This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
On The Horizon: The Slingshot Of Information Freedom
When the Chinese government recently fired Zhang Wenkang, its minster of health, for lying to the public in an attempt to cover up the scope of the SARS outbreak, a small but significant milestone in political history and the history of information was passed. Perhaps you're too young to remember a time--and it was not that long ago--when lying and covering up information was an essential part of the job description for most high government positions in China and other Communist countries. One can only imagine Mr. Wenkang's reaction to the news that he was being sacked: You're firing me for what!?
We thought of this episode while looking over a new Carnegie Endowment study by Shanthi Kalathil and Taylor Boas titled Open Networks/Closed Regimes. Kalathil and Boas take on what they call the conventional wisdom, the "blind optimism" that links technological advances, in particular the rise of the Internet, to democratization and the fall of totalitarianism. Through eight case studies--China, Cuba, Singapore, Vietnam, Burma, the United Arab Emirates, Saudi Arabia, and Egypt--the authors attempt to show that the "widespread belief in the popular world that the Internet poses an insurmountable threat to authoritarian rule" is incorrect. They conclude that while "certain types of Internet use do indeed pose political challenges to authoritarian governments," other uses "reinforce authoritarian rule." Several of the authoritarian regimes in their study were "proactively promoting" the development of tools designed to let them control and manipulate Internet use by their citizens, to allow them access only to "an Internet that serves state-defined interests rather than [one] challenging them," as Kalathil and Boas say.
We're all for challenging conventional wisdom, even when it's set up as something of a straw man. But the observation that totalitarian regimes will try to exert control over the information their people receive from, and communicate to, the outside world isn't exactly "Man Bites Dog." While we applaud Kalathil and Boas for examining and cataloging these efforts to subvert the open and decentralized character of the global network and turn it to certain governments' self-serving ends, their study hardly answers the question about whether they will succeed in that effort.
The answer, we think, is no as it relates to the Internet alone, or, at the very least, too soon to tell. Information has always been harder to control than physical, tangible things, and it has gotten a lot harder over the past 20 years. Just ask Mr. Wenkang. He was fired because of the revolution of which the Internet is an important part, because the velocity of information exchange has accelerated dramatically in recent years, and because the Chinese government recognized that it's no longer business as usual when it comes to information.
In June 1989, Ronald Reagan said, "Information is the oxygen of the modern age. It seeps through the walls topped by barbed wire, it wafts across the electrified borders. ... The Goliath of totalitarianism will be brought down by the David of the microchip." He just might have been right.
David Post is a Temple University law professor and senior fellow at the National Center for Technology and Law at the George Mason University School of Law. Reach him at [email protected] Bradford C. Brown is chairman of the National Center for Technology and Law at the George Mason University School of Law. Reach him at [email protected].
To discuss this column with other readers, please visit the Talk Shop.
We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
The State of IT & Cybersecurity Operations 2020Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!