Jump to ContentJump to Main Navigation
Access ContestedSecurity, Identity, and Resistance in Asian Cyberspace$
Users without a subscription are not able to see the full content.

Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain

Print publication date: 2011

Print ISBN-13: 9780262016780

Published to MIT Press Scholarship Online: August 2013

DOI: 10.7551/mitpress/9780262016780.001.0001

Show Summary Details
Page of

PRINTED FROM MIT PRESS SCHOLARSHIP ONLINE (www.mitpress.universitypressscholarship.com). (c) Copyright The MIT Press, 2021. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in MITSO for personal use.date: 20 September 2021

Control and Resistance

Control and Resistance

Attacks on Burmese Opposition Media

(p.153) 8 Control and Resistance
Access Contested

Nart Villeneuve

Masashi Crete-Nishihata

The MIT Press

This chapter explores Burma’s information control and resistance complexities based on the investigation conducted by the Information Warfare Monitor of the Mizzima News Web site attacks in 2008. The consistency of the attacks with the interest of the country’s government and military in information control and censorship of the Internet is explored. The factors behind the attack were found to be political motivation and availability of a target of opportunity. The chapter presents the Internet content control mechanisms used by Burma including Internet filtering, repressive legal frameworks, and recurring cyber attacks. A case study is presented focusing on the importance of holistic analysis in understanding cyberspace freedom of expression threats.

Keywords:   Information Warfare Monitor, Mizzima News, Internet censorship, Internet filtering, cyber attacks, freedom of expression

MIT Press Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs, and if you can't find the answer there, please contact us.