Freedom on the Net 2009

Total Page:16

File Type:pdf, Size:1020Kb

Freedom on the Net 2009 0100101001100110101100100101001100 110101101000011001101011001001010 011001101011001001010011001101011 0010010100110011010110010010100110 011010110010010100110011010110100Freedom 101001100110101100100101001100110 1011001001010011001101011001001010on the Net 0110011010110010010100110011010110 0100101001100110101101001010011001 1010110010010100110010101100100101a global assessment of internet 0011001101011001001010011001101011and digital media 0010010100101001010011001101011001 0010100110011010110100001100110101 1001001010011001101011001001010011 0011010110010010100110011010110010 0101001100110010010100110011010110 0100101001100110101101000011001101 0110010010100110011010110010010100 1100110101100100101001100110101100 1001010011001101011001001010011001 1010110100101001100110101100100101 0011001101011001001010011001101011 0010110010010100101001010011001101 0110010010100110011010110100001100 1101011001001010011001101011001001 0100110011010110010010100110011010 1100100101001100110101100100101001 1001101011010010100110011010110010 0101001100110101100100101001100110 1011001001010011001101011001001010 FREEDOM ON THE NET A Global Assessment of Internet and Digital Media April 1, 2009 Freedom House Freedom on the Net Table of Contents Page Overview Essay Access and Control: A Growing Diversity of Threats to Internet Freedom .................... 1 Freedom on the Net Methodology ........................................................................................................... 12 Charts and Graphs of Key Findings ................................................................................................... 20 Country Reports Brazil .......................................................................................................................................... 28 China .......................................................................................................................................... 34 Cuba ........................................................................................................................................... 45 Egypt .......................................................................................................................................... 51 Estonia ....................................................................................................................................... 55 Georgia ...................................................................................................................................... 59 India............................................................................................................................................ 63 Iran ............................................................................................................................................. 70 Kenya ......................................................................................................................................... 76 Malaysia ...................................................................................................................................... 80 Russia ......................................................................................................................................... 85 South Africa .............................................................................................................................. 91 Tunisia ........................................................................................................................................ 95 Turkey ....................................................................................................................................... 100 United Kingdom ...................................................................................................................... 106 Glossary .................................................................................................................................................. 113 Survey Team .......................................................................................................................................... 117 Freedom House Freedom on the Net 1 Access and Control: A growing diversity of threats to internet freedom By Karin Deutsch Karlekar and Sarah G. Cook As the internet and other new media come to repressive regimes, like those in China and Iran, dominate the flow of news and information have created a pervasive, sophisticated, and around the world, governments have responded multilayered system of censorship that with measures to control, regulate, and censor significantly limits the content that citizens can the content of blogs, websites, and text access or post on the internet and transmit via messages. Indeed, the recent case of an Iranian mobile phones, particularly when it comes to blogger who died in police custody is a topics deemed sensitive by the authorities. disturbing reminder that expressions of political Harsh laws, an apparatus of monitoring and dissent or even independent thought circulated surveillance, torture, and imprisonment await through the internet carry as much risk as those those who cross the ―red lines‖ separating circulated via underground journals in an earlier acceptable from unacceptable thought. In era. And just as authoritarian regimes once settings that are somewhat less repressive— devoted massive resources to controlling the such as Egypt, Russia, and Malaysia—the print media and the airwaves, so today China internet has emerged as a haven of relatively employs a small army of functionaries tasked free speech in otherwise restrictive media with monitoring and censoring the content of environments. In these societies, however, the websites and blogs. space for free comment and open circulation of The mounting assault on digital ideas is slowly closing, as governments devise freedom is taking place in an environment of subtle methods to manipulate online discussion explosive growth in the use and, more and apply vague and flexible security laws to significantly, the influence of new media forms. arrest and intimidate bloggers. As with An increasing number of organizations and traditional media, the result of this sophisticated civic initiatives use websites to inform the harassment is an insidious form of self- public about their causes and question censorship among journalists and government performance. Recent years have commentators. Even in more democratic also featured a ―blogging revolution,‖ as countries—such as the United Kingdom, millions of people have begun keeping online Brazil, and Turkey—internet freedom is journals, commenting and sharing opinions on increasingly undermined by legal harassment, a vast number of cultural, social, and political opaque filtering procedures, and expanding issues. This expansion has taken place in surveillance. On the whole, threats to internet developed and developing countries alike, in freedom are growing and have become more countries where the press is under duress as diverse, both in the array of countries that well as in vibrant democracies. impose restrictions and in the range of methods Even as new information sources employed. become more prevalent and influential, This dynamic of increasing digital media governments, and in some cases private actors, use worldwide accompanied by more systematic have begun to push back through the and sophisticated methods of control is the development of techniques designed to control core finding of this study, a pilot report on what people read, view, and discuss. internet and new media freedom. On the basis Predictably, some of the world’s most of a newly developed set of 19 indicators, the Freedom House Freedom on the Net 2 study evaluates the level of internet and mobile- number of forms and can include not phone freedom experienced by average users only technical filtering, but also manual and activists in a sample of 15 countries across removal of content as a result of 6 regions: China, India, and Malaysia in Asia; government directives, intimidation, Cuba and Brazil in Latin America; Egypt, requests from private actors, or judicial Tunisia, and Iran in the Middle East and North decisions. Some regimes even engage in Africa; Kenya and South Africa in sub-Saharan the sophisticated manipulation of online Africa; Russia, Estonia, and Georgia in the conversations using undercover former Soviet Union; and the United Kingdom government-sponsored agents. and Turkey in Europe. Covering the calendar Privatization of censorship: There is a years 2007 and 2008, the index addresses a growing trend toward ―outsourcing‖ range of factors that might affect such freedom, censorship and monitoring to private including the state of telecommunications companies, as opposed to direct infrastructure, government restrictions on intervention by government agencies. access to technology, the regulatory framework In a range of countries with differing for service providers, censorship and content levels of democracy, private entities and control, the legal environment, surveillance, and their employees—including service extralegal attacks on users or content providers, blog-hosting companies, producers. The selected indicators capture not cybercafes, and mobile-phone only the actions of governments but also the operators—are being required by vigor, diversity, and activism of the new media governments or other actors to censor domain in each country, regardless of—or and monitor information and despite—state efforts to restrict
Recommended publications
  • Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
    Order Code RL32114 Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Updated January 29, 2008 Clay Wilson Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Summary Cybercrime is becoming more organized and established as a transnational business. High technology online skills are now available for rent to a variety of customers, possibly including nation states, or individuals and groups that could secretly represent terrorist groups. The increased use of automated attack tools by cybercriminals has overwhelmed some current methodologies used for tracking Internet cyberattacks, and vulnerabilities of the U.S. critical infrastructure, which are acknowledged openly in publications, could possibly attract cyberattacks to extort money, or damage the U.S. economy to affect national security. In April and May 2007, NATO and the United States sent computer security experts to Estonia to help that nation recover from cyberattacks directed against government computer systems, and to analyze the methods used and determine the source of the attacks.1 Some security experts suspect that political protestors may have rented the services of cybercriminals, possibly a large network of infected PCs, called a “botnet,” to help disrupt the computer systems of the Estonian government. DOD officials have also indicated that similar cyberattacks from individuals and countries targeting economic,
    [Show full text]
  • What Every Citizen Should Know About DRM, A.K.A. “Digital Rights Management”
    What Every Citizen Should Know About DRM, a.k.a. “Digital Rights Management” By Mike Godwin Senior Technology Counsel Public Knowledge PUBLIC KNOWLEDGE NEW AMERICA FOUNDATION What Every Citizen Should Know About DRM, a.k.a. “Digital Rights Management” By Mike Godwin Senior Technology Counsel Public Knowledge NEW AMERICA FOUNDATION Washington, DC Acknowledgements This “DRM primer” would not have come about without the author’s having worked with an informal “Risks of Copy Protection” expert group that includes Ed Felten, Matt Blaze, Phil Karn, Steve Bellovin, Bruce Schneier, Alan Davidson, John Morris, Hal Abelson, and Bill Cheswick. Two members of the group — Ed Felten and Matt Blaze — deserve special thanks for framing a number of copy-protection technology issues with such clarity that I have to some extent reproduced that clarity here. Phil Karn similarly deserves special thanks for his discussion of the extent to which peer-to-peer file-sharing is a feature of the Inter- net’s fundamental design. Andy Moss and Aaron Burstein each made a wide range of helpful comments and observations on earlier drafts of this primer. I’m particularly grateful to my boss, Gigi Sohn, for giving me the opportunity to explore the landscape of digital rights management and to develop further some of my ideas about the directions in which DRM may take us. I’m also thankful for the support and feedback of my other fellow staff members at Public Knowledge — Sarah Brown, Alex Curtis, Ann Dev- ille, and Nathan Mitchler. I consider myself fortunate to be backed by such a knowledgeable and resourceful team; each of my colleagues contributed in many ways to the development of this project, and all of them read this paper in various stages of development and offered helpful corrections and suggestions.
    [Show full text]
  • Egypt Digital Rights Landscape Report
    ids.ac.uk Digital Rights in Closing Civic Space: Lessons from Ten African Countries 209 Egypt Digital Rights Landscape Report Egypt Digital Rights Landscape Report Mohamed Farahat This is an Open Access report distributed under the terms of the Creative Commons Attribution 4.0 International licence (CC BY), which permits unrestricted use, distribution, and reproduction in any medium, provided the original authors and source are credited and any modifications or adaptations are indicated. This report is part of ‘Digital Rights in Closing Civic Space: Lessons from Ten African Countries’; the Introduction is also recommended reading. © 2021 Mohamed Farahat © Institute of Development Studies. DOI: 10.19088/IDS.2021.014 ids.ac.uk Digital Rights in Closing Civic Space: Lessons from Ten African Countries 210 Egypt Digital Rights Landscape Report 1. Introduction Egypt has experienced many political and social changes prior to and since the 2011 uprising. These changes have had a significant impact on civic space offline, as well as online. Digital rights are simply human rights in online spaces and are recognised as being of central importance. This is especially true when closing civic space in the physical world means that opening civic space online is a necessary last resort. The coronavirus (Covid-19) pandemic has highlighted the importance of digital rights, especially for vulnerable groups such as refugees and people in rural and remote areas. The main objective of this report is to give an overview of digital rights in Egypt, especially in the context of freedom of expression and freedom of assembly, the right to access the internet, and for access to information, and the right to knowledge; and to explore the impacts of the political context on civic space in general and digital rights in particular.
    [Show full text]
  • Seeking Offense: Censorship and the Constitution of Democratic Politics in India
    SEEKING OFFENSE: CENSORSHIP AND THE CONSTITUTION OF DEMOCRATIC POLITICS IN INDIA A Dissertation Presented to the Faculty of the Graduate School of Cornell University In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy by Ameya Shivdas Balsekar August 2009 © 2009 Ameya Shivdas Balsekar SEEKING OFFENSE: CENSORSHIP AND THE CONSTITUTION OF DEMOCRATIC POLITICS IN INDIA Ameya Shivdas Balsekar, Ph. D. Cornell University 2009 Commentators have frequently suggested that India is going through an “age of intolerance” as writers, artists, filmmakers, scholars and journalists among others have been targeted by institutions of the state as well as political parties and interest groups for hurting the sentiments of some section of Indian society. However, this age of intolerance has coincided with a period that has also been characterized by the “deepening” of Indian democracy, as previously subordinated groups have begun to participate more actively and substantively in democratic politics. This project is an attempt to understand the reasons for the persistence of illiberalism in Indian politics, particularly as manifest in censorship practices. It argues that one of the reasons why censorship has persisted in India is that having the “right to censor” has come be established in the Indian constitutional order’s negotiation of multiculturalism as a symbol of a cultural group’s substantive political empowerment. This feature of the Indian constitutional order has made the strategy of “seeking offense” readily available to India’s politicians, who understand it to be an efficacious way to discredit their competitors’ claims of group representativeness within the context of democratic identity politics.
    [Show full text]
  • Egypt: Freedom on the Net 2017
    FREEDOM ON THE NET 2017 Egypt 2016 2017 Population: 95.7 million Not Not Internet Freedom Status Internet Penetration 2016 (ITU): 39.2 percent Free Free Social Media/ICT Apps Blocked: Yes Obstacles to Access (0-25) 15 16 Political/Social Content Blocked: Yes Limits on Content (0-35) 15 18 Bloggers/ICT Users Arrested: Yes Violations of User Rights (0-40) 33 34 TOTAL* (0-100) 63 68 Press Freedom 2017 Status: Not Free * 0=most free, 100=least free Key Developments: June 2016 – May 2017 • More than 100 websites—including those of prominent news outlets and human rights organizations—were blocked by June 2017, with the figure rising to 434 by October (se Blocking and Filtering). • Voice over Internet Protocol (VoIP) services are restricted on most mobile connections, while repeated shutdowns of cell phone service affected residents of northern Sinai (Se Restrictions on Connectivity). • Parliament is reviewing a problematic cybercrime bill that could undermine internet freedom, and lawmakers separately proposed forcing social media users to register with the government and pay a monthly fee (see Legal Environment and Surveillance, Privacy, and Anonymity). • Mohamed Ramadan, a human rights lawyer, was sentenced to 10 years in prison and a 5-year ban on using the internet, in retaliation for his political speech online (see Prosecutions and Detentions for Online Activities). • Activists at seven human rights organizations on trial for receiving foreign funds were targeted in a massive spearphishing campaign by hackers seeking incriminating information about them (see Technical Attacks). 1 www.freedomonthenet.org Introduction FREEDOM EGYPT ON THE NET Obstacles to Access 2017 Introduction Availability and Ease of Access Internet freedom declined dramatically in 2017 after the government blocked dozens of critical news Restrictions on Connectivity sites and cracked down on encryption and circumvention tools.
    [Show full text]
  • • United Nations • UN Millenium Development Goals
    • United Nations • The Bretton Woods Institutions http://www.un.org http://www.chebucto.ns.ca/Current/P7/b wi/cccbw.html • UN Millenium Development Goals http://www.developmentgoals.org/ News • The Economist • MUNweb http://www.economist.co.uk/ http://www.munweb.org/ • Foreign Affairs • UN Official MUN website http://www.foreignaffairs.org/ http://www.un.org/cyberschoolbus/mod elun/ • Associated Press http://www.ap.org/ • UN System - Alphabetic Index of Websites of the United Nations • Russian News Agency System of Organizations http://www.tass.net/ http://www.unsystem.org/ • Interfax International Group • United Nations Development http://www.interfax-news.com/ Programme http://www.undp.org/ • British Broadcasting Corporation http://news.bbc.co.uk/ • UN Enviroment Programme http://www.unep.org/ • Reuters. Know. Now. http://www.reuters.com/ • Office of the United Nations High Commissioner for Human Rights • Agencia EFE http://www.ohchr.org/english/ http://www.efe.es/ • International Criminal Court • Agence France Presse http://www.iccnow.org/ www.afp.com • International Criminal Tribunal for • El Mundo the former Yugoslavia http://www.elmundo.es http://www.un.org/icty/ • Aljazeera International English • United Nations Bibliographic Edition Information System http://www.aljazeera.com/ http://unbisnet.un.org/ • Foreign Affairs • International Criminal Tribunal for http://www.foreignaffairs.org/ Rwanda http://www.ictr.org/ • Associated Press http://www.ap.org/ • International Court of Justice http://www.icj-cij.org/ • Russian News Agency http://www.tass.net/ • World Bank Group http://www.worldbank.org/ • Interfax International Group http://www.interfax-news.com/ • European Union http://europa.eu.int/ • British Broadcasting Corporation http://news.bbc.co.uk/ • World Trade Organization http://www.wto.org/ • Reuters.
    [Show full text]
  • Earning Astana Yellow Jerseys in a Corporate Governance Race: Engaging External Partners in Communications in Kazakhstan
    Earning Astana yellow Jerseys in a Corporate Governance Race: Engaging External Partners in Communications in Kazakhstan What do corporate governance and bicycle racing have in common? Frankly, not much. But the IFC Central Asia Corporate Governance Project team felt like cycling champions after our success in raising awareness about corporate governance in Kazakhstan. The corporate governance “race” in Kazakhstan started in 2006 in Almaty when a team of 11 people got together to launch the project. Just as the Astana cycling team retains its first place in the world ranking, subsequently reinforced by the victory of Alberto Contador in the Tour de France, our project team came out winners in helping corporate governance become an important topic in Kazakhstan. In this SmartLesson we would like to share how the project partnered with international coaches, local experts, and government bodies to promote corporate governance through publications, annual conferences, and seminars for mass media representatives in Kazakhstan. Background competitiveness and sustainability of the national Kazakhstan is located in the heart of the Eurasian economy, relying on corporate governance principles. continent at the crossroads of East and West. Prime Minister Karim Massimov also participated When the project started operations, not many of in a corporate governance awareness conference in the region’s businesspeople knew what corporate February 2007 in the Kazakhstani capital, Astana, governance was. IFC’s communications objective thereby greatly raising the profile of the topic through was to widely spread the word about corporate the accompanying press coverage. In spring 2007, governance, convince policymakers to create a full Senate hearings on the competitiveness of the favorable legislative framework, and—the most economy included invited experts on corporate important task—inspire joint-stock companies and governance.
    [Show full text]
  • The Art of Communication in a Polarized World This Page Intentionally Left Blank the Art of Communication in a Polarized World
    The Art of Communication in a Polarized World This page intentionally left blank The Art of Communication in a Polarized World KYLE CONWAY Copyright © 2020 Kyle Conway Published by AU Press, Athabasca University 1200, 10011 – 109 Street, Edmonton, AB T5J 3S8 https://doi.org/10.15215/aupress/9781771992930.01 Cover image © Suchat Nuchpleng / Shutterstock.com Cover design by Natalie Olsen Interior design by Sergiy Kozakov Printed and bound in Canada Library and Archives Canada Cataloguing in Publication Title: The art of communication in a polarized world / Kyle Conway. Names: Conway, Kyle, 1977- author. Description: Includes bibliographical references and index. Identifiers: Canadiana (print) 20200162683 | Canadiana (ebook) 20200162691 ISBN 9781771992930 (softcover) | ISBN 9781771992947 (pdf) ISBN 9781771992954 (epub) | ISBN 9781771992961 (Kindle) Subjects: LCSH: Intercultural communication. | LCSH: Translating and interpreting. LCSH: Communication and culture. | LCSH: Language and culture. Classification: LCC P94.6 C66 2020 | DDC 303.48/2—dc23 This book has been published with the help of a grant from the Federation for the Humanities and Social Sciences, through the Awards to Scholarly Publications Program, using funds provided by the Social Sciences and Humanities Research Council of Canada. We acknowledge the financial support of the Government of Canada through the Canada Book Fund (CBF) for our publishing activities and the assistance provided by the Government of Alberta through the Alberta Media Fund. This publication is licensed under a Creative Commons licence, Attribution–Noncommercial–No Derivative Works 4.0 International: see www.creativecommons.org. The text may be reproduced for non-commercial purposes, provided that credit is given to the original author. To obtain permission for uses beyond those outlined in the Creative Commons licence, please contact AU Press, Athabasca University, at [email protected].
    [Show full text]
  • An End Run Around the First Amendment: „Libel Tourists‟ Take Aim Overseas
    An End Run Around the First Amendment: „Libel Tourists‟ Take Aim Overseas By Ryan Feeney 2008 Pulliam Kilgore Intern Bruce W. Sanford Bruce D. Brown Laurie A. Babinski BAKER & HOSTETLER LLP Washington, D.C. Counsel to the Society of Professional Journalists September 2008 In the throes of the American Civil Rights movement as Southern blacks flexed their political might against segregation, a city commissioner in Alabama sued the country‟s most prominent newspaper, The New York Times. L.B. Sullivan‟s libel suit sought to silence the implication of his critics that he was part of a racist Southern oligarchy responsible for the violent suppression of black protests in Montgomery. It failed, and an uniquely American brand of free speech was born. In deciding that landmark free-speech case, New York Times v. Sullivan, 1 the U.S. Supreme Court noted how libel suits such as Sullivan‟s threatened “the very existence of an American press virile enough to publish unpopular views on public affairs.” Throughout modern American history, linking a person to an unpopular group has often led to a rash of libel suits against the press. It happened with communism in the 1940s, organized crime in the 1970s, and homosexuality in the 1980s under the stigmatizing glare of the AIDS epidemic. Yet in the more than four decades since the New York Times decision, American libel plaintiffs have found it acutely difficult to muzzle the press. But these free speech protections apply only on American soil, which means they cannot be used against the latest wave of libel litigants who bring suits overseas – foreigners accused of terrorism ties.
    [Show full text]
  • The Problem of Trans-National Libel, 60 Am
    University of Miami Law School University of Miami School of Law Institutional Repository Articles Faculty and Deans 2012 The rP oblem of Trans-National Libel Lili Levi University of Miami School of Law, [email protected] Follow this and additional works at: https://repository.law.miami.edu/fac_articles Part of the Comparative and Foreign Law Commons, First Amendment Commons, and the Jurisdiction Commons Recommended Citation Lili Levi, The Problem of Trans-National Libel, 60 Am. J. Comp. L. 507 (2012). This Article is brought to you for free and open access by the Faculty and Deans at University of Miami School of Law Institutional Repository. It has been accepted for inclusion in Articles by an authorized administrator of University of Miami School of Law Institutional Repository. For more information, please contact [email protected]. LILI LEVI* The Problem of Trans-National Libelt Forum shopping in trans-nationallibel cases-"libel tourism"- has a chilling effect on journalism, academic scholarship,and scien- tific criticism. The United States and Britain (the most popular venue for such cases) have recently attempted to address the issue legisla- tively. In 2010, the United States passed the SPEECH Act, which prohibits recognition and enforcement of libel judgments from juris- dictions applying law less speech-protective than the First Amendment. In Britain, consultation has closed and the Parliamen- tary Joint Committee has issued its report on a broad-ranginglibel reform bill proposed by the Government in March 2011. This Article questions the extent to which the SPEECH Act and the Draft Defama- tion Bill will accomplish their stated aims.
    [Show full text]
  • BLIS USER MANUAL BLIS Is Bernama Library & Infolink Service
    BLIS USER MANUAL BLIS is Bernama Library & Infolink Service. It is an information-rich and convenient research portal that provides access to news and significant information on Malaysia. ..HOW TO USE.. Insert : 1. I-Staff Account – Academicians & 1 Management Staff; 2. IPPS Account – Postgraduates Students 3. I-Student Account – Undergraduates 6 Students Click on content list - “ASKZAD” Go to Google and type USIM Library in the 2 3 4 5 search box. Click at title – “BLIS” Click on Click on “Database” “Subscription” . ..HOW TO USE.. Welcome to BLIS Page ..HOW TO USE.. Foreign News BERNAMA News Archival News Collection of foreign news from various Collection of news items as reported Collection of news clippings from the news agencies from around the world like by BERNAMA from 1996 to current. local newspapers and magazines from Kyodo of Japan, Yonhap of Korea, Xinhua Berita Dalam Negeri; Berita Ekonomi; 1969 to current. Berita Harian; Utusan from China, MAP from Moroccco, PTI Economic News; Feature/Special Malaysia; Malaysian Business; from India, International Islamic News Reports; General News; Siaran Bernama (1968- 1995); New Straits Agency(IINA) under the organization of Akhbar; Press Release; & Times; Miscellaneous; Business the Islamic Conference(OIC), Antara of Rencana/Laporan Khas. Times; & The Edge. Indonesia and many others from the African nations. Info Providers Who’s Who Sectoral Reports Malaysian statistics on industry Compilation of profiles of prominent Compilation of various industries in performance, commodity production and persons in Malaysia. Malaysia. Sourced from various economic forecast provided by organizations. government research agencies. Facts And Figures Databank Speeches Profile of Malaysia on its economy, Provides facts on diverse issues and Full text of speeches delivered by government, industries, labor and events extracted from Malaysian important political and corporate figures in business environment.
    [Show full text]
  • 23. Baltic Perspectives on the European Security and Defence Policy
    23. Baltic perspectives on the European Security and Defence Policy Elzbieta Tromer I. Introduction Given the choice between the North Atlantic Treaty Organization and the Euro- pean Security and Defence Policy as providers of their national security, the Baltic states—Estonia, Latvia and Lithuania—look to the USA. One reason is their perception of Russia as a source of instability. Another is their lack of con- fidence in the ability of the ESDP to deal with present-day threats. Although these three states are eager to be ‘normal’ members of the European Union and thus to join in its initiatives, their enthusiasm for the EU’s development of its own military muscle is lukewarm. An EU with some military capability but without the USA’s military strength and leadership holds little promise for them. Since the ESDP vehicle is already on the move, the Baltic states see their main function as ensuring coordination between the ESDP and NATO. Estonia, Latvia and Lithuania want to be ‘Atlanticists from within the ESDP’.1 The Baltic states see themselves as exposed to challenges similar to those confronting the Nordic countries: notably the challenge of the new transatlantic dynamic, which makes it almost impossible to avoid taking sides between the US and Europe on an increasing range of global and specific issues. Being torn in this way is bound to be especially painful for Scandinavian [and Baltic] societies which have strong ties of history, culture and values with both sides of the Atlantic, and which in strategic terms are relatively dependent both on American military and European economic strength.2 The Nordic countries are seen by the Baltic states as allies in this context.
    [Show full text]