The Impact of Information and Communication Technology on State Sovereignty

Total Page:16

File Type:pdf, Size:1020Kb

The Impact of Information and Communication Technology on State Sovereignty The Impact of Information and Communication Technology on State Sovereignty An Analysis of the Cyber Utopian and Cyber Skeptic Perspectives Sara Mishra Senior Honors Thesis Interdisciplinary Studies Tufts University, 2012 Mishra 2 Contents Extended Contents……………………..……………………………………….............………….................2 Preface………………………………………………..………………………………………........................5 Acknowledgments………………………………………………………………...…………………….........7 Introduction………………………………………………………………………………..……….................9 Problem………………………………………………………………………..........………………9 Significance………………………………………………………………………...……………...12 Structure………………………………………..………………………………………………….14 Definitions…………………………………………………………………………………………17 Methodology……………………………………………………………………………….…………..........21 Background Literature………………………………..…………………………………………………......24 Networks Background…...………………………………………………………………………..24 Cyber Utopians Background……………...……………………………….…...……………...…..38 Cyber Skeptics Background……………...……………………………….…...……………...…...51 Cyber Utopian Evidence………………………………..…………………………………………………...69 Information…….……..…...……………...……………..................................................................69 Coordination…….……..…...……………...……………................................................................86 Activism…….……..…...……………...……………........................................................86 Assistance…….……..…...……………...……………...................................................111 Cyber Skeptic Evidence……………………………………………………………….........……………...124 Control……………………………………………………………………………………………124 Censorship……………………………..……………….…………………………….....124 Influence…………………………………………………………………………….....141 Force………………………………………………………...………………….………...………154 Discussion……………………………………………………………………...………...………...............168 Conclusion………………………………………………………………..………………………..............177 Bibliography…………………………………………………………..…………..…………….…............184 Appendix A…………………………………………………………...…....…………..………..……........205 Acronyms………………………………………………………………………………….....…….............207 Mishra 3 Extended Contents Preface………………………………………………..………………………………………........................5 Acknowledgments………………………………………………………………...…………………….........7 Introduction………………………………………………………………………………..……….................9 Problem………………………………………………………………………..........………………9 Significance………………………………………………………………………...……………...12 Structure………………………………………..………………………………………………….14 Definitions…………………………………………………………………………………………17 Methodology……………………………………………………………………………….…………..........21 Background Literature………………………………..…………………………………………………......24 Networks Background…...………………………………………………………………………..24 Network Theory..……………………………………………………… ………………..………………………24 ICT Networks..……………………………………………………………… …………..……………………....26 Physical Layer..…………………………………………… …………………..……….….………..27 Logical Layer..……………………………………… …………………………..………………..…27 Hierarchies..………………………………………… ……………………………..……….…….…28 Information Layer..…………………………………… ……………………………………...….….29 User Layer..………………………………………………… …………………………………....….30 Internet Governance..………………………………………………… …………………………………………31 ICT Development……………………………………….……………………………………….……………….33 International Networks..…………………………………………… …………...……………………………….34 Network Limitations. .………………………………………………… …………………...…………………...36 Cyber Utopians Background……………...……………………………….…...……………...…..38 International Relations Foundation…...…………………………………………..…...……………...…………38 History…...…………………………………………..…...……………...……………...……………………….42 Basic Arguments…...…………………………………………..…...……………...……………...……………..43 Networks…………………………………..…...……………...……………...………………………………….44 Information…………………………………..…...……………...……………...……………………………….46 Coordination…………………………………..…...……………...……………...……………………………...49 Cyber Skeptics Background……………...……………………………….…...……………...…...51 International Relations Foundation…………………………………..…...……………...……………................52 History…………………………………..…...……………...……………............................................................54 Basic Arguments…………………………………..…...……………...……………............................................56 Hierarchy…………………………………..…...……………...……………........................................................58 Control…………………………………..…...……………...……………...........................................................61 Influence…………………………………..…...……………...……………........................................................65 Force…………………………………..…...……………...……………..............................................................66 Cyber Utopian Evidence………………………………..…………………………………………………...69 Information…….……..…...……………...……………..................................................................69 Access…………………………………..…...…………….....…………..............................................................70 Gatekeepers…………………………………..…...……………...……………....................................................71 Standards…………………………………..…...……………...……………........................................................72 Social Media…………………………………..…...……………...……………..................................................73 Instantaneous Reporting…………………………………..…...……………...…………….................................74 Citizen Journalism…………………………………..…...……………...…………….........................................76 Counter Narratives (Egypt) …………………………………..…...……………...……………...........................76 Accountability (China) …………………………………..…...……………...……………..................................77 Transparency (United States) …………………………………..…...……………...……………........................78 Cyber Utopian Perspective…………………………………..…...……………...……………............................80 Cyber Skeptic Perspective…………………………………..…...……………...…………….............................81 Integrated Perspective…………………………………..…...……………...……………....................................83 Transition…………………………………..…...……………...…………….......................................................84 Coordination…….……..…...……………...……………................................................................86 Activism…….……..…...……………...……………........................................................86 Public Sphere…..…...……………...……………...............................................................................87 Strong and Weak Ties…..…...……………...……………..................................................................89 Political Protest (Tunisia) ………...……………................................................................................90 Political Protest (Egypt) ………...……………...................................................................................92 Political Protest (United States) ………...…………….......................................................................98 Cyber Skeptic Perspective………...……………..............................................................................100 Cyber Utopian Perspective………...…………….............................................................................102 Cyber Skeptic Rebuttal………...……………...................................................................................106 Mishra 4 Integrated Perspective………...…………….....................................................................................107 Transition………...……………........................................................................................................109 Assistance…….……..…...……………...……………...................................................111 Networked Organizations…...…………….......................................................................................111 Ushahidi Platform Background…...……………...............................................................................113 Environmental Crisis (Haiti) …...……………..................................................................................113 Political Crisis (Libya) …...……………...........................................................................................115 Ushahidi Platform Challenges…...……………................................................................................116 Decentralized Structure…...……………..........................................................................................118 Cyber Utopian Perspective…...…………….....................................................................................118 Cyber Skeptic Perspective…...……………......................................................................................119 Integrated Perspective…...…………….............................................................................................120 Transition…...……………................................................................................................................122 Cyber Skeptic Evidence……………………………………………………………….........……………...124 Control……………………………………………………………………………………………124 Censorship……………………………..……………….…………………………….....124 Dictator’s Dilemma (Egypt) …...……………..................................................................................125 Censorship Technology (China) …...……………............................................................................127 Intermediary Control (China) …...……………................................................................................129 Self-Censorship (China) …...…………….........................................................................................130 Liberal Regime Censorship (United States) …...……………..........................................................131 Liberal Regime Censorship (United Kingdom) …...…………….....................................................133 Circumvention Tools…...……………..............................................................................................135
Recommended publications
  • Utrecht University Vernacular Spaces in the Year of Dreams: A
    Utrecht University Research Master’s Thesis Vernacular Spaces in the Year of Dreams: A Comparison Between Occupy Wall Street and the Egyptian Revolution Author: Supervisor: Alex Strete Prof. Dr. Ismee Tames Submitted in fulfillment of the requirements for the degree of Master of Arts in the Research Master’s of History Faculty of Humanities 15th June, 2021 Chapter Outline Table of Contents Introduction: The Global Occupation Movement of 2011 ............................................................. 1 Chapter One: The Vernacular Space as an Ideal Type ................................................................. 11 Chapter Two: “The People” of Tahrir Square .............................................................................. 35 Chapter Three: “The 99%” of Zuccotti Park ................................................................................ 52 Chapter Four: Tahrir Square and Zuccotti Park in Perspective .................................................... 67 Conclusion: Occupy Everything? ................................................................................................. 79 Bibliography ................................................................................................................................. 85 Abstract The year 2011 was a year of dreams. From the revolutionaries in the Arab Spring to the occupiers of Wall Street, people around the world organized in order to find alternative ways of living. However, they did not do so in a vacuum. Protesters were part of the same international
    [Show full text]
  • JULIAN ASSANGE: When Google Met Wikileaks
    JULIAN ASSANGE JULIAN +OR Books Email Images Behind Google’s image as the over-friendly giant of global tech when.google.met.wikileaks.org Nobody wants to acknowledge that Google has grown big and bad. But it has. Schmidt’s tenure as CEO saw Google integrate with the shadiest of US power structures as it expanded into a geographically invasive megacorporation... Google is watching you when.google.met.wikileaks.org As Google enlarges its industrial surveillance cone to cover the majority of the world’s / WikiLeaks population... Google was accepting NSA money to the tune of... WHEN GOOGLE MET WIKILEAKS GOOGLE WHEN When Google Met WikiLeaks Google spends more on Washington lobbying than leading military contractors when.google.met.wikileaks.org WikiLeaks Search I’m Feeling Evil Google entered the lobbying rankings above military aerospace giant Lockheed Martin, with a total of $18.2 million spent in 2012. Boeing and Northrop Grumman also came below the tech… Transcript of secret meeting between Julian Assange and Google’s Eric Schmidt... wikileaks.org/Transcript-Meeting-Assange-Schmidt.html Assange: We wouldn’t mind a leak from Google, which would be, I think, probably all the Patriot Act requests... Schmidt: Which would be [whispers] illegal... Assange: Tell your general counsel to argue... Eric Schmidt and the State Department-Google nexus when.google.met.wikileaks.org It was at this point that I realized that Eric Schmidt might not have been an emissary of Google alone... the delegation was one part Google, three parts US foreign-policy establishment... We called the State Department front desk and told them that Julian Assange wanted to have a conversation with Hillary Clinton...
    [Show full text]
  • Al Jazeera's Expansion: News Media Moments and Growth in Australia
    Al Jazeera’s Expansion: News Media Moments and Growth in Australia PhD thesis by publication, 2017 Scott Bridges Institute of Governance and Policy Analysis University of Canberra ABSTRACT Al Jazeera was launched in 1996 by the government of Qatar as a small terrestrial news channel. In 2016 it is a global media company broadcasting news, sport and entertainment around the world in multiple languages. Devised as an outward- looking news organisation by the small nation’s then new emir, Al Jazeera was, and is, a key part of a larger soft diplomatic and brand-building project — through Al Jazeera, Qatar projects a liberal face to the world and exerts influence in regional and global affairs. Expansion is central to Al Jazeera’s mission as its soft diplomatic goals are only achieved through its audience being put to work on behalf of the state benefactor, much as a commercial broadcaster’s profit is achieved through its audience being put to work on behalf of advertisers. This thesis focuses on Al Jazeera English’s non-conventional expansion into the Australian market, helped along as it was by the channel’s turning point coverage of the 2011 Egyptian protests. This so-called “moment” attracted critical and popular acclaim for the network, especially in markets where there was still widespread suspicion about the Arab network, and it coincided with Al Jazeera’s signing of reciprocal broadcast agreements with the Australian public broadcasters. Through these deals, Al Jazeera has experienced the most success with building a broadcast audience in Australia. After unpacking Al Jazeera English’s Egyptian Revolution “moment”, and problematising the concept, this thesis seeks to formulate a theoretical framework for a news media turning point.
    [Show full text]
  • Barefoot Into Cyberspace Adventures in Search of Techno-Utopia
    Barefoot into Cyberspace Adventures in search of techno-Utopia By Becky Hogge July 2011 http://www,barefootintocyberspace.com Barefoot into Cyberspace Becky Hogge Read This First This text is distributed by Barefoot Publishing Limited under a Creative Commons Attribution-ShareAlike 2.0 UK: England & Wales Licence. That means: You are free to copy, distribute, display, and perform the work to make derivative works to make commercial use of the work Under the following conditions Attribution. You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar licence to this one. For any reuse or distribution, you must make clear to others the licence terms of this work. The best way to do this is with a link to http://barefootintocyberspace.com/book/hypertext Any of these conditions may be waived by seeking permission from Barefoot Publishing Limited. To contact Barefoot Publishing Limited, email barefootpublishing [AT] gmail [DOT] com. More information available at http://creativecommons.org/licenses/by- sa/2.0/uk/. See the end of this file for complete legalese 2 Barefoot into Cyberspace Becky Hogge Contents Prologue: Fierce Dancing ...................................................................................................................................... 5 Chapter 1: Digging the command line ............................................................................................................
    [Show full text]
  • An Examination of Social Media's Role in the Egyptian Arab Spring
    Butler University Digital Commons @ Butler University Undergraduate Honors Thesis Collection Undergraduate Scholarship 5-2014 Revolutionizing the Revolution: An Examination of Social Media's Role in the Egyptian Arab Spring Needa A. Malik Butler University Follow this and additional works at: https://digitalcommons.butler.edu/ugtheses Part of the International and Area Studies Commons, Mass Communication Commons, and the Social Media Commons Recommended Citation Malik, Needa A., "Revolutionizing the Revolution: An Examination of Social Media's Role in the Egyptian Arab Spring" (2014). Undergraduate Honors Thesis Collection. 197. https://digitalcommons.butler.edu/ugtheses/197 This Thesis is brought to you for free and open access by the Undergraduate Scholarship at Digital Commons @ Butler University. It has been accepted for inclusion in Undergraduate Honors Thesis Collection by an authorized administrator of Digital Commons @ Butler University. For more information, please contact [email protected]. 1 Revolutionizing the Revolution: An Examination of Social Media’s Role in the Egyptian Arab Spring Revolution A Thesis Presented to the Department of International Studies College of Liberal Arts and Sciences And The Honors Program Of Butler University In Partial Fulfillment of the Requirements for Graduation Honors Needa A. Malik 4/28/14 2 “The barricades today do not bristle with bayonets and rifles, but with phones.”1 Introduction Revolutions are born out of human existence intertwining with synergetic movements. They are the products of deeply disgruntled and dissatisfied individuals seeking an alternative to the present status quo. Revolutions emerge from a number of situations and come in the form of wars, of movements, of social, cultural, and technological upheavals.
    [Show full text]
  • Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media
    See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/327186182 Custodians of the internet: Platforms, content moderation, and the hidden decisions that shape social media Book · January 2018 CITATIONS READS 268 6,850 1 author: Tarleton Gillespie Microsoft 37 PUBLICATIONS 3,116 CITATIONS SEE PROFILE All content following this page was uploaded by Tarleton Gillespie on 20 December 2019. The user has requested enhancement of the downloaded file. Custodians of the Internet platforms, content moderation, and the hidden decisions that shape social media Tarleton Gillespie CUSTODIANS OF THE INTERNET CUSTODIANS OF THE INTERNET platforms, content moderation, and the hidden decisions that shape social media tarleton gillespie Copyright © 2018 by Tarleton Gillespie. All rights reserved. Subject to the exception immediately following, this book may not be repro- duced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers. The Author has made this work available under the Creative Commons Attribution- Noncommercial- ShareAlike 4.0 International Public License (CC BY- NC- SA 4.0) (see https://creativecommons.org/licenses/ by- nc- sa/4.0/). An online version of this work is available; it can be accessed through the author’s website at http://www.custodiansoftheinternet.org. Yale University Press books may be purchased in quantity for educational, business, or promotional use. For information, please e- mail sales.press@yale. edu (U.S. offi ce) or [email protected] (U.K.
    [Show full text]
  • 1 Michelle Zilio – Rapporteur December 16
    Michelle Zilio – Rapporteur December 16, 2011 Conference Report (DRAFT 2) Executive Summary The University of Victoria’s Centre for Global Studies hosted the Networks, Social Media and Political Change in the Middle East and North Africa (MENA) conference from November 29 to December 1, 2011 in Victoria, British Columbia, Canada. A group of 27 academics, activists, government and private sector representatives, and social media experts gathered for three days to discuss this timely subject matter. The conference was structured into five informal discussion forums and included a web conference with individuals from the MENA region. The conference began with a review of the role of social media in MENA since the start of the phenomenon known popularly as the Arab Spring. After canvassing the types of hardware/software which might be characterized as constituting “social media”, participants agreed that the role of those media varied from country to country, largely depending on the degree of Internet penetration. A lively discussion ensued on the relationship between traditional (printed press, television networks) and new/social media in MENA over the last year. Participants agreed that the old and new media were interacting and evolving in relation to each other. A combination of old and new media often significantly affected specific event outcomes, although the level of impact depended on circumstances. They also agreed that the media as a whole contributed to a demonstration or cascade effect from one country to another. The role of journalism in MENA was examined, including the differing practices and approaches of the two Al Jazeera networks. The general parameters of social media effects were agreed upon.
    [Show full text]
  • Cyberactivism in the Egyptian Revolution: How Civic Engagement and Citizen Journalism Tilted the Balance
    Cyberactivism in the Egyptian Revolution: How Civic Engagement and Citizen Journalism Tilted the Balance by Dr Sahar Khamis and Katherine Vaughn published in Issue 14 of Arab Media and Society, Summer 2011 Introduction ―If you want to free a society, just give them Internet access.‖ These were the words of 30-year- old Egyptian activist Wael Ghonim in a CNN interview on February 9, 2011, just two days before long-time dictator Hosni Mubarak was forced to step down under pressure from a popular, youthful, and peaceful revolution. This revolution was characterized by the instrumental use of social media, especially Facebook, Twitter, YouTube, and text messaging by protesters, to bring about political change and democratic transformation. This article focuses on how these new types of media acted as effective tools for promoting civic engagement, through supporting the capabilities of the democratic activists by allowing forums for free speech and political networking opportunities; providing a virtual space for assembly; and supporting the capability of the protestors to plan, organize, and execute peaceful protests. Additionally, it explores how these new media avenues enabled an effective form of citizen journalism, through providing forums for ordinary citizens to document the protests; to spread the word about ongoing activities; to provide evidence of governmental brutality; and to disseminate their own words and images to each other, and, most importantly, to the outside world through both regional and transnational media. In discussing these aspects, special attention will be paid to the communication struggle which erupted between the people and the government, through shedding light on how the Egyptian people engaged in both a political struggle to impose their own agendas and ensure the fulfillment of their demands, while at the same time engaging in a communication struggle to ensure that their authentic voices were heard and that their side of the story was told, thus asserting their will, exercising their agency, and empowering themselves.
    [Show full text]
  • 2019 Annual General Meeting Speaker Bios
    Last Updated 2/26/19 2019 ANNUAL GENERAL MEETING SPEAKER BIOS Rasha Abdul-Rahim | International Secretariat of Amnesty Tech Rasha Abdul Rahim is Deputy Director of Amnesty Tech and oversees its work on Big Data and artificial intelligence and leads Amnesty’s work on autonomous weapons. Before that, she was a Researcher/Advisor in the Military, Security and Police Team, where she worked on various arms control issues, including the Arms Trade Treaty. Session: Humanity at Risk: Climate Change, Artificial Intelligence & the Future of Human Rights Alireza Azizi | Country Specialist for Amnesty International USA Member of the Middle East Coordination Group of Amnesty International USA, covering Yemen, UAE, and Qatar. He has participated in three research missions to Yemen as part of the AI delegation. He has been a member of AI for over three decades and has served in various positions from local group coordinator to serving on the AIUSA board of directors. He has also participated in several international meetings representing AIUSA. Session: U.S. Arms Sales and the Hidden War in Yemen: Campaign Opportunities Ahead Eduardo Beckett | Immigration Lawyer Eduardo Beckett is a private immigration attorney with Beckett Law Firm, P.C. in El Paso, Texas. Since 2008, he has represented many asylum seekers from around the globe before the El Paso Immigration Court. Before private practice, he was the managing attorney at Las Americas Immigrant Advocacy Center, a non-profit dedicated to immigrant defense in El Paso. Session: Campaign Plenary – Families Belong Together and Free: Supporting Refugee Families in This Time of Crisis Simon Billonness | Co-chair of the AIUSA Business and Human Rights Group Described by the New York Times as “a super-specialist” in human rights advocacy, Simon Billenness serves as co-chair of the AIUSA Business and Human Rights Group (BHRG), where he helps develop and implement AI’s strategies to hold corporations accountable.
    [Show full text]
  • A Clash of Cultures: Hate Speech, Taboos, Blasphemy, and the Role of News Media
    A Clash of Cultures: Hate Speech, Taboos, Blasphemy, and the Role of News Media A Report to the Center for International Media Assistance By Jane Sasseen October 3, 2013 The Center for International Media Assistance (CIMA), at the National Endowment for Democracy, works to strengthen the support, raise the visibility, and improve the effectiveness of independent media development throughout the world. The Center provides information, builds networks, conducts research, and highlights the indispensable role independent media play in the creation and development of sustainable democracies. An important aspect of CIMA’s work is to research ways to attract additional U.S. private sector interest in and support for international media development. CIMA convenes working groups, discussions, and panels on a variety of topics in the field of media development and assistance. The center also issues reports and recommendations based on working group discussions and other investigations. These reports aim to provide policymakers, as well as donors and practitioners, with ideas for bolstering the effectiveness of media assistance. Don Podesta Interim Senior Director Center for International Media Assistance National Endowment for Democracy 1025 F Street, N.W., 8th Floor Washington, DC 20004 Phone: (202) 378-9700 Fax: (202) 378-9407 Email: [email protected] URL: http://cima.ned.org Design and Layout by Valerie Popper About the Author Jane Sasseen Jane Sasseen is a freelance editorial consultant who has worked with a number of major non-profit and media organizations in recent years. Her work has spanned coverage of the global economy, U.S. politics and economic policy, and the future of media.
    [Show full text]
  • Who Moderates the Social Media Giants? a Call to End Outsourcing
    Who Moderates the Social Media Giants? A Call to End Outsourcing PAUL M. BARRETT Center for Business and Human Rights June 2020 Contents Executive Summary .................................................................................... 1 1. Introduction ............................................................................................ 3 Sidebar: The Coronavirus Pandemic and Content Moderation ............... 6 2. The Origins and Development of Content Moderation ............................. 7 Sidebar: Ad Hoc Policies: From COVID-19 to Holocaust Denial.............. 9 3. The Moderator’s Experience ................................................................. 12 4. Content Moderation and Volatile Countries ........................................... 19 Sidebar: Many Frauds, Not Enough Fact-Checkers .............................. 23 5. Recommendations ............................................................................... 24 Endnotes .................................................................................................. 27 Acknowledgments We extend special thanks to researchers and Stern Signature Project participants Abhinav Krishna, Tiffany Lin, and Su-Kyong Park. Thanks also to the following for their time and insights: Facebook: Monika Bickert, Ruchika Budhraja, Arun Chandra, Nick Clegg, Crystal Davis, Sarah Oh, Maxime Prades, Drew Pusateri, Guy Rosen, Miranda Sissons Google/YouTube: Markham Erickson, Mike Grosack, Alex Joseph, Radha Penekelapati, Alexandria Walden, Clement Wolf Twitter: Del Harvey,
    [Show full text]
  • Anti-Blasphemy Offensives in the Digital Age: When Hardliners Take Over
    The Brookings Project on U.S. Relations with the Islamic World AnaLYSIS PAPER | No. 25, September 2016 Anti-blasphemy offensives in the digital age: When hardliners take over BY JOELLE FISS The Brookings Institution is a nonprofit organization devoted to independent research and policy solutions. Its mission is to conduct high-quality, independent research and, based on that research, to provide innovative, practical recommendations for policymakers and the public. The conclusions and recommendations of any Brookings publication are solely those of its author(s), and do not reflect the views of the Institution, its management, or its other scholars. Brookings recognizes that the value it provides to any supporter is in its absolute commitment to quality, independence and impact. Activities supported by its donors reflect this commitment and the analysis and recommendations are not determined by any donation. Copyright © 2016 Brookings Institution 1775 Massachusetts Avenue, NW Washington, D.C. 20036 U.S.A. www.brookings.edu Table of contents 1 Acknowledgments 3 The author 5 Introduction 9 Religious speech and technology: Individuals caught in the crossfire 17 Cross-border repercussions, diplomatic strains 24 Censorship and surveillance: What can be done to protect Internet users accused of blasphemy? 28 Recommendations 30 About the Project on U.S. Relations with the Islamic World 31 The Center for Middle East Policy 1 | Anti-blasphemy offensives in the digital age: When hardliners take over Acknowledgments would like to thank William McCants of the Brookings Institution for commissioning this paper. I gratefully acknowledge the assistance Iof Anne Peckham, as well as the helpful comments made by two anonymous reviewers.
    [Show full text]