Jared Cohen - The New Digital Age

Здесь есть возможность читать онлайн «Jared Cohen - The New Digital Age» весь текст электронной книги совершенно бесплатно (целиком полную версию без сокращений). В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: Старинная литература, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

The New Digital Age: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «The New Digital Age»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

The New Digital Age — читать онлайн бесплатно полную книгу (весь текст) целиком

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «The New Digital Age», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Governments and operators alike will take a lesson from Egypt’s failed shutdown tactic. Inside the country, it mobilized masses, and outside, it enraged the international community. Within days of the shutdown, external companies and activists had developed alternative ways for Egyptian citizens to connect again, albeit patchily. A Paris-based nonprofit, French Data Network, opened up Internet access through dial-up connections (available to anyone with an international landline), while Google launched a tweet-by-phone service called Speak2Tweet, which allowed callers to dial one of three numbers and leave a voice mail, which would then be posted as a tweet.

Vittorio Colao told us that after the events in Egypt, major telecom carriers came together to discuss how to prevent such a thing from happening again, and how to take a common position in case it does. Ultimately, he said, “We decided that this has to be discussed within the International Telecommunication Union”—the United Nations special agency for global telecommunications—“to exactly define the rules of engagement.” In the future, other governments will surely look to the Egyptian shutdown episode and reevaluate their own odds of survival if they disrupt the connectivity of their populations. Moreover, with peer-to-peer and other connection platforms that operate without a traditional network gaining in popularity, the impact of shutting down communications networks is drastically reduced. Irrational governments, or regimes in a panic, might still consider the extreme step of literally severing the connections at the borders: disconnecting fiber cables, destroying cell towers. But this step would incur such serious economic damage to the country—all financial markets, currency markets and businesses that use external data to operate would fail—that it’s very unlikely any regime would take it.

Repressive governments, though, are nothing if not resourceful, and they will find ways to create leverage and exploit loopholes in the face of restive populations and revolutionary challenges. States will develop new methods that are more subtle and insidious. One strategy that many will employ is the if-you-can’t-beat-’em-join-’em plan, whereby instead of trying to limit the Internet, they infiltrate it. As we discussed earlier, states stand to gain a significant edge over citizens in the data revolution because of how much of citizens’ information they’ll have access to. If a government is worried about an uprising, it could ramp up its Internet-monitoring efforts by trawling social-media networks to look for vocal activists; impersonating dissidents to lure in and capture others; hacking into and adding misinformation to prominent mobilization websites; commandeering the webcam on a laptop or tablet to listen to and watch a dissident’s actions without his knowledge; and paying close attention to the inflows of money over electronic platforms to identify outside support. Early-stage infiltration might make the difference between a small demonstration and a national rebellion.

Even if the nature of virtual crackdowns changes, however, physical crackdowns will remain a constant in the repressive-state security playbook. Technology is no match for ground-level brutality, as the horrific examples in Syria’s multiyear crackdown have shown. Impossible as it seems in the beginning, the international community can become desensitized to violent and graphic content, even when the flow of nightmarish images on videos and photographs actually increases over time. All told, for those governments that are still trying to protect their credibility and deny such crimes, brutal crackdowns will become a much riskier endeavor in the digital age. Increased visibility through global online platforms does protect citizens, and this will, we hope, become even more the case as tools like facial-recognition software improve. For an army officer, the knowledge that one well-timed picture from a citizen’s handset could identify and shame him internationally—or lead his own government to throw him under the bus—might encourage him to show restraint or even defect. The same could be said for informal civilian militias that engage in violence on behalf of a regime, like the Zimbabwean gangs that fight for Robert Mugabe’s ZANU-PF party.

Instead of infiltration (or at least in addition to it), we expect that many states will adopt a strategy we’ll call virtual containment. To relieve the pressure of an agitated, informed public, states will calculate that rather than deny services altogether, it’s better to crack a window to allow citizens to vent their grievances in public on the Internet—but, more important, only to a certain degree. Regimes in the future will allow some online dissent, whether by reforming the law or simply not prosecuting the speech, but only on their terms, through specific channels they control. After all, giving a Bolivian environmental activist space to complain about the risks of deforestation is unlikely to substantively threaten the strength of the government.

At first glance, the creation of virtual “venting” spaces will seem like a win-win: Citizens will feel a deeper sense of engagement and perhaps a new degree of freedom, while the government will win points for embracing reform (while avoiding or at least stalling an outright rebellion). Perhaps some repressive states will sincerely see the value in reform and offer policy changes without guile. Many won’t; not only would the gestures not be genuine (those governments would be uninterested in citizen feedback), but the state would view such spaces as opportunities for intelligence-gathering. Regimes already understand the strategic value of allowing online activity that can lead to arrests. A decade ago, the Egyptian police’s vice squad would troll chat rooms and Internet forums with false identities to entrap gay citizens, then lure them to a McDonald’s in Cairo to ambush and arrest them. 4In 2011, following the Tunisian revolution, several Chinese dissidents responded to an online call for a Chinese version of the protests in front of popular American chains like Starbucks. The mobilization calls spread throughout Chinese social media and microblogs, at which point the police became aware of them. When activists arrived at the prescribed date and time, they were met with an overwhelming police force that arrested many of them. Had the government crushed this online activity immediately after noticing it, the police would not have been able to follow the virtual activity to find the physical dissidents.

As part of their virtual containment strategies, states will undertake a series of transparency gestures, releasing crumbs but withholding the bulk of information they possess. These states will be congratulated for exposing their own institutions and even their own past crimes. Perhaps a government known for its internal corruption will want to appear to turn over a new leaf by publicly disclosing the graft of its judiciary or of a former leader. Or a regime in a single-party state will release some information that is accurate but not particularly damning or useful, like its health ministry’s budget statements. Designated straw men will emerge to take responsibility and bear the brunt of public anger, and the regime will survive intact. Manufacturing transparent-looking documents and records will not be difficult for these regimes—in the absence of contradictory information (such as leaked original documents), there’s little hope of proving them false.

The real challenge for states that adopt the virtual containment approach will be distinguishing between public venting and real opposition online. Computer engineers use the term “noise” to describe data that can be very loud but does not convey a useful signal. Authoritarian governments will encounter a political version of this as they begin to allow freer online discussion. In open societies, laws regarding freedom of speech and hate speech largely define the boundaries for citizens, but in closed countries that lack legal precedents for allowable speech, the government is operating somewhat blindly. It will be very difficult for states to determine the intent behind people’s words online—if they’re not known dissidents, have no ties to opposition groups and don’t stick out in any particular way, how does a government newly committed to open dialogue respond without going too far? This unknowable quality will make digital noise the big wild card for authorities as they struggle to first assess and then react. Getting it wrong, by overreaction or underreaction, could be lethal for a regime. Neglect of an online swell could turn it into an off-line storm, and harshly cracking down on online banter could give a nascent online movement with no real momentum something to rally around.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «The New Digital Age»

Представляем Вашему вниманию похожие книги на «The New Digital Age» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «The New Digital Age»

Обсуждение, отзывы о книге «The New Digital Age» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x