SlideShare a Scribd company logo
1 of 13
DPI-665
Politics of the Internet
    April 11, 2012

    Internet Freedom
   And Its Discontents
       Micah L. Sifry
Audio: http://bit.ly/HXBsgW
      CC-BY-NC-SA
Topics for discussion
• What is “Internet Freedom”?
• Why is this being talked about now?
• Are we naïve about the role of the
  Internet in closed societies?
• Should the U.S. Govt align itself with
  U.S. tech companies? (and vice versa?)
• Who does the net empower more?
  Governments or activists? Why?
Texts from Hillary
Texts from Hillary
• “a new nervous system for
  our planet”
• “the more freely info flows,
  the stronger societies
  become”
• “equal access to
  knowledge and ideas”
• “the internet is a network
  that magnifies the power
  and potential of all others”
• “freedom to connect is like
  freedom of assembly, only
  in cyberspace”
More Texts from Hillary
• “Internet has become
  the public space of the
  21st c”
• “Freedoms of
  expression, assembly,
  and association online
  comprise what I’ve
  called the freedom to
  connect”
• “Without security, liberty
  is fragile; without liberty
  security is oppressive”
Hold this thought…
“The WikiLeaks incident      “And one final word on this matter:
                                There were reports in the days
  began with a theft, just      following these leaks that the United
  as if it had been             States Government intervened to
                                coerce private companies to deny
  executed by smuggling         service to WikiLeaks. That is not the
  papers in a briefcase.        case. Now, some politicians and
                                pundits publicly called for
  The fact that WikiLeaks       companies to disassociate from
  used the internet is not      WikiLeaks, while others criticized
                                them for doing so. Public officials
  the reason we criticized      are part of our country’s public
  its actions. WikiLeaks        debates, but there is a line between
                                expressing views and coercing
  does not challenge our        conduct. Business decisions that
  commitment to internet        private companies may have taken
                                to enforce their own values or
  freedom.”                     policies regarding WikiLeaks were
                                not at the direction of the Obama
                                Administration.”
Critiquing “Internet Freedom”
• Google Doctrine: “the
  enthusiastic belief in the
  liberating power of
  technology
  accompanied by the
  irresistible urge to enlist
  Silicon Valley start-ups
  in the global fight for
  freedom”
• Cyber-utopianism: “the
  idea that the Internet
  favors the oppressed
  rather than the
  oppressor”
Morozov’s Good Questions
• Iran: What “Twitter revolution”?
• Did State Dept endanger dissidents by
  embracing US tech (like Twitter?)
• Does increasing access to Western info
  sources lead to democratization? Or to
  depoliticization? (as in, David vs David
  Letterman, and Big Brother vs Big Brother
• Is the “dictator’s dilemma” truly that bad--or
  does greater internet access allow for better
  surveillance and control?
Assessing “Internet Freedom” From
     an Arab Democracy Perspective
•    “U.S official and corporate
     involvement in the Internet
     Freedom movement is harmful
     for that same freedom.”
•    “When putting Internet
     freedom at the center of its
     foreign policy agenda, the U.S
     will be disinclined to engage in
     any kind of action which might
     endanger the ‘stability’ of the
     dictatorial Arab order.”
•    “Foreign money delegitimizes
     political and social activism”
•    “Money has always corrupted
     activism”
Abu Gharbia’s Advice
“For digital activism in the Arab world to achieve its
    noble aspirations, it must remain independent and
    homegrown, tapping its financial, logistic and moral
    support into the grassroots level or try to seek a
    support from neutral parties that do not push for any
    kind of political or ideological agenda.”
“If the U.S. and other Western governments want to
    support Internet Freedom they should start by
    prohibiting the export of censor wares and other
    filtering software to our countries. After all, most of
    the tools used to muzzle our online free expression
    and monitor our activities on the Internet are being
    engineered and sold by American and Western
    corporations.”
Critiquing Morozov: Cory Doctorow
“When Morozov talks about the security risks
   arising from dissidents' use of Facebook
   – which neatly packages up lists of
   dissidents to be targeted by oppressive
   nations' secret police – he does so
   without ever mentioning the protracted,
   dire warnings of exactly this problem that
   have come from the ‘cyber-utopian’
   vanguard.”
“There is hardly any mention at all of
   history's most prominent internet freedom
   fighters, such as the venerable
   cypherpunks movement, who have spent
   decades building, disseminating and
   promoting the use of cryptographic tools
   that are purpose-built to evade the kind
   of snooping and network analysis he
   (rightly) identifies as being implicit in the
   use of Facebook, Google and other
   centralised, private tools to organise
   political movements.”
Strong Crypto for Dissidents
“It is vastly easier to scramble a message than it is to
    break the scrambling system and gain access to the
    message without the key.
“Poorly resourced individuals and groups with cheap,
    old computers are able to encipher their messages to
    an extent that they cannot be deciphered by all the
    secret police in the world… In this sense, at least, the
    technological deck is stacked in favour of dissidents –
    who have never before enjoyed the power to hide
    their communiques beyond the reach of secret police
    – over the state, who have always enjoyed the power
    to keep secrets from the people.”

More Related Content

What's hot

Open Data, Open Government
Open Data, Open GovernmentOpen Data, Open Government
Open Data, Open GovernmentMsifry
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++Roxanne St Ives
 
Modern Cryptographic Dissidence - B Sides PDX
Modern Cryptographic Dissidence - B Sides PDXModern Cryptographic Dissidence - B Sides PDX
Modern Cryptographic Dissidence - B Sides PDXJason Truppi
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetDibussi Tande
 
Brett Solomon: Transparency - the new norm
Brett Solomon: Transparency - the new normBrett Solomon: Transparency - the new norm
Brett Solomon: Transparency - the new normGlobal Utmaning
 
Ecommerce legal exchange beijing
Ecommerce legal exchange beijingEcommerce legal exchange beijing
Ecommerce legal exchange beijingInternet Law Center
 
Cyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentCyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentInternet Law Center
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionAlvaro Lopez Ortega
 
Cyber Libertarianism: Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism: Real Internet Freedom (Thierer & Szoka)Cyber Libertarianism: Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism: Real Internet Freedom (Thierer & Szoka)Berin Szoka
 
The Crisis of Self Sovereignty in The Age of Surveillance Capitalism
The Crisis of Self Sovereignty in The Age of Surveillance CapitalismThe Crisis of Self Sovereignty in The Age of Surveillance Capitalism
The Crisis of Self Sovereignty in The Age of Surveillance CapitalismJongseung Kim
 
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)Adam Thierer
 
International internet governance
International internet governanceInternational internet governance
International internet governanceJillian York
 
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...blogzilla
 
Surveillance Capitalism
Surveillance  CapitalismSurveillance  Capitalism
Surveillance CapitalismKen Berkun
 
Stamford innovation week - blockchain day
Stamford innovation week - blockchain dayStamford innovation week - blockchain day
Stamford innovation week - blockchain dayPreston J. Byrne
 
The Internet State Filter
The Internet State FilterThe Internet State Filter
The Internet State FilterAndrew Davies
 

What's hot (20)

Open Data, Open Government
Open Data, Open GovernmentOpen Data, Open Government
Open Data, Open Government
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
 
Modern Cryptographic Dissidence - B Sides PDX
Modern Cryptographic Dissidence - B Sides PDXModern Cryptographic Dissidence - B Sides PDX
Modern Cryptographic Dissidence - B Sides PDX
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
Introduction to Hacktivism
Introduction to HacktivismIntroduction to Hacktivism
Introduction to Hacktivism
 
Brett Solomon: Transparency - the new norm
Brett Solomon: Transparency - the new normBrett Solomon: Transparency - the new norm
Brett Solomon: Transparency - the new norm
 
Ecommerce legal exchange beijing
Ecommerce legal exchange beijingEcommerce legal exchange beijing
Ecommerce legal exchange beijing
 
Isa12b
Isa12bIsa12b
Isa12b
 
Polinter07
Polinter07Polinter07
Polinter07
 
Cyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentCyber Security Agenda for 45th President
Cyber Security Agenda for 45th President
 
Anthro hr powerpoint
Anthro hr powerpointAnthro hr powerpoint
Anthro hr powerpoint
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective Encryption
 
Cyber Libertarianism: Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism: Real Internet Freedom (Thierer & Szoka)Cyber Libertarianism: Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism: Real Internet Freedom (Thierer & Szoka)
 
The Crisis of Self Sovereignty in The Age of Surveillance Capitalism
The Crisis of Self Sovereignty in The Age of Surveillance CapitalismThe Crisis of Self Sovereignty in The Age of Surveillance Capitalism
The Crisis of Self Sovereignty in The Age of Surveillance Capitalism
 
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
 
International internet governance
International internet governanceInternational internet governance
International internet governance
 
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
 
Surveillance Capitalism
Surveillance  CapitalismSurveillance  Capitalism
Surveillance Capitalism
 
Stamford innovation week - blockchain day
Stamford innovation week - blockchain dayStamford innovation week - blockchain day
Stamford innovation week - blockchain day
 
The Internet State Filter
The Internet State FilterThe Internet State Filter
The Internet State Filter
 

Similar to Internet Freedom and its Discontents

Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarThomas Jones
 
Authoritarian Governments in Cyberspace
Authoritarian Governments in CyberspaceAuthoritarian Governments in Cyberspace
Authoritarian Governments in Cyberspaceevgeny.morozov
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismUniversity of Sydney
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxwhittemorelucilla
 
georgetown talk evgeny morozov
georgetown talk evgeny morozovgeorgetown talk evgeny morozov
georgetown talk evgeny morozovevgeny.morozov
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESJenny O'Meara
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
The Blogosphere The New Public Sphere? What Role for the State If Any?
The Blogosphere The New Public Sphere? What Role for the State If Any? The Blogosphere The New Public Sphere? What Role for the State If Any?
The Blogosphere The New Public Sphere? What Role for the State If Any? Dibussi Tande
 
Political hacktivism
Political hacktivismPolitical hacktivism
Political hacktivismEva Sánchez
 
Some Perspective on Hackers
Some Perspective on HackersSome Perspective on Hackers
Some Perspective on HackersRandi Lovelett
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...Emily Võ
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationHinne Hettema
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxbagotjesusa
 
Brown and Beige Aesthetic Vintage Group Project Presentation.pdf
Brown and Beige Aesthetic Vintage Group Project Presentation.pdfBrown and Beige Aesthetic Vintage Group Project Presentation.pdf
Brown and Beige Aesthetic Vintage Group Project Presentation.pdfvenuspatatag4
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internetJeffrey Hart
 
What social media is doing to the world
What social media is doing to the worldWhat social media is doing to the world
What social media is doing to the worldJulieCarn
 
Internet censorship
Internet censorshipInternet censorship
Internet censorshipmateo davis
 

Similar to Internet Freedom and its Discontents (20)

Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information War
 
Authoritarian Governments in Cyberspace
Authoritarian Governments in CyberspaceAuthoritarian Governments in Cyberspace
Authoritarian Governments in Cyberspace
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom Activism
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
georgetown talk evgeny morozov
georgetown talk evgeny morozovgeorgetown talk evgeny morozov
georgetown talk evgeny morozov
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
The Blogosphere The New Public Sphere? What Role for the State If Any?
The Blogosphere The New Public Sphere? What Role for the State If Any? The Blogosphere The New Public Sphere? What Role for the State If Any?
The Blogosphere The New Public Sphere? What Role for the State If Any?
 
Political hacktivism
Political hacktivismPolitical hacktivism
Political hacktivism
 
Some Perspective on Hackers
Some Perspective on HackersSome Perspective on Hackers
Some Perspective on Hackers
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
Brown and Beige Aesthetic Vintage Group Project Presentation.pdf
Brown and Beige Aesthetic Vintage Group Project Presentation.pdfBrown and Beige Aesthetic Vintage Group Project Presentation.pdf
Brown and Beige Aesthetic Vintage Group Project Presentation.pdf
 
Policy primer
Policy primerPolicy primer
Policy primer
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
 
What social media is doing to the world
What social media is doing to the worldWhat social media is doing to the world
What social media is doing to the world
 
The Largest Democracy - India
The Largest Democracy - IndiaThe Largest Democracy - India
The Largest Democracy - India
 
Internet censorship
Internet censorshipInternet censorship
Internet censorship
 

More from Msifry

Critiques of Transparency
Critiques of TransparencyCritiques of Transparency
Critiques of TransparencyMsifry
 
Mar 26: We-Govt, Govt as a Platform and Govt 2.0
Mar 26: We-Govt, Govt as a Platform and Govt 2.0Mar 26: We-Govt, Govt as a Platform and Govt 2.0
Mar 26: We-Govt, Govt as a Platform and Govt 2.0Msifry
 
Critiques of the Internet's Effects on Democracy
Critiques of the Internet's Effects on DemocracyCritiques of the Internet's Effects on Democracy
Critiques of the Internet's Effects on DemocracyMsifry
 
Open/Networked Movements: Occupy Wall Street and the Tea Party
Open/Networked Movements: Occupy Wall Street and the Tea PartyOpen/Networked Movements: Occupy Wall Street and the Tea Party
Open/Networked Movements: Occupy Wall Street and the Tea PartyMsifry
 
Obama 2008: What Was Empowered By His Campaign
Obama 2008: What Was Empowered By His CampaignObama 2008: What Was Empowered By His Campaign
Obama 2008: What Was Empowered By His CampaignMsifry
 
Yes They Can: How the 2012 Presidential Campaigns Are Using Technology
Yes They Can: How the 2012 Presidential Campaigns Are Using TechnologyYes They Can: How the 2012 Presidential Campaigns Are Using Technology
Yes They Can: How the 2012 Presidential Campaigns Are Using TechnologyMsifry
 
Trustiness mockup
Trustiness mockupTrustiness mockup
Trustiness mockupMsifry
 
From Dean to Obama: How Electoral Politics is Changing
From Dean to Obama: How Electoral Politics is Changing From Dean to Obama: How Electoral Politics is Changing
From Dean to Obama: How Electoral Politics is Changing Msifry
 
From Dean to Obama: How Electoral Politics is Changing
From Dean to Obama: How Electoral Politics is ChangingFrom Dean to Obama: How Electoral Politics is Changing
From Dean to Obama: How Electoral Politics is ChangingMsifry
 
Decentralized and Open Organizations
Decentralized and Open OrganizationsDecentralized and Open Organizations
Decentralized and Open OrganizationsMsifry
 
Decentralized and Open Organizations
Decentralized and Open OrganizationsDecentralized and Open Organizations
Decentralized and Open OrganizationsMsifry
 
From Fortresses to Sponges
From Fortresses to SpongesFrom Fortresses to Sponges
From Fortresses to SpongesMsifry
 
Read/Write: A Culture of Sharing and Transparency
Read/Write: A Culture of Sharing and TransparencyRead/Write: A Culture of Sharing and Transparency
Read/Write: A Culture of Sharing and TransparencyMsifry
 
From Mass Media to the Networked Public Sphere
From Mass Media to the Networked Public SphereFrom Mass Media to the Networked Public Sphere
From Mass Media to the Networked Public SphereMsifry
 
SOPA/PIPA and the Rise of Networked Public Power
SOPA/PIPA and the Rise of Networked Public PowerSOPA/PIPA and the Rise of Networked Public Power
SOPA/PIPA and the Rise of Networked Public PowerMsifry
 
Politics in America, Pre-Internet
Politics in America, Pre-InternetPolitics in America, Pre-Internet
Politics in America, Pre-InternetMsifry
 
What is Web 2.0?
What is Web 2.0?What is Web 2.0?
What is Web 2.0?Msifry
 
From Scarcity to Abundance
From Scarcity to AbundanceFrom Scarcity to Abundance
From Scarcity to AbundanceMsifry
 
Summing up the early internet
Summing up the early internetSumming up the early internet
Summing up the early internetMsifry
 
Obama Agonistes
Obama AgonistesObama Agonistes
Obama AgonistesMsifry
 

More from Msifry (20)

Critiques of Transparency
Critiques of TransparencyCritiques of Transparency
Critiques of Transparency
 
Mar 26: We-Govt, Govt as a Platform and Govt 2.0
Mar 26: We-Govt, Govt as a Platform and Govt 2.0Mar 26: We-Govt, Govt as a Platform and Govt 2.0
Mar 26: We-Govt, Govt as a Platform and Govt 2.0
 
Critiques of the Internet's Effects on Democracy
Critiques of the Internet's Effects on DemocracyCritiques of the Internet's Effects on Democracy
Critiques of the Internet's Effects on Democracy
 
Open/Networked Movements: Occupy Wall Street and the Tea Party
Open/Networked Movements: Occupy Wall Street and the Tea PartyOpen/Networked Movements: Occupy Wall Street and the Tea Party
Open/Networked Movements: Occupy Wall Street and the Tea Party
 
Obama 2008: What Was Empowered By His Campaign
Obama 2008: What Was Empowered By His CampaignObama 2008: What Was Empowered By His Campaign
Obama 2008: What Was Empowered By His Campaign
 
Yes They Can: How the 2012 Presidential Campaigns Are Using Technology
Yes They Can: How the 2012 Presidential Campaigns Are Using TechnologyYes They Can: How the 2012 Presidential Campaigns Are Using Technology
Yes They Can: How the 2012 Presidential Campaigns Are Using Technology
 
Trustiness mockup
Trustiness mockupTrustiness mockup
Trustiness mockup
 
From Dean to Obama: How Electoral Politics is Changing
From Dean to Obama: How Electoral Politics is Changing From Dean to Obama: How Electoral Politics is Changing
From Dean to Obama: How Electoral Politics is Changing
 
From Dean to Obama: How Electoral Politics is Changing
From Dean to Obama: How Electoral Politics is ChangingFrom Dean to Obama: How Electoral Politics is Changing
From Dean to Obama: How Electoral Politics is Changing
 
Decentralized and Open Organizations
Decentralized and Open OrganizationsDecentralized and Open Organizations
Decentralized and Open Organizations
 
Decentralized and Open Organizations
Decentralized and Open OrganizationsDecentralized and Open Organizations
Decentralized and Open Organizations
 
From Fortresses to Sponges
From Fortresses to SpongesFrom Fortresses to Sponges
From Fortresses to Sponges
 
Read/Write: A Culture of Sharing and Transparency
Read/Write: A Culture of Sharing and TransparencyRead/Write: A Culture of Sharing and Transparency
Read/Write: A Culture of Sharing and Transparency
 
From Mass Media to the Networked Public Sphere
From Mass Media to the Networked Public SphereFrom Mass Media to the Networked Public Sphere
From Mass Media to the Networked Public Sphere
 
SOPA/PIPA and the Rise of Networked Public Power
SOPA/PIPA and the Rise of Networked Public PowerSOPA/PIPA and the Rise of Networked Public Power
SOPA/PIPA and the Rise of Networked Public Power
 
Politics in America, Pre-Internet
Politics in America, Pre-InternetPolitics in America, Pre-Internet
Politics in America, Pre-Internet
 
What is Web 2.0?
What is Web 2.0?What is Web 2.0?
What is Web 2.0?
 
From Scarcity to Abundance
From Scarcity to AbundanceFrom Scarcity to Abundance
From Scarcity to Abundance
 
Summing up the early internet
Summing up the early internetSumming up the early internet
Summing up the early internet
 
Obama Agonistes
Obama AgonistesObama Agonistes
Obama Agonistes
 

Recently uploaded

Power in International Relations (Pol 5)
Power in International Relations (Pol 5)Power in International Relations (Pol 5)
Power in International Relations (Pol 5)ssuser583c35
 
15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdf12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Political-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxPolitical-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxSasikiranMarri
 
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road ConnectivityTransforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivitynarsireddynannuri1
 
11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdf11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Emerging issues in migration policies.ppt
Emerging issues in migration policies.pptEmerging issues in migration policies.ppt
Emerging issues in migration policies.pptNandinituteja1
 
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Foreign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxForeign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxunark75
 
lok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptxlok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptxdigiyvbmrkt
 
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...The Lifesciences Magazine
 
Geostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptGeostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptUsmanKaran
 
14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdf14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdf13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdfFIRST INDIA
 

Recently uploaded (14)

Power in International Relations (Pol 5)
Power in International Relations (Pol 5)Power in International Relations (Pol 5)
Power in International Relations (Pol 5)
 
15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf
 
12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdf12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdf
 
Political-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxPolitical-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptx
 
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road ConnectivityTransforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivity
 
11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdf11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdf
 
Emerging issues in migration policies.ppt
Emerging issues in migration policies.pptEmerging issues in migration policies.ppt
Emerging issues in migration policies.ppt
 
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf
 
Foreign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxForeign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptx
 
lok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptxlok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptx
 
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
 
Geostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptGeostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.ppt
 
14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdf14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdf
 
13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdf13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdf
 

Internet Freedom and its Discontents

  • 1. DPI-665 Politics of the Internet April 11, 2012 Internet Freedom And Its Discontents Micah L. Sifry Audio: http://bit.ly/HXBsgW CC-BY-NC-SA
  • 2. Topics for discussion • What is “Internet Freedom”? • Why is this being talked about now? • Are we naïve about the role of the Internet in closed societies? • Should the U.S. Govt align itself with U.S. tech companies? (and vice versa?) • Who does the net empower more? Governments or activists? Why?
  • 4. Texts from Hillary • “a new nervous system for our planet” • “the more freely info flows, the stronger societies become” • “equal access to knowledge and ideas” • “the internet is a network that magnifies the power and potential of all others” • “freedom to connect is like freedom of assembly, only in cyberspace”
  • 5. More Texts from Hillary • “Internet has become the public space of the 21st c” • “Freedoms of expression, assembly, and association online comprise what I’ve called the freedom to connect” • “Without security, liberty is fragile; without liberty security is oppressive”
  • 6. Hold this thought… “The WikiLeaks incident “And one final word on this matter: There were reports in the days began with a theft, just following these leaks that the United as if it had been States Government intervened to coerce private companies to deny executed by smuggling service to WikiLeaks. That is not the papers in a briefcase. case. Now, some politicians and pundits publicly called for The fact that WikiLeaks companies to disassociate from used the internet is not WikiLeaks, while others criticized them for doing so. Public officials the reason we criticized are part of our country’s public its actions. WikiLeaks debates, but there is a line between expressing views and coercing does not challenge our conduct. Business decisions that commitment to internet private companies may have taken to enforce their own values or freedom.” policies regarding WikiLeaks were not at the direction of the Obama Administration.”
  • 7. Critiquing “Internet Freedom” • Google Doctrine: “the enthusiastic belief in the liberating power of technology accompanied by the irresistible urge to enlist Silicon Valley start-ups in the global fight for freedom” • Cyber-utopianism: “the idea that the Internet favors the oppressed rather than the oppressor”
  • 8. Morozov’s Good Questions • Iran: What “Twitter revolution”? • Did State Dept endanger dissidents by embracing US tech (like Twitter?) • Does increasing access to Western info sources lead to democratization? Or to depoliticization? (as in, David vs David Letterman, and Big Brother vs Big Brother • Is the “dictator’s dilemma” truly that bad--or does greater internet access allow for better surveillance and control?
  • 9. Assessing “Internet Freedom” From an Arab Democracy Perspective • “U.S official and corporate involvement in the Internet Freedom movement is harmful for that same freedom.” • “When putting Internet freedom at the center of its foreign policy agenda, the U.S will be disinclined to engage in any kind of action which might endanger the ‘stability’ of the dictatorial Arab order.” • “Foreign money delegitimizes political and social activism” • “Money has always corrupted activism”
  • 10.
  • 11. Abu Gharbia’s Advice “For digital activism in the Arab world to achieve its noble aspirations, it must remain independent and homegrown, tapping its financial, logistic and moral support into the grassroots level or try to seek a support from neutral parties that do not push for any kind of political or ideological agenda.” “If the U.S. and other Western governments want to support Internet Freedom they should start by prohibiting the export of censor wares and other filtering software to our countries. After all, most of the tools used to muzzle our online free expression and monitor our activities on the Internet are being engineered and sold by American and Western corporations.”
  • 12. Critiquing Morozov: Cory Doctorow “When Morozov talks about the security risks arising from dissidents' use of Facebook – which neatly packages up lists of dissidents to be targeted by oppressive nations' secret police – he does so without ever mentioning the protracted, dire warnings of exactly this problem that have come from the ‘cyber-utopian’ vanguard.” “There is hardly any mention at all of history's most prominent internet freedom fighters, such as the venerable cypherpunks movement, who have spent decades building, disseminating and promoting the use of cryptographic tools that are purpose-built to evade the kind of snooping and network analysis he (rightly) identifies as being implicit in the use of Facebook, Google and other centralised, private tools to organise political movements.”
  • 13. Strong Crypto for Dissidents “It is vastly easier to scramble a message than it is to break the scrambling system and gain access to the message without the key. “Poorly resourced individuals and groups with cheap, old computers are able to encipher their messages to an extent that they cannot be deciphered by all the secret police in the world… In this sense, at least, the technological deck is stacked in favour of dissidents – who have never before enjoyed the power to hide their communiques beyond the reach of secret police – over the state, who have always enjoyed the power to keep secrets from the people.”

Editor's Notes

  1. Hillary Clinton’s first speech on Internet Freedom, Jan 2010
  2. Internet freedom speech 2011
  3. Evgeny Morozov, author of the Net Delusion
  4. Sami Abu Gharbia, Nawaat.org