Skip to main content

Advertisement

Log in

Geographies of global Internet censorship

  • Published:
GeoJournal Aims and scope Submit manuscript

Abstract

More than one-quarter of the planet’s population uses the Internet today, although access to it is highly uneven throughout the world. While it is widely celebrated for its emancipatory potential, many governments view the Internet with alarm and have attempted to limit access or to control its contents. This project seeks to provide a comprehensive, theoretically informed analysis of the geographies of Internet censorship. It begins by clarifying the reasons, types, extent of, and opposition to, government limitations of Internet access and contents. Invoking an index of censorship by Reporters Without Borders, it maps the severity of censorship worldwide and assesses the numbers of people affected, and using the Freedom House index, it correlates political liberty with penetration rates. Second, it explores Internet censorship at several levels of severity to explicate the multiple means through which censorship is implemented and resisted. The third part offers a moral critique of Internet censorship via a Habermasian interpretation of cyberspace as the closest real-world approximation of an ideal speech situation. The summary notes the paradox of growing e-government and continued fears of an expanded domain of public discourse.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Notes

  1. The regression equation is \( P = . 1 8 - \begin{array}{l} { 6. 8F} \\ {( 3. 9)} \\ \end{array} + \begin{array}{l} { 1. 1 {\text{GDP}}} \\ {( 4. 1)} \\ \end{array} \, \), where P = internet penetration rate in 2009, F = Freedom House index in 2009, and GDP = GDP per capita in 2009. Numbers in parentheses below the equation are t-values of coefficients. R 2 = .79 (N = 180), significant at .95 confidence level.

References

  • Abbott, J. (2001). Democracy@internet.asia? The challenges to the emancipatory potential of the net: Lessons from China and Malaysia. Third World Quarterly, 22(1), 99–114.

    Article  Google Scholar 

  • Adams, P. (1996). Protest and the scale politics of telecommunications. Political Geography, 15(5), 19–441.

    Article  Google Scholar 

  • Africa ICT Policy Monitor. (2006). http://africa.rights.apc.org.

  • Ahmed, A. (2002). Pakistan’s blasphemy laws: Words fail me. The Washington Post, May 19.

  • Anderson, J. (1997). Globalizing politics and religion in the Muslim world. Journal of Electronic Publishing, www.press.umich.edu/jep/archive/Anderson.html.

  • Anderson, J. (2003). New media, new publics: Reconfiguring the public sphere of Islam. Social Research, 70(3), 887–906.

    Google Scholar 

  • Anderson, K. (2009). Net surveillance and filters are a reality for Europe, too. The Guardian, June 24. http://www.guardian.co.uk/technology/2009/jun/24/kevin-anderson-internet-filtering.

  • Arabic Network for Human Rights Information. (2004). The Internet in the Arab world: A new space of repression? http://www.hrinfo.net/en/reports/net2004/.

  • Bahgat, H. (2004). Egypt’s virtual protection of morality. Middle East Report, 230, 22–25.

    Article  Google Scholar 

  • Barry, E. (2004). In Azerbaijan, a donkey suit leads to laughs, questions and possibly arrests. New York Times, July 15, 2009, p. A4.

  • BBC News Online. (2002). Bahrain blocks opposition websites. March 26. http://news.bbc.co.uk/1/low/world/middle_east/1895005.stm.

  • Bernstein, J. (1995). Recovering ethical life: Jürgen Habermas and the future of critical theory. New York, NY: Routledge.

    Google Scholar 

  • Bi, J. (2001). The internet revolution in China: The significance for traditional forms of communist control. International Journal, 56(3), 421–441.

    Article  Google Scholar 

  • Brunn, S. (2000). Towards an understanding of the geopolitics of cyberspace: Learning, re-learning and un-learning. Geopolitics, 5(3), 144–149.

    Google Scholar 

  • Burnett, P. (2005). Internet censorship on the rise in Africa? http://www.worldhunger.org/articles/06/africa/burnett.htm.

  • Cairncross, F. (1997). The death of distance. Boston, MA: Harvard Business School Press.

    Google Scholar 

  • Calhoun, C. (1992). Habermas and the public sphere. Cambridge, MA: MIT Press.

    Google Scholar 

  • Castells, M. (2001). The internet galaxy. Oxford: Oxford University Press.

    Google Scholar 

  • Conway, M. (2007). Terrorism and internet governance: Core issues. http://www.unidir.ch/pdf/articles/pdf-art2644.pdf.

  • Cortés, M. (2000). Internet censorship around the world. http://www.isoc.org/inet2000/cdproceedings/8k/8k_4.htm.

  • Crampton, J. (2003). The political mapping of cyberspace. Edinburgh: Edinburgh University Press.

    Google Scholar 

  • Crampton, J. (2007). The biopolitical justification for geosurveillance. Geographical Review, 97(3), 389–493.

    Google Scholar 

  • Crovitz, G. (2010). China’s web crackdown continues. Wall Street Journal, January 11. http://online.wsj.com/article/SB10001424052748703948504574649021577882240.html.

  • Cunningham, K. (2002). Factors influencing Jordan’s information revolution: Implications for democracy. Middle East Journal, 56(2), 240–256.

    Google Scholar 

  • Dann, D., & Haddow, N. (2008). Just doing business or doing just business? Google, Microsoft, Yahoo! and the business of censoring China’s Internet. Journal of Business Ethics, 79(3), 219–234.

    Article  Google Scholar 

  • Deibert, R., Palfrey, J., Rohozinski, R., & Zittrain, J. (Eds.). (2008). Access denied: The practice and policy of global internet filtering. Cambridge, MA: MIT Press.

    Google Scholar 

  • Diker, D. (2003). Should Israel now send a new message to the Arab world? Jerusalem Letter, May 1. http://www.jcpa.org/jl/vp497.htm.

  • Dobson, J., & Fisher, P. (2007). The panopticon’s changing geography. Geographical Review, 97(3), 307–323.

    Google Scholar 

  • Dodge, M., & Kitchin, R. (2000). Mapping cyberspace. London: Routledge.

    Google Scholar 

  • Dunn, M. (2000). The information revolution and the Middle East: An overview of the early literature. Middle East Journal, 54(3), 465–476.

    Google Scholar 

  • Elmer-Dewitt, P., Jackson, D., & King, M. (1993). First nation in cyberspace. Time, December 6, pp. 62–64.

  • Eriksson, J., & Giacomello, G. (2009). Who controls what, and under what conditions? International Studies Review, 11(1), 206–210.

    Article  Google Scholar 

  • Eurasianet.org. (2007). In Turkemenistan. Internet access comes with soldiers. http://www.eurasianet.org/departments/insight/articles/eav030807.shtml.

  • Fandy, M. (1999). Cyberresistance: Saudi opposition between globalization and localization. Comparative Studies in Society and History, 41, 124–147.

    Article  Google Scholar 

  • Froomkin, A. (2003). Habermas@Discourse.net. Toward a critical theory of cyberspace. Harvard Law Review, 116(3), 740–873.

    Article  Google Scholar 

  • Gauch, S. (2001). Effects of Arab censorship blunted by the Internet. Christian Science Monitor, January 29, p. 1.

    Google Scholar 

  • Gellman, B. (2005). The FBI’s secret scrutiny: In Hunt for terrorists, bureau examines records of ordinary Americans. Washington Post, November 6, p. A1.

  • Ghareeb, E. (2000). New media and the information revolution in the Arab world: An assessment. Middle East Journal, 54(3), 395–418.

    Google Scholar 

  • Ghattas, K. (2002). Surfing the net in Iraq. BBC News, May 1. http://news.bbc.co.uk/1/hi/world/middle_east/1959481.stm.

  • Goldsmith, J. (1998). Against cyberanarchy. University of Chicago Law Review, 1199(fall), 1217–1222.

  • Goldsmith, J., & Wu, T. (2006). Who controls the internet? Illusion of a borderless world. New York, NY: Oxford University Press.

    Google Scholar 

  • Habermas, J. (1979). Communication and the evolution of society. Boston, MA: Beacon Press.

    Google Scholar 

  • Habermas, J. (1989). The structural transformation of the public sphere: An inquiry into a category of bourgeois society. Oxford: Blackwell.

    Google Scholar 

  • Hachigian, N. (2001). China’s cyber-strategy. Foreign Affairs, 80(2), 118–133.

    Article  Google Scholar 

  • Hachigian, N. (2002). The internet and power in one-party East Asian states. Washington Quarterly, 25(3), 41–58.

    Article  Google Scholar 

  • Hajiyev, Y. (2006). Azerbaijan. http://ec.europa.eu/information_society/activities/internationalrel/docs/pi_study_rus_ukr_arm_azerb_bel_geor_kaz_mold/5_azerbaijan.pdf.

  • Harwit, E., & Clark, D. (2001). Shaping the internet in China: Evolution of political control over network infrastructure and political content. Asian Survey, 41(3), 377–408.

    Article  Google Scholar 

  • Hohendahl, P. (1979). Critical theory, public sphere and culture: Habermas and his critics. New German Critique, 16(winter), 89–118.

    Article  Google Scholar 

  • Human Rights Watch. (2002). Human Rights Watch: World report 2001, Vietnam. http://www.hrw.org/wr2k/asia/Vietnam.html.

  • Inglehart, R., & Welzel, C. (2005). Modernization, cultural change, and democracy: The human development sequence. Cambridge: Cambridge University Press.

    Google Scholar 

  • International Censorship Explorer. (2006). Vietnam strikes back. http://ice.citizenlab.org/?p=150.

  • James, R. (2009). A brief history of Chinese internet censorship. Time, March 18. http://www.time.com/time/world/article/0,8599,1885961,00.html.

  • Kahn, J. (2002). China has world’s tightest internet censorship, study finds. New York Times, December 4, p. 1.

  • Kalathil, S., & Boas, T. (2001). The Internet and state control in authoritarian regimes: China, Cuba, and the counterrevolution. Carnegie Endowment global policy program work, paper no. 21. Washington, DC: Carnegie Endowment for International Peace.

  • Kalathil, S., & Boas, T. (2003). Open networks, closed regimes: The impact of the internet on authoritarian rule. Washington, DC: Carnegie Endowment for International Peace.

    Google Scholar 

  • Katyal, N. (2001). Criminal law in cyberspace. University of Pennsylvania Law Review, 1003, 1100.

    Google Scholar 

  • Kellerman, A. (2002). The internet on Earth: A geography of information. Hoboken, NJ: Wiley.

    Google Scholar 

  • Kellner, D. (1979). TV, ideology, and emancipatory popular culture. Socialist Review, 45(May–June), 13–53.

    Google Scholar 

  • Kellner, D. (1990). Television and the crisis of democracy. Boulder, CO: Westview Press.

    Google Scholar 

  • Kreimer, S. (2001). Technologies of protest: Insurgent social movements and the First Amendment in the era of the Internet. University of Pennsylvania Law Review, 150(1), 119–171.

    Article  Google Scholar 

  • Kreimer, S. (2006). Censorship by proxy: The First Amendment, internet intermediaries, and the problem of the weakest link. University of Pennsylvania Law Review, 155(11), 11–101.

    Article  Google Scholar 

  • LaFraniere, S. (2009). Censors put tighter grip on internet in China. New York Times, December 18, p. A. 14.

  • Lake, E. (2009). Hacking the regime. The New Republic, September 3. http://www.tnr.com/article/politics/hacking-the-regime.

  • Lee, J. (2001). Companies compete to provide Saudi internet veil. New York Times, November 19, p. A1.

  • Luhmann, N. (1996). Quod omnes tangit: Remarks on Jurgen Habermas’s legal theory. Cardoso Law Review, 17(4–5), 883–900.

    Google Scholar 

  • MacFarquhar, M. (2006). In tiny Arab state, Internet is tool to fight rulers. New York Times, January 15, p. A1, 11.

  • MacKinnon, R. (2008). Flatter world and thicker walls? Blogs, censorship and civic discourse in China. Public Choice, 134, 31–46.

    Article  Google Scholar 

  • MacKinnon, R. (2009). China’s censorship 2.0: How companies censor bloggers. First Monday, 14(2). http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2378/2089.

  • Malecki, E., & Moriset, B. (2008). The digital economy: Business organisation, production processes, and regional developments. London: Routledge.

    Google Scholar 

  • McLaughlin, W. (2005). The use of the Internet for political action by non-state dissident actors in the Middle East. FirstMonday. http://www.firstmonday.org/issues/issue8_11/mclaughlin.

  • Murdoch, S., & Anderson, R. (2008). Tools and technology of internet filtering. In R. Deibert, J. Palfrey, R. Rohozinksi, & J. Zittrain (Eds.), Access denied: The practice and policy of global internet filtering (pp. 57–72). Cambridge, MA: MIT Press.

    Google Scholar 

  • O’Brien, R. (1992). Global financial integration: The end of geography. New York, NY: Council on Foreign Relations Press.

    Google Scholar 

  • OpenNet Initiative (2004). Internet filtering in Saudi Arabia in 2004. http://opennet.net/studies/saudi. Accessed 18 Nov 2010.

  • OpenNet Initiative (2005). Internet filtering in China 2004–2005. http://opennetinitiative.net/studies/china.

  • OpenNet Initiative (2006). Singapore. http://opennet.net/research/profiles/Singapore.

  • OpenNet Initiative (2007). Commonwealth of Independent States. http://opennet.net/research/regions/cis.

  • OpenNet Initiative (2009a). Internet filtering in Iran. http://opennet.net/sites/opennet.net/files/ONI_Iran_2009.pdf.

  • OpenNet Initiative (2009b). Internet filtering in Sudan. http://opennet.net/sites/opennet.net/files/ONI_Sudan_2009.pdf.

  • Paltemaa, V., & Vuori, J. (2009). Regime transition and the Chinese politics of technology: From mass science to the controlled internet. Asian Journal of Political Science, 17(1), 1–23.

    Article  Google Scholar 

  • Parry, N. (1997). The past and future of information technology in Palestine. www.nigelparry.com/mideastinternet/unitednationspaper.html.

  • Pierre, A. (2000). Vietnam’s contradictions. Foreign Affairs, 79(6), 69–86.

    Article  Google Scholar 

  • Poster, M. (1997). Cyberdemocracy: Internet and the public sphere. In D. Porter (Ed.), Internet culture (pp. 202–214). London: Routledge.

    Google Scholar 

  • Privacy International. (2003). Silenced—Costa Rica. http://www.privacyinternational.org/article.shtml?cmd[347]=x-347-103752.

  • Quirk, M. (2006). The web police. Atlantic Monthly, May. http://www.theatlantic.com/magazine/archive/2006/05/the-web-police/4818.

  • Reporters Without Borders. (2004). Pakistan annual report 2004. http://www.rsf.org/article.php3?id_article=10794.

  • Reporters Without Borders. (2008). Belarus. http://www.rsf.org/article.php3?id_article=25496. 2008.

  • Reporters Without Borders. (2009). Internet enemies. http://www.rsf.org/en-ennemi26106-Turkmenistan.html.

  • Rhoads, C., & Chao, L. (2009). Iran’s web spying aided by Western technology. The Wall Street Journal, June 22. http://online.wsj.com/article/SB124562668777335653.html.

  • Rodan, G. (2000). Singapore information lockdown: Business as usual. In L. Williams & R. Rich (Eds.), Losing control: Freedom of the press in Asia (pp. 66–81). Canberra: Asia Pacific Press.

    Google Scholar 

  • Sayare, S. (2009). As web challenges French leaders, they push back. New York Times, December 13, p. 26.

    Google Scholar 

  • Slane, A. (2007). Democracy, social space, and the internet. University of Toronto Law Journal, 57(1), 81–104.

    Article  Google Scholar 

  • Steinberg, P., & McDowell, S. (2003). Mutiny on the bandwidth: the semiotics of statehood in the internet domain name registries of Pitcairn Island and Niue. New Media & Society, 5(1), 47–67.

    Article  Google Scholar 

  • Stelter, B., & Stone, B. (2009). Web pries lid of Iranian censorship. New York Times, June 22, p. A1. http://www.nytimes.com/2009/06/23/world/middleeast/23censor.html.

  • Stone, B., & Barboza, D. (2010). Scaling the digital wall in China. New York Times, January 16, p. B1.

  • Taylor, P. (1994). The state as container: Territoriality in the modern world-system. Progress in Human Geography, 18(2), 151–162.

    Article  Google Scholar 

  • Teitelbaum, J. (2002). Dueling for ‘Da’Wa’: State vs. society on the Saudi internet. Middle East Journal, 56(2), 222–239.

    Google Scholar 

  • Tilly, C. (2007). Democracy. Cambridge, MA: Cambridge University Press.

    Google Scholar 

  • Troianovski, A., & Finn, P. (2007). Kremlin seeks to extend its reach in cyberspace. The Washington Post, October 28, p. 1. http://www.washingtonpost.com/wp-dyn/content/article/2007/10/27/AR2007102701384_pf.html.

  • Villeneuve, N. (2006). The filtering matrix: Integrated mechanisms of information control and the demarcation of borders in cyberspace. First Monday, 11(1–2). http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1307.

  • Wagner, C., Cheung, K., Lee, F., & Ip, R. (2003). Enhancing e-government in developing countries: Managing knowledge through virtual communities. Electronic Journal on Information Systems in Developing Countries, 14(4), 1–20. http://www.ejisdc.org.

    Google Scholar 

  • Warf, B. (2009a). Diverse spatialities of the Latin American and Caribbean internet. Journal of Latin American Geography, 8(2), 125–146.

    Article  Google Scholar 

  • Warf, B. (2009b). The rapidly evolving geographies of the Eurasian internet. Eurasian Geography and Economics, 50(5), 564–580.

    Article  Google Scholar 

  • Warf, B., & Grimes, J. (1997). Counterhegemonic discourses and the internet. Geographical Review, 87(2), 259–274.

    Article  Google Scholar 

  • Warf, B., & Vincent, P. (2007). Multiple geographies of the Arab internet. Area, 39(1), 83–96.

    Article  Google Scholar 

  • Wines, M. (2010). China’s censors tackle and trip over the Internet. New York Times, April 8, p. 1, 4.

  • Wriston, W. (1997). Bits, bytes, and diplomacy. Foreign Affairs, 76(5), 172–182.

    Article  Google Scholar 

  • Yang, G. (2003). The co-evolution of the internet and civil society in China. Asian Survey, 43(3), 405–422.

    Article  Google Scholar 

  • Zittrain, J., & Palfrey, J. (2008). Internet filtering: The politics and mechanisms of control. In R. Deibert, J. Palfrey, R. Rohozinksi, & J. Zittrain (Eds.), Access denied: The practice and policy of global internet filtering (pp. 29–56). Cambridge, MA: MIT Press.

    Google Scholar 

  • Zook, M. (2003). Underground globalization: Mapping the space of flows of the Internet adult industry. Environment and Planning A, 35(7), 1261–1286.

    Article  Google Scholar 

  • Zook, M. (2005a). The geography of the Internet industry. Oxford: Wiley-Blackwell.

    Book  Google Scholar 

  • Zook, M. (2005b). The geography of the internet. Annual Review of Information Science and Technology, 40(1), 53–78.

    Article  Google Scholar 

  • Zook, M., & Graham, M. (2007). The creative reconstruction of the Internet: Google and the privatization of cyberspace and DigiPlace. Geoforum, 38(6), 1322–1343.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Barney Warf.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Warf, B. Geographies of global Internet censorship. GeoJournal 76, 1–23 (2011). https://doi.org/10.1007/s10708-010-9393-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10708-010-9393-3

Keywords

Navigation