SlideShare a Scribd company logo
Cybertarianism:
China and the future
  of the Internet
  a talk to the World Press Freedom
   Committee by Rebecca MacKinnon
          Open Society Fellow
   Co-founder, Global Voices Online
         (globalvoicesonline.org)
The Berlin “twitter” wall
The “Great Firewall” in action
Authoritarianism
  has evolved.
Chinaʼs cultural loss of control: “Back dorm boys”




            http://www.youtube.com/watch?v=J2HOD-nrOY8
Chinaʼs cultural loss of control: “Back dorm boys”




            http://www.youtube.com/watch?v=J2HOD-nrOY8
Cyber-vigilantism
“Human flesh search engines”
Internet heroine Deng Yujiao
Guangdong Provincial Govt.
forum with “netizens” - Oct. 2009
Prime Minister Wen Jiabaoʼs
2-hour live chat with “netizens”
Glasnost?
Glasnost?   Not so fast...
Glasnost?                            Not so fast...




    Wang Xiaofeng:
  people are getting too
  emotional .. “...without a
  proper [political] structure all
 Premier Wen can do is interact
  with people on an emotional
            level...”
Glasnost?                            Not so fast...




    Wang Xiaofeng:                   “Due to certain problems Wang Xiaofengʼs blog is
  people are getting too                   closed temporarily (for a few days)”
  emotional .. “...without a
  proper [political] structure all
 Premier Wen can do is interact
  with people on an emotional
            level...”
Imprisoned
    Online political organizers
  Liu Xiaobo


                      Huang Qi




Tan Zuoren       Zeng Jinyan & Hu Jia
Censorship by Chinese blog-hosting companies



                          Tianya blog service:
                            Blog post about
                         “Tiananmen Mothers”
CENSORED




Your post “Tiananmen mothers organization publishes a
 website” has been successfully submitted! Because it
contains sensitive words, please wait for the community
 editors to approve it. Please donʼt re-post. Thank you.
Website “self discipline” awards
“Fifty Cent party”
paid & volunteer web commentators
Cyber-nationalism
Riot in Wengʼan county, Guizhou province, Julyʼ08
                          Summer 2008 marked a shift in
                             official media strategy: let
                           official news agencies cover
                          bad breaking stories to get the
                          official version out quickly, then
                             censor unofficial versions.
Networked authoritarianism:
    “cyber-tarianism”


                  President Hu Jintao (June 2008):
                      “We pay great attention to
                  suggestions and advice from our
                      netizens. ...The web is an
                     important channel for us to
                   understand the concerns of the
                  public and assemble the wisdom
                            of the public.”
Networked authoritarianism:
         “cyber-tarianism”


                                                         President Hu Jintao (June 2008):
                                                             “We pay great attention to
                                                         suggestions and advice from our
                                                             netizens. ...The web is an
                                                            important channel for us to
                                                          understand the concerns of the
                                                         public and assemble the wisdom
                                                                   of the public.”




• “Authoritarian deliberation” (Yongnian Zheng)
    Technological Empowerment: The Internet, State, and Society in China
           http://video.sina.com.cn/news/c/v/2008-06-20/105617742.shtml
Internet & telecommunications: key to
    Chinaʼs global competitiveness
Chinaʼs “Green Dam” filtering
software - ostensibly for child protection
...and in the UK...
            "All computers should
            be provided with net
            filtering software loaded
            - and the default
            position for such filters
            should be on."
            --Miranda Suit, co-
            founder, Mediamarch

As quoted in The Register, 11 June 2009: http://www.theregister.co.uk/2009/06/11/censorship_middle_way/print.html
Photo source: http://www.christianchoice.cpaparty.org.uk/?page=map&id=10
Security vs. Liberty




http://en.wikipedia.org/wiki/File:Libra2.jpg
We are building a global layer
between citizens and government

           Government




             Citizen
We are building a global layer
between citizens and government

           Government




            Web & IT
            services




             Citizen
We are building a global layer
between citizens and government

           Government




            Web & IT
            services




             Citizen
We are building a global layer
between citizens and government

           Government




            Web & IT
            services




             Citizen
Global “Internet Governance” Bodies


• Law enforcement
• Child protection
• Intellectual property

• Free expression?




     http://www.flickr.com/photos/seiitiarata/4124482654/in/set-72157622728072417
IGF 2009: Open Net Initiativeʼs
  censorship poster censored




      http://twitpic.com/pmaku
Suzanne Mubarak presents
       “cyber peace initiative”
                                                                       "Preparing Young
                                                                       Generations in the
                                                                       Digital Age: A Shared
                                                                       Responsibility."

                                                                       MOU with Family
                                                                       Online Safety Institute
                                                                       (FOSI):
                                                                       “demonstrates the huge
                                                                       strides the Egyptian
                                                                       Government has made in
                                                                       creating a safer, better
                                                                       Internet for its citizens” -
                                                                       David Miles, FOSI

Photo: http://www.flickr.com/photos/seiitiarata/4114084863/in/pool-1062424@N22
MOU press release: http://smwipm.cyberpeaceinitiative.org/downloads/0000/0309/Press_release_Fosi_CPI.pdf
Ministry press release: http://www.mcit.gov.eg/PressreleaseDetailes.aspx?id=8kObd0NVYzg=&scroll=Releases
Egyptʼs Internet: safe for young people who
             support Mubarak..
Egyptʼs Internet: safe for young people who
             support Mubarak..
Egyptʼs Internet: safe for young people who
             support Mubarak..
Where are we going?


“Authoritarian   “Democratic
 Countries”       Countries”
Where are we going?


“Authoritarian   “Democratic
 Countries”       Countries”
Where are we going?


“Authoritarian   “Democratic
 Countries”       Countries”
Where are we going?


“Authoritarian   “Democratic
 Countries”       Countries”
Where are we going?
                 ?
“Authoritarian       “Democratic
 Countries”           Countries”
Brandenburg Gate
   Nov. 9, 2009




http://en.wikipedia.org/wiki/File:U2_at_the_Brandenburg_Gate.jpg

More Related Content

What's hot

Digital Divide PPT
Digital Divide PPTDigital Divide PPT
Digital Divide PPT
meganshapedspace
 
Engaging students and communities through innovative technology use
Engaging students and communities through innovative technology useEngaging students and communities through innovative technology use
Engaging students and communities through innovative technology useMinnesota Campus Comapct
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Frocomm Australia
 
Hands off (what) internet some reflections on wcit 2012
Hands off (what) internet some reflections on wcit 2012Hands off (what) internet some reflections on wcit 2012
Hands off (what) internet some reflections on wcit 2012
NGUYEN MINH QUOC
 
ALPSP Web 2 Intro2010
ALPSP Web 2 Intro2010ALPSP Web 2 Intro2010
ALPSP Web 2 Intro2010
David Smith
 
Digital Divide Powerpoint
Digital Divide PowerpointDigital Divide Powerpoint
Digital Divide Powerpointsmuench
 
FILM 260 Flipbook - Technology in Relationships
FILM 260 Flipbook - Technology in Relationships FILM 260 Flipbook - Technology in Relationships
FILM 260 Flipbook - Technology in Relationships
MaddyHyde2017
 
The Blogosphere The New Public Sphere? What Role for the State If Any?
The Blogosphere The New Public Sphere? What Role for the State If Any? The Blogosphere The New Public Sphere? What Role for the State If Any?
The Blogosphere The New Public Sphere? What Role for the State If Any?
Dibussi Tande
 
Clu Leadership Retreat 2 21
Clu Leadership Retreat 2 21Clu Leadership Retreat 2 21
Clu Leadership Retreat 2 21marichal
 
PunProbe x NII 協進會《網路治理 Internet Governance》——吳國維執行長
PunProbe x NII 協進會《網路治理 Internet Governance》——吳國維執行長PunProbe x NII 協進會《網路治理 Internet Governance》——吳國維執行長
PunProbe x NII 協進會《網路治理 Internet Governance》——吳國維執行長
PunNode 科技創業新聞網
 
The digital divide
The digital divideThe digital divide
The digital divide
Elizabeth Medlock
 
Globalisation
GlobalisationGlobalisation
Globalisation
SaranShane
 
LECTURE 6 - Cyberculture
LECTURE 6 - CybercultureLECTURE 6 - Cyberculture
LECTURE 6 - CybercultureKim Flintoff
 
LECTURE 5 - Cyberculture
LECTURE 5 - CybercultureLECTURE 5 - Cyberculture
LECTURE 5 - CybercultureKim Flintoff
 
How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?
John Mancini
 
Corso pisa-4 dh-2017
Corso pisa-4 dh-2017Corso pisa-4 dh-2017
Corso pisa-4 dh-2017
Luca De Biase
 
Information talk slides february2011 1-final
Information talk slides february2011 1-finalInformation talk slides february2011 1-final
Information talk slides february2011 1-finalKaisa Schreck
 
Technology And Civic Engagement
Technology And Civic EngagementTechnology And Civic Engagement
Technology And Civic Engagement
Minnesota Campus Comapct
 
The New Digital Divide
The New Digital DivideThe New Digital Divide
The New Digital Divide
newdigitaldivide
 
New Digital Divide Presentation
New Digital Divide PresentationNew Digital Divide Presentation
New Digital Divide Presentationnewdigitaldivide
 

What's hot (20)

Digital Divide PPT
Digital Divide PPTDigital Divide PPT
Digital Divide PPT
 
Engaging students and communities through innovative technology use
Engaging students and communities through innovative technology useEngaging students and communities through innovative technology use
Engaging students and communities through innovative technology use
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
 
Hands off (what) internet some reflections on wcit 2012
Hands off (what) internet some reflections on wcit 2012Hands off (what) internet some reflections on wcit 2012
Hands off (what) internet some reflections on wcit 2012
 
ALPSP Web 2 Intro2010
ALPSP Web 2 Intro2010ALPSP Web 2 Intro2010
ALPSP Web 2 Intro2010
 
Digital Divide Powerpoint
Digital Divide PowerpointDigital Divide Powerpoint
Digital Divide Powerpoint
 
FILM 260 Flipbook - Technology in Relationships
FILM 260 Flipbook - Technology in Relationships FILM 260 Flipbook - Technology in Relationships
FILM 260 Flipbook - Technology in Relationships
 
The Blogosphere The New Public Sphere? What Role for the State If Any?
The Blogosphere The New Public Sphere? What Role for the State If Any? The Blogosphere The New Public Sphere? What Role for the State If Any?
The Blogosphere The New Public Sphere? What Role for the State If Any?
 
Clu Leadership Retreat 2 21
Clu Leadership Retreat 2 21Clu Leadership Retreat 2 21
Clu Leadership Retreat 2 21
 
PunProbe x NII 協進會《網路治理 Internet Governance》——吳國維執行長
PunProbe x NII 協進會《網路治理 Internet Governance》——吳國維執行長PunProbe x NII 協進會《網路治理 Internet Governance》——吳國維執行長
PunProbe x NII 協進會《網路治理 Internet Governance》——吳國維執行長
 
The digital divide
The digital divideThe digital divide
The digital divide
 
Globalisation
GlobalisationGlobalisation
Globalisation
 
LECTURE 6 - Cyberculture
LECTURE 6 - CybercultureLECTURE 6 - Cyberculture
LECTURE 6 - Cyberculture
 
LECTURE 5 - Cyberculture
LECTURE 5 - CybercultureLECTURE 5 - Cyberculture
LECTURE 5 - Cyberculture
 
How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?
 
Corso pisa-4 dh-2017
Corso pisa-4 dh-2017Corso pisa-4 dh-2017
Corso pisa-4 dh-2017
 
Information talk slides february2011 1-final
Information talk slides february2011 1-finalInformation talk slides february2011 1-final
Information talk slides february2011 1-final
 
Technology And Civic Engagement
Technology And Civic EngagementTechnology And Civic Engagement
Technology And Civic Engagement
 
The New Digital Divide
The New Digital DivideThe New Digital Divide
The New Digital Divide
 
New Digital Divide Presentation
New Digital Divide PresentationNew Digital Divide Presentation
New Digital Divide Presentation
 

Viewers also liked

China's Censorship 2.0 (Green Dam update)
China's Censorship 2.0 (Green Dam update)China's Censorship 2.0 (Green Dam update)
China's Censorship 2.0 (Green Dam update)
rmackinnon
 
Internet & Activism: 20 Years After Tiananmen
Internet & Activism: 20 Years After TiananmenInternet & Activism: 20 Years After Tiananmen
Internet & Activism: 20 Years After Tiananmen
rmackinnon
 
OSi Forum - supplementary videos
OSi Forum - supplementary videosOSi Forum - supplementary videos
OSi Forum - supplementary videos
rmackinnon
 
POL 252 Authoritarian Regimes
POL 252 Authoritarian Regimes POL 252 Authoritarian Regimes
POL 252 Authoritarian Regimes
atrantham
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017
LinkedIn
 

Viewers also liked (7)

China's Censorship 2.0 (Green Dam update)
China's Censorship 2.0 (Green Dam update)China's Censorship 2.0 (Green Dam update)
China's Censorship 2.0 (Green Dam update)
 
Internet & Activism: 20 Years After Tiananmen
Internet & Activism: 20 Years After TiananmenInternet & Activism: 20 Years After Tiananmen
Internet & Activism: 20 Years After Tiananmen
 
OSi Forum - supplementary videos
OSi Forum - supplementary videosOSi Forum - supplementary videos
OSi Forum - supplementary videos
 
POL 252 Authoritarian Regimes
POL 252 Authoritarian Regimes POL 252 Authoritarian Regimes
POL 252 Authoritarian Regimes
 
U1.lp4.authoritarian governments
U1.lp4.authoritarian governmentsU1.lp4.authoritarian governments
U1.lp4.authoritarian governments
 
Authoritarianism
AuthoritarianismAuthoritarianism
Authoritarianism
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017
 

Similar to Can authoritarianism survive the Internet? Yes it can...

georgetown talk evgeny morozov
georgetown talk evgeny morozovgeorgetown talk evgeny morozov
georgetown talk evgeny morozov
evgeny.morozov
 
Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...
Philip Sheldrake
 
Civic tech the future of civic engagement and technology innovation
Civic tech  the future of civic engagement and technology innovationCivic tech  the future of civic engagement and technology innovation
Civic tech the future of civic engagement and technology innovation
Alberto Gomez Isassi
 
Ushahidi: Made in Africa
Ushahidi: Made in AfricaUshahidi: Made in Africa
Ushahidi: Made in Africa
Keisha Taylor
 
e-G8 Summary
e-G8 Summarye-G8 Summary
e-G8 Summary
Simeon Oriko
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
Jeffrey Hart
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
Kunihiro Maeda
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
Dibussi Tande
 
B4111219.pdf
B4111219.pdfB4111219.pdf
Importance of web 2
Importance of web 2Importance of web 2
Importance of web 2sparkly
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Charles Mok
 
Should the government monitor their people's activities online?
Should the government monitor their people's activities online?Should the government monitor their people's activities online?
Should the government monitor their people's activities online?
DannyTio
 
Online Spiritual Civilization (1)
Online Spiritual Civilization (1)Online Spiritual Civilization (1)
Online Spiritual Civilization (1)
ashiyan
 
Annenberg-Oxford Summer Institute - Min Jiang - Authoritarian Deliberation On...
Annenberg-Oxford Summer Institute - Min Jiang - Authoritarian Deliberation On...Annenberg-Oxford Summer Institute - Min Jiang - Authoritarian Deliberation On...
Annenberg-Oxford Summer Institute - Min Jiang - Authoritarian Deliberation On...
Min Jiang
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its Discontents
Msifry
 
Extending the Digital Self
Extending the Digital SelfExtending the Digital Self
Extending the Digital Self
Peter Brantley
 
ICTs as infrastructure- Explorations through a gendered prism - Anita Gurumurthy
ICTs as infrastructure- Explorations through a gendered prism - Anita GurumurthyICTs as infrastructure- Explorations through a gendered prism - Anita Gurumurthy
ICTs as infrastructure- Explorations through a gendered prism - Anita Gurumurthy
itfc-resources
 
E engagement tools for civic engagement
E engagement tools for civic engagement E engagement tools for civic engagement
E engagement tools for civic engagement
Ohio Campus Compact
 
Swissgov presentation 23rd September 2010
Swissgov presentation 23rd September 2010Swissgov presentation 23rd September 2010
Swissgov presentation 23rd September 2010osimod
 
The usage of internet by youngsters of gujrat city (pakistan)
The usage of internet by youngsters of gujrat city (pakistan)The usage of internet by youngsters of gujrat city (pakistan)
The usage of internet by youngsters of gujrat city (pakistan)
Alexander Decker
 

Similar to Can authoritarianism survive the Internet? Yes it can... (20)

georgetown talk evgeny morozov
georgetown talk evgeny morozovgeorgetown talk evgeny morozov
georgetown talk evgeny morozov
 
Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...
 
Civic tech the future of civic engagement and technology innovation
Civic tech  the future of civic engagement and technology innovationCivic tech  the future of civic engagement and technology innovation
Civic tech the future of civic engagement and technology innovation
 
Ushahidi: Made in Africa
Ushahidi: Made in AfricaUshahidi: Made in Africa
Ushahidi: Made in Africa
 
e-G8 Summary
e-G8 Summarye-G8 Summary
e-G8 Summary
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
B4111219.pdf
B4111219.pdfB4111219.pdf
B4111219.pdf
 
Importance of web 2
Importance of web 2Importance of web 2
Importance of web 2
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Should the government monitor their people's activities online?
Should the government monitor their people's activities online?Should the government monitor their people's activities online?
Should the government monitor their people's activities online?
 
Online Spiritual Civilization (1)
Online Spiritual Civilization (1)Online Spiritual Civilization (1)
Online Spiritual Civilization (1)
 
Annenberg-Oxford Summer Institute - Min Jiang - Authoritarian Deliberation On...
Annenberg-Oxford Summer Institute - Min Jiang - Authoritarian Deliberation On...Annenberg-Oxford Summer Institute - Min Jiang - Authoritarian Deliberation On...
Annenberg-Oxford Summer Institute - Min Jiang - Authoritarian Deliberation On...
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its Discontents
 
Extending the Digital Self
Extending the Digital SelfExtending the Digital Self
Extending the Digital Self
 
ICTs as infrastructure- Explorations through a gendered prism - Anita Gurumurthy
ICTs as infrastructure- Explorations through a gendered prism - Anita GurumurthyICTs as infrastructure- Explorations through a gendered prism - Anita Gurumurthy
ICTs as infrastructure- Explorations through a gendered prism - Anita Gurumurthy
 
E engagement tools for civic engagement
E engagement tools for civic engagement E engagement tools for civic engagement
E engagement tools for civic engagement
 
Swissgov presentation 23rd September 2010
Swissgov presentation 23rd September 2010Swissgov presentation 23rd September 2010
Swissgov presentation 23rd September 2010
 
The usage of internet by youngsters of gujrat city (pakistan)
The usage of internet by youngsters of gujrat city (pakistan)The usage of internet by youngsters of gujrat city (pakistan)
The usage of internet by youngsters of gujrat city (pakistan)
 

More from rmackinnon

国际互联网治理 - 我们都是国际网民!
国际互联网治理 -我们都是国际网民!国际互联网治理 -我们都是国际网民!
国际互联网治理 - 我们都是国际网民!
rmackinnon
 
Document 1: Green Dam Technical Requirements
Document 1: Green Dam Technical RequirementsDocument 1: Green Dam Technical Requirements
Document 1: Green Dam Technical Requirements
rmackinnon
 
Lecture @ Fudan J-School
Lecture @ Fudan J-SchoolLecture @ Fudan J-School
Lecture @ Fudan J-School
rmackinnon
 
The Tao of the Web: China and the future of the Internet
The Tao of the Web: China and the future of the InternetThe Tao of the Web: China and the future of the Internet
The Tao of the Web: China and the future of the Internet
rmackinnon
 
Chinese social media and political discourse
Chinese social media and political discourseChinese social media and political discourse
Chinese social media and political discourse
rmackinnon
 
Cyber-ocracy vs. Cyber-tarianism: The Chinese Internet
Cyber-ocracy vs. Cyber-tarianism: The Chinese InternetCyber-ocracy vs. Cyber-tarianism: The Chinese Internet
Cyber-ocracy vs. Cyber-tarianism: The Chinese Internet
rmackinnon
 
Censorship by Chinese Blog-hosting Companies
Censorship by Chinese Blog-hosting CompaniesCensorship by Chinese Blog-hosting Companies
Censorship by Chinese Blog-hosting Companies
rmackinnon
 
iSummit keynote: Free Culture & Free Speech
iSummit keynote: Free Culture & Free SpeechiSummit keynote: Free Culture & Free Speech
iSummit keynote: Free Culture & Free Speechrmackinnon
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
rmackinnon
 
China the Internet and Corporate Responsibility
China the Internet and Corporate ResponsibilityChina the Internet and Corporate Responsibility
China the Internet and Corporate Responsibilityrmackinnon
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
rmackinnon
 
Journalism 2.0: The future of news
Journalism 2.0: The future of newsJournalism 2.0: The future of news
Journalism 2.0: The future of newsrmackinnon
 
Cc Hku
Cc HkuCc Hku
Cc Hku
rmackinnon
 
Global Voices May9
Global Voices May9Global Voices May9
Global Voices May9
rmackinnon
 
Web2hku
Web2hkuWeb2hku
Web2hku
rmackinnon
 

More from rmackinnon (15)

国际互联网治理 - 我们都是国际网民!
国际互联网治理 -我们都是国际网民!国际互联网治理 -我们都是国际网民!
国际互联网治理 - 我们都是国际网民!
 
Document 1: Green Dam Technical Requirements
Document 1: Green Dam Technical RequirementsDocument 1: Green Dam Technical Requirements
Document 1: Green Dam Technical Requirements
 
Lecture @ Fudan J-School
Lecture @ Fudan J-SchoolLecture @ Fudan J-School
Lecture @ Fudan J-School
 
The Tao of the Web: China and the future of the Internet
The Tao of the Web: China and the future of the InternetThe Tao of the Web: China and the future of the Internet
The Tao of the Web: China and the future of the Internet
 
Chinese social media and political discourse
Chinese social media and political discourseChinese social media and political discourse
Chinese social media and political discourse
 
Cyber-ocracy vs. Cyber-tarianism: The Chinese Internet
Cyber-ocracy vs. Cyber-tarianism: The Chinese InternetCyber-ocracy vs. Cyber-tarianism: The Chinese Internet
Cyber-ocracy vs. Cyber-tarianism: The Chinese Internet
 
Censorship by Chinese Blog-hosting Companies
Censorship by Chinese Blog-hosting CompaniesCensorship by Chinese Blog-hosting Companies
Censorship by Chinese Blog-hosting Companies
 
iSummit keynote: Free Culture & Free Speech
iSummit keynote: Free Culture & Free SpeechiSummit keynote: Free Culture & Free Speech
iSummit keynote: Free Culture & Free Speech
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
 
China the Internet and Corporate Responsibility
China the Internet and Corporate ResponsibilityChina the Internet and Corporate Responsibility
China the Internet and Corporate Responsibility
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
 
Journalism 2.0: The future of news
Journalism 2.0: The future of newsJournalism 2.0: The future of news
Journalism 2.0: The future of news
 
Cc Hku
Cc HkuCc Hku
Cc Hku
 
Global Voices May9
Global Voices May9Global Voices May9
Global Voices May9
 
Web2hku
Web2hkuWeb2hku
Web2hku
 

Recently uploaded

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Can authoritarianism survive the Internet? Yes it can...

  • 1. Cybertarianism: China and the future of the Internet a talk to the World Press Freedom Committee by Rebecca MacKinnon Open Society Fellow Co-founder, Global Voices Online (globalvoicesonline.org)
  • 4.
  • 6. Chinaʼs cultural loss of control: “Back dorm boys” http://www.youtube.com/watch?v=J2HOD-nrOY8
  • 7. Chinaʼs cultural loss of control: “Back dorm boys” http://www.youtube.com/watch?v=J2HOD-nrOY8
  • 10. Guangdong Provincial Govt. forum with “netizens” - Oct. 2009
  • 11. Prime Minister Wen Jiabaoʼs 2-hour live chat with “netizens”
  • 13. Glasnost? Not so fast...
  • 14. Glasnost? Not so fast... Wang Xiaofeng: people are getting too emotional .. “...without a proper [political] structure all Premier Wen can do is interact with people on an emotional level...”
  • 15. Glasnost? Not so fast... Wang Xiaofeng: “Due to certain problems Wang Xiaofengʼs blog is people are getting too closed temporarily (for a few days)” emotional .. “...without a proper [political] structure all Premier Wen can do is interact with people on an emotional level...”
  • 16. Imprisoned Online political organizers Liu Xiaobo Huang Qi Tan Zuoren Zeng Jinyan & Hu Jia
  • 17. Censorship by Chinese blog-hosting companies Tianya blog service: Blog post about “Tiananmen Mothers”
  • 18. CENSORED Your post “Tiananmen mothers organization publishes a website” has been successfully submitted! Because it contains sensitive words, please wait for the community editors to approve it. Please donʼt re-post. Thank you.
  • 20. “Fifty Cent party” paid & volunteer web commentators
  • 22. Riot in Wengʼan county, Guizhou province, Julyʼ08 Summer 2008 marked a shift in official media strategy: let official news agencies cover bad breaking stories to get the official version out quickly, then censor unofficial versions.
  • 23. Networked authoritarianism: “cyber-tarianism” President Hu Jintao (June 2008): “We pay great attention to suggestions and advice from our netizens. ...The web is an important channel for us to understand the concerns of the public and assemble the wisdom of the public.”
  • 24. Networked authoritarianism: “cyber-tarianism” President Hu Jintao (June 2008): “We pay great attention to suggestions and advice from our netizens. ...The web is an important channel for us to understand the concerns of the public and assemble the wisdom of the public.” • “Authoritarian deliberation” (Yongnian Zheng) Technological Empowerment: The Internet, State, and Society in China http://video.sina.com.cn/news/c/v/2008-06-20/105617742.shtml
  • 25. Internet & telecommunications: key to Chinaʼs global competitiveness
  • 26. Chinaʼs “Green Dam” filtering software - ostensibly for child protection
  • 27. ...and in the UK... "All computers should be provided with net filtering software loaded - and the default position for such filters should be on." --Miranda Suit, co- founder, Mediamarch As quoted in The Register, 11 June 2009: http://www.theregister.co.uk/2009/06/11/censorship_middle_way/print.html Photo source: http://www.christianchoice.cpaparty.org.uk/?page=map&id=10
  • 29. We are building a global layer between citizens and government Government Citizen
  • 30. We are building a global layer between citizens and government Government Web & IT services Citizen
  • 31. We are building a global layer between citizens and government Government Web & IT services Citizen
  • 32. We are building a global layer between citizens and government Government Web & IT services Citizen
  • 33. Global “Internet Governance” Bodies • Law enforcement • Child protection • Intellectual property • Free expression? http://www.flickr.com/photos/seiitiarata/4124482654/in/set-72157622728072417
  • 34. IGF 2009: Open Net Initiativeʼs censorship poster censored http://twitpic.com/pmaku
  • 35. Suzanne Mubarak presents “cyber peace initiative” "Preparing Young Generations in the Digital Age: A Shared Responsibility." MOU with Family Online Safety Institute (FOSI): “demonstrates the huge strides the Egyptian Government has made in creating a safer, better Internet for its citizens” - David Miles, FOSI Photo: http://www.flickr.com/photos/seiitiarata/4114084863/in/pool-1062424@N22 MOU press release: http://smwipm.cyberpeaceinitiative.org/downloads/0000/0309/Press_release_Fosi_CPI.pdf Ministry press release: http://www.mcit.gov.eg/PressreleaseDetailes.aspx?id=8kObd0NVYzg=&scroll=Releases
  • 36. Egyptʼs Internet: safe for young people who support Mubarak..
  • 37. Egyptʼs Internet: safe for young people who support Mubarak..
  • 38. Egyptʼs Internet: safe for young people who support Mubarak..
  • 39. Where are we going? “Authoritarian “Democratic Countries” Countries”
  • 40. Where are we going? “Authoritarian “Democratic Countries” Countries”
  • 41. Where are we going? “Authoritarian “Democratic Countries” Countries”
  • 42. Where are we going? “Authoritarian “Democratic Countries” Countries”
  • 43. Where are we going? ? “Authoritarian “Democratic Countries” Countries”
  • 44. Brandenburg Gate Nov. 9, 2009 http://en.wikipedia.org/wiki/File:U2_at_the_Brandenburg_Gate.jpg