PDF Repression in the digital age: surveillance, censorship, and the dynamics of state violence anit

Page 1


https://ebookmass.com/product/repression-in-the-digital-age-

Instant digital products (PDF, ePub, MOBI) ready for you

Download now and discover formats that fit your needs...

State of Disorder: Privatised Violence and the State in Indonesia Abdil Mughis Mudhoffir

https://ebookmass.com/product/state-of-disorder-privatised-violenceand-the-state-in-indonesia-abdil-mughis-mudhoffir/

ebookmass.com

Civil Action and the Dynamics of Violence Deborah Avant (Editor)

https://ebookmass.com/product/civil-action-and-the-dynamics-ofviolence-deborah-avant-editor/

ebookmass.com

Digital Surveillance in Southern Africa: Policies, Politics and Practices Allen Munoriyarwa

https://ebookmass.com/product/digital-surveillance-in-southern-africapolicies-politics-and-practices-allen-munoriyarwa/

ebookmass.com

The Live Enterprise: Create a Continuously Evolving and Learning Organization Jeff Kavanaugh & Rafee Tarafdar & Nandan Nilekani [Jeff Kavanaugh]

https://ebookmass.com/product/the-live-enterprise-create-acontinuously-evolving-and-learning-organization-jeff-kavanaugh-rafeetarafdar-nandan-nilekani-jeff-kavanaugh/ ebookmass.com

Windows 11 Mastery: From Foundation to Mastery Kameron

Hussain & Frahaan Hussain

https://ebookmass.com/product/windows-11-mastery-from-foundation-tomastery-kameron-hussain-frahaan-hussain/

ebookmass.com

Cinematic Representations of Alzheimer’s Disease 1st ed. Edition Raquel Medina

https://ebookmass.com/product/cinematic-representations-of-alzheimersdisease-1st-ed-edition-raquel-medina/

ebookmass.com

Introduction to Chinese Culture 1st ed. Edition Guobin Xu

https://ebookmass.com/product/introduction-to-chinese-culture-1st-ededition-guobin-xu/

ebookmass.com

eTextbook 978-0134404769 International Relations

https://ebookmass.com/product/etextbook-978-0134404769-internationalrelations/

ebookmass.com

with Microsoft

https://ebookmass.com/product/go-with-microsoftexcel-2016-comprehensive-go-for-office-2016-series-1st-edition-ebookpdf-version/

ebookmass.com

https://ebookmass.com/product/sewing-for-the-apparel-industry-fashionseries/

ebookmass.com

RepressionintheDigitalAge

DISRUPTIVETECHNOLOGYAND

INTERNATIONALSECURITY

SeriesEditors

BENJAMINJENSEN

MarineCorpsUniversityandCenterforStrategicandInternationalStudies

JACQUELYNSCHNEIDER

HooverInstitution,StanfordUniversity

BRANDONVALERIANO

MarineCorpsUniversity

otherbookintheseries

LeveragingLatency:HowtheWeakCompeltheStrongwith NuclearTechnology

TristanA.Volpe

Surveillance,Censorship,andthe DynamicsofStateViolence

ANITAR.GOHDES

OxfordUniversityPressisadepartmentoftheUniversityofOxford. ItfurtherstheUniversity’sobjectiveofexcellenceinresearch,scholarship, andeducationbypublishingworldwide.Oxfordisaregisteredtrademarkof OxfordUniversityPressintheUKandincertainothercountries.

PublishedintheUnitedStatesofAmericabyOxfordUniversityPress 198MadisonAvenue,NewYork,NY10016,UnitedStatesofAmerica.

©OxfordUniversityPress2024

Allrightsreserved.Nopartofthispublicationmaybereproduced,storedinaretrievalsystem, ortransmitted,inanyformorbyanymeans,withoutthepriorpermissioninwritingofOxford UniversityPress,orasexpresslypermittedbylaw,bylicenseorundertermsagreedwiththe appropriatereprographicsrightsorganization.Inquiriesconcerningreproductionoutsidethescope oftheaboveshouldbesenttotheRightsDepartment,OxfordUniversityPress,attheaddressabove.

Youmustnotcirculatethisworkinanyotherformandyoumustimposethissameconditiononanyacquirer CIPdataisonfileattheLibraryofCongress.

ISBN978–0–19–774357–7(hbk.) ISBN978–0–19–777261–4(pbk.)

DOI:10.1093/oso/9780197743577.001.0001

DOI:10.1093/oso/9780197772614.001.0001

Marquis,Canada

Acknowledgments

Thisbookwouldnothavebeenwrittenwithouttheintellectualand emotionalsupportofmanyfriends,collaborators,andcolleagues.

IamdeeplygratefultoSabineCareywhoexpertlyguidedmyworkon thistopicfromtheveryfirstday.Ihavebeenluckytomovefromworking underherguidanceasaPhDstudenttobecomingco-authorsandtrusted colleagues.Hergenerousmentorshiptaughtmethatitisnotenoughtojust beagoodresearcher:weneedtokeepworkingonmakingtheacademya placewheremoreofuscanthrive.Iintendtopayitforward.

Overtheyears,manybrilliantcolleaguesandmentorsprovided detailedcommentsandsuggestionsthathelpedshapethisbook.Pablo Barberá,KanishaBond,JessicaMavesBraithwaite,MikeColaresi,Kathleen Cunningham,ChristianDavenport,RonDeibert,ChrisFariss,Tina Freyburg,LisaGarbe,ChristianGlaessel,KellyGreenhill,StathisKalyvas, RoxaniKrystalli,WillLowe,JasonLyall,NikolayMarinov,WillMoore,Rich Nielsen,SarahParkinson,MaschaRauschenbach,MollyRoberts,Espen Rød,AdamScharpf,LiviaSchubiger,NilsWeidmann,andYuriZhukovall contributedtothedevelopmentoftheideaspresentedhere,andIthankthem fortheirgenerosity.AspecialthankyougoestoEricaChenoweth,Cassy Dorff,KristineEck,andJoshKertzerforencouragingmetonotgiveup whenIwasstuck.ThankyoutoDaraKayCohenforprovidingawonderful intellectualhomeduringmypost-doctoralfellowship.

MyHRDAGfamily,PatrickBall,MeganPrice,KristianLum,TarakShah, MariaGargiulo,withwhomIhavebeenfortunatetoworkforoveradecade: thankyouforteachingmehowtothinkcriticallyaboutthequantification ofviolence,howtostriveforscientificrigorinthenameofaccountability andjustice,andforteachingmetechnicalskillsIuseeveryday.Ouryearsof collaborationallowedmetoinvestigatemanyofthequestionsinthisbook withsoundempiricalfooting.In2020Iwasfortunatetoworkwithandlearn fromSophieDyer,SamDubberly,LikhitaBanerji,MattMahmoudi,Raha Bahreini,andMahsaAlimardani:thankyouforallyourinsights.Thank youtoRamaPadmanabhanandAlbertoDainottiforhelpingmeworkwith theIODAdataonInternetshutdowns,andtoAllisonKohfortheexcellent researchassistance.ThankyoutoDaynaSadowforproof-reading.

IamgratefultotheserieseditorsBrandonValeriano,JackieSchneider, andBenJensen,aswellastoAngelaChnapkoatOUPformakingthe publicationprocesssosmooth.EarlierversionsofpartsofChapters5and6 draw,withpermission,frompreviouslypublishedwork.ThisincludesAnita R.Gohdes(2020)“RepressionTechnology:InternetAccessibilityandState Violence,” AmericanJournalofPoliticalScience 64(3):488–503,andAnitaR. Gohdes(2015)“PullingthePlug:NetworkDisruptionsandViolenceinCivil Conflict,” JournalofPeaceResearch:52(3):352–367.

Katha,Tarik,Anja,Amina,Peter,Shira,Moritz,Domi,Basti,Kristian, Sam,Nina,Zara,andGabi:Iamindebtedtoyouforputtingupwithme talkingaboutthisprojectoverthemanyyearsittookmetocompleteit. Thankyouforyourfriendship,care,andgentlepatience.ThankyoutoZara Rahmanforthejoyfuldaysspentco-workingasIfinishedthismanuscript. AndtoSarah,Marci,andEddieforkeepingmegoing.Iamimmeasurably gratefultoandforLukas:thankyouforeverything,andmore.

ThisbookisdedicatedtomyparentsCatherineandRolfGohdes,to whomIowesomuch.Thankyoufortheunconditionalloveandsupport.

ListofFigures

1.1AveragenumberofindividualsusingtheInternet,byregimetype 1990–2017. 2

1.2DevelopmentofInternetpenetrationinSyriaandIran. 11

4.1Individualsources,andintegrateddata,overtime,Syria, March2011–April2015. 74

4.2Densityofreportedkillings,bygovernorate,Syria,March2011–April 2015. 74

5.1NationwideInternetshutdownsandchangeinaveragenumberof killings,bygovernorate. 89

5.2AveragedailynumberofdocumentedkillingsinSyriainthedays leadinguptoanationwideInternetshutdown,aswellasthedays followingashutdown. 90

5.3Expectedchangeindailydocumentedregimekillingsduringa shutdown. 92

5.4Time-shiftedplacebotest,nationwideshutdown. 93

5.5Reportingpatternsofviolenceinthethreedaysbefore,during,and threedaysaftereachshutdown. 95

6.1Network(mobilephones,3G,and2G)accessibilitybySyrian governorate,June2013–April2015. 101

6.2Targetedanduntargetedviolence,observedandestimatedcounts, overtime. 103

6.3ArmedgrouppresenceinSyria—communitylevel,January2014and 2015. 107

6.4Percentageofviolencethatistargeted,bytypeofcontrol. 108

6.5Expectedproportionoftargetedkillings,givenInternetaccessibility anddifferentlevelsofgovernmentcontrol. 109

6.6Expectedproportionoftargetedkillings,givenInternetaccessibility andwhetheraregionisinhabitedbytheAlawiminority. 111

7.1NormalizedInternettrafficinIran,November15–25,2019. 122

7.2AveragenumberofdailyconcurrentTorusers. 127

7.3Boxplots,dailyconcurrentTorusersbeforeandaftertheshutdown128

8.1PercentofcountrieswhereatleastonenationwideInternetoutage wasmeasured 134

8.2MarginaleffectofnationwideInternetoutagesandrepression,global analysis. 139

2.1Conceptualizingcensorship.

4.1Summaryofempiricalapproachtostudycybercontrolsand repressionintheSyrianconflict.

5.1Expectedeffectsfornetworkdisruptionsandviolence.

5.2NationwideInternetshutdownsanddocumentedregimeviolence.

6.1Internetaccessibility(3G)andviolentrepression.

8.1Networkdisruptionsandstaterepression.

Introduction

Ifthepasttwodecadesofworldwidedigitalexpansionhavetaughtus anything,itisthatInternetaccessisdeeplypolitical.Fewcountrieshave beenleftuntouchedbythedigitalrevolution,andmanyhaveseencontentiouspoliticalprocessesoverturnedbymassadoptionoftheInternet. Unsurprisingly,policy-makers,researchers,andpunditsalikehavemade far-reachingclaimsabouttherolecyberspaceplaysineitherpromoting orendangeringthepursuitofdemocraticpolitics.In2009,theUSState Departmentperceivedtheroleofsocialmediaplatformsinthefightfor democracytobesocrucialthatitrequestedTwittertorescheduleplanned maintenanceworkinordertoprovidefullaccessibilitytoIraniansrallying inpost-electionprotests(LandlerandStelter,2009).Whencivilianuprisings spreadlikewildfireacrosstheArabworldatthestartofthe2010s,some observersdeclared“therevolutionwillbetweeted”(Hounshell,2011;Lotan etal.,2011;Else,2012).Inrecentyears,theoptimismoftheearlydays ofmassInternetusagehassignificantlydampened.Onlineinformation operationsaimedatinterferingwithdemocraticelectionsarebecoming commonplace(Benkler,Faris,andRoberts,2018),andthegrowingnumber ofdigitalhatecampaignsaimedatstokingethnictensionsarecastinga lightonthewaysinwhichonlineaccessmayamplifysocietalcontention (Stevenson,2018).

AmidstevolvingdebatesaroundtheInternet’simpactonpolitics,the percentageofindividualswithfixedormobileaccesstotheInternethas exploded.Figure1.1providesuswiththeaverageshareofindividualsusing theInternetbetween1990and2017,dependingonthedegreetowhichthe countryisgovernedthroughdemocraticinstitutions.Whatisstrikingis thatalthoughliberaldemocraciesweretheearliestadoptersoftheInternet, autocraticcountrieshavebeenmakingstridesincatchingup.Intheearly 2010s,liberaldemocracieshadmorethantwiceasmanyindividualsusing theInternetthananyothertypeofpoliticalregime.Initially,someautocratic leaderswerequiteskepticalofintroducingmassaccesstotheInternet,as thiswouldcreatechallengesinregulatingunwantedcontent(Deibertetal.,

Fig.1.1 AveragenumberofindividualsusingtheInternet,byregimetype 1990–2017.RegimetypedataisfromtheV-DemRegimesoftheWorld Measure(Coppedgeetal.,2021).Country-levelInternetpenetrationdatais collectedbytheInternationalTelecommunicationUnion(ITU,2022).

2008:361).Butoverthepastdecade,non-andsemi-democraticcountries acrosstheworldhaveworkedhardtoclosethisgap,andsomearenow easilyoutpacingtheirdemocraticcounterparts.In2019,Bahrain,Kuwait, andQatarreportedthatmorethan99%oftheirpopulationwereonline, numbersthatonlyaverysmallnumberofliberaldemocracies(suchas Iceland,Denmark,orNorway)cancompetewith.

Throughoutthistime,governmentshavemaintainedsubstantialdecisionmakingpowerovertheircountry’sdigitaldevelopment.IfInternetaccess, andinparticularsocialmedia,offersaformofempowermenttononstateactorsthatcanhelpstartrevolutionsandsowtensions,thenwhat explainsthiscontinuedworldwidedigitalexpansion?Prospectsofincreased economicprosperityarecertainlypartofthestory(WorldBank,2016). Butthesedevelopmentsalsopointtoanincreasingrealizationthatnetworkaccessibilitycouldprovidepreviouslyunseenopportunitiesforpoliticalcontrol.Governmentsacrosstheworldhavebeenworkinghardto expandInternetaccessfortheirownpeople,andmanyhavesimultaneously

investedinandrefinedawholearsenaloftoolstocontrolthedigitalflow ofinformationintherealmoftheirauthority(seeKalathilandBoas,2003; Deibertetal.,2011;Feldstein,2021).Recentscholarshiphasshownthat higherlevelsofInternetaccessinautocraciesfavorgovernmentsbyreducing thelikelihoodofmassprotests,butthatthoseproteststhatdogetoffthe groundaremorelikelytocontinuewheredigitalaccessishigher(Weidmann andRød,2019).Andthepervasiveuseofonlinerestrictionsimplemented by—forthemostpart—illiberalgovernmentswhenencounteringdomestic challengessuggeststhatleadersmustperceivethefreeaccesstoandexchange ofinformationonlineasathreattotheirpoliticalstability.

Asaresult,thereishardlyaweekthatpasseswithoutreportsofpolitical protestsbeingaccompaniedbyaccusationsofstate-orderedtamperingwith citizens’accesstotheInternet.Thesophistication,context,length,coverage, andlocationofsuchcontrolsvaries(Gohdes,2016;Taye,2019).Forexample, inIndia,theInternetisfrequentlyrestrictedinJammuandKashmir,butcan beaccessedregularlyinotherpartsofthecountry(Rydzak,2019).Following themilitarycoupin2021,Myanmarimplementednightlydigitalcurfewsto preventcitizensfromgoingonlineafterwork(Padmanabhanetal.,2021). In2014,Turkey’sprimeministerErdoğanblockedaccesstoTwitteramidst leakssharedontheplatformthatallegedlydocumentgovernmentcorruption(Rawlinson,2014).AndinJanuary2022,theKazachauthoritiesshut downtheInternetamidstmassprotestsagainstthegovernment’sdecisionto liftpricecapsonliquidnaturalgas(Hu,2022).

TheseexamplesindicatethatcontroloftheInternetisnowpartandparcel ofstates’strategiesaimedatmaintainingandincreasingtheirauthority.They alsoshowthatvisibleformsofonlinerestrictionstendtoberelativelyshort. Fullshutdownsaremostlylimitedtoafewdays,specificregions,ortimes ofday.Specificappsorsocialmediawebsitesmaybeblockedforlonger,but usuallynotwithoutsignificantpushback(Tufekci,2014;HobbsandRoberts, 2018;AkbariandGabdulhakov,2019).Whatthissuggestsisthatdigital controlsaremostusefulwhentheyareupdatedandadjustedaccording tothelevelofpoliticaltensionsfeltbythegovernment.WorkbyMolly Robertsoffersimportantinsightsintotheadaptivelogicandsophistication ofonlinecensorshipstrategiesinChina.HerexplorationoftheChinese censorshipmodelshowshowdigitalcontrolsaremostlikelytobesuccessful insupportingpoliticalstabilitywhentheyarebasedonthe management ofsensitivecontent,notontheoutrightandoverall ban thereof(Roberts, 2018).Forexample,China’ssocialmediacensorshavebeenfoundtobe

mostactiveduringcollectiveactionevents,andaremorelaxaboutgeneral criticismdirectedatthestate(King,Pan,andRoberts,2013).

Justbecauseonlinecontrolsarenotalwaysvisibledoesnotmeanthat theyarenotbeingused,nordoesitmeantheyareineffective.Thetypes ofdisruptiverestrictionsjustdescribedhavebeencomplementedbyan evergrowingsectorofmonitoringandsurveillancetechnology,ofteninthe nameoffightingcrimeandpreventingterror(AndrejevicandGates,2014; Choudry,2019;Hegghammer,2021).Suchsurveillancetechnologyisby nowubiquitous,havingdevelopedfromhome-grown,crudepiecesofsoftwaretoencompassingaboomingmarketforoff-the-shelfandcustom-made softwareleveragingcutting-edgetechnologyaimedatinterceptingandanalyzingindividualandmassbehavior.ThePegasusprogramsoldbytheNSO grouptodozensofcountriesacrosstheworldisonlyamorerecentexample ofgovernmentsinvestinginsoftwarethatallowstheinvisiblesurveillanceof digitaldevices(Marczaketal.,2018;Kirchgaessneretal.,2021).

Controlofdomesticcyberspacehasbeenmostheavilystudiedinlarge authoritariancountries,notablyChinaandRussia(e.g.MacKinnon,2011; Gunitsky,2015;Kerr,2016).Butrecentworkhashighlightedthatdigital controlsarebecomingincreasinglyattractivetoolsforleaderswhoseek popularlegitimacythroughelectionsthatareatleastsomewhatcompetitive.Inhisrecentbook,Feldstein(2021)providesanoverviewofdifferent Internetcontrolsandthepervasivenesswithwhichtheyareusedacrossthe world.Hisfindingssuggestthatautocraciesmostheavilyengageinonline censorship,surveillance,andmediamanipulation.Buttheyarenottheonly ones:democraticcountriesandthosethatcombineelementsofdemocratic rulewithauthoritarianmethodsarealsoactivelyengagedinthesepractices, andinterestinimprovingtheircapacitiestoengageindigitalcontrolhas onlygrownoverthepastdecades.

Takentogether,thesefindingssuggestthatdigitalcontrolssuchasonline surveillanceandcensorshiparebothattractiveandpowerfultoolsthathave thepotentialtohelpgovernmentspreventandmanagepoliticaldissent. Theyalsopointtothefactthatfewcountriesengageinconsistentorrigid controls.Digitalresponsesareinsteadadjustedtopoliticaldevelopments, includingelections,protests,orotherformsofpoliticaltensions(Freyburg andGarbe,2018;Lutscheretal.,2019;Stukaletal.,2022).Thepervasiveness anddynamicadaptationofthesedigitaltoolsraisesimportantquestions regardingstates’overallresponsestopopularthreats.Whatistherelationshipbetweenonlinecontrolsandmoretraditionalmethodsofstate

control?Whatroledoweexpectcensorshipandsurveillancetotakeonina state’sbroaderrepressivestrategy?Researchonviolentstaterepressionhas consistentlyshownthatdomesticthreatsintheformofdissent,protest,and insurgencyarethebestpredictorsforviolentstaterepression(Davenport, 2007a;HillandJones,2014;Chenoweth,Perkoski,andKang,2017).Have onlinecontrolsaffectedthenatureoftraditionalcoercivestatebehaviorin thefaceofdomesticpoliticalcontention,andifsohow?Therelationship betweenmodesofonlinecontrolandstates’strategiesofviolentrepression isthesubjectofthisbook.

1.1Argument

Iarguethatcybercontrolspresentthemselvesasnaturaladditions togovernments’arsenaloftacticsaimedatsupportingtherepression ofchallengestostateauthority.Iusethetermsonlinecontrolsandcyber controlsinterchangeably,andconceptualizethemasactivitiesundertaken byoronbehalfofstateauthoritieswiththeaimofeithermonitoring, filtering,orblockingcommunicationandinformationontheInternet. Idistinguishbetweencontrolsthatareprimarilyintendedtosuppress information,andthosethatareprimarilyintendedtogatherinformation. Whilewemightassumethatcybercontrolsareemployedinnon-random waysbygovernments,itisnotimmediatelyclearinwhatwaytheywouldbe connectedtoviolentformsofrepression.Tounderstandtheirroleinstates’ repressivestrategiesitisnecessarytostudyhowtheyhavechangedthe mechanismsofaccessandcontroltoinformation—forbothstateandnonstateactors.Ithenshowhowtheinfrastructureofonlinesurveillanceand censorshiphastransformedtraditionalformsofgatheringandcontrolling informationforthepurposeofraisingthecostsofcollectivemobilization.

Traditionalformsofin-person surveillance relyonsingle-purposeinfrastructurethatisextremelyresource-intensiveandrequireslong-terminvestmenttoyieldhigh-qualityandactionableintelligenceforstatesecurity forces.Onlinesurveillancereliesonmulti-purposeinfrastructurebyexploitingthemassadoptionoftheInternetasameansofobtainingaccesstonew domainsandtypesofinformationonpotentialthreats.Thedrawbacksof relyingontheInternetforinformationgatheringaretwofold.Whilethe infiltration,interception,andultimatecontrolofonlinecommunication andcontenthastransformedandenhancedthesurveillancecapabilitiesof

manysecurityservices,theinfrastructureitmakesuseofalso democratizes informationaccess,therebyinadvertentlybenefitingnon-stateactors.Second,filteringorblockingaccesstotheInternetcandirectlyaffectonline surveillanceefforts.OnlinesurveillancerequiresacertainlevelofInternet accesssothatindividualscanexchangetheirideasandplansonline,which stateactorscanthenmonitorandanalyze.

Importantdifferencesarealsoapparentwhencomparingtraditionalcensorshiptoonlinecensorship.Traditionalmediacensorshipusuallyinvolves shuttingdown,regulating,andrestaffingnewspapersandothermediaoutlets(VanBelle,1997).Anestablishedmethodtostopindividualdissidents fromspeakingoutagainstthegovernmenthasbeendeterrencethrough repressionandintimidation.Whilebothofthesestrategiescontinuetobe popular,onlinecensorshiphasaddedamorecentralized,low-cost,and responsiveformofcontrollinginformation.Idiscusshowvariousforms offilteringandblockingInternetaccesshaveprovidedgovernmentswith amethodtosimultaneouslycensormediaoutletsandindividualsina responsivemanner.

MassaccesstotheInternetthuspresentsgovernmentswhofearfor theirpoliticalsurvivalwithasetofresponseoptions.Whenfacedwitha politicalthreat,theycaneithertemporarilyrestrictorblockonlineaccess inanattempttodiminishoppositiongroups’mobilizationandoutreach capabilitiesortheycanopttocontinueorexpandmassaccesstoonline informationandmonitorittotheirownadvantage.Whilecensorshipand surveillancearenotalwaysmutuallyexclusive,censorshipweakensastate’s abilitytoobtainhigh-qualityinformationthroughonlinesurveillance. Iarguethatthetypeofonlinecontrolstateschoosetoimplementis inevitablylinkedtotheircapacitytoactinotherareas,onebeingtheexertion ofviolence.

ThetheoreticalargumentIpresentinthisbookshowshowthechoiceof Internetcontrolislinkedtothe type and scale ofstate-sanctionedviolence usedagainstperceiveddomesticthreats.Choosingeithercensorshipor surveillanceasaformofdigitalcontrollimitstheuseofsomeformsof violenceandenablestheuseofotherforms.Wherestateshavechosen torespondtocriticaldomesticthreatsthroughademonstrationofvisible controlintheformofcensorship,theywillalsobemorelikelytovisibly demonstratetheirauthoritythroughaheighteneduseofviolentrepression. Censorshipseverelylimitsthechoicesforviolentactiononthesideofthe governmentbycensoringitsownaccesstohigh-qualityintelligenceon

precisetargets.Duringperiodsofcensorship,state-sanctionedviolenceis likelytoaffectthedomesticpopulationindiscriminately.

Inconstrast,onlinesurveillanceislikelytosupporttargetedactsof localizedviolenceagainstthoseidentifiedascriticaltothefuturesuccess ofoppositionmovements.Repressivegovernmentsarekeenlyinterestedin understandingwhichindividualsandgroupstheyshouldfearthemost, whetherthethreattheyfaceisincreasing,andtowhatextenttheirchallengershavebeenabletoorganizedissentsuccessfully.Theavailabilityof high-qualityinformationregardingtheintentionsandlocationofoppositionleadersenablesstatestousetargetedviolence.Digitalsurveillance measuresarelikelytobelinkedtotheuseoftargeted,individualizedstatesanctionedviolence.

Anumberofobservableimplicationscanbeformulatedbasedonthis distinction.Whenandwherecensorshipislowandthepredominantformof onlinecontrolissurveillance,weshouldexpecttoseemoreindividualized campaignsofviolence,suchastargetedinstancesofarrestandtorture,orthe targetedassassinationofindividualsdeemedthreateningtothegovernment. Ithereforeexpectthatstateforceswillbemorelikelytoemploy targeted campaignsofviolentrepressioninareaswheretheygrantcitizensunhindered accesstotheInternet.Shutdowns,blockingofapplications,andincreased filteringofspecificwebcontentarelikelytogohandinhandwithincreasesin indiscriminaterepression.Wherethegovernmentisheavilycensoringboth accessandcontentoftheInternet,weshouldthereforeexpecttosee more intenseandfrequentuseofviolence bystateforces.

Scopeconditions

Thisbookfocusesontherelationshipbetweendomesticonlinecontrols andviolentstaterepression.Theargumentspresentedhereprovideinsights intounderstandingbroadertrendsinvolvingcybercontrolsandcontentious politics.Thereare,however,anumberofscopeconditionsthatapplytoboth mytheoreticalargumentandsubsequentanalyses.

ThefirstscopeconditionisthatIexpectmytheoreticalargumentto mostdirectlyapplytocountrieswithnon-democraticformsofgovernment. Ibuildoninsightsfromanumberofdifferentfields,includingresearch onauthoritariansurvival,staterepressionandhumanrights,thelogicof violenceincivilconflict,andInternetcensorship.Traditionally,muchof

thisresearchhasfocusedonnon-orsemi-democraticinstitutionalcontextswhereleadersaremorelikelytooptforviolentstrategiesofcontrol. Non-democraticstatesaremorelikelytoviolatehumanrights(Davenport,2007b;Carey,2010)andengageintraditionalanddigitalformsof censorship(Whitten-Woodring,2009;Stier,2015;Hellmeier,2016;Bak, Sriyai,andMeserve,2018).Atthesametime,growingevidenceinthefield ofstaterepressionandinthestudyofdomesticcybercontrolssuggests bothmodesofcontrolarealsobeingusedindemocraticcountries.Recent workondigitalrepressionhashighlightedhowcountriesthatcombine elementsofdemocraticandautocraticinstitutionsalsoengageincensorship, manipulation,andsurveillanceoftheirdomesticcyberspace(Feldstein, 2021).Democraticcountrieshavealsobeenfoundtomoreactivelyemploy violentrepressionwhenandwheretheycandenytheirwrongdoingand evadeaccountability(Conrad,Hill,andMoore,2018;CareyandGohdes, 2021).Eventhoughtheprimaryfocusisonautocraticcountries,Iexpect thatcertaininsightsfrommytheoreticalargumentcanbegeneralizedin ordertoalsoexplaindynamicsofcontrolandrepressionincountriesthat atleastallowforminimumlevelsofpoliticalcontestationandparticipation (Dahl,1971).

Inmyanalysisofastate’sperceivedthreats,Iprimarilyfocusonpopular challengestocentralgovernmentauthority,whichisthesecondscopecondition.Inherworkonunderstandingstates’coerciveinstitutions,Greitens (2016:19)distinguishesbetweenexternalandinternalthreatstoaregime’s stability.Statesthatfaceinternalthreatsmaydealwithsecessionistclaims, ormaybeconfrontedwithchallengestothecentralgovernment’sauthority. Challengersattemptingtoattackthecentralgovernment’sauthoritymaybe basedwithintheeliteandoperatethroughthemeansofacoup,ortheycould bebasedinthebroaderpopulationandbemobilizedinapopularrevoltor aninsurgency.Governmentsareusuallyconfrontedwithmultiplethreats, andtheirstrategiesofmaintainingcontrolarelikelytoreflectthat.The argumentIpresentinthisbookfocusesonthewaysinwhichcybercontrols canadvanceagovernment’spowerovertheirpopulation’sinformation infrastructurebyeitherwithholdingsaidinfrastructure,orprovidingitfor monitoringpurposes.Asaconsequence,mytheoreticalexpectationsare morelikelytoapplyininstanceswheregovernmentsareintentondefending themselvesagainstinternal,mass-basedthreats.

TheargumentIadvancefocusesonhowthestate-orderedmonitoring anddisruptionofonlineinformationareassociatedwithcoercivestrategies. Idonotexplorequestionsrelatedtotheproductionandmanipulation

ofinformation.Agrowingnumberofstudieshighlightimportantways inwhichgovernments,inparticularsemi-democraticgovernments,make useofsocialmediaforpropaganda,disinformation,andharassmentcampaignsagainstjournalistsandoppositionmembers(Pearce,2015;Nystand Monaco,2018;Sinpeng,2020;LuandPan,2021).Therelationshipbetween theseformsofmediamanipulationandviolentstatecoercionisanimportant topicforfutureresearch.

1.2Evidence

Thisbookseekstodocumenttheprevalenceofcybercontrolsandtheirrole instates’repressivestrategiesbyprovidingbothdescriptiveandmultivariate evidencefromarangeofcontexts.Thetoolboxofcybercontrolshasevolved overtheyears,andtheeasewithwhichsomeofthesemethodscanbe appliedhasalsochanged.InChapter2,Ipresentanoverviewofsome ofthemostpopularandwidelyusedformsofcybercontrolsforlimiting andgatheringinformation.EvidenceinChapters4–6examinestheSyrian government’suseofcybercontrolsandviolentcoercioninthecontextof thecivilconflictthatcommencedin2011.Chapter7shiftsthefocustoIran totracetheroletheInternetshutdownplayedintherepressiveresponseto nationwideprotestsinlate2019.SyriaandIransharesimilaritiesintheir desiretomaintainandexpandcontroloftheirdigitalinfrastructure.While Iran’sgovernmenthasrepeatedlyfacedmasspoliticalprotest,thelevelof domesticupheavalandthedegreetowhichtheregime’spoliticalauthority waschallengedthroughoutthedecadeofthe2010sfundamentallydiffers fromSyria.

Movingbeyondindividualcases,Iconcludetheempiricalsectionofthe bookwithaglobalcomparativeanalysisoftherelationshipbetweenInternet shutdownsandstaterepression.Theglobalcomparativeinvestigationof Internetshutdownsandrepressionallowsmetotestsomeofthetheoretical expectationsbeyondindividualcases,therebycontributingtotheexternal validityofmyargument.

RepressiontechnologyinSyria

TheSyriangovernmenthasweaponizeditsdigitalinfrastructureforpopulationcontrolsincetheintroductionoftheInternetforthegeneralpublic

in2000.TheBaathiststateformedbythecurrentpresident’sfatherhasbeen describedasanauthoritarian-populist(Hinnebusch,1993:246)andhighly personalizedregimethathasjustifieditsrepressivecontroloversociety throughtheconstantinvocationofexternalanddomesticthreats,most notablythethreatsposedbyIsraelandpoliticalIslam(Wedeen,1999,2019).

Syria’srepressivestrategyisinstructiveforstudyingtheinterplaybetween onlineandofflinerepressionasitwasarguablythefirsttoemployafullarsenalofdigitalcontrolsinconjunctionwithmassrepressioninthecontextof alarge-scalecivilconflict.Intheearlyyearsoftheconflict,itwasfrequently referredtoas“themostsociallymediatedcivilconflictinhistory”(Lynch, Freelon,andAday,2014:5),witheventspainstakinglycaptured,documented,andcommunicatedviatheInternet.Fromtheearliestdaysofthe Syrianuprising,activistswithinandoutsidethecountryusedcountless socialmediaaccountstoinformeachotheraboutmilitaryoperationsand massacresandtohelporganizeandcoordinatetherevolution(Shehabat, 2012;Poulsen,2013;Pearlman,2020).Citizenjournalistshaverecorded hundredsofthousandsofYouTubevideosofpeoplekilledandinjured inmorgues,hospitals,andmarketplaces(MillerandSienkiewicz,2012). Theamountofuser-generatedcontentissovastthatmorehoursofdigital materialnowexistondocumentingtheconflictthantheconflicthasbeen long(DeutchandHabal,2018:50).TheAssadregimehasusedanarrayof methodstospyonthecountry’spopulation,suchastheuseofcommercial spyware,DDoSattacksbytheSyrianElectronicArmy,andevendetaining individualsinordertoobtainFacebookandTwitterpasswords.Ithasalso fullyorpartiallyshutdownInternetaccessonafrequentbasis,thereby cuttingmillionsofpeople’saccesstocommunication.

SincethestartoftheSyrianconflictmorethanadecadeagotherole ofdigitaltechnologyinwarfarehasonlygrown,andstrategiccommunicationbyconflictactorsonvarioussocialmediasiteshasbecomethe norm.Interestedobserversarenowaccustomedtofollowingkineticwarfare throughsocialmediaandotheronlinespacesfromanywhereintheworld. Militariesandinsurgentsalikehavebecomeawareoftheimportanceof digitalimageriesandstory-tellinginkeepingboththeirdomesticandinternationalaudiencesengagedand(dis)informed.Studyingoneoftheearliest instancesofdomesticconflictwherebothstateandnon-stateactorswere heavilyengagedinonlineactivitywhilefightingofflineisinstructivefor ourunderstandingofthewaysinwhichstatescanweaponizetheircontrol overdigitalinfrastructure.Understandingthemotivationbehindnetwork

manipulationsinstitutedbyregimesfearfuloftheirpoliticaldemisewill becomeanindispensabletoolforourtheoreticalandpracticalunderstandingofconflictdynamics.LearningfromcurrentcasessuchasSyriaisan importantplacetostart.

InternetinfrastructureandusageinSyriaandIran

IntheearlyyearsoftheInternet,SyriaandIranhadsimilarlyslowgrowth trajectories,asisevidencedbythedepictioninFigure1.2ofthepercentage ofeachcountry’spopulationthathasaccesstotheInternet.Thistrend changedin2013whenIranovertookSyria,andbytheendofthedecade itspenetrationlevelsweredoublethoseofSyria.Inbothcountriesforeign socialmediaandmessengerappssuchasSkype,WhatsApp,Telegram,and Twitterhavebeenpopularamongyoungandtech-savvyusers(Abadpour andAnderson,2013;Brownlee,2018).Alongsidecontrolofthedigital infrastructureandimplementationofwide-reachingwebfilterstheregimes inbothcountrieshaveactivelybuiltandexpandedtheirabilitytoengagein targetedandmasssurveillance.

SyriaandIranbothfallintothecategoryofcountriesthatexhibithighlevelsofcentralizationwhenitcomestotheirdomesticInternetinfrastructure.

In2012,Renesys1 estimatedthat132countriesworldwidewereatsevereor significantriskofexperiencingInternetshutdowns(Cowie,2012)duetothe

Fig.1.2 DevelopmentofInternetpenetrationinSyriaandIran.Country-level InternetpenetrationdataiscollectedbytheInternationalTelecommunication Union(ITU,2022).

lowdiversityintheirtelecommunicationssector.InbothSyriaandIranthe telecomsectoriscentralizedinwaysthatputsthecontrolofaccesstothe Internetintothehandsofafewdecision-makers(Cowie,2012).

In2011,theyearofthecivilianuprisinginSyriaandtheimplementation ofitsfirstnationwideshutdown,SyrianaccesstotheInternetprimarily dependedononeprovider,thestate-ownedSyrianTelecommunications Establishment(STE)(Cowie,2011b).Inthesameyear,71countrieswere estimatedtohavefewerthantenserviceproviders,whichincludedIran. Iran’sdomesticInternetinfrastructurehassignificantlydevelopedoverthe pastdecade,yetdespitethesedevelopmentsandthegrowinginfluencethe countryhasachievedthroughnetworkprovisionintheregion,itsaccessto theglobalInternetremainsdependentontwoentitiesthatessentiallyserve aschokepointstothedigitaloutsideworld(Madory,2019).

Methodologicalapproach

Investigatingcybercontrolsandrepressivestatebehaviorisacomplicated endeavor.Somecybercontrolsrequirerelativesecrecytobeeffectivewhile othersaremeanttobeobservedandfeared.Likewise,stateviolencecanbe overtlyusedagainstpublicprotesters,oritcanbeclandestine,suchaswhen dissidentsarequietlyarrestedintheirhomesinthemiddleofthenight.State actorshaveincentivestohide,obfuscate,outrightdeny,orevenoverstate theirrepressiveintentionsandactions.

TheevidenceIpresentinthisbookdrawsonqualitativeandquantitative datafromavarietyofsources.Itmighthavebeenusefultointerview seniormembersofgovernment,ofthesecurityservices,thesecretservice, andthetelecomsectoranditwouldmostcertainlyhavebeenhelpfulget accesstoarchivalmaterialontheprocurementofcensorshipandsurveillancesoftwareaswellasonmilitarystrategy.However,seniorfiguresin authoritariancountriesaregenerallynotavailableforcommentontheir repressivestrategies,andwhileIwasabletodrawonsomedocumentation onITprocurement,archivalmaterialsareeitherlimitedortendtoonly becomeavailablewithregimechange.Theevidenceinthisbookbuildson thecollectionandanalysisofamultitudeofsources,suchasinformationcollectedbyhumanrightsdocumentationgroups,mediasources,andnetwork measurementdata.

TomeasurestaterepressionintheSyrianconflict,IdrawonindividuallevelreportsofkillingsfrommultipleSyriandocumentationgroupsand makeuseofrecentinnovationsinquantitivetextanalysistoclassifythemas targetedoruntargetedviolence.Thisdistinctionallowsmetostudychanges inthetypeofviolencethatgobeyondmerelymeasuringscale,thereby contributingtowardsamoredifferentiatedunderstandingofrepression(see HooverGreen,2019;Bagozzi,Berliner,andWelch,2021).Post-sampling estimationintheformofmulti-recaptureestimationhelpsaccountfor violencethatwentunreportedinthechaosofwar.Wheninvestigating changesinthenatureofrepressionusedbytheIranianauthoritiesduringthe protestsinNovember2019Idrawonquantitativeandqualitativeaccounts ofviolenceastheywerereportedbyIranianandinternationalhumanrights groups,aswellasininternationalmediareports.Theglobalcomparative analysisinChapter8drawsonnetworkmeasurementdatatoclassifyInternetshutdowns,andonthePoliticalTerrorScale,astandards-basedmeasure ofrepressionthatcodeshowwidespreadstaterepressionisinagivencountry inanygivenyear.

Thisbookpresentsevidenceontherelationshipbetweencybercontrols andrepressionatvaryingobservationalunits.InChapter5,theinvestigation oftheSyrianconflicttracesInternetshutdownsanddailychangesinviolence atthenationalandregional(governorate)level.InChapter6,IanalyzebiweeklylevelsofInternetaccessibilityandstrategiesofstateviolenceatthe regionallevel.TounderstandthequalitativeshiftsinrepressioninIran, IinvestigatechangesbeforeandduringthenationwideshutdowninNovember2019.Thischapteralsolooksatchangesinonlinebehaviorsbycomparingusageofapopularcensorshipcircumventiontoolsbeforeandafterthe shutdown.Finally,inChapter8,Ileavethesubnationallevelandconstruct yearlyindicatorsofInternetshutdownsusingnetworkmeasurementdata, andstudyitsco-occurrencewithstaterepressionacrosscountries.

TheinvestigationofInternetcontrolsandviolentcoercionrelieson observationaldata,whichcomeswithchallengestomakingcausalclaims. Experimentalapproacheshavebeensuccessfulinstudyingpublicopinion towardsdigitalcontrolsandexposuretostaterepression,butexperimentally manipulatingorelicitinginformationaboutrepressivestatebehavioris,in mostcases,eitherunfeasibleorunethical.Iaimtoprovideinsightsinto thisunderstudiedareaofstatebehaviorbyempiricallyapproachingthe researchquestionfromamulti-methodperspectivethattestsaspectsofthe

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.