5.14: AI Ethics, Digital Repression and Global Case Studies
- Page ID
- 307759
This page is a draft and is under active development.
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)
\( \newcommand{\dsum}{\displaystyle\sum\limits} \)
\( \newcommand{\dint}{\displaystyle\int\limits} \)
\( \newcommand{\dlim}{\displaystyle\lim\limits} \)
\( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)
( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)
\( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)
\( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)
\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)
\( \newcommand{\Span}{\mathrm{span}}\)
\( \newcommand{\id}{\mathrm{id}}\)
\( \newcommand{\Span}{\mathrm{span}}\)
\( \newcommand{\kernel}{\mathrm{null}\,}\)
\( \newcommand{\range}{\mathrm{range}\,}\)
\( \newcommand{\RealPart}{\mathrm{Re}}\)
\( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)
\( \newcommand{\Argument}{\mathrm{Arg}}\)
\( \newcommand{\norm}[1]{\| #1 \|}\)
\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)
\( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)
\( \newcommand{\vectorA}[1]{\vec{#1}} % arrow\)
\( \newcommand{\vectorAt}[1]{\vec{\text{#1}}} % arrow\)
\( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vectorC}[1]{\textbf{#1}} \)
\( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)
\( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)
\( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\(\newcommand{\longvect}{\overrightarrow}\)
\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)
\(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)Artificial Intelligence and the New Human Condition
AI is no longer science fiction; it mediates who gets jobs, loans, parole, and even healthcare.
Its algorithms learn from data that mirror social inequalities, transforming bias into code.
Cathy O’Neil (2016) calls these Weapons of Math Destruction—opaque systems that appear neutral but perpetuate discrimination at scale.
Algorithmic Accountability
Research by Joy Buolamwini and Timnit Gebru (2018) revealed commercial facial-recognition systems misidentified darker-skinned women up to 35 percent of the time.
These findings spurred legislative proposals such as the U.S. Algorithmic Accountability Act (2022) and the EU’s Artificial Intelligence Act (2024).
Meanwhile, UNESCO’s Recommendation on the Ethics of AI (2021)—ratified by 193 member states—urges fairness, transparency, and human oversight in algorithmic governance.
AI and the Right to Work
Automation reshapes labor markets.
According to the World Economic Forum (2023), 44 percent of workers’ skills will be disrupted within five years.
While AI may create new industries, it also displaces millions in logistics, manufacturing, and clerical work.
Scholars like Nick Srnicek and Alex Williams (2015) argue for post-work politics: decoupling livelihood from employment through universal basic income and collective control over automation benefits.
AI and the Right to Life
Autonomous weapons—“killer robots”—raise profound ethical dilemmas.
The Campaign to Stop Killer Robots urges a global treaty banning lethal AI.
Yet, major powers resist, arguing regulation would hinder innovation.
For human-rights advocates, algorithmic decision-making in warfare collapses accountability: who is responsible when a drone makes a lethal error? (Sharkey, 2020).
Digital Authoritarianism and the Global Crackdown
China’s Model of Cyber-Sovereignty
China’s state-led internet is the most sophisticated authoritarian ecosystem on Earth.
Its Great Firewall filters foreign content while domestic platforms—WeChat, Weibo, Douyin—operate under real-name verification and keyword censorship.
The government’s Social Credit System merges financial, legal, and social data to reward or punish behavior (Creemers, 2018).
Exported through the Digital Silk Road, this model influences countries from Ethiopia to Cambodia, promoting a vision of cyber-sovereignty where the state, not the citizen, owns cyberspace.
India: Digital Democracy on Edge
India’s internet hosts both vibrant activism and growing surveillance.
The Aadhaar biometric-ID program—covering 1.3 billion people—enables welfare access but also potential state tracking (Rao, 2020).
Internet shutdowns—over 80 in 2022—make India the global leader in “kill-switch” censorship (SFLC, 2023).
The Digital Personal Data Protection Act (2023) aims to strengthen privacy but exempts broad government surveillance powers, reflecting democracy’s internal contradictions.
Russia: The Sovereign Internet Law
Since 2019, Russia’s Runet architecture allows authorities to route all internet traffic through state-controlled nodes.
Combined with repressive laws on “fake news” and “foreign agents,” this infrastructure enabled near-total information control during the Ukraine war (Bermejo, 2023).
Yet digital dissidents use VPNs, encrypted apps, and satire to resist—a cyber cat-and-mouse game where humor becomes subversion.
The Middle East and North Africa
After the Arab Spring’s promise, regimes learned to weaponize the web.
Egypt, Saudi Arabia, and UAE employ spyware like Pegasus to monitor activists (Citizen Lab, 2022).
Women bloggers such as Loujain al-Hathloul faced imprisonment for online dissent.
Still, digital networks remain lifelines for organizing—from Iran’s #MahsaAmini protests to Lebanon’s economic-justice movements.
Cyber-Activism and Networked Resistance
Digital activism combines speed with fragility: hashtags go viral but can fade overnight.
Scholar Zeynep Tufekci (2017) argues that networked movements mobilize crowds quickly yet struggle with long-term strategy compared with older, hierarchical organizations.
The #ArabSpring
Between 2010 and 2012, online platforms catalyzed protests in Tunisia, Egypt, and beyond.
While not caused by social media, digital tools accelerated coordination and global visibility (Howard & Hussain, 2013).
However, authoritarian backlash was equally swift; surveillance technologies turned “liberation tech” into “repression tech.”
Hong Kong’s Umbrella Movement and 2019 Protests
Hong Kong protesters used encrypted messaging, AirDrop leaflets, and creative memes to evade censorship.
Their leaderless “be water” tactics embodied agile, fluid resistance (Lee & Chan, 2020).
Beijing’s subsequent National Security Law (2020) criminalized dissent, illustrating both the power and peril of digital mobilization.
#BlackLivesMatter and Global Solidarity
Originating in 2013 after Trayvon Martin’s death, #BLM spread worldwide following George Floyd’s murder (2020).
The movement used TikTok and Twitter to expose systemic racism and police violence while inspiring transnational coalitions (Freelon et al., 2020).
Algorithmic amplification also introduced risks: activists faced doxxing, troll armies, and platform moderation bias.
Fridays for Future and Digital Climate Citizenship
Youth climate activists leverage digital media to coordinate global strikes.
Their online reach translates into street action, redefining citizenship around planetary responsibility (de Moor et al., 2021).
The movement shows that technology can sustain collective hope amid ecological anxiety.
Regional Case Studies: Tech and Human Rights in Practice
A. The European Union – Regulating Big Tech
The EU positions itself as the world’s digital regulator.
The General Data Protection Regulation (GDPR) (2018) established privacy as a fundamental right with global spillover effects (Bennett, 2018).
The Digital Services Act (2022) and Digital Markets Act (2023) extend accountability to content moderation and monopoly power.
Critics warn that compliance costs burden smaller firms, yet these laws set benchmarks for data protection and platform governance worldwide.
B. The United States – Corporate Libertarianism
The U.S. model relies on market self-regulation and First Amendment protections.
Section 230 of the Communications Decency Act (1996) shields platforms from liability for user content, enabling innovation but also disinformation (Balkin, 2020).
Recent hearings on TikTok and Twitter expose bipartisan frustration over foreign influence and content moderation.
While California’s CCPA (2020) mimics GDPR, federal privacy legislation remains fragmented.
C. Kenya and the Digital Frontier in Africa
Kenya is a continental tech hub nicknamed “Silicon Savannah.”
The M-Pesa mobile-money system (2007) expanded financial inclusion but sparked concerns over data security and state monitoring (Mas & Ng’weno, 2010).
Kenya’s 2019 Data Protection Act modeled on GDPR marks progress, yet implementation lags.
During elections, micro-targeted ads by foreign consultancies echo Cambridge Analytica’s influence, raising questions about digital sovereignty (Njoroge, 2022).
D. Brazil – Democracy Under Disinformation
Brazil’s 2018 and 2022 elections showcased WhatsApp’s role in spreading political misinformation (Resende et al., 2019).
The “Fake News Bill” debated in Congress seeks transparency without censorship, balancing rights and responsibility.
Grass-roots fact-checking collectives like Aos Fatos and Agência Lupa demonstrate civic innovation in the Global South.
E. South Korea – Smart Society and Privacy
As one of the most connected societies, South Korea illustrates the paradox of technological efficiency and personal risk.
COVID-19 contact-tracing apps helped contain the virus but sparked debates about proportionality and data retention (Kim & Kim, 2021).
The Korean Personal Information Protection Commission (2020) is now a global reference for pandemic-era rights management.
Cybersecurity vs. Cyber Freedom
Governments justify digital control in the name of security.
Yet cybersecurity and human rights need not conflict.
The Tallinn Manual (2017) interprets international law for cyber operations, affirming that states must avoid harming civilians.
Meanwhile, cyberattacks on hospitals and critical infrastructure during COVID-19 exposed how digital conflict can become humanitarian crisis (UN ODA, 2021).
Civil society groups urge a “human-centric cybersecurity” approach — protecting people first, networks second (Access Now, 2022).
This reframes security from national defense to collective care, linking digital rights to peacebuilding itself.

