{"id":1238,"date":"2013-11-15T09:19:37","date_gmt":"2013-11-15T09:19:37","guid":{"rendered":"http:\/\/reframe.sussex.ac.uk\/activistmedia\/?p=1238"},"modified":"2017-01-24T23:01:37","modified_gmt":"2017-01-24T23:01:37","slug":"from-optimism-to-delusion-cyber-technologies-democracy-and-surveillance","status":"publish","type":"post","link":"https:\/\/reframe.sussex.ac.uk\/activistmedia\/2013\/11\/from-optimism-to-delusion-cyber-technologies-democracy-and-surveillance\/","title":{"rendered":"From optimism to delusion: Cyber-technologies, democracy and surveillance"},"content":{"rendered":"<p><!-- \/* Font Definitions *\/ @font-face {font-family:\"\uff2d\uff33 \u660e\u671d\"; mso-font-charset:78; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:1 134676480 16 0 131072 0;} @font-face {font-family:\"\uff2d\uff33 \u30b4\u30b7\u30c3\u30af\"; mso-font-charset:78; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:1 134676480 16 0 131072 0;} @font-face {font-family:\"\uff2d\uff33 \u30b4\u30b7\u30c3\u30af\"; mso-font-charset:78; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:1 134676480 16 0 131072 0;} @font-face {font-family:Calibri; panose-1:2 15 5 2 2 2 4 3 2 4; mso-font-charset:0; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:-520092929 1073786111 9 0 415 0;} @font-face {font-family:Cambria; panose-1:2 4 5 3 5 4 6 3 2 4; mso-font-charset:0; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:-536870145 1073743103 0 0 415 0;} \/* Style Definitions *\/ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-unhide:no; mso-style-qformat:yes; mso-style-parent:\"\"; margin:0cm; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:Cambria; mso-ascii-font-family:Cambria; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:\"\uff2d\uff33 \u660e\u671d\"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Cambria; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:\"Times New Roman\"; mso-bidi-theme-font:minor-bidi;} a:link, span.MsoHyperlink {mso-style-priority:99; color:blue; mso-themecolor:hyperlink; text-decoration:underline; text-underline:single;} a:visited, span.MsoHyperlinkFollowed {mso-style-noshow:yes; mso-style-priority:99; color:purple; mso-themecolor:followedhyperlink; text-decoration:underline; text-underline:single;} .MsoChpDefault {mso-style-type:export-only; mso-default-props:yes; font-family:Cambria; mso-ascii-font-family:Cambria; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:\"\uff2d\uff33 \u660e\u671d\"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Cambria; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:\"Times New Roman\"; mso-bidi-theme-font:minor-bidi;} @page WordSection1 {size:612.0pt 792.0pt; margin:72.0pt 90.0pt 72.0pt 90.0pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.WordSection1 {page:WordSection1;} --><\/p>\n<div style=\"text-align: right\"><i><a href=\"https:\/\/twitter.com\/gerauddv\">G\u00e9raud de Ville<\/a> is a PhD student at the Open University, Department of Engineering &amp; Innovation. His research focuses on the use of information and communication technologies by indigenous communities in the Guiana Shield. In addition, he is a researcher on the EU-funded <a href=\"https:\/\/twitter.com\/Project_Cobra\">@Project_Cobra<\/a> that uses participatory video and photo to disseminate community-owned solutions for the management of natural resources. This week, <\/i><i><i><a href=\"https:\/\/twitter.com\/gerauddv\">G\u00e9raud de Ville<\/a> questions the impact of cyber-technologies on democracy.\u00a0<\/i><\/i><\/div>\n<p class=\"MsoNormal\"><span style=\"font-size: 11pt\">Thanks to the tremendous development of information and communication technologies (ICT) and the growing accessibility of the digital network, activists and citizens have found a new space for political expression: the Internet. We should be enthusiastic about these developments and embrace ICTs where it helps us build a better future. But we should also be wary of its downsides, and not be fooled into false digital promises. <\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 11pt\">From the Arab revolutions to Indigenous-led <a href=\"https:\/\/www.facebook.com\/IdleNoMoreCommunity?fref=ts\">campaigns<\/a><\/span><span style=\"font-size: 11pt\"> and, more recently, the spontaneous social movements that burst in <a href=\"http:\/\/www.huffingtonpost.com\/2013\/06\/09\/turkey-social-media-smartphones-occupy-gezi-protests_n_3411542.html\">Turkey<\/a><\/span><span style=\"font-size: 11pt\"> and <a href=\"http:\/\/dashburst.com\/change-brazil-protests-social-media\/\">Brazil<\/a><\/span><span style=\"font-size: 11pt\">, over the last three years, the Internet seems to have turned into a megaphone for political dissidents and human rights activists. The networked nature of web 2.0 applications, in particular social media, and the explosion of users worldwide provide activists with unprecedented tools to communicate their ideas, mobilise supporters and take action outside established hierarchical power structures. Platforms such as Facebook, Twitter and YouTube have become privileged fields of action for professional campaigners as well as grassroots movements.<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 11pt\">With their built-in feature allowing many-to-many communication, social media have revolutionised the way information is produced and shared: everyone is encouraged to participate, share opinions, pictures and videos on issues that they care about or witness and instantly upload them from their smartphone on the Internet. Institutions and individuals that represent public authority are now under constant citizen scrutiny. They know that any abuse, any mistake can spark online retaliation and take proportions that are hard to control. Many cyberactivists and academics see in digital networks a new source of power that will eventually force the ruling elite around the world to become more transparent, accountable and favour human rights and democracy.\u00a0\u00a0\u00a0\u00a0 <\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 11pt\">Unfortunately, there is no such thing as a technological fix to a complex problem and, the solution itself carries its own load of downsides. Indeed, while digital technologies have participated to the success of social and <a href=\"http:\/\/www.npr.org\/2012\/01\/17\/145326759\/revolution-2-0-social-medias-role-in-removing-mubarak-from-power\">revolutionary movements<\/a><\/span><span style=\"font-size: 11pt\">, they also tremendously enhance the effectiveness of state surveillance. Due to the supervision they exert on the physical infrastructure, governments are tempted to use digital networks to control populations by monitoring communications, blocking access of certain users or even tracking and imprisoning digital dissidents, e.g. in <a href=\"http:\/\/www.sinodaily.com\/reports\/China_activist_jailed_for_10_years_amid_crackdown_999.html\">China<\/a><\/span><span style=\"font-size: 11pt\"> and <a href=\"http:\/\/www.france24.com\/en\/20120228-2012-02-28-2049-wb-en-webnews?page=8\">Iran<\/a><\/span><span style=\"font-size: 11pt\">.<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 11pt\">Recent revelations by the <a href=\"http:\/\/www.theguardian.com\/world\/the-nsa-files\">Guardian<\/a> on the surveillance system set up by the US National Security Agency (NSA) and its British counterpart: the Government Communications Headquarters (GCHQ) have shown that this is not an exclusive feature of authoritarian or non-democratic regimes. The Western surveillance system uses every single means at hand, from tapping online communications and phone calls, to extorting user data from private companies such as Google, Apple and Microsoft, and to archiving billions of bits of personal information into highly secure data centres, all in the name of security.<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 11pt\">Let\u2019s be clear on one thing: it is still preferable to be a political dissident in the US than it is to be in a country like China. But the level of surveillance achieved by democratic governments, in clear violation of their own privacy rules and without public debate, as well as the pressure exerted against <a href=\"http:\/\/www.reuters.com\/article\/2013\/08\/19\/us-usa-security-snowden-guardian-idUSBRE97I10E20130819\">whistleblowers and journalists<\/a><\/span><span style=\"font-size: 11pt\"> who stand up against it, is unsettling. Admittedly, they seem closer to the practices of Beijing or Tehran than those of Washington, DC or London. <\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 11pt\">We would be wrong to assume that digital technologies have some kind of built-in determinism that will necessarily result in a more transparent and democratic society. Such assumption is inaccurate and will only lead to greater pitfalls once the bulk reality catches upon us. So, is this the price to pay? Are we condemned to see our hopes in the ability of digital technologies to make the world a better place vanish, only to realise that they are in fact weakening the rule of law and human rights at home?<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 11pt\">Not necessarily. For one, a series of people and organisations &#8211; from <a href=\"http:\/\/www.mozilla.org\/en-US\/\">Mozilla<\/a> to the <a href=\"https:\/\/www.eff.org\/\">Electronic Frontier Foundation<\/a> &#8211; are working to keep the Internet free, open and secure for activists and ordinary citizens. These, in turn, need to start adapting their behaviour and take the necessary measures to limit unwanted access to their personal information, e.g. by using encryption schemes. In addition, we need to involve our representatives in Parliament into a public debate about state\u2019s eavesdropping practices and support the adoption of a regulatory framework that is flexible enough to respond to a fast-evolving sector and strong enough to keep us secure from the abuses of state surveillance. <\/span><\/p>\n<p><i>You can follow <\/i><i><i>G\u00e9raud de Ville<\/i> at <a href=\"https:\/\/twitter.com\/gerauddv\">@gerauddv<\/a> and\u00a0<a href=\"http:\/\/indigenousactivism.tumblr.com\/\" target=\"_blank\">http:\/\/indigenousactivism.tumblr.com\/<\/a><\/i><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>G\u00e9raud de Ville is a PhD student at the Open University, Department of Engineering &amp; Innovation. His research focuses on&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/reframe.sussex.ac.uk\/activistmedia\/2013\/11\/from-optimism-to-delusion-cyber-technologies-democracy-and-surveillance\/\">Read More<\/a><\/div>\n","protected":false},"author":11,"featured_media":1241,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[48],"tags":[109,51,77,108,107],"class_list":["post-1238","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-research","tag-cyberactivism","tag-revolution","tag-social-media","tag-state","tag-surveillance"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/reframe.sussex.ac.uk\/activistmedia\/files\/2013\/11\/7.png","jetpack_shortlink":"https:\/\/wp.me\/p2TCNp-jY","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/reframe.sussex.ac.uk\/activistmedia\/wp-json\/wp\/v2\/posts\/1238","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reframe.sussex.ac.uk\/activistmedia\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reframe.sussex.ac.uk\/activistmedia\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reframe.sussex.ac.uk\/activistmedia\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/reframe.sussex.ac.uk\/activistmedia\/wp-json\/wp\/v2\/comments?post=1238"}],"version-history":[{"count":6,"href":"https:\/\/reframe.sussex.ac.uk\/activistmedia\/wp-json\/wp\/v2\/posts\/1238\/revisions"}],"predecessor-version":[{"id":1639,"href":"https:\/\/reframe.sussex.ac.uk\/activistmedia\/wp-json\/wp\/v2\/posts\/1238\/revisions\/1639"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reframe.sussex.ac.uk\/activistmedia\/wp-json\/wp\/v2\/media\/1241"}],"wp:attachment":[{"href":"https:\/\/reframe.sussex.ac.uk\/activistmedia\/wp-json\/wp\/v2\/media?parent=1238"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reframe.sussex.ac.uk\/activistmedia\/wp-json\/wp\/v2\/categories?post=1238"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reframe.sussex.ac.uk\/activistmedia\/wp-json\/wp\/v2\/tags?post=1238"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}