Information Orders and New Communications Technology
Transcription
Information Orders and New Communications Technology
NO 10 2012 Published by Swedish Institute of International Affairs. www.ui.se Information Orders and New Communications Technology: Democratic Hopes and Authoritarian Pitfalls Johan Lagerkvist (Ed.) Contributions by: Evgeny Morozov Visiting Scholar, Stanford University Kristina Riegert Professor, Department of Media Studies, Stockholm University Johan Lagerkvist Senior Research Fellow, Swedish institute of International Affairs (UI) Contents Information Orders and Democracy: Toward a New Research Agenda ............... 3 Johan Lagerkvist Freedom to Sell: Why “The Internet Freedom Agenda” Fails to Thwart the Global Trade in Surveillance Tools. ........................................................................... 7 Evgeny Morozov How Democracies Build Tools for Dictators............................................................. 9 The False Innocence of Silicon Valley .................................................................... 12 From Tools to Policies ............................................................................................. 14 Before The Revolutionary Moment: The Significance of Lebanese and Egyptian Bloggers For Mediated Public Spheres. ................................................................... 20 Kristina Riegert Blogospheres as Alternative Publics ........................................................................ 22 Egypt and Lebanon: Two Very Different Contexts for Blogospheres .................... 25 The Top Bloggers and Local Media ........................................................................ 28 Blogging Content during 2009-2010 ....................................................................... 34 Conclusion ............................................................................................................... 37 References ................................................................................................................ 39 China´s Authoritarian Information Order: Dealing With New Media Capitalists and Emergent Civil Society. ...................................................................................... 42 Johan Lagerkvist Research Questions .................................................................................................. 43 Thorny Dilemmas for Chinese ICT Entrepreneurs .................................................. 44 A Subdued ICT Industry .......................................................................................... 45 Microblogging Businesses in China ........................................................................ 47 Real Name Registration: From Blogging to Weibo................................................. 49 Pleasing Both Consumers and Censors ................................................................... 51 Tolerating the Authoritarian Information Order ...................................................... 54 References ................................................................................................................ 56 Information Orders and Democracy: Toward a New Research Agenda Johan Lagerkvist The democratic revolutions in Tunisia and Egypt, as well as the broader unfolding of events during the Arab Spring of 2011, ignited debates about digital technologies and social media usage and their consequences for social protest mobilization, democratization, and prolonged struggles to consolidate democracy in countries long dominated by authoritarian political culture. The Arab Spring demonstrated the liberalizing role that new communications technology can play under certain circumstances, but did not eliminate suspicions that constraining contextual factors can hinder the development of open information orders. Partly because of the political upheaval in North Africa and the Middle East, augmented by social media and do-ityour-self- journalism, and partly because of ongoing research projects the Swedish Institute of International Affairs on digital politics and emerging civil societies in East Asia, the institute on 9 February 2012 organized a one-day seminar – “Information orders and new communications technology: democratic hopes and authoritarian pitfalls” – as a stepping stone toward establishing a new research program. As its point of departure, the program holds that the historical and socio-cultural settings of individual countries must be thoroughly analyzed when attempting to explain how authoritarian regimes and post-authoritarian newly democratized countries deal with new communications technologies. While information orders are often characterized by resilience, they are not immune to the destabilizing risks associated with flows of information. Moreover, how such orders are challenged by use of information and communications technologies (ICTs), actors in civil society and, in turn, how authoritarian regimes seek to contain information flows and social media networking are important for understanding the interplay between national-authoritarian and global-anarchic environments. 3 The paper presenters at the seminar – Evgeny Morozov, Kristina Riegert, Alexandra Segerberg, Johan Lagerkvist – all discussed the increasing transnational links and communication networks between the global and the national, as well as the competition and cooperation between business, state and societal interests that they bring. Important questions that were raised included: How do various national interests and transnational linkages impact on different authoritarian political systems in diverse national contexts such as the Middle East and East and Southeast Asia? And how does state power react to new social media and communications technology that have the potential to empower civil society? To what extent are Internet censorship, law-making, media ownership, propaganda, and surveillance effective tools for authoritarian regimes and the nominally democratic in managing processes of globalization, democratization, and democracy? Based on their presentations at the seminar, Evgeny Morozov, Kristina Riegert and Johan Lagerkvist contributed three essays to this UI occasional paper. Evgeny Morozov’s essay “Freedom to Sell: Why “The Internet Freedom Agenda” Fails to Thwart the Global Trade in Surveillance Tools” critically engages with the “Internet freedom agenda” of the Obama administration in the United States. Using the current crisis in Syria as a case, he argues that the sanctions regime used against authoritarian regimes is too broad to be effective. Particularly problematic is the lack of policies and regulations preventing the sales of surveillance systems and products from Western high-tech firms to the world’s dictators. West European and American companies are selling (some of them proudly so) products to authoritarian countries such as Syria, Iran and China, while Western governments at the same time attempt to train dissidents to acquire the online skills needed to stay away from the monitors and security apparatuses of these same authoritarian states. Kristina Riegert’s essay “Before the Revolutionary Moment: Lebanese and Egyptian Bloggers Stretching the Boundaries of Mediated Public Sphere” analyzes in-depth the two blogospheres of Lebanon and Egypt, prior to the outbreak of the Arab Spring and 4 the revolutionary uprisings that were fuelled by activists and social media users. She makes the important case, backed up by rigorous fieldwork, that the Egyptian social media users and bloggers were but a tiny part of the broader and much larger network of revolutionaries who ultimately ousted President Mubarak from power. Certainly, the English speaking liberal-democratic inclined elite were important, functioning as bridge-bloggers to a global audience of transnational activist networks and international news media. Yet, the visibility and hand-picking of a resourceful minority of bloggers/activists risk inflating their value at the expense of larger, but more obscure phenomena that arguably demands much more legwork of both journalists and scholars to uncover. Finally, Johan Lagerkvist’s essay ”China’s authoritarian information order: dealing with new media capitalists and emergent civil society” describes and analyzes the setting of social media providers and entrepreneurs in a media landscape of replete of pervasive censorship of online expressions. He explains the uneasy position of Chinese microblogging companies Sina and Tencent, focusing on their dual role as both facilitators and monitors of social media in China’s locked-in public sphere. The analysis shows how the collusion between commercial actors of China’s social media sector and the Party-state’s control agencies has only been temporarily resolved, making cadre-capitalist cooperation inherently unpredictable and increasingly tenuous. Evidenced by fieldwork conducted in Beijing during the fall of 2011 at Sina and Tencent headquarters, the party-state cannot – and does not – fully trust businesses in the social media sector to fully comply with implementing policy that relates to agenda of social and political stability. The difficulties of establishing a waterproof real name registration system for microblogs since 16 March 2012 to prevent leakage of sensitive rumors, well illustrates the ad hoc nature of the current alliance of cadre and capitalist interests. In sum, the 9 February seminar at the Swedish Institute of International Affairs and these three essays illustrates that there is a pressing need for new theorizing about 5 both triggering factors and the complex interplay of prerequisites in transitions to democracy, as information and communications technologies increasingly empower citizens, digital media empires, and state actors alike. Challenging, undermining and maintaining various authoritarian information orders are becoming a central feature of domestic and international politics in our time. In the wake of the Arab Spring revolutions directed against one form of authoritarianism, consolidation of democracy and prolonged struggles against new forms and constellations of authoritarianism are becoming features of digital politics worldwide. Understanding this dynamic across world regions and a range of political systems that “color” their national media systems and information orders have become increasingly necessary to investigate. Thus, there is a pressing need to embark on a new research agenda for different disciplines within the social sciences. 6 Freedom to Sell: Why “The Internet Freedom Agenda” Fails to Thwart the Global Trade in Surveillance Tools Evgeny Morozov To listen to leaders of the Western world sing praises to ambiguous ideals like “Internet freedom” while bashing their opponents in Moscow, Tehran or Beijing, one would think that the West itself is the paragon of ethical behavior, a staunch defender of bloggers' rights and gamers' freedoms. Alas, there is a lot of grand and highfalutin talk of values, ideals and – here comes that vapid and dreadful word! – “empowerment,” but very little by way of actually doing something to offend the fat but innovative cats of Silicon Valley and help the dissidents in China, Syria or Iran evade pervasive surveillance of their regimes. Perhaps, it's time to entertain the idea that the dissidents need no more trainings by Western consultants – the staple of Western “Internet freedom” initiatives. For such trainings are just a lazy and rather ineffective way of dealing with the actual problem, which is the proliferation of new and powerful surveillance tools, created and marketed by American and European firms to almost anyone who would ask (including the secret police of some of the most heinous authoritarian regimes). Instead of training dissidents how to cover their tracks online, why not ensure that Western technology is not used to hunt down those very dissidents? Take Syria, one of the many horror stories of the modern surveillance trade. Late in 2011 it emerged that 13 internet filtering servers manufactured by Blue Coat Systems 1, a California-based company worth over $750 million, mysteriously made their way to Syria, where they were used to censor the Internet. Blue Coat Systems acknowledged that its products had been used in the country but denied it had made 1 “U.S. Firm Acknowledges Syria Uses Its Gear to Block Web,” The Wall Street Journal, 29 October 2011 7 any sales to Syria, claiming that it had shipped them to a Dubai distributor who was meant to pass it on to Iraq's Ministry of Communications 2. Leaving aside the deep irony of seeing a “free and liberated” Iraq abetting the Syrian dictatorship with the purchases of latest censorship gizmos from its liberators (probably with their own money), this explanation is not without its flaws (some technologists have pointed out that Syrians were using more servers than Blue Coat Systems had shipped to Iraq 3, while Iraqi politicians flatly denied any knowledge of the deal 4). But the Blue Coat story pales in comparison to that of the Italian firm Area SpA, which won a 2009 tender from the Syrian government and was all set to start building a $17.9 million electronic panopticon that would record every email sent in the country 5. Area withdrew from that contract in late November; it's unclear whether it did so because of public pressure – Bloomberg News was particularly nosy about its dealings with the Syrian regime but a leading Italian newspaper La Reppublica also picked up the story – or because of technical problems, which are not unthinkable given the unrest in the country. However, before withdrawing Area had assembled a stellar list of suppliers and collaborators – including American companies NetApp and HP. Both of them denied having any advance knowledge that the hardware they had sold to Area would be used in Syria but Bloomberg News uncovered emails showing that NetApp's technicians had indeed known that their firm's hardware was heading to the country6. 2 Ibid. “Behind Blue Coat: Investigations of commercial filtering in Syria and Burma,” Citizen Lab, 9 November 2011 4 "What Was Iraq’s Role in the Export of Banned US-made Web Watching Gear to Syria?", Niqash, 28 November 2011 5 "Italian technicians are aiding Syria with surveillance," Bloomberg BusinessWeek, Dec 1, 2011 6 "U.S. Calls for NetApp Probe on Syria Spy Tech" Bloomberg BusinessWeek, Nov 9, 2011 3 8 How Democracies Build Tools for Dictators Perhaps, the reticence of Western leaders on the question of surveillance is not accidental. Many of the tools that are now aggressively deployed by dictators have been initially developed to suit the needs of Western law enforcement and intelligence agencies. Left with no easy means to monitor Skype calls and online chats of terrorists and drug dealers, they inadvertently created this cyber-spying industry, which is now aggressively expanding worldwide. It's useful to pause here and consider the origins of this new industry. Up until very recently, the debate about the future of online surveillance in democratic states has been dominated by two options. First, governments could require that all providers of software and hardware incorporate backdoors into their products by design, i.e. become "wiretappable" in the same way that phones have been required to be "wiretappable". The major arguments against this option are that it may stifle innovation in the technology sector and actually decrease security, as ubiquitous backdoors can be manipulated by third-party hackers. The second option is to build spying software that, instead of exploiting built-in backdoors in a particular software (e.g. Skype), would compromise the security of just one computer - the one belonging to the suspect. This way, there is no need to require technology companies to build products that are faulty by design. The risks to national security are also minimized, as the spying operation would be highly targeted. Civil liberties advocates are also happy: this solution doesn't give governments the kind of infrastructure to spy on anyone they like: when Skype, Gmail and Facebook all have default backdoors, this temptation may be too great to resist, especially in the middle of the war on terror. In fact, this is why many smart technologists - including free speech advocates at the Electronic Frontier Foundation have preferred this second approach to backdoors 7. 7 I have covered this issue in more depth here http://edge.org/conversation/code-is-law 9 Given the current legal regime, there are few barriers that prevent Western firms that produce keyloggers or spyware from exporting their technologies to the Middle East or China. High demand for their products in the West ensures low costs and constant innovation. The sophistication of Egypt's security apparatus is directly proportional to the sophistication of methods pursued by NSA and FBI; a failure to recognize this link between domestic and foreign agendas – a failure which underpins much of Hillary Clinton's “Internet freedom” agenda that focuses on empowering bloggers, not restraining America's own technology firms – guarantees that dictators have easy access to Western surveillance tools. Unfortunately, this may be one of those cases where US-led efforts to promote Internet freedom abroad are doomed regardless of what the US chooses to do domestically – whatever happens, the idealists in Foggy Bottom are bound to lose. Having FBI and NSA push for backdoors in internet services would affect global standards and eventually make these services easier to wiretap by any foreign governments, democratic or not. The reason why authorities in Iran and Belarus can easily track their opponents is because Nokia-Siemens and Ericsson supply them with the same kind of technology that is demanded by Western governments (who, of course, require a possibility for “lawful intercept” of communications). But if the US government abandons its plan to create backdoors and pours tax money into creating tools that provide for easy tracking and wiretapping instead, this might also strengthen the security apparatus of authoritarian states, as we saw in Egypt. From the perspective of dissidents, it's not obvious which approach is better: knowing of potential backdoors, they may take extra precautionary steps; the reason why so many Egyptians were caught off-guard when it turned out that authorities are eavesdropping on Skype is precisely because they believed that Skype was impossible to break into. The broader problem here is that anything that will allow Chinese dissidents to breach the firewalls put in place by their government might also be used by anyone in America to conceal drug trade. There are no easy ways around this problem other than to require that US-funded anti-censorship tools work only when 10 used in China (i.e. when accessed from Chinese IP addresses) but this could make it easier for the Chinese authorities to identify and block them 8 . So while Western policy-makers are sorting out their problems, Western firms are busy expanding worldwide. Boeing-owned Narus – a US firm that sold monitoring equipment to Egypt and Saudi Arabia and was exploring a deal with Qaddafi 9 – has more than a tenuous connection to the National Security Agency (Narus equipment was used in the now infamous AT&T's San Francisco facility, where wiretapping was taking place.) FBI has developed and deployed several Web spying tools of its own – and we can only guess about the NSA, since the agency is notoriously secretive about its dealings. European firms that offer a panoply tools for eavesdropping on Skype calls still primarily cater to the needs – often quite legitimate ones – of the Western governments. Likewise, the reason why the likes of Siemens and Nokia manufacture technology that allows for listening in on cellphone calls or for monitoring text messaging is because current industry standards require them to do so. Still, the ubiquity of European firms among supplies of such hardware is alarming. Area's helpers in Syria included not just HP and NetApp but also Germany's Utimaco Safeware AG and Frances' Qosmos SA. In Egypt, protesters who stormed the headquarters of the secret police in March 2011 were surprised to discover pitches for advanced surveillance gear from European technology firms 10 ; similar documentation was uncovered in Libya after Gaddafi's fall 11 (to add insult to injury, it may be that Gaddafi got his surveillance equipment from the French firm Amesys while the late dictator was visiting Nicholas Sarkozy in 2007; another troubling sign of Western complicity in enabling authoritarian repression 12 ). 8 I have written more about this problem in my review of Susan Landau's book. It's available here: http://www.bostonreview.net/BR36.5/evgeny_morozov_internet_spying_privacy.php 9 "Foreign Firms Helped Gadhafi Spy on Libyans," The Wall Street Journal, 30 August 2011 10 “Document Trove Exposes Surveillance Methods,” The Wall Street Journal, 19 November 2011 11 "Foreign Firms Helped Gadhafi Spy on Libyans," The Wall Street Journal, 30 August 2011 12 Ibid. 11 The False Innocence of Silicon Valley It's unclear to what extent such gear was actually in use; it may be that the rulers of both countries may have been swept out of office before they had a chance to fully act on those offers. However, analysis of similar schemes deployed in Iran, Bahrain and Syria suggests that regimes that do take the timely precautions and build a powerful surveillance apparatus do gain a powerful advantage over their opponents. It's primarily British and German firms that have catered to the surveillance needs of Iran and Bahrain (and in the case of Britain's Creativity Software – which supplied telecommunications equipment to Iran – was “proud” to do so, as it acknowledged in a public statement 13). And it's not just surveillance gear; customized censorship solutions sell well too. A March 2011 study by the Open Network Initiative, an academic group that studies Internet freedom, found that Netsweeper (a Canadian company) along with America's Websense and SmartFilter (the latter now owned by Intel) cater to the censorship needs of governments in the Middle East and Africa 14. Numerous other American companies – from Cisco to HP – have been considering helping China with its ambitious agenda of fitting the country with ubiquitous video surveillance 15 ; we do not know how many of them have resisted the temptation in the end. As the technology of facial recognition technology (FRT) improves, we are bound to see many Western offerings in that niche as well; an Arab Spring, where the face of every protester could be easily identified and matched to their Facebook profile, might easily have a very different outcome. However, it's not just companies: some Western universities may be complicit as well. Scientists at UCLA – with some funding from the Chinese government – have built an “image-to-text” system that 13 Quoted on Privacy International's website: https://www.privacyinternational.org/pressreleases/creativity-software-declare-themselves-proud-to-supply-surveillance-technology-to 14 "U.S. Products Help Block Mideast Web," The Wall Street Journal, 27 March 2011 15 “Cisco Poised to Help China Build Surveillance Project,” The Wall Street Journal, July 5, 2011 12 automatically produces text summaries of the captured video frames. This provides for easy search of CCTV footage, boosting China's sprawling complex of video surveillance. Perhaps, this is a worthy contribution to science – but it's an even better contribution to the well-being of the Chinese Communist Party. But it is Internet giants like Facebook and Google that could make facial recognition technology dictators' best friend. So far, Facebook hasn't released any groundbreaking technology; most probably, the company licenses its current FRT from an Israeli startup called Face.com. However, Facebook has one advantage over other providers of FRT: the sheer amount of photos that it posses are mind-boggling (4 billion photos are uploaded to the site every month). And it's not just photos – Facebook already knows the names of people who are likely to appear in your photos (i.e. your online friends); the most likely backgrounds of your photos (place where you study, live, travel, or go to work); your approximate age and gender; and a heap of other information that may help it build the ultimate FRT technology (or, at least, the ultimate face search engine). Facebook's data repository puts in a brand-new category all by itself. Google, too, may revolutionize the field – if it wants to. Even though in May 2011 Eric Schmidt, Google's executive chairman, named automated facial recognition as one of the technologies that even his company finds creepy 16 , it is probably just one of Google's rhetorical ruses. Google has previously acquired several start-ups – Like.com and Neven Vision – that worked in face and other types of visual recognition technologies. The company also keeps patenting technologies that may turn into a powerful player in FRT. One recent Google patent – published by the U.S. Patent and Trademark Office on the very day that Schmidt renounced FRT – would allow the company to build a biometric database of celebrities' faces, which would be 16 "Google warns against facial recognition database," The Daily Telegraph, 18 May 2011 13 matched with their mentions in the news 17. Another recent patent would allow Google to divide an image into separate objects – a building, a street name, a person, etc – and receive information about each of them individually18. The company has also patented the ability to increase the accuracy of facial recognition by tapping into the social networking profile data 19 . It seems that if Facebook succeeds in convincing the public about the normality of FRTs, it's quite likely that Google would reverse the course and enter the field ("Technically, we can pretty much do all of these things", Google's engineering director for image-recognition development told CNN last year 20 ). Apple and Microsoft are also not far behind in terms of patents and acquired FRT start-ups. From Tools to Policies Putting limits on the sale of surveillance technology has proved nearly impossible but in December 2011 the European Union did the unthinkable: it banned European companies from exporting such tools to Syria 21 . The only country to object and seek special waivers for its own technology companies was Sweden, which has large presence in the Syrian mobile sector. Sweden's reasoning was that tapped and monitored mobile phones are still better than no mobile phones and that by forcing Swedish companies out of Syria, EU would essentially be thwarting the opposition. This is not an unassailable assumption but the Swedish government is correct to believe that sanctions on technology exports are at best ineffective and at worst counterproductive. 17 It's available here: http://appft1.uspto.gov/netacgi/nphParser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.html&r =1&f=G&l=50&s1=%2220110116690%22.PGNR.&OS=DN/20110116690&RS=DN/20110116690 18 Available here: http://appft.uspto.gov/netacgi/nphParser?Sect1=PTO2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearchadv.html&r=1&p=1&f=G&l=50&d=PG01&S1=20110035406.PGNR.&OS=dn/20110035406&RS=D N/20110035406 19 “Google Seeks Social Networking Face Recognition Patent," Information Week, 14 Feb 2011 20 “Google making app that would identify people's faces,” CNN.com, March 31, 2011 21 “European Union Bans Exports to Syria of Systems for Monitoring Web, Phones,” Bloomberg BusinessWeek, December 1, 2011 14 America's own sanctions against Syria are a surreal case in point. How did technology from Blue Coat or NetApp or HP end up Syria? It's not because there are no sanctions on Syria; those are in place since 2004 and are extremely broad in their scope, requiring any American company seeking to make its services or products available in Syria obtain a US government license first. Rather, it's because the distributed, decentralized and highly modular way in which modern surveillance tools are developed and traded cannot be captured and regulated by the current sanctions regime. As long as components can be shipped to some third country – Moldova, Azerbaijan, Somalia? All three of them? – they might be easily re-exported to the sanctioned country (which is what seems to have happened with Area in Italy). If the younger Viktor Bout, the notorious Russian arms dealer, was contemplating where to focus his efforts today, the smuggling of surveillance equipment might seem more lucrative than guns. In fact, the broad scope of the current sanctions regime, while unable to ban the sale of surveillance and censorship technology, ends up constraining what ordinary Syrian citizens – including the dissidents – can and cannot do online. Few American technology companies go through the hassle of obtaining government licenses to operate in Syria; as a result, for a long time Syrians couldn't download many of the products – from Google Chrome to Google Earth – that are used by their peers in Egypt or Tunisia. They can't even top up their Skype accounts, so they can't call their families abroad 22. If there were a perfect example of a stupid and ineffective sanctions regime, this is it – but the US government is not keen to change it, preferring to waste time on honing its cyber-emancipatory rhetoric about blogger empowerment instead. As for the future of surveillance industry, it looks very bright – and very liquid. If, until very recently, this industry was funded almost entirely by various agencies of the 22 “When Sanctions Make Things Worse,” Aljazeera.com, 23 November 2011 15 US government and In-Q-Tel (CIA's venture fund), now investors from the private sector are paying increased attention to this field as well, with venture capitalists showing up at industry events and promising easy money for cutting-edge ideas. Much of this sudden interest can be attributed to the spectacular success of Palantir – a data-mining company co-founded by the staunch libertarian billionaire Peter Thiel and Alex Karp, the former student of Jurgen Habermas turned Palantir's CEO, which has become the darling of the American intelligence community. Virtually all venture capitalists overlooked Palantir when it was first seeking funding almost a decade ago – and few want to make the same mistake again.) Thiel's involvement with the project is probably reassuring to other entrepreneurs: if helping to boost the surveillance state looks kosher for a self-avowed libertarian like him, it must be kosher for everybody else too. Thiel's rationale here, however, is also far from impeccable; he thinks that we need to develop Palantir-like technology – which basically helps the spooks connect the dots before anyone has even seen the dots – because “we cannot afford to have another 9/11 event in the US” 23 . Very libertarian, this: the more data we surrender to our government, the less likely another 9/11 is to occur. As the Palantir example demonstrates, it's unlikely that the providers and developers of such tools have any trouble sleeping at night. First of all, the fact that such technologies are developed under the semi-official auspices of the War on Terror allows the manufactures and popularizers of such tools to present themselves as saviors of civilization – even if those very tools then end up being used to crush uprisings and imprison dissidents. (And this is meant literally: as Jerry Lucas – something of an impresario for the official and unofficial gatherings of the surveillance industry – has recently told The Washington Post: “This technology is absolutely vital for civilization.” 24) 23 "Palantir, the War on Terror's Secret Weapon" Bloomberg BusinessWeek, 22 November, 2011 24 "Trade in surveillance technology raises worries," The Washington Post, December 1, 2011 16 Second, the logic of tool neutrality – the presumption that it all depends on how technologies are used by people – is quickly invoked to deflect any responsibility from those designing and selling the tools. As a German executive of one such company told the Wall Street Journal “it's like a knife. You can always cut vegetables but you can also kill your neighbor.” Comparing NSA to a vegetable-lover wielding a knife is quite rich – but so is the assumption that vendors are in the dark as to how their tools are being used. Much of modern software and hardware requires constant updates and periodic communication with the home server; it's not unfeasible to expect technology firms to actually check whether gadgets are used to cut vegetables or kill neighbors. And is the US State Department doing much on this front? No – quite the opposite. Instead of bashing companies like Cisco for their alleged role in facilitating the building of the Chinese system of Internet controls, the State Department lavished an award on that company – in recognition of Cisco's “corporate excellence” 25 ! Oh – and a few months before that notorious award, the State Department took Cisco to...Syria and brokered a meeting with President Assad 26 . Of course, Syria is closely watched at the moment – it's unlikely that many Western companies would risk doing business there. But what about authoritarian states that are seen as Western – or, at any rate, American – allies? What about Bahrain or Saudi Arabia? The latter is a beneficiary of gigantic amounts of American aid; in 2010 Washington approved a $60 billion arms deal with the Saudi government 27 . If Washington can send $60 billion worth of tanks to helicopters to the country, what's to prevent it from selling $6 million worth of surveillance gear? Furthermore, what's to prevent the Saudis from reselling it to other 25 "Cisco Receives U.S. State Department Award for Corporate Excellence," Cisco Blog, 17 December 2010 26 "U.S. Deploys Tech Firms to Win Syrian Allies," The Wall Street Journal, 15 June 2010 27 “U.S.-Saudi Arms Deal Moves Ahead,” The Wall Street Journal, 12 September 2010 17 governments? In fact, it's the sales of Western surveillance gear to American “allies” that need to be monitored most closely, for it Silicon Valley might find the temptation to make a quick buck at the expense of human rights in the region simply irresistible. The inconsistencies of American foreign policy aside, it's quite urgent that Western governments take drastic steps in addressing the surveillance problem. Time is working against them, as Chinese, Indian and Russian companies are quickly developing similar capabilities. It used to be that only behemoths like China's Huawei were significant actors on this stage (Huawei has significant presence in Iran 28 and all over African continent– perhaps, a good reason for concern) but now there is also a swathe of small and niche start-ups that cater to particular demands of their host governments or international clients. As Andrei Soldatov and Irina Borogan have documented in great detail 29 , Russian start-ups have already developed advanced capabilities for voice recognition. Given the still present concern that Russia and its immediate ex-Soviet neighbors may still experience some kind of a localized Arab Spring 30 , one expect regional demand for such tools to grow only stronger. The Chinese government too has been aggressively marketing its domestic technology abroad; thus, both Moldova 31 and Belarus 32 have announced that they were getting equipment for video surveillance from China (in Moldova's case, it was part of China's economic aid given to the country). The thorny issue of surveillance in authoritarian states – and the role that Western technology companies play in facilitating it – reveals some of the profound ambiguities inherent in a term like “Internet freedom.” The problems outlined in this 28 “Huawei, Chinese Tech Giant, Aids Iran,” The Wall Street Journal, 27 October 2011 “Just business: how Russian technology provides the eyes and ears for the world’s Big Brothers,” openDemocracy, 25 January 2012 30 "CSTO wants to monitor the internet to prevent a repeat of Arab revolutions," Moscow News, 13 September, 2011 31 “China to grant Moldova 9.5 million dollars for economic, technical development,” MOLDPRESS, 16 December 2011 32 “Belarus Seeks China-Made Surveillance Gear,” The Wall Street Journal, December 21, 2011 29 18 essay make it clear that most problems that need to be solved by Western policymakers do not sit in an independent intellectual category that can be neatly bracketed out from domestic politics and lobbying by Silicon Valley, privacy laws that guide technologies like facial recognition, the complexity of sanctions laws written before the Internet, and so forth. While capacity building – training bloggers and activists from authoritarian states how to use tools to evade Internet police – is important, it cannot be the sole component of a successful “Internet freedom” strategy. Making the Internet more conducive to dissent would require a lot of hard work – in Washington, Brussels, the Bay Area, national capitals – and this hard work cannot be replaced with capacity building exercises. Given that Russia and China are rapidly becoming important players in the global surveillance trade, it's imperative that Western governments rethinking their cavalier approach to the issue. 19 Before The Revolutionary Moment: The Significance of Lebanese and Egyptian Bloggers For Mediated Public Spheres Kristina Riegert For many countries across the Arab world, 2005 marks the rise of the social media for airing controversial ideas, critiquing the powerful, and sharing popular culture. Intellectuals, politicians, students and activists have since then become adept at using Internet-enabled media to expose minority discrimination, the public sexual harassment of women, as well as the systematic torture, abuse and corruption by the authorities. It may also be said that in a number of cases the negative publicity has forced Arab governments to take action. However, aside from increasing the speed of communication and promoting the engagement of the ‘activist’ classes, the impact of the social media on the mediated public sphere is not exactly clear. There were numerous deep-rooted causes for the spread of the mass demonstrations demanding ‘dignity’ and ‘freedom’ that swept the Arab region in 2011, and they were no doubt fuelled by the simultaneous expansion of the social media. That said, low and varying Internet penetration would make it misleading to conclude that the social media alone are responsible for the mass character of this unrest. Rather, the interaction between social media platforms and pan-Arab and Western satellite television meant that the ideas and actions circulating on the Internet reached both national and international audiences in a whole new way. Indeed, the mainstream media have been busy in the last decade positioning themselves in relation to social media, utilizing citizen journalists as sources and honing crowd-sourcing techniques, something that in turn amplifies issues among social media users themselves. This evolving relationship between ‘old’ and ‘new’ media is what Andrew Chadwick calls a ‘hybrid media environment’, in which the hegemonic mainstream media are 20 challenged by new media actors, resulting in power struggles, to “control, police and redraw boundaries” of political communication between various actors, organizations and assemblages in the field of news media (Chadwick, 2011: 10). Naomi Sakr has recently argued that the ‘satellite-internet divide’ in Egypt was incrementally bridged in the years prior to the revolutionary moment, not only due to the rise of bloggers but because “concerned Egyptian citizens, journalists and politicians made heavy use of the online space for political communication precisely because mainstream offline media were largely closed to them” (forthcoming, 20). Egypt is not the only society with a dominant state media and censorship where digital media have become portals for alternative information and hubs of civic activism and resistance (Lagerkvist, 2010; Srebreny & Khiabany, 2010; Kulikova & Perlmutter, 2007; Taki, 2010). This poses interesting questions for how the power contest between mainstream/alternative media and between foreign/national media plays out in authoritarian and transitional societies, rather than the late modern democracies discussed by Chadwick. In order to get a better understanding of the role of social media during the Arab uprisings, this essay takes a closer look at some seminal social media users – popular bloggers in two Arab countries Lebanon and Egypt – prior to the unrest. In doing so, it focuses on the most linked to and most visited bloggers, their relationships to mainstream media and each country’s specific political and cultural context, especially its mediascape. 33 By giving an overview of who these bloggers are, their networks, what types of issues they blog about and to whom, we are in a better position to assess what role blogging had in inspiring the events that have led to the Arab uprisings in 2011. 33 The project on which this essay is based is interested in the nature and impact of the most ‘popular’ Arabic and English language bloggers in Lebanon, Egypt and Kuwait in the pre-revolutionary period 2009-2010. It is a collaboration between Media and Arabic studies professors Kristina Riegert and Gail Ramsay and financed by the Swedish Research Council. 21 Blogospheres as Alternative Publics It is not a forgone conclusion to ask whether the most ‘popular’ Arabic blogs stretch the boundaries of the mediated public sphere, transcending the political and cultural norms governing mainstream media. The most popular blogs are not necessarily political; they may be business blogs, entertainment blogs or diary-style blogs. As websites written in reverse chronological order, blogs are incredibly rich, often mixing autobiographical narratives, political engagement, consumerist critique, poetry, and satire, YouTube clips, or commentary on daily life. Especially in countries with Internet filtering and heavy-handed involvement in gender relations, religion, and entertainment, blogs may be more apt to focus on technological ‘gadgets’ and restaurant reviews than political commentary (i.e. in the Gulf States). This means that analysis of the blog content is required in the latter case, whereas an idea about whether the blogs form their own networks and what their linkages are to the mainstream media can be gleaned by interviews and more quantitative means. Our definition of the most ‘popular blogs’ rests on a combination of the most often linked to blogs in each blogosphere combined with the most highly ranked in terms of visitors. 34 These blogs, we reasoned, are those most likely to be picked up, linked to, or ‘stolen’ from by the mainstream media. Relationships between the mainstream media and bloggers can be difficult to trace in Arab countries, due to widespread ‘idea theft’, censorship and filtering, and technological anomalies, but we can get an overview of blogger networks through their hyperlinks, through citations of them and mainstream media through search engines as well as from blogger’s own accounts. We chose the top Lebanese and Egyptian Arabic and English language non- 34 Alexa (www.alexa.com) is a web traffic analysis site that provides ranking and analysis of visitor statistics and averages for a three-month period. Alexa alone is not considered a reliable indicator, so those chosen come from the top 30 ‘most linked to blogs’ according our link impact analysis (Thelwall, 2009) which also had the highest traffic according to Alexa. 22 commercial, active, individual blogs 35. We interviewed 17 of these 21 bloggers personally or via Skype (with video). Our textual analyses cover at least every tenth blogging day of these blogs during the period between 1 April 2009 – 30 April 2010 to see what types of subjects the bloggers focus on and how they express themselves. Middle East studies scholar Mark Lynch (2011) has argued that the most likely effect of the Internet will be an incremental widening of Arab public spheres rather than fundamental change, because Arab governments may yet adapt to and stifle the Internet challenge. Whether blogospheres can most aptly be described as extensions of mediated public spheres, or as alternative or ‘counter’-public spheres, blogs can be thought of as accessible online spaces where people gain a degree of publicity and interaction for issues the blogger(s) have decided are of concern. By choosing popular bloggers we signal that we are interested in the type of alternative public that is not so isolated from the dominant mediated public sphere as to be irrelevant. Some attention needs to be paid to them by the more established actors in society - either the media, civil society and religious organisations, or official authorities. Non-affiliated bloggers emphasise their independence from established media organisations, marking their authenticity with subjective audience address, signalling first-hand experience and trustworthiness (Atton 2008, 43). The popular bloggers we interviewed in Lebanon and Egypt are no exception. Few of them even admitted to belonging to a social or civil society organization. That said, most participated in an ad hoc way in civil society organisations’ or NGOs’ charity drives, workshops, protest demonstrations, or human rights campaigns (prisoner abuse, women’s rights, minority issues). 35 The reason there are eleven blogs in the Egyptian case and only ten in the Lebanese case is because Manalaa.net, run by a couple, were not very active during our time period. Therefore not much could be said about the content, but since this blog was among the top most linked to and visited blogs, and also a seminal Egyptian blog whose founder started one of the most important Egyptian blog aggregators, we include it here. 23 The Lebanese and the Egyptian bloggers told us that the aim of their blogs was to freely express their opinions about politics, society and culture, many saying that opinions such as theirs were not adequately reflected in the mainstream media. While this does not preclude the possibility that some bloggers started their blogs to launch a career in the media (whether artistically or journalistically), it also points to a subjective feeling of not being represented in mainstream society. Thus, blogging can seen as part of “alternative media spheres” where publics that feel marginalized use campaigns and alternative media to make their voices heard, and hoping to make an impact in the dominant public sphere (Wimmer, 2009; Warner, 2002). At the very least, blogging functions as online spaces where bloggers post about their concerns and issues. Through interacting with others online and offline, they form their own community, parallel to the mainstream (Fraser 1990). Those bloggers we interviewed demonstrated an awareness and interest in their readers: they knew how many readers they had, which countries they came from and, through the ‘comments’ function and Twitter, they interacted with many of them. Secondly, they knew most of the other bloggers included here, either through reading them regularly, or via other online platforms, or through meeting them at ‘bloggers’ meetings’, conferences on social media, ‘tweet-ups’, protest demonstrations or other common causes. Figures 1.1 and 1.2 demonstrate also that the bloggers link (i.e. ‘cite’) each other, forming a network. The red squares denote Arabic language bloggers and the blue (and purple) circles are English or mixed language blogs. 24 Figures 1.1 and 1.2 Egyptian (left) and Lebanese (right) Bloggers Interlinking Networks (with SocSciBot webcrawls, see Thelwall, 2009). One interesting point that could be made is that the Lebanese bloggers appear better interlinked, whereas the Egyptian English language bloggers are not linked to as often. This could be explained by the more common use of English in the wider Lebanese blogosphere. Nonetheless, these link networks together with our interviews demonstrate that ‘bloggers’ or ‘social media activists’ as some call themselves, form a special type of sub-identity, whether or not they agree with each other on substantive or ideological issues. Indeed, writing of Lebanese bloggers, Jurkiewicz (2012) describes an intensive cooperation (as well as conflict) around common initiatives, offline meetings and friendship as well as online discussion and comment. Egypt and Lebanon: Two Very Different Contexts for Blogospheres To generalize about public discussion in the Arab world, controversial topics have to do with sex (premarital, extramarital, homosexuality), religion (sectarian issues, interpretations of one’s own religion or criticizing religious authorities), and politics (criticizing the current leadership, the army or governmental system). Taboos against 25 public discussion of these issues vary, of course, widely across the Arab world as well as the sanctions for breaking them (from censorship, Internet filtering, incarceration to death). The bloggers we interviewed felt that blogs were ideal spaces for airing controversial political and social issues, or criticising political and cultural norms in their respective societies. The conditions for such free expression did however differ significantly between Lebanon and Egypt, for while the former had little formal government censorship, bloggers in the latter risked fines, harassment, physical harm, arrest or imprisonment for crimes such as insulting President Mubarak, the Supreme Council of Armed Forces (SCAF) or Islam. For Egypt, it is a great paradox that despite its blogosphere being one of the largest and most lively blogospheres in the Arab World, and relatively early regional adopters of Facebook and Twitter, Egypt was cited in 2009 by Reporters without Borders as an “Internet enemy”. 36 The rise of blogging in Egypt has been attributed to their documentation of incidences of election fraud and the ensuing Kefaya (“Enough”) Movement protests in 2005 against the corruption of the regime of President Mubarak. These pioneering bloggers were human rights activists and citizen journalists, who criticised government and business corruption, systematic torture, labour exploitation, and defending womens’ and minority rights. Their online and offline mobilisation became an inspiration for tech-savvy youth around the region as to what could be done in the face of heavy handed government repression (Hamdy, 2009, Radsch, 2008). That same year in Lebanon, blogging mushroomed after the assassination of former Prime Minister Rafik al-Hariri. The ensuing mass demonstrations that came to be called the 36 At least three bloggers were imprisoned during 2010 and many more detained, fined and had their computer equipment confiscated according to Freedom House. One of the bloggers in our sample, Alaa Abd El Fattah here was held for over two months during 2011 for taking part in a protest staged by the Egyptian Copts which resulted in the death over 20 people. Journalists also face fines, beatings, and imprisonment due to various laws and their inconsistent application. See http://www.freedomhouse.org/report/freedom-press/2011/egypt. 26 “Independence Intifada” forced the Syrian army to withdraw after 30 years in Lebanon. A second generation of bloggers appeared in both Egypt and Lebanon in 2006 (Radsch, 2009; Taki, 2010). In Egypt, this related to demonstrations against the public sexual harassment of women and to the increase of Muslim Brotherhood bloggers. In Lebanon, a new generation began blogging as a result of the Hizbullah-Israeli war, which virtually closed Lebanon off from the outside world for a time. The so-called ‘third generation’ bloggers appears harder to fix to a specific time, but they tend to appear in 2007. Radsch (2009) has characterised this latest Egyptian blogging generation as one in which the ‘subaltern groups’ began blogging in greater numbers. Like their predecessors however, many are human rights focused. In contrast, this third generation in Lebanon has diversified away from human rights and politics to arts and entertainment blogs, business blogs, and lifestyle blogs (Jurkiewicz 2011). Of our chosen top Egyptian bloggers, mainly all are first generation veterans with an average age of 34 - several were over 40 years of age when we interviewed them. 37 Most of these bloggers are well known internationally in the online activist world, some could even be described as celebrities; they had good connections to mainstream media and among youth movement, both inside and outside Egypt. By 2011 most of the Arab language bloggers had moved much of their activity to Twitter and Facebook, and were blogging infrequently, however the English language bloggers continued to be active and were linked to by Western media. In contrast, the top Lebanese bloggers were younger and could be said to come the third generation bloggers; although the average age was 29, most were closer to their mid-twenties. With a couple exceptions, most did not have the same celebrity status in relation to the mainstream media as the Egyptian bloggers. A couple others had by 37 The onsite interviews took place in Beirut, November 2010 and in Cairo, March 2011. 27 2011 opened new blogs, moved to Facebook or become more infrequent. The use of Twitter and Facebook was not as often mentioned by Lebanese bloggers as alternatives or complementary tools as among the Egyptian interviewees. One can only speculate as to the reasons for the later adoption of Twitter and Facebook among the Lebanese top bloggers – perhaps because fewer of the Lebanese considered themselves to be ‘social media activists’. The questionable staying power of even the most popular bloggers raises questions about the sustainability of blogospheres over time. After all they are not paid, as journalists are, to produce a certain amount of text on a regular basis – only a few of them earned much money from ads. The great majority of bloggers tend to be active only during certain periods. On the other hand, the top bloggers in our sample that have slowed down have continued on other social media platforms. Khamis, Gold & Vaughn (2012) have emphasised how the various social media platforms were used during the Egyptian Uprisings in 2011 for different purposes, so it is unlikely that sucessful bloggers simply disappear or stop taking part in online discussions altogether. How individuals utilise different social media platforms to create their online presence is one interesting and often overlooked avenue of study in analyses of social media. Traditionally, the focus has rather been on the blurred boundaries between offline and online activities, especially when it comes to activism. In this case, many of the bloggers also worked as freelance journalists, and/or participated ad hoc demonstrations, protests and campaigns. The Top Bloggers and Local Media Western observers have noted that the adoption of citizen journalism and social media by the mainstream media is driven by conflict and crisis, when the latter are unable to be at the right place at the right time or when their watchdog role is compromised. This observation must be modified to have relevance to mainstream Arab media, which have by and large been appendages to power, either being state-owned or controlled by powerful groups/business interests close to the state. 28 This is particularly true of Egypt, where state or privately owned (but government friendly) media have long been dominant. However, since the turn of millennium, this dominance has been challenged by the success of political talk shows on satellite television channels, the launch of online portals and or online versions of the new independent newspapers and from the rise of blogging (Sakr, forthcoming). Omnia Mehanna (2010) attributes the breakthrough of blogging in Egypt in 2005, in part, to the transnational Arab media. She says that the broadcast of Al Jazeera’s programme “Taht Al-Mighar” (Under Examination) in May 2006, which mainly dealt with Egyptian bloggers’ documentation of incidences of election fraud in the presidential and parliamentary elections of 2005 and other human rights violations, was a turning point. This episode, featuring several of the bloggers discussed here, sparked an upswing in blogging among a whole generation of disgruntled segments in society and also put bloggers on the Egyptian media radar. As she describes it, “/…/some newspapers started paying attention to the blogs, copying, sometimes without permission, stories and pictures from them.” (p. 199) Figures 1.3 and 1.4 depict the link citation relationships between our bloggers and some of the top news sites for Lebanon and Egypt. 38 The diagrams represent URL citations (of blogs or websites) found in the top blogs and the media sites of each other. These could, but do not have to be hyperlinks (as were the previous set of diagrams), rather they are a search engine’s return of blog citations and their connectivity to certain chosen top media sites. 39 Although not as comprehensive as hyperlinks, the citations returned by such a search, are according to webometric analyst Mike Thelwall (2009), comparable to a hyperlink network. 38 Taken the last two weeks in April 2011. The link analyses were made between april-june 2011. URL citations are defined by Thelwall as “the inclusion of an URL (or URL without the http://) in a web page, with or without a hyperlink. For example, ‘I like news.bbc.co.uk’ is an URL citation in this page for the BBC news web site.” See http://lexiurl.wlv.ac.uk/searcher/FAQ.html#URLCitation. Accessed: April 16, 2011. Having analysed hyperlink relationships for the Lebanese blogosphere, we found the URL citations to return a similar overall pattern of results. 39 29 Figure 1.3 Network Diagram of Link Citations Between Top Egyptian Blogs and Local Online Media (black arrows denote where media cite to blogs). 30 Figure 1.4 Network Diagram of Link Citations Between Top Lebanese Blogs and Local Media (black arrows denote where media cite to blogs). From both diagrams, it is clear that the Egyptian and Lebanese news sites (nodes in yellow circles) tend to link to one another rather than to the blogs (English language blogs are blue circles and Arabic language in red squares). The blogs cite the media and each other quite a lot, but especially the Egyptian news sites cite more seldom the blogs (denoted by black arrows). Some interesting exceptions should be noted, however. These are Nawara Negm (tahyyes.com) and Alanay who are cited by El Shorouk, 40 and state-owned Al Ahram which cites Wael Abbas, Manal and Alaa's Bit 40 The local media sites for Egypt are the independent online newspapers, almasryalyoum.com, dostor.org, shorouknews.com, and the state-owned ahram.org.eg, and the privately financed youm7.com and masrawy.comAl Youm al Sabe´a translated as 7th Day. It a liberal private newspaper rumoured to be owned by business interests close to the Mubarak regime. Masrawy is one of the oldest online news sites in Egypt, and describes itself as a news portal. It is owned by businessman Naguib Sawiris who also has shares in Al Masry al Youm and Orascom Telecom. 31 Bucket, and Ana-Ikhwan. Here it should be noted that no less than five of the Egyptian bloggers either are free-lance journalists, work as columnists or have previously worked for news organisations. Nawara Negm (tahyyes), writes a column for the independent newspaper al-Dostor (dostor.org) and edits and translates for Egyptian State Television. Abdel Monem Mahmoud (ana-Ikwan) and Hossam elHamalawy (3Arabawy) are both trained journalists, and have worked for Al Jazeera and the LA Times respectively. Traveller within (Mohamed Dashan) freelances with a column for al-Masry al-Youm. Wael Abbas (misr digital), one the most internationally famous of all the bloggers, had previously worked as a Middle East correspondent for the German news agency Dpa. Obviously, being a journalist or writing for a media outlet has some explanatory power regarding the link citations. On the other hand, bloggers often link to their own articles in newspapers, but the newspapers do not have to do the reverse. In a politically and socially polarised country such as Lebanon with 18 recognised religious confessions, it comes as no surprise that the Lebanese media system is divided along confessionalist lines. This means that differences of opinion and various inflections on events can vary substantially in both the offline and online media system. Although confessionalism is part of the fabric of Lebanese society, two major political power blocs emerged after the retreat of the Syrian army in 2005: the March 14th movement (i.e. Future Movement Sunnis, various Christian and Armenian factions) and March 8th movement (i.e. Shia Muslim factions and Michel Aoun’s Christian Free Patriotic Movement). In this context, it is interesting to note the high number of mutual citations between these online media in the Lebanese network Diagram 1.4 above. Also, interesting is the high number of mutual citations between ‘old’ media press outlets, such as an-Nahar and as-Safir, and ‘new’ online news outlets such as tayyar.org, elnashra.com, ‘Now Lebanon’ news site and the online leftist March 8th newspaper Al-Akhbar. 32 Lebanese media citations of blogs are more common than in the Egyptian case. Angry Arab is the most often cited by the media. Being a veteran blogger and a Middle East scholar, he writes a regular column for the leftist March 8th-supported newspaper AlAkhbar. Tayyar.org (supporting the Free Patriotic movement) and As-Safir are citing +961, Saghbini, Hummus Nation and Trella. NowLebanon (Future Movement site) seems interested in linking to several of the English-language blogs, although none of the bloggers write for them. Here again, it should be noted that four of the Arabic language bloggers are currently writing or have written for al-Akhbar and As-Safir, and this may be responsible for some of these links to some of those bloggers 41. The new online media such as elnashra.com, nowlebanon.com and tayyar.com thus appear to be citing blogs. More Lebanese bloggers are cited by the Lebanese media and more of them are interlinked than among the Egyptian bloggers. This is counter-intuitive since the Egyptian bloggers, according to our interviews, were more known the media than the Lebanese bloggers. As noted above, this may be due to the Egyptian media simply ‘borrowing’ ideas from the blogs without attributing them, or to the limitations in the number of queries (1000) allowed in the search engines. Another linking method (www.issuecraweler.org) demonstrated that the same basic overall pattern applies: overall none of the local media link as much to the blogs as the blogs link to them. In any case, it is clear that in both cases, these bloggers appear to be known to the local media and can therefore count on having their voices heard in one way or another. 41 These are as noted above Angry Arab who writes a column, Hannibael (Hani Naim) free lances for both Al Akhbar and As-Safir and Kharbashat (Assad Thubian) (was freelancing for As-Safir). Saghbini had previously written for Al Akhbar but left it. 33 Blogging Content during 2009-2010 The content of both the Egyptian and Lebanese top bloggers can be said to have stretched the boundaries of the public sphere and pushed issues not prioritised in the mainstream media of each country. In the Lebanese case, the bloggers were critical of the politics of sectarianism and the media system it has spawned. Some criticized the Abrahamitic religions by giving examples of paganism in the region. Others engaged with day-to-day dysfunctions of life, the plight of the Palestinians and foreign maids in Lebanon, environmental degradation and climate change, or excessive commercialism and consumerism. Four of the bloggers used satirical commentary, humour, irony or sarcasm to criticise governmental authorities, powerful groups in Lebanese society, ad agencies, or social norms and values. Although the English-language bloggers tended to be more interested in the day-to-day and less ‘socially activist’ than their Arab-language cousins, almost all of them expressed frustration and deep dissatisfaction with the Lebanese confessional system. Similarly, gender discrimination was an issue in the Arabic language blogs and not exclusively the domain of the two female bloggers, Maya Zankoul and Independence 05 (now Funky Ozzy). Both of these two English language bloggers discussed the sexism and discrimination encountered as women in Lebanese society. Yet, their blogs were not exclusively concerned with womens’ issues. In this way, the women bloggers in this sample should not be singled out as the only voices speaking out about discrimination. Most of the bloggers also told us that they didn’t think there was any significant difference between female and male bloggers regarding content. In Egypt, the eleven bloggers differed even more clearly in ideological tone, from Marxist, to leftist Islamist, to Liberal secular, to Islamic intellectual, to socially conservative. Yet, these differences were overshadowed by common themes related to the (il)legitimacy and efficacy of the Mubarak government. Among these were documentation of the protests against the public sexual harassment of women, against 34 government corruption, arbitrary arrests and above all, the repression of free speech. They exposed widespread police brutality and lack of accountability, and corruption in the Egyptian administration and the business sector, the widespread poverty and exploitation of workers (lack of minimum wage), the discrimination of minorities, and criticism of the state-owned media for not giving a fair picture of events. The English language bloggers all reviewed the much hailed speech of US President Obama from Cairo in June 2009. In contrast to the Lebanese bloggers’ more diversified interests, the Egyptian top bloggers were almost all ‘social media activists’ and human rights bloggers. This is in a way unsurprising since these blogging veterans had for the most part been part of the wider youth movement criticising the Mubarak government for six years when January 25th 2011 rolled around. So, the state-dominated Egyptian mediascape and the Mubarak political system can be said to have shaped what types of bloggers become popular, and their blogging themes be said to reflect their views on what was going on at the time of their blogging. In both this case, and in the Lebanese case, these popular blogs are disporportionately leftist and secular compared to the wider Egyptian and Lebanese blogospheres, as well as to mainstream opinion in their societies. That said, they do document a wide variety of issues the online youth are concerned with, as well as events taking place in each society during 2009-2010. The Lebanese bloggers reflect the fact that Lebanon had an election in 2009, and that this election did not solve the polarised and deadlocked government. Even though a vibrant variety of media represented the spectrum of political opinion, bloggers were keen to distance themselves from these media by either ignoring ‘the partisan political’ or dealing in issues that cut across the political boundaries, like antisectarianism, environmental and anti-consumerist stances. In Egypt, where an authoritarian political system and censorship coexists with a vibrant intellectual culture, sectarian tensions and a venerated religious orthodoxy, these bloggers, despite 35 their differences, could coalesce around their desire to get rid of the hated symbol of all that was ill in society – the Mubarak regime. Based on this and other evidence, one cannot talk about a common “Arabic blogosphere” but a multiplicity of national and even fragmented sub-national blogospheres (Jurkeiwicz 2011, Etling, et. al. 2009). Each country’s relationship to the outside world, its history, patterns of political and social (and mass) communication, and types of cultural taboos have shaped the way the social media are being used by bloggers. This means while these bloggers certainly brought up panArab political or cultural issues (i.e. the Palestinian issue, the Iranian election, sectarian fighting or the lack of basic human rights in the region), Hollywood film releases or popular music, most were mainly concerned with national and local issues, despite their otherwise cosmopolitan attitudes and lifestyles. The use of blogging language does clearly reflect these cosmopolitan lifestyles and these bloggers education. There were more blogs in English and in Modern Standard Arabic (MSA) among the top Lebanese bloggers. The Egyptian bloggers tended to use Egyptian dialect and several of what we called “English-language” bloggers also had a considerable number of posts in both languages. There are several reasons why language is not necessarily an indicator of transnational blogging content. First, the English language “bridge-bloggers” address foreign audiences about events happening in their countries and therefore are not necessarily preoccupied with events in other countries. Secondly, while Egyptian dialect is understood throughout the Arab world thanks to the wide circulation of Egyptian media products, its use does not necessarily, indicate an effort to reach a pan-Arabic audience, but is an indication of a specifically Egyptian phenomenon (cf. Mehalla, 2010). Using English and Egyptian dialect together does though indicate and attempt to reach audiences both inside and outside Egypt. The paradox is that these nationally oriented media-savvy middle to upper class bloggers are for the most part, cosmopolitan in outlook and lifestyle. Little wonder then, that the Western and regional media have picked up on 36 them as sources in the run-up to the revolutionary, particularly those five Egyptian bloggers that have worked or are working as journalists or columnists. Conclusion Returning to our starting point, it is clear from the comparison between the Egyptian and Lebanese bloggers that the former clearly foreshadowed the events of 25 January 2011 that toppled Mubarak. In this, they were just a tiny part of a much larger network of human rights activists, labour movements, minority groups and others that were fed up with the regime. On the other hand, their relationships with Western and local media, and as well-known names in international activist circles, meant that their online activism was disproportionately visible, just as their views differ from the mediated public sphere dominating in Egypt. The drawback to this is that since the Western media are citing mainly the English-language blogs (as well as Wael Abbas), they are getting a more narrow view of events, and risk misunderstanding developments that would be given a different interpretation from a Muslim Brotherhood blogger, for example. Indeed, this warning may also be true of Lebanon, where the Arab language bloggers tended to be more leftist and more ‘social activist’ than the English language bloggers. Previously scholars have asked whether blogging in the Arab world is simply a pressure-valve for the well-educated classes to ‘let off steam’ or whether they can facilitate social change. While there is no doubt that online activism increases the visibility of certain issues or groups of advocates, we have also shown that they clearly reflect what is going on their own societies. The Lebanese bloggers did not appear to have the same impact as their Egyptian colleagues, despite being linked to more frequently by the local online media. Thus media attention could not compensate for the deadlocked nature of the Lebanese sectarian system and the lack of popular mobilization and public opinion for a secular political system. The Egyptian bloggers’ anti-regime stance, on the other hand, resonated with many other 37 offline and organized disaffected segments of society, that all came together in January 2011. So while social media moves quickly, social change is slow and there is no straight line between them. The blogospheres reflect their societies and mediascapes, and to the extent that the most popular bloggers blog about the same themes, they also document a certain period in time. Over the long term however, we have to see blogs as part of new media ecology with Arab satellite television and new online news outlets. Scholars have noted the contribution these have already made to a renewal of pan-Arab identity, a broadened range of topics publicly discussed in the media, and new interactive possibilities (Figenschou, 2010; Kraidy, 2010). The nature of social media has to do with empowering choice and sharing: what to watch, to listen to and what to convey to others. Albrecht Hofheinz hypothesizes that long-term everyday Internet use encourages a sense of being in control of what one pays attention to, a sense of entitlement to judge for oneself among various sources, and confers the right to hold an opinion and to express oneself in public (2011: 1427). In other words, this sense of personal empowerment should accompany a more questioning and critical attitude towards traditional authorities. Despite their journalist backgrounds, I would argue that these bloggers can be considered ’new voices’, that are being heard in the mediated public spheres of Lebanon and Egypt. Significantly women and minority bloggers add to diversity and plurality, and their issues are taken up by this self-identifying generation of bloggers and twitterers. True, in the light of mobilising ability of Twitter and Facebook, blogging appears to have gone down somewhat, but we also see the same individuals continuing on other platforms. Further research should focus on the individual use of different social media platforms for different purposes within a social movement. It should also address the role of social media for building more lasting democratic institutions and the advantages and drawbacks of diasporic and transnational social networks for building democracy after upheaval. 38 References Atton, C., (2008) “Bringing Alternative Media Practice to Theory: Media Power, Alternative Journalism and Production” in Pajnik, Mojca and Downing John D.H. (eds.), Alternative Media and the Politics of Resistance: Perspectives and Challenges, Series: Politike Symposion. Ljubljana: Peace Institute, 31–48. Chadwick , A. (2011) “The Hybrid Media System” Paper Prepared for delivery at the European Consortium for Political Research General Conference, Reykjavik, Iceland, August 25, 2011. Khamis, S., Gold, P. & Vaughn, K. (2012) “Beyond Egypt’s “Facebook Revolution” and Syria’s “YouTube Uprising:” Comparing Political Contexts, Actors and Communication Strategies”. Arab Media & Society. Issue 15. Spring. http://www.arabmediasociety.com/?article=791. Etling, Bruce, Kelly, John, Faris, Robert and Palfrey, John (2009) “Mapping the Arabic Blogosphere: Politics, Culture, and Dissent” Berkman Center at the Harvard. Research Publication No. 2009-06 June. http://cyber.law.harvard.edu/publications/2009/Mapping_the_Arabic_Blogosphere. Figenschou, T. U. (2010) The South is Talking Back: Al Jazeera English as a Strategic Contra-Flow, PhD Dissertation, Faculty of Humanities, University of Oslo. April 2010. Fraser, N. (1990) “Rethinking the Public Sphere: A Contribution to the Critique of Actually Existing Democracy”, Social Text, No. 25/26 (1990), pp. 56-80. Hamdy, N. (2009) “Arab Citizen Journalism in Action: Challenging Mainstream Media, Authorities and Media Laws,” Westminster Papers in Communication and Culture. Vol. 6(1): 92-112. Hofheinz, A. “Nextopia? Beyond Revolution 2.0”. International Journal of Communication 5 (2011) 1417–1434. Jurkiewicz, S. (2012) Being a Blogger in Beirut: Production Practices and Modes of Publicness. Dissertation Manuscript submitted to Faculty of Humanities University of Oslo. April 2012 39 Jurkiewicz, S. (2011) “Blogging as Counterpublic? The Lebanese and Egyptian Blogosphere in Comparison”. In: Schneider, Nadja-Christina, Gräf, Bettina. 2011. Social Dynamics 2.0: Researching Change in Times of Media Convergence. Berlin: Frank & Timme, 27-47. Kraidy, M. (2007) “Saudi Arabia, Lebanon, and the Changing Arab Information Order,” International Journal of Communication 1(1): 139-56 Kulikova, S.V. & Perlmutter, D. (2007) “Blogging Down the Dictator? The Kyrgyz Revolution and Samizdat webstides. International Communication Gazette. 69 (1). 29-50. Lagerkvist, J. (2010) After the Internet Before Democracy. Competing Norms in Chinese Media and Society. Bern: Peter Lang AG. Lynch, M. (2011) “After Egypt: The Limits and Promise of Online Challenges to the Authoritarian Arab State” Perspectives on Politics, 9 (2). pp 301-310. Mehanna, O., (2010) “Internet and the Egyptian Public Sphere” Africa Development, Vol. XXXV, No 4. 195-209. Radsch, C. (2008) “Core to Commonplace: The evolution of Egypt's blogosphere”. Arab Media & Society (6) September. Sakr, N. (forthcoming) “Social Media, Television Talk Shows and Political Change in Egypt”. Special Issue Media and the Middle East. Television and New Media. Sreberny, A. & Khiabany. G.,(2010). Blogistan: The internet and politics in Iran. New York: I.B. Tauris. Taki, M. (2010). “Bloggers and the Blogosphere in Lebanon & Syria: Meanings and Activities”. PhD diss., University of Westminster. Thelwall, M. (2009) Introduction to Webometrics: Quantitative Web Research for the Social Sciences. Synthesis Lectures of Information Concepts, Retrieval, and Services, #4, Morgan & Claypool. E-book. www.morganclaypool.com. Warner, M. (2002) “Publics and Counterpublics”, Public Culture 14(1), 49-90. Wimmer, J. (2009) “Revitalization of the Public Sphere? A Meta-Analysis of the Empirical Research about Counter-Public Spheres and Media Activism” In Media 40 Agoras: Democracy, Diversity and Communication. Eds. Garcia-Blanco, Iniaki, Van Bauwel, Sofie and Cammaerts, Bart. Newcastle upon Tyne: Cambridge. 41 China´s Authoritarian Information Order: Dealing With New Media Capitalists and Emergent Civil Society Johan Lagerkvist In state-capitalist and authoritarian China, Internet entrepreneurs find themselves caught between increasing marketization, restive social interests and state control. The position of businesses can also be conceptualized as negotiating different notions of reality and prescribed social norms on freedom of information, i.e. the party-state norm and the youth/subaltern norm (Lagerkvist 2010). 42 The youth/subaltern norm is imbued in, and finds expression through, the new social activism and citizen journalism that further contributes to the unlocking of the Chinese public sphere (Lagerkvist 2009). How to deal with – and financially or politically survive – the balancing act has engendered sharp challenges for both the party-state and Chinese entrepreneurs in the information- and communications technology (ICT) sector since the beginning of the 1990s. Today this tension is played out through animated and hard-censored discussions on Chinese microblogging platforms, such as Sina Weibo and Tencent Weibo, and the party-state’s fixation on social and political stability. Just like other communications practices on the Chinese Internet that preceded it, use of social media challenges the Communist Party and official and traditional mass media. Leaks of political scandals and social protests related to abuse of economic and political powers spread like prairie fire through the online world of networked sociality. Therefore the party-state has to prevent and forestall the transformative political 42 The youth/subaltern norm is a conceptualization of the social norm that contests and questions the legitimacy of the elitist and hegemonic Party-state norm. It is, however, reasonable to assume that just as there are fissures between segments in an emerging civil society and the party-state about what Chinese patriotism means and what policy actions it should entail, there may significant overlaps between popular and state perceptions of Internet freedom. Therefore, building a typology of social norms related to Internet control and freedom could be a fruitful research agenda. 42 impacts of rapid technological change in the field of communications. 43 Increasingly, efforts at maintaining the existing information order and the locked-in, yet budding, public sphere entail practices of social control and a division of censorship and surveillance labor between social media businesses and party-state officials. Serving two masters with diverging interests regarding open networks and information flow is an economic as well as a strategic burden for internet and social media companies. How long these enterprises can, and are willing, to endure the costs of outsourced censorship, ties into broader structural transformations in Chinese society, such as generational change, administrative reform inside the Communist Party, and to some extent ideational change impacted by transnational norms. Much societal anxiety, and state attempts to defuse it, is channeled into and gets new visibility in the world of real-time social media. As a consequence tension grows between increasing consumer demand for unfiltered news, citizens unfettered discussion of current affairs and the businesses that both provide and censor such services on behalf of the state. Research Questions This essay attempts to shed light on the current authoritarian information order that constrain the public sphere in China and the upholding of this order through strategic communication, ideology and practices of coordination. The party-state norm is articulated in the policies and ideology of the Communist Party. In this paper the focus is on how social media and internet companies are enlisted by the party-state in its effort to rein in and coordinate control of runaway speech – and alternative normsshaping in the Chinese online public space of social media, especially the Twitter-like microblogs. The perspectives of professionals and business leaders in the social media sector are scrutinized. In particular, their paradoxical role of both facilitating and 43 During 2011/12 some of the most spectacular leaks have concerned protests against land grabs in the countryside, such as the high-profile case of the village of Wukan, and the mounting scandal around and subsequent ousting of the colorful and very ”red” Party Secretary of megacity Chongqing, Bo Xilai. 43 containing freer speech. This phenomenon is especially intriguing against the backdrop in China of a cadre-capitalist interest alliance that crisscrosses all sectors of the economy, which necessitates closer scrutiny of the specific role, values, and strategies of ICT entrepreneurs. Two questions follow on this particular problematic. First, how do private social media businesses deal with the burden of delegated control of microblogs? Second, can the party-state trust these companies to adhere to the party-state norm on “harmony” and uphold social control over users? Thorny Dilemmas for Chinese ICT Entrepreneurs More than ever before the responsibility to police online society is delegated to lowerlevel entities in the long chain of control that begins with Zhou Yongkang, the Politburo Standing Committee member currently in charge of propaganda and domestic security. Studying the development of social media and outsourced control of it relates to a principal-agency dilemma, whereby original tasks and intentions may be compromised (Niskanen 1968). Few scholars have looked in-depth at the thorny relations between new media businesses and the party-state (Weber and Lu 2004/207; Lagerkvist 2006/2010/2011; Min 2012). One implicit assumption in popular and journalistic accounts is that professionals working with digital media communications, in China and elsewhere, more easily “ought to” adopt ideas of freedom of speech and information than professionals in other business sectors, state-owned companies, or the public sector at large (Saxennian 2007). That many Chinese companies in the ICT sector look to the west to absorb start-up capital from foreign venture capitalists and are listed on foreign stock exchanges, such as NASDAQ, has probably fed into the assumption. However, while it is likely that foreign money may make these companies somewhat more independent than state-owned commercial enterprises, which often are dependent on state investment and have board members who are Communist Party officials, reality is decidedly more complex. 44 Based on ethnographic fieldwork conducted in Beijing during the fall of 2011 devoted to understanding potential value change and business strategies – in the face of envisaged new regulations for social media – at the two major microblogging media companies Sina and Tencent, the essay investigates the nature of private entrepreneurial capitalism of the new media sector. 44 Control practices that target internet businesses and social media use follow mainly from the party-state’s unending worry to check threats to sociopolitical stability. Like Chinese state-owned media organizations, private media businesses must adhere to and also aid policies set out to preserve the legitimacy of the Communist Party. At the same time they are building the communicative infrastructure that restive social forces use to connect and disseminate socially provocative, sensitive, or in the eyes of communist party leaders, even worse – “subversive” thoughts and ideas. The essay proceeds by outlining Chinese microblogging companies’ dual role as both facilitators and monitors of social media in China’s locked-in public sphere. Thereafter, an analysis of how the existing principal-agent problem in China’s social media sector has only been temporarily resolved, making cadre-capitalist cooperation inherently unpredictable and increasingly tenuous, directs spotlight to the issue of the potential role of Chinese capitalists in a process of democratic transition. A Subdued ICT Industry The submissive stance of Chinese ICT entrepreneurs has been a consistent theme over time, starting with new regulations in 1999 to prohibit new media organizations to become also new bastions of online journalism. By and large, a general atmosphere of giving in to old political power has pervaded in a business climate of pervasive corruption, where profitable contracts are secured and market shares won through friction-free and mutually beneficial cooperation with politicians and regulators. 44 In September and November 2011, I interviewed 14 informants who in their professional capacities work as social media editors, managers and executives, as well as journalists with traditional media organizations in Beijing. The in-depth interviews were complemented by analysis of contextual material such as policy documents and legal texts as well as reading of weibo postings and accounts in major Chinese newspapers, crucial when conducting in-depth qualitative studies in an authoritarian country such as China, where statements by informants need to be cross checked against other sources when available. 45 However, that does not by definition mean that Chinese businessmen unconditionally accept authoritarianism, ready to support political liberalization and democratization “only when they do not perceive such a transformation to a threat to their material well-being” (Wright 2010: 57). Rather, most of them pragmatically tolerate the status quo since it – for now – brings more benefits than costs. As noted by Chen and Dickson, the “continuation of regime support is contingent on the government’s policy performance (2010: 17).” Nonetheless, it is very rare for business leaders to criticize government policies in public. Usually, they critique and convey their concerns about profitability to policymakers behind closed doors. Many domestic entrepreneurs have been socialized to adhere to a legal tradition of an authoritarian developmental ethos. Its effect is a benign circle that upholds that social and political stability are of benefit to Chinese society as a whole, including business, since stability are prerequisites for sustained economic growth – which in turn generates order and a more harmonious society. Yet, it’s now noticeable that minor cracks in the relations between government officials and capitalists in the internet and communications sector are beginning to emerge. In recent years two examples of industry opposition stand out as exceptions to the general trend of submissiveness. First, there was the opposition mounted to the “Green Dam youth escort software”, an effort by the Ministry of Information Industry (MIIT) to have all makers of laptop computers install a screening software called Green Dam on notebooks sold in China. 45 The government’s failure to implement Green Dam suggests that there was a limit to industry passivity, although the larger share of complaints may in fact have originated from foreign business organizations and domestic journalists of a liberal inclination. Second, when Google’s decided to close its search engine in Mainland China and instead move to freer Hong Kong, some business leaders argued that it would be detrimental for business innovation in 45 “China has not given up Green Dam plan,” The Telegraph, July 2, 2009, http://www.telegraph.co.uk/news/worldnews/asia/china/5720396/China-has- not-given-up-Green-Damplan.html, last accessed September 12, 2010. 46 the ICT sector. 46 In line with this trend, there have in recent years emerged indications that some business leaders in the new media sector are worried about the long-term negative market effects for business of China erecting barriers to information flows. Thus, the hitherto servile attitude of business leaders sector could change and is – to some extent – conditional. However, divergence from business as usual is discernible mostly when it concerns industry strategy and fiscal costs of surveillance rather than individual or societal freedom. Microblogging Businesses in China Although many media companies, both new and traditional, have set up microblogging services on their websites, the biggest players in this segment of the social media world are Sina and Tencent. On 14 August 2009, Sina announced that Weibo, its equivalent to the Twitter microblog, was open for registration to Chinese netizens. By May 2011, the company reported that it had reached 140 million users and by year’s end 2011, about 300 million microblogs were in use. If the statistics of April 2012 from the two Chinese microblog giants are to be taken seriously, they each have 300 million registered users. Since microblogs were introduced in the Chinese online world in 2009 they have caught the attention (like many previous internet applications and platform before it) of many foreign and Chinese scholars, journalists and policymakers. Although these two companies obviously cannot represent the whole segment of social media businesses (encompassing state-owned, collective, foreign owned, privately owned) a few generalizable insights may nevertheless be deducted. As the biggest facilitators of Twitter-like services they make possible a nationwide and semi-free platform of expression to an extent not seen in China since the chaotic 46 At the China IT Leader Summit in Shenzhen on 28 March 2010, Tian Suning of Media China Corporation said it was unwise to turn Google into an enemy of China, and Ding Jian of Asia Info even questioned the wisdom - short and long term - of the Chinese government’s censorship policy, http://www.szpost.com/2010/03/china-shenzhen-it-leader-summit-to-be- held-in-shenzhen.html, last accessed 11January 2011. 47 first period of dazibao, i.e. the big character posters criticizing the central leadership during the Cultural Revolution’s first phase from 1966 through 1968. The arena of microblogs has been called China’s first “free speech arena,” the Economist magazine has argued that the impact of Chinese microblogs “cannot be overestimated,” and its progression as a vehicle for public opinion formation has even prompted observers of Chinese politics to call the Internet a “virtual political system.” Although the above statements are exaggerations, Microblogging does exert pressure on the government to pay more attention to stirrings of more genuine public opinion. As a consequence, they have been particularly singled out and targeted by state policy, and even received high-profile visits from members of the standing committee of the politburo of the CCP.47 Based on the author’s ongoing fieldwork, there are indications that some younger professionals and mid-level managers are starting to encompass a more liberal attitude to free speech. As one manager of a social media division at Tencent herself argued: Regarding the stance on free flow of information, I think that all companies that are in this line of business wants more, not less freedom and more narrow information flow. This is only natural. 48 This statement goes some way to show that whereas other industry sectors in China may “accept authoritarianism,” parts of the ICT sector merely tolerate authoritarianism for now. This is a sign of a transformation in outlook over the past decade. When the author interviewed Internet industry professionals in Beijing and Shanghai in 2004-2005, they were more prone to accept state control as a given good (Lagerkvist 2005/2006). And they expect policy outcome to their favor as some quid- 47 In the wake of the public opinion storm on Sina Weibo after the high-speed train crash in Wenzhou in July 2011, the politburo member in charge of domestic security, Zhou Yongkang, visited Sina headquarters in August to learn more about the operations of the company’s Weibo service. 48 Interview in Beijing in September, 2011. 48 pro-quo. That a majority of entrepreneurs of new media and internet businesses would resist Internet controls on any significant scale is not consistent with Chinese realities, at least not in the short term. Real Name Registration: From Blogging to Weibo Wary about digital communication becoming a breeding ground for political challenges and social instability, state regulators in China have over the years toyed with the notion of establishing a real name registration system for Internet users (Lagerkvist 2010). Until the deadly high-speed train-crash in Wenzhou of August 2011, however, arguments in favor of a real name registration and outlawing individual postings on platforms that drive online public opinion were weaker than those against. Since 2005 there has been a battle of opinion between state officials and traditional media mouthpiece editors such as the People’s Daily newspaper and China Central Television (CCTV) and elements of society regarding this issue. Moreover, the concerns of legal practitioners, university academics, economists, and business leaders as well as arguments from the security apparatus have all weighed in. Unsurprisingly, the State Council’s Information Office, i.e. the government’s ultimate arbiter of media control in the state bureaucracy, has shown keen interest in the possible implementation of a real name system for internet users for a long time. 49 The central government wanted to implement a real name registration system with a deadline of June 30, 2005 for all non-commercial websites. Websites failing to register would not be allowed an online existence. Due to administrative and technical problems, however, the implementation of the policy was severely hampered and the attempt failed. By September 2006 officials of Beijing municipality wished to implement a real name registration system for individual bloggers to register with their real names. It was during this particular phase, from 2005 through 2006, that state officials visited Daqi 49 Interview with senior official at the Internet Bureau of the State Council Information Office in Beijing, 25 September 2011. 49 Net, a commercial website and blogging platform that had sought out a niche spot of serious intellectual analysis and socio-political commentary. In 2006 Daqi successfully tried out a real name registration system among its then cohort of elite bloggers. The authorities were very impressed and officials from the State Council’s Information Office visited to ask questions about the system’s operation. Due to the resistance from academics, Internet activists, and some quarters of the Internet industry as well as the cumbersome and costly procedure to introduce the system, however, yet again the Ministry of Information Industry (MIIT) decided to put the issue on the back burner. Since 2006, occasional academic studies have been published to show how popular attitudes regarding anonymity have changed. 50 It is notable that along with growing popularity of microblogs, leaders and professionals of the largest microblog providers, Sina Corp and Tencent, have been silent on issues of real-name registration, censorship and costs related surveillance of users, 51 as well as the role microblogs play for political life in China. Charles Zhao, the CEO of Sina Corp, has been very reluctant to comment on the monitoring practices of Sina’s weibo staff. In fact he has said that doing so would not be constructive. 52 As the source of the least controllable mass medium in China today, microblog providers have no choice but to acquiesce to laws, notices and regulations from various government bodies. In August 2011, high-level Communist Party leaders such as Liu Qi, the Mayor of Beijing, and Zhou Yongkang, the politburo member in charge of propaganda, appeared at the headquarters of both Sina and 50 One such study was a survey conducted in Shanghai by the Chinese scholar Zhao Yawen showed quite counterintuitive results. Zhao showed that the majority of the 607 respondents of three districts of Shanghai were in fact in favor of establishing a real name registration system. The conclusion drawn by the author was that “there is a widespread and great worry among people about the current Internet environment” (Zhao Yawen 2008: 327). 51 A Sina mid-level manager interviewed in Beijing by the author on 22 September said the costs for monitoring weibo ”do not constitute a large part of our budget.” 52 Gady Epstein, “Sina Weibo”, 14 March 2011, Forbes Asia Magazine, last accessed September 12, 2011, http://www.forbes.com/global/2011/0314/features-charles-chao-twitter-fanfou-china-sinaweibo.html. 50 Tencent to harangue staff to help create a healthy internet environment. 53 Their visits followed a summer of scandals that were hotly debated on Weibo and other social media. Chief among these were a citizens’ outcry over perceived corruption and incompetence in the Ministry of railways, which were seen as the underlying causes of a high-speed train crash in Wenzhou Province on 23 July, and an environmental protest organized through social media in the city of Dalian in early August 2011. 54 After these public outcries, the government launched a campaign in the state-owned media and among quasi-NGOs against the rumor mongering on Sina Weibo. 55 It did not take long for Sina Corp to show netizens that the company meant to take government concerns to heart. On 29 August, Sina announced the suspension of the accounts of two Weibo users for one month because they had spread false rumors regarding a murder case and embezzlement at the Chinese Red Cross Society. 56 Pleasing Both Consumers and Censors How come a repressive state such as China trust business enterprises outside the state system to implement costly policies of monitoring of microbloggers? Compounded by the fact that implementation of policy and law in China is often slow and cumbersome already within layered officialdom and its more conventional chains of command (Chen et al 2002; Diamant et al 2005). The delegation of surveillance to private companies could potentially lead to foot-dragging as it also brings an extra financial burden for businesses. For the Chinese party-state, the scheme to let companies do frontline spying on the users of social media has so far been a cost-effective strategy of monitoring deviancy in a rapidly pluralizing and emergent civil society. As 53 Michael Wines and Sharon Lafraniere, ”Chinese Protest Suspensions of Bloggers”, New York Times, 26 August 2011, http://www.nytimes.com/2011/08/27/world/asia/27weibo.html. 54 Christina Larson, “The New Epicenter of China’s Discontent: Dispatch from a city that wasn't supposed to be on the brink”, Foreign Policy, 23 August 2011. 55 Kathrin Hille, ”Microblogs challenge China’s ‘rumour buster,”, Financial Times, August 16, 2011, http://www.ft.com/cms/s/0/a02331a2-c64c-11e0-bb50-00144feabdc0.html#axzz1XlXcyQ2t. 56 Wines and Lafraniere, ”Chinese Protest Suspensions of Bloggers.” 51 evidenced in the State Council reports to the national legislature in 2010 and 2011, official figures now shows that the budget for domestic security is larger than the budget for national defense. 57 The leaks of blacklists of sensitive keywords compiled by commercial Internet businesses to accommodate Party-state pressure, and the giveand-take processes involving propaganda officials and actors in the state-controlled media system, point to a potential principal-agent dilemma in the social media sector. Reports in the immediate aftermath of the implementation of the real name system in March 2012, indicate that Sina’s design and operation of the system has been far from perfect, full of loopholes and plenty of possibilities to disregard or compromise using false identities. 58 Yet, this seeming breach of trust between the principal (party-state) and the agent (social media business), indicated also by CEO Zhao’s signals about new regulations’ impact on revenue to shareholders and policy-makers, is balanced by the more forthcoming behavior of Sina’s Vice President Chen Tong – responsible for all content uploaded and posted on the microblogging platform. During the fall of 2012 Chen intended to display Sina’s pro-government credentials by inviting and promoting government Weibo accounts. 59 Organizing conferences on government Weibo can thus be viewed as a two-pronged strategy to display loyalist credentials while it also creates a possibility to fraternize with officials and directly lobby for company positions on important policy issues. The party’s Central Propaganda Department (CPD) has oftentimes summoned major Internet companies to secret as well as semi-public conferences to admonish executives about their obligation to participate in the construction of a “healthy Internet”. Some of these meetings have produced joint agreements, in which firms undertake to do their part to attain this moral objective. The intention is to maintain hegemony over political discourse and cascading information flows. Therefore, the 57 ”China domestic security spending rises to $111 billion,” 5 March 2012, http://www.reuters.com/article/2012/03/05/us-china-parliament-security-idUSTRE82403J20120305 58 “Still the People’s Republic of Rumors”, Christina Larson, 22 March 2012, http://blog.foreignpolicy.com/posts/2012/03/22/still_the_people_s_republic_of_rumors 59 A conference on this theme was organized by Sina and Chen Tong in November 2011 in Beijing. 52 initiative of Chen Tong to organize a meeting on weibo can be seen as a clever negotiating strategy of “staging” forthcoming and responsible behavior. On the other hand, subtle complaints about the outsourcing of social control, may generate consolation prizes in the form of policy rewards. As one of the leaders of the quasigovernmental organization the Internet Society of China argued: If the ICT-capitalists want to stay in operation, they must obey the laws – and in return they also get service and support from the government. 60 Such “policy kickbacks” are in fact needed, since new media companies find themselves further away from the benefits that accrue to state-owned companies. One such benefit is that non-private firms benefit much from easier access to credit afforded from China’s state banks. Thus, with some degree of independence from CCP policy-makers and general oversight over industry sectors also comes vulnerability – of not being a part of the core cadre-capitalist alliance and profit cluster. 61 Based on initial and ongoing fieldwork, the party-state’s strategic calculus of carrots and sticks indicates that by implementing censorship and surveillance policy, companies may receive beneficial policies in return. As argued by a top executive of Sina: Meeting with government leaders means there is an opportunity for us too, to present our industry concerns – about working permits and household registration for our workers, as well as concerns about taxes. 62 The stick is the hovering presence of arbitrary sanctions of a state that only selectively adheres to constitutionalism and the rule of law – especially when it concerns issues 60 Interview in Beijing, 27 September 2011. There is little evidence of party-cells or party committees operating inside new media businesses. However, the China Media Bulletin of Freedom House reported in March 2011 that such cells indeed existed at Sina Corp. 62 Interview with Sina manager in Beijing, 21 September 2012. 61 53 of social and political stability. The ongoing waltz between state regulators and entrepreneurs in the social media sector is balancing act of give and take admidst pluralist, generational, and ideational changes in society at large. Yet, businesses in Chinese ICT businesses have to obey the municipal, provincial and central regulations and policies to monitor citizens, and only a few of them do so reluctantly, 63 and then more out of concern for not receiving compensation in return for their services to the state. Tolerating the Authoritarian Information Order Since the late 1990s the state has decentralized and delegated more responsibility from bureaucracy to new media companies across the whole spectrum of the information and communications technology (ICT) business sector: from hard-ware content producers to online service providers and internet cafés. This trend is continuing and business compliance is part of a large and fundamental overhaul of the Chinese media system and its modalities of control, which has been allotted bigger shares of a growing domestic security budget year- on-year. Yet, in this paper the business compliance with the party-state’s control policies has been problematized in the light of social media providers having to please both the party-state censors and their customers and users. It is argued that the party-state has temporarily solved this dilemma by maintaining the risk of sanctions for the industry, while at the same time rewarding compliant businesses with policy rewards. Equilibrium and continued compliance, however, is contingent on the state’s continued reward of policy “kickbacks.” Thus, the coexistence of social media, their providers and the authoritarian information order is uneasy. The party-state cannot – and does not – fully trust businesses in the social media sector to fully comply with or understand the importance of implementing policy that relates to the party-state norm on social harmony. The difficulties of establishing a waterproof real name registration system for microblogs since 16 March 2012 to prevent leakage of sensitive rumors, illustrates 63 Interview with Tencent manager in Beijing, 26 September 2011. 54 how a mutually beneficial alliance of cadre and capitalist interests, cannot be taken for granted. The not-so-diligent implementation of a real name registration system for microblogging on the part of Sina during the politically very turbulent Spring of 2012 – points to growing inconsistencies – which perhaps exist on both ends of the spectrum of relations between officials and ICT-entrepreneurs. This may well become a phenomenon of growing concern in the coming years, as by expansion of social media communication platforms such as microblogging for citizens they have also clearly laid the foundation for accountability politics. 55 References Lagerkvist, J. (2005). “The Rise of Online Public Opinion in China,” China: An International Journal. Lagerkvist, J. (2006). “In the crossfire of demands: Chinese News Portals between propaganda and the public,” in Chinese Cyberspaces: Technological Changes and Political Effects, Damm, J. and Thomas, S. (eds.), pp. 42-63. Lagerkvist, J. (2009). "Contesting Norms on China’s Internet? The Party-state, Youth, and Social Change" in Youth Engaging With the World. Media, Communication and Social Change, Ed. Tufte & Enghel. Göteborg: Nordicom. Lagerkvist, J. (2010). After the Internet Before Democracy. Competing Norms in Chinese Media and Society. Bern: Peter Lang AG. Chen, J, Li, Y, Otto, J-M. (2002). Implementation of Law in the People’s Republic of China, The Hague: Kluwer Law International. Diamant, N, Lubman, S, O’Brien, K.(2005). Engaging the Law in China, Stanford: Stanford University Press. Dickson, B. and Chen, J. (2010). Allies of the State: China.’s Private Entrepreneurs and Democratic Change. Cambridge: Harvard University Press. Niskanen, W. (1968). “The Peculiar Economics of Bureaucracy,” The American Economic Review, Vol. 58, No. 2, pp. 293-305. Saxenian, A. (2007). The New Argonauts: Regional Advantage in a Global Economy, Harvard: Harvard University Press. Weber, I. and Lu, J. (2004). “Handing over China.’s Internet to the Corporations,” International Institute, New Media Entrepreneurs in China for Asian Studies Newsletter 33, p.9; Weber, I. and Lu J. (2007). ”Internet and Self-regulation: The Cultural Logic of Controlled Commodification,.” Media Culture and Society 29, no. 5, p. 772.–89; Wright, T. (2010). Accepting Authoritarianism: State-Society Relations in China’s Reform Era, Stanford: Stanford University Press. 56 NR 10, 2012 UI Occasional Papers granskas av seniora och sakkunniga forskare på institutet. De åsikter som uttrycks i denna publikation är författarnas. Publicerat: 10 september 2012 ISBN: 978-91-86704-93-3 4