The Role of Information and Communication Technologies in

The Role of Information and Communication Technologies in World Politics
Thesis
by
Akhmadjon Yakubov
Submitted in Partial Fulfilment
of the Requirements for the Degree of
Bachelor of Arts
in
International Economic Relations
State University of New York
Empire State College
2015
Reader: Max Hilaire
Table Of Contents
Abstract................................................................................................................................................... 2
Introduction............................................................................................................................................. 3
Chapter 1: The Growth of Global Networks.......................................................................................... 6
Money..............................................................................................................................................7
Data and Information...................................................................................................................... 9
Ideas...............................................................................................................................................11
Chapter 2: The Internet and Politics..................................................................................................... 15
The Internet as a Source of Political Information.........................................................................16
How do Politicians Use the Internet?........................................................................................... 20
E-democracy and E-governance................................................................................................... 23
Appendices....................................................................................................................................27
Chapter 3: Challenges and Security Threats Brought into Politics by ICT..........................................30
Social Networks and Blogs as a Threat to the Regime.................................................................31
Criminal Organizations and Terrorist Activities in Cyberspace...................................................34
Cyberwars - The Wars of the Future?........................................................................................... 38
Excursus........................................................................................................................................ 41
Appendices....................................................................................................................................44
Chapter 4. New Technologies and Battlefields.....................................................................................45
Improvised Explosive Devices..................................................................................................... 45
Drones, Robots, and Unmanned Systems.....................................................................................47
New Ammunition.........................................................................................................................50
Appendices.................................................................................................................................... 53
Conclusion.............................................................................................................................................54
2
Abstract
This thesis is intended to measure the role of Information and Communication
Technologies in Global Politics. First of all it tells readers about the development of
information technologies over the last decade and how they became entangled with
politics. Can information technologies and global networks change the political world?
Did ICT bring something new to already well known politics? New actors maybe? One
of the main questions in this thesis is whether ICT have brought threats to the political
world or not. If so, can these threats be fought with the help of ICT themselves?
Specific examples of the new technological advances such as global networks, robots
and drones, internet, social networks and more will be provided with their effect on the
political scene.
3
Introduction
There has never been a bigger force for change than technology. In particular, we should
highlight how information and communication technologies (after - IT) have grown
(importance and role) since the 1990s and early 2000s. Twenty years ago there were not
so many people who would have believed that today there would already be a huge
growth of the global communication network (the Internet), the growth of the market for
mobile services and the rapid development of IT - all of which determine the direction
of development of other industries. Over the past 20 years, it has been systems of
transmitting data/information that set technological development and seriously changed
not only the activities in the main sectors of the economy, but even popular culture.
There is almost nothing that has not been affected by the IT and internet. You can argue
endlessly about what the Internet has become, but a global network is not the
technology in itself. It is rather a system that has been implemented into IT, aerospace
(satellites), microelectronics and people’s demand for mobility in all types of
communication. This system overtaken the whole of the business, financial, economical
and (what is more important for this paper) the political worlds.
Firstly, there is a need to concentrate on IT itself, to have at least some understandings
about it. Information technology (IT, as well as - information and communication
technology/ ICT for short) -is a process/method of searching, collecting, storing,
processing, supplying and distributing information. Information was, is and always will
be important. As Churchill once said, “[h]e who owns information, owns the world”.
4
Especially in today’s world, technologies have made it possible for information and data
to travel at the speed of light and to be distributed to the masses. Almost everyone uses
mobile phones today and they are a very important tool not only for communicating
with people around the earth, but also for transferring news (information or data). If 20
years ago we mostly got our information from TV or newspapers, today we use the
Internet, where we can get both TV and newspaper information before it actually arrives
on TV or at the kiosk.
Let’s take the example of Tanzania to really see how big the mobile phone market is. In
this country, which is not classified as developed (Western, first world), where more
than half of the population lives on “less than 2 USD a day”, the population of this
country has access to mobile technology.1 “The expansion of mobile telephone service
around the world has, to some degree, increased access in areas where bringing in
ground lines has been difficult. In Cambodia, for example, more than 90% of all
telephones are mobile phones.”2 More interesting is the fact that in some countries
there are more mobile cellular subscriptions than there are people living in that country.
Another example we can take is Panama, where there are double the cellular
subscriptions than population.3 The growth of the Internet is also very important, if not
the most important factor in the pace of technological change. There were only 361
million Internet users in 2000 - in the entire world. For perspective, that’s barely
1
World Bank Group ,
2
CIA Factbook - Cambodia
Internet Usage Statistics provided by InternetWorldStats.com
3
Information & Communication Technologies.
5
two-thirds of the size of Facebook today.4 Speaking of Facebook and other applications
(like Twitter or different online messengers), it is with the help of the Internet and
mobile systems becoming really global that Facebook and Twitter have become
something more than just a social networks for friends. In fact nowadays they can be
seen as political tools. Some see them as tools for freedom and democracy, others as
tools of governments to spy on their own citizens.
4
CIA Factbook - Panama
6
Chapter 1: The Growth of Global Networks
It is no longer a secret that global networks are expanding today. The growing quantities
of information flow through these networks faster and cheaper than ever before. “These
technologically sophisticated networks are reshaping the landscape of politics and
international relations, transforming global commerce, recasting societies and cultures,
and altering policy formulation and implementation. Many suggest that this is the dawn
of a new information age or the onset of a world information economy. The scope of
change is widespread, deep, and rapid.”5 Author tries to be more specific and divides
the analysis of “global networks and their roles” into the categories money, data, and
ideas. Firstly there will be an illustration of a change (in a given category), after - each
input will be viewed through the prism of politics and policies, commerce and finance
(mostly concentrating on politics). The goal is to show how the technological changes in
Global Networks create possibilities for policy-makers and firms; how the flow of
information affects the regulation and conduct of policies and commerce; how the
proliferation of information via wired or wireless routes made it easy to access and
manipulate this information as well as how global networks “keep people informed and
allow them to make their support or outrage known and thus influence society and
political events.”6
5
James Rosenau, Information Technologies and Global Politics: The Changing Scope of Power and
Governance, P39
6
Rosenau, Information Technologies and Global Politics: The Changing Scope of Power and
Governance, P40
7
Money
Most of the today's money is electronic and it pulses through global networks. The
“real” bills and coins are used less and less and make up only a small portion of an
industrialized country’s money supply. On the other hand we can see the trend that
online banking and phone banking users are growing in numbers.7 These changes have
their own effects on politics and commerce.
Politics and Policy: Control of money flows. Huge sums of money move from country
to country and currency to currency each day. “By the end of the 1990s the value of
foreign exchange trades reached about $1.2 trillion each day. In 2013 this number
increased to the amount of 5.3 trillion per day”8. Jonathan Aronson is concerned
because he thinks “this maelstrom of activity raises twin challenges for monetary
authorities”9. He first questions the ability of central bankers to manage national money
supply. While governments no longer make any serious attempts to impose currency
controls, bankers still believe in their leverages. “However, even the imposition of
draconian penalties usually fails, falling victim to the fungibility of money. Central
bankers are beginning to grapple with these issues, but so far they have downplayed
their significance and asserted that they are still in control.”10 The second issue he
questioned is whether the growth of volume and velocity of money changing hands will
7
Deloitte Development. Mobile Banking: A Catalyst for Improving Bank Performance
Rosenau, Information Technologies and Global Politics: The Changing Scope of Power and
Governance, P41
8
9
10
ibid.
ibid.
8
make it more likely for any global financial crisis to spread faster via the
interconnection between currencies. “From the runs on sterling in the 1960s, which
began the slow death of the Bretton Wood system, to the Asian financial crisis in the late
1990s, central banks, finance ministries, and the International Monetary Fund (IMF)
labored to stabilize the global monetary scene.”11 However, in times of crisis political
leaders blame foreign speculators.12 Politicians, we may say, tend to pass the buck to
avoid accusations for their own irresponsibility. However in the case of speculations,
some cries are recurring and this has to signify something.
Commerce and Finance: The new payment methods open possibilities for businesses
(both corporations and individuals) to not only think globally, but also to act almost
without consideration of countries borders. New systems have made easy money
transfers possible. VISA and Master Card are globally known and accepted; cash can be
withdrawn at almost any given location with ATMs in national - and sometimes
international - currencies. Bill payment has become much faster and easier and can be
done directly from home. National borders do not mean much in today’s financial and
commercial world. The eradication of such barriers allows even small businesses to
become truly global. “Governments are playing catch up, but mostly are staying out of
the way and allowing firms to push economic globalization forward.”13 Hence allowing
corporations to gain power and achieve bigger role.
11
Rosenau, P42
12
Malaysian Prime Minister Dr. Mahathir in 1997 blamed Soros and his speculations for the financial
crisis.
13
Rosenau, P42
9
Data and Information
Soon most people in industrialized countries will be connected with everybody else in
real time. “The numbers are startling. In just ten years, since the first commercial
Internet providers began operation in 1989, more than 200 million users are connected,
including 100 million in the United States. By 1999 almost 40 percent of U.S.
households were connected; 20 percent in the European Union, and 10 percent in
Japan.”14 Today any government, corporation or individual (again, talking about
industrialized countries) has access to more information than is available in the world’s
biggest libraries. The creation of Wikipedia and the free online version of the
Encyclopaedia Britannica provide an increasing amount of information/data for people
who seek knowledge anywhere in the world. The Internet, email and VOIP are making
bills for international phone calls fall. However, the implication of such information
superfluity goes far beyond this.
Politics and Policy: Here we may ask ourselves if more information gained by
intelligence services will truly transform into better policy? “Governments always want
to collect and analyze information that will inform their decisions. Intelligence
communities want to collect as much information as possible.”15 The example of role
and capabilities of “new/modern” intelligence services can be demonstrated in the case
of the Soviet Union shooting down Korean Airlines Flight 007. Fascinatingly, the US
14
Rosenau, Information Technologies and Global Politics: The Changing Scope of Power and
Governance, P46
15
ibid
10
President (Reagan) released the conversation between the Soviet pilot and the command
centre within a few hours. Remember that this happened in 1983 and that nobody
thought this kind of technology (interception of secret/protected information) existed. A
few problems since then have risen. One of which is that it will be hard to protect the
information you have (this will be discussed more broadly in the next chapter), and the
second is that it will be hard to search in the ocean of databases and archives for specific
(needed) information. “The glut of information flows may clog the system and may not
lead to better policy.” Jonathon Aronson believes “there may be less room for intuition,
trust, and secret understandings that were traditional instruments of the process.” He
adds “...more information may be a blessing when bureaucrats and political leaders can
manage, analyze, and synthesize the data. It can be a curse when abundant information
overloads or dehumanizes the decision making process to the detriment of creativity and
flexibility”16. Overall, author agrees with Mr. Aronson and supports his views that
people surely should understand how information flows as well as study when we can
use it to make policies better or when the abundance of information causes chaos in the
political system.
Commerce and Finance: James Rosenau asks the question: “Will firms be more
competitive if they produce and market globally for global markets?”17 We surely can
say that companies today depend more than ever on information and communications.
This is especially the case for the large multinational corporations that affect countries’
16
Rosenau, Information Technologies and Global Politics: The Changing Scope of Power and
Governance, P47
17
ibid
11
economies. These corporations not only have to produce goods and services globally,
but also to track their operations and check inventories worldwide. “The demand for
global production and marketing means that managers focus on doing business without
regard to national borders specifically in the areas of trade and investment.”18 It is
unclear why there is trend for companies to sometimes use information more
successfully than politicians. Jonathon Aronson thinks that this possibly is because
“data communication networks, electronic data interchange, and improved management
of information unleash new competitive possibilities for firms”19, they try to adopt new
communications technologies more rapidly and successfully. With the demand for new
types of technologies rising, the corporations that create them for others will likely also
increase their own competitiveness. In such a way we may have a circle, where
corporations “help each other”20.
Ideas
We should differentiate ideas from information. “Information provides the answers, but
ideas provide the questions, dreams, and insights that reshape the world.”21 It is ideas
which are at the core of all innovations and modernizations. New technologies allow
ideas to travel and be implemented faster. James Rosenau tells us that it is hard to
18
Rosenau, Information Technologies and Global Politics: The Changing Scope of Power and
Governance, P47
19
ibid
20
While paying for new technologies to one (or another) company, corporations increase their own
profits by implementing those new technologies.
21
Rosenau, P47
12
measure the spread of new ideas because this differs from money or information.
However we can see the impact and measure it.22
Politics and Policies: Ideas stand at the beginning of all innovations’ processes and
politics are not an exception. As has already been said that new ICT speed up the spread
of the ideas, but can all ideas be considered improvements? Jonathon Aronson points
that since the global depression of the 1930s world economists have more understanding
and, in order to prevent crisis, should not make the same mistakes. However, he adds
that “[t]hose lessons have not helped Japan break out of its malaise.”23 Then Aronson
brings the example of where he thinks “enough convergence and learning took place”.
He thinks that the ideas of European Union of “policy harmonization and a common
currency” were not only innovative, but also had a big influence on politics, economics,
nations and cultures.24 The flow of free speech and open market ideas fled from the
“Western Countries” into the “Eastern, Socialistic Block” and have changed the face of
global politics, finance and business since 1989. The ideas of democratic societies and
e-governance are one of the fastest spreading political ideas today. With the advances of
ICT, states have less leverage to control the flow of such ideas, thus making
governments either accept them, or block the channels to interfere the flow.
Commerce and Finance: is the idea self regulation a good or bad idea? Governments
22
Rosenau, Information Technologies and Global Politics: The Changing Scope of Power and
Governance, P48
23
ibid.
24
ibid.
13
understand that they cannot control everything. However this does not mean that there
won’t be any regulations at all. There should be balance, Aronson suggested. He brings
several examples saying that “most governments now prefer markets, not regulation, to
dominate, but want to ensure that privacy is maintained. Governments claim they do not
want to manage content, but Congress then passed the Decency Act to try to manage
access to pornography and hate sites. While China stands ready to unplug broadcasters
providing content unacceptable to the government.”25 Most companies, of course, want
fewer restrictions and less governmental control over them. But at the same time they
want their profits to remain the same (or even become greater). Thus, companies try to
regulate themselves while “broadcasters in Asia practice self-censorship to create
culturally appropriate content on a country-by-country basis.”26
To conclude this chapter here is an example that ties all three categories - Money,
Information and Ideas - to one. As ideas flow even faster and some of them tend to be
important, states may want to implement some of them. For example, a government
likes the idea of Sustainable Development and wants to pass new “green” laws and
regulations. This information reaches the corporations and they want to leave the
country because they do not like to be restricted. The government meets with
corporations and says that they will first do research to get more data and information
about pollution, weather, and climate change patterns in the region. After the reports are
concluded, they will negotiate whether or not to limit companies by law, or whether the
25
Rosenau, Information Technologies and Global Politics: The Changing Scope of Power and
Governance, P48
26
ibid
14
government will pay them (or provide tax breaks) and corporations will self-regulate the
issue. With the help of global networks, cooperation between government and
corporations grows meaning they can realise dream projects together. The vast amount
of data and information will be much more precise. The experience gained will be
passed to the other countries with the idea of sustainable development via global
networks.
Chapter 2: The Internet and Politics
Throughout the existence of human society and the state, revolutionary changes in
communication and information technologies have been followed by significant change
in the course of the political process.
At the present stage of development, it is
internetization (the growth of the Internet) that is going into the masses. From the local
15
invention of military scientists and researchers to facilitate their research and operations,
i.e. a local network, the Internet has evolved into a worldwide network, the
communication in which influences all aspects of our lives more and more. This trend
also has its own effect on global politics.
The Internet can be seen as an open electronic information platform that significantly
alters the political space both within borders and in the global arena. It is the Internet
that provides virtually unlimited access to almost any type of information that is
presented for public viewing as well as discussion of any political actor. In this case, the
Internet is beginning to resemble a kind of national assembly of Athenian Democracy
and the Novgorod Veche, only, of course, at a higher level of technical support. The
Internet puts a clear sign of equality between all participants in the political process,
regardless of their financial status and political or economic influence. With this in mind,
we may say that the Internet acts as a clear and obvious protagonist of democracy and
the rule of law as well as class equality of people.
Considering online communication in terms of the political process, it is now necessary
to define a few key points related to the political potential of the Internet. The first is
that people tend to use the Internet more frequently as a source of political information.
One of the main features of this trend is “Viral Editing”. This works due to users’
activity and thus raises the really “hot” topics, allowing people not only to filter
information but also to analyze its various sources, to form and express their own
16
opinions. The second tendency which is becoming widely accepted is the use of the
Internet by politicians. There are even examples of politicians raising huge amount of
funds for their presidential campaigns via donations on the Internet. Third, and most
interesting, is that the Internet (as a technology) and the technological capabilities of
modern electronics allow socio-political dialogue among political actors, active network
users and public administration directly from the desktop. The growth of “e-democracy”
and “e-governance” in different parts of the world can be seen as an illustration of the
new trend and emerging role of the Internet with its growing influence on politics and
democratic processes. These political tendencies and activities, which are realized with
the help of the Internet, are known as “cyberpolitics”; and this chapter is dedicated to
exactly that.
The Internet as a Source of Political Information
For more than three centuries print media had a monopoly on the mass delivery of news.
Later it had to share this mission with radio and TV. Now the Internet takes away almost
all the exclusive rights for the production and distribution of information. “A basic tenet
of democratic theory is that voters’ choices must be based on informed thinking about
political issues, so it is only natural that as online media have gained attention at the
expense of offline outlets, political scholars have increasingly scrutinized the
performance of the Internet as a source of political information.”27 Although, most of
27
Leticia Bode, Stephanie Edgerly, Emily Vraga, Ben Sayre, and Dhavan Shah. Digital Democracy: The
17
mainstream media (newspapers, broadcasting corporations) have their own online pages
- and they remain amongst the most visited websites - people consider the Internet not
only a place for receiving the news, rather “[m]any now visit a variety of online
information sources, including political blogs.” To define blog, in “Digital Democracy”
Bode has quoted Farrel and Drezner, where they have described a blog as “a web page
with minimal to no external editing, providing on-line commentary, periodically
updated, and presented in reverse chronological order, with hyperlinks to other online
sources.”28 The growth of political blogs in the last decade has been truly astounding:
“Collectively, the weekly readership of the top dozen political blogs rivals that of Time,
Newsweek, or the New York Times.”29 The political blogs, of course, have gained
scholars’ attention. They emphasize two realms: the content and its credibility on blogs
as well as the motivations of bloggers. One of the main features of political blogs is that
they enable “Viral Editing”.
Viral Editing is, in fact, the first successful Artificial Intelligence. It is artificial because
it was created in a technical environment, although the conducting "neurons" of this
network are the people themselves - the users.
Accidentally finding interesting information, a casual user edits it, comments on it and
adds or removes something. Then this user distributes his edited information, trying to
Influence of New Media Production and Consumption in Politics. p509
28
ibid p511-512
29
Matthew.Hindman. The Myth of Digital Democracy.
18
“infect” other users’ interest. After the number of reposts reaches some threshold, a
thematic epidemic begins and the information goes viral. In this case, the only source of
motivation for the viral editor is a desire of the user to receive as many “likes, clicks and
shares” as possible. This creates a problem of credibility, or rather lack thereof.
However, even if there are thousands of political bloggers, only small group of “A-list
bloggers” are actually considered not only interesting, but also credible.30
A-list bloggers, have not only interesting views, but are also considered to be credible.
We can bring many cases of when bloggers getting more resonance than mainstream
media because of strict government control of said media. Most of these are cases in
Iran and Russia. Iran is known for its very strict approach to media, where almost
everything is controlled by officials. Many journalists have become bloggers because of
the censorship in mainstream media. It is certainly not true to say that only political
bloggers have gained attention in Iran. However, most of the “A-List” bloggers talk
about the news which was not covered by the mainstream media from politics and
religion to women’s rights and things that cannot be said in public.31 “The first
significant publication about Persian blogs, We are Iran: The Persian Blogs, presented
blogs as a safe haven for young, urban bloggers who espoused secular, pro-human rights
and democratic ideals, with aspirations for more freedom of thought and speech, and an
inclination for a modern, even Western way of life. This rich but distorted picture both
30
31
Matthew.Hindman. The Myth of Digital Democracy.
Laurent Giacobino, Arash Abadpour,Collin Anderson, Fred Petrossian, and Caroline Nellemann
Whither Blogestan : Evaluating Shifts in Persian Cyberspace.
19
reflected and corroborated Western narratives about the Persian blogosphere, in which
blogs were seen as the best hope for freedom and democracy in Iran.”32 “Between 2002
and 2010, the Persian blogosphere - or what is referred to as “blogestan” - exploded in
size and became the topic of numerous reports, essays, videos and books. Global
interest in this emerging trend, however, seemed to decrease during the second
presidential mandate of Mahmoud Ahmadinejad (2009- 2013), when online social
networking and microblogging became the most discussed and researched IT-related
topics, along with the Iranian regime’s policies aimed at deterring online expression.”33
The Iranian government’s actions against blogging were very successful. Due to the
blocking of some web pages and making it harder to post news on the Internet, the
population of blogs in Iran has declined dramatically. As has been mentioned in
“Whither Blogestan: Evaluating Shifts in Persian Cyberspace”, only 20% of the most
active blogs prior 2009 were still active in 2013.
The next example of powerful a blogging community is the case of when Russia’s
Channel 1 (a governmental broadcasting corporation) showed a satellite image (see
Figure 1) of Malaysian Airlines flight MH17 being shot by a fighter jet. The news
anchor claimed that the fighter jet was Ukrainian and that the image was provided by an
American whistle-blower. It was the blogging community that pointed out that “the
image is fake”. In his personal blog, Ilya Varlamov34 provided an investigation proving
that the image was badly and unprofessionally “photoshopped”. He highlighted that the
32
33
34
ibid.
ibid.
Ilya Varlamov. Первый по фотошопу/First in Photoshop.
20
whole image was fabricated and that not only were fighter jet and plane different
models but also that the geographic location and the time did not correspond with the
original scene of the tragedy.
This editing went viral and made even more resonance
than the official news. It would also be appropriate at this point to highlight that most of
the “A-list” bloggers in Russia are political bloggers and most of them find themselves
in opposition to the Kremlin.35
How do Politicians Use the Internet?
The next very important feature that the Internet has made possible is to host online
campaigns and reach the masses. “Door-to-door campaigning is a thing of the past,”
says Rand Straus from the Huffington Post.36 Clair Miller, the New York Times reporter,
even said that without the use of Internet technology President Barack Obama may not
have been elected.37 She was not alone, also political writer Steven Hill has noted that,
“[o]ne of the winning campaign strategies masterfully deployed by the Obama
campaign was its use of the Internet. More than any other previous campaign, the
Obama campaign showed tremendous mobilising and fundraising potential of a
comprehensive internet strategy.” Online videos and live-streams made political debates
even more popular. Companies like Google track traffic during the political debates.
35
One of the Russian Oposition Leaders - Alexei Navalny - is also a well known bloger in Russian
network.
36
Rand Strauss. How the Internet Has Changed the State of Political Debate.
37
Clair Miller. How Obama's Internet Campaign Changed Politics.
21
Figure 2, for example, shows what users were searching for via Google while watching
the debates between Senator Biden and Governor Palin in 2008. “Governor Palin called
Senator McCain a "maverick" several times, sending many viewers to Google in order
to query “definition of maverick”, “what is a maverick”, and “define:maverick”.”38
Fundraising was one of the most important parts of Obama’s online campaign. “He
raised more money than any US presidential candidate in history, a mind-numbing $750
million. Online donations totalled $500 million, twelve times as much as John Kerry
raised through online fundraising in 2004. But unlike previous big fundraising
candidates, most of his money came from small donors, the vast bulk of that in
increments of $100 or less. Obama’s fundraising capabilities gave him a massive lead
over John McCain in the money race to carry his campaign message to voters.”39
Steven Hill also provides pertinent examples of how Obama’s campaign used internet
technologies, especially the video capabilities. “The first inkling of the ability of the
web to grab attention for the Obama campaign was revealed rather innocuously in June
2007 when an independently-developed YouTube video of ‘I got a crush on Obama’ was
posted by a buxomly clad Obama Girl. It was a huge sensation that drew attention to his
campaign early on.” The campaign’s staff used almost full capability of YouTube as a
video platform. The official campaign channel (on YouTube) has been watched over 290
million times, an astonishing over 15 million hours. To buy the same amount of time on
38
39
Official Google Blog. The VP Debate: Candidates, Questions, and Queries.
Steven Hill. World Wide Webbed: The Obama Campaign's Masterful Use of the Internet.
22
broadcast TV would cost around $47 million.40 Paying nothing for the time was also
positive in other ways simply because people were searching for the videos or received
them from their friends. In this way they were not interrupted on “commercial breaks”
while watching their favourite shows.
The internet also allowed people to repeatedly listen and watch the candidates’ own
words in the face of attacks. Obama could react almost instantly and have more impact
on the public debate. During Obama’s campaign in 2008 there was a huge controversy
over Obama’s friendship with the Reverend Jeremiah White. “While Obama’s
opponents found ways to make sure that Reverend Wright’s incendiary words kept
surfacing, people could watch and re-watch Mr. Obama’s speech on race. They could
forward links to their own friends and associates. Eventually nearly 7 million people
watched Obama’s 37-minute speech on YouTube, and the mainstream media reported on
it in part because it became such an internet sensation.”41
Obama’s success online almost certainly brought more politicians and officials onto the
web. For example the Prime Minister of the United Kingdom, David Cameron, has not
one, but two verified Twitter accounts. One is for his office and is run by the 10
Downing Street staff and the second is his personal account. The other example could
be noticed - or couldn’t go unnoticed - when only a few days ago Hillary Clinton
announced via her Twitter account that she is launching her campaign for the presidency:
40
41
from the Official Obama for America YouTube Channel.
Steven Hill. World Wide Webbed: The Obama Campaign's Masterful Use of the Internet.
23
“I'm running for president. Everyday Americans need a champion, and I want to be
that champion.”42 Interestingly, it was the first place where she announced her plans
and only after appearing on Twitter did the message find its way to mainstream
media.
E-democracy and E-governance
The analysis of the role of the Internet as a guarantor of democracy is one of the most
promising directions in political science. Information and Communication Technologies,
being introduced more deeply into society, are changing the implementation of
fundamental democratic procedures - such as freedom of political expression and
freedom of speech.
With the help of the Internet people in some countries now may exert their political
rights in a way that has rarely been done before. They may vote, discuss new laws, talk
to officials, pay taxes and apply for visas or citizenship without leaving home. Simply
having PC or even mobile phone enables them to access the governmental web portals
via internet.
Maybe Internet voting not something new, as it has been already tried by some countries
such as Switzerland, the UK and the US. Maybe it is not fundamentally changing the
voting process itself, as the main aspects - flexibility in time and place - have already
42
The link to the message https://twitter.com/HillaryClinton/status/587336319321407488
24
been achieved with the creation of postal voting. Internet voting serves the exact same
purposes and allows one to “cast a ballot remotely and during more than a few hours on
voting day”43 but it makes it even simpler, faster, cheaper.
The nation that has used these possibilities to the utmost is Estonia, a former Soviet
Union state, which is now part of the European Union. Since 2000, Estonia has
conducted eight national elections in which all voters could use Internet voting.44
Internet voting has been used45:

in the local elections of October 2005, October 2009 and October 2013 and

in the parliamentary elections of March 2007, March 2011 and March 2015 and

in the European Parliament elections of June 2009 and May 2014.
This positive trend can be seen in Figure 3. In 2007 around 30,000 people used Internet
voting, which corresponds to about 5% of voters. In the European Parliament elections
of 2009, a rise in the numbers of Internet voters can be seen where more than 58,000
people voted via the Internet, corresponding to about 15% of voters. In the Local
Elections of 2009 and in the Parliamentary elections of 2011, the percentage of Internet
voters continued to rise and, in the European Parliament Elections of 2014, the
amount reached 31.3% of all voters. In 2015 a slight drop of the percentage to 30.5%
can be seen, however the number of people using the Internet to vote has reached a new
high with the Estonian National Electoral Committee registering approximately 176,000
43
44
45
Michael Alvarez. Internet Voting in Comparative Perspective.
ibid
Statistics about Internet Voting in Estonia. Electoral Management - Estonian National Electoral
Committee
25
internet votes.
Internet voting shows positive signs and is working in Estonia. Some might question
how and why it works in Estonia but not really in other states? The answer is hidden not
far away. “There are four key features to the Estonian experience that makes Internet
voting a workable alternative: (1) widespread Internet penetration, (2) a legal structure
that addresses Internet voting issues, (3) an identification system that allows for digital
authentication of the voter, and (4) a political culture that is supportive of Internet
voting.”46
Overall, Internet capabilities can affect the political process by simplifying the
horizontal and vertical political connections: between the governmental institutions, and
between government and citizens. Thus, the Internet as a technology facilitates the task
of consolidating citizens and their interactions with the state, eliminating geographic
and socio-demographic barriers. The Internet reduces the organizational costs of
political associations and unities, increases the ability to collect contributions and
donations, makes it possible to independently spread political influence and opinions (of
politicians and citizens) through the new ICT resources.
One more example of e-government capabilities can be seen in how the government of
Uzbekistan tries to implement it. The draft law for the “e-government” itself was
46
Michael Alvarez. Internet Voting in Comparative Perspective.
26
published online and put up for public discussion. Anyone who had questions,
comments or ideas could respond and participate in drafting the law.47 Today the
parliament wants to pass the law to enable any other law to be discussed publicly on the
official e-government platform.48
In the end, it must be said that the discussion about the impact of ICT capabilities on the
domestic political process will still remain open. Much depends on the Internet literacy
of citizens. Also transformation of the political process hinges on the willingness of the
state and the public to take and use the opportunities provided by the new
communication technologies: new forms and methods of political participation, the
possibility of direct relationship between society and political actors.
Appendices.
Figure 1
47
48
Draft Law "On E-government" Put on Public Discussion. UzReport.
Mygov.uz or egovernment.uz
27
Source: zyalt.LiveJournal.com
Figure 2
Source: Official Google Blog
Figure 3
Local
Parlia- Europea Local
Parlia- Local
Europea ParliaElection mentary n
Election mentary Election n
mentary
28
s 2005
Eligible
voters
Election Parliam s 2009
s 2007
ent
Election
s 2009
1
059
897 243
292
Election s 2013
s 2011
Parliam Election
ent
s 2015
Election
s 2014
909 628
1
094
913 346
317
1
086
902 873
935
899 793
Particip
ating
voters(v
502 504
oters
turned
out)
555
463
399 181
662 813
580 264
630 050
329 766
577 910
Voter
turnout
47,4%
61,9%
43,9%
60,6%
63,5%
58,0%
36,5%
64,2%
I-voters
9 317
30 275
58 669
104 413
140 846
133 808
103 151
176 491
I-votes
9 287
counted
30 243
58 614
104 313
140 764
133 662
103 105
176 329
I-votes
cancelle 30
d
32
55
100
82
146
46
162
I-votes
invalid
n.a.
n.a.
n.a.
n.a.
n.a.**
1
n.a.
1
Multiple
I-votes(r
eplaced 364
with
I-vote)
789
910
2 373
4 384
3 045
2 019
4 593
I-voters
among
eligible
voters
0,9%
3,4%
6,5%
9,5%
15,4%
12,3%
11,4%
19,6%
I-voters
among
particip 1,9%
ating
voters
5,5%
14,7%
15,8%
24,3%
21,2%
31,3%
30,5%
I-votes
among
17,6%
45,4%
44%
56,4%
50,5%
59,2%
59,6%
7,2%
29
advance
votes
I-votes
cast
abroad
among
I-votes n.a.
(based
on
IP-addr
ess)*
3,9%
105
51 states 66 states 82 states states
4,2%
I-voting
3 days
periood
3 days
7 days
7 days
7 days
7 days
7 days
7 days
I-voters
using
n.a.
mobile-I
D
n.a.
n.a.
n.a.
2 690
11 753
11 609
22 084
I-voters
using
mobile-I
n.a.
D
among
I-voters
n.a.
n.a.
n.a.
1,9%
8,6%
11,0%
12,2%
2%
3%
2,8%
105
states
5,71%
4,69%
116
98 states
states
* in Local Elections, voters permanently residing abroad are not eligible for voting
** one invalid vote is depicted among cancelled votes
Source: Estonian National Electoral Committee.
vvk.ee
Chapter 3: Challenges and Security Threats Brought into
Politics by ICT.
Unfortunately, new communication information technologies bring serious threats to the
national security. The global networks provide opportunities to organize revolutions and
overthrow regimes. If hackers were acting alone before, now international crime has
30
entered cyberspace and brought real crime activities to the internet with the help of
software engineers. The emergence of the Internet has also made secret information and
data vulnerable, thus espionage has also come online. Some information does not need
to be hacked and is there to be downloaded and passed on. This may be harmful
information with extremist content that threatens the security and authorities of the
state.
Analysing the role of Social Networks and Blogs as a political instrument for
coup-d’etat; taking a look at how extremist organizations and the international criminals
invade the cyberspace; as well as discussing the concept and possibility of cyberwar all of these is a part of the chapter.
Social Networks and Blogs as a Threat to the Regime
Firstly, let us define what today’s Internet Social Networks are. Dana Boyd suggests this
definition: “[s]ocial network sites are web-based services that allow individuals to (1)
construct a public or semi-public profile within a bounded system, (2) articulate a list of
other users with whom they share a connection, and (3) view and traverse their list of
connections and those made by others within the system.”49 With the development of
49
Boyd, Danah, and Nicole Ellison. Social Network Sites: Definition, History, and Scholarship.
31
Web 2.0,50 social networks have gained a tangible foundation in a form of portals and
Web services. For example, one may find an unfamiliar person on a social network and
see the chain of acquaintances through which there is a connection. The growth of
social networks on the Internet started in 1995 with the creation of classmates.com51.
The project gained popularity and became the role model for future projects. However,
the real boom of social networks began around 2003 to 2004 when MySpace, LinkedIn
and Facebook went online. While LinkedIn was built especially for business contacts
and purposes, the creators of MySpace and Facebook made a bid on individual needs
and users’ self-expression. What was more important is that new social networks
allowed people not only to create, but also to share their creations and thoughts with the
users of the social network. Thus social networks can be seen as a platform for
interaction between people in groups that share same ideas.
Let us now return to the threats for political regimes and how the use of social networks
and blogs “helps” revolutions. Social networks provide unique opportunities for opinion
leaders to carry out their activity and interaction with the target group. The technologies
of Web 2.0 have opened possibilities for everyone to create a common social and
information space. Realizing these possibilities via social networks or blogs
significantly enhances and speeds up information and communication processes. The
main objective of using social networks and blogs during revolutions is maximum
50
Web 2.0 - The second stage of development of the Internet, characterized especially by the change
from static web pages to dynamic or user-generated content and the growth of social media.
(OxfordDctionaries.com)
51
The social network, where you can find your old classmates
32
coverage and efficiency of information transmission. This is why the possibilities of
social networks and other technologies have a significant impact on organization and
tactics used by the supporters of regime change.
For example, social networks had a huge role in the organization of protests and
revolutions during the “Arab Spring” of 2011. One day before the protests in Egypt, the
Facebook group “Revolution Day”, created by Wael Ghonim, had gained more than
85,000 people who verified their attendance.52 Opera Software, which develops web
browsers for mobile devices, has conducted research on the subject of active Internet
users in Egypt and other countries affected by the "Arab Spring". According to the
results, during the riots in Tahrir Square in Cairo, web traffic soared on Egyptian
opposition websites and some of them kept a high level of demand even after the
departure of Hosni Mubarak. According to the company, from February 2010 to
February 2011 the number of visits to the most popular online resources in the Middle
East (including the top sites Facebook, Google and YouTube) increased by 233%, the
number of unique users increased by 142%. But the most important thing is that the rate
of information exchange has experienced its largest growth: the amount of data
transferred increased by 259%.53
Here is a snapshot of the statistics in Egypt since February 2010, according to Opera
Software:54
52
53
54
Abigail Cairo. Is Egypt About to Have a Facebook Revolution?
Jon Von Tetzchner. State of the Mobile Web.
Jon Von Tetzchner. State of the Mobile Web.
33
Top 10 sites in Egypt






Page view growth : 187.7 %
Unique user growth : 139.9 %
Data transfer growth : 230.1 %
Page views per user: 373
Data transferred per user (MB): 7
Data transferred per page view (KB): 19










google.com
facebook.com
youtube.com
yahoo.com
bbc.co.uk
mobile2day.com
youm7.com
100fm6.com
my.opera.com
aljazeera.net
Opera Software has also conducted an interview with engineer, Ayman Shokr, from
Cairo, who participated in the protests. “The key success for the revolution was the way
we connected via Facebook and other social media via the Internet to mobile phones,”
said Shokr.55 When the government realized the way the wind was blowing from and
blocked access to the Internet, the time had already been lost. Life in the country had
stopped and all activity had flowed to Tahrir Square. The rest is already part of the
history.
Criminal Organizations and Terrorist Activities in Cyberspace
With the fast-paced growth of technologies, not only ordinary people’s and politicians’
55
ibid.
34
opportunities rise, but also the possibilities open for wrongdoers and their activities.
Internet and global networks have allowed extremist and terrorist groups to obtain
information about their targets and weaknesses more easily and more quickly. They may
find the transport timetables, maps and plans of the buildings, working hours, etc
online.56 Hamas even used Google Earth to plan its attacks on Israel.57 The information
they acquire in the Internet has an impact on other people’s lives. The Internet is also
being used by terrorists to recruit new people by spreading their own ideas, views and
ideology. Islamist extremist groups and organizations such as Hizb ut-Tahir and the
Hezbollah are trying to attract youngsters by placing music and computer games on
their web pages.58 The Internet is used to spread tactics with instructions and manuals.
Cohen-Almagor lists and describes the catalogue of extremist literature available online,
such as “Encyclopedia of Jihad” or “The Mujahideen Explosives Handbook”, which
teaches how to create improvised explosive devices at home and carry out violent terror
attacks. He also highlights the presence of “hacking material, the tutorials in viruses,
tools of anonymity and encryption methods.”59
One of the latest examples can be seen in how ISIL uses social networks. They have
mastered Twitter by creating an application that sends tweets/messages with hashtags
and pictures using their supporters’ profiles. This bumps their massages to the top of
most popular trends in Twitter. Berger has published an excellent graph online on the
56
57
58
59
Raphael Cohen-Almagor. In Internet’s Way.
Clancy Chassay and Bobbie Johnson. Google Earth Used to Target Israel.
Raphael Cohen-Almagor. In Internet’s Way. p44
Ibidp 47
35
Atlantic that shows how this application works throughout two-hour observation period
(see Figure 1). ISIL is also known for posting videos of torture, executions and
beheadings online. Such videos spread fear and hatred based on religion, race and
nationality across the web. Hence, they should be immediately blocked on the social
media as content that appeals to force and violence.
Nowadays even traditional organized crime uses the advances of technologies. They
employ software engineers to attack industrial systems. BBC has reported on a case
which took place in Antwerp, Belgium. The Dutch based drug trafficking group hacked
servers in the sea port of Antwerp. This enabled them to gain access to the data which
provides the location and security details of containers. By using this information they
(criminals) could easily hide heroine in cargoes, move them bypassing security and then
pick it at the destination point.60
The problem is becoming even bigger because the critical infrastructural today is mostly
controlled by new technologies. In an interview with Bloomberg, Eugene Kaspersky
said that criminal organizations can hack not only ports, but also petrol stations and coal
mines to steal natural resources.61 Critical infrastructure is the backbone of the United
States’ essential services. It is responsible for security, healthcare, and economy. For this
reason, Presidential Policy Directive 21 has been released, which establishes a national
policy to identify, prioritize, and protect critical infrastructure. According to PPD-21,
60
61
Tom. Police Warning after Drug Traffickers' Cyber-attack. BBC, Plocie Warning.
Eugene Kaspersky interviewed by Cory Johnson. Why Hackers Target Gas Stations, Coal Mines.
36
there are 16 critical infrastructure sectors62:
1.
Chemical
9.
Financial Services
2.
Commercial Facilities
10. Food and Agriculture
3.
Communications
11. Government Facilities
4.
Critical Manufacturing
12. Healthcare and Public Health
5.
Dams
13. Information Technology
6.
Defence Industrial Base
14. Nuclear Reactors, Materials, and Waste
7.
Emergency Services
15. Transportation Systems
8.
Energy
16. Water and Wastewater Systems
“Existing security technologies are typically not appropriate for the present control
systems in organization infrastructures because the systems were not designed with
security in mind.”63 Thus, the current infrastructure system is very vulnerable to
cyberattacks. However, criminal organizations are more interested in bypassing security
and abusing the infrastructure, not destroying it. While most of terrorist organizations
do not yet have sufficient skills to attack and deal out physical damage via cyberspace,
there are attacks on such systems and they are state-sponsored. Some countries utilize
and exercise these possibilities on a very high level.
62
The White House, Office of the Press Secretary. Presidential Policy Directive -- Critical Infrastructure
Security and Resilience.
63
Mark Mcgibbon. Cyber Readiness : Are We There Yet?
37
Cyberwars - The Wars of the Future?
When the Iranian Nuclear Deal was not yet a case, in 2010 the Iranian nuclear plant
Natanz was attacked via the Internet. It was not a simple attack to steal information,
rather the attack caused physical damage. This was a cyberattack, and the cyberweapon
was given a name: Stuxnet.64 Many wondered if it is the start of a new way of waging
war? A cyberwar?
Firstly, let’s define what can be seen as a cyberwar. A cyberwar is the confrontation on
the Internet, aimed primarily at disabling computer systems of government agencies of
the enemy country as well as systems of its critical infrastructure sectors. International
relations and political confrontations are often continued in the Internet in the form of a
cyberwar. The British journal The Economist identifies cyberspace as the fifth domain
of warfare, “after land, sea, air and space”.65 It should be highlighted that not only
attacking infrastructures should be considered as a cyberwar, but also:

Vandalism - the use of the Internet to spoil government, state and official web pages;
changing the content of these resources

Propaganda - the use of social networks and emails to send propagandistic
messages

Espionage - hacking systems to obtain secret or confidential information such as
military secrets like designs for the fighter jets or data for future military
64
65
David Sanger. Obama Order Sped Up Wave of Cyberattacks Against Iran.
Cyberwar. by The Economist
38
operations.
Cyberwar allows countries to have “war” without bloodshed, thus minimizing civilian
casualties. More important to the states is also the ability to carry out battles more
swiftly and with lower costs as it is easier “to move electrons across the globe than to
move large ships long distances.”66
Today most of the major powers, or the permanent members of the United Nations
Security Council67, have their own cybersecurity programs and cyber military
formations. One example is the United States Cyber Command officially established in
2009.68 The main reason for its creation was to be able to defend the country in cyber
space as well as to be able to respond to cyber attacks immediately.
The possibilities of having war in cyberspace may also bring new actors to the political
scene. They can be small states or even non-state actors that have access to the World
Wide Web. It takes much more effort and capital to create a proper army with top
weaponry, fleets, aircrafts, while it is relatively easy for an organization to teach
personnel coding and programming to establish its own cyber formations.69
Joseph Nye, a former US assistant secretary of defence and chairman of the US
National Intelligence Council, remembers that “the researches from US Department of
66
67
68
69
Joseph Nye. Cyber War and Peace.
United States, United Kingdom, France, Russia, and China.
The Official web page of USCYBERCOM - http://www.arcyber.army.mil/
Countries may even hire/employ hackers, like they do with the international mercenaries.
39
Defense created the Internet”. He adds that “today, by most accounts, the US remains
the leading country in terms of its military and societal use.”70 He also believes that
there is a dependency on new technologies and this makes the US more vulnerable
compared to other countries. In addition, “cyberspace has become a major source of
insecurity because, at this stage of technological development, offense prevails over
defense there.”71 However, this is not necessarily true. The Principal Cyber Advisor to
the Secretary Of Defense, Eric Rosenbach, speaking in the Senate has said that the US
military is well prepared to protect national security against cyber attacks but they are
not currently able to conduct a full-scale offensive campaign. The reason mentioned by
Rosenbach was insufficient investments.72
At the end of the article, Joseph Nye compares the possibilities of cyber war and
cyberattacks. Stating “A ‘cyber 9/11’ may be more likely than the often-mentioned
‘cyber Pearl Harbor’.”73
He means that there is more chance of a terrorist cyber attack
than a state operation. He may be partially right, but there have already been cases of
state cyber attacks. The reason why his opinion could be correct is that the major states
have had their own infrastructure connected by new information technologies. That
makes them vulnerable as well. This might actually look more like the case with the
intercontinental ballistic missiles of the Cold War period - mutual assured destruction as has been stated by the Senator Nelson.74 The only way we might see a “cyber 9/11”,
70
71
72
73
74
Joseph Nye. Cyber War and Peace.
Ibid
United States Commitee on Armed Services. Hearings : Military Cyber Programs and Posture.
Joseph Nye. Cyber War and Peace.
United States Commitee on Armed Services. Hearings : Military Cyber Programs and Posture.
40
is if the hacker groups or software engineers affiliate with the terrorist organizations or
become cyber terrorists themselves.
Excursus
In today’s world the Internet has become a tool for governments to track potential
threats. Governments use the Internet to trace different people and organizations that are
considered to be dangerous for the regime. It may be criminals, extremists or terrorist
groups. In particular states the opposition can be tracked as a threat to country’s
“stability”. In most cases the Internet is the only way for the opposition to reach the
masses, because government controls all of the mainstream mass media inside the
country. Such countries as Saudi Arabia, Belarus, Russia, China or Iran can be seen as
examples. However author believes that one specific case of China and Yahoo actions
are one of the first and colourful illustrations of repressive actions against the opposition
and free speech. Shi Tao, is a journalist, who has been arrested after divulging state
secrets. Using his Yahoo e-mail-account, he posted a government decree on the Internet.
The document prohibited the Chinese media to have any kind of reports of the
anniversary of the Tienanmen Square massacre. Yahoo has provided personal
information, thus helped to identify and track the journalist.75 This was one of the first
cases, that got global attention on the possibilities that are open for the repressive
governments.
75
Joseph Kahn, Yahoo helped Chinese to prosecute journalist.
41
After the case in China almost everyone in the world began to understand that internet is
not really free and there is a possibility to be traced. However, a former National
Security Agency contractor Edward Snowden with his revelations in 2013 surprised not
only US public, but also many other states and their governments. He disclosed the
information about special secret programs of surveillance and their scale. Based on
secret documents sent to the media by Snowden, journalists reported that the
intelligence activities of US secret services were directed not only against foreign states,
but against US citizens, as well as against the NATO and the European Union - which
are considered to be one of the main allies. “Those reports were followed by revelations
in both the Washington Post and Guardian that the NSA tapped directly into the servers
of nine internet firms including Facebook, Google, Microsoft and Yahoo to track online
communication in a surveillance programme known as Prism.”76 Snowden also told
that the programs cover “phone calls, emails, texts, search history, what you buy, who
your friends are, where you go, who you love.”77 The fact that the intelligence activities
was also targeted at allies hurt foreign affairs of the country, and relations with the allies.
The situation got even worse, when Spiegel has reported that “United States intelligence
agencies have not only targeted Chancellor Angela Merkel's cellphone, but they have
also used the American Embassy in Berlin as a listening station.”78 Shortly after
Chancellor Merkel then on the EU summit has told that she called to President Obama
and said that “spying on allies is not acceptable” and represented a “grave breach of
76
77
78
British Broadcasting Corporation (BBC), Edward Snowden: Leaks that exposed US spy programme
Associated Press.Everyone Is Under Surveillance Now, Says Whistleblower Edward Snowden.
Spiegel, The NSA Secret Spy Hub in Berlin
42
trust”79. Surprisingly, Spiegel has revealed that the German Intelligence Bundesnachrichtendienst (BND) has been cooperating with their US colleagues from
the NSA, and “it seems that German intelligence was aware of the espionage -- and did
nothing to stop it.”80
79
Ian Traynor, Angela Merkel: NSA spying on allies is not on
Maik Baumgärtner, Nikolaus Blome, Hubert Gude, Marcel Rosenbach, Jörg Schindler and Fidelius
Schmid, German Intelligence Agency BND Under Fire for NSA Cooperation
80
43
Appendices
Figure1
Tweets Sent by ISIS's Social-Media App Over a 2-Hour Period
Source: TheAtlantic.com
44
Chapter 4. New Technologies and Battlefields.
As has been described in the previous chapter new information and communication
technologies provide the opportunities for cyber attacks. However, these attacks have
some cons. One is that after the attack, the virus or malware would be known to other
parties and they would update their systems so that this virus could not be used again.
Typical weaponry, on other hand - such as rifles, pistols, shotguns and rocket launchers
- works most of the time. With the new technologies upgrades making them more
accurate, they have become more fatal as well. New technologies have infiltrated the
battlefields and changed the conduct of war forever. Terrorists create new varieties of
improvised explosive devices. Modern warfare hugely relays on high-techs weapons
and unmanned systems - drones and robots.
Improvised Explosive Devices
An Improvised Explosive Device, or IED, is simply a home-made bomb. It is one of the
most used weapons of terrorist groups, vandals, criminals and suicide bombers. The
main reasons for its popularity are how easy and cheap it is to make and also that it “can
come in many forms, ranging from a small pipe bomb to a sophisticated device capable
of causing massive damage and loss of life. IEDs can be carried or delivered in a
45
vehicle; carried, placed, or thrown by a person; delivered in a package; or concealed on
the roadside.”81 IEDs have mainly been used in the hotspots (such as Pakistan, Iraq and
Afghanistan) against anti-terrorist coalition forces. They are considered very successful
as more than 66% of deaths within coalition forces in Afghanistan since 2001 have been
attributed to IEDs.82 However, IEDs are not only being used in combat zones, terrorist
IED attacks have also been performed in the peaceful cities. The Department of
Homeland Security mentions cases such as the Oklahoma City bombing in 1995, the
Madrid train attacks in 2004 and the London bombings in 2005.83 The recent Boston
Marathon bombings in 2013 can also be seen as an example of the IED use.
These improvised explosive devices are considered to be easy to make because the
instructions can be found on the Internet and the materials and components for the
bombs are legally available on the market. Explosives may be both liquid and solid
contain acetone from nail polish remover, hair bleach with a 15-25% volume content of
hydrogen peroxide and a common acid. It is possible to rupture the body of an airplane
with less than 1 kg.84 “IEDs consist of a variety of components that include an initiator,
switch, main charge, power source, and a container.”85 Sometimes terrorists add extra
materials like nails, glass and/or some metal fragments to increase the damage and hurt
more people.
81
Randy Atkinson. IED Attack: Improvised Explosive Devices.
Tom Brook . IED Attacks in Afghanistan Set Record.
83
Randy Atkinson.
84
Oppenheimer, A. R., and Richard English. IRA, the Bombs and the Bullets: A History of Deadly
Ingenuity.
85
Randy Atkinson.
82
46
With the help of new technologies, IEDs can be detonated from far away with the use of
a cell phone or any other source of signal (Figure 1 shows an example of a typical IED).
There are also new technologies today to help the military and the police to fight against
IEDs. The unmanned systems or robots help to defuse the homemade bombs and save
the lives on thousands of people (Figure 2 illustrates a regular anti-IED robot).
Drones, Robots, and Unmanned Systems
New technologies have allowed armies to take soldiers away from very dangerous
places. Now that robots have been created, soldiers can now operate them from far away
and observe everything through cameras and navigate with the help of GPS. Of course,
in most countries the use of unmanned systems and robots is very rare. However, the US
and Israel armies posses highly developed and far advanced drone technologies.
Royakkers and Olsthoorn agree that “the majority of these unmanned systems used in
operations today are unarmed and mainly for reconnaissance and mine clearing”86.
However, there is a trend for robots to become armed and the best example can be seen
again in drones. In addition, there is a question that is being asked by Royakkers and
Olsthoorn: who should be held liable if robots commit a war crime?
We should differentiate autonomous and non-autonomous robots. Autonomous robots
have a special program installed already, and they carry it out (perform it). The Human
86
Lambèr Royakkers and Peter Olsthoorn. Military Robots and the Question of Responsibility.
47
Rights Council has reported that such robots already exist and are being used by South
Korea to guard the border to North Korea. These robots can detect and shoot targets
from kilometres away,87 while non-autonomous robots require a human to approve a
decision to open fire, basically making it a human’s decision.
When the war is taking place, parties should respect the principles of jus in bello. One
of the main principles states that the innocent should not be killed, that civilians should
not suffer war. The problem arises when robot/drone attacks cause civilian deaths
because we cannot really punish a robot, only if turn it off. Who is responsible then?
Royakkers and Olsthoorn suggest that it should be someone from the long chain of
individuals that created this robot, someone from among the “manufacturer,
programmer, the designer, the Department of Defense, the generals or admirals in
charge of operation, and the operator.”88 We can say that if an autonomous robot
operates outside of given boundaries, then it is the manufacturer who is responsible;
while if a non-autonomous robot is being used in a way that makes it illegal, then it is
the General or the operator’s fault. Sometimes it really is that the casualties are caused
by a programming error or malfunction. For example, “in October 2007 in South Africa
a malfunctioning robotic gun fired five hundred high explosive rounds, killing nine
soldiers and seriously injuring fourteen”.89
It shows that not only locals can be harmed
by robots, but also friendly or an army’s own soldiers.
87
88
89
Heyns, Christof. Report of the Special Rapporteur on Extrajudicial, Summary or Arbitrary Executions.
Lambèr Royakkers and Peter Olsthoorn. Military Robots and the Question of Responsibility.
ibid
48
Most of the criticism of using drones is against operators who control the drones. While
controlling an unarmed drone, they may witness crimes but be unable to stop them. On
other hand, they may be controlling the armed drones and, by their own actions, cause
civilian deaths.
Civilian casualties are one of the main reasons the armed drones are criticized. U.S.
President Obama gave a big speech about this issue, which was reported by many
tabloids and mass media organizations to be a “speech on limiting the drones”.
He
began by saying that the tactics are in fact effective. Then he also added that "the
terrorists we are after target civilians, and the death toll from their acts of terrorism
against Muslims dwarfs any estimate of civilian casualties from drone strikes."90
In contrast to the media description, it is obvious that President Obama was defending
the use of drones, rather than talking about limiting their use. However, the President
offers a valuable analogy and a logical reason to continue using drones: “Conventional
airpower or missiles are far less precise than drones and likely to cause more civilian
casualties and local outrage. And invasions of these territories lead us to be viewed as
occupying armies; unleash a torrent of unintended consequences; are difficult to contain;
and ultimately empower those who thrive on violent conflict. So it is false to assert that
putting boots on the ground is less likely to result in civilian deaths, or to create enemies
in the Muslim world.”91
90
91
LoGiurato, Brett. The Full Text Of Obama's Big Speech On Drones, Guantanamo, And Terrorism.
LoGiurato, Brett. The Full Text Of Obama's Big Speech On Drones, Guantanamo, And Terrorism.
49
Unfortunately, the issue of the civilian casualties still remains open. According to The
Bureau of Investigative Journalism, since 2004 up to 960 civilians have been killed, and
a minimum of 172 of them were kids.92
New Ammunition
Technologies have always been part of warfare. To defend their own soldiers and to
eliminate the enemy, scientists and researchers have always worked to come up with
something new. From stones to swords, from arrows to assault rifles, from the simplest
sight devices to the new night vision devices, these have all been possible because of the
technological process. Nowadays, technologies still help in developing new weaponry
and military ammunition.
In May of 2013, the official US Army has released information on their web page that
they are exploring the possibilities of futuristic uniforms.93 It did not take long, and
already in February 2014, President Barack Obama gave another speech in the White
House where he talked about new innovation. “Today I am joined by researchers who
invent some of the most advanced metals on the planet, designers who are modelling
prototypes in the digital cloud, folks from the Pentagon who help to support their work.
92
93
The Bureau of Investigative Journalism. Get the Data: Drone Wars.
Roger Teel. Army Explores Futuristic Uniform for SOCOM.
50
Basically, I’m here to announce that we’re building Iron Man.”94 This may not have a
direct connection to the movie, however. This is a special kind of a suit for soldiers
named the Tactical Assault Light Operator Suit, or TALOS for short.95 The main task of
the suit is to provide more mobility and protection for the soldier on his/her mission.
The creators of the suit want to implement some of the newest technologies,
concentrating on different factors such as the following:96
a) Advanced Armor: Materials to support next-generation, full-body ballistic
protection. Full-body ballistic protection will be at the NIJ-IV level and include the
head. Blast pressure wave mitigation technologies will be considered.
b) Mobility/Agility: Enhancement platforms such as powered exoskeletons that
improve/augment a warfighter’s endurance and agility.
c) Situational Awareness (SA): Body near and remote sensor integration, fusion, and
display to enhance a war fighter's understanding of the tactical environment.
d) Light/noise discipline.
e) Command, Control, Communications & Computers (C4): Such as conformable &
wearable antennae, wearable computers, and advanced wave forms/software
programmable radios allowing for a reduction in soldier load.
f)
Individual soldier combat-ready displays: Including non-visual means of
information display and potentially utilization of cognitive thoughts and the
surrounding environment to display personalized information.
94
The White House, Office of the Press Secretary. Remarks by the President on Manufacturing
Innovation Institutes.
95
Federal Business Opportunities. Tactical Assault Light Operator Suit (TALOS).
96
Ibid
51
g) Power generation and management.
h) Thermal management of the suit occupant.
i)
Medical: Embedded monitoring, oxygen systems, wound stasis, electromechanical
compensation.
This all may sound and look exceptional, but there are issues with the suit. Firstly, at
this stage it is heavy. To place and to accommodate all those new technologies into one
suit making it lighter than current suits is not an easy task. The second issue is power
supply. “While the comic book hero relies on a miniature reactor that is embedded in his
chest, the US Special Operation Command has struggled in real life to find a power
source for the suit, which could weigh several hundred pounds.”97 Still, there are more
than 30 scientific advisors working on the project. Currently TALOS is being tested and
is not planned to be released before August 2018.
97
Dan Lamothe.
New Competition Launched in Development of U.S. Military’s ‘Iron Man’ Suit.
52
Appendices.
Figure 1
Source: tribune.com.pk
Figure 2
Source: navy.mil
53
Conclusion
This bachelor thesis was written to demonstrate the changes in the political world
brought by the new technologies. The main question was whether the new technologies
changed the conduct of global politics. The answer is yes, the change is tremendous.
The first chapter showed the significance of global networks. Today they act as veins for
the money, ideas, information and data to roam across the world. It is not a secret that
nowadays economics and politics are connected to each other, even in the countries that
promote “free trade”. This is why to evaluate the importance of global networks two
prisms were used: politics and commerce. By virtually eliminating national borders,
global networks provide opportunities for businesses to become global and also provide
possibilities for some personalities have impact on countries’ economics. The fast
spreading information and ideas also bring both benefits and difficulties for
governments.
In the second chapter the desire was to show new trends, features and possibilities that
the Internet, one of the main global networks today, has brought onto the global political
scene. The use of the web by politicians and citizens is becoming more vital. The
examples of Obama’s successful internet campaign proves that the Internet has great
potential as a versatile platform on which politicians may gather funds by donations and
interact directly with people. Through this interaction the Internet may bring the old
54
concept of Direct Democracy back into use. To support this argument, examples of the
e-governance and e-democracy were brought. These provide citizens with more
possibilities for communicating with the government and affecting political processes.
Thus, penetrating into the sphere of politics, new information and communication
technologies not only changed the old representations (ideas), attitudes, and stereotypes,
but also broke many forms of behaviour models of the relationship between political
institutions and individuals.
The same chapter took a look at blogs. Blogs, in this author’s opinion, have brought
new actors onto the political scene. For example, Wael Ghonim, an Egyptian blogger
already known to us, was considered as a possible candidate for the Noble Peace Prize
in 2011. The American journal Time, which forms a list of the 100 most influential
people in the world, named Ghonim as one of the most influential persons in the world
in the same 2011.98
Chapter three provided a different view on how technologies affect politics. The chapter
highlighted the dangers for the regimes and security threats of the states. The rest
continued to discuss the power of social networks and blogs as this author believes that
they are part of the people’s journalism. These are very effective in cases where the
government does not provide information via the popular mass media sources or the
government does not have its own leverage to control the blogosphere. In these cases
98
Mohamed ElBaradei. Wael Ghonim. Spokesman for a Revolution.
55
the bloggers take this opportunity and provide people with valuable information
including the flavour of their own beliefs and ideas. As examples showed, this was one
of the main reasons that made the Arab Spring possible. With the help of social
networks, the wave of revolutions in 2011 moved from one state to another without
regard for national borders. The next concern was on whether criminals or terrorists can
use global networks, specifically the Internet, in their favour. Unfortunately, the Internet
has not only provided but also expanded opportunities for their criminal activities and
terrorism. The chapter provided examples of how international organized crime invaded
cyberspace; how terrorist groups spread their extremist information, engage in
fundraising activity and recruit new people. To fight these illegal activities states should
cooperate with the internet providers and corporations. Such content should be blocked
immediately by the corporations who own the web-pages. The next solution to fight
terrorism is simply to follow the money. As global networks provide opportunities to
collect money - and most of them are electronic - they can be traced. Once the route is
spotted, it should blocked to stop the flow of the funds for terrorist activities. The same
applies to any extremist content on the web.
The third chapter of the thesis also highlights that ICT made critical infrastructure
vulnerable to attacks from cyberspace. The author then evaluates the possibilities of a
cyberwar. At the end, the author concludes that a cyberwar will not start soon, however
some states may try single short attacks on other countries’ servers.
56
The last chapter, Chapter 4, analysed technological effects on battlefields and weaponry.
Continuing previous chapter themes on threats, IED were analysed first. As provided
statistics have shown, homemade bombs are the weapons that are effective and easy to
make. The author believes that there are solutions to fighting the threat of IEDs and they
are as follows. Firstly, there is a need for authorities to control the supply of materials
and components which can be used to craft a bomb. Second is the use of unmanned
systems or robots to defuse IED.
The next important part of the chapter took a look at the armed robots and drones. There
is no clear understanding on whether the use of armed drones is positive or negative.
Because statistics have shown that the drones are effective, i.e. they do damage terrorist
and kill the specific targets. On other hand, statistics have also shown that the use of
drones does a lot of damage to non-combatants. It is also unclear who is responsible if
armed drones or robots were to commit a war crime. Niccolo Machiavelli once held that
in war nothing really changes. This is of course not true. The new technologies have
brought many new features and have transformed warfare.
The last part, or excursus, was devoted to the latest Surveillance scandals connected to
with the name of Edward Snowden; also the chapter highlighted the potential threat to
the political opposition of current regime in repressive countries. Indeed author cannot
argue against the fact, that today new technologies provide governments possibilities
and tools to track people and organizations that are not only threat to citizens, but also
57
to the regime.
It is important to mention the limitation of this research paper. One of the main
limitations was the number of pages. There was a restriction on the length of this paper,
which is why this thesis did not evaluate the roles of telecommunications and satellites
or the use of technologies in border control and mapping. Critics may say that there
should be more information and discussion about the latest security leaks and
surveillance scandals. However, the author sees those leaks and scandals not as a
technological issue, but rather that the human factor had a larger role in those events.
The information was not stolen from outsiders, rather it was a clear example of
whistleblowing. Nonetheless, author is convinced that the Internet and global networks
had their impact in spreading information and making it open to many people.
For future research, one possibility would be done deeper research into topics that have
not been discussed in this thesis. Since technologies are constantly changing and bring
something new, maybe tomorrow they will have their own effect on the political world.
It would be interesting to explore the relationship between technological corporations
and governments since it looks as though in the era of new technologies the
corporations are gaining power. However, governments still try to control them. How
long can it last? Can corporations become the new governments? May technologies lead
real transition to corporatocracy and creation of Corporate Republic? All of these
questions may be asked in the future and research.
58
Works Cited
Alvarez, R. Michael, Thad E. Hall, and Alexander H. Trechsel. “Internet Voting in
Comparative Perspective: The Case of Estonia.” PS: Political Science & Politics 42
(03): 497, 2009. http://www.jstor.org/stable/40647646.
Associated Press. Everyone is under surveillance now, says whistleblower Edward
Snowden. The Guardian.
May 3, 2014.
http://www.theguardian.com/world/2014/may/03/everyone-is-under-surveillance-no
w-says-whistleblower-edward-snowden
Atkins, Randy. IED Attack: Improvised Explosive Devices. Department of Homeland
Security. August 12, 2012.
https://www.dhs.gov/xlibrary/assets/prep_ied_fact_sheet.pdf
Bateman, Tom. Police Warning after Drug Traffickers' Cyber-attack. BBC News.
October 16, 2013. http://www.bbc.com/news/world-europe-24539417.
Baumgärtner Malik, Blome N., Gude H., Rosenbach M., Schindler J.,
and Schmid F.,
German Intelligence Agency BND Under Fire for NSA Cooperation. Spiegel. April
24, 2015.
http://www.spiegel.de/international/germany/german-intelligence-agency-bnd-unde
r-fire-for-nsa-cooperation-a-1030593.html
British Broadcasting Corporation (BBC). Edward Snowden: Leaks that exposed US spy
programme. BBC.
January 17, 2014.
http://www.bbc.com/news/world-us-canada-23123964
Boyd, Danah, and Nicole Ellison. Social Network Sites: Definition, History, and
Scholarship.
Journal
of
Computer-Mediated
Communication,
http://onlinelibrary.wiley.com/doi/10.1111/j.1083-6101.2007.00393.x/epdf.
2007,
59
Brook V., Tom. IED Attacks in Afghanistan Set Record. USA TODAY. January 26, 2012.
http://usatoday30.usatoday.com/news/world/story/2012-01-25/IEDs-afghanistan/52
795302/1.
Cairo, Abigail. Is Egypt About to Have a Facebook Revolution? Time. January 24, 2011.
http://content.time.com/time/world/article/0,8599,2044142,00.html
Cohen-Almagor, Raphael. In Internet’s Way. International Journal of Cyber Warfare and
Terrorism, 39–58.
2012.
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijcwt.20120701
04.
Chassay, Clancy, and Bobbie Johnson. Google Earth Used to Target Israel. The
Guardian. October 25, 2007.
http://www.theguardian.com/technology/2007/oct/25/google.israel.
Cyberwar. The Economist. July 3, 2010.
http://www.economist.com/node/16481504?story_id=16481504&source=features_
box1.
Deloitte Development. Mobile Banking: A Catalyst for Improving Bank Performance,
2010.
https://www2.deloitte.com/content/dam/Deloitte/ie/Documents/Process/mobile_ban
king_bank_performance.pdf
Draft Law "On E-government" Put on Public Discussion. UzReport. November 20,
2013. http://news.uzreport.uz/news_2_e_113940.html.
ElBaradei, Mohamed. Wael Ghonim. Spokesman for a Revolution. Time. April 21, 2011.
http://content.time.com/time/specials/packages/article/0,28804,2066367_2066369_
2066437,00.html.
Eugene Kaspersky interviewed by Cory Johnson. Why Hackers Target Gas Stations,
Coal
Mines.
Bloomberg.com.
March
19,
2015.
60
http://www.bloomberg.com/news/videos/2015-03-19/why-hackers-target-gas-statio
ns-coal-mines.
Get
the
Data:
Drone
Wars.
The
Bureau
of
Investigative
Journalism.
http://www.thebureauinvestigates.com/category/projects/drones/drones-graphs/.
Heyns, Christof. Report of the Special Rapporteur on Extrajudicial, Summary or
Arbitrary Executions. United Nations Human Rights Council, April 9, 2013.
http://www.unhcr.org/refworld/pdfid/4c07635c2.pdf.
Hill, Steven. World Wide Webbed: The Obama Campaign's Masterful Use of the
Internet. Social Europe. April 7, 2009.
http://www.socialeurope.eu/2009/04/world-wide-webbed-the-obama-campaigns-ma
sterful-use-of-the-internet/4/.
Hindman, Matthew. The Myth of Digital Democracy. Most, 2010.
http://www.loc.gov/catdir/toc/fy0904/2008005147.html.
Information & Communication Technologies. World Bank Group. October 2, 2014.
Accessed February 1, 2015. http://www.worldbank.org/en/topic/ict/overview.
Internet Usage Statistics. World Internet Users Statistics and 2014 World Population
Stats. Accessed March 31, 2015. http://www.internetworldstats.com/stats.htm.
Kahn, Joseph. Yahoo helped Chinese to prosecute journalist. New York Times.
September 8, 2005.
http://www.nytimes.com/2005/09/07/business/worldbusiness/07iht-yahoo.html?
Lamothe, Dan.
Man’
New Competition Launched in Development of U.S. Military’s ‘Iron
Suit.
Washington
Post.
October
27,
2014.
http://www.washingtonpost.com/news/checkpoint/wp/2014/10/27/new-competition
-starts-in-development-of-u-s-militarys-iron-man-suit/.
Leticia Bode, Stephanie Edgerly, Emily Vraga, Ben Sayre, and Dhavan Shah. Digital
Democracy: The Influence of New Media Production and Consumption in Politics.
61
Media Effects and Media Psychology. Ed. Scharrer, Erica. New York: Wiley
Publishing , 2012.
LoGiurato, Brett. The Full Text Of Obama's Big Speech On Drones, Guantanamo, And
Terrorism. Business Insider. May 23, 2013.
http://www.businessinsider.com/obama-speech-drones-guantanamo-terror-nationaldefense-university-2013-5#ixzz2U98jhA5v.
Mcgibbon, H Mark. Cyber Readiness : Are We There Yet? International Journal of Cyber
Warfare and Terrorism (IJCWT). September , 2014.
http://www.igi-global.com.library.esc.edu/gateway/article/full-text-pdf/124129.
Miller, Clair. How Obama's Internet Campaign Changed Politics. The New York Times.
November 7, 2008.
http://bits.blogs.nytimes.com/2008/11/07/how-obamas-internet-campaign-changedpolitics/?_r=0.\
Nye, Joseph. Cyber War and Peace. Project Syndicate. April 10, 2012.
http://www.project-syndicate.org/commentary/cyber-war-and-peace.
Official Obama for America YouTube Channel. BarackObama.com - YouTube.
https://www.youtube.com/user/BarackObamadotcom/about.
Oppenheimer, A. R., and Richard English. IRA, the Bombs and the Bullets: A History of
Deadly Ingenuity. Dublin, Ireland: Irish Academic Press, 2009.
Rosenau, James N., and J. P. Singh.
The
Changing
Scope
Information Technologies and Global Politics:
of
Power
and
Governance,
2002.
http://books.google.co.uk/books?id=c1zmZsQxUn0C.
Royakkers, Lambèr, and Peter Olsthoorn. Military Robots and the Question of
Responsibility.
International
Journal
of
Technoethics.
2014.
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijt.2014010101.
Sanger, David. Obama Order Sped Up Wave of Cyberattacks Against Iran. The New
62
York Times. May 31, 2012.
http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyb
erattacks-against-iran.html.
Statistics about Internet Voting in Estonia. Electoral Management - Estonian National
Electoral Committee.
http://www.vvk.ee/voting-methods-in-estonia/engindex/statistics.
Strauss, Rand. How the Internet Has Changed the State of Political Debate. The
Huffington Post. January 20, 2013.
http://www.huffingtonpost.com/rand-strauss/how-the-internet-has-chan_b_2161805.
html?
Tactical Assault Light Operator Suit (TALOS). Federal Business Opportunities. October
18, 2013.
https://www.fbo.gov/index?s=opportunity&mode=form&id=4e1d130bf4c77ce3d23
249965aef0538&tab=core&_cview=0.
Traynor, Ian. Angela Merkel: Spying on Allies is not on. October 24, 2013.
http://www.theguardian.com/world/2013/oct/24/angela-merkel-nsa-spying-allies-no
t-on
Teel, Roger.
of
Army Explores Futuristic Uniform for SOCOM. The Official Homepage
the
United
States
Army.
May
28,
2013.
http://www.army.mil/article/104229/Army_explores_futuristic_uniform_for_SOCO
M/.
The Spiegel Staff. Embassy Espionage: The NSA’s Secret Spy Hub in Berlin. October
27, 2013.
http://www.spiegel.de/international/germany/cover-story-how-nsa-spied-on-merkelcell-phone-from-berlin-embassy-a-930205.html
The VP Debate: Candidates, Questions, and Queries. Official Google Blog. October 6,
63
2008.
http://googleblog.blogspot.cz/2008/10/vp-debate-candidates-questions-and.html.
The White House, Office of the Press Secretary. Remarks by the President on
Manufacturing Innovation Institutes. Washington DC: GPO February 24, 2014.
https://www.whitehouse.gov/the-press-office/2014/02/25/remarks-president-manufa
cturing-innovation-institutes.
The White House, Office of the Press Secretary. Presidential Policy Directive -- Critical
Infrastructure Security and Resilience. Washington DC: GPO February 12, 2013
https://www.whitehouse.gov/the-press-office/2013/02/12/presidential-policy-directi
ve-critical-infrastructure-security-and-resil
The World Factbook: Cambodia. Central Intelligence Agency. Accessed January 8, 2015.
https://www.cia.gov/library/publications/the-world-factbook/geos/cb.html.
The World Factbook: Panama. Central Intelligence Agency. Accessed March 15, 2015.
https://www.cia.gov/library/publications/the-world-factbook/geos/pm.html.
United States Commitee on Armed Services. Hearings : Military Cyber Programs and
Posture. April 14, 2015.
http://www.armed-services.senate.gov/hearings/15-04-14-military-cyber-programsand-posture-.
Varlamov, Ilya. Первый по фотошопу/First in Photoshop. Безмятежность и
доброта/Serenity and Kindness. November 14, 2014.
http://zyalt.livejournal.com/1203282.html.
Von Tetzchner, Jon. State of the Mobile Web. Opera Software. February 1, 2011.
http://www.operasoftware.com/archive/smw/2011/02/.
Whither Blogestan : Evaluating Shifts in Persian Cyberspace. March, 2014
http://www.iranmediaresearch.org/en/research/download/1607.