Techno-authoritarianism
   HOME

TheInfoList



OR:

Techno-authoritarianism, also known as IT-backed authoritarianism, digital authoritarianism or digital dictatorship, refers to the state use of information technology in order to control or manipulate both foreign and domestic populations. Tactics of digital authoritarianism may include
mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by Local government, local and federal governments or intell ...
including through biometrics such as
facial recognition Facial recognition or face recognition may refer to: *Face detection, often a step done before facial recognition *Face perception, the process by which the human brain understands and interprets the face *Pareidolia, which involves, in part, seein ...
, internet firewalls and censorship, internet blackouts, disinformation campaigns, and digital social credit systems. Although some institutions assert that this term should only be used to refer to authoritarian governments, others argue that the tools of digital authoritarianism are being adopted and implemented by governments with "authoritarian tendencies", including democracies. Most notably, China and Russia have been accused by the
Brookings Institution The Brookings Institution, often stylized as Brookings, is an American think tank that conducts research and education in the social sciences, primarily in economics (and tax policy), metropolitan policy, governance, foreign policy, global econo ...
of leveraging the Internet and information technology to repress opposition domestically while undermining democracies abroad.


Definition

IT-backed authoritarianism refers to an
authoritarian Authoritarianism is a political system characterized by the rejection of political plurality, the use of strong central power to preserve the political ''status quo'', and reductions in democracy, separation of powers, civil liberties, and ...
regime using cutting-edge
information technology Information technology (IT) is a set of related fields within information and communications technology (ICT), that encompass computer systems, software, programming languages, data processing, data and information processing, and storage. Inf ...
in order to penetrate, control and shape the behavior of actors within society and the economy. According to reports and articles on China's practice, the basis of the digital authoritarianism is an advanced, all-encompassing and in large parts real-time
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as ...
system, which merges government-run systems and data bases (e.g. traffic monitoring, financial credit rating, education system, health sector etc.) with company surveillance systems (e.g. of shopping preferences, activities on social media platforms etc.). IT-backed authoritarianism institutionalizes the data transfer between companies and governmental agencies providing the government with full and regular access to data collected by companies. The authoritarian government remains the only entity with unlimited access to the collected data. IT-backed authoritarianism thus increases the authority of the regime vis-à-vis national and multinational companies as well as vis-à-vis other decentral or subnational political forces and interest groups. The collected data is utilized by the authoritarian regime to analyze and influence the behavior of a country’s citizens, companies and other institutions.Mirjam Meissner (2016)
''China’s surveillance ambitions''
''
The Wall Street Journal ''The Wall Street Journal'' (''WSJ''), also referred to simply as the ''Journal,'' is an American newspaper based in New York City. The newspaper provides extensive coverage of news, especially business and finance. It operates on a subscriptio ...
'', 2 August 2016.
It does so with the help of algorithms based on the principles and norms of the authoritarian regime, automatically calculating credit scores for every individual and institution. In contrast to financial credit ratings, these “social credit scores” are based on the full range of collected surveillance data, including financial as well as non-financial information.Caren Morrison (2016)
''How China Plans to Blacklist Financially Unstable Citizens''
''
Fortune Fortune may refer to: General * Fortuna or Fortune, the Roman goddess of luck * Luck * Wealth * Fate * Fortune, a prediction made in fortune-telling * Fortune, in a fortune cookie Arts and entertainment Film and television * ''The Fortune'' (19 ...
'', 30 November 2015.
IT-backed authoritarianism only allows full participation in a country’s economy and society for those who have a good credit scoring and thus respect the rules and norms of the respective authoritarian regime. Behavior deviating from these norms incurs automatic punishment through a bad credit scoring, which leads to economic or social disadvantages (loan conditions, lower job opportunities, no participation in public procurement etc.). Severe violation or non-compliance can lead to the exclusion from any economic activities on the respective market or (for individuals) to an exclusion from public services.


Examples


China

China has been viewed as the cutting edge and the enabler of digital authoritarianism. With its
Great Firewall The Great Firewall (GFW; ) is the combination of legislative actions and technologies enforced by the China, People's Republic of China to regulate the Internet domestically. Its role in internet censorship in China is to block access to selected ...
of a state-controlled Internet, it has deployed high-tech repression against Uyghurs in Xinjiang and exported surveillance and monitoring systems to 18 countries as of 2019. According to
Freedom House Freedom House is a nonprofit organization based in Washington, D.C. It is best known for political advocacy surrounding issues of democracy, Freedom (political), political freedom, and human rights. Freedom House was founded in October 1941, wi ...
, the China model of digital authoritarianism through Internet control against those who are critical of the CCP features legislations of censorship, surveillance using
artificial intelligence Artificial intelligence (AI) is the capability of computer, computational systems to perform tasks typically associated with human intelligence, such as learning, reasoning, problem-solving, perception, and decision-making. It is a field of re ...
(AI) and
facial recognition Facial recognition or face recognition may refer to: *Face detection, often a step done before facial recognition *Face perception, the process by which the human brain understands and interprets the face *Pareidolia, which involves, in part, seein ...
, manipulation or removal of online content,
cyberattacks A cyberattack (or cyber attack) occurs when there is an unauthorized action against computer infrastructure that compromises the confidentiality, integrity, or availability of its content. The rising dependence on increasingly complex and inte ...
and
spear phishing Phishing is a form of Social engineering (security), social engineering and a scam where attackers deceive people into revealing Information sensitivity, sensitive information or installing malware such as Computer virus, viruses, Computer worm, ...
, suspension and revocation of social media accounts, detention and arrests, and
forced disappearance An enforced disappearance (or forced disappearance) is the secret abduction or imprisonment of a person with the support or acquiescence of a State (polity), state followed by a refusal to acknowledge the person's fate or whereabouts with the i ...
and torture, among other means. A report by
Carnegie Endowment for International Peace The Carnegie Endowment for International Peace (CEIP) is a nonpartisan international affairs think tank headquartered in Washington, D.C., with operations in Europe, South Asia, East Asia, and the Middle East, as well as the United States. Foun ...
also highlights similar digital repression techniques. In 2013,
The Diplomat A diplomat is someone who represents a government in its relations with other governments. It may also refer to: Diplomat, the Diplomat or the Diplomats may refer to: Media * ''The Diplomat'' (magazine), a Washington, D.C. online foreign affa ...
reported that the Chinese hackers behind the
malware Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
attacks on Falun Gong supporters in China, the Philippines, and Vietnam were the same ones responsible for attacks against foreign military powers, targeting email accounts and stealing Microsoft Outlook login information and email contents. The 2022 analysis by
The New York Times ''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of ...
of over 100,000 Chinese government bidding documents revealed a range of surveillance and data collection practices, from personal biometrics to behavioral data, which are fed into AI systems. China utilizes these data capabilities not only to enhance governmental and infrastructural efficiency but also to monitor and suppress dissent among its population, particularly in Xinjiang, where the government targets the Uyghur community under the guise of counterterrorism and public security. China is also regarded as an exporter of these technologies and practices to other states, while simultaneously serving as a model for other regimes seeking to adopt similar technologies, or governance.


Russia

The Russian model of digital authoritarianism relies on strict laws of digital expression and the technology to enforce them. Since 2012, as part of a broader crackdown on civil society, the
Russian Parliament The Federal Assembly is the bicameral national legislature of Russia. The upper house is the Federation Council (Russia), Federation Council, and the lower house is the State Duma. The assembly was established by the Constitution of the Russian F ...
has adopted numerous laws curtailing speech and expression. Hallmarks of Russian digital authoritarianism include: # The surveillance of all Internet traffic through the System for Operative Investigative Activities (SORM) and the Semantic Archive; # Restrictive laws on the freedom of speech and expression, including the
blacklisting Blacklisting is the action of a group or authority compiling a blacklist of people, countries or other entities to be avoided or distrusted as being deemed unacceptable to those making the list; if people are on a blacklist, then they are considere ...
of hundreds of thousands of websites, and punishment including fines and jail time for activities including slander, " insulting religious feelings," and "acts of extremism". # Infrastructure regulations including requirements for
Internet service provider An Internet service provider (ISP) is an organization that provides a myriad of services related to accessing, using, managing, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, no ...
s (ISPs) to install
deep packet inspection Deep packet inspection (DPI) is a type of data processing that inspects in detail the data (Network packet, packets) being sent over a computer network, and may take actions such as alerting, blocking, re-routing, or logging it accordingly. Deep ...
equipment under the 2019 Sovereign Internet Law.


Myanmar

Since the coup d'état in February 2021, the
military junta A military junta () is a system of government led by a committee of military leaders. The term ''Junta (governing body), junta'' means "meeting" or "committee" and originated in the Junta (Peninsular War), national and local junta organized by t ...
blocked all but 1,200 websites and imposed Internet shutdowns, with pro-military dominating the content on the remaining accessible websites. In May 2021,
Reuters Reuters ( ) is a news agency owned by Thomson Reuters. It employs around 2,500 journalists and 600 photojournalists in about 200 locations worldwide writing in 16 languages. Reuters is one of the largest news agencies in the world. The agency ...
reported that telecom and
Internet service providers An Internet service provider (ISP) is an organization that provides a myriad of services related to accessing, using, managing, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non ...
had been secretly ordered to install
spyware Spyware (a portmanteau for spying software) is any malware that aims to gather information about a person or organization and send it to another entity in a way that harms the user by violating their privacy, endangering their device's securit ...
allowing the military to "listen in on calls, view text messages and web traffic including emails, and track the locations of users without the assistance of the telecom and internet firms." In February 2022, Norwegian service provider
Telenor Telenor ASA ( or ) is a Norwegian majority state-owned multinational telecommunications company headquartered at Fornebu in Bærum, close to Oslo. It is one of the world's largest mobile telecommunications companies with operations worldwi ...
was forced to sell its operation to a local company aligned with the military junta. The military junta also sought to criminalize
virtual private networks Virtual private network (VPN) is a network architecture for virtually extending a private network (i.e. any computer network which is not the public Internet) across one or multiple other networks which are either untrusted (as they are not c ...
(VPNs), imposed mandatory registration of devices, and increased surveillance on both social media platforms and via telecom companies. In July 2022, the military executed activist
Kyaw Min Yu Kyaw Min Yu (; also known as Ko Jimmy; 13 February 1969 – 23 July 2022) was a Burmese writer, political prisoner, and a member of the 88 Generation Students Group. He was executed in July 2022 after being sentenced to death for activism again ...
, after arresting him in November 2021 for prodemocracy social media posts criticizing the coup.


Africa

A study by the African Digital Rights Network (ADRN) revealed that governments in ten African countries—
South Africa South Africa, officially the Republic of South Africa (RSA), is the Southern Africa, southernmost country in Africa. Its Provinces of South Africa, nine provinces are bounded to the south by of coastline that stretches along the Atlantic O ...
,
Cameroon Cameroon, officially the Republic of Cameroon, is a country in Central Africa. It shares boundaries with Nigeria to the west and north, Chad to the northeast, the Central African Republic to the east, and Equatorial Guinea, Gabon, and the R ...
,
Zimbabwe file:Zimbabwe, relief map.jpg, upright=1.22, Zimbabwe, relief map Zimbabwe, officially the Republic of Zimbabwe, is a landlocked country in Southeast Africa, between the Zambezi and Limpopo Rivers, bordered by South Africa to the south, Bots ...
,
Uganda Uganda, officially the Republic of Uganda, is a landlocked country in East Africa. It is bordered to the east by Kenya, to the north by South Sudan, to the west by the Democratic Republic of the Congo, to the south-west by Rwanda, and to the ...
,
Nigeria Nigeria, officially the Federal Republic of Nigeria, is a country in West Africa. It is situated between the Sahel to the north and the Gulf of Guinea in the Atlantic Ocean to the south. It covers an area of . With Demographics of Nigeria, ...
,
Zambia Zambia, officially the Republic of Zambia, is a landlocked country at the crossroads of Central Africa, Central, Southern Africa, Southern and East Africa. It is typically referred to being in South-Central Africa or Southern Africa. It is bor ...
,
Sudan Sudan, officially the Republic of the Sudan, is a country in Northeast Africa. It borders the Central African Republic to the southwest, Chad to the west, Libya to the northwest, Egypt to the north, the Red Sea to the east, Eritrea and Ethiopi ...
,
Kenya Kenya, officially the Republic of Kenya, is a country located in East Africa. With an estimated population of more than 52.4 million as of mid-2024, Kenya is the 27th-most-populous country in the world and the 7th most populous in Africa. ...
,
Ethiopia Ethiopia, officially the Federal Democratic Republic of Ethiopia, is a landlocked country located in the Horn of Africa region of East Africa. It shares borders with Eritrea to the north, Djibouti to the northeast, Somalia to the east, Ken ...
, and
Egypt Egypt ( , ), officially the Arab Republic of Egypt, is a country spanning the Northeast Africa, northeast corner of Africa and Western Asia, southwest corner of Asia via the Sinai Peninsula. It is bordered by the Mediterranean Sea to northe ...
—have employed various forms of digital authoritarianism. The most common tactics include
digital surveillance Digital usually refers to something using discrete digits, often binary digits. Businesses *Digital bank, a form of financial institution *Digital Equipment Corporation (DEC) or Digital, a computer company *Digital Research (DR or DRI), a software ...
,
disinformation Disinformation is misleading content deliberately spread to deceive people, or to secure economic or political gain and which may cause public harm. Disinformation is an orchestrated adversarial activity in which actors employ strategic dece ...
, Internet shutdowns, censorship legislation, and arrests for anti-government speech. The researchers highlighted the growing trend of complete Internet or mobile system shutdowns. Additionally, all ten countries utilized Internet surveillance, mobile intercept technologies, or artificial intelligence to monitor targeted individuals using specific keywords.


References

{{Authoritarian types of rule Authoritarianism Mass surveillance Government by algorithm