Sei sulla pagina 1di 5

Destabilizing websites

By Lokman Tsui. Annenberg School for Communication, University of Pennsylvania


Last updated March 16, 2005

Websites have been a prominent locale for mobilization. Mobilization efforts are, at times,
considered destabilizing by a particular government. Here we are concerned primarily with two
categories of such websites: a) “destabilizing websites” (i.e. sites considered to be such) the
servers of which are located within the geographical of the government that perceives itself as
threatened and b) such websites that are within the jurisdiction of another government. The latter
category is particularly interesting because they lead to requests by the “threatened government”
for the host government. Internet sites of the Falun Gong movements, for example, fall within
both categories (located within and outside China). This paper will provide a comparative
analysis of the different methods employed by governments to counter in specific these
destabilizing websites.

Case Studies

We have identified a sample of websites that arguably fit the template. Some may not be
appropriately viewed as imminently destabilizing. Obviously, there are a great many non-visible
examples where Internet sites are closed down within authoritarian regimes. It is harder to
enumerate sites where one state requests another state to take action. Summed up, they concern:

Date: May 13, 1999


Government seeking stability: UK
Party causing instability: American-based internet website
Location of website: US
Content of website: top-secret details of British intelligence agents
Countermeasure by government: requests to remove information, appeal to media not to
publish the address of website, or its contents

Date: August 30, 2000


Government seeking stability: Germany
Party causing instability: US internet service providers
Location of website: US
Content of website: Nazi propaganda
Countermeasure by government: request by Dusseldorf District Government President to
prevent access to websites. Migration to US servers is
mentioned as cause of fining German servers
DM500,000 for hosting Nazi propaganda.

Date: March 7, 2001


Government seeking stability: Japan
Party causing instability: Chinese hackers
Location of website: Saitama, Japan
Content of website: critical towards Japanese government, hacked website
showing Chinese tank, Chinese messages about Diaoyu
Islands
Countermeasure by government: website closed down

Date: September 1, 2001


Government seeking stability: Singapore
Party causing instability: Foreign Political Websites
Location of website: Outside Singapore
Content of website: Political websites
Countermeasure by government: Requirement to register, failure leads to blockade.

Date: October 12, 2001


Government seeking stability: US
Party causing instability: IRAradio.com
Location of website: US
Content of website: terrorist website
Countermeasure by government: FBI closed it down

Date: November 1, 2001


Government seeking stability: South Korea
Party causing instability: North Korean website
Location of website: China
Content of website: offers e-mail exchange and e-commerce
Countermeasure by government: approval of government required to subscribe to site

Date: March 28, 2002


Government seeking stability: Bahrain
Party causing instability: opposition groups, Freedom Movement
Location of website: London, UK
Content of website: inciting sectarianism, offensive content
Countermeasure by government: blockades of London-based servers

Date: April 24, 2002


Government seeking stability: China
Party causing instability: ABC (Australian Broadcasting Corp)
Location of website: Australia
Content of website: political sensitive to Chinese viewers
Countermeasure by government: Chinese foreign ministry spokeswoman denied
government involvement

Date: February 4, 2003


Government seeking stability: Kyrgyzstan
Party causing instability: Opposition website (Kyrgyzstan Democratic Movement
Party?)
Location of website: Kyrgyzstan
Content of website: critical of government, including shortcomings in the
official draft version of the constitution
Countermeasure by government: website shutdown without explanation by ISP

Date: September 17, 2003


Government seeking stability: Uzbekistan
Party causing instability: Ozod Ovoz website
Location of website: Uzbekistan
Content of website: critical of Uzbek president, serves as public outlet for
online protests about lack of freedom of expression
Countermeasure by government: blockade
Date: September 23, 2003
Government seeking stability: India
Party causing instability: Meghalaya’s Khasi tribe, militant group
Location of website: India
Content of website: espousing the cause of the tribe
Countermeasure by government: blockade, to ensure “balanced flow of information”, not
censorship

Date: December 21, 2003


Government seeking stability: Malaysia
Party causing instability: opposition parties
Location of website: UK
Content of website: inflammatory material, support for former DP Minister
Anwar Ibrahim
Countermeasure by government: complaints lodged, unknown by who
Update: December 24, 2003 reopened?

Date: May 14, 2004


Government seeking stability: Malaysia
Party causing instability: website of Acme Commerce
Location of website: Malaysia
Content of website: links to terrorist groups, showing beheading of US
citizen in Iraq
Countermeasure by government: ordered ISP to close down website

Date: July 11, 2004


Government seeking stability: South Korea
Party causing instability: (alleged) Supreme Headquarters of Armed Islamic
Warriors
Location of website: Iraq
Content of website: threat by militants to bomb South-Korean ships
delivering US military supplies to Middle East
Countermeasure by government: security officials implemented “preventive measures”

Date: September 14, 2004


Government seeking stability: Russia
Party causing instability: kavkazcenter.com
Location of website: Lithuania
Content of website: support for radical field commander Shamil Basaev (his
personal website is already blocked)
Countermeasure by government: Lithuanian ambassador summoned to Russian Foreign
Ministry to explain failure of closing down website
Update:
Date: November 16, 2004
Reaction to countermeasure: Relocation of server to Sweden
Countermeasure by government: Swedish ambassador called to discuss website
Extra: Website previous on Finnish server (October 2004)

Date: October 16, 2004


Government seeking stability: US (FBI)
Party causing instability: Indymedia
Location of website: London, UK
Content of website: independent media
Countermeasure by government: FBI seizure of servers

Date: February 2, 2005


Government seeking stability: US
Party causing instability: Iran blogs
Location of website: Dallas, US
Content of website: Iran’s dissenting and liberal voices
Countermeasure by government: shutdown

Discussion

When located inside the legal jurisdiction, it is generally easier to shutdown the website, as
opposed to blocking or filtering. In contrast, when outside the legal jurisdiction, the government
of the country hosting the server is sometimes requested to shutdown the website but more often
the government seeking stability will block or filter the website.

If “target” governments do not get the active participation of “server host”, then they resort to
more covert means to disable a foreign website. For example, the Chinese government has been
known to have launched Denial-of-Service (DOS) attacks against servers hosting Falun Gong
websites located in the United States and Canada. These attacks were only by accident found to
be initiated by the Chinese government. Because of the illegality of the technique, covertness is a
likely characteristic.

Some resources are available for further research. Some general websites on regulation,
censorship and liability are at: : http://qlinks.net/quicklinks/, especially the sections concerning
“content regulation”, “liability, jurisdiction and applicable law”, “racism and xenophobia”. There
is an empty section on the website labelled “terrorism”. Terrorism, an ultimate description of a
destabilizing activity, is a keyword to look out for when thinking about destabilizing websites.
Since 9-11, government measures to act against opposite forces have gained more currency when
posed under the label of ‘terrorism’. Other websites include:

Caslon Analytics
http://www.caslon.com.au/censorshipguide.htm
This guide explores censorship, regulation of offensive material and free speech in the digital
environment. It includes discussion of freedom of information, archives and whistleblowing
legislation. Also see http://www.caslon.com.au/governanceguide5.htm

ICE: Internet Censorship Explorer


http://ice.citizenlab.org/
The Internet Censorship Explorer (ICE) is a blog maintained by the Citizen Lab's technical
research director, Nart Villeneuve. ICE is an incubator where Nart explores the politics of
technology (hacktivism, infowar/cyberterrorism and Internet filtering), develops ideas for future
Citizen Lab projects, posts proof of concept code and any other snippets of raw data that don't
really have a place anywhere else. ICE also contains bleeding edge Internet filtering and
censorship research related to the work of the Citizen Lab and the OpenNet Initiative including
the development of censorship circumvention technology.

Also see the OpenNet Initiative: Documenting Internet Content Filtering Worldwide
http://www.opennetinitiative.net/index.php
The ONI mission is to investigate and challenge state filtration and surveillance practices. “Our
approach applies methodological rigor to the study of filtration and surveillance blending
empirical case studies with sophisticated means for technical verification. Our aim is to generate
a credible picture of these practices at a national, regional and corporate level, and to excavate
their impact on state sovereignty, security, human rights, international law, and global
governance.”

http://www.citizenlab.org/index.php
The Citizen Lab is an interdisciplinary laboratory based at the Munk Centre for International
Studies at the University of Toronto, Canada focusing on advanced research and development at
the intersection of digital media and world civic politics.

Also http://www.infowar-monitor.net/index.php. The Information Warfare Monitor is a joint


project of the Advanced Network Research Group, part of the Cambridge Programme for
Security in International Society, University of Cambridge, and the Citizen Lab, an
interdisciplinary laboratory based at the Munk Centre for International Studies, University of
Toronto. “The Information Warfare Monitor is an advanced research project examining how
states and non-state actors seek to exploit information and information systems to pursue political
objectives through non-political means. The project seeks to examine this emerging dimension of
global security on two levels:

• Operational Case Studies -- by building a repertoire of grounded, multi-dimensional


"case studies" of information warfare operations, and to do so by employing a cross-
disciplinary fusion of advanced network monitoring/visualization tools and qualitative
social science research methodologies.
• Consequences for Global Security -- by using the case study data to assess emerging
threats and consequences of information operations on global security in its military,
political, economic, legal and human rights dimensions.”

Potrebbero piacerti anche