Revolutionary Code
Why we need more conscious and collaborative social movement technologies.
Standing in the crowd of Tahrir Square, Gigi Ibrahim quickly typed and posted to Twitter: 鈥淧ro-Mubarak march now coming into Tahrir in 鈥榓 big number鈥 and it will get ugly.鈥
Like thousands of others, Ibrahim used social media to share the police brutality and human rights abuses of the 2011 Egyptian Revolution with the world. In response, the Egyptian government shut down the internet and SMS for nearly a week. In the years since, organizations have stepped in with new technologies promising to help activists like Ibrahim avoid this type of backlash, creating tools that enable users to circumvent internet shutdowns and surveillance. These developers have designed mesh networks, self-healing networks that enable smartphones or wireless routers to connect to one another via Bluetooth or WiFi without an internet connection, and apps that encrypt end-to-end internet traffic, creating additional security strongholds that enable protesters to anonymously communicate.
But there鈥檚 a problem with these technologies: many of them still have significant cybersecurity vulnerabilities or are so difficult to use appropriately that they put the lives of dissidents at risk. It鈥檚 more important than ever to address them, and to build better systems, in part because internet shutdowns, or intentional disruptions of the internet or electronic communications through blocking, throttling, or other barriers, are on the rise globally across both developing and developed countries. In 2015, there were 15 documented government-initiated internet shutdowns worldwide; In the first six months of 2016 alone, there have been 20. This has not been without response from the international community: on July 1, 2016, the UN passed a landmark resolution condemning internet shutdowns, reaffirming that human rights exist off and online.
And there has been a response from developers, too. After increased government-initiated shutdowns, the use of mesh network and encryption technologies are growing globally. During the 2014 pro-democracy protests in Hong Kong, ,聽a platform that forms a mesh network through smartphones, was used to enable peer-to-peer communication among nearly half a million protesters. The Open Technology Institute (which, in the interest of full disclosure, is a program at 国产视频) has developed , a free, open-source tool that creates mesh networks from wireless devices. The technology has been deployed in Sayada, Tunisia, providing a free community WiFi network that can be used for dissident communication as well as social and economic endeavors. The Tor Project offers 鈥溾 a free proxy app that encrypts internet traffic, enabling protesters to remain anonymous. WhatsApp, a free instant messaging service popular in developing regions and used by billions, end-to-end encryption in light of its use for dissident communication and retaliation by repressive governments.
And while information and communication technologies (ICTs) have altered protest dynamics, providing activists with an unprecedented mechanism for real-time mobilization and documentation, security vulnerabilities still put users at risk. In late July 2016, Iranian hackers revealed over a dozen accounts belonging to opposition journalists and activists on the instant messaging app, Telegram, and exposed the telephone numbers of over 15 million users. Telegram was also found to record text-based communications distributed through its end-to-end encrypted 鈥渟ecret鈥 mode on the sender鈥檚 device, creating the potential vulnerability that apps downloaded to their device could collect what were supposed to be encrypted, secret messages. Telegram reports that this bug has since been fixed.
Telegram, and other developers, can avoid some of these problems in a few key ways. First, by being aware that their tools may be used as social movement technologies, and then responding with implementation of end-to-end encryption and regular testing for security weaknesses. Those that implement end-to-end encryption and pass the tests can be identified with a standard 鈥渟eal of social movement approval.鈥 At the same time, there are no guarantees in the security world. That鈥檚 why these technologies should also include a warning that security vulnerabilities could still exist.
Even the most secure social movement technologies will not be used or will be used inappropriately if they are not user friendly. Developers should consult with end users to ensure a balance between technical solutions and user needs. Internews is leading in this domain with their recent launch of the , an initiative to connect communities facing digital security risks with digital security trainers, usability experts, and security developers to co-design tools that are both secure and usable.
The greatest impact of social movement technologies is found in its ability to utilize data analytics to quickly identify and communicate emerging trends. Developers should enable the aggregation and communication of data insights to end users. For example, multiple data points can be aggregated and analyzed to communicate the likelihood that a particular area is or is likely to become violent and provide insights on the changing dynamics and mission of a social movement. Caution should be taken to present data insights in aggregate form in order to not identify individual protesters.
Nevertheless, as use of ICTs as social movement technologies increases, so, too, will the need to ensure that these platforms are resilient, secure, and pragmatic. In order to make certain that they do, developers must consistently identify and mitigate cybersecurity vulnerabilities by closely collaborating with end users to create technically secure and usable technologies. A future in which we do otherwise will, to borrow Ibrahim鈥檚 parlance, get ugly.
Brandie Nonnecke is a postdoctoral fellow at CITRIS and the Banatao Institute at UC Berkeley. More info on her research is available at .