recommended reading

Governments Could Make or Break the Free Internet in the Next 10 Years

Volodymyr Krasyuk/Shutterstock.com

Here are two ways governments could undermine Internet freedom in the coming decade: They could block and filter it more, and they could stir greater mistrust by using it to conduct more intrusive surveillance programs against citizens.

That’s according to a canvassing of more than 1,400 experts conducted by the Pew Research Center, which asked for opinions and predictions about the future of the Internet.

Respondents noted an increasing tendency for governments worldwide to regulate the Internet -- especially among regimes that have faced protests. Egypt, Pakistan and Turkey were presented as countries that had blocked access and controlled information flows when they were under perceived threat, and China’s “great firewall” was offered as an example of Internet censorship.

In addition to authoritarian regimes, “Canada and Australia have threatened to filter all Internet content to get to child porn," said Jeff Jarvis, director of the Tow-Knight Center for Entrepreneurial Journalism at the City University of New York Graduate School of Journalism. "Once one government is given the means and authority to filter communication, information, and content for one reason, then any government can do so for any reason.”

Other respondents, however, were more optimistic, citing regulations and innovation that promote openness.

“There's a lot of work underway now in developing open-source, interoperable and encrypted versions of social media, in response to the increasing authoritarianism and state collaboration of existing walled-garden media,” noted Kevin Carson, a senior fellow at the Center for a Stateless Society.

Tools for sharing on the Internet wouldn’t be of much use, however, if people become unwilling to share information in the first place -- a problem some of the experts saw resulting from revelations about surveillance programs run by the National Security Administration and other governments.

“Privacy issues are the most serious threat to accessing and sharing Internet content in 2014, and there is little reason to expect that to change by 2025, particularly given the cyber terror threats confronting the Internet users and worldwide businesses,” Danah Boyd, a research scientist for Microsoft, said.

Experts noted both NSA surveillance and the recent Target data breach as incidents that might make Internet users wary. Jarvis, for one, found governments most concerning.  

“Government poses the greatest threat to the Net's freedoms,” he said. “I don't know which force—censorship or spying—will lead to greater degradation of Net freedoms. Both come from government."

He said he hopes hackers and independent technologists will stay ahead governments. “I also hope that technologists—programmers, mathematicians, statisticians, et al—will begin robust discussion of the ethics that govern their own power and how they will use it for public good.”

(Image via Volodymyr Krasyuk/Shutterstock.com)

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.