A Sampling of Blocked Websites in Ethiopia

Total Page:16

File Type:pdf, Size:1020Kb

A Sampling of Blocked Websites in Ethiopia HUMAN RIGHTS “They Know Everything We Do” Telecom and Internet Surveillance in Ethiopia WATCH “They Know Everything We Do” Telecom and Internet Surveillance in Ethiopia Copyright © 2014 Human Rights Watch All rights reserved. Printed in the United States of America ISBN: 978-1-62313-1159 Cover design by Rafael Jimenez Human Rights Watch is dedicated to protecting the human rights of people around the world. We stand with victims and activists to prevent discrimination, to uphold political freedom, to protect people from inhumane conduct in wartime, and to bring offenders to justice. We investigate and expose human rights violations and hold abusers accountable. We challenge governments and those who hold power to end abusive practices and respect international human rights law. We enlist the public and the international community to support the cause of human rights for all. Human Rights Watch is an international organization with staff in more than 40 countries, and offices in Amsterdam, Beirut, Berlin, Brussels, Chicago, Geneva, Goma, Johannesburg, London, Los Angeles, Moscow, Nairobi, New York, Paris, San Francisco, Tokyo, Toronto, Tunis, Washington DC, and Zurich. For more information, please visit our website: http://www.Human Rights Watch.org MARCH 2014 978-1-62313-1159 “They Know Everything We Do” Telecom and Internet Surveillance in Ethiopia Summary ........................................................................................................................... 1 Recommendations .............................................................................................................. 5 To the Government of Ethiopia .................................................................................................. 5 To International Technology and Telecom Companies Serving Ethiopia ..................................... 6 To the Governments of China, Germany, Italy, the United Kingdom, and Others ............................. 7 To the World Bank, African Development Bank, and other Donors ............................................. 8 Methodology ...................................................................................................................... 9 I. Background ................................................................................................................... 12 Patterns of Repression and Government Control ...................................................................... 12 Targets of Surveillance ........................................................................................................... 14 Fears of Surveillance .............................................................................................................. 19 Telecommunications and Media in Ethiopia ............................................................................ 21 State Monopoly on Telecommunication Services .............................................................. 23 History of Telecommunications in Ethiopia ....................................................................... 24 Institutions of Ethiopia’s Telecommunication and Surveillance Apparatus ............................... 27 History and Background on Communications Surveillance ...................................................... 30 II. Ethiopia’s Control over Information and Communications Technology ........................... 34 Ethiopia’s Growing Telephone Network: More Opportunities for Government Control? .......... 34 “Brute Force” Confiscation ............................................................................................... 35 Unrestricted Access to Phone Call Recordings and Metadata ............................................ 36 Targeting Foreign Communications ................................................................................... 45 Live Interception of Phone Communication ...................................................................... 46 Restricting Access to Phone Network ................................................................................ 47 Network Shutdowns ........................................................................................................ 49 Geotracking of Individual Locations .................................................................................. 51 Controlling the Internet ........................................................................................................... 53 Internet Filtering ............................................................................................................... 53 Internet Filtering Roles and Responsibilities .................................................................... 60 Email Monitoring and Forced Password Disclosure .......................................................... 60 Restricting Access to the Internet .................................................................................... 66 Internet Cafes: Rules for Cafe Operators ........................................................................... 67 Pressure to Censor: Threats to Bloggers and Facebook Users ........................................... 68 Major Internet Companies in Ethiopia: Transparency Reports ............................................ 70 New Technologies and Their Potential: Intrusive Malware ................................................. 70 Other Surveillance Technologies ..................................................................................... 82 Jamming of Radio and Television Signals ............................................................................... 82 III. Legal Context .............................................................................................................. 88 International Law ................................................................................................................... 88 Freedom of Expression .................................................................................................... 88 Right to Privacy ............................................................................................................... 90 Responsibilities of Companies ......................................................................................... 91 Ethiopian Law ......................................................................................................................... 93 Freedom of Expression and Access to Information ............................................................ 93 Right to Privacy ................................................................................................................ 95 IV. The Future of Ethiopia’s Telecommunications Surveillance Capacity ............................ 99 Acknowledgments .......................................................................................................... 100 Appendix 1: A Sampling of Blocked Websites in Ethiopia ................................................. 101 Appendix 2: Correspondence ........................................................................................... 105 GLOSSARY OF ABBREVIATIONS BPR Business Process Reengineering CALEA Communications Assistance for Law Enforcement Act CESCR Committee on Economic, Social and Cultural Rights CITCC China International Telecom Corporation CSO Law Charities and Societies Proclamation CUD Coalition for Unity and Democracy DPI Deep Packet Inspection DW Deutsche Welle EDF Ethiopian Defense Forces EICTDA Ethiopian Information and Communication Technology Development Agency EPRDF Ethiopian People’s Revolutionary Democratic Front EPRP Ethiopian People’s Revolutionary Party ESAT Ethiopian Satellite Television ETA Ethiopian Telecommunication Agency ETC Ethiopia Telecommunications Corporation GPS Global Positioning System ICCPR International Covenant on Civil and Political Rights ICS Intelligent Charging System ICT Information and Communications Technology IM Instant Message INSA Information Network Security Agency ITU International Telecommunication Union MCIT Ministry of Communications and Information Technology NGO Nongovernmental organization NISS National Intelligence and Security Services OLF Oromo Liberation Front ONC Oromo National Congress ONI Open Network Initiative ONLF Ogaden National Liberation Front OPC Oromo People’s Congress PID Project Information Document PSCAP Public Sector Capacity Building Program SIM Subscriber Identity Module SMS Short Message Service TPLF Tigrayan People’s Liberation Front UAV Unmanned Aerial Vehicles UDJ Union for Democracy and Justice VOA Voice of America VOBME Voice of the Broad Masses of Eritrea VoIP Voice over Internet Protocol VSAT Very Small Aperture Terminal WTO World Trade Organization ZTEsec ZTE Special Equipment Company Summary One day they arrested me and they showed me everything. They showed me a list of all my phone calls and they played a conversation I had with my brother. They arrested me because we talked about politics on the phone. It was the first phone I ever owned, and I thought I could finally talk freely. — Former member of an Oromo opposition party, now a refugee in Kenya, May 2013 Since 2010, Ethiopia’s information technology capabilities have grown by leaps and bounds. Although Ethiopia still lags well behind many other countries in Africa, mobile phone coverage is increasing and access to email and social media have opened up opportunities for young Ethiopians—especially those living in urban areas—to communicate with each other and share viewpoints and ideas. The Ethiopian
Recommended publications
  • The FCO's Human Rights Work in 2012
    House of Commons Foreign Affairs Committee The FCO’s human rights work in 2012 Fourth Report of Session 2013–14 Volume I: Report, together with formal minutes, oral and written evidence Additional written evidence is contained in Volume II, available on the Committee website at www.parliament.uk/facom Ordered by the House of Commons to be printed 8 October 2013 HC 267 Published on 17 October 2013 by authority of the House of Commons London: The Stationery Office Limited £15.50 The Foreign Affairs Committee The Foreign Affairs Committee is appointed by the House of Commons to examine the expenditure, administration, and policy of the Foreign and Commonwealth Office and its associated agencies. Current membership Richard Ottaway (Conservative, Croydon South) (Chair) Mr John Baron (Conservative, Basildon and Billericay) Rt Hon Sir Menzies Campbell (Liberal Democrat, North East Fife) Rt Hon Ann Clwyd (Labour, Cynon Valley) Mike Gapes (Labour/Co-op, Ilford South) Mark Hendrick (Labour/Co-op, Preston) Sandra Osborne (Labour, Ayr, Carrick and Cumnock) Andrew Rosindell (Conservative, Romford) Mr Frank Roy (Labour, Motherwell and Wishaw) Rt Hon Sir John Stanley (Conservative, Tonbridge and Malling) Rory Stewart (Conservative, Penrith and The Border) The following Members were also members of the Committee during the parliament: Rt Hon Bob Ainsworth (Labour, Coventry North East) Emma Reynolds (Labour, Wolverhampton North East) Mr Dave Watts (Labour, St Helens North) Powers The Committee is one of the departmental select committees, the powers of which are set out in House of Commons Standing Orders, principally in SO No 152. These are available on the internet via www.parliament.uk.
    [Show full text]
  • Citizens' Band (CB) Radio
    Citizens’ Band (CB) radio – Authorising Amplitude Modulation (AM) modes of operation Permitting AM double and single side band CB radio in the UK Statement Publication date: 10 December 2013 Contents Section Page 1 Executive Summary 1 2 Introduction and background 2 3 Consultation Responses 5 4 Conclusions and next steps 10 Annex Page 1 List of non-confidential respondents 11 Citizens’ Band (CB) radio – Authorising Amplitude Modulation (AM) modes of operation Section 1 1 Executive Summary 1.1 This Statement sets out Ofcom’s decision to proceed with proposals made in our Consultation “Citizens’ Band (CB) radio – Authorising Amplitude Modulation (AM) modes of operation”1 (the ‘Consultation') which was published on 7 October 2013 and closed on 8 November 2013. 1.2 The Consultation proposed to amend current arrangements for Citizens’ Band (CB) Radio in the UK to allow the use of Amplitude Modulation (AM) Double-sideband (DSB) and Single-sideband (SSB) transmission on CB radio. 1.3 Ofcom specifically proposed to: • Authorise the use of AM emissions on European Conference of Postal and Telecommunications Administrations (CEPT) harmonised channels in line with European Communication Committee (ECC) Decision (11)032; and • Authorise such use on a licence exempt basis (in line with our authorisation approach for other modes of operation for CB). 1.4 These proposals followed on from work carried out in Europe. In June 2011 the ECC, part of CEPT, published a Decision, ECC/DEC/ (11)03 (the ‘Decision’) on the harmonised use of frequencies for CB radio equipment. The Decision sought to harmonise the technical standards and usage conditions relating to the use of frequencies for CB radio equipment in CEPT administrations.
    [Show full text]
  • Jamming Attacks and Anti-Jamming Strategies in Wireless Networks
    1 Jamming Attacks and Anti-Jamming Strategies in Wireless Networks: A Comprehensive Survey Hossein Pirayesh and Huacheng Zeng Department of Computer Science and Engineering, Michigan State University, East Lansing, MI USA Abstract—Wireless networks are a key component of the will become ubiquitously available for massive devices to telecommunications infrastructure in our society, and wireless realize the vision of Internet of Everything (IoE) in the near services become increasingly important as the applications of future [18]. wireless devices have penetrated every aspect of our lives. Although wireless technologies have significantly advanced in As we are increasingly reliant on wireless services, security the past decades, most wireless networks are still vulnerable to threats have become a big concern about the confidentiality, radio jamming attacks due to the openness nature of wireless integrity, and availability of wireless communications. Com- channels, and the progress in the design of jamming-resistant pared to other security threats such as eavesdropping and wireless networking systems remains limited. This stagnation can data fabrication, wireless networks are particularly vulnerable be attributed to the lack of practical physical-layer wireless tech- nologies that can efficiently decode data packets in the presence to radio jamming attacks for the following reasons. First, of jamming attacks. This article surveys existing jamming attacks jamming attacks are easy to launch. With the advances in and anti-jamming strategies in wireless local area networks software-defined radio, one can easily program a small $10 (WLANs), cellular networks, cognitive radio networks (CRNs), USB dongle device to a jammer that covers 20 MHz bandwidth ZigBee networks, Bluetooth networks, vehicular networks, LoRa below 6 GHz and up to 100 mW transmission power [34].
    [Show full text]
  • The Internet and Regulatory Responses in Ethiopia: Telecoms, Cybercrimes, Privacy, E-Commerce, and the New Media
    The Internet and Regulatory Responses in Ethiopia: Telecoms, Cybercrimes, Privacy, E-commerce, and the New Media Kinfe Micheal Yilma . and Halefom Hailu Abraha.. Abstract Whilst Ethiopia has telephone services since 1894 − not long after its invention−, the history of the Internet in Ethiopia is less than two decades old. The prototype Internet with limited accessibility was introduced only in 1997, and broadband Internet was not widely deployed until recently. This slow pace in the proliferation of the Internet has delayed the legislative responses of the country to the brave new worlds of the Internet. Despite a few laws currently in operation namely the cybercrime and telecom fraud offence laws, most areas of the online environment needs the attention of the Ethiopian legislature. Nonetheless, there are few draft cyber laws that are in the pipeline. This article briefly reviews major legislative developments in telecoms, cybercrime, privacy, e-commerce and the new media. It sketches legislative responses of the Ethiopian legislature to the advent of the Internet by outlining major sources of Internet law and their defining features. The article further considers the salient features of the major draft pieces of cyber legislation that await enactment. Key terms Internet, information technology, telecommunications, cyber law, Internet law, e-commerce, Ethiopia DOI http://dx.doi.org/10.4314/mlr.v9i1.4 Acronyms CA Certification Authority DESL Draft Electronic Signature Law DETL Draft Electronic Transactions Law DoS Denial of Service Attacks . Kinfe Micheal Yilma (LLB, Addis Ababa University; LLM, University of Oslo; LLM, Brunel University London). The author was formerly a Lecturer-in-Law at Hawassa University.
    [Show full text]
  • Human Rights Violations in Ethiopia
    / w / %w '* v *')( /)( )% +6/& $FOUFSGPS*OUFSOBUJPOBM)VNBO3JHIUT-BX"EWPDBDZ 6OJWFSTJUZPG8ZPNJOH$PMMFHFPG-BX ACKNOWLEDGMENTS This report was prepared by University of Wyoming College of Law students participating in the Fall 2017 Human Rights Practicum: Jennie Boulerice, Catherine Di Santo, Emily Madden, Brie Richardson, and Gabriela Sala. The students were supervised and the report was edited by Professor Noah Novogrodsky, Carl M. Williams Professor of Law and Ethics and Director the Center for Human Rights Law & Advocacy (CIHRLA), and Adam Severson, Robert J. Golten Fellow of International Human Rights. The team gives special thanks to Julia Brower and Mark Clifford of Covington & Burling LLP for drafting the section of the report addressing LGBT rights, and for their valuable comments and edits to other sections. We also thank human rights experts from Human Rights Watch, the United States Department of State, and the United Kingdom Foreign and Commonwealth Office for sharing their time and expertise. Finally, we are grateful to Ethiopian human rights advocates inside and outside Ethiopia for sharing their knowledge and experience, and for the courage with which they continue to document and challenge human rights abuses in Ethiopia. 1 DIVIDE, DEVELOP, AND RULE: HUMAN RIGHTS VIOLATIONS IN ETHIOPIA CENTER FOR INTERNATIONAL HUMAN RIGHTS LAW & ADVOCACY UNIVERSITY OF WYOMING COLLEGE OF LAW 1. PURPOSE, SCOPE AND METHODOLOGY 3 2. INTRODUCTION 3 3. POLITICAL DISSENTERS 7 3.1. CIVIC AND POLITICAL SPACE 7 3.1.1. Elections 8 3.1.2. Laws Targeting Dissent 14 3.1.2.1. Charities and Society Proclamation 14 3.1.2.2. Anti-Terrorism Proclamation 17 3.1.2.3.
    [Show full text]
  • Jamming the Stations: Is There an International Free Flow of Info
    Schenone: Jamming The Stations: Is There an International Free Flow of Info JAMMING THE STATIONS: IS THERE AN INTERNATIONAL FREE FLOW OF INFORMATION? In September 1983, Korean Airlines flight 7 was shot down by a Soviet interceptor.' All 269 passengers perished.2 Within an hour, news of the incident was broadcast to citizens of the Eastern European countries and the Soviet Union 3 over Radio Free Europe (RFE)4 and Radio Liberty (RL).5 The Soviet news services, how- ever, failed to mention the incident.6 The Soviet government delib- erately attempted to block reception of the RFE and RL broadcast through radio jamming.' Radio jamming is a significant international problem because radio broadcasting is an essential and powerful means of dissemi- nating information among nations.8 Radio jamming is generally defined as "deliberate radio interference to prevent reception of a foreign broadcast."9 A more technical definition is "intentional harmful interference" '0 which results in intentional non-conformity 1. THE BOARD FOR INTERNATIONAL BROADCASTING, TENTH ANNUAL REPORT 11 (1984) [hereinafter cited as TENTH ANNUAL REPORT]. 2. Id. 3. Id. 4.' See infra note 35 and accompanying text. 5. See infra note 36 and accompanying text. 6. TENTH ANNUAL REPORT, supranote I, at 11. The Soviet Union at first denied that the plane was shot down. When the Soviet news services later admitted it had in fact been shot down by one of their pilots, they claimed the Korean plane had no lights identifying it as non-agressive. However, RFE and RL broadcasts of the tapes of the interceptor's pilot revealed that he claimed he could see the Korean jet's strobe lights.
    [Show full text]
  • Journalism Is Not a Crime” Violations of Media Freedom in Ethiopia WATCH
    HUMAN RIGHTS “Journalism Is Not a Crime” Violations of Media Freedom in Ethiopia WATCH “Journalism Is Not a Crime” Violations of Media Freedom in Ethiopia Copyright © 2015 Human Rights Watch All rights reserved. Printed in the United States of America ISBN: 978-1-6231-32279 Cover design by Rafael Jimenez Human Rights Watch defends the rights of people worldwide. We scrupulously investigate abuses, expose the facts widely, and pressure those with power to respect rights and secure justice. Human Rights Watch is an independent, international organization that works as part of a vibrant movement to uphold human dignity and advance the cause of human rights for all. Human Rights Watch is an international organization with staff in more than 40 countries, and offices in Amsterdam, Beirut, Berlin, Brussels, Chicago, Geneva, Goma, Johannesburg, London, Los Angeles, Moscow, Nairobi, New York, Paris, San Francisco, Sydney, Tokyo, Toronto, Tunis, Washington DC, and Zurich. For more information, please visit our website: http://www.hrw.org 2 HUMAN RIGHTS WATCH | JANUARY 2015 JANUARY 2015 978-1-6231-32279 “Journalism Is Not a Crime” Violations of Media Freedoms in Ethiopia Glossary of Abbreviations ................................................................................................... i Map of Ethiopia .................................................................................................................. ii Summary ..........................................................................................................................
    [Show full text]
  • Threat Modeling and Circumvention of Internet Censorship by David Fifield
    Threat modeling and circumvention of Internet censorship By David Fifield A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor J.D. Tygar, Chair Professor Deirdre Mulligan Professor Vern Paxson Fall 2017 1 Abstract Threat modeling and circumvention of Internet censorship by David Fifield Doctor of Philosophy in Computer Science University of California, Berkeley Professor J.D. Tygar, Chair Research on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities|such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations. My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model of the circumvention problem and examine how to adapt it to concrete censorship challenges. I describe the results of experiments on censors that probe their strengths and weaknesses; specifically, on the subject of active probing to discover proxy servers, and on delays in their reaction to changes in circumvention. I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers. I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements.
    [Show full text]
  • A Survey of ICT Access and Usage in Ethiopia
    ICT POLICY BRIEF NO.1 A Survey of ICT Access and Usage in Ethiopia: Policy Implications Executive Summary This policy brief presents a synthesis of the results of household survey on ICT access and usage that was conducted in Ethiopia and other 16 African countries at the end of 2007 and the beginning of 2008. The data were collected from a national sample of 2100 households. The survey covered 84 Enumeration Areas (EA) that were randomly selected based on the data available from the Central Statistics Agency. Major urban, urban and rural areas from Tigray, Amhara, SNNPR, Somali, Afar, Benshangul Gumuz, Oromiya, Hareri, Dire Dawa and Addis Ababa regions were covered to provide an overall picture of the state of ICT access and usage in the country. The paper synthesises the results of the ICT access and usage survey in comparison to other African countries and provides policy recommendations for actions. households that dwell in the same compounds; that has 1. Introduction inflated the figure slightly. Notwithstanding the relatively The Government of Ethiopia has made a significant progress high level of penetration, there is still a long way to go in in increasing access to the ICT in the recent years. The fixed bridging the access gap to fixed line network in the country, line penetration has reached 1.2% with mobile penetration in particular in rural areas. well above 3% in 2008. Progress was also made in the rural access front, particularly in connecting rural towns that did not have access to modern information and communication technologies. The incumbent’s (Ethiopian Telecommunica‐ tions Corporation) stations were expanded to 936 places mostly in rural towns.
    [Show full text]
  • The Cycles of Global Telecommunication Censorship and Surveillance
    PENNEY (DO NOT DELETE) 5/14/2015 5:02 PM THE CYCLES OF GLOBAL TELECOMMUNICATION CENSORSHIP AND SURVEILLANCE JONATHON W. PENNEY* ABSTRACT Internet censorship and surveillance is on the rise globally and cyber- warfare increasing in scope and intensity. To help understand these new threats, commentators have grasped at historical analogies often with little regard for historical complexities or international perspective. Unfortunately, helpful new works on telecommunications history have focused primarily on U.S. history with little focus on international developments. There is thus a need for further internationally oriented investigation of telecommunications technologies, and their history. This essay attempts to help fill that void, drawing on case studies wherein global telecommunications technologies have been disrupted or censored – telegram censorship and surveillance, high frequency radio jamming, and direct broadcast satellite blocking. The case studies suggest remarkable regulatory patterns or cycles with insights for current censorship and privacy threats and challenges. * The author would like to thank Joseph Nye, Jonathan Zittrain, Ron Deibert, Masashi Crete-Nishihata, Joss Wright, Harry Lewis, Dorothy Zineberg, Victoria Nash, Ariel Katz, Carys Craig, Jennifer Granick, Fred von Lohmann, Eric Goldman, Dan Hunter, Scott Boone, Kendra Albert, Ryan Budish, Andy Sellars, Molly Sauter, Phillipa Gill, Adam Holland, Amar Ashar, Dan Jones, Enrique Armijo, Lorne Sossin, François Tanguay-Renaud, and Simon Stern, for comments, questions,
    [Show full text]
  • Broadcasting Board of Governors (BBG) Talking Points Documents, 2008-2011
    Description of document: Broadcasting Board of Governors (BBG) Talking Points documents, 2008-2011 Requested date: 26-October-2010 Released date: 29-September-2011 Posted date: 31-October-2011 Date/date range of document: 31-January-2008 – 30-June-2011 Source of document: Broadcasting Board of Governors FOIA/PA Unit Room 3349 330 Independence Ave. SW Washington, D.C. 20237 Fax: (202) 203-4585 The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. Broadcasting 330 Independence Ave.SW T 202.203.4550 Board of Cohen Building, Room 3349 F 202.203.4585 Governors Washington, DC 20237 Office of the General Counsel Freedom of Information and Privacy Act September 29, 2011 RE: Request Pursuant to the Freedom of Information Act- FOIA #11-014 This letter is in response to your October 26, 2010 request for primarily internal "Talking Points" or "Q&A" documents.
    [Show full text]
  • The Net Delusion : the Dark Side of Internet Freedom / Evgeny Morozov
    2/c pMs (blAcK + 809) soFt-toUcH MAtte lAMinAtion + spot gloss The NeT DelusioN evgeNy Morozov evgeNy The NeT DelusioN PoliTiCs/TeChNology $27.95/$35.50CAN “evgeny Morozov is wonderfully knowledgeable about the internet—he seems “THEREVOLUTIONWILLBETWITTERED!” to have studied every use of it, or every political use, in every country in the declared journalist Andrew sullivan after world (and to have read all the posts). And he is wonderfully sophisticated and protests erupted in iran in June 2009. Yet for tough-minded about politics. this is a rare combination, and it makes for a all the talk about the democratizing power powerful argument against the latest versions of technological romanticism. of the internet, regimes in iran and china His book should be required reading for every political activist who hopes to are as stable and repressive as ever. in fact, AlexAnder KrstevsKi AlexAnder change the world on the internet.” —MiChAel WAlzer, institute for authoritarian governments are effectively Advanced study, Princeton using the internet to suppress free speech, evgeNy Morozov hone their surveillance techniques, dissem- is a contributing editor to Foreign Policy “ evgeny Morozov has produced a rich survey of recent history that reminds us inate cutting-edge propaganda, and pacify and Boston Review and a schwartz Fellow that everybody wants connectivity but also varying degrees of control over their populations with digital entertain- at the new American Foundation. Morozov content, and that connectivity on its own is a very poor predictor of political ment. could the recent Western obsession is currently also a visiting scholar at stan- pluralism.... by doing so, he’s gored any number of sacred cows, but he’s likewise with promoting democracy by digital ford University.
    [Show full text]