Global Information Society Watch 2011

Home > Other > Global Information Society Watch 2011 > Page 8
Global Information Society Watch 2011 Page 8

by APC APC


  * Denotes lack of data due to the US comprehensive economic embargo on Iran, Sudan and Syria. There is no official Facebook data for these countries due to the trade embargo – technically they are not supposed to be offered Facebook, which is a US product.

  Sources: International Telecommunication Union 2009 (www.itu.int/ITU-D/ICTEYE/Indicators/Indicators.aspx)

  and Social Map (geographics.cz/socialMap, statistics are from May 2011)

  ICT access in MENA

  Calling the uprisings in Tunisia and Egypt Twitter or Facebook revolutions overlooks information and communications technology (ICT) access in these countries. In 2009 in Tunisia and Egypt there were only 34.1 and 24.3 internet users per 100 inhabitants respectively. In Egypt only 7% of inhabitants are Facebook users, while 16% are Facebook users in Tunisia. From the ICT access and usage figures listed in Table 1, there is little correlation between ICTs and the level of unrest.

  Throughout MENA social networking users generally comprise a minority of the population. Claims that UGC speaks for the demonstrators must be taken critically. The usage of the internet in developing countries is often disproportionately urban. Media attention is generally drawn to urban protests, for example, Cairo, Alexandria, Tunis, Tripoli and Benghazi. Use of UGC and social media also often reflects income and literacy biases.

  Nonetheless, many protesters used UGC to express popular demands. Linkages were demonstrated between the mobilisation of demonstrators by social media as well as offline (on-the.ground) mobilisation.110

  UGC and social networking in MENA

  The terms “Twitter revolution” or “Facebook revolution” may not be accurate. The assertions that “the revolution will be tweeted” and “the revolution will be streamed” have more credence in the cases of Egypt, Tunisia, Syria, Bahrain and Libya. Many used mobile phones to organise demonstrations and to spread their messages. UGC and social networking platforms play an important role in protests and political transitions, but not necessarily a decisive one.

  Before investigating the usage of UGC, the context of its use in MENA will be examined by looking at internet freedom in the region.

  Internet freedom in MENA

  In November 2005, Reporters Without Borders (RSF) listed fifteen “enemies of the internet”, four of which were in MENA: Libya, Saudi Arabia, Syria and Tunisia. In 2010, RSF listed twelve enemies of the internet, including Saudi Arabia, Egypt, Syria and Tunisia. In March 2011, only Saudi Arabia and Syria were “enemies of the internet”, although Bahrain, Belarus, Egypt, Libya, Tunisia and the United Arab Emirates (UAE) were listed as “under surveillance”. Saudi Arabia, Syria and Egypt had netizens in prison.111

  Internet filtering is common in MENA. The OpenNet Initiative reports that Bahrain, UAE, Qatar, Oman, Saudi Arabia, Kuwait, Yemen, Sudan and Tunisia used Western technologies to block internet content, “such as websites that provide sceptical views of Islam, secular and atheist discourse, sex, GLBT [gay, lesbian, bisexual and transgender content], dating services, and proxy and anonymity tools.”112

  According to a 2007 study of Arab media, “the impact of censorship across the region is mixed.” Despite persistent censorship, “governments have not been able to silence dissent on the internet.”113

  The use of UGC and social networking in protest in MENA

  Mohammed Bouazizi was a poverty-stricken Tunisian vegetable trader from the small town of Sidi Bouzid who had been repeatedly harassed by the police, who often asked him for bribes and confiscated his wares. In the last encounter they beat him. After being denied an appointment with a local government official to discuss this harassment, he doused himself with fuel and set himself alight in a public square. He died in hospital weeks later.

  News of Bouazizi inspired protests in Sidi Bouzid, elsewhere in Tunisia, and throughout MENA. Initially television and print media were slow to pick up on the story. Often state media in MENA avoided reporting on it. Some internet content (like YouTube) was blocked at the time by the Tunisian internet filter. Facebook, which was not blocked at the time, became an important platform for spreading news of Bouazizi and the Sidi Bouzid revolt. Twitter was also instrumental in covering the protests.

  Around the globe, many used Twitter and Facebook as a first port of call for information about Tunisia. UGC about events in Tunisia served to inspire people throughout the region. Egyptian activist Gigi Ibrahim, upon witnessing the downfall of Tunisian President Zine al-Abidine Ben Ali, tweeted: “The Tunisian revolution is being twitterised...history is being written by the people #sidibouzid #Tunisia.”114

  In Egypt, Facebook and Twitter were used to announce and publicise the planned protests on 25 January 2011. Facebook groups such as We are all Khaled Said115 and the 6th of April Youth Movement116 called for demonstrations. The plans and message of the protest were also disseminated through conventional means like word of mouth, photocopies and emailing of a PDF file explaining the plans for the protests.117

  Facebook was used to announce protests in other countries in the MENA region. Many protests in 2011 were supported by Facebook pages, events and groups. UGC communicated the messages of protesters nationally, regionally and globally, and provided live coverage, news and opinions. On Twitter, protests (both online and off-line) had their own Twitter hashtags. The Twitter hashtags #SidiBouzid, #Jan25, #Jan30, #Feb14, #Feb17, #Mar11/#ksa/#tal3mrak,118 #Yemen/#Yamen, #Kuwait, and #Syria were used for protest in Tunisia, Egypt, Sudan, Bahrain, Libya, Saudi Arabia, Yemen, Kuwait and Syria respectively.

  UGC acted as a conduit for news around unfolding events not covered by or outside the reach of the conventional media. Micro-blogging and picture and video sharing over mobile phones became avenues to disseminate and consume news about protests. The nexus of UGC and mobile phones is an important tool for protesters to inform the world of their demands, the events surrounding the actual protests, and the nature of police, military and civilian responses. UGC often offers views and perspectives that state.run and conventional media do not offer, as well as images that other media cannot record. In Syria, where access by international journalists has been almost completely restricted, mobile phone videos have become one of the few ways to report on protests.

  State responses to UGC and social networking

  Many have commented on the power of social media in the hands of protesters and activists. What of state responses to UGC and social networking during the protests? How have UGC and social networking websites been used by incumbent regimes in response to protests?

  Goliath and the mouse? Twitter revolutions and cyber crackdowns

  An online campaign by the International Society for Human Rights (ISHR) depicts challenged incumbent leaders gripped by fear of the revolutionary potential of ICTs. The presidents of Iran, Zimbabwe, Venezuela and Cuba, Colonel Muammar Gaddafi of Libya and North Korea’s Kim Jong-il, are portrayed cowering in near paralytic fear of a computer mouse, jumping on furniture and hanging from chandeliers and curtains in an attempt to flee.119 The real balance of power in the electronic terrain, however, is not necessarily in favour of the mouse. The campaign could have been balanced with other images: boots crushing mice, keyboards and mobile phones after being identified as threats for spreading content. Or perhaps the regime’s technicians unplugging the mice, terminating lines of communication.

  UGC and the infrastructures through which it flows are areas of contestation between protesters and pro-incumbent groups, not necessarily balanced in favour of those creating content for protest.

  Some governments used internet filters to block content during the protests. In Tunisia, Egypt, Libya, Syria and allegedly Gaza there were state crackdowns on UGC and the internet in general through internet blackouts and slowdowns.120

  The Mubarak regime virtually shut down all Egyptian access to the internet from midnight 27/28 January until 2 February 10:30 GMT.121 In Libya, the internet was blocked to most Libyans from the beginnings of the protests in areas under Gaddafi control.122
Hours after the internet had gone back up, Egyptian security forces arrested, detained and harassed bloggers and Facebook and Twitter users who had shared content or publicised and attended events.

  In Tunisia, the Ben Ali regime stole usernames and passwords for Facebook, Twitter and online email accounts by injecting Java scripts into the content of these pages before they were sent to end-users.

  Twitter and Facebook have been used by security and intelligence agencies to identify and locate activists and protesters. In North Sudan, where Facebook groups announced protests against the regime, the government actively monitored social networking websites. When protests did happen, many potential demonstrators found police waiting for them and were arrested.123

  In Azerbaijan, influenced by events in Egypt, a number of Facebook pages and groups called for protests in early 2011. An opposition activist was arrested and charged with possession of narcotics. Many believe he was detained for comments he made on Facebook calling for Egypt-style protests.124 Amnesty International called the charges a “pretext to punish Jabbar Savalan for his political activism and to discourage other youth activists from exercising the right to freedom of expression.”125

  Crackdowns on internet communications during protests were not only witnessed in MENA in 2011, but also in the United States (US) and United Kingdom (UK). In response to protests in the UK, the government has asked for cooperation from Research in Motion (RIM) – the creators of the Blackberry smartphone – to provide it with encryption keys in order to be able to eavesdrop on the Blackberry Messenger service (BBM). The UK government has summoned Twitter, Facebook and RIM to a meeting discussing ways to restrict the use of social media during civil unrest.126 The San Francisco Bay Area Rapid Transit (BART) authority (a state.owned transport corporation) shut down mobile phone access at subway stations as a response to planned protests against the killing of a homeless man by the BART Police.127

  Problems presented by the use of UGC in struggles for democracy and human rights

  Social media and surveillance

  As WikiLeaks’ Julian Assange recently noted, the internet is not only a force for openness and transparency, “it is also the greatest spying machine the world has ever seen.”128 Social networking platforms often link an online identity to a real name, home town, occupation, interests, pictures, and network of friends – providing many opportunities for surveillance.

  Information on social networks may potentially be mined by third-party applications and advertisers. Facebook’s API,129 which is a language or set of commands for retrieving information from Facebook, is openly accessible by anyone turning their account into a developer account. The API makes it easy to obtain and analyse such information.130

  Mobile phones and geolocation

  Facebook and Twitter, as well as mobile phone applications, offer geolocation functionality, which may add location to a user’s content. The position of a mobile phone can be tracked by mobile operators, and potentially by governments or third parties. Under certain circumstances the use of the mobile internet can actually enhance the surveillance capabilities of repressive regimes.

  Removal of UGC from social networks

  Facebook policies can often result in the Facebook pages of political activists being shut down. The “We are all Khaled Said” Facebook page, which was used (among others) to call for protests on the 25 January revolution in Egypt, was actually opened in June 2010 but was quickly shut down by Facebook. This was because the user who opened the account – “El Shaheed” – was not using a real name. Facebook’s terms of service prohibit the use of fake names or monikers.

  In the UK in April 2011 a group of students from University College London called UCL Occupation, protesting over fee increases and cuts to higher education funding, claimed that in twelve hours Facebook had deleted over 50 Facebook profiles of activists in the UK.131

  Guy Aitchison, a student at UCL and blogger for openDemocracy.net, said:

  These groups are technically in violation of Facebook’s terms of agreement (…). But the timing – on the royal wedding and May Day weekend – is deeply suspicious. (...) [T]his purge of online organising groups could be linked to the wider crackdown on protest by authorities in Britain. Either way, it is a scandalous abuse of power by Facebook to arbitrarily destroy online communities built up over many months and years [which] provide a vital means for activist groups to communicate with their supporters.132

  Facebook officially responded to UCL Occupation with the following explanation and advice:

  Facebook profiles are intended to represent individual people only. It is a violation of Facebook’s Statement of Rights and Responsibilities to use a profile to represent a brand, business, group, or organization. (...) If you would like to continue representing your organization on Facebook, we can convert your profile to a Page.133

  In Palestine a page calling for a “Third Palestinian Intifada” was shut down. It was seen by some as hate speech and reported to Facebook.134 Many wondered why all other Arab countries were allowed to have pages dedicated to a “day of rage” against their governments, but one was not allowed for a protest against Israeli occupation.

  These examples demonstrate that it is not users of the platforms, but the social networking or content platforms themselves, that have ultimate control of their content.

  Reliability and veracity of UGC

  UGC can be used for misinformation and propaganda. UGC presents problems with regards to the reliability and veracity of information. A famous example from MENA was that of the “lesbian Syrian blogger” who turned out to be a married US man.135 This ended up being counterproductive for the protest movement and fuelled rumours of foreign intervention in protests, propagated by the Syrian government. Social networks can be mechanisms for spreading rumour and falsehood. As there is usually no moderation of this content, it is the responsibility of the user to critically examine the veracity of UGC.

  Sockpuppetry and astroturfing

  “Sockpuppets” are an important problem in UGC. Wikipedia defines a sockpuppet as “an online identity used for purposes of deception within an online community” and, in earlier usage, “a false identity through which a member of an Internet community speaks with or about himself or herself, pretending to be a different person.”136 “Astroturfing” is using sockpuppets on a larger and organised scale, designed to fake the appearance of grassroots or “netroots” movements (conventionally the word “astroturf” refers to synthetic grass). Astroturfing can disseminate views that appear to be legitimate and spontaneous, but are actually campaigns by political or commercial identities.137

  Members of the hacktivist collective Anonymous claim to have discovered the existence of an advanced astroturfing software allegedly commissioned by the US Air Force.138 This software can create online identities with corresponding social networking profiles on multiple platforms, which can create content with identities that appear contingent to previous posts, as well as according to culture, age or gender. This software is also a surveillance platform, as “fake friends” on social networks to monitor unsuspecting users.139 The possible existence of this software raises important concerns about the nexus of UGC and astroturfing.

  Conclusion

  UGC, social networks and mobile phones are not unequivocally tools for the benefit of protesters, but rather a part of a contested terrain used by both governments and protest movements in societal conflicts and transitions. Social networking sites like Facebook and Twitter could be used to spy on protesters, find out their real-life identities and make arrests and detentions.

  These dilemmas will remain relevant in Egypt and Tunisia now that political transitions have started. Egypt and Tunisia both remain under military rule. Democracy and freedom to create and distribute content will not necessarily prevail. Neither will the role of UGC and social networking sites cease to be of relevance.

  UGC is still being used actively in Egypt and Tunisia to expose violations of t
he security forces. In Egypt, the military recognised the power of Facebook and made a Facebook page after the fall of Mubarak to try to garner support and make peace with the protesters.

  The transition in Egypt and Tunisia is still unfolding – elections need to be planned, political parties organised, reorganised and new ones formed. These processes cannot be conducted today without the internet and ICTs.

  Some issues the online activist needs to bear in mind include:

  Anonymity and monikers

  User-generated content can, if not used carefully, expose content creators to surveillance. Many UGC platforms do not allow for anonymity. In light of the concerns raised above about astroturfing and sockpuppetry, anonymity is not ideal for activism, especially if the source of the activism is not known. Nonetheless, in the context of repressive regimes, the protection afforded by anonymity does have its merits.

  Anonymity cannot and should not, as Randi Zuckerberg, ex-marketing director of Facebook has suggested, “go away.”140 Despite calls by some authorities – the British Police for example – to end the use of anonymous monikers on platforms like Twitter,141 many platforms will not do this. There are legitimate reasons (including personal security) for activists not to use their real names. Content creators should be informed about the possibilities of creating content anonymously and securely and decide whether to use real names or monikers. If anonymity is chosen, creators of content must be aware that small things like a network of real-life friends, one picture or an accidental use of geolocation could expose a user’s identity.

  Safe and informed use of social networking

  UGC and social networking present the challenge of balancing activism with privacy and online safety. Different platforms offer different strengths and weaknesses regarding the often diverging goals of activism and privacy: Facebook does not allow for anonymity, and the use of monikers is not permitted, while Twitter does allow monikers.

  Facebook users need to be aware of the range of possible privacy settings and their implications. Privacy settings can protect users, but minimal privacy settings in certain conditions may be useful for online activism to build and coordinate communities, and spread content virally.

  Each platform for the creation and dissemination of UGC, as well as each social networking website, has terms and conditions which users should be aware of. Users should also be aware of the national legal and regulatory environments governing privacy and the internet in the countries in which these UGC platforms are hosted.

  Backup and mirroring of content

  At the end of the day, it is the social networking platform or content platform on which the content is hosted that has the ultimate control over their online content. Unless, of course, users have this content backed up or mirrored (duplicated on another website).

  There are alternatives to Facebook

  It would be beneficial if activists were afforded access to social networking tools that they could exercise more control over, especially with regards to the hosting of their content, and their privacy and anonymity.

  There are alternatives to social networking platforms such as Twitter or Facebook. The social networking platform Diaspora is nodal and peer-to-peer. Users can host their own identities or “pods”, and choose from a range of hosts to host their pod on.

  Self-hosted or smaller social networking platforms have many advantages. However, they may not be able to invest as much in security as their larger counterparts. Even big “brand” social networks can experience problems securing private data.

  UGC under surveillance

  If the avoidance of state surveillance is required, certain practices should be followed wherever possible when disseminating UGC. Platforms offering end-to-end encryption should be defaulted to wherever possible. Facebook, Twitter and other social networking applications, web-based email and web-based applications should always be accessed through HTTPS encryption if it is available (by typing https:// instead of https:// before a web address).142 HTTPS will help avoid the stealing of usernames and passwords as well as eavesdropping. Anonymising tools such as proxies, virtual private networks (VPNs) and Tor can also be used for protecting the identity of content creators, as well as for circumventing filtering and censorship. Tor has been particularly helpful in protecting activists and journalists in the MENA region.143

  The internet and social movements in North Africa

 

‹ Prev