Tunisia: Understanding Conflict 2012 - Johns Hopkins School of ...
Tunisia: Understanding Conflict 2012 - Johns Hopkins School of ...
Tunisia: Understanding Conflict 2012 - Johns Hopkins School of ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
The Implements <strong>of</strong> Repression<br />
There are two key issues to understanding the problem <strong>of</strong> internal security forces prior to<br />
the revolution; the first has to do with the repressive methods <strong>of</strong> the political police,<br />
especially in terms <strong>of</strong> electronic surveillance, and the second concerns the behavior <strong>of</strong> the<br />
administrative police.<br />
As the enforcers <strong>of</strong> Ben Ali’s doctrine <strong>of</strong> political conformity, the political police<br />
were essential to the perpetuation <strong>of</strong> a rigid system, unresponsive to the needs <strong>of</strong> its<br />
people. The methods <strong>of</strong> the political police were like those <strong>of</strong> the mafia, but imbued with<br />
the resources and authority <strong>of</strong> a nation—surveillance, kidnapping, intimidation,<br />
blackmail, even torture and most likely murder, the probable fate <strong>of</strong> the many political<br />
prisoners who “disappeared” over the years. Islamists, in particular, were subjected to<br />
various forms <strong>of</strong> torture, but adherents to other forms <strong>of</strong> political opposition deemed<br />
“dissident” were also targeted. The result was an atmosphere <strong>of</strong> fear and mistrust among<br />
the populace—fear <strong>of</strong> stepping out <strong>of</strong> line, and mistrust <strong>of</strong> the government and especially<br />
the security forces. Due to the clandestine nature <strong>of</strong> the activities and the prolonged<br />
period <strong>of</strong> media and academic censorship in the country, it is difficult to cite direct<br />
evidence <strong>of</strong> these activities, which are catalogued primarily in the accounts <strong>of</strong> its victims<br />
and their relatives, some <strong>of</strong> whom we met on our visit to <strong>Tunisia</strong>.<br />
The surveillance operations <strong>of</strong> the regime merit further consideration beyond the<br />
scope <strong>of</strong> this chapter, however, they are worth summarizing. They have significant<br />
implications for oversight <strong>of</strong> the Internet and social media, which were—at least in<br />
international perceptions—the defining implements <strong>of</strong> the revolution. Even prior to the<br />
outbreak <strong>of</strong> the popular revolts, Internet surveillance was a regular tactic employed by the<br />
regime to target and monitor politically active citizens who were critical <strong>of</strong> the regime<br />
(Goldstein 2011). The precise affiliation <strong>of</strong> those involved in the monitoring is not<br />
publicly known and it is unlikely to be soon given the lack <strong>of</strong> existing documentation, but<br />
most sources point to the political police and the Ministry <strong>of</strong> the Interior, to which the<br />
suspect Internet traffic would be diverted. Some refer to the perpetrators as an entirely<br />
separate entity known as the “cyber police,” but still most likely under the purview <strong>of</strong> the<br />
political police and certainly the regime. The actual implementation <strong>of</strong> the monitoring is<br />
155