In this July 16, 2013 file photo, a woman walks by a sign at Cyber Terror Response Center of National Police Agency in Seoul, South Korea.

In this July 16, 2013 file photo, a woman walks by a sign at Cyber Terror Response Center of National Police Agency in Seoul, South Korea. Ahn Young-joon/AP

The Rise of Cyber Repression

When even the New York Times is open to tinkering with the First Amendment, it’s time to look at the way groups and governments are shaping our online society.

Donald Trump calls for “closing that Internet up” due to the rise of Islamic extremism, Hillary Clinton says the same thing, just a bit more diplomatically, asking the great disrupters to go to work disrupting the so-called Islamic State. Given that it is impossible to shut down the Internet in the United States, even if Russian submarines were to cut transatlantic cables, this move by Trump to enter the arena of information security demonstrates one of the most pernicious challenges in our digital era: the rise of cyber repression. Even the New York Times is exploring challenging the First Amendment in the age of digital extremism, which suggests Trump’s ideas are not at all fringe.

While the actions of the Islamic State and other malicious actors online pose security problems, especially in their ability help recruit and promote offensive ideologies, the rush to react to this threat may harm civil liberties, or as Trump says “oh freedom of speech, freedom of speech.” The great hope of the Internet as a path to digital freedom has quickly given way to the reality of the structural control imposed by states on activists in cyberspace. The danger posed by digital threats is not severe enough to warrant a challenge the freedoms and liberties inherent in Western political ideologies.

There has been a precipitous rise in malicious hacking but it is not exhibited between states, rather it is from within them by governments seeking to maintain control over their populations. There is increasing utilization of cyber technology to silence dissent, often in direct contradiction with human rights law. The dramatic rise of digital control by the state is a development that has been relatively overlooked by both mainstream media and the United Nations compared to the concern exhibited for the as of yet mythical cyberwar.

The latest Citizen Lab report exposes the efforts of an espionage team named Packrat to silence dissent in Ecuador, Venezuela, and Argentina. The group used malware, phishing and disinformation, even going so far as to threaten an investigator looking into their activities. The scope, funding, and targets suggest this group is either directed or serves as a proxy for state interests.

Our future is not one of constant cyber war between countries, tracing dots as they bounce around the digital map between countries—but rather one of digital violence and repression directed at both internal and external enemies.

The story of Hacking Team, which made headlines earlier this year, also illustrates the ability of governments to use malicious code to target activists. Based in Italy, Hacking Team is an information technology company that sells intrusion and surveillance capabilities to governments, law enforcement agencies, and corporations. While it claims to not sell to governments with poor human rights records, evidence from a counter hack points to the contrary. Hacking Team software was found on the office computers of Mamfakinch, an award-winning Moroccan news website that is critical of the Moroccan government. The Hacking Team’s products have also surfaced in Ethiopia, a country notorious for its repression and strict governmental control over all channels of communications, as well as in Sudan, Bahrain and Saudi Arabia.

Digital tools clearly have as much potential for harm as good because governments, with their many resources, can leverage these tools to suppress dissent as described. As well, the ability of social media to facilitate rapid organization or protest, or to share video or photo footage is tremendous but not foolproof. Governments have been known to respond to digitally organized protests with traditional weapons. For example, agents of the Thai government killed dozens of protesters after the Red Shirt uprising, which was coordinated largely via Twitter. There are similar examples from Iran and Belarus.

This kind of digital repression may not seem as dire, dramatic, or tragic as other crimes that occur regularly against civilians, but it does constitute a human rights violation. This is largely based in Article 19 of the International Convention on Civil and Political Rights guarantees the “freedom to seek, receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in writing or in print, in the form of art, or through any other media of his choice.”

The question then is, what must be done to help activism flourish and protect civil liberties? The first step should be collect better data to obtain a realistic picture of how and when cyber repression happens. Valeriano and Maness catalog attacks between states but now the focus must shift towards collecting data on domestic attacks perpetrated by states and their proxies. Data collection should start with defining a list of actions that constitute cyber repression, the perpetrator, target, degree of severity, goal of operation, and method of attack. This goes beyond Freedom on the Net‘s ranking of countries based on Internet openness or the former OpenNet Initiative’s measuring of information controls, instead we must catalog specific abuses and methods. Once this information is collected, like any human rights abuse, action can be taken. Parties cannot be credibly named and shamed without evidence.

Repression by digital means deserves attention and action. Our future is not one of constant cyber war between countries, tracing dots as they bounce around the digital map between countries, but rather one of digital violence and repression directed at both internal and external enemies. To address digital repression, we first need better awareness of the extent of the problem, followed by actions seeking to end the harm. This is a call for a control over the digital arms of repressive regimes, and the need to construct a digital society that even Russia, China, and the United States could agree to.

This post appears courtesy of CFR.org.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.