"This book explores how digital authoritarianism operates in India, Pakistan, Turkey, Indonesia, and Malaysia, and how religion can be used to legitimize digital authoritarianism within democracies. In doing so, it explains how digital authoritarianism operates at various technological levels includ
...
ing sub-network level, proxy level, and user level, and elaborates on how governments seek to control cyberspace and social media. In each of these states, governments, in an effort to prolong – or even make permanent – their rule, seek to eliminate freedom of expression on the internet, punish dissidents, and spread pro-state propaganda. At the same time, they instrumentalize religion to justify and legitimize digital authoritarianism. Governments in these five countries, to varying degrees and at times using different methods, censor the internet, but also use digital technology to generate public support for their policies, key political figures, and at times their worldview or ideology. They also, and again to varying degrees, use digital technology to demonize religious and ethnic minorities, opposition parties, and political dissidents." (Publisher description)
more
"[...] this is the first anthology to specifically investigate the history and state of cyber warfare in the Middle East. It gathers an array of technical practitioners, social science scholars, and legal experts to provide a panoramic overview and cross-sectional analysis covering four main areas:
...
privacy and civil society; the types of cyber conflict; information and influence operations; and methods of countering extremism online. The book highlights the real threat of hacktivism and informational warfare between state actors and the specific issues affecting the MENA region. These include digital authoritarianism and malware attacks in the Middle East, analysis of how ISIS and the Syrian electronic army use the internet, and the impact of disinformation and cybercrime in the Gulf. The book captures the flashpoints and developments in cyber conflict in the past 10 years and offers a snapshot of the region's still-early cyber history. It also clarifies how cyber warfare may develop in the near- to medium-term future and provides ideas of how its greatest risks can be avoided." (Publisher description)
more
"For more than half a century, North Korea’s leaders have relied on a domestic media monopoly to control what information North Koreans can access and how narratives around that information are presented. But the situation on the ground is changing, thanks in large part to North Koreans’ expandi
...
ng access to unsanctioned foreign media and information sources. InterMedia’s A Quiet Opening: North Koreans in a Changing Media Environment documents this evolution based on research among recent North Korean defectors, refugees and travelers abroad. The project’s assessment of the current state of the media environment in North Korea suggests that substantial numbers of North Koreans are able to access various forms of foreign media. These include foreign TV and radio broadcasts, and particularly foreign DVDs brought into the country from China by cross-border traders and smugglers. Other vectors for information from abroad include smuggled mobile phones capable of receiving foreign signals, and the exchange of illicit foreign content on otherwise legal MP3/MP4 players and USB drives." (www.audiencescapes.org, June 18, 2012)
more
"This report evaluates the risks and vulnerabilities of mobile phone services and apps in 12 specified countries: the Republic of Azerbaijan, the Republic of Belarus, the People’s Republic of China, the Arab Republic of Egypt, the Islamic Republic of Iran, Libya, the Sultanate of Oman, the Kingdom
...
of Saudi Arabia, the Syrian Arab Republic, the Tunisian Republic, the Republic of Uzbekistan, and the Socialist Republic of Vietnam. Rather than focus on a single innovation, this study analyzes multiple mobile technologies – including operating systems, applications and mobile protocols – to determine their capacity to protect security and privacy and to combat censorship and surveillance. Throughout this study the protection of mobile phone users was of paramount importance." (Executive summary)
more
"Around the developing world, political leaders face a dilemma: the very information and communication technologies that boost economic fortunes also undermine power structures. Globally, one in ten internet users is a Muslim living in a populous Muslim community. In these countries, young people ar
...
e developing their political identities—including a transnational Muslim identity—online. In countries where political parties are illegal, the internet is the only infrastructure for democratic discourse. In others, digital technologies such as mobile phones and the internet have given key actors an information infrastructure that is independent of the state. And in countries with large Muslim communities, mobile phones and the internet are helping civil society build systems of political communication independent of the state and beyond easy manipulation by cultural or religious elites. This book looks at the role that communications technologies play in advancing democratic transitions in Muslim countries. As such, its central question is whether technology holds the potential to substantially enhance democracy. Certainly, no democratic transition has occurred solely because of the internet. But, as the book argues, no democratic transition can occur today without the internet. According to this book, the major (and perhaps only meaningful) forum for civic debate in most Muslim countries today is online. Activists both within diasporic communities and within authoritarian states—including Iran, Saudi Arabia, and Pakistan—are the drivers of this debate, which centers around issues such as the interpretation of Islamic texts, gender roles, and security issues. Drawing upon material from interviews with telecommunications policy makers and activists in Azerbaijan, Egypt, Tajikistan, and Tanzania and a comparative study of seventy-four countries with large Muslim populations, this book demonstrates that these forums have been the means to organize activist movements that have lead to successful democratic insurgencies." (Publisher description)
more