Thinking global, living local: Voices in a globalized world

Defending the Global Village

Written by on . Published in Defending the global village

Wikileaks protest MadridWe live in a global village. Give a man a laptop and an internet connection – or even a cell phone and a decent signal – and he can become a global villager, fully engaged with a world that has turned to technology to facilitate everything from business and politics to celebrity gossip. The global village is a place where we can come together regardless of time and distance. It’s a place that offers safety, equality and open discussion. In short, it’s a place that simply does not exist.

Information and communications technology (ICT) has become a key weapon for actors on both sides of the war for the world’s freedoms. It’s used by governments and private citizens, criminals and terrorists, and it’s blurring the lines between these groups.

Whether it’s the role played by Twitter and YouTube in the various uprisings of the Arab Spring, or the widely reported use of BlackBerry Messenger by rioters last summer in the UK, simple technologies have made very different groups with very different aims very effective. Such simple consumer technologies will decide the shape of our futures, forcing the development of new governance at national and international levels in an attempt to rationalize the relationship between connectivity and security. The question is, to what extent should those laws respect the freedom of lawful users while restricting criminality?

Criminal intent

The Mumbai attacks of 2008 showed a chilling application of ICT by those seeking to cause maximum disruption. A hundred and sixty-six people died in the meticulously planned operation, which saw the terrorists using VOIP technology to communicate because they knew the Indian intelligence agencies wouldn’t be able to listen in on their plans. Payments for VOIP credit from Italy and Pakistan and handsets bought in Spain and the USA made it even harder for the authorities to trace the group.

If basic consumer ICT can enable such vicious attacks, the world clearly needs a staunch form of defense. But that’s easier said than done – the time frame needed to trace IPs and the continuous change of IP handling around the world makes interception virtually impossible in real time. Clearly, nobody would suggest that VOIP technology should be withdrawn from public consumption as a result of this terrible misuse, but it’s equally evident that the international community must do everything in its power to prevent VOIP from being used in such a way again.

A similar problem is seen in Latin America, where cyber crime is thought to cost banks an incredible $93m a year. A recent study by Pyramid Research estimates that 18 million people in Latin America bank via their mobile devices, presenting a large and potentially lucrative target for criminals. By writing complex algorithms, hackers are able to fool the software designed to detect malware, and gain access to a victim’s account. The code is commonly embedded in image files, and when the image is opened, a Trojan is installed that captures data from online financial transactions. Brazil and Mexico are the countries worst affected by this criminal use of ICT, but the entire Latin American region currently lacks a proper cyber security infrastructure.

With so many people using mobile banking, this failure is akin to Latin American countries not having a police force to stop robbers from holding up banks. The modern bank robbers don’t need guns and getaway cars, and victims often don’t even realize they’ve been robbed until days later, but in essence the crime is the same. It’s therefore essential that banks and governments in the region work to improve their security measures, bringing them up to standards that will not only deter criminals, but also bring them to justice. The problem for law enforcers is that as hard as they work to improve standards, the criminals will apply themselves just as assiduously to stay one step ahead.

What price freedom?

It’s this flexibility and adaptability that makes ICT such a powerful tool for both sides of the divide. It’s tempting to call for greater restriction of the technology – after all, if terrorists can benefit from the openness of VOIP technology, why not restrict that openness? If criminals can take advantage of mobile banking services to steal millions of dollars, why not close those services down?

The answer is that while the losses enabled by ICT are deeply regrettable, they pale in comparison to the benefits brought by the technology. And of course, it’s not always as simple as the criminals on one side and the forces of good on the other. Wikileaks, envisioned by its founder as an ‘open-source, democratic intelligence agency,’ has been using the power of not-quite-anonymous distributed technology to become a hub for the collection and distribution of sensitive government and business information. Its 2010 leak of more than 250,000 classified cables gave the world inside information on the United States’ secret work in areas like nuclear disarmament, the war on terror, global intelligence and counterintelligence efforts, and diplomatic negotiations.

The leak led to a broader distribution of the truth, which should not be the sole preserve of a privileged few. If knowledge makes us aware, enabling us to raise our voices against injustice, so secrecy helps to manipulate public opinion and leads to the public voice being excluded from decisions that profoundly affect citizens. But the US government argued that the release of so much classified information directly contributed to the risk to US soldiers, and caused a deterioration in international relations.

National and international policy will be slow to catch up to organizations like Wikileaks. Any policy that is implemented will have to negotiate major hurdles and engage with the debate of whether ‘puncturing the power group’ justifies the terrible risk of putting a country or a person under threat. At root, it is a question of ethics and morality. Does our desire to have open information make our global village more vulnerable or more safe?

The answer is that it probably does add to our vulnerability. But that vulnerability is a price worth paying for the sort of world we want to live in. We began by acknowledging that the global village is a fiction precisely because of its cozy image of safety and security. The world is not always as safe as we would like it to be, and the abuse of information technology has to be controlled as far as is possible. But that control must not come at the expense of our freedom.

Image © Osvaldo Gago

Tags: , ,

Maria Farooq

I am a self-motivated and hard-working researcher and academician. I am English language teacher and also M. Phil scholar. I am interested in world politics, international affairs and cultures and world history.

Most recent Local Views on ‘Defending the global village’

  • Social Media: how much have our lives changed?

    Written by on May 9, 2016.

    My best definition of social media is people on the left, people on the right, and technology in the middle. It is the democratization of information and content, the convenience and equal opportunity to share and connect with others, and the fulfillment of “the world is a global village” prophecy. […]

  • The Global Need for Women-Friendly Internet Laws – IGF

    Written by on December 14, 2013.

    As part of the Freedom House’s delegation of civil society leaders and online activists from around the world, I was thrilled to be in Bali for the 8th Internet Governance Forum (IGF) held from October 22 to 25. The United Nations-funded annual forum is held in different global locations every […]

  • Azerbaijan: An Unlikely Host for Internet Governance Forum

    Written by on November 19, 2012.

      I attended the 7th annual Internet Governance Forum sponsored by the United Nations in Azerbaijan: a country notorious for its non-compliance with international standards for protecting human rights. The IGF brought together some 1,600 representatives of governments, human rights activists, international bodies, NGOs and private companies to convene a […]

  • The Internet – A Tool of Power and Control

    Written by on June 22, 2012.

    The world has discovered much over the course of time and people have evolved much more sophisticated social organs. However, the tendency for people never to fully trust each other has also increased over the course of history. Look at history and we are sure to notice a pattern of conspiracies and biased […]

  • The Social Pipeline: Identity within the Global Village

    Written by on May 31, 2012.

    All  articles you read, videos you watch, posts you tweet and things you like can now automatically be reposted to all your online profiles, creating a social pipeline. In China, activists use this method of mass propagation to fight against the amnesia that strikes their posts when deleted by censorship. But at the […]

  • The Silence of the Digital Sheep

    Written by on May 11, 2012.

    Pakistan is a country that has lagged behind the developed world in information and technology for as long as we Pakistanis can remember. Yes, we’ve even lagged behind the United States, which has some of the slowest internet connections in the entire ‘Western World’ and still sports Dial-Up internet – […]

  • Affording Apathy

    Written by on April 27, 2012.

    The first inklings of sound come from utter, complete silence, the first true appreciation of light only after complete, all-encompassing darkness. Therefore, following from that, only from violent, discordant and overwhelming chaos should order arise from.

  • When Our Technology Is Used Against Us

    Written by on April 9, 2012.

    Is the world better off with cell phones? What about the Internet? These might seem like obvious questions. Sure, the rise of cell phones can be annoying when other people’s conversations disturb our peace and quiet, and the rise of the internet makes it harder for us to shelter our […]