Search This Blog

Wednesday, May 20, 2020

Internet censorship

From Wikipedia, the free encyclopedia
 
Internet censorship is the control or suppression of what can be accessed, published, or viewed on the Internet enacted by regulators, or on their own initiative. Individuals and organizations may engage in self-censorship for moral, religious, or business reasons, to conform to societal norms, due to intimidation, or out of fear of legal or other consequences.

The extent of Internet censorship varies on a country-to-country basis. While most democratic countries have moderate Internet censorship, other countries go as far as to limit the access of information such as news and suppress discussion among citizens. Internet censorship also occurs in response to or in anticipation of events such as elections, protests, and riots. An example is the increased censorship due to the events of the Arab Spring. Other types of censorship include the use of copyrights, defamation, harassment, and obscene material claims as a way to suppress content.

Support for and opposition to Internet censorship also varies. In a 2012 Internet Society survey 71% of respondents agreed that "censorship should exist in some form on the Internet". In the same survey 83% agreed that "access to the Internet should be considered a basic human right" and 86% agreed that "freedom of expression should be guaranteed on the Internet". Perception of internet censorship in the US is largely based on the First Amendment and the right for expansive free speech and access to content without regard to the consequences. According to GlobalWebIndex, over 400 million people use virtual private networks to circumvent censorship or for increased user privacy.

Overview

Many of the challenges associated with Internet censorship are similar to those for offline censorship of more traditional media such as newspapers, magazines, books, music, radio, television, and film. One difference is that national borders are more permeable online: residents of a country that bans certain information can find it on websites hosted outside the country. Thus censors must work to prevent access to information even though they lack physical or legal control over the websites themselves. This in turn requires the use of technical censorship methods that are unique to the Internet, such as site blocking and content filtering.

Views about the feasibility and effectiveness of Internet censorship have evolved in parallel with the development of the Internet and censorship technologies:
  • A 1993 Time Magazine article quotes computer scientist John Gilmore, one of the founders of the Electronic Frontier Foundation, as saying "The Net interprets censorship as damage and routes around it."
  • In November 2007, "Father of the Internet" Vint Cerf stated that he sees government control of the Internet failing because the Web is almost entirely privately owned.
  • A report of research conducted in 2007 and published in 2009 by the Berkman Center for Internet & Society at Harvard University stated that: "We are confident that the [ censorship circumvention ] tool developers will for the most part keep ahead of the governments' blocking efforts", but also that "...we believe that less than two percent of all filtered Internet users use circumvention tools".
  • In contrast, a 2011 report by researchers at the Oxford Internet Institute published by UNESCO concludes "... the control of information on the Internet and Web is certainly feasible, and technological advances do not therefore guarantee greater freedom of speech."
Blocking and filtering can be based on relatively static blacklists or be determined more dynamically based on a real-time examination of the information being exchanged. Blacklists may be produced manually or automatically and are often not available to non-customers of the blocking software. Blocking or filtering can be done at a centralized national level, at a decentralized sub-national level, or at an institutional level, for example in libraries, universities or Internet cafes. Blocking and filtering may also vary within a country across different ISPs. Countries may filter sensitive content on an ongoing basis and/or introduce temporary filtering during key time periods such as elections. In some cases the censoring authorities may surreptitiously block content to mislead the public into believing that censorship has not been applied. This is achieved by returning a fake "Not Found" error message when an attempt is made to access a blocked website.

Unless the censor has total control over all Internet-connected computers, such as in North Korea (who employ an intranet that only privileged citizens can access), or Cuba, total censorship of information is very difficult or impossible to achieve due to the underlying distributed technology of the Internet. Pseudonymity and data havens (such as Freenet) protect free speech using technologies that guarantee material cannot be removed and prevents the identification of authors. Technologically savvy users can often find ways to access blocked content. Nevertheless, blocking remains an effective means of limiting access to sensitive information for most users when censors, such as those in China, are able to devote significant resources to building and maintaining a comprehensive censorship system.

The term "splinternet" is sometimes used to describe the effects of national firewalls. The verb "rivercrab" colloquially refers to censorship of the Internet, particularly in Asia.

Content suppression methods

Technical censorship

Various parties are using different technical methods of preventing public access to undesirable resources, with varying levels of effectiveness, costs and side effects.

Blacklists

Entities mandating and implementing the censorship usually identify them by one of the following items: keywords, domain names and IP addresses. Lists are populated from different sources, ranging from private suppliers through courts to specialized government agencies (Ministry of Industry and Information Technology of China, Islamic Guidance in Iran).

As per Hoffmann, different methods are used to block certain websites or pages including DNS poisoning, blocking access to IPs, analyzing and filtering URLs, inspecting filter packets and resetting connections.

Points of control

Enforcement of the censor-nominated technologies can be applied at various levels of countries and Internet infrastructure:
  • Internet backbone, including Internet exchange points (IXP) with international networks (Autonomous Systems), operators of submarine communications cables, satellite Internet access points, international optical fibre links etc. In addition to facing huge performance challenges due to large bandwidths involved, these do not give censors access to information exchanged within the country.
  • Internet Service Providers, which involves installation of voluntary (as in UK) or mandatory (as in Russia) Internet surveillance and blocking equipment.
  • Individual institutions, which in most cases implement some form of Internet access controls to enforce their own policies, but, especially in case of public or educational institutions, may be requested or coerced to do this on the request from the government.
  • Personal devices, whose manufacturers or vendors may be required by law to install censorship software.
  • Application service providers (e.g. social media companies), who may be legally required to remove particular content. Foreign providers with business presence in given country may be also coerced into restricting access to specific contents for visitors from the requesting country.
  • Certificate authorities may be required to issue counterfeit X.509 certificates controlled by the government, allowing man-in-the-middle surveillance of TLS encrypted connections.
  • Content Delivery Network providers who tend to aggregate large amounts of content (e.g. images) may be also attractive target for censorship authorities.

Approaches

Internet content is subject to technical censorship methods, including:
  • Internet Protocol (IP) address blocking: Access to a certain IP address is denied. If the target Web site is hosted in a shared hosting server, all websites on the same server will be blocked. This affects IP-based protocols such as HTTP, FTP and POP. A typical circumvention method is to find proxies that have access to the target websites, but proxies may be jammed or blocked, and some Web sites, such as Wikipedia (when editing), also block proxies. Some large websites such as Google have allocated additional IP addresses to circumvent the block, but later the block was extended to cover the new addresses. Due to challenges with geolocation, geo-blocking is normally implemented via IP address blocking.
  • Domain name system (DNS) filtering and redirection: Blocked domain names are not resolved, or an incorrect IP address is returned via DNS hijacking or other means. This affects all IP-based protocols such as HTTP, FTP and POP. A typical circumvention method is to find an alternative DNS resolver that resolves domain names correctly, but domain name servers are subject to blockage as well, especially IP address blocking. Another workaround is to bypass DNS if the IP address is obtainable from other sources and is not itself blocked. Examples are modifying the Hosts file or typing the IP address instead of the domain name as part of a URL given to a Web browser.
  • Uniform Resource Locator (URL) filtering: URL strings are scanned for target keywords regardless of the domain name specified in the URL. This affects the HTTP protocol. Typical circumvention methods are to use escaped characters in the URL, or to use encrypted protocols such as VPN and TLS/SSL.
  • Packet filtering: Terminate TCP packet transmissions when a certain number of controversial keywords are detected. This affects all TCP-based protocols such as HTTP, FTP and POP, but Search engine results pages are more likely to be censored. Typical circumvention methods are to use encrypted connections – such as VPN and TLS/SSL – to escape the HTML content, or by reducing the TCP/IP stack's MTU/MSS to reduce the amount of text contained in a given packet.
  • Connection reset: If a previous TCP connection is blocked by the filter, future connection attempts from both sides can also be blocked for some variable amount of time. Depending on the location of the block, other users or websites may also be blocked, if the communication is routed through the blocking location. A circumvention method is to ignore the reset packet sent by the firewall.
  • Network disconnection: A technically simpler method of Internet censorship is to completely cut off all routers, either by software or by hardware (turning off machines, pulling out cables). A circumvention method could be to use a satellite ISP to access Internet.
  • Portal censorship and search result removal: Major portals, including search engines, may exclude web sites that they would ordinarily include. This renders a site invisible to people who do not know where to find it. When a major portal does this, it has a similar effect as censorship. Sometimes this exclusion is done to satisfy a legal or other requirement, other times it is purely at the discretion of the portal. For example, Google.de and Google.fr remove Neo-Nazi and other listings in compliance with German and French law.
  • Computer network attacks: Denial-of-service attacks and attacks that deface opposition websites can produce the same result as other blocking techniques, preventing or limiting access to certain websites or other online services, although only for a limited period of time. This technique might be used during the lead up to an election or some other sensitive period. It is more frequently used by non-state actors seeking to disrupt services.

Over and under blocking

Technical censorship techniques are subject to both over- and under-blocking since it is often impossible to always block exactly the targeted content without blocking other permissible material or allowing some access to targeted material and so providing more or less protection than desired. An example is blocking an IP-address of a server that hosts multiple websites, which prevents access to all of the websites rather than just those that contain content deemed offensive.

Use of commercial filtering software

Screenshot of Websense blocking Facebook in an organisation where it has been configured to block a category named "Personals and Dating"

Writing in 2009 Ronald Deibert, professor of political science at the University of Toronto and co-founder and one of the principal investigators of the OpenNet Initiative, and, writing in 2011, Evgeny Morzov, a visiting scholar at Stanford University and an Op-Ed contributor to the New York Times, explain that companies in the United States, Finland, France, Germany, Britain, Canada, and South Africa are in part responsible for the increasing sophistication of online content filtering worldwide. While the off-the-shelf filtering software sold by Internet security companies are primarily marketed to businesses and individuals seeking to protect themselves and their employees and families, they are also used by governments to block what they consider sensitive content.

Among the most popular filtering software programs is SmartFilter by Secure Computing in California, which was bought by McAfee in 2008. SmartFilter has been used by Tunisia, Saudi Arabia, Sudan, the UAE, Kuwait, Bahrain, Iran, and Oman, as well as the United States and the UK. Myanmar and Yemen have used filtering software from Websense. The Canadian-made commercial filter Netsweeper is used in Qatar, the UAE, and Yemen. The Canadian organization CitizenLab has reported that Sandvine and Procera products are used in Turkey and Egypt.

On 12 March 2013 in a Special report on Internet Surveillance, Reporters Without Borders named five "Corporate Enemies of the Internet": Amesys (France), Blue Coat Systems (U.S.), Gamma (UK and Germany), Hacking Team (Italy), and Trovicor (Germany). The companies sell products that are liable to be used by governments to violate human rights and freedom of information. RWB said that the list is not exhaustive and will be expanded in the coming months.

In a U.S. lawsuit filed in May 2011, Cisco Systems is accused of helping the Chinese Government build a firewall, known widely as the Golden Shield, to censor the Internet and keep tabs on dissidents. Cisco said it had made nothing special for China. Cisco is also accused of aiding the Chinese government in monitoring and apprehending members of the banned Falun Gong group.

Many filtering programs allow blocking to be configured based on dozens of categories and sub-categories such as these from Websense: "abortion" (pro-life, pro-choice), "adult material" (adult content, lingerie and swimsuit, nudity, sex, sex education), "advocacy groups" (sites that promote change or reform in public policy, public opinion, social practice, economic activities, and relationships), "drugs" (abused drugs, marijuana, prescribed medications, supplements and unregulated compounds), "religion" (non-traditional religions occult and folklore, traditional religions), .... The blocking categories used by the filtering programs may contain errors leading to the unintended blocking of websites. The blocking of Dailymotion in early 2007 by Tunisian authorities was, according to the OpenNet Initiative, due to Secure Computing wrongly categorizing Dailymotion as pornography for its SmartFilter filtering software. It was initially thought that Tunisia had blocked Dailymotion due to satirical videos about human rights violations in Tunisia, but after Secure Computing corrected the mistake access to Dailymotion was gradually restored in Tunisia.

Organizations such as the Global Network Initiative, the Electronic Frontier Foundation, Amnesty International, and the American Civil Liberties Union have successfully lobbied some vendors such as Websense to make changes to their software, to refrain from doing business with repressive governments, and to educate schools who have inadvertently reconfigured their filtering software too strictly. Nevertheless, regulations and accountability related to the use of commercial filters and services are often non-existent, and there is relatively little oversight from civil society or other independent groups. Vendors often consider information about what sites and content is blocked valuable intellectual property that is not made available outside the company, sometimes not even to the organizations purchasing the filters. Thus by relying upon out-of-the-box filtering systems, the detailed task of deciding what is or is not acceptable speech may be outsourced to the commercial vendors.

Non-technical censorship

PDF about countries that criminalize free speech

Internet content is also subject to censorship methods similar to those used with more traditional media. For example:
  • Laws and regulations may prohibit various types of content and/or require that content be removed or blocked either proactively or in response to requests.
  • Publishers, authors, and ISPs may receive formal and informal requests to remove, alter, slant, or block access to specific sites or content.
  • Publishers and authors may accept bribes to include, withdraw, or slant the information they present.
  • Publishers, authors, and ISPs may be subject to arrest, criminal prosecution, fines, and imprisonment.
  • Publishers, authors, and ISPs may be subject to civil lawsuits.
  • Equipment may be confiscated and/or destroyed.
  • Publishers and ISPs may be closed or required licenses may be withheld or revoked.
  • Publishers, authors, and ISPs may be subject to boycotts.
  • Publishers, authors, and their families may be subject to threats, attacks, beatings, and even murder.
  • Publishers, authors, and their families may be threatened with or actually lose their jobs.
  • Individuals may be paid to write articles and comments in support of particular positions or attacking opposition positions, usually without acknowledging the payments to readers and viewers.
  • Censors may create their own online publications and Web sites to guide online opinion.
  • Access to the Internet may be limited due to restrictive licensing policies or high costs.
  • Access to the Internet may be limited due to a lack of the necessary infrastructure, deliberate or not.
  • Access to search results may be restricted due to government involvement in the censorship of specific search terms, content may be excluded due to terms set with search engines. By allowing search engines to operate in new territory they must agree to abide to censorship standards set by the government in that country.

Self-censorship by web service operators

Removal of user accounts based on controversial content

Deplatforming is a form of Internet censorship in which controversial speakers or speech are suspended, banned, or otherwise shut down by social media platforms and other service providers that generally provide a venue for free speech or expression. Banking and financial service providers, among other companies, have also denied services to controversial activists or organizations, a practice known as "financial deplatforming".

Law professor Glenn Reynolds dubbed 2018 the "Year of Deplatforming", in an August 2018 article in The Wall Street Journal. According to Reynolds, in 2018 "the internet giants decided to slam the gates on a number of people and ideas they don't like. If you rely on someone else's platform to express unpopular ideas, especially ideas on the right, you're now at risk." On August 6, 2018, for example, several major platforms, including YouTube and Facebook, executed a coordinated, permanent ban on all accounts and media associated with conservative talk show host Alex Jones and his media platform InfoWars, citing "hate speech" and "glorifying violence." Reynolds also cited Gavin McInnes and Dennis Prager as prominent 2018 targets of deplatforming based on their political views, noting, "Extremists and controversialists on the left have been relatively safe from deplatforming."

Official statements regarding site and content removal

Most major web service operators reserve to themselves broad rights to remove or pre-screen content, and to suspend or terminate user accounts, sometimes without giving a specific list or only a vague general list of the reasons allowing the removal. The phrases "at our sole discretion", "without prior notice", and "for other reasons" are common in Terms of Service agreements.
  • Facebook: Among other things, the Facebook Statement of Rights and Responsibilities says: "You will not post content that: is hateful, threatening, or pornographic; incites violence; or contains nudity or graphic or gratuitous violence", "You will not use Facebook to do anything unlawful, misleading, malicious, or discriminatory", "We can remove any content or information you post on Facebook if we believe that it violates this Statement", and "If you are located in a country embargoed by the United States, or are on the U.S. Treasury Department's list of Specially Designated Nationals you will not engage in commercial activities on Facebook (such as advertising or payments) or operate a Platform application or website".
  • Google: Google's general Terms of Service, which were updated on 1 March 2012, state: "We may suspend or stop providing our Services to you if you do not comply with our terms or policies or if we are investigating suspected misconduct", "We may review content to determine whether it is illegal or violates our policies, and we may remove or refuse to display content that we reasonably believe violates our policies or the law", and "We respond to notices of alleged copyright infringement and terminate accounts of repeat infringers according to the process set out in the U.S. Digital Millennium Copyright Act".
    • Google Search: Google's Webmaster Tools help includes the following statement: "Google may temporarily or permanently remove sites from its index and search results if it believes it is obligated to do so by law, if the sites do not meet Google's quality guidelines, or for other reasons, such as if the sites detract from users' ability to locate relevant information."
  • Twitter: The Twitter Terms of Service state: "We reserve the right at all times (but will not have an obligation) to remove or refuse to distribute any Content on the Services and to terminate users or reclaim usernames" and "We reserve the right to remove Content alleged to be [copyright] infringing without prior notice and at our sole discretion".
  • YouTube: The YouTube Terms of Service include the statements: "YouTube reserves the right to decide whether Content violates these Terms of Service for reasons other than copyright infringement, such as, but not limited to, pornography, obscenity, or excessive length. YouTube may at any time, without prior notice and in its sole discretion, remove such Content and/or terminate a user's account for submitting such material in violation of these Terms of Service", "YouTube will remove all Content if properly notified that such Content infringes on another's intellectual property rights", and "YouTube reserves the right to remove Content without prior notice".
  • Wikipedia: Content within a Wikipedia article may be modified or deleted by any editor as part of the normal process of editing and updating articles. All editing decisions are open to discussion and review. The Wikipedia Deletion policy outlines the circumstances in which entire articles can be deleted. Any editor who believes a page doesn't belong in an encyclopedia can propose its deletion. Such a page can be deleted by any administrator if, after seven days, no one objects to the proposed deletion. Speedy deletion allows for the deletion of articles without discussion and is used to remove pages that are so obviously inappropriate for Wikipedia that they have no chance of surviving a deletion discussion. All deletion decisions may be reviewed, either informally or formally.
  • Yahoo!: Yahoo!'s Terms of Service (TOS) state: "You acknowledge that Yahoo! may or may not pre-screen Content, but that Yahoo! and its designees shall have the right (but not the obligation) in their sole discretion to pre-screen, refuse, or remove any Content that is available via the Yahoo! Services. Without limiting the foregoing, Yahoo! and its designees shall have the right to remove any Content that violates the TOS or is otherwise objectionable."

Circumvention

Internet censorship circumvention is the processes used by technologically savvy Internet users to bypass the technical aspects of Internet filtering and gain access to the otherwise censored material. Circumvention is an inherent problem for those wishing to censor the Internet because filtering and blocking do not remove content from the Internet, but instead block access to it. Therefore, as long as there is at least one publicly accessible uncensored system, it will often be possible to gain access to the otherwise censored material. However circumvention may not be possible by non-tech-savvy users, so blocking and filtering remain effective means of censoring the Internet access of large numbers of users.

Different techniques and resources are used to bypass Internet censorship, including proxy websites, virtual private networks, sneakernets, the dark web and circumvention software tools. Solutions have differing ease of use, speed, security, and risks. Most, however, rely on gaining access to an Internet connection that is not subject to filtering, often in a different jurisdiction not subject to the same censorship laws. According to GlobalWebIndex, over 400 million people use virtual private networks to circumvent censorship or for an increased level of privacy. The majority of circumvention techniques are not suitable for day to day use.

There are risks to using circumvention software or other methods to bypass Internet censorship. In some countries, individuals that gain access to otherwise restricted content may be violating the law and if caught can be expelled, fired, jailed, or subject to other punishments and loss of access.

In June 2011 the New York Times reported that the U.S. is engaged in a "global effort to deploy 'shadow' Internet and mobile phone systems that dissidents can use to undermine repressive governments that seek to silence them by censoring or shutting down telecommunications networks."

Another way to circumvent Internet censorship is to physically go to an area where the Internet is not censored. In 2017 a so-called "Internet refugee camp" was established by IT workers in the village of Bonako, just outside an area of Cameroon where the Internet is regularly blocked.

An emerging technology, blockchain DNS is also challenging the status quo of the centralized infrastructure on the Internet. This is through a design principle of building a domain name system which is more decentralized and transparent. Blockchain, in layman terms, is a public ledger that records all events, transactions or  exchanges  that  happen  between  parties (identified as nodes)  in  a  network. Bitcoin  popularized  the  concept of  blockchain,  but  blockchain  is  a  baseline  platform that has  far greater implications than just Bitcoin or cryptocurrencies. Blockchain domain names are entirely an asset of the domain owner and can only be controlled by the owner through a private key. Therefore authorities cannot take down content or enforce shutdown of the domain. However the technology has its own flaws as one would need to install add-ons on a browser to be able to access blockchain domains.

Increased use of HTTPS

One seemingly small difference in a letter created a large change in the filtering of content. The use of HTTPS versus what originally was HTTP in web searches created greater accessibility to most sites originally blocked or heavily monitored. Many social media sites including, Facebook, Google, and Twitter have added an automatic redirection to HTTPS as of 2017.  With the added adoption of HTTPS use, "censors" are left with limited options of either completely blocking all content or none of it.  Sites that were blocked in Egypt began using sites such as Medium to get their content out due to the difficulty "censors" would have with blocking each piece of individual content. With the use of Medium, many users were able to get more available access within more heavily monitored countries. However, the site was blocked in several areas which caused millions of posts on the site to become un-accessible. An article written by Sarawak Report was one of the many articles blocked from the site. The article was blocked by the Malaysian Communications and Multimedia Commission (MCMC) due to what was deemed as a failure to comply with the requested removal of the post. 

Common targets

There are several motives or rationales for Internet filtering: politics and power, social norms and morals, and security concerns. Protecting existing economic interests is an additional emergent motive for Internet filtering. In addition, networking tools and applications that allow the sharing of information related to these motives are themselves subjected to filtering and blocking. And while there is considerable variation from country to country, the blocking of web sites in a local language is roughly twice that of web sites available only in English or other international languages.

Politics and power

Censorship directed at political opposition to the ruling government is common in authoritarian and repressive regimes. Some countries block web sites related to religion and minority groups, often when these movements represent a threat to the ruling regimes.
Examples include:

Social norms

Social filtering is censorship of topics that are held to be antithetical to accepted societal norms. In particular censorship of child pornography and to protect children enjoys very widespread public support and such content is subject to censorship and other restrictions in most countries.
Examples include:

Security concerns

Many organizations implement filtering as part of a defense in depth strategy to protect their environments from malware, and to protect their reputations in the event of their networks being used, for example, to carry out sexual harassment. 

Internet filtering related to threats to national security that targets the Web sites of insurgents, extremists, and terrorists often enjoys wide public support.

Examples include:

Protection of existing economic interests and copyright

The protection of existing economic interests is sometimes the motivation for blocking new Internet services such as low-cost telephone services that use Voice over Internet Protocol (VoIP). These services can reduce the customer base of telecommunications companies, many of which enjoy entrenched monopoly positions and some of which are government sponsored or controlled.

Anti-copyright activists Christian Engström, Rick Falkvinge and Oscar Swartz have alleged that censorship of child pornography is being used as a pretext by copyright lobby organizations to get politicians to implement similar site blocking legislation against copyright-related piracy.
Examples include:

Network tools

Blocking the intermediate tools and applications of the Internet that can be used to assist users in accessing and sharing sensitive material is common in many countries.

Examples include:

Information about individuals

The right to be forgotten is a concept that has been discussed and put into practice in the European Union. In May 2014, the European Court of Justice ruled against Google in Costeja, a case brought by a Spanish man who requested the removal of a link to a digitized 1998 article in La Vanguardia newspaper about an auction for his foreclosed home, for a debt that he had subsequently paid. He initially attempted to have the article removed by complaining to Spain's data protection agency—Agencia Española de Protección de Datos—which rejected the claim on the grounds that it was lawful and accurate, but accepted a complaint against Google and asked Google to remove the results. Google sued in Spain and the lawsuit was transferred to the European Court of Justice. The court ruled in Costeja that search engines are responsible for the content they point to and thus, Google was required to comply with EU data privacy laws. It began compliance on 30 May 2014 during which it received 12,000 requests to have personal details removed from its search engine.

Index on Censorship claimed that "Costeja ruling ... allows individuals to complain to search engines about information they do not like with no legal oversight. This is akin to marching into a library and forcing it to pulp books. Although the ruling is intended for private individuals it opens the door to anyone who wants to whitewash their personal history....The Court’s decision is a retrograde move that misunderstands the role and responsibility of search engines and the wider internet. It should send chills down the spine of everyone in the European Union who believes in the crucial importance of free expression and freedom of information."

Around the world

Internet censorship and surveillance by country (2018)
As more people in more places begin using the Internet for important activities, there is an increase in online censorship, using increasingly sophisticated techniques. The motives, scope, and effectiveness of Internet censorship vary widely from country to country. The countries engaged in state-mandated filtering are clustered in three main regions of the world: east Asia, central Asia, and the Middle East/North Africa

Countries in other regions also practice certain forms of filtering. In the United States state-mandated Internet filtering occurs on some computers in libraries and K-12 schools. Content related to Nazism or Holocaust denial is blocked in France and Germany. Child pornography and hate speech are blocked in many countries throughout the world. In fact, many countries throughout the world, including some democracies with long traditions of strong support for freedom of expression and freedom of the press, are engaged in some amount of online censorship, often with substantial public support.

Internet censorship in China is among the most stringent in the world. The government blocks Web sites that discuss the Dalai Lama, the 1989 crackdown on Tiananmen Square protesters, the banned spiritual practice Falun Gong, as well as many general Internet sites. The government requires Internet search firms and state media to censor issues deemed officially "sensitive," and blocks access to foreign websites including Facebook, Twitter, and YouTube. According to a study in 2014, censorship in China is used to muzzle those outside government who attempt to spur the creation of crowds for any reason—in opposition to, in support of, or unrelated to the government. The government allows the Chinese people to say whatever they like about the state, its leaders, or their policies, because talk about any subject unconnected to collective action is not censored. The value that Chinese leaders find in allowing and then measuring criticism by hundreds of millions of Chinese people creates actionable information for them and, as a result, also for academic scholars and public policy analysts.

There are international bodies that oppose internet censorship, for example "Internet censorship is open to challenge at the World Trade Organization (WTO) as it can restrict trade in online services, a forthcoming study argues".

International concerns

Generally, national laws affecting content within a country only apply to services that operate within that country and do not affect international services, but this has not been established clearly by international case law. There are concerns that due to the vast differences in freedom of speech between countries, that the ability for one country to affect speech across the global Internet could have chilling effects.

For example, Google had won a case at the European Court of Justice in September 2019 that ruled that the EU's right to be forgotten only applied to services within the EU, and not globally. But in a contrary decision in October 2019, the same court ruled that Facebook was required to globally comply with a takedown request made in relationship to defamatory material that was posted to Facebook by an Austrian that was libelous of another, which had been determined to be illegal under Austrian laws. The case created a problematic precedent that the Internet may become subject to regulation under the strictest national defamation laws, and would limit free speech that may be acceptable in other countries.

Internet shutdowns

Several governments have resorted to shutting down most or all Internet connections in the country.

This appears to have been the case on 27 and 28 January 2011 during the 2011 Egyptian protests, in what has been widely described as an "unprecedented" internet block. About 3500 Border Gateway Protocol (BGP) routes to Egyptian networks were shut down from about 22:10 to 22:35 UTC 27 January. This full block was implemented without cutting off major intercontinental fibre-optic links, with Renesys stating on 27 January, "Critical European-Asian fiber-optic routes through Egypt appear to be unaffected for now."

Full blocks also occurred in Myanmar/Burma in 2007, Libya in 2011, and Syria during the Syrian civil war.

Almost all Internet connections in Sudan were disconnected from 3 June to 9 July, 2019, in response to a political opposition sit-in seeking civilian rule. A near-complete shutdown in Ethiopia lasted for a week after the Amhara Region coup d'état attempt. A week-long shutdown in Mauritania followed disputes over the 2019 Mauritanian presidential election. Other country-wide shutdowns in 2019 include Zimbabwe after a gasoline price protests triggered police violence, Gabon during the 2019 Gabonese coup d'état attempt, and during or after elections in Democratic Republic of the Congo, Benin, Malawi, and Kazakhstan.

Local shutdowns are frequently ordered in India during times of unrest and security concerns. Some countries have used localized Internet shutdowns to combat cheating during exams, including Iraq, Ethiopia, India, Algeria, and Uzbekistan.

Iranian government imposed a total internet shutdown from 16 to 23 November, 2019, in response to the fuel protests.

Reports, ratings, and trends

World map showing the status of YouTube blocking
Detailed country by country information on Internet censorship is provided by the OpenNet Initiative, Reporters Without Borders, Freedom House, and in the U.S. State Department Bureau of Democracy, Human Rights, and Labor's Human Rights Reports. The ratings produced by several of these organizations are summarized in the Internet censorship by country and the Censorship by country articles.

OpenNet Initiative reports

Through 2010 the OpenNet Initiative had documented Internet filtering by governments in over forty countries worldwide. The level of filtering in 26 countries in 2007 and in 25 countries in 2009 was classified in the political, social, and security areas. Of the 41 separate countries classified, seven were found to show no evidence of filtering in all three areas (Egypt, France, Germany, India, Ukraine, United Kingdom, and United States), while one was found to engage in pervasive filtering in all three areas (China), 13 were found to engage in pervasive filtering in one or more areas, and 34 were found to engage in some level of filtering in one or more areas. Of the 10 countries classified in both 2007 and 2009, one reduced its level of filtering (Pakistan), five increased their level of filtering (Azerbaijan, Belarus, Kazakhstan, South Korea, and Uzbekistan), and four maintained the same level of filtering (China, Iran, Myanmar, and Tajikistan).

Freedom on the Net reports

The Freedom on the Net reports from Freedom House provide analytical reports and numerical ratings regarding the state of Internet freedom for countries worldwide. The countries surveyed represent a sample with a broad range of geographical diversity and levels of economic development, as well as varying levels of political and media freedom. The surveys ask a set of questions designed to measure each country's level of Internet and digital media freedom, as well as the access and openness of other digital means of transmitting information, particularly mobile phones and text messaging services. Results are presented for three areas: Obstacles to Access, Limits on Content, and Violations of User Rights. The results from the three areas are combined into a total score for a country (from 0 for best to 100 for worst) and countries are rated as "Free" (0 to 30), "Partly Free" (31 to 60), or "Not Free" (61 to 100) based on the totals.

Starting in 2009 Freedom House has produced nine editions of the report. There was no report in 2010. The reports generally cover the period from June through May.

Freedom on the Net Survey Results
  2009 2011 2012 2013 2014 2015 2016 2017 2018
Countries 15 37 47 60 65 65 65 65 65
Free   4 (27%)   8 (22%) 14 (30%) 17 (29%) 19 (29%) 18 (28%) 17 (26%) 16 (25%) 15 (23%)
Partly free   7 (47%) 18 (49%) 20 (43%) 29 (48%) 31 (48%) 28 (43%) 28 (43%) 28 (43%) 30 (46%)
Not free   4 (27%) 11 (30%) 13 (28%) 14 (23%) 15 (23%) 19 (29%) 20 (31%) 21 (32%) 20 (31%)
Improved n/a   5 (33%) 11 (31%) 12 (26%) 12 (18%) 15 (23%) 34 (52%) 32 (49%) 19 (29%)
Declined n/a   9 (60%) 17 (47%) 28 (60%) 36 (55%) 32 (49%) 14 (22%) 13 (20%) 26 (40%)
No change n/a   1   (7%)   8 (22%)   7 (15%) 17 (26%) 18 (28%) 17 (26%) 20 (31%) 20 (31%)

The 2014 report assessed 65 countries and reported that 36 countries experienced a negative trajectory in Internet freedom since the previous year, with the most significant declines in Russia, Turkey and Ukraine. According to the report, few countries demonstrated any gains in Internet freedom, and the improvements that were recorded reflected less vigorous application of existing controls rather than new steps taken by governments to actively increase Internet freedom. The year's largest improvement was recorded in India, where restrictions to content and access were relaxed from what had been imposed in 2013 to stifle rioting in the northeastern states. Notable improvement was also recorded in Brazil, where lawmakers approved the bill Marco Civil da Internet, which contains significant provisions governing net neutrality and safeguarding privacy protection.

Reporters Without Borders (RWB)

RWB "Internet enemies" and "countries under surveillance" lists
In 2006, Reporters without Borders (Reporters sans frontières, RSF), a Paris-based international non-governmental organization that advocates freedom of the press, started publishing a list of "Enemies of the Internet". The organization classifies a country as an enemy of the internet because "all of these countries mark themselves out not just for their capacity to censor news and information online but also for their almost systematic repression of Internet users." In 2007 a second list of countries "Under Surveillance" (originally "Under Watch") was added.

When the "Enemies of the Internet" list was introduced in 2006, it listed 13 countries. From 2006 to 2012 the number of countries listed fell to 10 and then rose to 12. The list was not updated in 2013. In 2014 the list grew to 19 with an increased emphasis on surveillance in addition to censorship. The list has not been updated since 2014.

When the "Countries under surveillance" list was introduced in 2008, it listed 10 countries. Between 2008 and 2012 the number of countries listed grew to 16 and then fell to 11. The list was last updated in 2012.
RWB Special report on Internet Surveillance
On 12 March 2013, Reporters Without Borders published a Special report on Internet Surveillance. The report includes two new lists:
  • a list of "State Enemies of the Internet", countries whose governments are involved in active, intrusive surveillance of news providers, resulting in grave violations of freedom of information and human rights; and
  • a list of "Corporate Enemies of the Internet", companies that sell products that are liable to be used by governments to violate human rights and freedom of information.
The five "State Enemies of the Internet" named in March 2013 are: Bahrain, China, Iran, Syria, and Vietnam.

The five "Corporate Enemies of the Internet" named in March 2013 are: Amesys (France), Blue Coat Systems (U.S.), Gamma International (UK and Germany), Hacking Team (Italy), and Trovicor (Germany).

BBC World Service global public opinion poll

A poll of 27,973 adults in 26 countries, including 14,306 Internet users, was conducted for the BBC World Service by the international polling firm GlobeScan using telephone and in-person interviews between 30 November 2009 and 7 February 2010. GlobeScan Chairman Doug Miller felt, overall, that the poll showed that:
Despite worries about privacy and fraud, people around the world see access to the internet as their fundamental right. They think the web is a force for good, and most don’t want governments to regulate it.
Findings from the poll include:
  • Nearly four in five (78%) Internet users felt that the Internet had brought them greater freedom.
  • Most Internet users (53%) felt that "the internet should never be regulated by any level of government anywhere".
  • Opinion was evenly split between Internet users who felt that “the internet is a safe place to express my opinions” (48%) and those who disagreed (49%). Somewhat surprisingly users in Germany and France agreed the least, followed by users in a highly filtered country such as China, while users in Egypt, India and Kenya agreed more strongly.
  • The aspects of the Internet that cause the most concern include: fraud (32%), violent and explicit content (27%), threats to privacy (20%), state censorship of content (6%), and the extent of corporate presence (3%).
  • Almost four in five Internet users and non-users around the world felt that access to the Internet was a fundamental right (50% strongly agreed, 29% somewhat agreed, 9% somewhat disagreed, 6% strongly disagreed, and 6% gave no opinion). And while there is strong support for this right in all of the countries surveyed, it is surprising that the United States and Canada were among the top five countries where people most strongly disagreed that access to the Internet was a fundamental right of all people (13% in Japan, 11% in the U.S., 11% in Kenya, 11% in Pakistan, and 10% in Canada strongly disagree).

Internet Society's Global Internet User Survey

In July and August 2012 the Internet Society conducted online interviews of more than 10,000 Internet users in 20 countries. Some of the results relevant to Internet censorship are summarized below.

Question No. of Responses Responses
Access to the Internet should be considered a basic human right. 10,789 83% somewhat or strongly agree,
14% somewhat or strongly disagree,
  3% don't know
Freedom of expression should be guaranteed on the Internet. 10,789 86% somewhat or strongly agree,
11% somewhat or strongly disagree,
  2% don't know
The Internet should be governed in some form to protect the community from harm. 10,789 82% somewhat or strongly agree,
15% somewhat or strongly disagree,
  3% don't know / not applicable
Censorship should exist in some form on the Internet. 10,789 71% somewhat or strongly agree,
24% somewhat or strongly disagree,
  5% don't know / not applicable
Each individual country has the right to govern the Internet the way they see fit. 10,789 67% somewhat or strongly agree,
29% somewhat or strongly disagree,
  4% don't know /not applicable
The Internet does more to help society than it does to hurt it. 10,789 83% somewhat or strongly agree,
13% somewhat or strongly disagree,
  4% don't know / not applicable
How often do you read the privacy policies of websites or services that you share personal information with? 10,789 16% all the time,
31% most of the time,
41% sometimes,
12% never
When you are logged in to a service or application do you use privacy protections? 10,789 27% all the time,
36% most of the time,
29% sometimes,
  9% never
Do you use “anonymization” services, for example, the “anonymize” feature in your web browser, specialized software like Tor, third - party redirection services like duckduckgo.com? 10,789 16% yes,
38% no,
43% don't know / not aware of these types of services,
  3% would like to use them but I am not able to
Increased government control of the Internet would put limits on the content I can access. 9,717 77% somewhat or strongly agree,
18% somewhat or strongly disagree,
  4% don't know / not applicable
Increased government control of the Internet would limit my freedom of expression. 9,717 74% somewhat or strongly agree,
23% somewhat or strongly disagree,
  4% don't know / not applicable
Increased government control of the Internet would improve the content on the Internet. 9,717 49% somewhat or strongly agree,
44% somewhat or strongly disagree,
  7% don't know / not applicable
Increased government control of the Internet would make the Internet safe for everyone to use. 9,717 58% somewhat or strongly agree,
35% somewhat or strongly disagree,
  7% don't know / not applicable
Increased government control of the Internet would have no effect. 9,717 31% somewhat or strongly agree,
56% somewhat or strongly disagree,
14% don't know / not applicable
To what degree would you accept increased control or monitoring of the Internet if you gained increased safety? 10,789 61% a lot or somewhat,
23% not very much or not at all

Transparency of filtering or blocking activities

Among the countries that filter or block online content, few openly admit to or fully disclose their filtering and blocking activities. States are frequently opaque and/or deceptive about the blocking of access to political information. For example:
  • Saudi Arabia and the United Arab Emirates (UAE) are among the few states that publish detailed information about their filtering practices and display a notification to the user when attempting to access a blocked website. The websites that are blocked are mostly pornographic or considered un-Islamic.
  • In contrast, countries such as China and Tunisia send users a false error indication. China blocks requests by users for a banned website at the router level and a connection error is returned, effectively preventing the user's IP address from making further HTTP requests for a varying time, which appears to the user as "time-out" error with no explanation. Tunisia has altered the block page functionality of SmartFilter, the commercial filtering software it uses, so that users attempting to access blocked websites receive a fake "File not found" error page.
  • In Uzbekistan users are frequently sent block pages stating that the website is blocked because of pornography, even when the page contains no pornography. Uzbeki ISPs may also redirect users' request for blocked websites to unrelated websites, or sites similar to the banned websites, but with different information.

Arab Spring

During the Arab Spring of 2011, media jihad (media struggle) was extensive. Internet and mobile technologies, particularly social networks such as Facebook and Twitter, played and are playing important new and unique roles in organizing and spreading the protests and making them visible to the rest of the world. An activist in Egypt tweeted, “we use Facebook to schedule the protests, Twitter to coordinate, and YouTube to tell the world”.

This successful use of digital media in turn led to increased censorship including the complete loss of Internet access for periods of time in Egypt and Libya in 2011. In Syria, the Syrian Electronic Army (SEA), an organization that operates with at least tacit support of the government, claims responsibility for defacing or otherwise compromising scores of websites that it contends spread news hostile to the Syrian government. SEA disseminates denial of service (DoS) software designed to target media websites including those of Al Jazeera, BBC News, Syrian satellite broadcaster Orient TV, and Dubai-based Al Arabiya TV.

In response to the greater freedom of expression brought about by the Arab Spring revolutions in countries that were previously subject to very strict censorship, in March 2011, Reporters Without Borders moved Tunisia and Egypt from its "Internet enemies" list to its list of countries "under surveillance" and in 2012 dropped Libya from the list entirely. At the same time, there were warnings that Internet censorship might increase in other countries following the events of the Arab Spring. However, in 2013, Libyan communication company LTT blocked the pornographic websites. It even blocked the family-filtered videos of ordinary websites like Dailymotion.

Christian socialism

From Wikipedia, the free encyclopedia
 
Christian socialism is a religious and political philosophy that blends Christianity and socialism, endorsing left-wing economics on the basis of the Holy Bible and the teachings of Jesus of Nazareth.
Many Christian socialists believe capitalism to be idolatrous and rooted in the sin of greed. Christian socialists identify the cause of inequality to be the greed that they associate with capitalism.

Christian socialism became a major movement in the United Kingdom beginning in the 19th century. The Christian Socialist Movement, since 2013 known as Christians on the Left, is one formal group.

Other earlier figures are also viewed as Christian socialists, such as the nineteenth century writers Frederick Denison Maurice (The Kingdom of Christ, 1838), John Ruskin (Unto This Last, 1862), Charles Kingsley (The Water-Babies, 1863), Thomas Hughes (Tom Brown's Schooldays, 1857), Frederick James Furnivall (co-creator of the Oxford English Dictionary), Adin Ballou (Practical Christian Socialism, 1854), and Francis Bellamy (a Baptist minister and the author of the United States' Pledge of Allegiance).

History

Biblical age

Elements that would form the basis of Christian socialism are found in the Old and New Testaments.

Old Testament

The Old Testament had divided perspectives on the issue of poverty. One part of the Jewish tradition held that poverty was judgment of God upon the wicked while viewing prosperity as a reward for the good, stating that "The righteous has enough to satisfy his appetite, but the belly of the wicked suffers want" (Prov. 13:25).

However, there are other sections that instruct generosity to the "have nots" of society. The Torah instructs followers to treat neighbours equally and to be generous to have nots, such as stating:
You shall not oppress your neighbour...but you shall love your neighbour as yourself: I am the Lord
— (Lev 19:13, 18).
He [the Lord your God] executes justice for the fatherless and the widow, and loves the sojourner, giving him food and clothing. Love the sojourner therefore; for you were sojourners in the land of Egypt
— (Deut. 10:18–19).
When you reap in your harvest in the field, and have forgotten a sheaf in the field, you shall not go back to get it...When you beat your olive trees, you shall not go over the boughs again...When you gather the grapes of your vineyard, you shall not glean it afterward; it shall be for the sojourner, the fatherless and the widow. You shall remember that you were a slave in the land of Egypt; therefore I command you to do this
— (Deut. 24:19–22).
Some of the Psalms include many references to social justice for the poor:
Give justice to the weak and the fatherless; maintain the right of the afflicted and the destitute. Rescue the weak and the needy; deliver them from the hand of the wicked
— (Ps. 82 (81): 3, 4).
Blessed is the man who fears the Lord, who greatly delights in his commandments!...He has distributed freely, he has given to the poor; his righteousness endures forever; his horn is exalted in honour
— (Ps. 112 (111): 1, 9).
Amos emphasizes the need for "justice" and "righteousness" that is described as conduct that emphasizes love for those who are poor and to oppose oppression and injustice towards the poor. The prophet Isaiah (759–694 B.C.) to whom is attributed the first thirty-nine chapters of the Book of Isaiah ("Proto-Isaiah"), followed upon Amos' themes of justice and righteousness involving the poor as necessary for followers of God, denouncing those who do not do these things, stating:
Even though you make many prayers, I will not listen; your hands are full of blood...cease to do evil, learn to do good; seek justice, correct oppression; defend the fatherless, plead for the widow
— (Isa. 1:15–17).
The Book of Sirach, one of the Deuterocanonical or Apocryphal books of the Old Testament, denounces the pursuit of wealth, stating:
He who loves gold will not be justified, and he who pursues money will be led astray by it. Many have come to ruin because of gold, and their destruction has met them face to face. It is a stumbling block to those who are devoted to it, and every fool will be taken captive by it
— (Sir. 31: 5–7).

New Testament

In the New Testament, Jesus in Matthew 25:31–46 identifies himself with the hungry, the poor, the sick, and the prisoners. Matthew 25:31–46 is a major component of Christianity and is considered the cornerstone of Christian socialism. Another key statement in the New Testament that is an important component of Christian socialism is Luke 10:25–37 that follows the statement "You shall love your neighbour as yourself" with the question "And who is my neighbour?", and in the Parable of the Good Samaritan Jesus gives the revolutionary response that the neighbour includes anyone in need, even people we might be expected to shun. (The Samaritans were considered a heretical sect by Jews and neither would usually deal with the other.)

"Jesus Expels the Moneylenders from the Temple" by Giovanni Paolo Pannini
 
In the Sermon on the Plain, Jesus says, "Blessed are you poor, for yours is the kingdom of God. Blessed are you that hunger now, for you shall be satisfied" (Luke 6:20, 21).

Christian socialists note that James the Just, the brother of Jesus of Nazareth, in the Epistle of James criticizes the rich intensely and in strong language:
Come now, you rich, weep and howl for the miseries that are coming upon you. Your riches have rotted and your garments are moth-eaten. Your gold and silver have rusted, and their rust will be evidence against you and will eat your flesh like fire. You have laid up for treasure for the last days. Behold, the wages of the labourers who mowed your fields, which you have kept back by fraud, cry out; and the cries of the harvesters have reached the ears of the Lord of hosts. You have lived on the earth in luxury and in pleasure; you have fattened your hearts in a day of slaughter.
— (Jam. 5:1–6).
During the New Testament period and beyond, there is evidence that many Christian communities practiced forms of sharing, redistribution and communism.

Church Fathers age

Basil of Caesarea (c. 330–379), the Father of the Eastern monks who became Bishop of Caesarea, established a complex around the church and monastery that included hostels, almshouses, and hospitals for infectious diseases. During the great famine of 368, Basil denounced against profiteers and the indifferent rich. Basil wrote the sermon on The Rich Fool in which he states:
Who is the covetous man? One for whom plenty is not enough. Who is the defrauder? One who takes away what belongs to everyone. And are not you covetous, are you not a defrauder, when you keep for private use what you were given for distribution? When some one strips a man of his clothes we call him a thief. And one who might clothe the naked and does not—should not he be given the same name? The bread in your hoard belongs to the hungry; the cloak in your wardrobe belongs to the naked; the shoes you let rot belong to the barefoot; the money in your vaults belongs to the destitute. All you might help and do not—to all these you are doing wrong.
John Chrysostom declared his reasons for his attitude towards the rich and position of attitude towards wealth by saying:
I am often reproached for continually attacking the rich. Yes, because the rich are continually attacking the poor. But those I attack are not the rich as such, only those who misuse their wealth. I point out constantly that those I accuse are not the rich, but the rapacious; wealth is one thing, covetousness another. Learn to distinguish.

19th century to present

A variety of socialist perspectives emerged in 19th century Britain, beginning with John Ruskin.

John Ruskin

The influential Victorian art critic John Ruskin expounded theories about social justice in Unto This Last (1860). In it, he stated four goals that might be called "socialist" although Ruskin did not use the term.
  1. "training schools for youth, established at government cost"
  2. in connection with these schools, the government should establish "manufactories and workshops, for the production and sale of every necessary of life"
  3. all unemployed people should be "set to work" or trained for work if needed or forced to work if necessary
  4. "for the old and destitute, comfort and home should be provided"
Ruskin was not "an authentic Socialist in any of its various nineteenth-century meanings." His only real contact with the Christian Socialists came through the Working Men's College. However, he influenced later socialist thinking, especially William Morris.

Artists

The painters of the Pre-Raphaelite Brotherhood were influenced and sponsored by Ruskin. The artist William Morris was a leader of the Socialist League founded in December 1884.

Fabian Society

The Fabian Society was founded in the same year; Sydney and Beatrice Webb were among its leading members. The Fabians influenced members of the Bloomsbury Group and were important in the early history of the British Labour Party.
Episcopal Church Socialist League and the Church League for Industrial Democracy
Founded in 1911 by Vida Dutton Scudder, herself influenced by the Fabian Society, the Episcopal Church Socialist League and its successor the Church League for Industrial Democracy sought to ally Christian doctrine with the plight of the working class as a part of the larger social gospel movement that was taking hold of many urban churches across the United States in the early 20th century.

Bishop Spalding

In the November 1914 issue of The Christian Socialist, Episcopal bishop Franklin Spencer Spalding of Utah stated:
The Christian Church exists for the sole purpose of saving the human race. So far she has failed, but I think that Socialism shows her how she may succeed.
It insists that men cannot be made right until the material conditions be made right. Although man cannot live by bread alone, he must have bread. Therefore,
the Church must destroy a system of society which inevitably creates and perpetuates unequal and unfair conditions of life. These unequal and unfair conditions
have been created by competition. Therefore competition must cease and cooperation take its place.

Christian democracy

The political movement of Christian democracy espouses some values of Christian socialism, for example "economic justice" and "social welfare." It opposes an "individualist worldview" and it approves state intervention in the economy in defence of "human dignity." On the other hand, because of its "close association with Roman Catholicism", Christian democracy differs from Christian socialism by its emphasis on "traditional church and family values," by its defence of "private property," and by its opposition to "excessive intervention of the state."

Christian democratic parties (under various names) were formed in Europe and Latin America after World War II. Some became "a major political force."

Communists

Christian communism is a form of religious communism based on Christianity. It is a view that the teachings of Jesus Christ compel Christians to support communism as the ideal social system. Although there is no universal agreement on the exact date when Christian communism was founded, many Christian communists assert that evidence from the Bible (in the Acts of the Apostles) suggests that the first Christians, including the apostles, established their own small communist society in the years following Jesus' death and resurrection. As such, many advocates of Christian communism argue that it was taught by Jesus and practiced by the apostles themselves. Some independent historians confirm it.

Spiritualism and Occultism

Utopian socialist ideas continued, after 1848, in new religious movements such as Spiritualism or Occultism. They were often marked by a heterodox Christian identity and a decidedly anti-materialist attitude.

In Catholicism

In Catholicism, communism was strongly criticized in the 1878 papal encyclical Quod Apostolici Muneris by Pope Leo XIII, as he believed that it led to state domination over the freedom of the individual and quelled proper religious worship, inherently turning the top hierarchical power over to the state instead of God. This opinion was moderated in an encyclical issued by Pope Pius XI on 15 May 1931 Quadragesimo anno, wherein Pius describes the major dangers for human freedom and dignity arising from unrestrained capitalism and totalitarian communism. Pius XI called upon true socialism to distance itself from totalitarian communism as a matter of clarity and also as a matter of principle. Communists were accused of attempting to overthrow all existing civil society, and Christian socialism, if allied to communism, was deemed to be an oxymoron because of this.[citation needed] Pius XI famously wrote at the time that "no one can be at the same time a good Catholic and a true socialist", yet had clarified that a Catholic was free to vote for the British Labour Party, the UK affiliate of the Socialist International. Nonetheless, prominent Catholic Socialists did exist during Pope Pius XI's era, such as Dorothy Day of the United States of America, and Father Michael O'Flanagan of Ireland. 

Pope Benedict XVI addressed the Italian Senate, declaring, “In many respects democratic socialism was and is close to Catholic social doctrine; in any case, it contributed toward the formation of a social consciousness.” 

Pope Francis has shown sympathy to socialist causes with claims such as that capitalism is "Terrorism against all of Humanity" and that "it is the communists who think like Christians. Christ spoke of a society where the poor, the weak and the marginalized have the right to decide."

More recently movements such as liberation theology, and Tradinista! have argued for the compatibility of socialism and Catholicism. António Guterres, a practicing Catholic and current Secretary-General of the United Nations is the immediate past President of the Socialist International.

In Calvinism

In France, the birthplace of Calvinism, the Christianisme Social (Social Christianity) movement emerged from the preaching of Tommy Fallot in the 1870s. Early on, the movement focused on such issues as illiteracy and alcoholism amongst the poor. After the First World War, Social Christianity moved in two directions: towards pacifism and towards ecumenism.

Hence within the movement emerged conscientious objectors such as Jacques Martin, Philo Vernier and Henri Roser, economists pursuing policies that reflected cooperation and solidarity (such as Bernard Lavergne and Georges Lasserre), and theologians such as Paul Ricoeur. One of the pastors in the movement, Jacques Kaltenbach, was also to have a formative influence on André Trocmé.

Under the Vichy regime, which had seen the emergence of other forms of witness (particularly the support of internees in the camps, and aiding Jews to escape), the movement was reborn to tackle the problems of a changing world. It expressed a Christian socialism, more or less in line with the beginning of a new political left. Political activism was very broad and included the denunciation of torture, East–West debate on European integration and taking a stance on the process of decolonization. It facilitated meetings between employers, managers and trade unionists to discern a new economic order.

After the events of May 1968, Calvinism in France became much more left-wing in its orientation. One doctrinal text produced in this period, Church and Authorities, was described as Marxist in its orientation. Churches now seized for themselves the political and social issues to tackle, such as nuclear power and justice for the Third World.

In the early 2000s, the Social Christianity movement temporarily discontinued and its journal, Other Times, ceased to be published. However, the movement was relaunched on 10 June 2010 with a petition signed by over 240 people and now maintains an active presence with its own website.

Economically, Calvinists have supported capitalism and have been in the vanguard of promoting market capitalism and have produced many of France's leading entrepreneurs. With regard to politics and social issues however, they are very much socialists. Three of France's post-war prime ministers have been Calvinists, despite Protestants only making up two percent of the population. Two of these prime ministers have been socialists.

In Australia, the academic Roland Boer has attempted to synthesize Calvinism and Marxism. He has stated that "it became clear to me that within Christianity there is a strong tradition of political and theological radicalism, which I continued to explore personally. Reformed or Calvinist theology did not seem to sit easily with that interest, so I spent many a long year rejecting that tradition, only to realise later that Calvin himself was torn between the radical potential of elements in the Bible and his own conservative preferences".

In Wales, Calvinistic Methodism is the largest non-conformist religion. Its beginnings may be traced to Griffith Jones (1684–1761), of Llanddowror, Carmarthenshire, whose sympathy for the poor led him to set on foot a system of circulating charity schools for the education of children.[citation needed] However, until the nineteenth century, the prevailing thought amongst Welsh non-conformists was that "it would be wiser if the churches limited their activities to those of the altar and not to meddle at all with the state and social questions". This stemmed partly from the traditional nonconformist belief in the separation of church and state.

In his influential sermon, Y Ddwy Alwedigaeth (The Two Vocations), Emrys ap Iwan challenged this passive pietism: "We must not think, like the old Methodists, Puritans and some Catholics, that we can only seek Godliness outside our earthly vocation." He condemned those Christians who limited godliness to directly religious matters such as Sabbath observance and personal devotion. He declared that all earthly things, including language and culture, have some kind of divine origin.

Many of the founders of the Welsh nationalist social-democratic party, Plaid Cymru were also devout Calvinists, including John Edward Daniel. Daniel was the theologian credited for bringing neo-orthodoxy to Wales. Daniel argued that God did not create man as an isolated individual but as a social being.

The second generation of Plaid Cymru leaders included R. Tudur Jones. His political stance, combined with Calvinist doctrine, created an integrated vision that was significant to the religious life of Christian Wales in the later half of the 20th century. Jones argued that the "state should be a servant, to preserve order and to allow men to live the good life".

Today, many Calvinist socialists in Wales support same-sex marriage on the grounds that it delivers marriage equality in the eyes of the state while still allowing churches to follow their own conscience, thus upholding the traditional Protestant belief in separation of church and state.

The Calvinist tradition in Plaid Cymru has also influenced its non-violent approach. "The ideal is no fist violence, no verbal violence, and no heart violence.... Christians... point to the New Testament example of Jesus Christ clearing the temple. Here there is no suggestion of violence against people; rather the tables are turned as a symbolic act. The life and teaching of Jesus Christ were seen as the foundations of nonviolent direct action [for Plaid Cymru members]... loving their enemies on the one hand, but not compromising on what they saw as an issue of moral rightness." Plaid Cymru continues to see itself as very much part of the Christian pacifist tradition.

Criticism

Lawrence Reed, in Rendering Unto Caesar, writes that Jesus was not a socialist in that he promoted voluntary giving and charity rather than the mandatory taking by government (taxes). Johnnie Moore (Professor of Religion at Liberty University) writing on the homepage of Fox News Radio's Todd Starnes, says Jesus was a capitalist. Bryan Fischer, of the American Family Association, says Jesus was a capitalist who advocated "voluntary redistribution of wealth".

Charles Haddon Spurgeon was critical of socialist doctrines, and warned that those who seek socialism "may soon have too much of it." Specifically, he regarded collectivist Christianity as inferior to faith on an individual level. He said "I would not have you exchange the gold of individual Christianity for the base metal of Christian Socialism."

Christian socialist parties

Notable Christian socialists

The following list includes notable followers of Christian socialism:

Sermon on the Mount

From Wikipedia, the free encyclopedia
 
Sermon on the Mount by Carl Bloch (1877)

The Sermon on the Mount (anglicized from the Matthean Vulgate Latin section title: Sermo in monte) is a collection of sayings and teachings of Jesus Christ, which emphasizes his moral teaching found in the Gospel of Matthew (chapters 5, 6, and 7). It is the first of the Five Discourses of Matthew and takes place relatively early in the Ministry of Jesus after he has been baptized by John the Baptist, finished his fasting and meditation retreat in the desert, and begun to preach in Galilee. The name and location of the mountain is unstated; the Mount of Beatitudes is the traditional interpretation.

The Sermon is the longest continuous discourse of Jesus found in the New Testament and has been one of the most widely quoted elements of the Canonical Gospels. It includes some of the best-known teachings of Jesus, such as the Beatitudes, and the widely recited Lord's Prayer. The Sermon on the Mount is generally considered to contain the central tenets of Christian discipleship.

Background and setting

The Sermon on the Mount occupies chapters 5, 6 and 7 of the Gospel of Matthew. The Sermon has been one of the most widely quoted elements of the Canonical Gospels.

This is the first of the Five Discourses of Matthew, the other four being Matthew 10, Matthew 13 (1–53), Matthew 18 and the Olivet discourse in Matthew 24.

The Sermon is set early in the Ministry of Jesus after he has been baptized by John the Baptist in chapter 3 of Matthew's Gospel, gathered his first disciples in chapter 4, and had returned from a long fast and contemplation in the Judaean Desert where he had been tempted by Satan to renounce his spiritual mission and gain worldly riches.

Before this episode, Jesus had been "all about Galilee" preaching, as in Matthew 4:23, and "great crowds followed him" from all around the area. The setting for the sermon is given in Matthew 5:1-2. Jesus sees the multitudes, goes up into the mountain, is followed by his disciples, and begins to preach. The Sermon is brought to its close by Matthew 8:1, which reports that Jesus "came down from the mountain followed by great multitudes".

Components

While the issue of the exact theological structure and composition of the Sermon on the Mount is subject to debate among scholars, specific components within it, each associated with particular teachings, can be identified.

The Lord's Prayer, in Matthew 6:9, 1500, Vienna

Matthew 5:3–12 discusses the Beatitudes. These describe the character of the people of the Kingdom of Heaven, expressed as "blessings". The Greek word most versions of the Gospel render as "blessed," can also be translated "happy" (Matthew 5:3–12 of Young's Literal Translation for an example). In Matthew, there are eight (or nine) blessings, while in Luke there are four, followed by four woes.

In almost all cases the phrases used in the Beatitudes are familiar from an Old Testament context, but in the sermon Jesus gives them new meaning. Together, the Beatitudes present a new set of ideals that focus on love and humility rather than force and mastery; they echo the highest ideals of Jesus' teachings on spirituality and compassion.

In Christian teachings, the Works of Mercy, which have corporal and spiritual components, have resonated with the theme of the Beatitude for mercy. These teachings emphasize that these acts of mercy provide both temporal and spiritual benefits.

Matthew 5:13–16 presents the metaphors of salt and light. This completes the profile of God's people presented in the beatitudes and acts as the introduction to the next section.

There are two parts in this section, using the terms "salt of the earth" and Light of the World to refer to the disciples – implying their value. Elsewhere, in John 8:12, Jesus applies Light of the World to himself.

Jesus preaches about hell and what hell is like: "But I say unto you, That whosoever is angry with his brother without a cause shall be in danger of the judgment: and whosoever shall say to his brother "Raca (fool)" shall be in danger of the council: but whosoever shall say, Thou fool, shall be in danger of hell fire." (Matthew 5:22 KJV) 

A page from Matthew, from Papyrus 1, c. 250 AD

The longest discourse in the Sermon is Matthew 5:17–48, traditionally referred to as the Antitheses or Matthew's Antitheses. In the discourse, Jesus fulfills and reinterprets the Old Covenant and in particular its Ten Commandments, contrasting with what "you have heard" from others. For example, he advises turning the other cheek, and to love your enemies, in contrast to taking an eye for an eye. According to most interpretations of Matthew 5:17, 18, 19, and 20, and most Christian views of the Old Covenant, these new interpretations of the Law and Prophets are not opposed to the Old Testament, which was the position of Marcion, but form Jesus' new teachings which bring about salvation, and hence must be adhered to, as emphasized in Matthew 7:24–27 towards the end of the sermon.

In Matthew 6 Jesus condemns doing what would normally be "good works" simply for recognition and not from the heart, such as those of alms (6:1–4), prayer (6:5–15), and fasting (6:16–18). The discourse goes on to condemn the superficiality of materialism and calls the disciples not to worry about material needs, but to "seek" God's kingdom first. Within the discourse on ostentation, Matthew presents an example of correct prayer. Luke places this in a different context. The Lord's prayer (6:9–13) contains parallels to 1 Chronicles 29:10–18.

The first part of Matthew 7, i.e. Matthew 7:1–6 deals with judging. Jesus condemns those who judge others before first judging themselves: "Judge not, that ye be not judged."

In the last part in Matthew 7:17–29 Jesus concludes the sermon by warning against false prophets.

Teachings and theology

Plaque of the 8 Beatitudes, St. Cajetan Church, Lindavista, Mexico

The teachings of the Sermon on the Mount have been a key element of Christian ethics, and for centuries the sermon has acted as a fundamental recipe for the conduct of the followers of Jesus. Various religious and moral thinkers (e.g. Tolstoy and Gandhi) have admired its message, and it has been one of the main sources of Christian pacifism.

In the 5th century, Saint Augustine began his book Our Lord's Sermon on the Mount by stating:
If anyone will piously and soberly consider the sermon which our Lord Jesus Christ spoke on the mount, as we read it in the Gospel according to Matthew, I think that he will find in it, so far as regards the highest morals, a perfect standard of the Christian life.
The last verse of chapter 5 of Matthew (5:48) is a focal point of the sermon that summarizes its teachings by advising the disciples to seek perfection." The Greek word telios used to refer to perfection also implies an end, or destination, advising the disciples to seek the path towards perfection and the Kingdom of God. It teaches that God's children are those who act like God.

The teachings of the sermon are often referred to as the Ethics of the Kingdom: they place a high level of emphasis on "purity of the heart" and embody the basic standard of Christian righteousness.

Theological structure

The issue of the theological structure and composition of the Sermon on the Mount remains unresolved. One group of theologians ranging from Saint Augustine in the 5th century to Michael Goulder in the 20th century, see the Beatitudes as the central element of the Sermon. Others such as Bornkamm see the Sermon arranged around the Lord's prayer, while Daniel Patte, closely followed by Ulrich Luz, see a chiastic structure in the sermon. Dale Allison and Glen Stassen have proposed a structure based on triads. Jack Kingsbury and Hans Dieter Betz see the sermon as composed of theological themes, e.g. righteousness or way of life.

Analysis and interpretation

The Sermon of the Mount as depicted by Louis Comfort Tiffany in a stained glass window at Arlington Street Church in Boston

Interpretations

The high ethical standards of the Sermon have been interpreted in a wide variety of ways by different Christian groups and Craig S. Keener states that at least 36 different interpretations regarding the message of the Sermon exist, which he divides into 8 categories of views:
  1. The predominant medieval view, "reserving a higher ethic for clergy, especially in monastic orders"
  2. Luther's view that it represents an impossible demand like the Law of Moses
  3. The Anabaptist a literal view which directly applies the teachings
  4. The Social Gospel view
  5. The Christian existentialism view
  6. Schweitzer's view of an imminent eschatology referring to an interim ethic
  7. Dispensational eschatology which refers to the future Kingdom of God
  8. Inaugurated eschatology in which the Sermon's ethics remain a goal to be approached, yet realized later

Comparison with the Sermon on the Plain

While Matthew groups Jesus' teachings into sets of similar material, the same material is scattered when found in Luke. The Sermon on the Mount may be compared with the similar but more succinct Sermon on the Plain as recounted by the Gospel of Luke (6:17–49), which occurs at the same moment in Luke's narrative, and also features Jesus heading up a mountain, but giving the sermon on the way down at a level spot. Some scholars believe that they are the same sermon, while others hold that Jesus frequently preached similar themes in different places.

Modern parallels with Buddhist teachings

Although modern parallels between the teachings of Jesus and Buddhist philosophy have been drawn (by the 14th Dalai Lama for example), these comparisons emerged after missionary contacts in the 19th century, and there is no historically reliable evidence of contacts between Buddhism and Jesus during his life. Modern scholarship has almost unanimously agreed that claims of the travels of Jesus to Tibet, Kashmir or India and the influence of Buddhism on his teachings are without historical basis. The similarities between the teachings of Buddha and Jesus have been noted.

According to the Perennial Philosophy

According to perennialist author Frithjof Schuon, the message of the Sermon is a perfect synthesis of the whole Christian tradition. The text has the largest number of perennial and universal doctrines and spiritual advice of all Scripture. Much of what Bible readers remember from Scripture derives from the Sermon. Source of spiritual and moral instructions, the Sermon on the Mount is regarded by the Perennial Philosophy "as the quintessence itself of religion". Perennialism considers the injunctions of the Sermon on the Mount as belonging to the esoteric dimension of Christianity.

Online machine learning

From Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/Online_machine_learning In computer sci...