMEYER, for the Master of Science degree in PROFESSIONAL MEDIA AND MEDIA MANAGEMENT, presented on MARCH 28, 2017, at Southern Illinois University Carbondale. TITLE: SURVEILLANCE SELF-DEFENSE: PRIVACY IN THE POST-9/11 MASS SURVEILLANCE STATE MAJOR PROFESSOR: Robert Spahr The nature of digital information and the networked world has enabled the greatest advances in communication, education, art, science, and entertainment since the invention of the printing press.
    [Show full text]