10.07.2015 Views

Internet Freedom A Foreign Policy Imperative in the Digital Age

Internet Freedom A Foreign Policy Imperative in the Digital Age

Internet Freedom A Foreign Policy Imperative in the Digital Age

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

80. Lisa Bryant, “<strong>Internet</strong> Powers Tunisian Protests,” Voice of America (17January 2011), http://www.voanews.com/english/news/africa/<strong>Internet</strong>-Powers-Tunisian-Protests-113868589.html.81. Jennifer Preston, “Movement Began with Outrage and a Facebook PageThat Gave It an Outlet,” The New York Times (5 February 2011), http://www.nytimes.com/2011/02/06/world/middleeast/06face.html.82. “Estimated 2 Million People Protest In, Around Tahrir Square In CairoEgypt,” Cnewsworld.com, http://www.cnewsworld.com/world-news/middle-east-world-news/estimated-2-million-people-protest-<strong>in</strong>-_-aroundtahrir-square-<strong>in</strong>-cairo-egypt-mp4/.83. James Glanz, “How Mubarak Shut Down Egypt’s <strong>Internet</strong>,” The <strong>Age</strong>(Australia) (17 February 2011), http://www.<strong>the</strong>age.com.au/world/howmubarak-shut-down-egypts-<strong>in</strong>ternet-20110216-1awjj.html.84. Grant Gross, “Egyptian Activist: <strong>Internet</strong> Shutdown Backfired,” PC World(3 February 2011), http://www.pcworld.com/bus<strong>in</strong>esscenter/article/218630/egyptian_activist_<strong>in</strong>ternet_shutdown_backfired.html.85. See “Data Retention,” Electronic Privacy Information Center, http://epic.org/privacy/<strong>in</strong>tl/data_retention.html.86. “Tor: Sponsors,” http://www.torproject.org/about/sponsors.html.en.87. Experts at <strong>the</strong> Berman Center for <strong>Internet</strong> and Society at HarvardUniversity exam<strong>in</strong>ed virtual private networks (VPNs) <strong>in</strong> a thorough study oncircumvention technology <strong>in</strong> 2010. They expla<strong>in</strong> how <strong>the</strong>se networks operate:“VPN technology has traditionally been used to allow corporate and o<strong>the</strong>r<strong>in</strong>stitutional users to access <strong>in</strong>ternal networks from <strong>the</strong> public network, but<strong>in</strong> <strong>the</strong> past few years <strong>the</strong>re has been tremendous growth <strong>in</strong> <strong>the</strong> availabilityof personal VPN services. Among o<strong>the</strong>r uses, <strong>the</strong>se personal VPN services actas circumvention tools as long as <strong>the</strong> VPN proxy is hosted outside a filter<strong>in</strong>gcountry. VPN services might or might not require <strong>in</strong>stallation of client-sidesoftware (many rely on exist<strong>in</strong>g VPN support <strong>in</strong> W<strong>in</strong>dows or Mac OSX and soneed no extra client software) and allow <strong>the</strong> user to access <strong>the</strong> web directlythrough <strong>the</strong> native browser <strong>in</strong>terface. Because VPN services tunnel all <strong>Internet</strong>traffic, <strong>the</strong>y can be used for email, chat, and any o<strong>the</strong>r <strong>Internet</strong> service <strong>in</strong>addition to web brows<strong>in</strong>g. Almost all of <strong>the</strong>se tools support <strong>the</strong>mselvesthrough fees charged directly to users (charges of $10 to $30 per month arecommon), though a few also offer free services with restricted bandwidth.”Hal Roberts, Ethan Zuckerman, Jillian York, Robert Faris and John Palfrey,“2010 Circumvention Tool Usage Report,” Harvard Berkman Center for <strong>Internet</strong>and Society (October 2010): 4, http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_Circumvention_Tool_Usage_Report.pdf.88 . Andrew Qu<strong>in</strong>n, “U.S. Develops ‘Panic Button’ for Democracy Activists,”Reuters (25 March 2011), http://www.reuters.com/article/2011/03/25/us-rights-usa-technology-idUSTRE72O6DH20110325.89. Maggie Shiels, “On Iran’s Virtual Front L<strong>in</strong>e,” BBC News (6 August 2009),http://news.bbc.co.uk/2/hi/technology/8186761.stm.90. Aleks Krotoski, “MediaGuardian Innovation Awards: Aust<strong>in</strong> Heap v Iran’scensors,” Guardian.co.uk (20 March 2010), http://www.guardian.co.uk/media/2010/mar/29/aust<strong>in</strong>-heap-megas-<strong>in</strong>novator-award.91. William J. Dobson, “Needles <strong>in</strong> a Haystack,” Newsweek (6 August 2010),http://www.newsweek.com/2010/08/06/needles-<strong>in</strong>-a-haystack.html.92. Evgeny Morozov, “The Great <strong>Internet</strong> <strong>Freedom</strong> Fraud,” Slate (16 September2010), http://www.slate.com/id/2267262.93. United States Senate Committee on <strong>Foreign</strong> Relations, Ano<strong>the</strong>r U.S. Deficit– Ch<strong>in</strong>a and America – Public Diplomacy <strong>in</strong> <strong>the</strong> <strong>Age</strong> of <strong>the</strong> <strong>Internet</strong> (15 February2011): 42, http://lugar.senate.gov/issues/foreign/diplomacy/Ch<strong>in</strong>a<strong>Internet</strong>.pdf.94. Desmond Ang, “Falun Gong helps crack Iran’s web filter,” ABCNews (Australia) (2 July 2009), http://www.abc.net.au/news/stories/2009/07/02/2614914.htm.95 . Hal Roberts, Ethan Zuckerman, Jillian York, Robert Faris and John Palfrey,“2010 Circumvention Tool Usage Report,” Berkman Center for <strong>Internet</strong> andSociety, Harvard University (October 2010): 6, http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_Circumvention_Tool_Usage_Report.pdf.96. John Pomfret, “U.S. Risks Ch<strong>in</strong>a’s Ire with Decision to Fund SoftwareMaker Tied to Falun Gong,” The Wash<strong>in</strong>gton Post (12 May 2010), http://www.wash<strong>in</strong>gtonpost.com/wp-dyn/content/article/2010/05/11/AR2010051105154.html.97. Author conversation with U.S. government official (14 April 2011).98. Hillary Rodham Cl<strong>in</strong>ton, “<strong>Internet</strong> Rights and Wrongs: Choices &Challenges <strong>in</strong> a Networked World,” The George Wash<strong>in</strong>gton University,Wash<strong>in</strong>gton (15 February 2011), http://www.state.gov/secretary/rm/2011/02/156619.htm.99. United States Senate Committee on <strong>Foreign</strong> Relations, Ano<strong>the</strong>r U.S. Deficit– Ch<strong>in</strong>a and America – Public Diplomacy <strong>in</strong> <strong>the</strong> <strong>Age</strong> of <strong>the</strong> <strong>Internet</strong> (15 February2011): 4, http://lugar.senate.gov/issues/foreign/diplomacy/Ch<strong>in</strong>a<strong>Internet</strong>.pdf.100. Kathleen Hickey, “DARPA Looks for Stealthier <strong>Internet</strong> Access,” DefenseSystems (24 May 2010), http://defensesystems.com/articles/2010/05/21/darpa-safer-solicitation.aspx?admgarea=DS.101. The State Department has expressed <strong>in</strong>terest <strong>in</strong> fund<strong>in</strong>g some of <strong>the</strong>setechnologies. See U.S. Department of State, Jo<strong>in</strong>t Request for Statements ofInterest: <strong>Internet</strong> <strong>Freedom</strong> Programs (3 January 2011).102. Hillary Rodham Cl<strong>in</strong>ton, “<strong>Internet</strong> Rights and Wrongs: Choices &Challenges <strong>in</strong> a Networked World,” The George Wash<strong>in</strong>gton University,Wash<strong>in</strong>gton (15 February 2011), http://www.state.gov/secretary/rm/2011/02/156619.htm.103. This Tunis Commitment reaffirmed <strong>the</strong> 2003 Geneva Declaration ofPr<strong>in</strong>ciples, which held, “Communication is a fundamental social process, abasic human need and <strong>the</strong> foundation of all social organization. It is central to<strong>the</strong> Information Society. Everyone, everywhere should have <strong>the</strong> opportunity toparticipate and no one should be excluded from <strong>the</strong> benefits <strong>the</strong> InformationSociety offers.” “Tunis Commitment,” World Summit on <strong>the</strong> InformationSociety (18 November 2005), http://www.itu.<strong>in</strong>t/wsis/docs2/tunis/off/7.html.| 45

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!