1,284
Views
1
CrossRef citations to date
0
Altmetric
Papers

Netizenship, security and freedom

Pages 104-123 | Received 04 Jan 2013, Published online: 21 Mar 2013
 

Abstract

We [Cyberspace] must declare our virtual selves immune to your sovereignty … We will spread ourselves across the planet so that no-one can arrest our thoughts… May it be more humane and fair than the world your governments have made before.Footnote1

Failing to anticipate how authoritarian governments would respond to the Internet, cyber-utopians did not predict how useful it would prove for propaganda purposes, how masterfully dictators would learn to use it for surveillance, and how sophisticated modern systems of Internet censorship would become. Instead most cyber-utopians stuck to a populist account of how technology empowers the people, who, oppressed by years of authoritarian rule, will inevitably rebel, mobilizing themselves through text messages, Facebook, Twitter, and whatever new tool comes along next year.Footnote2

The above statements seem to suggest that the Internet is a space for contestation between freedom and security, but, for Morozov, in that contestation it is the forces of security, for regulation and control of the Internet which may be gaining the upper hand. (cf. MuellerFootnote3) The primary aim of this article is to consider ways in which a Netizen culture of free and open internet is constrained by forces of state surveillance and control. The developments in the Middle East provide one example of the apparent relationship of contestation between oppressive states and freedom-seeking cyber-citizens or Netizens within cyberspace's complex plural network modes of governance. The article compares Middle Eastern developments with developments elsewhere, particularly in China and the United States. It suggests that the relationship between Netizens and states needs to be understood in the context of the culture of the internet and modes of governance that involve complex networking among Netizen groups, commercial providers, governments and international institutions. Only through such a contextual examination of the complex interactions is it possible to understand the power (im)balances that provide the continuing tensions of global network information society. There have been many claims that the Arab spring was an Internet event. Egyptian security personnel cut off almost all access to the Internet other than to the stock exchange.Footnote4 Yet this did not stop the filling of Tahrir Square and ultimately the end of Mubarak. Some attributed this to the ‘mosque net’ as the traditional channel of communication, others have extolled the role of the more traditional medium of television and especially the new El Jezira.Footnote5 Some have focused on the role played by collaboration between social network sites, for example enabling Google and Twitter to allow people in Egypt to send Twitter messages by leaving a voicemail on a specific phone number.Footnote6 The Google executive Wael Ghoneim became an internet hero of the revolution through coordinating a crucial Facebook page.Footnote7 Global Cybercitizen organisations such as the Electronic Freedom Frontier had already been urging social network sites such as Facebook to take technical steps that would ensure the privacy of web users in countries with heavy internet surveillance.Footnote8

Acknowledgement

This paper is based on but is a substantially extended, reworked and updated version of ‘The governance of cyberspace: between security and freedom’ in Kleve, P. and van Noortwijk, K. (eds) (2011) Something bigger than yourself: essays in honour of Richard de Mulder (Rotterdam: Erasmus).

Notes

Barlow, J. P. 1996 A declaration of independence of cyberspace, Email 9 February 1996, http://w2.eff.org/Censorship/Internet_censorship_bills/barlow_0296.declaration (Accessed 5 August 2012).

Mozorov, E. 2011. The net delusion: the dark side of internet freedom, xiv. New York: Public Affairs.

Mueller, M.L. 2010. Networks and states: the global politics of internet governance. Cambridge, MA: MIT Press.

Arthur, C. 2011. Egypt cuts off internet access. The Guardian, 28 January 2011. http://www.guardian.co.uk/technology/2011/jan/28/egypt-cuts-off-internet-access. (Accessed 5 August 2012).

Srinivasan, R (011. Five myths about social media. The Washington Post, 15 September 2011 http://www.washingtonpost.com/national/on-innovations/five-myths-about-social-media/2011/09/15/gIQAr2BwAL_story_1.html. (Accessed 5 August 2012).

Arthur, C. 2011. Google and Twitter launch service enabling Egyptians to tweet by phone, The Guardian 1 February 2011 http://www.guardian.co.uk/technology/2011/feb/01/google-twitter-egypt

Black, I. 2011. Wael Ghonim anointed voice of the revolution by Tahrir Square faithful. The Guardian 8 February 2011. http://www.guardian.co.uk/world/2011/feb/08/wael-ghonim-tahrir-square. (Accessed 5 August 2012).

Anderson, N. 2011. Tweeting Tyrants out of tunisia: global internet at its best. Ars Technica, 14 January 2011 http://arstechnica.com/tech-policy/news/2011/01/tweeting-tyrants-out-of-tunisia.ars (Accessed 5 April 2011).

Dibell, J. 1993. A rape in cyberspace. The Village Voice, December 23, 1993 http://www.ludd.luth.se/mud/aber/articles/village_voice.html (Accessed April 5, 2011).

Hauben, M. 1996, Netizens: An Anthology. http://www.columbia.edu/~rh120/ (accessed April 5 2011).

Lury C. 1993. Cultural rights. Technology, legality and personality. London: Routledge.

Santos, B. 2002. Towards a new legal common sense: law, globalization and emancipation. London: Butterworths.

O'Donnell, C. 2011. New study quantifies use of social media in Arab Spring UW Today 12 September 2011 http://www.washington.edu/news/2011/09/12/new-study-quantifies-use-of-social-media-in-arab-spring/

Bowery, K. 2005. Law & internet cultures, 15. Cambridge: Cambridge University Press.

Benkler, Y. 2003. Freedom in the commons: towards a political economy of information. Duke Law Journal 52: 1245–1276.

Benkler, Y. 2006. The wealth of networks: how social production transforms markets and freedom. Yale: Yale University Press. http://www.benkler.org/Benkler_Wealth_Of_Networks.pdf (accessed 5 April 2011).

Hardt, M. and Negri, A. 2001. Empire. Cambridge and London: Harvard University Press.

Hardt, M. and Negri, A. 2004. Multitude: war and democracy in the age of empire, 187. London: Penguin.

Benkler, Y. 2003. Freedom in the commons: towards a political economy of information. Duke Law Journal 52: 1249.

Rosenzweig, R. 1998. Wizards, bureaucrats, warriors, and hackers: writing the history of the internet. The American Historical Review 103, no. 5: 1530–1552.

Klein, U. 2005. Introduction: techno-scientific productivity. Perspectives on Science 13, no. 2: 139–141.

Baxi, U. 2006. The future of human rights 2nd ed. New Delhi: Oxford University Press.

Ibid., 264.

Rajan, K. 2006. Biocapital: the constitution of postgenomic life. Durham: Duke University Press.

Ibid., 6.

Castells, M. 2000. The information age: economy society, culture. Vol 1 The rise of the network society. Oxford: Blackwell.

Huffington Post. 2012. London 2012: ‘Tim Berners-Lee tweets from Olympic stage as stars gather for opening ceremony’ http://www.huffingtonpost.co.uk/2012/07/27/london-2012-tim-berners-lee-olympic-opening-ceremony_n_1711874.html. (Accessed 5 August 2012).

Burris, S.P. Drahos, and Shearing, C. 2005. Nodal governance. Australian Journal of Legal Philosophy 30. SSRN http://ssrn.com/abstract=760928 (accessed 25 July 2009).

Working Group on Internet Governance, Report of the Working Group on Internet Governance, WGIG, Chateau de Bossey 2005., para 10 http://www.wgig.org/docs/WGIGREPORT.pdf (accessed 5 April 2011).

O'Neil, M. 2009. Cyberchiefs: autonomy and authority in online tribes. London: Pluto.

Easton, C. 2011. The web content accessibility standards 2.0: analysis of industry self-regulation. International Journal of Law and Information Technology 19, no 1: 74–93, doi:10.1093/ijlit/eaq015 (accessed 5 April 2011).

Palfrey, J. 2006. The end of the experiment: the failure of democracy in ICANN. In Reformatting politics, eds J. Dean et al., ch. 12 London: Routledge.

Raboy, M., Landry, N., and Shtern, J. 2010. Digital solidarities, communication policy and multi-stakeholder global governance: the legacy of the world summit on the information society. New York, Berlin, Oxford: Peter Lang.

Weinberg, J. 2000. ICANN and the problem of legitimacy. Duke Law Journal, Thirtieth Annual Administrative Law Issue, 50, no. 1: 187–260.

Mueller, M. Kuerbis, B. and Pagé, C. 2007. Democratizing Global Communication? Global Civil Society and the Campaign for Communication Rights in the Information Society. International Journal of Communication, Vol. 1. http://ijoc.org/ojs/index.php/ijoc/article/view/13

World Summit on Information Society. 2003. Declaration of principles. Geneva WSIS-03/GENEVA/DOC/4-E http://www.itu.int/wsis/docs/geneva/official/dop.html (accessed 5 August 2012).

World Summit on Information Society. 2005. Tunis commitment WSIS-05/TUNIS/DOC/7-E http://www.itu.int/wsis/docs2/tunis/off/7.html (accessed 5 August 2012).

Working Group on Internet Governance. 2005. Report of the Working Group on Internet Governance, WGIG, Chateau de Bossey 2005. http://www.wgig.org/docs/WGIGREPORT.pdf (accessed 5 April 2011).

UN Human Rights Council. 2011. Report of the Special Rapporteur La Rue on the Promotion and Protection of the Right of Freedom of Opinion and Expression (UN A/HRC/17/27) www2.ohchr.org/english/bodies/hrcouncil/docs/.../a.hrc.17.27_en.pdf

Ziccardi, G. 2012. Resistance, liberation technology and human rights in the digital age, 139–144. Dordrecht: Springer.

Dynamic Coalition on Internet Rights and Principles. 2011. The charter of human rights and principles for the internet. http://irpcharter.org/wpcharter/

Ziccardi, G. 2012. Resistance, liberation technology and human rights in the digital age, 144. Dordrecht: Springer.

Castells, M. 2009. Communication power, 431–432. Oxford: Oxford University Press.

Zittrain, J., and Palfrey, J., 2008. Internet filtering: the politics and mechanisms of control. In Access denied: the practice and policy of global internet filtering, eds R. Deibert et al., 30–31. Cambridge, MA: MIT Press.

Liang, B., and Lu, H. 2010. Re-legalization or de-legalization? Netizens' participation in criminal justice practices in China. Journal of Contemporary Criminal Justice 26 no. 1: 103–120.

Huang, X. 2012. Internet development, censorship, and cyber crimes in China. British Journal of Criminology 52, no. 4: 724–743.

Mozorov, E. 2011. The net delusion: the dark side of internet freedom, 89–90. New York: Public Affairs.

Ziccardi, G. 2012. Resistance, liberation technology and human rights in the digital age, 163–166. Dordrecht: Springer.

MacKinnon, R. 2010. Networked authoritarianism in China and beyond: implications for global internet freedom. In Colloquium on liberation technology in authoritarian regimes. Stanford. http://iis-db.stanford.edu/evnts/6349/mackinnon_libtech.pdf (Accessed 5 August 2012).

MacKinnon, R 2011. China's networked authoritarianism. Journal of Democracy 22: 2.

Deibert, R., Palfrey, J., Rohozinski, R., and Zittrain, J. (eds). 2008. Access denied: the practice and policy of global internet filtering, 263–271. Cambridge, MA: MIT Press.

Lam, O. 2009 China: Blue Dam activated. Global Voices Advocacy, September 13, 2009, accessed September 13, 2010 at: http://advocacy.globalvoicesonline.org/2009/09/13/china-blue-dam-activated/

Cheung, A.S. 2006. The business of governance: China's legislation on content regulation in cyberspace. New York University Journal of International Law and Politics 38: 1.

Cheung, A.S. 2009. A study of cyber-violence and internet service providers' liability: lessons from China. Pacific Rim Law and Policy Journal 18: 323.

Reporters without Borders. 2011. Internet leaders cooperate with government efforts to reinforce online controls. 9 November 2011. http://en.rsf.org/chine-respect-for-free-speech-continues-27-10-2011,41303.html (Accessed 5 August 2012).

Bandurski, D. 2008. China's guerilla war for the web. Far Eastern Economic Review, July 2008, at: http://www.feer.com/essays/2008/august/chinas-guerrilla-(accessed 5 August 2011).

Zuckerman, Ethan. 2011. The first Twitter revolution? Not so fast. The internet can take some credit for toppling Tunisia's government, but not all of it. Foreign Policy January 14, 2001. http://www.foreignpolicy.com/articles/2011/01/14/the_first_twitter_revolution. (accessed 20 October 2011)

Zhuo, X., Wellman, B. and Yu, J. 2011. Egypt: The first internet revolt? Peace Magazine July/Sept 2011: 6. http://peacemagazine.org/archive/v27n3p06.htm (accessed 10 February 2013).

Abdulla, R. 2007. The internet in the Arab world: Egypt and beyond, 82. New York, Berlin, Oxford: Peter Lang.

Deibert, R., Palfrey, J., Rohozinski, R., and Zittrain, J. (eds). 2008. Access denied: the practice and policy of global internet filtering, 396. Cambridge, MA: MIT Press.

Ibid., 397.

Ibid.

Anonymous. 2011. Anonymous attacks Tunisian government for war on free speech. Citizenlab January 2011, http://citizenlab.org/2011/01/anonymous-attacks-tunisian-government-for-%e2%80%98war-on-free-speech%e2%80%99/ (accessed 5 August 2012).

Elkin, M. 2011. Exclusive: Tunisia internet chief gives inside look at Tunisia uprising. Wired.Co.Uk 31 January 2011, http://www.wired.co.uk/news/archive/2011-01/31/tunisia-egypt-internet-restrictions?page=2 (accessed 5 August 2012).

Abdulla, R. 2007. The internet in the Arab World: Egypt and beyond, 86. New York, Berlin, Oxford: Peter Lang.

Deibert, R., Palfrey, J., Rohozinski, R., and Zittrain, J. (eds). 2008 Access denied: the practice and policy of global internet filtering, 278. Cambridge, MA: MIT Press.

El Sirgany S. 2006. Al-Ahram reverses Internet block on blogs. Daily News 15 August 2006 http://www.masress.com/en/dailynews/112904 (accessed 5 August 2012).

Reuters. 2011. Social media: a double edged sword in Syria. http://www.reuters.com/article/2011/07/13/us-syria-social-media-idUSTRE76C3DB20110713 (accessed 5 Aug 2012).

Clinton, H. 2010. Remarks on internet freedom. The Newseum, Washington, DC January 21, 2010 http://www.state.gov/secretary/rm/2010/01/135519.htm (accessed 5 August 2012).

Baxi, Upendra. 2005. The war on terror and the war of terror: nomadic multitudes, aggressive incumbents, and the new international law - prefactory remarks on two wars, Osgoode Hall Law Journal, 43: 7.

Krigman, E. 2012. Dems: ‘Secrecy doomed anti-counterfeiting treaty’. Politico 24 June 2012. http://www.politico.com/news/stories/0612/77768.html (accessed 5 August 2012).

Ibid.

Strossen, N. 2009. Free speech in an era of terrorism, the regulation of extremist speech in the era of mass digital communication: is Brandenburg tolerance obsolete in the terrorist era? Pepperdine Law Review 36: 361–362.

Doe v Mukassey 2008 USCA 2d Circuit available at http://www.aclu.org/files/pdfs/safefree/doevmukasey_decision.pdf (accessed 5 August 2012).

Savage, C. and Risen, J. 2010. Federal Judge Finds N.S.A. Wiretaps Were Illegal. New York Times (accessed 31 March 2010) http://www.nytimes.com/2010/04/01/us/01nsa.html?ref=wiretappingandothereavesdroppingdevicesandmethods

Hinnen, T. 2004 The cyber-front in the war on terrorism: curbing terrorist use of the internet. Columbia Science and Technology Law Review 5: 5

Ibid.

European Commission. 2011. Report from the Commission to the Council and the European Parliament: Evaluation report on the Data Retention Directive. Directive 2006/24/EC, COM(2011) 225, 18.4.2011, Brussels.

Bigo, R., Carrera, S., Gonzalez Fuster, G., Guild, E., de Hurt, P., Jeandesboz, J., and Papakonstantinou, V. 2011. Towards a new EU legal framework for data protection and privacy: challenges principles and role for the European Parliament. Study for European Parliament PE 453.216 www.ceps.eu/ceps/download/6351 (accessed 5 August 2012).

Breyer, P. 2005. Telecommunications data retention and human rights: the compatibility of blanket traffic data retention with the ECHR. European Law Journal 11, no. 3: 365–375.

Maras, M.-H. 2009. From targeted to mass surveillance: is the EU Data Retention Directive a necessary measure or an unjustified threat to privacy? In B. Goold, and D. Neyland. New directions in surveillance and privacy. Cullompton and Portland: Willan Publishing.

Ball, J. 2012, The surveillance state: growing under a coalition that pledged to reverse it. The Guardian 2 April 2012 http://www.guardian.co.uk/commentisfree/2012/apr/02/surveillance-state-coalition-email-social-media (accessed 5 August 2012).

Harlow, C. 2012. Surveillance and the superstate. UK Constitutional Law Group 2 May 2012 http://ukconstitutionallaw.org/2012/05/02/carol-harlow-surveillance-and-the-superstate/ (accessed 5 August 2012).

Benkler, Y. 2011. A free irresponsible press: Wikileaks and the battle over the soul of the networked fourth estate. Harvard Civil Rights-Civil Liberties Law Review 46: 311.

Global Research. 2012. Bradley Manning tortured at Quantico http://www.globalresearch.ca/index.php?context=va&aid=32334 (Accessed 5 August 2012).

Pilkington, E. 2012. Bradley Manning prosecutors ordered to explain evidence disclosures to judge. The Guardian, 26 June 2012 http://www.guardian.co.uk/world/2012/jun/26/bradley-manning-prosecutors-explain-evidence (accessed 5 August 2012).

Lessig, L. 1999. Code and other laws of cyberspace. New York: Basic Books.

Lessig, L. 2006. Code Version 2.0. New York: Basic Books.

Zittrain, J. 2008. The future of the internet and how to stop it. Yale: Yale University Press.

Paliwala, A. 2011. Regulating cyberspace: modes of production, modes of regulation and modes of resistance. In From transnational relations to transnational laws: northern European laws at the crossroads, eds A. Hellum et al. London: Ashgate (accessed 5 August 2012).

Pangburn, D. 2011. 5 U.S. corporations who have sold surveillance and filtering technology to authoritarian regimes. In Death & Taxes http://www.deathandtaxesmag.com/158315/5-u-s-corporations-who-have-sold-surveillance-technology-to-authoritarian-regimes/.

Wortzel, L. 2010. China's approach to cyber operations: implications for the United States: congressional testimony. Darby, CA: Diane Publishing.

Grady, D. 2012. How Google fights China on America's behalf. The Week. 18 June 2012. http://theweek.com/bullpen/column/229420/how-google-fights-china-on-americas-behalf (accessed 5 August 2012).

Dingledine, R. 2010. Ten things to look for in a circumvention tool. ttps://www.torproject.org/press/presskit/2010-09-16-circumvention-features.pdf. (Accessed 5 August 2012).

Ziccardi, G. 2012. Resistance, liberation technology and human rights in the digital age, 171–180. Dordrecht: Springer.

Callanan, C., Ziekenheiner, H., Escudero-Pascual, A., and Guerra, R. 2011. Leaping over the firewall: a review of censorship circumvention tools. Washington, DC: Freedom House,. http://www.freedomhouse.org/sites/default/files/inline_images/Censorship.pdf (accessed 5 August 2012).

Ibid., 27.

Glanz, J .and Markoff, J. 2011. US underwrites Internet Detour around censors. The New York Times, 12 June 2011. http://www.nytimes.com/2011/06/12/world/12internet.html?pagewanted=1&_r=1 (accessed 5 August 2012).

Park, T. 2011. The illiberal consequences of U.S. government investments in liberation technology. http://dartthrowingchimp.wordpress.com/2011/06/13/the-illiberal-consequences-of-u-s-government-investments-in-liberation-technology/ (accessed 5 August 2012).

Mozorov, E. 2011. The net delusion: the dark side of internet freedom, 179–183. New York: Public Affairs.

BBC News. 2012. Julian Assange row: Americas give Ecuador partial support. 25 August 2012. BBC, London. http://www.bbc.co.uk/news/uk-19377110 (Accessed 25 August 2012).

IMMI. 2012. IMMI status report. 9 April 2012 http://immi.is/images/8/8c/2012-04-15_IMMI_status_report.pdf (accessed 5 August 2012).

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 878.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.