Professional Documents
Culture Documents
We are currently witnessing a high level of violence and unrest throughout the Middle
Eastern region, with protests occurring against national regimes and those same regimes
exercising repressive measures to stop the protests. Some protesters have been organizing using
the Internet, but their actions can be traced by the government they are fighting against as long as
they are not “encrypted” again surveillance. In other words, political activists in the Middle East
government. A small percentage of protesters currently use encryption technology to hide their
online activity, but the vast majority does not. There is a strong connection between online
anonymity and protest activity in a number of different contexts around the world, but this paper
will look exclusively at the Arab Spring and the use of Internet Communication Technologies
(ICT) for circumventing government surveillance and spreading political speech. In the paper, I
will examine the different dimensions of online anonymity and the actors that participate in
I. What is anonymity? (This section and others listed below in roman numeral form will
be completed last, as they are very similar to work I have already written)
transformation of the Internet from an open frontier for expression into a tight collection of
privately-owned spaces in his 2007 book, I-SPY: Surveillance and Power in the Interactive Era.
Through digital enclosure, Andrejevic argues that the space for civil society and political identity
formation has been taken over by market forces in the form of large Internet companies. Mark
Poster looks at the issue of privatization of speech on the Internet in Reading digital culture:
“The issue of commodification also affords a narrow focus, often restricting the discussion of the
politics of the Internet to the question of which corporation will be able to obtain what amount of
extension of our substitution for existing institutions.” (Trend, 260) Political discussion now
takes place on the platform of social networking sites like Facebook and Twitter, and this
Facebook, for example, does not allow anonymous speech but encourages political speech –
revealing political opinions serves as another layer of data that can be used for behaviorally-
targeted advertisements within the SNS environment. The public sphere, Andrejevic points out,
has been subverted by public relations, a system supported by the code of the websites citizens
use every day and further enabled by social and political norms. In this environment, “freedom
of choice” and of speech are no longer truly available – our options online have become limited
to an almost unrecognizable degree, compared to the Internet of 10 years ago. In the Middle
Eastern context, the introduction of global social networking sites has opened up new
possibilities for global communication on the one hand, but has still limited the avenues for
a. No freedom of speech
d. Religious minorities?
replacing them.
censored, citizens have for some time had the upper hand, using
existence of many “levels” of anonymity, the degrees with which a person’s identity can be
hidden (or how easily it can be uncovered) online. (Daza, 194) What most inexperienced
users do not realize about anonymous speech online is that, in many circumstances, it is
relatively easy for website administrators to gain access to an author’s identity information,
such as name, e-mail address, or physical location. In other words, the anonymity that most
online commenters have is not absolute – it is only effective insofar as it hides their identity
from peers in the online discussion space. Website administrators, the people who provide
the space for communication, often have the technical ability to view and track the IP address,
or computer location of an anonymous poster – this allows them to enforce rules on or even
ban individual members from participating in the future. (Lampe, 543) In these settings,
comments violate a website’s rules and take disciplinary action in the form of warnings,
suspensions, or bans. Anonymity in this case is not absolute in that violators of website
policies can be caught and held accountable for their actions; website administrators retain
the ability to check a person’s location or search for their other online profiles to help them
determine how to approach a situation. This can be considered the first level of anonymity,
because a person’s actions online can still be traced back to their real life presence by an
administrator.
website automatically records information about its users such as IP address, but the identifiable
location information is rendered unreadable to the website operator (changed into a series of
random numbers) or logs of such information might even be deleted on a regular basis. (“Who
are the moderators?”) This practice was established in order to respect the privacy of users if
they choose to be anonymous. One of the largest and most well-known online communities,
4chan.org operates completely anonymously in this way. What the previous two kinds of
anonymity have in common is that they are “provided” to an individual Internet user by the
technology built into the website they choose to use. The web administrator or ISP is in full
control of who can see a user’s information, as the user has probably entered into a terms of
Anonymity is provided to an individual either by the owner of the website they are
visiting at the time, or by self-installed encryption software, which represents the third level of
anonymity. Encryption offers a special kind of anonymity that not only hides identifiable
information from other people in the discussion forum with you, but from site administrators and
sometimes even law enforcement. It is the technology used to protect private data like e-mail and
credit card numbers from retrieval by third parties online as they travel through the Internet;
government agencies encrypt their information using particularly strong and always-changing
software. There are an abundance of more common software options available for Internet users
who wish to remain anonymous in their online activities. One of these programs is called Tor,
which is free and open source; this means that anyone can download, use, and edit the code of
the software to make their own adjustments. The brief description of the software on Tor’s
homepage says that it “helps you defend against a form of network surveillance that threatens
personal freedom and privacy known as traffic analysis.” (“About Tor”) The basic idea of Tor is
that instead of connecting your computer’s unique address to every site you visit or every
comment you write, the communication signals you send to that website are bounced across a
distributed global network of volunteers, whose own computers relay that signal to the desired
website from a different location for every message. This idea is not new, as it was developed by
people from the first distributed network and message board, UseNet in the 1980’s. This network
was designed as a distributed news-sharing bulletin board, where anyone could post articles and
read what others had posted. More important than what was being shared on UseNet was the fact
that it required no personal registration to participate, and did not collect information about its
users. Anonymity is only effective insofar as certain groups of people are unable to connect an
individual’s real life and online identities, and open source encryption software like Tor make it
possible to communicate online without leaving a trace. This is where tensions can arise
between citizens and the government, because the process of law enforcement is made more
difficult when criminal suspects use encryption technology to hide their activities. On Tor’s
website, one can find deep concern about the direction of the courts concerning anonymous
speech and privacy: “Ongoing trends in law, policy, and technology threaten anonymity as never
before, undermining our ability to speak and read freely online.” (“About Tor”) This concern
will be addressed in the next chapter, which focuses on the courts and their approach to dealing
The U.S. State Department is starting to fund encryption work in the creation of informal
offline intranets through the New America Foundation, in the amount of 2 million dollars so far.
(McDuffee) According to a report by the Washington Post in June 2011, the Open Technology
Initiative is responsible for a product called, “Internet in a briefcase,” which allows political
activists to literally transport networks across national borders and set them up anywhere. The
package contains “small wireless antennas, which could increase the area of coverage; a laptop
to administer the system; thumb drives and CDs to spread the software to more devices and
encrypt the communications; and other components like Ethernet cables.” The same group has
been developing applications for “mesh networking,” a new way for people to connect to one
another directly, as opposed to sending Internet signals to a centralized server that records
identifiable information such as location before forwarding the signals along to the recipient. The
cell phone networks in Afghanistan has been funded a full $50 million by the State Department.
These and similar kinds of private networks have already proven instrumental in encrypting
activist speech during times when authoritarian regimes have shut down the Internet or phone
lines. Secretary of State Hillary Clinton supports these initiatives, saying that the U.S.
Government is “focused on helping [activists effect positive change], on helping them talk to
each other, to their communities to their governments and to the world.” (Glanz) Enabling
political activists in the Middle East to communicate is an important way to “bring down
autocratic regimes,” says New Media Professor Clay Shirky of New York University. He
cautions that the United States government is entering a conflict of interests situation by
supporting certain authoritarian leaders through diplomacy and funding the efforts of
revolutionaries at the same time. Rhetoric about the promotion of free speech and human rights
cannot be easily separated from the circumvention applications of technologies being currently
funded.
New strategies have been developed by activists in the region. They share their
passwords with friends, so if a Facebook user is arrested and his account misused, they can log in
and remove personal information or delete content the government has posted. Activists also
create multiple Facebook accounts so that when threatened, they reveal an innocent account,
A recent example of a trusted system in conflict with values of anonymity and free
speech is the case of Facebook and the anti-Mubarak protesters in Egypt. (McCarthy, CNET:
“Amid Unrest, a Hard New Look at Online Anonymity”) Facebook and other social media have
proven to be an essential tool for those in Egypt who wanted to bring awareness to the situation
in their country and organize in protest against the dictator, Mubarak. But Facebook’s emphasis
on “real name identity” made it easier than ever for the Egyptian government or counter-protest
forces to track the protesters’ movements and online activities. A nonprofit organization called
Access Now has started a petition online to “encourage Facebook to rethink its policy” towards
anonymous accounts. Currently, if Facebook suspects that a user is not who they are claiming to
be, they can restrict or even ban the profile from using the site’s capabilities, such as creating
events or adding friends. Access Now hopes to change this policy, by arguing that political
activists under risk of some kind of retaliation should be allowed to run anonymous Facebook
accounts under a more secure HTTPS protocol; Facebook offers the more unsecure HTTP
service to these users, which is easy to track or hack into for the Egyptian government.
With the number of obstacles preventing Internet users in the Middle East from writing
surprising to discover that most do not take the necessary measures to encrypt their online
activity. According to a recent report by the Berkman Center at Harvard, online security is not
one of the top priorities for bloggers in the Middle Eastern region. Berkman Center conducted a
survey of bloggers in the Middle East and North Africa region (MENA) and 98 responded.
Questions in the survey ranged from website preferences to quiz-like questions about encryption
technology. When asked to rank the importance of different factors for choosing a platform to
blog with, most respondents answered that the “design and ease of use” of the website were the
most important considerations. This choice was compared with the customizability of privacy
settings, likelihood of the website tool in question to share the user’s data with the government,
and mobile capability. Across the different types of bloggers in different countries, design and
mobile capability led the poll – privacy settings and discoverability by law enforcement were not
taken into as much consideration. An important thing to note is that most of the survey
respondents turned to Western websites like Facebook and Google to express themselves, as
security expert Ronald Deibert, proposed that it is possible the bloggers who answered the
survey believed it was safer to use Western blogging services because they would not be as
American blogging platforms to protect the online anonymity of their users may not be wisest or
most well-informed decision, given the number of times these companies have been reported to
give up the identities of users for criminal investigation. But, it might be the safest choice of the
ones available in their country. Finally, the Berkman Center survey found that there is a
significant gap between the self-perceived (reported) level of knowledge about online security
and actual scores on a security quiz offered at the end of the survey. Bloggers were particularly
uninformed about different types of encryption technology, which might help them to escape law
enforcement online.
Only 16% of the bloggers surveyed do so anonymously – this means that 84% provide
information about themselves such as their real name or photo on their website. The choice to
use a real identity for blogging makes it much easier for the government to locate and apprehend
an activist – so why would so many of them do it? As ___ argues in ____, to use a real name is
to make a political statement, to openly defy government repression while also adding credibility
to opinionated posts.
How to Preserve Online Anonymity in the Middle East
Authoritarian governments in the Middle East and North Africa have no interest in
preserving the online public sphere or in allowing anonymous speech – so it is left to outside
actors, such as corporations, democratic governments, and civil society organizations to help.
Each one of these actors has a different set of interests, but it is still possible to align these
interests with the side of greater liberation of political activists and normal citizens alike in the
Middle East.
Internet corporations, and new social networking sites that function as discussion spaces
in particular can play a significant role in promoting free anonymous speech. By enabling users
to post anonymously, and by developing innovative strategies for moderating and resolving
conflicts, these websites have a unique opportunity to not only invite the participation of a wider
range of writers around the world, but can provide a safe space for political activists to connect
with others outside their country. Quora.com, a question & answer website that was launched
almost two years ago, is an example of a new online community that has found ways to maintain
a strict set of community guidelines but still experience the benefits of anonymous speech. On
their site, a user can post a question about any topic, or answer a question that someone else has
asked; they always have the option of attaching their real name or posting anonymously. The
community selects the best answers by voting them up or down; a post that does not fit
community standards could be “collapsed” or removed from view. Quora encourages people to
post responses to the questions that they know the answer to; some questions about what it is like
to work at a certain company, for example, might be best and most honestly answered by a
current employee who chooses not to reveal her name. More sensitive questions, such as “How
In the context of the Middle East, questions about the reality of aspects of the Arab
Spring could be answered truthfully by someone who is involved in the situation but who wishes
to remain anonymous. Through Quora and sites like it, readers around the world can gain access
to news and opinions from even authoritarian countries in the Middle East; and activists can tell
the outside world about events happening in their country that the mainstream media might not
be covering. As with all accounts like this, information in posts by anonymous users is often
scrutinized more closely and other users might suggest edits for a factually inaccurate answer.
Another example of innovative strategies for handling anonymous speech online is Slashdot, a
technology news website and community. (Lampe, 543) According to University of Michigan
Professors Cliff Lampe and Paul Resnick, who conducted research on the Slashdot community in
2004, “Part of the ethos of Slashdot is that posts are not deleted from the database; the site
creators mandated that anonymous posting be allowed.” When certain behavioral problems arose,
Slashdot handed over moderation to its userbase for a more “democratic solution.” (543) Like on
Quora, Slashdot users can vote on other users’ posts and through this rating convey to other
readers how valuable they believe the posts are. These solutions take much of the burden off of
website owners and administrators, and avoid the problems of censorship and prior restraint from
government interference. The next generation of online entrepreneurs will have the chance to
design tools for expression that put more control in the hands of both individual users and the
Ryan Calo, cyber-law expert at Stanford University, has thoroughly examined the
intersection of privacy and innovation in ways that are extremely relevant to any debate about
privacy, anonymity and online security for Middle Eastern activists. According to Calo’s
research, “Web companies have begun in recent years to compete with one another over privacy,
including by building better tools of access, choice, and portability.” (Calo, 2) This healthy
competition will provide more options for activists and normal Web users alike. An entire
industry has sprung up around privacy, with services like Reputation Defender and TrustE
promising to protect personal information from online collection. These services exist because
most mainstream websites thrive off of a steady stream of data from user characteristics and
behavior – privacy is commonly viewed as an interest separate from profit for social networking
sites that run on advertising. But Calo observes that increased empirical research on the
integration of privacy controls into user experience design have “profound repercussions for
consumer and citizen privacy.” (3) He and human-computer interaction expert Victoria Groom
are currently conducting an experiment that compares effects of various interfaces on online user
behavior; their findings would bring young Internet companies even closer to being able to offer
CONCLUSION: Anonymity is key to enabling free(r) speech in the Middle East online.
citizens, and this has a deep impact on the ability of protesters to organize and the political
identity formation of individual citizens. Outside actors, like new Internet companies, large
online social platforms, governments, and civil society organizations can play a role in providing
an anonymous space for political discussion, and there is evidence of this already happening.
Obstacles to these actors participating in the preservation of the online anonymous public sphere
include government pressure and regulation, and profit-driven motives for encouraging real