-
(单词翻译:双击或拖选)
Online communication tools played a huge role in recent government changes in Tunisia and Egypt. But they also showed how easily governments can interrupt Internet traffic and cell phone transmissions. VOA's David Byrd has this look at the future of online communications in the Middle East, and how more of the control is moving from the government to the people.
The turmoil1 in the Middle East - including the recent "revolutions" in Tunisia and Egypt - have highlighted the role of technology - including the Internet and mobile devices. Social media - including Facebook and Twitter - also played large roles in both Egypt and Tunisia.
Government's online action
But both revolutions also showed how governments can still cut off communications.
Courtesy of Julian York
Jillian York
Jillian York is with the Berkman Center for Internet and Society at Harvard University in Cambridge, Massachusetts. She says that the Tunisian government used old-school "Phishing" attacks to get Facebook user's passwords and hijack2 their accounts.
"A user would try to log in to Facebook.com and would be redirected to a page that looked just like the login page, " she said. "When they logged in, their password was captured and their account was thus taken away from them."
Facebook eventually responded by implementing3 secure servers or "https" accounts for its users. The social networking site also put up a roadblock that asked users to identify people in their photos in order to log in. The solution took less than a week, but many accounts had been compromised.
In Egypt, the government action was deeper and more widespread. The government-owned Telecom Egypt controls nearly all the fiber4 optic cables on which Internet service providers were required to lease space.
Egypt's internal networks also relied on information services located outside the country, including e-mail servers at Google, Yahoo, and Microsoft. By cutting off contact with the outside world, the government crippled internal communications as well.
Activists5 in Egypt found ways around the shutdown by using self-purchased satellite dishes to watch television coverage6 of events. After five days Internet and cell service was restored. But similar government-sponsored service interruptions controls have occurred in Iran, Syria, Iraqi Kurdistan and elsewhere in the Middle East.
Courtesy of Michael Rubin
Michael Rubin
Michael Rubin is a resident scholar at the American Enterprise Institute in Washington. He told VOA that governments' grip on communication will be loosened as technology gets smaller and more sophisticated.
"We are going to see a miniaturization of Internet Service Providers and satellite receivers and satellite phones and the means for independent communication," Rubin said. "At the same time, we are going to see the governments trying to come up with jamming technologies which will prevent ordinary people from having an independent communications platform."
MIT
Luke Hutchison
Luke Hutchison is a PhD candidate at MIT in Cambridge, Massachusetts, specializing in computer science and computational biology. He says one way that people can get around government control is smaller networks, including peer-to-peer sharing.
"So you could have a string of laptops where each laptop was only in range of one laptop down the valley and one laptop down the valley, but it would bounce an Internet signal from laptop to laptop all the way up the valley," he said.
"So at the very top of this valley you could get a signal that had been transmitted along say 20 laptops. So these sorts of networks show a lot of promise for future communications," he added.
Michael Rubin also says people could set up their own Internet networks using satellite up-links to dial into servers outside their country.
"For example, when Syrians wanted to use Internet illegally, often times what they would do is simply dial into Lebanese Internet Service Providers," he said.
"The question is for example whether the Libyans will someday be able to access directly Italy's servers or France's servers - whether technology is going to be constrained7 by borders or whether borders are going to become irrelevant8 when it comes to networks," Rubin added.
'Kill switch'
But Luke Hutchison says governments can still maintain a so-called "kill switch" particularly if the government owns or licenses9 the communications networks or fiber optic cables.
In some cases, governments control the infrastructure10 to which social media are connected - as it did in Egypt and still does in countries like China, Iran and Syria - and Internet access can be hindered. Authoritarian11 regimes can also use the same tools - Internet pages, SMS, and mobile devices - to rally their supporters. There are still also places where the so-called information superhighway is limited to a virtual one-lane road.
The Chinese government used a so-called "choke point" in 2009 to shut down Internet and cellular12 service during unrest in the Xinjiang region of western China. But Hutchison said that people who are determined13 to exercise their civil rights will still find ways to communicate.
"Once you have tasted freedom, particularly information freedom, it is very difficult for someone to take that away from you," Hutchison said.
"China is an interesting case. More and more you see Chinese citizens not just sitting back and accepting the injustices14 they see around them but actually saying something and doing something about it. And more and more the government is stepping back and not allowing that control to take place," Hutchison said.
Ways around
Jillian York of the Berkman Center says that even if governments try to block Internet communication, there are ways around the interference.
"Even with Facebook or Twitter being blocked, there are numerous ways to get around that," she said.
"There are circumvention15 tools, when https is enabled it is very difficult and unlikely that a government is going to block all https communications. And there are also projects like the Tor project that provides both anonymity16 and circumvention," York added.
Mobile devices are getting smaller and more powerful. With the advent17 of smart phones like the iPhone and Android devices in the Middle East, people are carrying more power in their back pocket than rooms full of machines could generate a generation ago. New media have given the world a window into what is happening on the ground in countries like Tunisia, Egypt and Libya. But whether governments in the region will embrace new media or resist them remains18 an open question.
1 turmoil | |
n.骚乱,混乱,动乱 | |
参考例句: |
|
|
2 hijack | |
v.劫持,劫机,拦路抢劫 | |
参考例句: |
|
|
3 implementing | |
v.实现( implement的现在分词 );执行;贯彻;使生效 | |
参考例句: |
|
|
4 fiber | |
n.纤维,纤维质 | |
参考例句: |
|
|
5 activists | |
n.(政治活动的)积极分子,活动家( activist的名词复数 ) | |
参考例句: |
|
|
6 coverage | |
n.报导,保险范围,保险额,范围,覆盖 | |
参考例句: |
|
|
7 constrained | |
adj.束缚的,节制的 | |
参考例句: |
|
|
8 irrelevant | |
adj.不恰当的,无关系的,不相干的 | |
参考例句: |
|
|
9 licenses | |
n.执照( license的名词复数 )v.批准,许可,颁发执照( license的第三人称单数 ) | |
参考例句: |
|
|
10 infrastructure | |
n.下部构造,下部组织,基础结构,基础设施 | |
参考例句: |
|
|
11 authoritarian | |
n./adj.专制(的),专制主义者,独裁主义者 | |
参考例句: |
|
|
12 cellular | |
adj.移动的;细胞的,由细胞组成的 | |
参考例句: |
|
|
13 determined | |
adj.坚定的;有决心的 | |
参考例句: |
|
|
14 injustices | |
不公平( injustice的名词复数 ); 非正义; 待…不公正; 冤枉 | |
参考例句: |
|
|
15 circumvention | |
n.陷害,欺骗 | |
参考例句: |
|
|
16 anonymity | |
n.the condition of being anonymous | |
参考例句: |
|
|
17 advent | |
n.(重要事件等的)到来,来临 | |
参考例句: |
|
|
18 remains | |
n.剩余物,残留物;遗体,遗迹 | |
参考例句: |
|
|