SlideShare une entreprise Scribd logo
1  sur  103
Télécharger pour lire hors ligne
march 2011


internet
 enemies
INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 2




                      world mAp of CyberCensorsHip....................................3

                      introduCtion..................................................................................................4

                      internet enemies...................................................................................11

                      BURMA............................................................................................................................11
                      ChinA...............................................................................................................................15
                      CUBA...............................................................................................................................24
                      iRAn.............................................................................................................................27
                      nORTh KOREA....................................................................................................................32
                      SAUDi ARABiA....................................................................................................................35
                      SyRiA...............................................................................................................................38
                      TURKMEniSTAn.................................................................................................................43
                      UzBEKiSTAn.......................................................................................................................46
                      ViETnAM............................................................................................................................49



                      under surveillAnCe........................................................................ 54

                      AUSTRAliA........................................................................................................................ 54
                      BAhRAin............................................................................................................................56
                      BElARUS............................................................................................................................59
                      EgypT...............................................................................................................................62
                      ERiTREA..........................................................................................................................65
                      FRAnCE..............................................................................................................................67
                      liByA ..................................................................................................................................72
                      MAlAySiA..........................................................................................................................74
                      RUSSiA.............................................................................................................................77
                      SOUTh KOREA....................................................................................................................81
                      SRi lAnKA........................................................................................................................84
                      ThAilAnD........................................................................................................................86
                      TUniSiA..............................................................................................................................89
                      TURKEy............................................................................................................................92
                      UniTED ARAB EMiRATES.................................................................................................96
                      VEnEzUElA......................................................................................................................99
INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 3




 world mAp of CyberCensorsHip
INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 4




tHe new mediA:
between revolution And repression,
net solidArity tAkes on CensorsHip




ArAb springtime: is tHe web                                        Facebook and Twitter served as sound boxes, amplifying
                                                                   the demonstrators’ frustrations and demands. They also
reACHing new HeigHts?                                              made it possible for the rest of the world to follow the
                                                                   events as they unfolded, despite censorship. The role of
The year 2010 firmly established the role of social networks       cell phones also proved crucial. citizen journalists kept fi-
and the Internet as mobilisation and news transmission             le-sharing websites supplied with photos and videos, and
tools. In 2010 alone, 250 million Internet users joined Fa-        fed images to streaming websites.
cebook and by the end of the year, the social network had
600 million members. In September that year, 175 million           The Tunisian authorities had imposed a media blackout on
people were Twitter users – 100 million more than in the           what was going on in Sidi Bouzid. Since the so-called “tra-
previous year.                                                     ditional” media had failed to cover the protest movements
                                                                   that were rocking the country, at least at their beginning
The Western media had praised the Internet and its “libe-          in December, their role as news sources and vectors was
rator” role during the 2009 Iranian revolution. according to       taken over by social networks such as Facebook and Twit-
The New York Times, the demonstrators “shot tweets” back           ter, and news websites like Nawaat.org. Facebook in par-
at bullets. however, Twitter was then used mainly by the           ticular acted as a platform on which Internet users posted
diaspora. “The Net Delusion,” a theory advanced by Evge-           comments, photos and videos. The Bambuser streaming
ny morozov, an Internet expert, casts doubt on the Internet’s      site also had its moment of glory. Everyone was able to
role as a democratisation tool. although the Internet is cer-      track the events as they happened. The online calls for
tainly used by dissidents, it is also used by the authorities to   demonstrations spread to other countries: Egypt, Libya,
relay regime propaganda and enforce a police state.                Yemen, Bahrain, Oman, Syria, Iraq, morocco, and even
                                                                   china and Vietnam, etc.
The Internet remains above all a tool used for the better or
the worse. In the most closed countries, it creates a space
of freedom which would not otherwise exist. Its potential
                                                                   Control 2.0 gAins strengtH
to disseminate news irritates dictators and eludes traditio-
                                                                   CEnSORShip AnD REpRESSiOn inTEnSiFy
nal censorship methods. Some regimes use it – mainly on
Facebook and Twitter – to monitor dissidents and infiltrate
                                                                   authoritarian regimes’ latest strategy is no longer to use
their networks.
                                                                   pure and simple blocking as it is to use, but rather online
                                                                   tampering and propaganda. Naturally countries such as
Nonetheless, the terms “Twitter revolution” and “Fa-
                                                                   china, Saudi arabia and Iran are still practicing strict filte-
cebook revolution” have become watchwords with the
                                                                   ring, which they tend to tighten during periods of unrest,
events that rocked the arab world in late 2010 and early
                                                                   notably with regard to micro-blogging sites and social
2011. The “online” movements were coupled with “offline”
                                                                   networks. meanwhile, their netizens keep on learning new
demonstrations, hastening the fall of dictators. The Tuni-
                                                                   ways to circumvent censorship. china in particular has
sian and Egyptian uprisings turned out to be, first and fo-
                                                                   reinforced its “Electronic Great Wall” and is tackling the
remost, human revolutions facilitated by the Internet and
                                                                   anonymity of Internet and cell phone users. Uzbekistan,
social networks.
INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 5




Syria, Vietnam – to name but a few – have enhanced their           “father of the Iranian blogosphere,” received the most se-
censorship to stifle the echoes of the revolutions agitating       vere prison sentence: 19.5 years.
the arab world.
                                                                   In this “control 2.0” era, several tested methods are used
currently, one out of every three Internet users is unable         simultaneously by the authorities to prevent dissidents
to access a free Internet. Net censorship is becoming              from ruling the web and to maintain better control over the
the norm. around 60 countries are implementing some                regime’s disinformation.
form of Internet censorship, which entails either content
filtering or netizen harassment. Others may well join their
ranks in the months and years to come. For the first time,
                                                                   broAder reCourse to
Bangladesh has blocked access to certain sites because             propAgAndA And mAnipulAtion
of videos deemed offensive to the Prophet. cambodia is
censuring news sites.                                              First, the use of distributed denial-of-service (DDoS) cy-
                                                                   berattacks has become commonplace, as has phishing,
Blogger and netizen arrests have continued and remained            which involves stealing user passwords. One of the epi-
at the same level in 2010 as in 2009. as of this writing, 119      sodes which received the most media coverage is un-
netizens are behind bars, as compared to 120 in 2009. al-          doubtedly the pirating of Google’s website and those of
though 2010 saw the release of several popular bloggers            some 20 other companies in china in late 2009 and early
such as Kareem amer in Egypt a few days after serving his          2010. Vietnam also uses cyberattacks to muzzle dissident
sentence, and adnan hadjizade and Emin milli in azerbai-           opinions. Independent news websites based abroad and
djan, the authorities are finding new ways to hinder blog-         those which discussed bauxite mining were targeted in
gers’ and cyberdissidents’ freedom of action. The number           2010. Burma not only attempted to immobilise several in-
of false releases – such as that of mongol cause activist          dependent online media, but also tried to shift the blame
hada, in china – or forced disappearances, is growing,             for the bandwidth speed slowdown on hackers acting
and so are house arrests. as for self-censorship, which is         against the country’s interests. another weapon used by
hard to quantify, it appears to have gained ground.                dissidents in Iran was the “Green cyber army,” which at-
                                                                                         tacked some government websites.
The world’s biggest prisons for netizens
remain: china (77 netizens), Vietnam
                                                As of tHis writing,                      The “hackivists anonymous” group
                                                                                         paralysed the Tunisian president’s and
(17) and Iran (11). a new wave of arrests       119 netizens Are                         parliament’s website in January 2011
in Vietnam preceded the January 2011
communist Party congress. The chine-
                                                beHind bArs                              as part of its “Operation: Tunisia.”

se regime launched a series of arrests                                                   In 2010, authoritarian regimes sought
in February 2011 following online calls for demonstrations         to control their country’s Internet connection speeds by
triggered by the arab uprisings. The authorities feared that       slowing down bandwidth during elections or periods of
they would spread. For the first time in china, Twitter users      social unrest. connection speed became the barometer of
were arrested for their posts on the social network.               a country’s political and social situation. Iran has become
                                                                   an expert in this technique, and used it just before and
One such prisoner is no other than Liu Xiaobo – the win-           during every demonstration organised by the opposition.
ner of the 2011 Nobel Peace Prize, the only Nobel Peace            Ben ali’s and mubarak’s divested regimes also resorted to
Prize laureate currently in jail. The announcement of this         it. Often such disruptions are accompanied by jamming or
news in December 2010 resulted in an unusually violent             shutting down cell phone networks in the areas concer-
crackdown by the authorities: any reference to this award          ned, such as Tahrir Square in cairo.
on micro-blogging sites is being censored and they are
questioning or placing under house arrest hundreds of              another Iranian strategy which proved successful in Be-
supporters and friends of the human rights activist and            larus during the demonstrations over the re-election of
freedom defender.                                                  President Lukashenko was redirecting users of opposition
                                                                   websites (or those critical of the regime) to pseudo-sites
In Iran, imprisoned netizens were sentenced to death for           with similar, yet more pro-government, content.
the first time. Blogger hossein Derakshan, known as the
INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 6




In addition, every government seeking to control the net           certain regimes sometimes intentionally maintain infras-
has vested itself with a cyberpolice force equal to its am-        tructural problems to keep their populations from having
bitions and which, particularly on social networks, closely        Internet access. The 2011 commissioning of the fibre optic
monitors dissident activities. It has also deployed groups         undersea cable linking cuba to Venezuela, which expan-
of “sponsored” bloggers paid to post online pro-regime             ded bandwidth potential, therefore will eliminate one of the
comments, thereby eclipsing critical opinions. russian             cuban regime’s excuses about access problems.
brigade and “50-cent party” bloggers are experts at this.
Initially, the authorities had used repression to counteract       North Korea, on the other hand, launched its own pages
their opponents’ use of the Internet, but now they are dis-        on the online social networks in 2010, and is said to have
playing their own content.                                         initiated its first connections to the World Wide Web. The
                                                                   latter are apparently very limited, however, and are being
inTERnET DiSRUpTiOnS: A DRASTiC AnD COSTly MEASURE                 run by the regime for propaganda purposes.

Extreme measures which ultimately failed were taken in
Egypt, and then in Libya, to try to put an end to protest
                                                                   tHe new vs. trAditionAl mediA:
movements against the incumbent leaders. In the evening            is symbiosis An option?
of 27 January 2011, Egypt virtually cut off Internet access
for five days, causing its economy a loss of at least USD          There is truly no longer any reason for the long-lasting
90 million, according to the Organisation for European             gap between the new and the traditional media. In the
co-Operation and Development (OEcD), which shows to                last few months, they have proven to be increasingly com-
what extent the Internet is an integral part of the global         plementary. according to BBc Global News Direct Peter
economy and essential to a country’s economy. In Libya,            horrocks, it is imperative for journalists to learn how to
the authorities first severed Internet access on 19 Februa-        use social networks: “It is not an option.” The new media
ry, then maintained strong Internet disruptions after that         have become key tools for journalists. at the same time,
and cut it off again on                                                                            by flooding social networks
3 march. It was not the
first time that Internet
                              CertAin regimes sometimes                                            with news and pictures,
                                                                                                   arab revolutionaries were
access was totally sus-       intentionAlly mAintAin                                               also seeking to ensure that
pended in a country.
This occurred in 2005
                              infrAstruCturAl problems                                             the international media co-
                                                                                                   vered news events in order
in Nepal and in 2007 in       to keep tHeir populAtions from                                       to put pressure on their go-
Burma. however, such
measures stir up strong       HAving internet ACCess.                                              vernments and on the inter-
                                                                                                   national community.
reactions       worldwide
and further exacerbate demonstrators’ resentment. It also          News staff now use Twitter and Facebook to find ideas for
induces the latter to resort to more creative ways to freely       news stories, gather first-hand accounts and visuals, and
distribute information, despite the odds. Netizens have            to disseminate their own articles in order to expand their
either resumed using earlier Internet methods (modem,              readership. The shelf life of an article no longer ends with
fax, etc.) or have adopted the latest generation of techno-        the printing of a newspaper; it now has an extended life
logies (phone-based tweet system set up by Google and              online.
Twitter).
                                                                   according to a study conducted on print and web journalists
Burma learned its lessons from the 2007 Internet suspen-           by the cision research company and George Washington
sion and undertook a broad revamping of its national plat-         University, 56% of the respondents responded that social
form, to make certain that access providers would provide          media were “important or somewhat important” for resear-
distinctly separate services to the population, the govern-        ching and writing the stories they wrote. Blogs were still the
ment and the military, thereby ensuring that the junta will        main source for the respondents (89%). micro-blogging was
be prepared, in the next crisis, to cut off Internet access to     a source for 69% of the web journalists. however, these jour-
its citizens without being directly affected itself.               nalists remain cautious: 84% of them were aware of reliability
                                                                   problems with information gathered from the social media.
INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 7




The instantaneous nature of social networks and streaming          and to remove the names of civilians and local informants
tools permit real-time coverage of critical events such as         from said documents in order not to put them at risk.
natural disasters (earthquake in chili, floods in Pakistan),
demonstrations (in Tunisia, Egypt, etc.), but makes media          The series of close to 400,000 confidential documents be-
professionals’ verification work tougher, yet essential. It is     longing to the U.S. army concerning the war in Iraq which
sometimes hard to separate the true from the false, which          WikiLeaks released helped to expose the magnitude of
is why it is important to form a network of reliable contacts      the crimes which coalition forces and their Iraqi allies had
who can corroborate the “scoops” made by citizen journa-           committed against civilian populations since 2003. repor-
lists or ordinary netizens.                                        ters Without Borders denounced the pressure which U.S.
                                                                   and Iraqi authorities have placed on the website and as-
any witness of a trivial or historical event becomes a             ked these two governments to demonstrate transparency
chance informant. Journalists are no longer the only ones          and to reconsider their document classification methods.
who filter information – their work is also being scrutinised      Strong pressures are also being placed on WikiLeaks’ col-
by their readers.                                                  laborators. Founder Julien assange has been repeatedly
                                                                   threatened. U.S. army Private Bradley manning, suspec-
Numerous unknown factors persist in the relations between          ted of being one of WikiLeaks’ sources, has been held in
the new and traditional media. certain newspapers such             solitary confinement since his arrest in may 2010 and is
as the Washington Post prohibit their journalists from offe-       facing life imprisonment. after being subjected to cyberat-
ring their personal opinion on the Internet, out of fear that      tacks and being dropped by several host sites, WikiLeaks
it might be interpreted as the newspaper’s editorial po-           called upon its worldwide supporters on 5 December
licy. The New York Times and reuters have issued inter-            2010 to create mirror websites. reporters Without Borders
nal guidelines for using social networks. They encourage           decided to host one of them on its website. In Decem-
their journalists to use them, but also make sure they are         ber 2010 a number of media and websites – including Le
aware of the inherent risks involved. reuters specifies that       monde, El Pais and al-Quds al-arabi in morocco – were
no scoops should be posted on social networks because              censored for having relayed the cables. access to the
the former are reserved mainly for press agency clients.           website is notably blocked in china and in Thailand. The
Journalists are free to share their articles online, create an     site is accessible in Pakistan, but some pages containing
online network, invite comments from readers and post              wires about Pakistan are blocked.
live tweets on the events they cover. however, they must
obtain their supervisor’s permission to open a professio-          reporters Without Borders wrote to the U.S. attorney Ge-
nal account and they are required to maintain separate             neral to ask him not to prosecute Julian assange and Wiki-
personal and professional accounts.                                Leaks’ collaborators in view of the fact that the publishing
                                                                   by WikiLeaks and its five associated media of information

wikileAks: inevitAble                                              – even classified – in an effort to inform the public is a ac-
                                                                   tivity promoting the right to information guaranteed by the
trAnspArenCy                                                       First amendment.


This collaboration between the new and traditional media
is exemplified by changes in WikiLeaks’ strategy. Initially
                                                                   internet: tHe “i love you –
focused on the massive release of unedited confiden-               me neitHer” quAndAry of
tial documents, the website gradually developed par-
tnerships with several international media leaders ranging
                                                                   demoCrACies
from The New York Times to Le monde, and The Guardian
                                                                   In a historic speech on January 2010, U.S. Secretary
to al-Jazeera. This strategy allowed it to combine the new
                                                                   of State hillary clinton referred to online freedom of ex-
media’s assets (instantaneousness and a virtually unlimi-
                                                                   pression as the cornerstone of american diplomacy – a
ted publishing capacity) with those of the traditional me-
                                                                   position that she reasserted in February 2011 in an ad-
dia (information checking and contextualisation, thanks to
                                                                   dress in which she reminded her audience that “On the
journalists specialised in the issues covered). more than
                                                                   spectrum of Internet freedom, we place ourselves on the
120 journalists of diverse nationalities worked together to
                                                                   side of openness.” Nonetheless, the principles raised by
decipher the diplomatic cables released by WikiLeaks,
INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 8




hillary clinton conflict with the treatment reserved for Wi-       which may jeopardise the full exercise of journalists’ pro-
kiLeaks. Several days prior to WikiLeaks’ publication of           fessions and the transmission of information.
the documents, the Pentagon had asked the media “not to
facilitate the leak” of classified documents concerning the        Italy, on the other hand, attempted to regulate the posting
war in Iraq, claiming that it would endanger national secu-        of videos online by means of a march 2010 decree. Every
rity. american officials made some very harsh statements           website which regularly disseminates videos must now
about the site’s founder. Judicial action may still be taken       submit a “Statement of activity” to the Italian Telecom-
against the website. according to hillary clinton, “the Wi-        munications authority (aGcOm). This decree’s scope of
kiLeaks incident began with an act of theft” of government         application was ultimately reduced to online television sta-
documents. however she stated that “WikiLeaks does not             tions and no longer applies to traditional websites, blogs,
challenge our commitment to Internet freedom.”                     search engines, or electronic versions of dailies, magazi-
                                                                   nes and online betting.
Security trends tend to affect the web. Blackberry maker
rIm is facing growing pressures from the Gulf States, as           The principle of Net neutrality seems to be increasingly
well as from Indonesia and India, who are trying to gain           at risk. In December 2010 in the United States, the Fe-
access to the content of its secured communications on             deral communications commission (Fcc) adopted va-
the pretext of the fight against terrorism.                        rious measures concerning net neutrality which centred
                                                                                                   around two principles: that
apart from national secu-           nonetHeless, tHe prinCiples                                    Internet service providers
rity and cybersecurity, other                                                                      must ensure transparency
problems are persuading             rAised by HillAry Clinton                                      regarding their Internet ma-
democratic governments to
relativise their commitment
                                    ConfliCt witH tHe treAtment                                    nagement and the prohibi-
                                                                                                   tion of any discrimination in
to a free Internet.                 reserved for wikileAks                                         the manner “legal” contents
                                                                                                   are transmitted. however,
The Internet will be discussed during the next G20 mee-            such measures could leave the door open for the filtering
ting, not from the vantage point of freedom of expression,         of illegal websites and thereby signal the end of the unli-
but of protecting intellectual property.                           mited Internet. Unlike President Obama, the republican
                                                                   opposition opposes these measures and has challenged
In the name of copyright protection, the French govern-            the legitimacy of the commission’s authority to rule on this
ment adopted a law which makes it possible, after issuing          issue. In France, on the pretext of potential traffic satura-
warnings, to suspend the Internet connection of an indi-           tion, the minister of Industry, Energy and the Digital Eco-
vidual suspected of illegally downloading copyrighted fi-          nomy is calling for a regulation of Internet traffic and for
les online. This “graduated response” scheme, known as             abandoning the Net’s absolute neutrality principle.
the “three strikes” and introduced by the hadopi law, has
inspired other countries, notably the United Kingdom with
its Digital Economy act. Spain’s Sinde Law also provides
                                                                   CorporAte soCiAl responsibility:
measures for website blocking subject to a court order.            more timely tHAn ever
In addition, the French Parliament passed an internal se-          Google has kept its promises and has stopped censuring
curity law (“Loppsi 2”) which provides for an administrative       its search engine’s results in china. Google.cn users are
filtering of the web – a dangerous principle – in the name         now being redirected to their hong Kong-based website.
of the fight against child pornography. The australian fil-        Despite the boldness of this move and the cold reception
tering system, which has already been tested, has been             it received from chinese authorities, the company mana-
put on hold, even though the government has not totally            ged to get its chinese operating licence renewed in the
abandoned this project.                                            summer of 2010.

The highly controversial hungarian media law could have            microsoft and Yahoo! continue to practice self-censorship
some bad consequences on online media and bloggers                 in china. however, microsoft, after realising that the fight
because it can impose penalties and contains provisions            to prevent the pirating of its software in russia was a pre-
INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 9




text used by the authorities to justify the seizure of compu-      arabia, Burma, china, North Korea, cuba, Iran, Uzbekistan,
ters belonging to the media and to NGOs, took measures             Syria, Turkmenistan and Vietnam. They often compound In-
to supply the latter with pro bono licences. These three           ternet repression with strict filtering, access problems, cy-
U.S. companies have signed the code of conduct of the              berdissident surveillance and online propaganda.
Global Network Initiative, a coalition of NGOs, companies
and investment funds seeking to promote good practices             Tunisia and Egypt have been dropped from the “Enemies
in countries which are censoring the Net.                          of the Internet” list and added to the “countries under
                                                                   Surveillance” list The lifting of censorship in Tunisia and
For the first time in Egypt, companies such as Facebook,           the collapse of mubarak’s regime in Egypt are encoura-
Twitter and Google have set aside their reticence and              ging signs for the future of online freedom of expression in
openly sided with protecting online freedom of expres-             these countries, a right which ranked high in demonstra-
sion. Facebook believes that “no one should be denied              tors’ demands. Nonetheless, vigilance will be needed until
access to the Internet.” Google and Twitter set up a sys-          the censorship and surveillance apparatus has been dis-
tem to enable telephone tweeting in order to bypass net            mantled. The authorities must demonstrate transparency
blocking in the country. YouTube made its political news           in this regard.
channel citizenTube available to Egyptians who want to
circulate their videos. Users do not run much risk on the          among the countries still “under surveillance”: australia
site and should benefit in terms of image capabilities.            is still considering implementing a dangerous mandatory
                                                                   filtering system. Bahrain is vacillating between intensifying
In the last few months, cell phones – particularly during          filtering and releasing bloggers. In Belarus, elections have
the arab Springtime – cell phone communications have               ushered in a new era of repression against the online me-
been the focus of harsher controls. In countries such as           dia. South Korea is tightening censorship of North Korean
Libya and Egypt, telephone carriers have been forced to            propaganda and maintaining a repressive legislative arse-
occasionally suspend their services in some locations and          nal. In the United arab Emirates, filtering and surveillance
to transmit SmS to the population. In early February 2011,         are getting worse. In Eritrea, the police state is keeping
Vodafone, mobinil and Etisalat, pressured by the army,             its citizens away from the web and monitoring netizens. In
sent their Egyptian customers an SmS informing them of             malaysia, bloggers – a more credible source of news than
a demonstration in support of hosni mubarak being held             the traditional media – are under constant pressure. In
that day. The headquarters of Western foreign companies            russia, the government is trying to shape the increasingly
apparently protested … after the fact.                             influential russian net to suit its own purposes. Sri Lankan
                                                                   online journalists and media are still victims of violence. In
These issues do not just concern companies in the new              Thailand, the spring 2010 crisis has had negative conse-
technologies and telecommunications sectors. PayPal’s              quences for online freedom of speech. and in Turkey,
online payment service, based in the United States, de-            thousands of websites are still blocked and legal proce-
cided to suspend WikiLeaks’ account, claiming that its             dures against online journalists continue unabated.
terms of use prohibit using its service “to encourage,
promote, or facilitate any illegal activity.“ Visa and master-     This year, several countries were added to the countries
card made the same decision and suspended payments                 under Surveillance list, including France, which enacted a
directed to the site until they have the results of internal       law providing for the administrative filtering of the Net and
investigations.                                                    the “graduated response” procedure as part of the autho-
                                                                   rities’ idea of a “civilised” Internet. The year 2010 was diffi-
                                                                   cult for several online media and their journalists who had

tHe enemies of tHe internet                                        to endure office break-ins, court summons, and pressure
                                                                   to identify their sources.
2011 list: new Additions And
                                                                   Venezuela was also placed “under surveillance.” Whi-
repeAt offenders                                                   le there is still free access to the Internet in the country
                                                                   despite a climate of increasing tension between the lea-
The most net-repressive countries which deserve the label          dership and the dissident media, censorship tools are
“Enemies of the Internet” are, once again this year, Saudi         now in place in the form of an Internet gag law and the
INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 10




growing use of self-censorship. Discussion forums are in
the authorities’ line of fire.

colonel Kadhafi’s Libya also joins this list. amidst the cha-
os, the regime has been trying to implement a nation-wide
information blackout in an attempt to silence any news
about the uprising and the way it was quashed.

This is by no means an exhaustive list of all attacks on
online freedom of expression. In 2010, the Pakistan regi-
me’s attitude has raised much concern. a judge had or-
dered Facebook to be fully blocked after it posted videos
considered disrespectful to the Prophet. The authorities
reversed their decision, but promised to keep monitoring
the web. Kazakhstan will need to be observed during the
run-up to the presidential election.

as of this writing, protest movements continue to sweep
through the arab world and spread to other countries.
They may give rise to new online mobilisations and to
crackdowns by certain governments. In 2011, the Internet
and new media are still experiencing shock waves from
having been caught up in the momentum of all these poli-
tical changes. The Internet has entered turbulent times in
which its impact, power and frailties are likely to be ma-
gnified.




Lucie Morillon,
responsible of the New media Desk
Jean-François Julliard, General Secretary
INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 11




       burmA
internet enemy
Domain name: .mm
Population: 53 414 374
Internet-users: 300 000
Average charge for one hour’s connection at a cybercafé: about 0,55 US$
Average monthly salary: about 27,32 US$
Number of imprisoned netizens: 2

Burma took drastic measures in 2010 to reorganise the country’s Internet and to arm itself with the means, at the next sign
of a crisis, to cut off its population’s Web access without affecting official connections. Prior to the November 2010 elections
– the first in twenty years – censors resorted to massive crackdowns, intimidation and cyberattacks to reduce the risk of any
negative coverage. Tampering is now at its height.




widespreAd net CensorsHip                                           ders acquired censorship equipment and hardware from
                                                                    the chinese subsidiary of the Franco-american company
in burmA                                                            alcatel-Lucent. On march 24, 2010, reporters Without
                                                                    Borders and the Sherpa association sent a letter to alca-
The regime is enforcing harsh and widespread Internet               tel-Lucent’s management to ask for explanations, notably
censorship. The Burmese firewall restricts users to an in-          about the sale in Burma Lawful Interception Integrated
tranet purged of any anti-government content. Blocked               hardware. The company denied this claim, insisting that
websites include exiled Burmese media, proxies and                  it merely supplied telecom infrastructures within the fra-
other censorship circumvention tools, certain international         mework of a chinese-funded project.
media, and blogs and sites offering scholarships abroad.
                                                                    Yet in an article appearing in the may 19-25, 2008 issue
In an interview granted to rolling Stone magazine, ame-             of the newspaper myanmar Times, a spokesman for the
rican hacker and WikiLeaks member Jacob applebaum,                  state-controlled ISP hanthawaddy confirmed that the al-
exposed the scope of the censorship by showing that only            catel’s chinese subsidiary did indeed provide a website
118 of the country’s 12,284 IP addresses are not blocked            filtering and surveillance system.
by the regime and have access to the World Wide Web.
he also showed how vulnerable the network is the event
of attacks.
                                                                    outstAnding bloggers
                                                                    Despite the regime’s iron grip on the Internet, the number
censors may also be counting on the complicity of Wes-
                                                                    of bloggers keeps rising: there are now 1,500 of them, 500
tern companies. Some Burmese Internet service provi-
                                                                    of whom blog regularly. When Burmese bloggers based
INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 12




abroad are included, this number totals 3,000. Every year,          human lives and property caused by hurricane Nargis. he
reporters Without Borders and the Burma media asso-                 is serving a 35-year prison sentence for violating the Elec-
ciation reward Burma’s best bloggers. Thousands of Bur-             tronics act.
mese netizens voted for their favourite blogs, and in late
February 2010 in chiang mai, Thailand, a dozen of them              On 10 November 2008, blogger Nay Phone Latt (http://
received a prize for the best Burmese blogs. myanmar                www.nayphonelatt.net/), who owns three cybercafés in
E-Books (http://burmesebooks.wordpress.com) was vo-                 rangoon, was given a jail sentence of 20 years and six
ted the best general category blog. The prize for the best          months for having described on his blog how difficult it is
news blog went to The Power of Fraternity: (http://photayo-         for young Burmese people to express themselves freely,
keking.org).                                                        especially since the autumn 2007 demonstrations. accor-
                                                                    ding to reporters Without Borders’ sources, Nay Phone
In the months prior to the November 2010 elections, some            Latt was allowed to see his parents on 7 October 2010.
bloggers stepped up to the plate by keeping their compa-            The young blogger is said to have been deprived of his
triots informed about the elections and the issues at stake.        walking privileges for five months, and to have been confi-
They occasionally disseminated news about the candida-              ned to his cell. he is allegedly being held in a prison in
te contenders and the electoral laws – critical information         south-eastern Burma, along with 10 other political priso-
rarely relayed by the traditional press, which is subject to        ners.
stringent pre-run censorship.
                                                                    From his prison, Nay Phone Latt – who has been denied
Despite the slow connections and risks incurred, Burmese            the care his health problems require – has nonetheless
Internet users are still circumventing censorship, reading          managed to continue his fight for freedom of expression.
the foreign press, networking on Facebook or simply en-             Blogger Kaung myat hlaing (“Nat Soe”), who has already
joying themselves online.                                           been given a two-year prison sentence, and is wrongfully
                                                                    accused of having participated in the april 2010 Water

tHree netizens Are still                                            Festival bombings, was handed an additional 10-year
                                                                    sentence under the Electronics act. This young man of 22
lAnguisHing in prison                                               was interrogated for 10 days and deprived of food, water
                                                                    and sleep. he admitted being a member of the dissident
Journalists who collaborate with the exiled Burmese me-             group “Best Fertilizer.” he is charged with having taken
dia and bloggers are in the authorities’ line of fire, particu-     part in poster campaigns calling for the release of Daw
larly since the 2007 Saffron revolution and the internatio-         aung San Suu Kyi and of other political prisoners.
nal outcry which followed the mass circulation of images
of the ensuing crackdown. The authorities are making
unabashed use of a particularly repressive law adopted in
                                                                    reConfiguring tHe burmese
1996, the Electronics act, to regulate the Internet, TV and         internet beHind A smokesCreen
radio. This law notably prohibits the import, possession,
and use of a modem without official permission, under pe-           In October 2010, the Burmese junta-controlled Yatanar-
nalty of a 15-year prison sentence for “undermining state           pon Teleport company announced the launching of the
security, national unity, culture, the national economy and         country’s “first national Web portal,” a would-be Silicon
law and order.”                                                     Valley to be called “Yadanabon cyber city.”

The Burmese military junta considers netizens enemies of            In an exclusive report compiled by local sources entitled
the state. Three of them are in prison for having expressed         “National Web portal – Development or repression?” re-
themselves freely on the Web.                                       porters Without Borders and the Burma media association
                                                                    express concerns that the new Burmese Internet, billed by
Zarganar, a blogger and comedian known as the “Bur-                 the government as a huge step forward, may actually be
mese chaplin,” was arrested on 4 June 2008 after having             used to bolster the surveillance and repression already
testified to foreign media outlets – and notably to the BBc         imposed on Burmese netizens, while reserving the bene-
World Service – about the Burmese government’s poor                 fits of faster and improved access for members of the re-
management practices and guilty silence over the loss of            gime.
INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 13




The deployment of fibre-optic cables will not only allow In-
ternet access but also Voice over Internet Protocol (VoIP)
                                                                    unreliAble internet ConneC-
and Internet Protocol Television (IPTV) services because            tions in tHe run up to tHe 7
it will increase available bandwidth.
                                                                    november 2010: slowdowns,
Burmese Internet users will be allocated to three Internet          CyberAttACks And tAmpering
service providers, instead of the two they now have. One
will be reserved for the Burmese defence ministry, one for          The elections initiated by the military junta had no credibi-
the government and one for the public. Under this system,           lity, mainly because of the Burmese and foreign media’s
the government will be able to totally or partially block the       lack of freedom. Despite the constraints, the Burmese
population’s access without affecting government or mili-           media did their best and managed to offer the public a
tary connections. During the 2007 Safran revolution, sin-           variety of news and analyses unmatched since the last
ce all three “categories” were using the same providers,            elections in 1990. however, with all the preceding cen-
when the authorities disconnected the Internet to prevent           sorship, intimidations, detentions and expulsions of forei-
civilians from sharing photos of the ensuing crackdown,             gn journalists, stricter liberticidal laws and unreliable Inter-
members of the military and government were also cut off.           net connections, the conditions for a free election were far
What is more, he new architecture will allow the defence            from present.
ministry to directly control Internet traffic at the point of
entry into Burma.                                                   The military junta made it a requirement for political par-
                                                                    ties wishing to publish information or their programmes
The government and military will be likely to enjoy faster          to first have them approved by the Press Scrutiny and
and better Internet performance than the average user,              registration Board within 90 days after registering with
since ISPs will get an “equal share” of bandwidth in each           the Election commission. The regime announced on 17
of the three categories, even though the number of users            march 2010 that the publishing of pamphlets, newspa-
will vary greatly from one ISP to the next. The cost of the         pers, books or other election-related printed material, now
new service, which will be passed on to the public, may             falls under the 1962 Printers and Publishers registration
also curb any growth in the Internet penetration rate, cur-         act, which provides for sentences of up to seven years in
rently at about 2% in a country in which the average salary         prison for disseminating information which is critical of the
is 27 U.S. dollars and Internet cafés charge 54 cents per           government or disturbs public “tranquillity.”
connection hour.
                                                                    a drastic slowdown in Internet connections was noted in
This national portal will supposedly offer an email service         early October, more than a month after the elections, indi-
(Ymail) and a chat service (Ytalk) as alternatives to Gmail         cating the authorities’ resolve to tighten their control over
and Gtalk, making it even easier for the authorities to mo-         information. "I can no longer connect to my Gmail account
nitor users’ online communications.                                 using proxies. access to all websites based abroad has
                                                                    become terribly slow,” a rangoon-based journalist told
Lastly, undetectable Internet “sniffers” will be placed on          reporters Without Borders. according to Irrawaddy ma-
the server reserved for the public to retrieve diverse confi-       gazine, the capital’s cybercafés had closed in advance of
dential data. The military junta’s ability to spy on netizens       the elections.
and dissidents, thereby restricting freedom of speech
even further, will be greatly enhanced.                             This slowdown began after cyberattacks in the form of dis-
                                                                    tributed denial of service (DDoS) affected several exiled
The Internet access difficulties experienced by local In-           Burmese media websites such as Irrawaddy and the De-
ternet users during recent key events attest to the new             mocratic Voice of Burma (DVB).
portal’s timely arrival.
                                                                    Just a few days prior to the legislative elections, the Bur-
                                                                    mese Internet network experienced a massive cyberat-
                                                                    tack. The attacks began around 25 October 2010 and
                                                                    gradually increased in number and severity, causing the
                                                                    country to be regularly disconnected from the Web for se-
INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 14




veral days. They continued to occur until the elections             Daw aung San Suu Kyi is aware that her communications
were over, which made it extremely difficult for journalists        will be closely monitored and that the regime may decide
and netizens to transmit videos and photos and to do                at any time to suspend her Internet access. She has al-
their jobs.                                                         legedly stated that she has nothing to hide.

The government shifted the blame to hackers whom they
claimed launched the DdoS attacks on the country, but
according to Burmese sources contacted by reporters
Without Borders, most of the attacks were allegedly laun-
ched by government agents to justify cutting off the Inter-
net. The DDoS's were aimed at Internet service provider
myanmar Post and Telecommunications and constituted –
according to the american IT security firm arbor Networks
– an onslaught ”several hundred times” more than enough
to overwhelm the country’s terrestrial and satellite network.
They reportedly reached 10 to 15 GB of data per second,
a magnitude much greater than in the highly publicised
2007 attacks against Georgia and Estonia.

During the 2007 Safran revolution, Burmese netizens had
circulated news and videos on the authorities’ bloody crac-
kdown on monks and demonstrators. The regime subse-
quently cut off Internet access for several days. connec-
tions are also slowed on key dates such as 8 august – the
anniversary of the 1988 political uprising – and during the
2009 trial of dissident Daw aung San Suu Kyi. after being
released on 13 November 2010, the latter announced that
she intends to set up a website to showcase her views
and those of her political party, the National League for
Democracy (NLD)


dAw Aung sAn suu kyi:
free And ConneCted?
The well-known Burmese dissident and recipient of the
Nobel Peace Prize, who was cut off from all means of com-
munication during her years under house arrest, now has
an Internet connection in her home via the state-run ISP,
Yatanarpon Teleport. She has declared that she intends
to make full use of the Internet and social networks, parti-
cularly the Twitter micro-blogging site, in order to more ef-
fectively reach Burmese youths in the country and abroad
and to hold online discussions. This latter initiative may
prove challenging to achieve right now due to the poor
quality of the Internet infrastructure. as for the dissident’s
collaborators, they remain discreet about their role in de-
veloping the NLD’s online network, as they are subject to
a severe penalty under the Electronics act.
INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 15




         CHinA
internet enemy
Domain name : .cn
Population : 1 340 000 000
Number of Internet users : 457 000 000
Average charge for one hour’s connection at a cybercafé : around 2 U.S. dollars
Average monthly salary : between 220 and 300 U.S. dollars
Number of imprisoned netizens : 77

The Chinese government, exasperated that dissident Liu Xiaobo was awarded the Nobel Peace Prize and concerned about
spill-over effects from the Tunisian and Egyptian Revolutions, has drastically tightened its grip on the Web in order to trans-
form it from a protest medium to a tool for political control. Any attempt to challenge the country’s stability has been quashed
by harsh repression. The regime is taking aim at social networks, particularly micro-blogging websites and online anonymity.
New laws now regulate the Web, while Chinese Internet users continue to discuss banned topics and to mock censors.




CensorsHip to ensure                                                known to use the pretext of fighting pornography or the
                                                                    crackdown against the “dissemination of false news” to
regime stAbility                                                    justify the filtering.

                                                                    The man who designed the Great Firewall, Fang Binxing,
ThE “gREAT FiREwAll”: READy TO SpRing inTO ACTiOn
                                                                    who is also President of the Beijing University of Posts and
                                                                    Telecommunications, defended his creation in early 2011,
china has the world’s most consummate censorship sys-
                                                                    stating to the newspaper Global Times that censorship met
tem. The Great Firewall combines UrL filtering with the
                                                                    an “urgent” need. although he had opened a micro-blog
censoring of keywords considered “sensitive,” ranging
                                                                    account on sina.com, the account was closed a few days
from “Tiananmen” to the “Dalai Lama” to “democracy”
                                                                    later after thousands of netizens left comments blaming
and “human rights.” censorship is institutionalised and
                                                                    him for the control measures he had made possible.
managed by several ministries and administrations. In ad-
dition to filtering UrLs, the authorities are monitoring the
                                                                    The main news sites, such as the chinese state-controlled
largest blog and micro-blogging platforms, from which
                                                                    media, regularly receive oral and written directives from
they are removing numerous posts and comments. as-
                                                                    the Department of Propaganda specifying what topics
sistance from foreign companies – mainly in the form of
                                                                    can, or cannot, be covered and under what conditions.
Yahoo ! and microsoft self-censored search engines – is
                                                                    For example, the Department’s directives of January 2011
making their job that much easier. The regime has been
                                                                    imposed an information blackout on social and economic
INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 16




problems and specifically on price increases, anti-go-              censorship does not stop there. On 20 February, the
vernment demonstrations and the real estate market, to              authorities deployed security forces to Beijing and Shan-
“reassure” the chinese people and defend the regime’s               ghai following an online call for a “Jasmin revolution” and
concept of “fair growth.”                                           arrested people suspected of organizing it. Since then,
                                                                    the term “Jasmin” has joined the chinese Internet’s long
TighTEning CEnSORShip in ThE nAME                                   and ever-growing list of censored words, such as “Tuni-
OF nATiOnAl SECURiTy                                                sia,” “Egypt,” and “democracy.”

On 29 april 2010, china adopted an amendment to the                 CEnSORS ATTACK ThE nOBEl pEACE pRizE
State Secrets Law which requires Internet and telecom
companies to cooperate with the authorities on matters              The authorities’ indignation over the awarding of the Nobel
relating to national security. Such companies must now              Peace Prize to intellectual dissident Liu Xiaobo has trans-
block the transmission of vaguely defined state secrets             lated into harsher online censorship and acts of intimida-
over their networks, keep connection logs and alert the             tion against supporters of this human rights activist.
competent authorities to any possible violations. They
may also be forced to suppress certain contents.                    The government reacted by doing everything it could to
                                                                    censure the topic on the Web in order to prevent chinese
This amendment thus seems to be yet another warning                 citizens from becoming aware of the historical import of
sent to netizens to induce them to practice more self-cen-          this event. chinese media coverage of the awarding of
sorship, and an attempt to give the international commu-            the Nobel Peace Prize to the jailed dissident has been
nity the illusion of legality, since companies are already          dominated by the Beijing authorities’ hostile reaction. The
cooperating with the authorities in matters concerning na-          national TV network and most of the newspapers – even
tional security.                                                    the most liberal – did not even mention it, and for good
                                                                    reason: on 8 October 2010, when the laureate’s name was
CEnSORED REVOlUTiOnS                                                announced, the newsrooms received a clear order from
                                                                    the Department of Propaganda that it was “forbidden to
The Tunisian and Egyptian revolutions and their potential           relay information” about the topic (不能跨范围转载). a few
domino effect are greatly troubling to chinese leaders,             chinese foreign-language media, including the English-
who took prompt measures to restrict online discussions             language version of the nationalist newspaper Global Ti-
on such topics, in order to prevent the population from             mes, and the French and English editions of the People’s
being influenced by them.                                           Daily reported the government’s reaction. The Youth Daily
                                                                    ran an article headlined "chinese dissident Liu Xiaobo no-
On 28 January 2011, three days after the Egyptian upri-             minated: an insult to the Nobel Peace Prize." Foreign TV
sing began, china began censoring netizens’ searches                programmes are still being jammed whenever they broad-
by blocking results linked to the keyword “Egypt” on the            cast any news about Liu Xiaobo.
micro-blogging Twitter website and its chinese equi-
valents, sina.com and sohu.com. In response to this                 Internet censorship has not abated. On some of the major
keyword, users receive the following message: "Under                news sites, Sina and Sohu in particular, no content can
existing laws, the result of your search cannot be commu-           be accessed which directly mentions Liu Xiaobo. On the
nicated.” On Twitter as well as on Facebook, both of which          Baidu search engine, some results do refer to the awar-
are blocked in china, the hashtag #jan25 referring to the           ding of the Nobel Peace Prize, but the corresponding me-
Egyptian demonstrations of 25 January of 2011 quickly               dia pages are usually blocked. The official network ccTV
spread around the Web. The chinese communist Party                  remained silent about Liu Xiaobo and opened its evening
seems to be more fearful than ever of political reforms,            news programme of 8 October with a report about torren-
democratic demands and “breaches of public order.” On               tial rains falling on hainan Island.
30 January 2011, news wires about Egypt issued by Xin-
hua, the official chinese press agency, were reportedly             Some bloggers, such as the writer han han, have protes-
also suppressed.                                                    ted by posting empty messages to symbolise the impos-
                                                                    sibility of discussing what happened to Liu Xiaobo (http://
                                                                    www.rue89.com/node/170478). The chat forum 1984bbs,
INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 17




used by many journalists, was closed by its administrators          In the last few months, the authorities launched a new of-
after the latter were pressured by police. Twenty-three reti-       fensive against the proxy servers used by chinese Inter-
red communist Party officials and intellectuals have been           net users to bypass the “Great Firewall.” access to Free-
urging the country’s highest authorities to carry out poli-         gate and Ultrareach, two of the most popular proxies, was
tical reforms and to comply with article 35 of the china’s          made very difficult for several days as from 27 august
constitution, which guarantees free speech and media                2010. To counter this new wave of blockings, their develo-
freedom. This appeal was systematically removed from                pers reacted by making updated versions of their software
chinese blogs and websites where it had been posted.                available to netizens.
although within one hour of the announcement of the No-
bel Prize award related online messages remained acces-
sible for less than five minutes before being deleted.
                                                                    tHe regime’s internet
                                                                    CHArm offensive
It has also been impossible to send an SmS containing
the characters found in “Liu Xiaobo” or “Nobel Prize.” The          inTERnET whiTE pApER
micro-blogging website Weibo has also been censored.
Yet on Twitter, which is blocked in china, thousands of en-         On 8 June 2010, the chinese council of State’s Informa-
thusiastic messages from netizens have been posted sin-             tion Bureau published a “white paper” on the Internet,
ce the announcement. renowned artist ai Weiwei stated               which reasserts the need for online censorship in china in
that it was china’s happiest day in the last sixty years.           the name of “respect for local laws” and “maintaining sta-
                                                                    bility.” Far from challenging the authorities’ policy towards
moreover, a short time before the Nobel Peace Prize was             the Internet, or the upsurge in online censorship, it merely
awarded, a bogus invitation to attend the 10 December               adds to the Beijing leadership’s usual rhetoric. While the
2010 ceremony in Oslo containing a very powerful “Trojan            government’s resolve to broaden the chinese people’s
horse” computer virus circulated by e-mail. The computer            access to the Internet is commendable, it regretfully does
security firm F-Secure stated that it was unable to identify        not encompass access to the World Wide Web, but so-
the origin of these cyberattacks. Two weeks before the              lely to the chinese Web, complete with its sophisticated
virus appeared, the Nobel Peace Prize recipient’s website           filtering system that blocks political, social or other news
had been the target of an initial hacker attack.                    which the authorities deem undesirable.

ThE hEighT OF CEnSORShip: CEnSORing                                 iS A “nATiOnAl” SEARCh EnginE BEing DEVElOpED ?
ThE DEBATE On inTERnET CEnSORShip
                                                                    In august 2010, the official chinese press agency, Xinhua,
While censoring an article on censorship may seem to                and state-owned china mobile – the largest chinese tele-
be business as usual in china, the Diyi caijing Zhoukan             communications operator –signed an agreement to create
case (第一财经周刊- cbnweek.com) proves yet again the                     a joint venture called the Search Engine New media Interna-
extremes to which the chinese propaganda apparatus will             tional communications co. Its purpose is to launch a search
go to ensure that any discussion of Internet censorship in          engine directly controlled by the state which would enable
china is nipped in the bud.                                         chinese authorities to expand their control of the Internet by
                                                                    taking advantage of the mobile phone market boom.
On 24 November 2010, the authorities banned the reprin-             In addition, the regime is encouraging state-owned com-
ting or posting of an article by Shanghai business weekly           panies such as ccTV or Xinhua to strengthen their online
Diyi caijing Zhoukan, which was a behind-the-scenes look            presence.
at Beijing’s Bureau of Website administrators (北京市的网
管办), one of the entities responsible for online censorship.         In the meantime, the “50-cent party,” named after the Net
The report was quickly withdrawn from the website cb-               surfers paid to post pro-government online comments in
nweek.com. The article provides a detailed description of           order to “influence public opinion,” is still in operation.
how the Beijing Bureau of Website administrators, a go-
vernment agency, controls online information and shuts
down websites in order to stifle any debate about social
and political issues.
INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 18




A winDOw OF OppORTUniTy FOR OnlinE DiAlOgUE                         system for users of online forums.” Internet users are cur-
BETwEEn inTERnET USERS AnD ThE AUThORiTiES?                         rently required to register before posting comments on these
                                                                    sites, but they can do so using a pseudonym. according to
Some local and regional officials are already using the             Wang, now that anonymous posting on key news and com-
Web to convey their messages and address criticisms. In             mercial websites is banned, the next step is to extend the
September 2010, the website Zhitong Zhongnanhai, na-                system to online forums and chat rooms.
med after the government’s headquarters in central Bei-
jing, was launched as a way for Internet users to send their        cellular telephony is not exempt from this effort. chinese
messages to the national leadership. One week after its             authorities are tightening their grip on prepaid cell phone
launch, over 20,000 comments had already been posted                communications. a new regulation which entered into effect
for President hu Jintao alone on subjects such as real es-          on 1 September 2010 now requires users of prepaid cell
tate price increases, corruption, pollution and violations of       phones to provide detailed personal information by presen-
civil liberties.                                                    ting their identity card when buying SIm cards. anyone who
                                                                    already owns one has three years to register.
however, this free-speech window has been subject to
26 rules ever since. Netizens may not, for example, post            The newspaper Global Times claims that 800 million telepho-
comments which could jeopardise the state’s honour and              ne numbers are already assigned to cell phones now used
interests, or disrupt social order by advocating for the right      in china, of which 320 million were acquired anonymously.
of association, demonstration, or assembly.                         card sellers, mostly in newsstands, will be responsible for
                                                                    collecting photocopies of the buyers’ IDs and for recording
any Internet user who sends a disagreeable comment fa-              their contact information in the centralised cell phone user
ces penalties which can be as harsh as the permanent                name data collection system. The ministry of Industry and
termination of his or her IP address. aware that it is pro-         Information Technologies (mIIT) justifies this initiative by
hibited on this government website to send a message                claiming that it is part of the government’s campaign against
from an IP address located outside of china, chinese ne-            spams and fraud. In actuality, this new rule may potentially
tizens therefore cannot do so anonymously by using proxy            compromise the cell phone users’ personal data protection,
servers which assign them a foreign IP address. Even in             since it enhances the authorities’ ability to monitor calls,
cybercafés, every user is systematically asked to present           SmSs, and data exchanges, thereby facilitating the identifi-
an ID.                                                              cation of individuals who criticise or demonstrate against the
                                                                    government.
Despite this risk, some critical comments do manage to
slip through the Net’s filter. "When will prices go down?
The only thing that isn’t going up is salaries!” "comrade
                                                                    tHe AutHorities tAke Aim At
hu, don’t you think it interesting that I have left so many         miCro-blogging
messages, yet they all have been harmonised? can’t
you let us tell the truth?” one netizen asked. The govern-          In the summer of 2010, the authorities launched a new
ment’s website address is: http://cpc.people.com.cn/                crackdown on online networking tools, especially micro-
GB/191862/191865/index.html                                         blog services. On 15 July 2010, several dozen micro-blog

CrusAding AgAinst online                                            accounts were closed, among them those of blogger Yao
                                                                    Yuan and lawyer Pu Zhiqiang. Four of the leading chinese
And Cell pHone Anonymity                                            micro-blogging platforms, Netease, Sina, Tencent and
                                                                    Sohu, were inaccessible for several hours or days, dis-
In February 2010, the chinese ministry of Technology had            playing notices that the site was down for maintenance.
already announced that anyone wishing to create an Internet
website should register with Internet regulators in person and      around the same time, censors implemented an additional
present an ID.                                                      control level. In august 2010, chinese authorities ordered
                                                                    micro-blogging websites to hire a “self-discipline com-
In may 2011, Wang chen, the Department of Propaganda’s              missioner” to be responsible for censorship. according
assistant Director, quoted in an article published on 5 may         to the official press, the results of the first micro-blogger
by china Daily: “We are exploring an identity authentification      self-censorship test conducted in January 2010 in hebei
INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 19




province were deemed satisfactory enough to convince                the Yahoo! e-mail boxes of at least ten foreign journalists
the authorities to extend its application in Beijing to eight       based in china and Taiwan were hacked. Independent
micro-blogging platforms: Sina, Sohu, NetEase, Iphonixe,            news sites such as Boxun have been under constant at-
hexun, Soufang, 139mobile and Juyou9911. The latter hi-             tack.
red such commissioners and asked them to monitor and
censor anything which could threaten the country’s secu-            In secret documents released by WikiLeaks, a “chinese
rity or the society’s stability. They are focusing on content       source” cited by U.S. diplomatic sources confirmed the
dealing with illegal activities, pornography and violence,          chinese government’s involvement in the computer hac-
as well as unsubstantiated rumours and politically sen-             king of Google. These revelations have raised conside-
sitive issues. Each commissioner has been assigned a                rable concern about spying methods used on journalists
website whose content he or she is responsible for.                 and human rights activists working on china. The diplo-
                                                                    matic cable cited by the New York Times specified: “The
                                                                    Google hacking was part of a coordinated campaign of

impACt of tHe google CAse                                           computer sabotage carried out by government operati-
                                                                    ves, private security experts and internet outlaws recrui-
                                                                    ted by the chinese government."
STOpping CEnSORShip

The U.S. firm Google announced on 22 march 2010 its
decision to put an end to censorship via the chinese ver-           web CensorsHip:
sion of its search engine, google.cn. Now, when users
click on the home page of google.cn, they are redirected
                                                                    A trAde bArrier?
to Google.com.hk, where they have access to uncenso-
                                                                    Internet censorship is not just a human rights issue. It also
red content in simplified chinese characters. This website
                                                                    negatively impacts trade and business through the lack of
was intermittently censored in late march 2010. Despite
                                                                    access to reliable information. Online censorship has also
tenser relations with the chinese authorities following this
                                                                    become a way to discriminate against foreign – particularly
decision, the company did manage to get its operating
                                                                    american – companies, and to afford chinese companies
license there renewed in July 2010. It will maintain its re-
                                                                    preferential treatment, which led two experts of the European
search and development activities in china, and keep on
                                                                    centre for International Political Economy to label it, in The
selling advertising spots on Google.com to chinese com-
                                                                    Wall Street Journal, “disguised protectionism.”
panies.
Google may have set an example for others: the U.S. In-
                                                                    The European Union entered the debate in 2010, as the cen-
ternet company GoDaddy announced on 24 march 2010,
                                                                    sorship spread to mobile telephones – a sector in which Eu-
during a U.S. congressional hearing, that it would stop of-
                                                                    ropean companies do considerable business. In may 2010,
fering its clients new chinese domain names ending in the
                                                                    European commission Vice President and Digital agenda
.cn suffix because of the radical controls measures being
                                                                    commissioner Neelie Kroes called this censorship a “trade
implemented by chinese authorities.
                                                                    barrier” and said it is an issue that should be tackled within
                                                                    the World Trade Organization.
ARE ChinESE AUThORiTiES DiRECTly iMpliCATED
in hACKing ACTiViTiES?
                                                                    tibet And XinjiAng: sensitive
Google’s decision apparently was reached in the wake
of cyberattacks launched from china against the Gmail               provinCes, speCiAl treAtment
accounts of several dozen human rights activists. Some
twenty media and technology sector companies are said               AT lEAST 50 TiBETAnS SEnTEnCED FOR
to have also been victims of these hacker attacks and of            hAVing SEnT nEwS ABROAD
intellectual property infringement.
                                                                    The repression has never stopped since the march 2008
cyberattacks were still going on in early 2010. The Forei-          uprising in the Tibetan regions. Since then, at least 50
gn correspondents’ club of china (Fccc) reported that               Tibetans have been arrested and some sentenced to
                                                                    lengthy prison terms for having sent information, photos
INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 20




and videos abroad. The latest to be convicted, Dasher,              is one of the co-writers of charter 08, which calls for more
was given a 10-year prison sentence on a charge of “se-             freedoms and an end to the one-party rule in china. his
paratism” in February 2010.                                         biography is available at: http://en.rsf.org/chine-liu-xiaobo-
                                                                    biography-28-10-2010,38704.html, and charter 08 can be
XinjiAng: RECOnnECTED TO ThE nET,                                   found at: http://www.nybooks.com/articles/archives/2009/
BUT STill plAgUED By pURgES                                         jan/15/chinas-charter-08/

The arrests continue. cut off from the world for nearly 10          The pressures being placed on Liu Xiaobo’s relatives and
months following the social unrest in July 2009, the Xin-           supporters, as well as on all defenders of freedom of ex-
jiang autonomous region was then subjected to a dis-                pression, have not lessened in china since this announce-
criminatory shut-down of Internet access, and was only              ment was made. Beijing tried to dissuade diplomats from
reconnected to the chinese Internet on 14 may 2010.                 attending the Nobel Prize award ceremony in Oslo on 10
                                                                    December 2010 and prevented several human rights ac-
meanwhile, Xinjiang’s Internet users are subject to filtering       tivists from leaving the country. Liu’s wife, Liu Xia (刘刘), is
by the chinese Firewall, and the websites and blogs dea-            under house arrest and her relatives are not permitted to
ling with the Uyghur issue are still a favourite target for         leave china. The Nobel committee awarded the prize to
censors. many of them are still blocked – including the             an “empty chair.”
sites of the Uyghur american association (Uaa) and the
Uyghur human rights Project (UhrP) – because they re-               am ever-growing number of Liu’s supporters are being
fuse to toe the official Beijing Party line. Banned keywords        arrested. Since mid-October 2010, according to the in-
include "rebiya Kadeer" (the Uyghur human rights acti-              dependent chinese PEN centre, at least 40 human rights
vist), "World Uyghur congress", "Uyghur human rights                activists and journalists have been arrested or brought in
Project" and "East Turkestan Independence.”                         for questioning throughout china for attempting to cele-
                                                                    brate the news of Liu’s award. Three of them were detained
Salkin website collaborator Gulmire Imin was sentenced              for at least eight days: Wang Lihong, Wu Gan and Zhao
to life behind bars in april 2010 for having “revealed” state       changqing. Formerly imprisoned journalist Liu Jingsheng
secrets, for “organising a demonstration” and for “sepa-            said that two police officers had been posted outside his
ratism.”                                                            home. Liu Xiaobo supporters without Beijing residence
                                                                    permits have been sent back to their home province.
On 21 July 2010, in Urumqi, three Uyghur webmasters,
Dilshat Perhat, Nureli and Nijat azat were tried in camera
for having endangered state security and for the content            Guo Xianliang, an Internet writer known by his pen name,
of their publications, which the chinese government dee-            "hermit of Tianshan mountain" has been behind bars since
med to be politically sensitive. They were sentenced, res-          28 October after being arrested by the Guangzhou autho-
pectively, to five, three and ten years in prison.                  rities for passing out flyers with pictures of Liu Xiaobo in
                                                                    the streets and parks of canton. human rights activist
                                                                    Liu Di, known by her pen name, "Stainless Steel mouse",

liu XiAobo (刘哓波):                                                   along with about 100 other people, were placed under
                                                                    house arrest and strict police surveillance.
tHe world’s only nobel peACe
prize reCipient still beHind bArs A few releAses offset
On October 8, the Nobel Peace Prize was awarded for
                                                    by new ConviCtions
the first time to a chinese citizen residing in china, even
                                                                    The sentences of some “4 June dissidents” who had par-
though he has been serving an 11-year jail sentence in
                                                                    ticipated in the June 1989 Tiananmen Square demons-
Jinzhou Prison (Liaoning Province). Very moved when he
                                                                    trations were shortened (http://www.duihuanews.org/).
learned the news, intellectual and human rights activist Liu
                                                                    cyberdissident Li Zhi, a former government official sen-
Xiaobo dedicated this prize to “the lost souls of 4 June” –
                                                                    tenced in December 2003 to an eight-year prison term for
the date of the Tiananmen Square massacre. Liu Xiaobo
                                                                    “subversive” use of the Internet, was released last Novem-
INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 21




ber, nine months early. he is one of the netizens condem-           a hospital in Ningbo of complications from a disease for
ned on the basis of information originating from their e-           which he had never been treated during his three years
mail accounts, which Yahoo! had provided to chinese                 behind bars. Li hong was the chief editor of aiqinhai, a
authorities.                                                        literary online magazine (http://www.aiqinhai.org/) closed
                                                                    by the authorities in 2006 for disseminating “content cri-
Dissident Qin Yongmin was freed after serving his full 12-          tical of the chinese government.” he also contributed to
year prison sentence, but is still kept under close watch.          news websites Boxun and Epoch Times.
Writer Guo Xianliang, who had been arrested in canton for
having passed out flyers supportive of Liu Xiaobo, was              The lives of several other netizens are hanging in the ba-
released on 26 November. his friends and family report              lance. The chinese authorities should have learned their
that he was able to safely return to Kunming.                       lesson from this tragedy and immediately released all other
                                                                    netizens with health problems, particularly huang Qi, Fan
however, on 9 June 2010, the Sichuan Provincial high                Yanqiong, cheng Jianping, hu Jia and Yang Tianshui.
People’s court upheld the decision made against activist
and environmentalist Tan Zuoren, who had been senten-               huang Qi, arrested in 2008, was sentenced to three years
ced to a five-year prison term for "inciting subversion of          behind bars for having posted articles online about the
state power" and to a three-year deprivation of his political       consequences of the Sichuan Province earthquake. he
rights. he had been arrested in march 2008, after urging            is said to have stomach and chest tumours which are not
chinese netizens to travel to Sichuan Province to look into         being treated properly, and to have been tortured and de-
the situation of the earthquake victims’ families.                  prived of sleep.

For the first time, an ironic tweet earned a netizen one            cheng Jianping was sentenced on 15 November 2010 to
year of forced labour. On 15 November 2010, cybernaut               a year of “re-education through work” in a labour camp
cheng Jianping was sentenced to serve a year in the Shi-            for having relayed a comment on Twitter about tensions
bali river “re-education through work” labour camp for              between china and Japan. She is suffering from tubercu-
women in Zhengzhou, henan Province, for “disturbing                 lous pleurisy, a chronic lung condition.
social order.” her lawyer, Lan Zhixue, appealed this ad-
ministrative order, issued without any form of trial. cheng         Netizen Fan Yanqiong, arrested in 2009, was given a two-
Jianping was arrested on 28 October – on what would                 year prison sentence in april 2010 for having reported on-
have been her wedding day – and charged with having                 line the case of a raped and murdered woman in Fujian
retweeted, on 17 October 2010, a satirical message about            Province. at the time of her trial, she had to use a wheel-
anti-Japanese demonstrations taking place in china,                 chair and an oxygen mask because she was suffering
using her pen name “Wang Yi” (@wangyi09) on the Twit-               from high blood pressure, muscular atrophy and severe
ter website. She has more than 5,000 netizen followers on           pains in all her limbs.
this social network. The message suggested that young
chinese protesters should attack the Japanese pavilion              Blogger and human rights activist hu Jia got a three-year
at the Shanghai World Expo and mocked the excessive                 prison sentence in 2008 for “inciting subversion of state
tension between the two countries.                                  power” after posting articles online and granting inter-
                                                                    views to the foreign media. he has cirrhosis of the liver,

endAngered netizens: CriminAl                                       but is not receiving the medications he needs.

detentions And moCk releAses                                        FORCED DiSAppEARAnCES?


CyBERDiSSiDEnTS DETAinED DESpiTE BEing gRAVEly ill                  Geng he, the wife of chinese human rights activist and
                                                                    lawyer Gao Zhisheng, has never stopped demanding an
The incarceration of certain netizens can sometimes have            explanation for the disappearance of her husband, one of
a tragic outcome. Shortly after having finally been gran-           the first “barefoot lawyers” who has been missing again
ted the medically motivated release he had repeatedly re-           since april 2010 .
quested, cyberdissident Zhang Jianhong – better known
by his pen name Li hong – died on 31 December 2010 in
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011
Internet enemies 2011

Contenu connexe

Similaire à Internet enemies 2011

Online Spiritual Civilization (1)
Online Spiritual Civilization (1)Online Spiritual Civilization (1)
Online Spiritual Civilization (1)ashiyan
 
WatersNicholas_Dissertation
WatersNicholas_DissertationWatersNicholas_Dissertation
WatersNicholas_DissertationNick Waters
 
Webstock Bob Rapp
Webstock  Bob RappWebstock  Bob Rapp
Webstock Bob RappFreelancer
 
Publishing 2.0
Publishing 2.0Publishing 2.0
Publishing 2.0Andy Budd
 
Social media impact_digital
Social media impact_digitalSocial media impact_digital
Social media impact_digitalCarlos Herreros
 
Shirky and morozov
Shirky and morozovShirky and morozov
Shirky and morozovmw12676
 
Networks, Power & States: Internet reshaping world politics
Networks, Power & States: Internet reshaping world politicsNetworks, Power & States: Internet reshaping world politics
Networks, Power & States: Internet reshaping world politicsyamilsalinas
 
Social Network Continuity Disruption Countermeasures Paper
Social Network Continuity Disruption Countermeasures PaperSocial Network Continuity Disruption Countermeasures Paper
Social Network Continuity Disruption Countermeasures Papermartindudziak
 
Digital governance in nigeria going beyond the hype
Digital governance in nigeria going beyond the hype Digital governance in nigeria going beyond the hype
Digital governance in nigeria going beyond the hype Kayode Fayemi
 
Digital Governance in Nigeria: Going Beyond the Hype - The Ekiti State Digita...
Digital Governance in Nigeria: Going Beyond the Hype - The Ekiti State Digita...Digital Governance in Nigeria: Going Beyond the Hype - The Ekiti State Digita...
Digital Governance in Nigeria: Going Beyond the Hype - The Ekiti State Digita...Government of Ekiti State, Nigeria
 
Richardbooth himss-june232011-print
Richardbooth himss-june232011-printRichardbooth himss-june232011-print
Richardbooth himss-june232011-printRichard Booth
 
Schwartz Future Of Journalism
Schwartz Future Of JournalismSchwartz Future Of Journalism
Schwartz Future Of Journalismte.schwartz
 
Shirky and morozov
Shirky and morozovShirky and morozov
Shirky and morozovmw12676
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastMohamed N. El-Guindy
 
Log on, tune in, blog out: citizen-journalists, New Media, and subversive act...
Log on, tune in, blog out: citizen-journalists, New Media, and subversive act...Log on, tune in, blog out: citizen-journalists, New Media, and subversive act...
Log on, tune in, blog out: citizen-journalists, New Media, and subversive act...te.schwartz
 
Journalism 2.0: The future of news
Journalism 2.0: The future of newsJournalism 2.0: The future of news
Journalism 2.0: The future of newsrmackinnon
 
UNICEF Russian digital landscape exploratory paper
UNICEF Russian digital landscape exploratory paperUNICEF Russian digital landscape exploratory paper
UNICEF Russian digital landscape exploratory paperAkshay Sinha
 
New Media: Overview & A Model of YouTub Edu
New Media: Overview & A Model of YouTub  EduNew Media: Overview & A Model of YouTub  Edu
New Media: Overview & A Model of YouTub EduMohsen Alafranji
 

Similaire à Internet enemies 2011 (20)

Freedom On The Net
Freedom On The NetFreedom On The Net
Freedom On The Net
 
Online Spiritual Civilization (1)
Online Spiritual Civilization (1)Online Spiritual Civilization (1)
Online Spiritual Civilization (1)
 
WatersNicholas_Dissertation
WatersNicholas_DissertationWatersNicholas_Dissertation
WatersNicholas_Dissertation
 
Webstock Bob Rapp
Webstock  Bob RappWebstock  Bob Rapp
Webstock Bob Rapp
 
Publishing 2.0
Publishing 2.0Publishing 2.0
Publishing 2.0
 
Social media impact_digital
Social media impact_digitalSocial media impact_digital
Social media impact_digital
 
The RuNet generation
The RuNet generationThe RuNet generation
The RuNet generation
 
Shirky and morozov
Shirky and morozovShirky and morozov
Shirky and morozov
 
Networks, Power & States: Internet reshaping world politics
Networks, Power & States: Internet reshaping world politicsNetworks, Power & States: Internet reshaping world politics
Networks, Power & States: Internet reshaping world politics
 
Social Network Continuity Disruption Countermeasures Paper
Social Network Continuity Disruption Countermeasures PaperSocial Network Continuity Disruption Countermeasures Paper
Social Network Continuity Disruption Countermeasures Paper
 
Digital governance in nigeria going beyond the hype
Digital governance in nigeria going beyond the hype Digital governance in nigeria going beyond the hype
Digital governance in nigeria going beyond the hype
 
Digital Governance in Nigeria: Going Beyond the Hype - The Ekiti State Digita...
Digital Governance in Nigeria: Going Beyond the Hype - The Ekiti State Digita...Digital Governance in Nigeria: Going Beyond the Hype - The Ekiti State Digita...
Digital Governance in Nigeria: Going Beyond the Hype - The Ekiti State Digita...
 
Richardbooth himss-june232011-print
Richardbooth himss-june232011-printRichardbooth himss-june232011-print
Richardbooth himss-june232011-print
 
Schwartz Future Of Journalism
Schwartz Future Of JournalismSchwartz Future Of Journalism
Schwartz Future Of Journalism
 
Shirky and morozov
Shirky and morozovShirky and morozov
Shirky and morozov
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle East
 
Log on, tune in, blog out: citizen-journalists, New Media, and subversive act...
Log on, tune in, blog out: citizen-journalists, New Media, and subversive act...Log on, tune in, blog out: citizen-journalists, New Media, and subversive act...
Log on, tune in, blog out: citizen-journalists, New Media, and subversive act...
 
Journalism 2.0: The future of news
Journalism 2.0: The future of newsJournalism 2.0: The future of news
Journalism 2.0: The future of news
 
UNICEF Russian digital landscape exploratory paper
UNICEF Russian digital landscape exploratory paperUNICEF Russian digital landscape exploratory paper
UNICEF Russian digital landscape exploratory paper
 
New Media: Overview & A Model of YouTub Edu
New Media: Overview & A Model of YouTub  EduNew Media: Overview & A Model of YouTub  Edu
New Media: Overview & A Model of YouTub Edu
 

Plus de Valentina T.

Analisi euristica di un ambiente: Area Relax U6 - Piano Interrato
Analisi euristica di un ambiente: Area Relax U6 - Piano InterratoAnalisi euristica di un ambiente: Area Relax U6 - Piano Interrato
Analisi euristica di un ambiente: Area Relax U6 - Piano InterratoValentina T.
 
La comicità negata: il ruolo della donna nei cinepanettoni
La comicità negata: il ruolo della donna nei cinepanettoniLa comicità negata: il ruolo della donna nei cinepanettoni
La comicità negata: il ruolo della donna nei cinepanettoniValentina T.
 
Smart Mobility: dall'info-mobilità ai percorsi green, le app e i sistemi che ...
Smart Mobility: dall'info-mobilità ai percorsi green, le app e i sistemi che ...Smart Mobility: dall'info-mobilità ai percorsi green, le app e i sistemi che ...
Smart Mobility: dall'info-mobilità ai percorsi green, le app e i sistemi che ...Valentina T.
 
Indagine sulla situazione dei ciclisti milanesi
Indagine sulla situazione dei ciclisti milanesiIndagine sulla situazione dei ciclisti milanesi
Indagine sulla situazione dei ciclisti milanesiValentina T.
 
Comuni italiani e comuni inglesi: confronto fra le diverse tipologie di servi...
Comuni italiani e comuni inglesi: confronto fra le diverse tipologie di servi...Comuni italiani e comuni inglesi: confronto fra le diverse tipologie di servi...
Comuni italiani e comuni inglesi: confronto fra le diverse tipologie di servi...Valentina T.
 
Confronto tra Facebook e Google +
Confronto tra Facebook e Google +Confronto tra Facebook e Google +
Confronto tra Facebook e Google +Valentina T.
 
Internet come mezzo di comunicazione democratico
Internet come mezzo di comunicazione democraticoInternet come mezzo di comunicazione democratico
Internet come mezzo di comunicazione democraticoValentina T.
 

Plus de Valentina T. (7)

Analisi euristica di un ambiente: Area Relax U6 - Piano Interrato
Analisi euristica di un ambiente: Area Relax U6 - Piano InterratoAnalisi euristica di un ambiente: Area Relax U6 - Piano Interrato
Analisi euristica di un ambiente: Area Relax U6 - Piano Interrato
 
La comicità negata: il ruolo della donna nei cinepanettoni
La comicità negata: il ruolo della donna nei cinepanettoniLa comicità negata: il ruolo della donna nei cinepanettoni
La comicità negata: il ruolo della donna nei cinepanettoni
 
Smart Mobility: dall'info-mobilità ai percorsi green, le app e i sistemi che ...
Smart Mobility: dall'info-mobilità ai percorsi green, le app e i sistemi che ...Smart Mobility: dall'info-mobilità ai percorsi green, le app e i sistemi che ...
Smart Mobility: dall'info-mobilità ai percorsi green, le app e i sistemi che ...
 
Indagine sulla situazione dei ciclisti milanesi
Indagine sulla situazione dei ciclisti milanesiIndagine sulla situazione dei ciclisti milanesi
Indagine sulla situazione dei ciclisti milanesi
 
Comuni italiani e comuni inglesi: confronto fra le diverse tipologie di servi...
Comuni italiani e comuni inglesi: confronto fra le diverse tipologie di servi...Comuni italiani e comuni inglesi: confronto fra le diverse tipologie di servi...
Comuni italiani e comuni inglesi: confronto fra le diverse tipologie di servi...
 
Confronto tra Facebook e Google +
Confronto tra Facebook e Google +Confronto tra Facebook e Google +
Confronto tra Facebook e Google +
 
Internet come mezzo di comunicazione democratico
Internet come mezzo di comunicazione democraticoInternet come mezzo di comunicazione democratico
Internet come mezzo di comunicazione democratico
 

Dernier

Vashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call GirlsVashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call GirlsPooja Nehwal
 
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct CommiteemenRoberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemenkfjstone13
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...Ismail Fahmi
 
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxLorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxlorenzodemidio01
 
30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
25042024_First India Newspaper Jaipur.pdf
25042024_First India Newspaper Jaipur.pdf25042024_First India Newspaper Jaipur.pdf
25042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Pooja Nehwal
 
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s LeadershipTDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadershipanjanibaddipudi1
 
26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...Axel Bruns
 
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书Fi L
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...AlexisTorres963861
 
Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxMinto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxAwaiskhalid96
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docxkfjstone13
 
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...narsireddynannuri1
 
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docxkfjstone13
 
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKISHAN REDDY OFFICE
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...Diya Sharma
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfLorenzo Lemes
 

Dernier (20)

Vashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call GirlsVashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call Girls
 
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
 
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct CommiteemenRoberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
 
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxLorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
 
30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf
 
25042024_First India Newspaper Jaipur.pdf
25042024_First India Newspaper Jaipur.pdf25042024_First India Newspaper Jaipur.pdf
25042024_First India Newspaper Jaipur.pdf
 
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
 
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s LeadershipTDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
 
26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
 
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
 
Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxMinto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptx
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
 
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
 
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
 
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdf
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdf
 

Internet enemies 2011

  • 2. INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 2 world mAp of CyberCensorsHip....................................3 introduCtion..................................................................................................4 internet enemies...................................................................................11 BURMA............................................................................................................................11 ChinA...............................................................................................................................15 CUBA...............................................................................................................................24 iRAn.............................................................................................................................27 nORTh KOREA....................................................................................................................32 SAUDi ARABiA....................................................................................................................35 SyRiA...............................................................................................................................38 TURKMEniSTAn.................................................................................................................43 UzBEKiSTAn.......................................................................................................................46 ViETnAM............................................................................................................................49 under surveillAnCe........................................................................ 54 AUSTRAliA........................................................................................................................ 54 BAhRAin............................................................................................................................56 BElARUS............................................................................................................................59 EgypT...............................................................................................................................62 ERiTREA..........................................................................................................................65 FRAnCE..............................................................................................................................67 liByA ..................................................................................................................................72 MAlAySiA..........................................................................................................................74 RUSSiA.............................................................................................................................77 SOUTh KOREA....................................................................................................................81 SRi lAnKA........................................................................................................................84 ThAilAnD........................................................................................................................86 TUniSiA..............................................................................................................................89 TURKEy............................................................................................................................92 UniTED ARAB EMiRATES.................................................................................................96 VEnEzUElA......................................................................................................................99
  • 3. INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 3 world mAp of CyberCensorsHip
  • 4. INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 4 tHe new mediA: between revolution And repression, net solidArity tAkes on CensorsHip ArAb springtime: is tHe web Facebook and Twitter served as sound boxes, amplifying the demonstrators’ frustrations and demands. They also reACHing new HeigHts? made it possible for the rest of the world to follow the events as they unfolded, despite censorship. The role of The year 2010 firmly established the role of social networks cell phones also proved crucial. citizen journalists kept fi- and the Internet as mobilisation and news transmission le-sharing websites supplied with photos and videos, and tools. In 2010 alone, 250 million Internet users joined Fa- fed images to streaming websites. cebook and by the end of the year, the social network had 600 million members. In September that year, 175 million The Tunisian authorities had imposed a media blackout on people were Twitter users – 100 million more than in the what was going on in Sidi Bouzid. Since the so-called “tra- previous year. ditional” media had failed to cover the protest movements that were rocking the country, at least at their beginning The Western media had praised the Internet and its “libe- in December, their role as news sources and vectors was rator” role during the 2009 Iranian revolution. according to taken over by social networks such as Facebook and Twit- The New York Times, the demonstrators “shot tweets” back ter, and news websites like Nawaat.org. Facebook in par- at bullets. however, Twitter was then used mainly by the ticular acted as a platform on which Internet users posted diaspora. “The Net Delusion,” a theory advanced by Evge- comments, photos and videos. The Bambuser streaming ny morozov, an Internet expert, casts doubt on the Internet’s site also had its moment of glory. Everyone was able to role as a democratisation tool. although the Internet is cer- track the events as they happened. The online calls for tainly used by dissidents, it is also used by the authorities to demonstrations spread to other countries: Egypt, Libya, relay regime propaganda and enforce a police state. Yemen, Bahrain, Oman, Syria, Iraq, morocco, and even china and Vietnam, etc. The Internet remains above all a tool used for the better or the worse. In the most closed countries, it creates a space of freedom which would not otherwise exist. Its potential Control 2.0 gAins strengtH to disseminate news irritates dictators and eludes traditio- CEnSORShip AnD REpRESSiOn inTEnSiFy nal censorship methods. Some regimes use it – mainly on Facebook and Twitter – to monitor dissidents and infiltrate authoritarian regimes’ latest strategy is no longer to use their networks. pure and simple blocking as it is to use, but rather online tampering and propaganda. Naturally countries such as Nonetheless, the terms “Twitter revolution” and “Fa- china, Saudi arabia and Iran are still practicing strict filte- cebook revolution” have become watchwords with the ring, which they tend to tighten during periods of unrest, events that rocked the arab world in late 2010 and early notably with regard to micro-blogging sites and social 2011. The “online” movements were coupled with “offline” networks. meanwhile, their netizens keep on learning new demonstrations, hastening the fall of dictators. The Tuni- ways to circumvent censorship. china in particular has sian and Egyptian uprisings turned out to be, first and fo- reinforced its “Electronic Great Wall” and is tackling the remost, human revolutions facilitated by the Internet and anonymity of Internet and cell phone users. Uzbekistan, social networks.
  • 5. INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 5 Syria, Vietnam – to name but a few – have enhanced their “father of the Iranian blogosphere,” received the most se- censorship to stifle the echoes of the revolutions agitating vere prison sentence: 19.5 years. the arab world. In this “control 2.0” era, several tested methods are used currently, one out of every three Internet users is unable simultaneously by the authorities to prevent dissidents to access a free Internet. Net censorship is becoming from ruling the web and to maintain better control over the the norm. around 60 countries are implementing some regime’s disinformation. form of Internet censorship, which entails either content filtering or netizen harassment. Others may well join their ranks in the months and years to come. For the first time, broAder reCourse to Bangladesh has blocked access to certain sites because propAgAndA And mAnipulAtion of videos deemed offensive to the Prophet. cambodia is censuring news sites. First, the use of distributed denial-of-service (DDoS) cy- berattacks has become commonplace, as has phishing, Blogger and netizen arrests have continued and remained which involves stealing user passwords. One of the epi- at the same level in 2010 as in 2009. as of this writing, 119 sodes which received the most media coverage is un- netizens are behind bars, as compared to 120 in 2009. al- doubtedly the pirating of Google’s website and those of though 2010 saw the release of several popular bloggers some 20 other companies in china in late 2009 and early such as Kareem amer in Egypt a few days after serving his 2010. Vietnam also uses cyberattacks to muzzle dissident sentence, and adnan hadjizade and Emin milli in azerbai- opinions. Independent news websites based abroad and djan, the authorities are finding new ways to hinder blog- those which discussed bauxite mining were targeted in gers’ and cyberdissidents’ freedom of action. The number 2010. Burma not only attempted to immobilise several in- of false releases – such as that of mongol cause activist dependent online media, but also tried to shift the blame hada, in china – or forced disappearances, is growing, for the bandwidth speed slowdown on hackers acting and so are house arrests. as for self-censorship, which is against the country’s interests. another weapon used by hard to quantify, it appears to have gained ground. dissidents in Iran was the “Green cyber army,” which at- tacked some government websites. The world’s biggest prisons for netizens remain: china (77 netizens), Vietnam As of tHis writing, The “hackivists anonymous” group paralysed the Tunisian president’s and (17) and Iran (11). a new wave of arrests 119 netizens Are parliament’s website in January 2011 in Vietnam preceded the January 2011 communist Party congress. The chine- beHind bArs as part of its “Operation: Tunisia.” se regime launched a series of arrests In 2010, authoritarian regimes sought in February 2011 following online calls for demonstrations to control their country’s Internet connection speeds by triggered by the arab uprisings. The authorities feared that slowing down bandwidth during elections or periods of they would spread. For the first time in china, Twitter users social unrest. connection speed became the barometer of were arrested for their posts on the social network. a country’s political and social situation. Iran has become an expert in this technique, and used it just before and One such prisoner is no other than Liu Xiaobo – the win- during every demonstration organised by the opposition. ner of the 2011 Nobel Peace Prize, the only Nobel Peace Ben ali’s and mubarak’s divested regimes also resorted to Prize laureate currently in jail. The announcement of this it. Often such disruptions are accompanied by jamming or news in December 2010 resulted in an unusually violent shutting down cell phone networks in the areas concer- crackdown by the authorities: any reference to this award ned, such as Tahrir Square in cairo. on micro-blogging sites is being censored and they are questioning or placing under house arrest hundreds of another Iranian strategy which proved successful in Be- supporters and friends of the human rights activist and larus during the demonstrations over the re-election of freedom defender. President Lukashenko was redirecting users of opposition websites (or those critical of the regime) to pseudo-sites In Iran, imprisoned netizens were sentenced to death for with similar, yet more pro-government, content. the first time. Blogger hossein Derakshan, known as the
  • 6. INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 6 In addition, every government seeking to control the net certain regimes sometimes intentionally maintain infras- has vested itself with a cyberpolice force equal to its am- tructural problems to keep their populations from having bitions and which, particularly on social networks, closely Internet access. The 2011 commissioning of the fibre optic monitors dissident activities. It has also deployed groups undersea cable linking cuba to Venezuela, which expan- of “sponsored” bloggers paid to post online pro-regime ded bandwidth potential, therefore will eliminate one of the comments, thereby eclipsing critical opinions. russian cuban regime’s excuses about access problems. brigade and “50-cent party” bloggers are experts at this. Initially, the authorities had used repression to counteract North Korea, on the other hand, launched its own pages their opponents’ use of the Internet, but now they are dis- on the online social networks in 2010, and is said to have playing their own content. initiated its first connections to the World Wide Web. The latter are apparently very limited, however, and are being inTERnET DiSRUpTiOnS: A DRASTiC AnD COSTly MEASURE run by the regime for propaganda purposes. Extreme measures which ultimately failed were taken in Egypt, and then in Libya, to try to put an end to protest tHe new vs. trAditionAl mediA: movements against the incumbent leaders. In the evening is symbiosis An option? of 27 January 2011, Egypt virtually cut off Internet access for five days, causing its economy a loss of at least USD There is truly no longer any reason for the long-lasting 90 million, according to the Organisation for European gap between the new and the traditional media. In the co-Operation and Development (OEcD), which shows to last few months, they have proven to be increasingly com- what extent the Internet is an integral part of the global plementary. according to BBc Global News Direct Peter economy and essential to a country’s economy. In Libya, horrocks, it is imperative for journalists to learn how to the authorities first severed Internet access on 19 Februa- use social networks: “It is not an option.” The new media ry, then maintained strong Internet disruptions after that have become key tools for journalists. at the same time, and cut it off again on by flooding social networks 3 march. It was not the first time that Internet CertAin regimes sometimes with news and pictures, arab revolutionaries were access was totally sus- intentionAlly mAintAin also seeking to ensure that pended in a country. This occurred in 2005 infrAstruCturAl problems the international media co- vered news events in order in Nepal and in 2007 in to keep tHeir populAtions from to put pressure on their go- Burma. however, such measures stir up strong HAving internet ACCess. vernments and on the inter- national community. reactions worldwide and further exacerbate demonstrators’ resentment. It also News staff now use Twitter and Facebook to find ideas for induces the latter to resort to more creative ways to freely news stories, gather first-hand accounts and visuals, and distribute information, despite the odds. Netizens have to disseminate their own articles in order to expand their either resumed using earlier Internet methods (modem, readership. The shelf life of an article no longer ends with fax, etc.) or have adopted the latest generation of techno- the printing of a newspaper; it now has an extended life logies (phone-based tweet system set up by Google and online. Twitter). according to a study conducted on print and web journalists Burma learned its lessons from the 2007 Internet suspen- by the cision research company and George Washington sion and undertook a broad revamping of its national plat- University, 56% of the respondents responded that social form, to make certain that access providers would provide media were “important or somewhat important” for resear- distinctly separate services to the population, the govern- ching and writing the stories they wrote. Blogs were still the ment and the military, thereby ensuring that the junta will main source for the respondents (89%). micro-blogging was be prepared, in the next crisis, to cut off Internet access to a source for 69% of the web journalists. however, these jour- its citizens without being directly affected itself. nalists remain cautious: 84% of them were aware of reliability problems with information gathered from the social media.
  • 7. INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 7 The instantaneous nature of social networks and streaming and to remove the names of civilians and local informants tools permit real-time coverage of critical events such as from said documents in order not to put them at risk. natural disasters (earthquake in chili, floods in Pakistan), demonstrations (in Tunisia, Egypt, etc.), but makes media The series of close to 400,000 confidential documents be- professionals’ verification work tougher, yet essential. It is longing to the U.S. army concerning the war in Iraq which sometimes hard to separate the true from the false, which WikiLeaks released helped to expose the magnitude of is why it is important to form a network of reliable contacts the crimes which coalition forces and their Iraqi allies had who can corroborate the “scoops” made by citizen journa- committed against civilian populations since 2003. repor- lists or ordinary netizens. ters Without Borders denounced the pressure which U.S. and Iraqi authorities have placed on the website and as- any witness of a trivial or historical event becomes a ked these two governments to demonstrate transparency chance informant. Journalists are no longer the only ones and to reconsider their document classification methods. who filter information – their work is also being scrutinised Strong pressures are also being placed on WikiLeaks’ col- by their readers. laborators. Founder Julien assange has been repeatedly threatened. U.S. army Private Bradley manning, suspec- Numerous unknown factors persist in the relations between ted of being one of WikiLeaks’ sources, has been held in the new and traditional media. certain newspapers such solitary confinement since his arrest in may 2010 and is as the Washington Post prohibit their journalists from offe- facing life imprisonment. after being subjected to cyberat- ring their personal opinion on the Internet, out of fear that tacks and being dropped by several host sites, WikiLeaks it might be interpreted as the newspaper’s editorial po- called upon its worldwide supporters on 5 December licy. The New York Times and reuters have issued inter- 2010 to create mirror websites. reporters Without Borders nal guidelines for using social networks. They encourage decided to host one of them on its website. In Decem- their journalists to use them, but also make sure they are ber 2010 a number of media and websites – including Le aware of the inherent risks involved. reuters specifies that monde, El Pais and al-Quds al-arabi in morocco – were no scoops should be posted on social networks because censored for having relayed the cables. access to the the former are reserved mainly for press agency clients. website is notably blocked in china and in Thailand. The Journalists are free to share their articles online, create an site is accessible in Pakistan, but some pages containing online network, invite comments from readers and post wires about Pakistan are blocked. live tweets on the events they cover. however, they must obtain their supervisor’s permission to open a professio- reporters Without Borders wrote to the U.S. attorney Ge- nal account and they are required to maintain separate neral to ask him not to prosecute Julian assange and Wiki- personal and professional accounts. Leaks’ collaborators in view of the fact that the publishing by WikiLeaks and its five associated media of information wikileAks: inevitAble – even classified – in an effort to inform the public is a ac- tivity promoting the right to information guaranteed by the trAnspArenCy First amendment. This collaboration between the new and traditional media is exemplified by changes in WikiLeaks’ strategy. Initially internet: tHe “i love you – focused on the massive release of unedited confiden- me neitHer” quAndAry of tial documents, the website gradually developed par- tnerships with several international media leaders ranging demoCrACies from The New York Times to Le monde, and The Guardian In a historic speech on January 2010, U.S. Secretary to al-Jazeera. This strategy allowed it to combine the new of State hillary clinton referred to online freedom of ex- media’s assets (instantaneousness and a virtually unlimi- pression as the cornerstone of american diplomacy – a ted publishing capacity) with those of the traditional me- position that she reasserted in February 2011 in an ad- dia (information checking and contextualisation, thanks to dress in which she reminded her audience that “On the journalists specialised in the issues covered). more than spectrum of Internet freedom, we place ourselves on the 120 journalists of diverse nationalities worked together to side of openness.” Nonetheless, the principles raised by decipher the diplomatic cables released by WikiLeaks,
  • 8. INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 8 hillary clinton conflict with the treatment reserved for Wi- which may jeopardise the full exercise of journalists’ pro- kiLeaks. Several days prior to WikiLeaks’ publication of fessions and the transmission of information. the documents, the Pentagon had asked the media “not to facilitate the leak” of classified documents concerning the Italy, on the other hand, attempted to regulate the posting war in Iraq, claiming that it would endanger national secu- of videos online by means of a march 2010 decree. Every rity. american officials made some very harsh statements website which regularly disseminates videos must now about the site’s founder. Judicial action may still be taken submit a “Statement of activity” to the Italian Telecom- against the website. according to hillary clinton, “the Wi- munications authority (aGcOm). This decree’s scope of kiLeaks incident began with an act of theft” of government application was ultimately reduced to online television sta- documents. however she stated that “WikiLeaks does not tions and no longer applies to traditional websites, blogs, challenge our commitment to Internet freedom.” search engines, or electronic versions of dailies, magazi- nes and online betting. Security trends tend to affect the web. Blackberry maker rIm is facing growing pressures from the Gulf States, as The principle of Net neutrality seems to be increasingly well as from Indonesia and India, who are trying to gain at risk. In December 2010 in the United States, the Fe- access to the content of its secured communications on deral communications commission (Fcc) adopted va- the pretext of the fight against terrorism. rious measures concerning net neutrality which centred around two principles: that apart from national secu- nonetHeless, tHe prinCiples Internet service providers rity and cybersecurity, other must ensure transparency problems are persuading rAised by HillAry Clinton regarding their Internet ma- democratic governments to relativise their commitment ConfliCt witH tHe treAtment nagement and the prohibi- tion of any discrimination in to a free Internet. reserved for wikileAks the manner “legal” contents are transmitted. however, The Internet will be discussed during the next G20 mee- such measures could leave the door open for the filtering ting, not from the vantage point of freedom of expression, of illegal websites and thereby signal the end of the unli- but of protecting intellectual property. mited Internet. Unlike President Obama, the republican opposition opposes these measures and has challenged In the name of copyright protection, the French govern- the legitimacy of the commission’s authority to rule on this ment adopted a law which makes it possible, after issuing issue. In France, on the pretext of potential traffic satura- warnings, to suspend the Internet connection of an indi- tion, the minister of Industry, Energy and the Digital Eco- vidual suspected of illegally downloading copyrighted fi- nomy is calling for a regulation of Internet traffic and for les online. This “graduated response” scheme, known as abandoning the Net’s absolute neutrality principle. the “three strikes” and introduced by the hadopi law, has inspired other countries, notably the United Kingdom with its Digital Economy act. Spain’s Sinde Law also provides CorporAte soCiAl responsibility: measures for website blocking subject to a court order. more timely tHAn ever In addition, the French Parliament passed an internal se- Google has kept its promises and has stopped censuring curity law (“Loppsi 2”) which provides for an administrative its search engine’s results in china. Google.cn users are filtering of the web – a dangerous principle – in the name now being redirected to their hong Kong-based website. of the fight against child pornography. The australian fil- Despite the boldness of this move and the cold reception tering system, which has already been tested, has been it received from chinese authorities, the company mana- put on hold, even though the government has not totally ged to get its chinese operating licence renewed in the abandoned this project. summer of 2010. The highly controversial hungarian media law could have microsoft and Yahoo! continue to practice self-censorship some bad consequences on online media and bloggers in china. however, microsoft, after realising that the fight because it can impose penalties and contains provisions to prevent the pirating of its software in russia was a pre-
  • 9. INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 9 text used by the authorities to justify the seizure of compu- arabia, Burma, china, North Korea, cuba, Iran, Uzbekistan, ters belonging to the media and to NGOs, took measures Syria, Turkmenistan and Vietnam. They often compound In- to supply the latter with pro bono licences. These three ternet repression with strict filtering, access problems, cy- U.S. companies have signed the code of conduct of the berdissident surveillance and online propaganda. Global Network Initiative, a coalition of NGOs, companies and investment funds seeking to promote good practices Tunisia and Egypt have been dropped from the “Enemies in countries which are censoring the Net. of the Internet” list and added to the “countries under Surveillance” list The lifting of censorship in Tunisia and For the first time in Egypt, companies such as Facebook, the collapse of mubarak’s regime in Egypt are encoura- Twitter and Google have set aside their reticence and ging signs for the future of online freedom of expression in openly sided with protecting online freedom of expres- these countries, a right which ranked high in demonstra- sion. Facebook believes that “no one should be denied tors’ demands. Nonetheless, vigilance will be needed until access to the Internet.” Google and Twitter set up a sys- the censorship and surveillance apparatus has been dis- tem to enable telephone tweeting in order to bypass net mantled. The authorities must demonstrate transparency blocking in the country. YouTube made its political news in this regard. channel citizenTube available to Egyptians who want to circulate their videos. Users do not run much risk on the among the countries still “under surveillance”: australia site and should benefit in terms of image capabilities. is still considering implementing a dangerous mandatory filtering system. Bahrain is vacillating between intensifying In the last few months, cell phones – particularly during filtering and releasing bloggers. In Belarus, elections have the arab Springtime – cell phone communications have ushered in a new era of repression against the online me- been the focus of harsher controls. In countries such as dia. South Korea is tightening censorship of North Korean Libya and Egypt, telephone carriers have been forced to propaganda and maintaining a repressive legislative arse- occasionally suspend their services in some locations and nal. In the United arab Emirates, filtering and surveillance to transmit SmS to the population. In early February 2011, are getting worse. In Eritrea, the police state is keeping Vodafone, mobinil and Etisalat, pressured by the army, its citizens away from the web and monitoring netizens. In sent their Egyptian customers an SmS informing them of malaysia, bloggers – a more credible source of news than a demonstration in support of hosni mubarak being held the traditional media – are under constant pressure. In that day. The headquarters of Western foreign companies russia, the government is trying to shape the increasingly apparently protested … after the fact. influential russian net to suit its own purposes. Sri Lankan online journalists and media are still victims of violence. In These issues do not just concern companies in the new Thailand, the spring 2010 crisis has had negative conse- technologies and telecommunications sectors. PayPal’s quences for online freedom of speech. and in Turkey, online payment service, based in the United States, de- thousands of websites are still blocked and legal proce- cided to suspend WikiLeaks’ account, claiming that its dures against online journalists continue unabated. terms of use prohibit using its service “to encourage, promote, or facilitate any illegal activity.“ Visa and master- This year, several countries were added to the countries card made the same decision and suspended payments under Surveillance list, including France, which enacted a directed to the site until they have the results of internal law providing for the administrative filtering of the Net and investigations. the “graduated response” procedure as part of the autho- rities’ idea of a “civilised” Internet. The year 2010 was diffi- cult for several online media and their journalists who had tHe enemies of tHe internet to endure office break-ins, court summons, and pressure to identify their sources. 2011 list: new Additions And Venezuela was also placed “under surveillance.” Whi- repeAt offenders le there is still free access to the Internet in the country despite a climate of increasing tension between the lea- The most net-repressive countries which deserve the label dership and the dissident media, censorship tools are “Enemies of the Internet” are, once again this year, Saudi now in place in the form of an Internet gag law and the
  • 10. INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 10 growing use of self-censorship. Discussion forums are in the authorities’ line of fire. colonel Kadhafi’s Libya also joins this list. amidst the cha- os, the regime has been trying to implement a nation-wide information blackout in an attempt to silence any news about the uprising and the way it was quashed. This is by no means an exhaustive list of all attacks on online freedom of expression. In 2010, the Pakistan regi- me’s attitude has raised much concern. a judge had or- dered Facebook to be fully blocked after it posted videos considered disrespectful to the Prophet. The authorities reversed their decision, but promised to keep monitoring the web. Kazakhstan will need to be observed during the run-up to the presidential election. as of this writing, protest movements continue to sweep through the arab world and spread to other countries. They may give rise to new online mobilisations and to crackdowns by certain governments. In 2011, the Internet and new media are still experiencing shock waves from having been caught up in the momentum of all these poli- tical changes. The Internet has entered turbulent times in which its impact, power and frailties are likely to be ma- gnified. Lucie Morillon, responsible of the New media Desk Jean-François Julliard, General Secretary
  • 11. INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 11 burmA internet enemy Domain name: .mm Population: 53 414 374 Internet-users: 300 000 Average charge for one hour’s connection at a cybercafé: about 0,55 US$ Average monthly salary: about 27,32 US$ Number of imprisoned netizens: 2 Burma took drastic measures in 2010 to reorganise the country’s Internet and to arm itself with the means, at the next sign of a crisis, to cut off its population’s Web access without affecting official connections. Prior to the November 2010 elections – the first in twenty years – censors resorted to massive crackdowns, intimidation and cyberattacks to reduce the risk of any negative coverage. Tampering is now at its height. widespreAd net CensorsHip ders acquired censorship equipment and hardware from the chinese subsidiary of the Franco-american company in burmA alcatel-Lucent. On march 24, 2010, reporters Without Borders and the Sherpa association sent a letter to alca- The regime is enforcing harsh and widespread Internet tel-Lucent’s management to ask for explanations, notably censorship. The Burmese firewall restricts users to an in- about the sale in Burma Lawful Interception Integrated tranet purged of any anti-government content. Blocked hardware. The company denied this claim, insisting that websites include exiled Burmese media, proxies and it merely supplied telecom infrastructures within the fra- other censorship circumvention tools, certain international mework of a chinese-funded project. media, and blogs and sites offering scholarships abroad. Yet in an article appearing in the may 19-25, 2008 issue In an interview granted to rolling Stone magazine, ame- of the newspaper myanmar Times, a spokesman for the rican hacker and WikiLeaks member Jacob applebaum, state-controlled ISP hanthawaddy confirmed that the al- exposed the scope of the censorship by showing that only catel’s chinese subsidiary did indeed provide a website 118 of the country’s 12,284 IP addresses are not blocked filtering and surveillance system. by the regime and have access to the World Wide Web. he also showed how vulnerable the network is the event of attacks. outstAnding bloggers Despite the regime’s iron grip on the Internet, the number censors may also be counting on the complicity of Wes- of bloggers keeps rising: there are now 1,500 of them, 500 tern companies. Some Burmese Internet service provi- of whom blog regularly. When Burmese bloggers based
  • 12. INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 12 abroad are included, this number totals 3,000. Every year, human lives and property caused by hurricane Nargis. he reporters Without Borders and the Burma media asso- is serving a 35-year prison sentence for violating the Elec- ciation reward Burma’s best bloggers. Thousands of Bur- tronics act. mese netizens voted for their favourite blogs, and in late February 2010 in chiang mai, Thailand, a dozen of them On 10 November 2008, blogger Nay Phone Latt (http:// received a prize for the best Burmese blogs. myanmar www.nayphonelatt.net/), who owns three cybercafés in E-Books (http://burmesebooks.wordpress.com) was vo- rangoon, was given a jail sentence of 20 years and six ted the best general category blog. The prize for the best months for having described on his blog how difficult it is news blog went to The Power of Fraternity: (http://photayo- for young Burmese people to express themselves freely, keking.org). especially since the autumn 2007 demonstrations. accor- ding to reporters Without Borders’ sources, Nay Phone In the months prior to the November 2010 elections, some Latt was allowed to see his parents on 7 October 2010. bloggers stepped up to the plate by keeping their compa- The young blogger is said to have been deprived of his triots informed about the elections and the issues at stake. walking privileges for five months, and to have been confi- They occasionally disseminated news about the candida- ned to his cell. he is allegedly being held in a prison in te contenders and the electoral laws – critical information south-eastern Burma, along with 10 other political priso- rarely relayed by the traditional press, which is subject to ners. stringent pre-run censorship. From his prison, Nay Phone Latt – who has been denied Despite the slow connections and risks incurred, Burmese the care his health problems require – has nonetheless Internet users are still circumventing censorship, reading managed to continue his fight for freedom of expression. the foreign press, networking on Facebook or simply en- Blogger Kaung myat hlaing (“Nat Soe”), who has already joying themselves online. been given a two-year prison sentence, and is wrongfully accused of having participated in the april 2010 Water tHree netizens Are still Festival bombings, was handed an additional 10-year sentence under the Electronics act. This young man of 22 lAnguisHing in prison was interrogated for 10 days and deprived of food, water and sleep. he admitted being a member of the dissident Journalists who collaborate with the exiled Burmese me- group “Best Fertilizer.” he is charged with having taken dia and bloggers are in the authorities’ line of fire, particu- part in poster campaigns calling for the release of Daw larly since the 2007 Saffron revolution and the internatio- aung San Suu Kyi and of other political prisoners. nal outcry which followed the mass circulation of images of the ensuing crackdown. The authorities are making unabashed use of a particularly repressive law adopted in reConfiguring tHe burmese 1996, the Electronics act, to regulate the Internet, TV and internet beHind A smokesCreen radio. This law notably prohibits the import, possession, and use of a modem without official permission, under pe- In October 2010, the Burmese junta-controlled Yatanar- nalty of a 15-year prison sentence for “undermining state pon Teleport company announced the launching of the security, national unity, culture, the national economy and country’s “first national Web portal,” a would-be Silicon law and order.” Valley to be called “Yadanabon cyber city.” The Burmese military junta considers netizens enemies of In an exclusive report compiled by local sources entitled the state. Three of them are in prison for having expressed “National Web portal – Development or repression?” re- themselves freely on the Web. porters Without Borders and the Burma media association express concerns that the new Burmese Internet, billed by Zarganar, a blogger and comedian known as the “Bur- the government as a huge step forward, may actually be mese chaplin,” was arrested on 4 June 2008 after having used to bolster the surveillance and repression already testified to foreign media outlets – and notably to the BBc imposed on Burmese netizens, while reserving the bene- World Service – about the Burmese government’s poor fits of faster and improved access for members of the re- management practices and guilty silence over the loss of gime.
  • 13. INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 13 The deployment of fibre-optic cables will not only allow In- ternet access but also Voice over Internet Protocol (VoIP) unreliAble internet ConneC- and Internet Protocol Television (IPTV) services because tions in tHe run up to tHe 7 it will increase available bandwidth. november 2010: slowdowns, Burmese Internet users will be allocated to three Internet CyberAttACks And tAmpering service providers, instead of the two they now have. One will be reserved for the Burmese defence ministry, one for The elections initiated by the military junta had no credibi- the government and one for the public. Under this system, lity, mainly because of the Burmese and foreign media’s the government will be able to totally or partially block the lack of freedom. Despite the constraints, the Burmese population’s access without affecting government or mili- media did their best and managed to offer the public a tary connections. During the 2007 Safran revolution, sin- variety of news and analyses unmatched since the last ce all three “categories” were using the same providers, elections in 1990. however, with all the preceding cen- when the authorities disconnected the Internet to prevent sorship, intimidations, detentions and expulsions of forei- civilians from sharing photos of the ensuing crackdown, gn journalists, stricter liberticidal laws and unreliable Inter- members of the military and government were also cut off. net connections, the conditions for a free election were far What is more, he new architecture will allow the defence from present. ministry to directly control Internet traffic at the point of entry into Burma. The military junta made it a requirement for political par- ties wishing to publish information or their programmes The government and military will be likely to enjoy faster to first have them approved by the Press Scrutiny and and better Internet performance than the average user, registration Board within 90 days after registering with since ISPs will get an “equal share” of bandwidth in each the Election commission. The regime announced on 17 of the three categories, even though the number of users march 2010 that the publishing of pamphlets, newspa- will vary greatly from one ISP to the next. The cost of the pers, books or other election-related printed material, now new service, which will be passed on to the public, may falls under the 1962 Printers and Publishers registration also curb any growth in the Internet penetration rate, cur- act, which provides for sentences of up to seven years in rently at about 2% in a country in which the average salary prison for disseminating information which is critical of the is 27 U.S. dollars and Internet cafés charge 54 cents per government or disturbs public “tranquillity.” connection hour. a drastic slowdown in Internet connections was noted in This national portal will supposedly offer an email service early October, more than a month after the elections, indi- (Ymail) and a chat service (Ytalk) as alternatives to Gmail cating the authorities’ resolve to tighten their control over and Gtalk, making it even easier for the authorities to mo- information. "I can no longer connect to my Gmail account nitor users’ online communications. using proxies. access to all websites based abroad has become terribly slow,” a rangoon-based journalist told Lastly, undetectable Internet “sniffers” will be placed on reporters Without Borders. according to Irrawaddy ma- the server reserved for the public to retrieve diverse confi- gazine, the capital’s cybercafés had closed in advance of dential data. The military junta’s ability to spy on netizens the elections. and dissidents, thereby restricting freedom of speech even further, will be greatly enhanced. This slowdown began after cyberattacks in the form of dis- tributed denial of service (DDoS) affected several exiled The Internet access difficulties experienced by local In- Burmese media websites such as Irrawaddy and the De- ternet users during recent key events attest to the new mocratic Voice of Burma (DVB). portal’s timely arrival. Just a few days prior to the legislative elections, the Bur- mese Internet network experienced a massive cyberat- tack. The attacks began around 25 October 2010 and gradually increased in number and severity, causing the country to be regularly disconnected from the Web for se-
  • 14. INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 14 veral days. They continued to occur until the elections Daw aung San Suu Kyi is aware that her communications were over, which made it extremely difficult for journalists will be closely monitored and that the regime may decide and netizens to transmit videos and photos and to do at any time to suspend her Internet access. She has al- their jobs. legedly stated that she has nothing to hide. The government shifted the blame to hackers whom they claimed launched the DdoS attacks on the country, but according to Burmese sources contacted by reporters Without Borders, most of the attacks were allegedly laun- ched by government agents to justify cutting off the Inter- net. The DDoS's were aimed at Internet service provider myanmar Post and Telecommunications and constituted – according to the american IT security firm arbor Networks – an onslaught ”several hundred times” more than enough to overwhelm the country’s terrestrial and satellite network. They reportedly reached 10 to 15 GB of data per second, a magnitude much greater than in the highly publicised 2007 attacks against Georgia and Estonia. During the 2007 Safran revolution, Burmese netizens had circulated news and videos on the authorities’ bloody crac- kdown on monks and demonstrators. The regime subse- quently cut off Internet access for several days. connec- tions are also slowed on key dates such as 8 august – the anniversary of the 1988 political uprising – and during the 2009 trial of dissident Daw aung San Suu Kyi. after being released on 13 November 2010, the latter announced that she intends to set up a website to showcase her views and those of her political party, the National League for Democracy (NLD) dAw Aung sAn suu kyi: free And ConneCted? The well-known Burmese dissident and recipient of the Nobel Peace Prize, who was cut off from all means of com- munication during her years under house arrest, now has an Internet connection in her home via the state-run ISP, Yatanarpon Teleport. She has declared that she intends to make full use of the Internet and social networks, parti- cularly the Twitter micro-blogging site, in order to more ef- fectively reach Burmese youths in the country and abroad and to hold online discussions. This latter initiative may prove challenging to achieve right now due to the poor quality of the Internet infrastructure. as for the dissident’s collaborators, they remain discreet about their role in de- veloping the NLD’s online network, as they are subject to a severe penalty under the Electronics act.
  • 15. INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 15 CHinA internet enemy Domain name : .cn Population : 1 340 000 000 Number of Internet users : 457 000 000 Average charge for one hour’s connection at a cybercafé : around 2 U.S. dollars Average monthly salary : between 220 and 300 U.S. dollars Number of imprisoned netizens : 77 The Chinese government, exasperated that dissident Liu Xiaobo was awarded the Nobel Peace Prize and concerned about spill-over effects from the Tunisian and Egyptian Revolutions, has drastically tightened its grip on the Web in order to trans- form it from a protest medium to a tool for political control. Any attempt to challenge the country’s stability has been quashed by harsh repression. The regime is taking aim at social networks, particularly micro-blogging websites and online anonymity. New laws now regulate the Web, while Chinese Internet users continue to discuss banned topics and to mock censors. CensorsHip to ensure known to use the pretext of fighting pornography or the crackdown against the “dissemination of false news” to regime stAbility justify the filtering. The man who designed the Great Firewall, Fang Binxing, ThE “gREAT FiREwAll”: READy TO SpRing inTO ACTiOn who is also President of the Beijing University of Posts and Telecommunications, defended his creation in early 2011, china has the world’s most consummate censorship sys- stating to the newspaper Global Times that censorship met tem. The Great Firewall combines UrL filtering with the an “urgent” need. although he had opened a micro-blog censoring of keywords considered “sensitive,” ranging account on sina.com, the account was closed a few days from “Tiananmen” to the “Dalai Lama” to “democracy” later after thousands of netizens left comments blaming and “human rights.” censorship is institutionalised and him for the control measures he had made possible. managed by several ministries and administrations. In ad- dition to filtering UrLs, the authorities are monitoring the The main news sites, such as the chinese state-controlled largest blog and micro-blogging platforms, from which media, regularly receive oral and written directives from they are removing numerous posts and comments. as- the Department of Propaganda specifying what topics sistance from foreign companies – mainly in the form of can, or cannot, be covered and under what conditions. Yahoo ! and microsoft self-censored search engines – is For example, the Department’s directives of January 2011 making their job that much easier. The regime has been imposed an information blackout on social and economic
  • 16. INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 16 problems and specifically on price increases, anti-go- censorship does not stop there. On 20 February, the vernment demonstrations and the real estate market, to authorities deployed security forces to Beijing and Shan- “reassure” the chinese people and defend the regime’s ghai following an online call for a “Jasmin revolution” and concept of “fair growth.” arrested people suspected of organizing it. Since then, the term “Jasmin” has joined the chinese Internet’s long TighTEning CEnSORShip in ThE nAME and ever-growing list of censored words, such as “Tuni- OF nATiOnAl SECURiTy sia,” “Egypt,” and “democracy.” On 29 april 2010, china adopted an amendment to the CEnSORS ATTACK ThE nOBEl pEACE pRizE State Secrets Law which requires Internet and telecom companies to cooperate with the authorities on matters The authorities’ indignation over the awarding of the Nobel relating to national security. Such companies must now Peace Prize to intellectual dissident Liu Xiaobo has trans- block the transmission of vaguely defined state secrets lated into harsher online censorship and acts of intimida- over their networks, keep connection logs and alert the tion against supporters of this human rights activist. competent authorities to any possible violations. They may also be forced to suppress certain contents. The government reacted by doing everything it could to censure the topic on the Web in order to prevent chinese This amendment thus seems to be yet another warning citizens from becoming aware of the historical import of sent to netizens to induce them to practice more self-cen- this event. chinese media coverage of the awarding of sorship, and an attempt to give the international commu- the Nobel Peace Prize to the jailed dissident has been nity the illusion of legality, since companies are already dominated by the Beijing authorities’ hostile reaction. The cooperating with the authorities in matters concerning na- national TV network and most of the newspapers – even tional security. the most liberal – did not even mention it, and for good reason: on 8 October 2010, when the laureate’s name was CEnSORED REVOlUTiOnS announced, the newsrooms received a clear order from the Department of Propaganda that it was “forbidden to The Tunisian and Egyptian revolutions and their potential relay information” about the topic (不能跨范围转载). a few domino effect are greatly troubling to chinese leaders, chinese foreign-language media, including the English- who took prompt measures to restrict online discussions language version of the nationalist newspaper Global Ti- on such topics, in order to prevent the population from mes, and the French and English editions of the People’s being influenced by them. Daily reported the government’s reaction. The Youth Daily ran an article headlined "chinese dissident Liu Xiaobo no- On 28 January 2011, three days after the Egyptian upri- minated: an insult to the Nobel Peace Prize." Foreign TV sing began, china began censoring netizens’ searches programmes are still being jammed whenever they broad- by blocking results linked to the keyword “Egypt” on the cast any news about Liu Xiaobo. micro-blogging Twitter website and its chinese equi- valents, sina.com and sohu.com. In response to this Internet censorship has not abated. On some of the major keyword, users receive the following message: "Under news sites, Sina and Sohu in particular, no content can existing laws, the result of your search cannot be commu- be accessed which directly mentions Liu Xiaobo. On the nicated.” On Twitter as well as on Facebook, both of which Baidu search engine, some results do refer to the awar- are blocked in china, the hashtag #jan25 referring to the ding of the Nobel Peace Prize, but the corresponding me- Egyptian demonstrations of 25 January of 2011 quickly dia pages are usually blocked. The official network ccTV spread around the Web. The chinese communist Party remained silent about Liu Xiaobo and opened its evening seems to be more fearful than ever of political reforms, news programme of 8 October with a report about torren- democratic demands and “breaches of public order.” On tial rains falling on hainan Island. 30 January 2011, news wires about Egypt issued by Xin- hua, the official chinese press agency, were reportedly Some bloggers, such as the writer han han, have protes- also suppressed. ted by posting empty messages to symbolise the impos- sibility of discussing what happened to Liu Xiaobo (http:// www.rue89.com/node/170478). The chat forum 1984bbs,
  • 17. INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 17 used by many journalists, was closed by its administrators In the last few months, the authorities launched a new of- after the latter were pressured by police. Twenty-three reti- fensive against the proxy servers used by chinese Inter- red communist Party officials and intellectuals have been net users to bypass the “Great Firewall.” access to Free- urging the country’s highest authorities to carry out poli- gate and Ultrareach, two of the most popular proxies, was tical reforms and to comply with article 35 of the china’s made very difficult for several days as from 27 august constitution, which guarantees free speech and media 2010. To counter this new wave of blockings, their develo- freedom. This appeal was systematically removed from pers reacted by making updated versions of their software chinese blogs and websites where it had been posted. available to netizens. although within one hour of the announcement of the No- bel Prize award related online messages remained acces- sible for less than five minutes before being deleted. tHe regime’s internet CHArm offensive It has also been impossible to send an SmS containing the characters found in “Liu Xiaobo” or “Nobel Prize.” The inTERnET whiTE pApER micro-blogging website Weibo has also been censored. Yet on Twitter, which is blocked in china, thousands of en- On 8 June 2010, the chinese council of State’s Informa- thusiastic messages from netizens have been posted sin- tion Bureau published a “white paper” on the Internet, ce the announcement. renowned artist ai Weiwei stated which reasserts the need for online censorship in china in that it was china’s happiest day in the last sixty years. the name of “respect for local laws” and “maintaining sta- bility.” Far from challenging the authorities’ policy towards moreover, a short time before the Nobel Peace Prize was the Internet, or the upsurge in online censorship, it merely awarded, a bogus invitation to attend the 10 December adds to the Beijing leadership’s usual rhetoric. While the 2010 ceremony in Oslo containing a very powerful “Trojan government’s resolve to broaden the chinese people’s horse” computer virus circulated by e-mail. The computer access to the Internet is commendable, it regretfully does security firm F-Secure stated that it was unable to identify not encompass access to the World Wide Web, but so- the origin of these cyberattacks. Two weeks before the lely to the chinese Web, complete with its sophisticated virus appeared, the Nobel Peace Prize recipient’s website filtering system that blocks political, social or other news had been the target of an initial hacker attack. which the authorities deem undesirable. ThE hEighT OF CEnSORShip: CEnSORing iS A “nATiOnAl” SEARCh EnginE BEing DEVElOpED ? ThE DEBATE On inTERnET CEnSORShip In august 2010, the official chinese press agency, Xinhua, While censoring an article on censorship may seem to and state-owned china mobile – the largest chinese tele- be business as usual in china, the Diyi caijing Zhoukan communications operator –signed an agreement to create case (第一财经周刊- cbnweek.com) proves yet again the a joint venture called the Search Engine New media Interna- extremes to which the chinese propaganda apparatus will tional communications co. Its purpose is to launch a search go to ensure that any discussion of Internet censorship in engine directly controlled by the state which would enable china is nipped in the bud. chinese authorities to expand their control of the Internet by taking advantage of the mobile phone market boom. On 24 November 2010, the authorities banned the reprin- In addition, the regime is encouraging state-owned com- ting or posting of an article by Shanghai business weekly panies such as ccTV or Xinhua to strengthen their online Diyi caijing Zhoukan, which was a behind-the-scenes look presence. at Beijing’s Bureau of Website administrators (北京市的网 管办), one of the entities responsible for online censorship. In the meantime, the “50-cent party,” named after the Net The report was quickly withdrawn from the website cb- surfers paid to post pro-government online comments in nweek.com. The article provides a detailed description of order to “influence public opinion,” is still in operation. how the Beijing Bureau of Website administrators, a go- vernment agency, controls online information and shuts down websites in order to stifle any debate about social and political issues.
  • 18. INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 18 A winDOw OF OppORTUniTy FOR OnlinE DiAlOgUE system for users of online forums.” Internet users are cur- BETwEEn inTERnET USERS AnD ThE AUThORiTiES? rently required to register before posting comments on these sites, but they can do so using a pseudonym. according to Some local and regional officials are already using the Wang, now that anonymous posting on key news and com- Web to convey their messages and address criticisms. In mercial websites is banned, the next step is to extend the September 2010, the website Zhitong Zhongnanhai, na- system to online forums and chat rooms. med after the government’s headquarters in central Bei- jing, was launched as a way for Internet users to send their cellular telephony is not exempt from this effort. chinese messages to the national leadership. One week after its authorities are tightening their grip on prepaid cell phone launch, over 20,000 comments had already been posted communications. a new regulation which entered into effect for President hu Jintao alone on subjects such as real es- on 1 September 2010 now requires users of prepaid cell tate price increases, corruption, pollution and violations of phones to provide detailed personal information by presen- civil liberties. ting their identity card when buying SIm cards. anyone who already owns one has three years to register. however, this free-speech window has been subject to 26 rules ever since. Netizens may not, for example, post The newspaper Global Times claims that 800 million telepho- comments which could jeopardise the state’s honour and ne numbers are already assigned to cell phones now used interests, or disrupt social order by advocating for the right in china, of which 320 million were acquired anonymously. of association, demonstration, or assembly. card sellers, mostly in newsstands, will be responsible for collecting photocopies of the buyers’ IDs and for recording any Internet user who sends a disagreeable comment fa- their contact information in the centralised cell phone user ces penalties which can be as harsh as the permanent name data collection system. The ministry of Industry and termination of his or her IP address. aware that it is pro- Information Technologies (mIIT) justifies this initiative by hibited on this government website to send a message claiming that it is part of the government’s campaign against from an IP address located outside of china, chinese ne- spams and fraud. In actuality, this new rule may potentially tizens therefore cannot do so anonymously by using proxy compromise the cell phone users’ personal data protection, servers which assign them a foreign IP address. Even in since it enhances the authorities’ ability to monitor calls, cybercafés, every user is systematically asked to present SmSs, and data exchanges, thereby facilitating the identifi- an ID. cation of individuals who criticise or demonstrate against the government. Despite this risk, some critical comments do manage to slip through the Net’s filter. "When will prices go down? The only thing that isn’t going up is salaries!” "comrade tHe AutHorities tAke Aim At hu, don’t you think it interesting that I have left so many miCro-blogging messages, yet they all have been harmonised? can’t you let us tell the truth?” one netizen asked. The govern- In the summer of 2010, the authorities launched a new ment’s website address is: http://cpc.people.com.cn/ crackdown on online networking tools, especially micro- GB/191862/191865/index.html blog services. On 15 July 2010, several dozen micro-blog CrusAding AgAinst online accounts were closed, among them those of blogger Yao Yuan and lawyer Pu Zhiqiang. Four of the leading chinese And Cell pHone Anonymity micro-blogging platforms, Netease, Sina, Tencent and Sohu, were inaccessible for several hours or days, dis- In February 2010, the chinese ministry of Technology had playing notices that the site was down for maintenance. already announced that anyone wishing to create an Internet website should register with Internet regulators in person and around the same time, censors implemented an additional present an ID. control level. In august 2010, chinese authorities ordered micro-blogging websites to hire a “self-discipline com- In may 2011, Wang chen, the Department of Propaganda’s missioner” to be responsible for censorship. according assistant Director, quoted in an article published on 5 may to the official press, the results of the first micro-blogger by china Daily: “We are exploring an identity authentification self-censorship test conducted in January 2010 in hebei
  • 19. INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 19 province were deemed satisfactory enough to convince the Yahoo! e-mail boxes of at least ten foreign journalists the authorities to extend its application in Beijing to eight based in china and Taiwan were hacked. Independent micro-blogging platforms: Sina, Sohu, NetEase, Iphonixe, news sites such as Boxun have been under constant at- hexun, Soufang, 139mobile and Juyou9911. The latter hi- tack. red such commissioners and asked them to monitor and censor anything which could threaten the country’s secu- In secret documents released by WikiLeaks, a “chinese rity or the society’s stability. They are focusing on content source” cited by U.S. diplomatic sources confirmed the dealing with illegal activities, pornography and violence, chinese government’s involvement in the computer hac- as well as unsubstantiated rumours and politically sen- king of Google. These revelations have raised conside- sitive issues. Each commissioner has been assigned a rable concern about spying methods used on journalists website whose content he or she is responsible for. and human rights activists working on china. The diplo- matic cable cited by the New York Times specified: “The Google hacking was part of a coordinated campaign of impACt of tHe google CAse computer sabotage carried out by government operati- ves, private security experts and internet outlaws recrui- ted by the chinese government." STOpping CEnSORShip The U.S. firm Google announced on 22 march 2010 its decision to put an end to censorship via the chinese ver- web CensorsHip: sion of its search engine, google.cn. Now, when users click on the home page of google.cn, they are redirected A trAde bArrier? to Google.com.hk, where they have access to uncenso- Internet censorship is not just a human rights issue. It also red content in simplified chinese characters. This website negatively impacts trade and business through the lack of was intermittently censored in late march 2010. Despite access to reliable information. Online censorship has also tenser relations with the chinese authorities following this become a way to discriminate against foreign – particularly decision, the company did manage to get its operating american – companies, and to afford chinese companies license there renewed in July 2010. It will maintain its re- preferential treatment, which led two experts of the European search and development activities in china, and keep on centre for International Political Economy to label it, in The selling advertising spots on Google.com to chinese com- Wall Street Journal, “disguised protectionism.” panies. Google may have set an example for others: the U.S. In- The European Union entered the debate in 2010, as the cen- ternet company GoDaddy announced on 24 march 2010, sorship spread to mobile telephones – a sector in which Eu- during a U.S. congressional hearing, that it would stop of- ropean companies do considerable business. In may 2010, fering its clients new chinese domain names ending in the European commission Vice President and Digital agenda .cn suffix because of the radical controls measures being commissioner Neelie Kroes called this censorship a “trade implemented by chinese authorities. barrier” and said it is an issue that should be tackled within the World Trade Organization. ARE ChinESE AUThORiTiES DiRECTly iMpliCATED in hACKing ACTiViTiES? tibet And XinjiAng: sensitive Google’s decision apparently was reached in the wake of cyberattacks launched from china against the Gmail provinCes, speCiAl treAtment accounts of several dozen human rights activists. Some twenty media and technology sector companies are said AT lEAST 50 TiBETAnS SEnTEnCED FOR to have also been victims of these hacker attacks and of hAVing SEnT nEwS ABROAD intellectual property infringement. The repression has never stopped since the march 2008 cyberattacks were still going on in early 2010. The Forei- uprising in the Tibetan regions. Since then, at least 50 gn correspondents’ club of china (Fccc) reported that Tibetans have been arrested and some sentenced to lengthy prison terms for having sent information, photos
  • 20. INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 20 and videos abroad. The latest to be convicted, Dasher, is one of the co-writers of charter 08, which calls for more was given a 10-year prison sentence on a charge of “se- freedoms and an end to the one-party rule in china. his paratism” in February 2010. biography is available at: http://en.rsf.org/chine-liu-xiaobo- biography-28-10-2010,38704.html, and charter 08 can be XinjiAng: RECOnnECTED TO ThE nET, found at: http://www.nybooks.com/articles/archives/2009/ BUT STill plAgUED By pURgES jan/15/chinas-charter-08/ The arrests continue. cut off from the world for nearly 10 The pressures being placed on Liu Xiaobo’s relatives and months following the social unrest in July 2009, the Xin- supporters, as well as on all defenders of freedom of ex- jiang autonomous region was then subjected to a dis- pression, have not lessened in china since this announce- criminatory shut-down of Internet access, and was only ment was made. Beijing tried to dissuade diplomats from reconnected to the chinese Internet on 14 may 2010. attending the Nobel Prize award ceremony in Oslo on 10 December 2010 and prevented several human rights ac- meanwhile, Xinjiang’s Internet users are subject to filtering tivists from leaving the country. Liu’s wife, Liu Xia (刘刘), is by the chinese Firewall, and the websites and blogs dea- under house arrest and her relatives are not permitted to ling with the Uyghur issue are still a favourite target for leave china. The Nobel committee awarded the prize to censors. many of them are still blocked – including the an “empty chair.” sites of the Uyghur american association (Uaa) and the Uyghur human rights Project (UhrP) – because they re- am ever-growing number of Liu’s supporters are being fuse to toe the official Beijing Party line. Banned keywords arrested. Since mid-October 2010, according to the in- include "rebiya Kadeer" (the Uyghur human rights acti- dependent chinese PEN centre, at least 40 human rights vist), "World Uyghur congress", "Uyghur human rights activists and journalists have been arrested or brought in Project" and "East Turkestan Independence.” for questioning throughout china for attempting to cele- brate the news of Liu’s award. Three of them were detained Salkin website collaborator Gulmire Imin was sentenced for at least eight days: Wang Lihong, Wu Gan and Zhao to life behind bars in april 2010 for having “revealed” state changqing. Formerly imprisoned journalist Liu Jingsheng secrets, for “organising a demonstration” and for “sepa- said that two police officers had been posted outside his ratism.” home. Liu Xiaobo supporters without Beijing residence permits have been sent back to their home province. On 21 July 2010, in Urumqi, three Uyghur webmasters, Dilshat Perhat, Nureli and Nijat azat were tried in camera for having endangered state security and for the content Guo Xianliang, an Internet writer known by his pen name, of their publications, which the chinese government dee- "hermit of Tianshan mountain" has been behind bars since med to be politically sensitive. They were sentenced, res- 28 October after being arrested by the Guangzhou autho- pectively, to five, three and ten years in prison. rities for passing out flyers with pictures of Liu Xiaobo in the streets and parks of canton. human rights activist Liu Di, known by her pen name, "Stainless Steel mouse", liu XiAobo (刘哓波): along with about 100 other people, were placed under house arrest and strict police surveillance. tHe world’s only nobel peACe prize reCipient still beHind bArs A few releAses offset On October 8, the Nobel Peace Prize was awarded for by new ConviCtions the first time to a chinese citizen residing in china, even The sentences of some “4 June dissidents” who had par- though he has been serving an 11-year jail sentence in ticipated in the June 1989 Tiananmen Square demons- Jinzhou Prison (Liaoning Province). Very moved when he trations were shortened (http://www.duihuanews.org/). learned the news, intellectual and human rights activist Liu cyberdissident Li Zhi, a former government official sen- Xiaobo dedicated this prize to “the lost souls of 4 June” – tenced in December 2003 to an eight-year prison term for the date of the Tiananmen Square massacre. Liu Xiaobo “subversive” use of the Internet, was released last Novem-
  • 21. INTERNET ENEMIES / 12tH mArCH 2011/ WORLD DAY AGAINST CENSORSHIP ///////////////////////////////////////////////////////////////// 21 ber, nine months early. he is one of the netizens condem- a hospital in Ningbo of complications from a disease for ned on the basis of information originating from their e- which he had never been treated during his three years mail accounts, which Yahoo! had provided to chinese behind bars. Li hong was the chief editor of aiqinhai, a authorities. literary online magazine (http://www.aiqinhai.org/) closed by the authorities in 2006 for disseminating “content cri- Dissident Qin Yongmin was freed after serving his full 12- tical of the chinese government.” he also contributed to year prison sentence, but is still kept under close watch. news websites Boxun and Epoch Times. Writer Guo Xianliang, who had been arrested in canton for having passed out flyers supportive of Liu Xiaobo, was The lives of several other netizens are hanging in the ba- released on 26 November. his friends and family report lance. The chinese authorities should have learned their that he was able to safely return to Kunming. lesson from this tragedy and immediately released all other netizens with health problems, particularly huang Qi, Fan however, on 9 June 2010, the Sichuan Provincial high Yanqiong, cheng Jianping, hu Jia and Yang Tianshui. People’s court upheld the decision made against activist and environmentalist Tan Zuoren, who had been senten- huang Qi, arrested in 2008, was sentenced to three years ced to a five-year prison term for "inciting subversion of behind bars for having posted articles online about the state power" and to a three-year deprivation of his political consequences of the Sichuan Province earthquake. he rights. he had been arrested in march 2008, after urging is said to have stomach and chest tumours which are not chinese netizens to travel to Sichuan Province to look into being treated properly, and to have been tortured and de- the situation of the earthquake victims’ families. prived of sleep. For the first time, an ironic tweet earned a netizen one cheng Jianping was sentenced on 15 November 2010 to year of forced labour. On 15 November 2010, cybernaut a year of “re-education through work” in a labour camp cheng Jianping was sentenced to serve a year in the Shi- for having relayed a comment on Twitter about tensions bali river “re-education through work” labour camp for between china and Japan. She is suffering from tubercu- women in Zhengzhou, henan Province, for “disturbing lous pleurisy, a chronic lung condition. social order.” her lawyer, Lan Zhixue, appealed this ad- ministrative order, issued without any form of trial. cheng Netizen Fan Yanqiong, arrested in 2009, was given a two- Jianping was arrested on 28 October – on what would year prison sentence in april 2010 for having reported on- have been her wedding day – and charged with having line the case of a raped and murdered woman in Fujian retweeted, on 17 October 2010, a satirical message about Province. at the time of her trial, she had to use a wheel- anti-Japanese demonstrations taking place in china, chair and an oxygen mask because she was suffering using her pen name “Wang Yi” (@wangyi09) on the Twit- from high blood pressure, muscular atrophy and severe ter website. She has more than 5,000 netizen followers on pains in all her limbs. this social network. The message suggested that young chinese protesters should attack the Japanese pavilion Blogger and human rights activist hu Jia got a three-year at the Shanghai World Expo and mocked the excessive prison sentence in 2008 for “inciting subversion of state tension between the two countries. power” after posting articles online and granting inter- views to the foreign media. he has cirrhosis of the liver, endAngered netizens: CriminAl but is not receiving the medications he needs. detentions And moCk releAses FORCED DiSAppEARAnCES? CyBERDiSSiDEnTS DETAinED DESpiTE BEing gRAVEly ill Geng he, the wife of chinese human rights activist and lawyer Gao Zhisheng, has never stopped demanding an The incarceration of certain netizens can sometimes have explanation for the disappearance of her husband, one of a tragic outcome. Shortly after having finally been gran- the first “barefoot lawyers” who has been missing again ted the medically motivated release he had repeatedly re- since april 2010 . quested, cyberdissident Zhang Jianhong – better known by his pen name Li hong – died on 31 December 2010 in