domenica 7 aprile 2019

Negotiating with the ‘enemy’. When is this the right choice? Under what circumstances might a government consider negotiating with another state or a group that it sees as an enemy or an adversary?


Introduction
It is usually argued, especially in terms of the
Functionalist theory of international relations, that when there is a conflict it is better for the two sides to sit down and negotiate in order to seek a reasonable compromise, instead of simply continuing the conflict with all the economic and human costs that this may involve. At the same time a good argument can be made for saying that there may be some states or groups (terrorists, for example) with which it is basically wrong or dangerous to negotiate. Thus the question of if and when to negotiate with a perceived ‘enemy’ has been and will remain for the foreseeable future a key question in diplomacy.
After 9/11 the Bush administration decided to wage a ‘war on terror’ against Al Qaeda and the Taliban. It also named North Korea, Iraq, Iran and Syria as’ rogue states’ arguing that these states supported terrorism and were not therefore reliable members of the international community. It was generally unwilling to negotiate with groups or states that it considered enemies. It claimed that it would use US power if necessary to ‘export democracy’ through regime change. This led to military intervention first in Afghanistan, then in Iraq. However, at the same time the US seems to have made a deal with Libya – no intervention in Libya in exchange for no further support for terrorism. And later it opened a partial though temporary dialogue with Syria, warning Syria of retribution if Syria tried to destabilize post-Saddam Iraq.
With the arrival of the Obama administration the US government said it was open to dialogue with old enemies if the conditions were right. Then, faced with the Arab spring, growing protests across the Arab world and the fall of the regimes in Tunisia and Egypt, the Obama administration decided to back this popular movement for change. This meant breaking with Gaddafi when he repressed public protests and supporting military intervention ‘to protect civilians’ and eventually regime change. The US and its allies also believed that the Assad regime in Syria should step down or be forced to step down after bloodily repressing public protest. While many Arab and Muslim countries agreed, the international community was divided on the question of continuing negotiations with the regime. The UNSC was also divided on the question of more forceful action, with Russia and China against US intervention against Assad. All members supported UN attempts to negotiate a truce as a precondition for negotiations between the government and the rebels, but Western and Arab countries imposed sanctions on the Syrian regime to try to discourage it from further acts of violence and in the hope of bringing it down. The Syrian regime agreed to dismantle its chemical arsenal under UN supervision. With the rise of Islamic State Russia (actively backed by China) began intervention in support of the Syrian regime and Russia even called for an alliance with the US and its NATO allies. However, the US refused to accept Assad as someone it was prepared to do a deal with and Russian intervention has targeted the rebels as well as IS. Peace talks between the Syrian government and the rebel leadership went on for several years. Earlier efforts were followed in October 2015 by further talks in Vienna involving officials from the U.S., the EU, Russia, China and various regional actors such as Saudi Arabia, Egypt, Turkey and, for the first time Iran. Peace talks with the rebel leadership continued in Astana, Kazakhstan in 2017 Russia-backed Syrian peace talks in Sochi in January 2018 and the 9th round of the Astana Process on Syrian peace have so far failed to produce a settlement. The Trump administration now intends to withdraw from Syria and accepts the reality of Assad's hold on power. This effectively means that for the US Assad is now an acceptable negotiating partner in the fight against radical Islamic military and terrorist groups.
Meanwhile, after months of negotiations in July 2015 Iran agreed to a deal on its nuclear program with the P5+1 (the permanent members of the United Nations Security Council–the United States, the United Kingdom, Russia, France, and China plus Germany) plus the European Union, in exchange for the lifting of sanctions. However, the Trump administration abandoned the deal on May 12th 2018 because of Iran's refusal to agree to new conditions.
In Afghanistan the Trump administration is trying to open negotiations with theTaliban.
In June 2018 there was a summit meeting between President Trump and North Korean Supreme Leader Kim Jong-un in Singapore. A further meeting took place in February 2019.
Given all the ongoing arguments and negotiations with (and sanctions imposed on, lifted or threatened against) North Korea, Syria, Iran, Russia and Myanmar, identifying if and when it is a good idea for an actor to negotiate with a state or organization it considers an enemy is still a vital question for both individual democratic states and the international community as a whole.
Here are some of the factors that may influence the decision whether to negotiate or not, and some examples to think about, although you will no doubt be able to find for yourself more and better examples from current affairs and from history:
1) Is there some kind of believable/ feasible /viable/reasonable compromise that could be reached?
Cuba – after the rapprochement in December 2014 it seemed so, but there was still a long way to gohttp://www.theguardian.com/world/2015/dec/18/us-cuba-relations-one-year-later-progress-report
and the Trump administration imposed new sanctions in November 2017, seeming once more intent on freezing relations between the 2 countries.
Al Qaeda and Islamic State –there seems no basis for a negotiationColombia and the FARC – a successful deal was negotiated in 2016 and FARC which took part in the 2018 legislative and presidential elections with a promise to fight poverty and corruption but lost in both to conservative opponents. In 2019 there remained one armed rebel group the ELN. In January 2019, polls show that 64% of Colombians wanted President Duque to resume negotiations with the ELN, but the new government called off talks in 2018, leaving the future of the peace process uncertain.

2) Can a temporary truce and release of prisoners be arranged to give a positive start to negotiations? Can negotiations begin with a moderate political interlocutor who can also act as a proxy for or channel to a more radical group that we are not yet ready to negotiate with directly? – Sinn Fein for the IRA in negotiating the 1998 Good Friday Agreement in Northern Ireland / Fatah for Hamas in negotiations for a settlement with Israel? This is a way to start things in the hope of broadening participation if progress is made
3) Does the adversary have some legitimate grievances even though we do not like their methods? – Hamas for the Palestinians / Russia in the Ukraine?
4) Do they have a leadership with whom to negotiate? Will their followers accept the settlement the leadership negotiates? This was part of Yasser Arafat’s problem at Oslo.
5) Do they have widespread local support? (Brigate Rosse – no/ Hamas –it seems so in Gaza.) And if they do, is not negotiating with them a dead end? – the Taliban in some areas, is it gaining support again
Is it possible and desirable to negotiate with 'moderate' Taliban? Or is this dangerous, a betrayal of princile or simply an illusion?The US began high level talks with the Taliban in February 2019.
https://asiafoundation.org/2018/02/14/afghan-women-pessimistic-peace-talks-taliban/
6) Does 'the enemy' have international support – Cuba in the past, and Assad today, North Korea (from China) today?
7) Time and timing – is this the right moment to negotiate? Is the population in the area tired of the struggle? Is the enemy now ready to negotiate? Attitudes in Northern Ireland, Ireland and Britain in the 1990s / in France during the Algerian crisis. Has the struggle changed? ETA is no longer faced with Franco but with democratic Spain, has given up armed struggle and is now voting on its future
Cuba is seen by many as no longer a Cold War threat, a centre from which Communism can spread to the Americas. Or is the situation the same? The Trump administration believes the Cuban government is still a brutal regime. Has there been too much blood? Is there still too much hatred and distrust? Israel and the Palestinians? In elections and surveys both the Palestinians and Israelis say they want peace but both sides seem intransigent and very unwilling to make any concessions.
8) Does the group have two wings, one radical and one more moderate? Can the moderates be persuaded to start negotiations and abandon and isolate the extremists – the Taliban?
9) Are there outside sponsors for negotiations? – the UN, US, EU and Russia and the moderate Arab states for negotiations between Israel and the Palestinians
10) Are these sponsors willing to offer money and other aid as an incentive to negotiate? The UN, Saudi Arabia and the Gulf states if the Palestinians and Israelis reached a full and lasting settlement.
11) Realpolitik – how desperate are we? Afghanistan? How much does each side need an agreement? Can one side win without one? Does the present situation cost too much in terms of lives or money, or damage us in other ways? Should the Iraqi government include Sunni leaders who were ex-Baath party members, Shiites who are ex-insurgents or anti-US or more some of the radical Kurdish separatists? Should the US and NATO accept a dialogue with Assad in Syria? Should the Afghan government do a deal with some of the Taliban? Will the EU and NATO be forced to accept Russia’s annexation of Crimea?
12) Realpolitik – can we buy them out? North Korea and US-South Korean aid to North Korea in the past in exchange for promises to halt its nuclear program
13) Realpolitik – Are there domestic reasons for negotiating or not negotiating? Negotiations with North Vietnam and the Viet Cong (National Liberation Front) in the late sixties and early seventies and changing US public opinion on the Vietnam war / Russia’s refusal to negotiate with Chechen rebel separatists because of the fear that separatist hopes would spread from Chechnya to other Caucasian republics (and the same for radical Islamist groups in the area) /Turkey’s fears regarding Kurdish aspirations in Syria and the effect of the creation of a Kudish state on the aspirations of Kurds in Turkey itself and the consequences for its territorial integrity
14) Realpolitik – Is it better to use another approach? An embargo, an invasion, political isolation, pressure from an intermediary – for the latter, the US has often called on China to put pressure on its ally, North Korea to negotiate.
15) How weak are our allies? How much do they need peace to survive? The government of Pakistan and negotiations with moderate Taliban?/ the government of Iraq and possible negotiations with Sunni ex-Saddam Hussein supporters and ex- al Qaeda supporters and other non-government groups?
16) How expensive for us is what they want (in economic or non-economic terms)? What would happen if Islamist radicals were successful in the Middle East and threatened to take control of the Gulf states and Saudi Arabia? / Iran and nuclear weapons? / are the stakes too high to back down and negotiate? September 1939.
17) How final will the treaty be? In exchange for recognition of a fully independent Palestinian state, Israel wants a lasting settlement that guarantees security and means no more attacks and no more claims at a later date. It doesn’t want a treaty with 60% of the Palestinians on most but not all of the issues.
18) Is the situation a kind of civil war? A fight to the death between irreconcilable enemies? The Algerian government and Islamist rebels in the past? / Syria today?
19) Are there any really effective negotiators who can help? In Northern Ireland, Senator Mitchell and Mo Mowlam
20) Costs - Is the competition too expensive? The Soviet Union and the US, SALT I and II and the oil crisis / the US and the Russian Federation and START and New START? What now seems like the beginning of a new arms race?
21) Impasse – the need for coexistence / Israel and the Palestinians?/ the US and Soviet Union (Nixon and Kissinger) / the US and China (Nixon and Kissinger)
22) New opportunities, especially commercial ones – the US and Soviet Union (Nixon and Kissinger) / the US and China (Nixon and Kissinger)
Conclusion
There may be space for negotiations with some groups or countries which are currently considered adversaries, but it requires a case by case approach, realism so as not to waste time where progress is not really likely or the counterpart is unreliable, but also real commitment once negotiations are opened (there were accusations of diplomatic inactivity in many areas during the Bush administration). Obama’s willingness to listen and offer dialogue was a first step and a necessary condition as regards both Cuba and Iran, but the sincerity of the interlocutor in the eyes of skeptics remains doubtful as is the commitment of the Trump administration. Progress needs to be monitored in terms of actions in line with the settlement reached or simply in line with the conditions set for opening negotiations. Finally, the possibility of meaningful negotiations depends only in part on the decision and determination of political leaders. It is often largely conditioned by public perception of the idea. This is true in an area of conflict but also in a democratic country. ETA renounced armed activity in 2011 but the Spanish government refused any dialogue with it at least partly in response to Spanish public opinion after years of terrorist attacks..
In the case of ETA such dialogue no longer necessary.
However, the same question about popular support for dialogue is perhaps the key to any real hope for serious negotiations between the Israelis and the Palestinians.

Good background:



What is the role of the role of the new media and communications technologies in international relations? – some old notes

You will need to supplement the notes that follow point 6 with ideas about:
  1. Current and potential IT threats and attacks from China and Russia on sensitive Western targets. e.g. security, government administration and business. https://www.politico.com/story/2018/12/19/chinese-hackers-eu-communications-network-1040166 https://www.cfr.org/blog/new-cyber-brief-new-old-threat-chinese-industrial-cyber-espionage
  2. Fake news and attempts by dictatorships and authoritarian regimes to interfere in Western politics and influence public opinion and at the same time to disseminate propaganda and improve their country's image. https://www.thenewfederalist.eu/european-elections-russia-and-fake-news-under-commission-s-scrutiny http://www.europarl.europa.eu/RegData/etudes/ATAG/2018/620230/EPRS_ATA(2018)620230_EN.pdf This may be linked to China's ongoing expansion into ownership of foreign newspapers and 'sponsoring' foreign journalists https://www.nytimes.com/2015/12/12/business/dealbook/alibaba-scmp-south-china-morning-post.html https://www.rfa.org/english/news/china/china-buying-positive-news-coverage-11272018114512.html https://www.abc.net.au/news/2019-02-08/chinas-foreign-media-push-a-major-threat-to-democracies/10733068
  3. The idea that today most of the public gets its news from internet and/or very biased traditional media (a private TV channel) and that the public is politically less informed and more easily manipulated than in the past. Is this true? https://www.washingtonpost.com/news/volokh-conspiracy/wp/2017/10/27/political-ignorance-and-the-future-of-political-misinformation-online/?noredirect=on&utm_term=.206ba8252887
  4. The use of the internet for recruitment and indoctrination not only by Islamist terrorists but now also by white supremacists intending to carry out terrorist attacks. https://www.osce.org/secretariat/107810
  5. The question of who should control the contents of websites, blogs and chats (what kind of liability and under what legal authority and how this would work in practice with regard to Google, Facebook, Twitter etc...). https://www.theguardian.com/commentisfree/2019/mar/09/eu-plan-facebook-google-online-copyright-law The question of who should 'own' or run the internet and censor it. https://en.wikipedia.org/wiki/Internet_governance#History Countries like China allow Google to operate domestically but only in exchange for government restrictions and censorship. https://www.theguardian.com/technology/ng-interactive/2019/jan/11/the-internet-but-not-as-we-know-it-life-online-in-china-russia-cuba-and-india https://dash.harvard.edu/bitstream/handle/1/33084425/The%20Shifting%20Landscape%20of%20Global%20Internet%20Censorship-%20Internet%20Monitor%202017.pdf Could such censorship expand through apparently neutral international bodies? https://www.bbc.com/news/technology-37527719
New media and communications technologies’ are broad terms which refer to a wide range of things and ideas – new communications technology infrastructure, such as Internet /what is found on it, search engines like Google, the World Wide Web (an information space) and websites of all kinds, the social media, such as Facebook, Youtube and Twitter, the kind of interactive web-sites that use new technologies to generate and pass on information and comment on a massive scale / cell phones, PCs and tablets and other devices for connecting to Internet and operating on it / even satellite TV and traditional media like the press as they go online and become more interactive (#). The new media, in turn, make possible the creation of open web communities within a country and across borders. Many experts argue that this has led, and will continue to lead, to a greater democratization of politics, i.e. the general IT computer-literate public will be able to share and receive information, discuss and debate issues, exchange and evolve opinions, and plan and coordinate political action via the Web independently of governments. Thus political dissidents, for example, may be able to communicate with each other and with the outside world. In such a scenario politics and our knowledge of world events will no longer be exclusively in the hands of a political élite (democratically elected or not) and a media élite (democratically controlled or not). Cell phones, for instance, usually make it possible to provide some visual and text material relating to real time events even when an authoritarian regime attempts to block the information flows on Internet. This was demonstrated during the anti-government demonstrations in Iran and Myanmar in 2009.
Only time will tell whether this vision of the changed nature of politics is real or simply idealistic wishful-thinking. After all, neither the government in Iran nor that in Myanmar actually fell at that time, and temporarily blocking Internet or a clamp-down on Internet freedom has not always proved impossible, as the situation in China and Russia has demonstrated. However, a real shift in power away from central governments may be taking place, given the role of the new media in the Arab Spring (not just Internet and social media alone but also in combination with satellite TV, like Al Jazeera in Arabic #), starting in Tunisia in December 2010 and spreading across the Arab world in 2011-13, and helping to bring down the regimes in Tunisia, Egypt (at least temporarily), and Libya and threatening those in Bahrain and Yemen and sparking the Syrian civil war. It seems clear that the new media can be used very successfully by broad-based movements calling for political change. One should bear in mind, however, that without widespread discontent and active physical commitment to opposition to a regime (a willingness by people to protest on the streets), it seems unlikely that these new technologies in themselves will lead to real democratic change where an authoritarian regime holds power, except perhaps in the very long term (as they gradually alter the political environment and expectations regarded as normal by a particular generation).
In an old interview Bill Gates pointed out that we are still in the early stages of the information revolution, so the future is difficult to predict (the equivalent of being present at the industrial revolution in 1790 and trying to predict its future course). What is already clear, however, is that governments, democratic and non-democratic, are being forced to respond to the challenge of the new media, whether they see it as a positive factor or a threat to their authority and independence. Governments, political parties, government offices and public agencies at all levels, lobby groups, NGOs and individual politicians (as well as companies and the private sector) have all gone online in order to respond and interact with ordinary citizens and customers. Meanwhile social-networking sites provide space for discussion of and response to all the information provided by these and other sources such as the traditional media (newspapers, radio stations, TV channels and their related web sites) and blogs.
For diplomats the new media offer rapid access to events as they unfold and sometimes more accurate and detailed information about those events than that immediately available from traditional channels and sources, as well as easy communications within the diplomatic corps and the diplomatic community. They also offer a platform from which to explain the country’s foreign policy and a forum in which diplomats can monitor public reaction to policies proposed or implemented, dialogue with citizens and groups and respond to criticism or misunderstandings. At the same time the growth of the new media often means growing pressure on diplomats to respond in real time to events as they occur, and diminishing space for secret or quiet diplomacy (e.g. the release by Al Jazeera of the Palestine Papers in 2011). It may also mean less secure channels of communication if whistle-blowers, for whatever reasons, decide to reveal internal communications. This was always a danger in traditional diplomacy. Compared with whistle-blowers in thr past, the difference today in the Manning and Snowden cases is the amount and sensitivity of the information that they had access to, and the ease with which this information can be disclosed and disseminated. The same is true for the Palestine Papers case.
Chelsea Elizabeth Manning (born Bradley Edward Manning) was a United States Army soldier who was convicted in July 2013 of violations of the Espionage Act and other offenses, after releasing to WikiLeaks the largest quantity of classified documents ever leaked to the public. Much of the material was published by WikiLeaks or its media partners between April and November 2010. The material included videos of the July 12, 2007 Baghdad airstrike, and the 2009 Granai airstrike in Afghanistan, 250,000 U.S. diplomatic cables and 500,000 army reports that came to be known as the Iraq War logs and Afghan War logs. The case of the Palestine Papers and Al Jazeera, is emblematic of the new difficulties that diplomats face in this new environment. A Palestinian diplomatic team, in good faith, had exploratory talks with the Israelis, discussing hypothetically which of their goals they would be prepared to give up or compromise on in order to obtain a comprehensive treaty with Israel. Documents relating to these meetings were leaked from the office of the main PLO negotiator, Sa’eb Ereka to Al Jazeera which posted and broadcast them in January 2011, causing enormous embarrassment to those involved and leading to resignations. Edward Snowden, a former contractor for the CIA, left the US in May 2013 after leaking to the media details of extensive Internet and phone surveillance by American intelligence. The NSA had been secretly collecting US telephone records. Mr Snowden was granted temporary asylum in Russia but faces espionage charges in the US concerning his actions.http://en.wikipedia.org/wiki/Palestine_Papers
http://en.wikipedia.org/wiki/Chelsea_Manning
http://en.wikipedia.org/wiki/Edward_Snowden
Another concern is the overall security of this interconnected system of communications. For example, could Internet be taken down by a massive cyber-attack or a physical assault of some kind? The web is run by over 504 ‘root name servers’ (Jan 2016) in over 76 countries. One of them in California runs 80 million company addresses.
https://en.wikipedia.org/wiki/Root_name_server
https://www.weforum.org/agenda/2016/08/who-owns-the-internet-and-who-should-control-it
They are usually housed in a secure location with various back-up power systems. Should any of these root servers fail or be taken down there is a back-up network where systems management information is copied, which would thus be able to take over in the event of an attack and keep the system going. So, according to Bill Gates, it is difficult to see how a cyber-attack or even a physical attack by a terrorist group on the site of a root server could really endanger the system. Again, however, he stresses that we are in the early days of computer technology and all predictions are doubtful.
Another worrying factor is the disruption to electronic systems that could be caused by some kind of atmospheric disaster, natural or man-made, which disables the global satellite system that relays much of our communications. Are we becoming too dependent on a fragile system? For example, rather alarmingly, some experts argue that the system as a whole may be at risk from extreme solar storms which pose a threat to all forms of high-technology. They begin with an explosion, a solar flare in the magnetic canopy of a sunspot.  X-rays and extreme UV radiation reach Earth at light speed, ionizing the upper layers of our atmosphere The side-effects include radio blackouts and GPS navigation errors. Minutes to hours later, the energy particles arrive.  Moving only slightly slower than light itself, electrons and protons accelerated by the blast can electrify satellites and damage their electronics. Then comes the coronal mass ejection, a CME, billion-ton clouds of magnetized plasma that take a day or more to cross the Sun-Earth divide.  Analysts believe that a direct hit by an extreme CME such as the one that missed Earth in July 2012 could cause widespread and long-term power blackouts, disabling everything that plugs into a wall socket. Electronic communications systems would be hit, and perhaps nuclear facilities too. 
http://science.nasa.gov/science-news/science-at-nasa/2014/23jul_superstorm/
Growing concern about privacy issues, disinformation and false news campaigns for the purposes of political manipulation have raised huge and complex questions about the governance of the Internet and social media.
In the context of the terrorist attacks in Europe in recent years in 2016 the Eu moved to counter the spread of extremism online:
and in 2017 began to move on fake news:
As regards cyber-attacks by states, individuals or groups on an individual state or particular institutions, one of the earliest examples occurred in Estonia in 2007 when coordinated cyber-attacks on web sites belonging to the government, banks and telecommunications companies were launched, apparently, from within Russia.
https://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
http://www.washingtonpost.com/wp-dyn/content/article/2007/05/18/AR2007051802122.html
 
http://en.wikipedia.org/wiki/Cyberwarfare
Such an attack can be highly effective and temporarily completely disrupt a society. It might be an end in itself, or the first step towards a military attack . Similarly effective are attacks designed to hack into supposedly secure systems for espionage purposes. Amid claims that there have been cyber-attacks from China on the US, the US and its NATO allies have become increasingly aware of the dangers and say they are working to improve defense systems against such attacks.
http://en.wikipedia.org/wiki/Cyberwarfare_in_China
Governments can also use the web, and not merely to provide citizens with information, but also for propaganda purposes in order to control and manipulate public opinion (domestic disinformation, a criticism often made of China, Russia and Iran). However, the permanent elimination of sites that a government disapproves of, whether those of terrorists or dissidents, is much more difficult. It involves constant vigil and control, and is at best only partially effective, since a site which is blocked can be reactivated with a new address or hidden within a link from another innocuous site, and firewalls and other barriers to block access to information can often be skirted (circumvented). On the other hand, China has had considerable success in putting pressure on foreign servers operating in English and Chinese in China to block certain key-word searches and access to some sites. Many experts argue, however, that the Chinese one-party government is less worried about the influence of information coming into China from abroad than about dissent and unsupervised discussion within China between Chinese citizens. A recent report claims that the government pays around 50,000 people to write and post pro-government articles on social network sites and to infiltrate, spy on and denounce dissident groups and individuals. So it is not clear how much security and anonymity on-line critics of the Chinese government within China really have.
The US has a sophisticated system (ECHELON) for monitoring
a large proportion of the world's civilian email, telephone, fax and data traffic, which it has used to combat terrorism, to the annoyance of many civil rights groups. This works in two ways. First, all the communications of a known suspect can be closely monitored. This is often very effective. Second, general communications can be monitored on the basis of the use of  key words or expressions. This is obviously much less effective. It requires significant man-power and extensive use of translation. As traffic on the internet expands so will the costs, so that this kind of monitoring will always involve a large amount of luck.http://www.youtube.com/watch?v=WGSYktqmlJY
http://www.globalresearch.ca/echelon-today-the-evolution-of-an-nsa-black-program
The PRISM (electronic surveillance program) is a further development within this context. Edward Snowden’s revelations about the alleged misuse of such systems to target ordinary citizens, both foreigners and Americans, at the very least raise serious concerns about government security agencies and privacy issues. The American Civil Liberties Union (ACLU) argued that the phone surveillance program violates both the US First Amendment rights of free speech and association, and the Fourth Amendment's protections against unreasonable searches and seizures. It filed a lawsuit in the U.S. District Court in New York (June 2013). The US government argued its use of the system is legitimate (the government has an obligation to ensure the safety of its citizens). In June 2015, Congress passed a law that ended collection of data in this way, instead allowing the NSA to search the phone companies’ records only if it gets court approval first. http://www.wsj.com/articles/u-s-appeals-court-backs-government-in-nsa-phone-surveillance-case-1446128749
https://www.nytimes.com/2017/05/02/us/politics/nsa-phone-records.html
While the Web provides a democratic space for communications between dissidents struggling for greater freedom in authoritarian states, and a space for like-minded people in a democratic country to exchange information, learn and form pressure groups to increase government transparency and accountability, ‘open web communities’ – it also, unfortunately provides a space for ‘closed web communities’ e.g. terrorists can recruit and indoctrinate in a space that tends to cut off and isolate the individual and can become more real than the outside world and the daily life of the subject. This can lead to a radical psychological reprogramming of the individual. Criminal organizations can also use the Internet to recruit, monitor and to threaten people.
The Bradley Manning and WikiLeaks case, the Palestine Papers case and the Edward Snowden case, have illustrated many of the key points relating to the evolving uses that can made of the new media. Large quantities of confidential information can, with the help of someone inside an organization with access to that information, be copied and transferred out of the system and posted for public consumption very rapidly. It is unclear how we should view such a phenomenon. Is this a further step towards government accountability, transparency and real democracy - something which will affect diplomacy and may have significant consequences (some of them legal) for politicians who lie and agencies that infringe existing privacy laws? Does this mean there is a need for new law to cover new types of surveillance? And how should jurisdiction for acts committed in cyberspace work? Whistleblowers themselves claim they are driven to an act of conscience by a desire to expose wrong-doing by their own government and seem ready to accept the risks and legal consequences. Governments usually argue that such behavior is a danger to the real concerns of national and international security, and one for which both the supplier and receiver of such information should be prosecuted. Can we believe Mr Julian Assange when he claims that WikiLeaks would never post information that might endanger somebody’s life (a soldier’s at the front, for example)? More important, can we be sure that other people will act with the same level of responsibility? Is this becoming a phenomenon that is beyond a government’s ability to control? If not, what new levels of security and restriction on information need to be introduced, and do these damage our right to freedom of expression and a free press (freedom of information)? If so, what are the implications for government activity in general and diplomatic activity in particular? Will there remain any space for secret negotiation, quiet diplomacy, where perhaps this might be necessary or beneficial, or for diplomats to express candid opinions to other diplomats on what they assume is a secure channel? The response of WikiLeaks sympathizers to the initial arrest of Mr Assange was to protest by blocking access to certain banks and credit institutions by bombarding their web sites with requests for access is also significant. Assange was granted political asylum by Ecuador and currently resides at the Ecuadorian embassy
in London. He was granted Ecuadorian citizenship in January 2018. http://en.wikipedia.org/wiki/Edward_Snowden
http://en.wikipedia.org/wiki/Chelsea_Manning
http://en.wikipedia.org/wiki/WikiLeaks
http://en.wikipedia.org/wiki/Julian_Assange
http://www.telegraph.co.uk/news/worldnews/wikileaks/11681502/Why-is-Julian-Assange-still-inside-the-embassy-of-Ecuador.html
http://www.independent.co.uk/news/uk/home-news/julian-assange-ecuador-citizenship-citizen-naturalised-london-embassy-wikileaks-asylum-uk-sweden-a8153986.html
Privacy is thus a growing issue of concern in many countries. Civil rights groups claim that the largely unmonitored collection, exchange and use of data on people (whether legally or illegally obtained) by government agencies and private companies is a clear infringement of privacy rights, e.g. the US Bill of Rights, Fourth Amendment, see:
http://en.wikipedia.org/wiki/United_States_Bill_of_Rights#Fourth_Amendment
The
News International phone-hacking scandal in Britain 2011 demonstrated how exposed individuals, both famous ones and ordinary citizens, are to targeted phone-hacking by unscrupulous journalists and newspapers. Individuals operating online are similarly exposed to increased risks of invasions of privacy and government surveillance. The role of the Government Communications Headquarters (GCHQ) in the UK in 2013 received considerable media attention when the former National Security Agency contractor Edward Snowden revealed that the agency was attempting to collect all online and telephone data in the UK via the Tempora program. Snowden's revelations began a spate of ongoing disclosures of global surveillance.
http://en.wikipedia.org/wiki/News_International_phone_hacking_scandal
http://en.wikipedia.org/wiki/Internet_privacy
http://en.wikipedia.org/wiki/Computer_and_network_surveillance
Finally, the ongoing investigation into Russia's alleged interference in the US presidential election of 2016, its apparently unsupervised use of Facebook and Twitter accounts to lauch fake news and conduct a campaign of disinformation and the Trump campaign's alleged collusion with it, have raised widespread concerns about the security of Western democratic systems in general. Any effective response will presumably require more oversight of online activities. This may, in turn, conflict with issues regarding both online privacy and free speech. For civil rights groups the Internet, once seen as a way for citizens to obtain better access to information, as a space for greater democracy and freedom of speech and a way to make the state more accountable, now risks becoming a means to invade citzens' privacy, limit their freedom of speech and manipulate public opinion. Moreover, for the Western state itself, for its political institutions and for its IT experts, at a practical level these issues raise the question of just how the supervision required to protect democracy and ensure security can be achieved technichcally.

Conclusion – The new media have significantly changed the space in which political discussion and action take place. This affects directly security, privacy, freedom of speech and the way the state (democratic or otherwise) functions. This is simply a reality and not something that can be undone. For example, diplomats will have to accept that secret diplomacy and quiet diplomacy, for better or worse, will now be much more difficult. They need to embrace the positive features the new environment offers in terms of being better able to communicate and dialogue with the public, within their own service and with the government and public in other countries. All this means that international relations will have to adapt to this new and rapidly evolving reality. At the same time, since the IT revolution is probably still in its early stages, it is difficult to predict the course it will take and the effect it will have on international affairs. It is, after all, an ongoing process.


# Despite the fact that social media played a significant role in sparking the Arab Spring, it was satellite broadcasting that was able to provide the Arab masses with minute-by-minute coverage of developments. This medium broadcast to Tunisia, Egypt, Bahrain, Libya, and Syria and followed stories about the leaders and other officials involved in regime changes. It was satellite television that gave voice to the opposition. AlJazeera, AlArabiya, BBC’s Arabic news channel, AlHurra, and France 24 were the main news networks that played a significant role in informing the Arab world about Arab Spring events. The paper cited in the link below not only describes the role these networks played in covering the Arab Spring, but also analyzes the important role the networks played in preparing the region for the aftermath by giving a voice to the voiceless, covering opposition groups, exposing corruption, reporting demonstrations, and discussing issues of freedom, democracy, and social justice in the Arab states.
The debate over the legitimacy of the 2003 invasion of Iraq, the claims made by the US and British governments that Iraq had WMDs and the use made of the media in this context is also very interesting.