recommended reading

Internet isn't the agent of regime change some hoped for

For years, technologists have predicted the Internet would provide the masses with free speech that would challenge totalitarian regimes. But so far the Web has been a weak tool in the fight against censorship, technology experts said on Monday.

One of the most commonly cited examples of how citizens have used the Internet to challenge a government occurred after the Iranian presidential elections in June 2009. Despite news accounts of protests being organized through the text-messaging service Twitter, Evgeny Morozov, a fellow at Georgetown University's Institute for the Study of Diplomacy, said he has grown skeptical of the Web's power to foster democracy.

Morozov, a native of Belarus who studies the Internet's effect on authoritarian states and a blogger for Foreign Policy magazine, noted the evolution of social media actually has aided oppressive regimes. The Web has given dictators the ability to mine contents of social networking sites to identify dissidents and to pay bloggers for spreading propaganda. "I wasn't really sure that the good guys were winning," he said.

Morozov spoke at an invitation-only meeting on Monday hosted by Foreign Policy at the magazine's Washington office. More than a dozen government officials, academics, industry executives and journalists attended the get-together to discuss an article by Morozov in the May/June issue of Foreign Policy that refutes the theory the Internet can encourage democracy in repressive regimes.

Attendees at the meeting included officials from the Defense and State departments; Google; Microsoft; the Center for Democracy and Technology, a civil liberties group in Washington; the human rights organization Freedom House; and several journalists.

Retribution against bloggers and other open-minded Internet users in foreign countries has become a growing area of concern for the United States. The State Department this year named one of its strategic priorities, Internet Freedom, the human right to access networked technologies without restraints.

But activists are beginning to understand the shortcomings of networking tools for bringing about changes in regimes. Robert Guerra, Internet freedom project director at Freedom House, said democratic activism spurred by the ease of blogging and other Web 2.0 communications has limits. "Governments have reacted with repression 2.0," he said.

Authoritarian regimes have learned how to block certain computers from accessing the Web, Guerra noted. One of the more effective ways to overcome these obstacles is to educate citizens on how to safely use Web circumvention tools such as proxies that hide citizens' locations, said Guerra and Daniel Baer, State's deputy assistant secretary for the bureau of democracy, human rights and labor.

The Internet is not the first free speech facilitator to fall short of expectations. "I've had the sense that I've been here before," said Price Floyd, principal deputy assistant secretary of public affairs at Defense. Since the Cold War, Radio Free Europe/Radio Liberty, the U.S.-funded broadcaster, has used shortwave frequencies to report news to countries that ban free press. But throughout history, oppressive regimes have countered with espionage and misinformation campaigns to discredit the broadcasts, according to Radio Free Europe.

"The Soviet KGB and Warsaw Pact intelligence services penetrated the stations, jailed sources and even resorted to violence in attempts to intimidate RFE and RL staff," the broadcaster's website noted.

Part of Price's job is to promote a policy issued in February to open Defense networks to social media sites such as Facebook and YouTube, which previously had been off-limits. "In the Defense Department, there was a move to block access to all these things," he said. "But it's now not blocked. Is there anything different?"

Government officials and tech companies can only do so much. Although the Obama administration is helping developing countries such as Cuba and Haiti build telecommunications infrastructures, neither U.S. policies nor IT firms can make anti-censorship a precondition of doing business with the United States, most experts acknowledged.

"If you stamp it in any way as American, you're asking for it to be rejected," said Bob Boorstin, Google's director of public policy.

Dictators always will be able to find a countermeasure, such as the Internet-filtering tools that China uses to exert control over its people, some participants said.

Google recently decided to divert users of its search engine in China to Hong Kong's Google search service, when the company discovered that hackers allegedly from China had attempted to penetrate the Web mail accounts of human rights activists.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.