Category Archives: Digital Activism

FSI09: Lessons from Serbia’s Civil Resistance

The fifth presentation at the Fletcher Summer Institute (FSI) for the Advanced Study of Nonviolent Conflict addressed the lessons learned by the Otpor student movement in Serbia. This presentation addressed the strategies and tactics that can lead to successful civil resistance.

otpor

Unity, Planning and Nonviolent Discipline are three main principles key to nonviolent struggle. These principles have obvious parallels with military principles. Nonviolent discipline is especially critical.

You can have 100,000 people demonstrating nonviolently in the streets but as soon as one person picks up a stone and throws it at the police, this is what the media will focus on and gives the regime the “excuse” to crack down. One participant noted that in their country, the regime sends criminals to pick fights and turn nonviolent protests violent. In this case, one tactic that could help mitigate this issue is to have women be on the front lines because police is less likely to use force against them.

Here are the 10 lessons learned from Otpor’s resistance in Serbia:

  1. Taking an offensive approach. The moment you start responding to what the regime does, you are losing your momentum. Keep moving, always, just like sharks.
  2. Understanding the concept “power in numbers”. Draw on the multi-level marketing model: “Act, Recruit and Train.”
  3. Developing an Effective Communication Strategy. There are typically 4 crucial target audiences: Members and supporters; Wider audience; Potential allies within oppositional parties and NGOs; and International community.
  4. Creating a Perception of  a Successful Movement. Pick the battles you can win; know when and where to declare victories.
  5. Investing in Skills and Knowledge of Activists. This is always appreciated by your members and helps foster group cohesion.
  6. Cultivating External Support. Solicit external support early but be deliberate as to whether you make that support public or not.
  7. Inducing Security Force Defections. Security forces are a key pillar of support to the regime. Most are not interested in acting with violence; they have families they need to feed. Those who take pleasure in torture have wives or girlfriends, find out where the latter shop, put pictures of their husbands with the question: “Why is X torturing our sons?” If you have the person’s phone number, add that to the poster and add “To find out, call X at #”.
  8. Resisting Oppression. Decentralize leadership and engage in extensive training to prepare activists to avoid surprises and overcome effects of fear. Share motivating messages (e.g., to the police).
  9. Using Elections as a Trigger. These create an atmosphere of “social referendum” while creating a wide coalition among political parties and broader consensus with civil society.
  10. Enabling Peaceful Transition of Power. Key state stakeholders need to be rapidly restored after “nonviolent revolution” to demonstrate democratic dividends right away.

I’ve found the past two days of conversations at FSI 2009 thought-provoking. There are many parallels between civil resistance tactics/strategies and the study of complexity science and complex systems.

One of the key challenges of nonviolent action is to scale the number of participants in the movement. Numbers matter. So how does one influence micro-motives so that they lead to macro-behavior—or emergent behavior. One way to influence micro-level motives in complex social systems is to create incentive mechanisms.

How does one communicate and synchronize these incentives? Enter the importance of communication technology.

Patrick Philippe Meier

FSI09: Lessons from Serbia’s Civil Resistance

The fifth presentation at the Fletcher Summer Institute (FSI) for the Advanced Study of Nonviolent Conflict addressed the lessons learned by the Otpor student movement in Serbia. This presentation addressed the strategies and tactics that can lead to successful civil resistance.

otpor

Unity, Planning and Nonviolent Discipline are three main principles key to nonviolent struggle. These principles have obvious parallels with military principles. Nonviolent discipline is especially critical.

You can have 100,000 people demonstrating nonviolently in the streets but as soon as one person picks up a stone and throws it at the police, this is what the media will focus on and gives the regime the “excuse” to crack down. One participant noted that in their country, the regime sends criminals to pick fights and turn nonviolent protests violent. In this case, one tactic that could help mitigate this issue is to have women be on the front lines because police is less likely to use force against them.

Here are the 10 lessons learned from Otpor’s resistance in Serbia:

  1. Taking an offensive approach. The moment you start responding to what the regime does, you are losing your momentum. Keep moving, always, just like sharks.
  2. Understanding the concept “power in numbers”. Draw on the multi-level marketing model: “Act, Recruit and Train.”
  3. Developing an Effective Communication Strategy. There are typically 4 crucial target audiences: Members and supporters; Wider audience; Potential allies within oppositional parties and NGOs; and International community.
  4. Creating a Perception of  a Successful Movement. Pick the battles you can win; know when and where to declare victories.
  5. Investing in Skills and Knowledge of Activists. This is always appreciated by your members and helps foster group cohesion.
  6. Cultivating External Support. Solicit external support early but be deliberate as to whether you make that support public or not.
  7. Inducing Security Force Defections. Security forces are a key pillar of support to the regime. Most are not interested in acting with violence; they have families they need to feed. Those who take pleasure in torture have wives or girlfriends, find out where the latter shop, put pictures of their husbands with the question: “Why is X torturing our sons?” If you have the person’s phone number, add that to the poster and add “To find out, call X at #”.
  8. Resisting Oppression. Decentralize leadership and engage in extensive training to prepare activists to avoid surprises and overcome effects of fear. Share motivating messages (e.g., to the police).
  9. Using Elections as a Trigger. These create an atmosphere of “social referendum” while creating a wide coalition among political parties and broader consensus with civil society.
  10. Enabling Peaceful Transition of Power. Key state stakeholders need to be rapidly restored after “nonviolent revolution” to demonstrate democratic dividends right away.

I’ve found the past two days of conversations at FSI 2009 thought-provoking. There are many parallels between civil resistance tactics/strategies and the study of complexity science and complex systems.

One of the key challenges of nonviolent action is to scale the number of participants in the movement. Numbers matter. So how does one influence micro-motives so that they lead to macro-behavior—or emergent behavior. One way to influence micro-level motives in complex social systems is to create incentive mechanisms.

How does one communicate and synchronize these incentives? Enter the importance of communication technology.

Patrick Philippe Meier

FSI09: Failed States and Civil Resistance

My former Professor Richard Shultz gave the fourth presentation at the Fletcher Summer Institute (FSI) for the Advanced Study of Nonviolent Conflict 2009.

Shultz placed his presentation into context by noting that he has radically changed his syllabi and created new courses in order reflect the changing global security. While security traditionally focused on armed groups, we are now focusing increasingly on non-state armed groups and more recently on non-state non-armed groups. Furthermore, violence is a subset of force. In other words, nonviolence is another force that needs to be studied within the context of failed states and civil resistance.

Authority, according to Professor Shultz is based on two characteristics: legitimacy and coercion. He addressed these within the context of strong states and weak states on the one hand and strong societies and weak societies on the other.

There are two types of strong states: those based on strong institutions of coercion not restricted by law; versus those in which the population grants or agrees that the government needs strong institutions of coercion and extraordinary powers. Whether a society is strong or weak depends on how legitimate they view the state. This produces a framework with 4 quadrants or cells (e.g., strong state, strong society).

Not surprisingly, the framework prompted discussions on whether the notions of legitimacy, consent, coercion, etc., were really so clear cut. One participant noted that whether or not a state’s institutions of coercion or strong or weak depends on what period of history we’re interest in. Also, if coercive institutions are “weak”, that may actually be due to the fact that society was able to foster political transition. Finally, states are not monolithic, the strength of states and societies will vary substantially within a country’s territorial borders.

I had hoped that the presentation would be more linked to the topic of civil resistance. For example, how do civil resistance strategies and tactics need to change depending on which cell a state falls in? Moreover, I had hoped that the presentation would address how one might engage in civil resistance in failed states, such as Somalia.

Patrick Philippe Meier

FSI09: Strategic Planning & Tactical Choices in Civil Resistance

This was my favorite presentation yet at the Fletcher Summer Institute (FSI) for the Advanced Study of Nonviolent Conflict 2009. However, WordPress totally wiped my post half-way through the talk when I tried to save the draft. Grrr. Lesson learned, draft blog posts in a text editor first.

Hardy Merriman‘s excellent presentation drew from Gene Sharp‘s 198 nonviolent tactics, which he classified into three categories: Protest and Persuasion (shift perception); Noncooperation (shift behavior, particularly effective when scaled); and Nonviolent intervention (shift status quo). Tactics can be classified in other ways as well. For example, they can be categorized into intended outcomes; or into concentration and dispersion tactics.

Planning and strategizing is imperative. Many movements fail because they were poorly planned and/or sequenced. In addition, brave actions that get media attention but result in the activist’s arrest are not advised. Tactical innovation is critical such as alternative leadership. This means adapting and keeping the asymmetric advantage.

An interesting conversation ensued regarding the process of defining strategy, operations and tactics in a nonviolent movement.  Unlike the hierarchical, top-down process in the military, resistance movements need to front load the conversation on strategy, to set up a planning committee and de-federalize the decision-making process vis-a-vis operations and tactics. Indeed, these decisions need to be made locally to tap into local knowledge and know-how.

How does one evaluate civil resistance movements? Assess whether tactics advance operational goals and whether the latter converge towards the established strategy. The best case scenario is to devise a series of tactics that don’t appear to be coherent by the adversary but ultimately come together to accomplish the movement’s operational goals and strategy.

The use of technology was also addressed. How does new technology help a civil resistance movement? Does it make tactical decisions easier or more difficult? One participant noted that sometimes one cannot not use these technologies, particularly in countries where physical assembly is illegal.

Another participant cautioned that tactical autonomy is potentially restricted with instant communication between activists engaged in street action and those coordinating the action. He noted a case he was involved in several years ago when he and colleagues took over a police station and secured the police radio equipment. Police officers in the streets who tried to radio for instructions were unable to and were not sure what to do.

One participant also mentioned that activists can use government surveillance to their advantage by spreading misinformation.

The topic of young people came up as well in the context of technology. Young people are often more tech savvy than adults and also early adapters of technology. One participant thus opined that the side with the young people is likely to win over the side without young people.

Another participant referred to the popular book “The Starfish and the Spider” to contrast the organizational structure of repressive regimes versus resistance movements. I’ve got some good notes on this book, so do email me if you’d like a copy of my notes. I’m glad that this book came up as it delves into one of my other passions, the study of complexity science and complex systems.

Patrick Philippe Meier

FSI09: Geopolitical Constraints vs Opportunities in Civil Resistance

This is the second presentation at the Fletcher Summer Institute (FSI) for the Advanced Study of Nonviolent Conflict 2009. The presentation focuses on “The Geopolitical Constraints and Opportunities for Civil Resistance.” Note that you can also follow #FSI09 on Twitter.

The thesis of this talk is that changes in geopolitical forces accelerate the frequency of nonviolent conflict. (My question is whether this claim is even falsifiable?).

The use of nonviolent strategies is ascendant and nonviolent movements are influenced by geopolitical forces. Geopolitics describes international politics in geographic terms, i.e., “the term has applied primarily to the impact of geography on politics.”

The weakened role of the state in international politics may in part explain the rise of civil resistance. (Note that I disagree with the argument that states are less significant actors). Fundamental trends in communication technologies and the global media may also explain this rise. In addition, the notion of “soft power” is in line with the strategies and tactics employed in resistance movements.

Perhaps the most compelling argument for me vis-a-vis the rise of nonviolent resistance is the promotion of democracy via global institutions and norms; the focus on democratic peace theory and civil society networks. That said, I’m still not sure how drawing on geopolitics as a framework to situate and explain civil resistance adds to our understanding of nonviolent conflict.

Moreover, as one participant noted, shouldn’t we frame the question as follows: how do social movements influence geopolitics, rather than vice versa?

In any case, I’m glad to note that much of the conversation generated by the presentation focused on the impact of communication technology on geopolitics while keeping a healthy dose of skepticism. One participant made a comment that I make all the time; namely that networks of activists are more likely to learn and adapt to changes in technology than centralized, hierarchical regimes are.

Somewhat surprisingly, the concept of the dictator’s dilemma was overlooked.

The dictator’s dilemma suggests that globalization has produced a lucrative global information economy that repressive regimes are interested in exploiting. However, as they gear the domestic economy to take advantage of the information economy, they give up some control on how technology is used within their borders.

One final note, I think there is an evolutionary dynamic at play, just like there is with warfare. We describe Al Qaeda’s approach as fourth generation warfare, i.e., decentralized tactics, since this give the group an asymmetric advantage over a more centrlaized military power such as the US.

In other words, Al Qaeda’s approach make logical sense. In this same way, perhaps more movements recognize that nonviolent civil resistance is indeed a Force More Powerful.

Patrick Philippe Meier

FIS09: Introduction to Civil Resistance

My notes on the opening presentation at the Fletcher Summer Institute (FSI) for the Advanced Study of Nonviolent Conflict 2009. You can also follow #FSI09 on Twitter.

Using the term “nonviolence” is often unhelpful and counterproductive. The term denotes an ethical stance that opens up all kinds of philosophical debates. Instead of using this adjective, we should use the verb “civil resistance” which denotes the use of highly disruptive actions by the many against the few.

Some quotes

“Power concedes nothing and it never will. Find out just what any people will quietly submit to, and you have found out the exact measure of injustice and wrong which will be imposed upon them,  and these will continue until they are resisted.” – Frederick Douglass

“Any people anywhere, being inclined and having hte power, have the right to rise up, and shake off the existing government, and form a new one that suits them better.” – Abrahm Lincon

Leo Tolstoy predicted that “public opinion” would change the “whole structure of life” making violence “superfluous”.

“England can hold India only by consent. We can’t rule it by the sword.” – Sir Charles Innes

“The sudden dramatic breakdown of power that ushers in  revolutions reveals in a flash how civil obedience-to laws, to rulers, to institutions – is but the outward manifestation of support and consent.” – Hannah Arendt

Gandhi was not shy about using direct analogies to violent conflict, he referred to “nonviolent weapons” such as active interference, protests and resignations. Gene Sharp added the following categories: Protest/Persuasion; Noncooperation; Intervention.

Depriving the oppressor of consent reduces his legitimacy. The refusal to cooperate increases the costs of holding control. The legitimacy of the system drops while costs of maintaining the status quo increases, which prompts enforcers of the system to doubt its endurance (and possibly switch sides).

Nonviolent force was a key factor in 50 of the 67 political transitions between 1970-2005. However, there have been failures in nonviolent action, the most spectacular of which was Tienanmen. Nonviolent action often fails when it has not been planned.

Emergent properties of civil resistance

The following are key emergent properties that each activist should understand and practice.

  • Consent
    • Confers legitimacy
    • Recasts the idea of power
    • Creates space to resist.
  • Reason
    • Respect the citizen’s mind
    • Stimulates creative thinking
    • Persuasion, not coercion
    • Signals honestly, credibility
    • Instills “reason to believe”.
  • Self-Rule
    • Swaraj (ruling yourself)
    • “Constructive work”
    • Self-organization
    • Planning
    • Nonviolent discipline.
  • Representation
    • Acertaining and presenting people’s grievances
    • Listening, delegating and inviting participation
    • Humility, not hierarchy
    • Solidarity of all, not heroism of the few.
  • Resilience
    • Tactical mobilization, strategic sustainability
    • Momentum-driving action
    • Existential stakes: identifying with the cause
    • Certitude of faith in eventual success.
  • Force
    • Strategic/tactical skills
    • Target foe’s capacities
    • Disperse initiative
    • Divide loyalty structure
  • Transformation
    • No monolithic enemies
    • From destruction to debate
    • Justice only by rule of law
    • Everyone as stakeholder
    • Ends reflected in means

There are still those who argue for political violence. These arguments boil down to two points:

  • Necessary as a means to an end. “Oppression cannot be demolished except in a hail of bullets.” Bin Laden
  • Virtuous, as redemption or apotheosis. “Death is truth.” Bin Laden

Proponents of violence always have to find ways to justify death. But death is simply not popular. Nevertheless, there is a market for terror. However, a new study of 323 violent and nonviolent campaigns, 1900 to 2006: violence campaigns succeeded in 26% of cases; Nonviolent campaigns succeeded in 53% of cases.

Questions & Answers

One participant from a repressive country emphasized how important it is to make friends with the security forces, they are not the real enemy, they are simply following orders. If you prevent them from following orders, they get into trouble. So let them know you understand that and simply ask that they do not hit, push, beat as hard as they can. On the contrary, ask them to beat lightly and even pretend.

Nonviolent tactics are also being adopted by groups that do not seek to advance democratic principles and human rights. Does this pose a problem for the future of nonviolent action if repressive regimes begin using nonviolent tactics to repress? Not necessarily since a  repressive regime would not be able to scale these tactics. For these tactics to have impact, they must be viewed by the majority as legitimate and necessary.

In a case like Gaza, how does one increase the appeal of nonviolent action when everyone is armed? The mainstream media and citizen journalists can change the frame of the “logic” of violence. In my opinion, we need more gendered analysis of armed violence. Clearly, the concepts of masculinity and violence are closely tied. Perhaps nonviolence is perceived as more feminine? How do we change this?

A participant emphasized the need to equate civil resistance as guerrilla warfare without the violence. In other words, military discipline is integral to the success of nonviolent action.

One participant countered the argument that violence is attractive. People often turn to violence because they’ve witnessed violence, because they are driven by vengeance. However, fear also drives fear and paralysis. I would add a cost-benefit angle to this. Some groups in the Sudan have turned to organized violence because their options vis-a-vis other livelihoods have virtually vanished, in part because of the ecological crisis.

Patrick Philippe Meier

An Analytical Framework to Understand Twitter’s use in Iran?

The digital activism and resistance witnessed in Iran go to the heart of my dissertation research, which asks whether the information revolution empowers coercive regimes at the expense of resistance movements or vice versa? Iran is one of my case studies for my upcoming field research in addition to Burma, Tunisia and Ukraine.

Introduction

There have been a number of excellent blog posts on the intersection between technology and resistance in Iran, and especially on the use of Twitter. The mainstream press is also awash with references to Twitter’s role. For example, Agence France Presse (AFP) recently cited my research in this piece entitled “Twitter Streams Break Iran News Dam.”

However, what I haven’t seen in the blogosphere and mainstream press is the application of an analytical and theoretical framework to place Twitter’s use in Iran into context.

For example, just how important is/was Twitter’s role vis-a-vis the mobilization and organization of anti-government protests in Iran? We can draw on anecdotes here and there but this process is devoid of any applied social science methodology.

This post seeks to shed light on how, when and why information and communication technologies (ICTs) are used by resistance movements in repressive environments. The framework I draw on (summarized below) is informed by Kelly Garrett’s excellent publication on “Protest in an Information Society: A Review of the Literature on Social Movements and New ICTs” (2006).

Framework

The framework seeks to “explain the emergence, development and outcomes of social movements by addressing three interrelated factors: mobilizing structures, opportunity structures and framing processes”  within the context of ICTs. (The figure below is excerpted from my dissertation, hence the figure 4 reference).

PhDFramework

  • Mobilizing Structures are the mechanisms that facilitate organization and collective action. These include social structures and tactical repertoires.
  • Opportunity Structures are conditions that favor social movement activity. For example, these include factors such as the state’s capacity and propensity for repression.
  • Framing Processes are “strategic attempts to craft, disseminate, and contest the language and narratives used to describe a movement.”

These three factors should be further disaggregated to facilitate analysis. For example, mobilizing structures can be divided into categories susceptible to the impact of ICTs:

  • Participation levels (recruitment);
  • Contentious activity;
  • Organizational issues.

These sub-indicators are still to broad, however. Take, for example, participation levels; what is participation a function of? What underlying mechanisms are facilitated or constrained by the wider availability and use of ICTs? Participation levels may change as a function of three factors:

  • Reduction of participation costs;
  • Promotion of collective identity;
  • Creation of community.

These activities are of course not mutually exclusive but often interdependent. In any case, taking the analysis of ICTs in repressive environments to the tactical level facilitates the social science methodology of process tracing.

Application

We can apply the above framework to test a number of hypotheses regarding Twitter’s use in Iran. Take Mobilizing Structures, for example. The following hypothesis could be formulated.

  • Hypothesis 1: The availability of Twitter in Iran increased participation levels, contentious activity and organizational activity.

Using process tracing and the above framework, one could test hypothesis 1 as follows:

hypo1

These causal chains, or “micro theories,” are posited with the “⎥” marker to signify that the causal relationship is contended. The direction of the arrows above reflects the theoretical narratives extracted from the theoretical framework presented above. Note that the above “micro” theories are general and not necessarily reflective of Twitter’s use in Iran.

Iran Case Study

When the arrows are tallied, the results suggest the following general theory: there is a direct and positive relationship between the impact of Twitter and the incidents of protests and riots. The next step is to test these “micro theories” in the context of Iran by actually “weighting” the arrows. And of course, to do so comparatively by testing the use of Twitter relative to the use of mobile phones and the Internet. Furthermore, the results of this hypothesis testing should be compared to those for Opportunity Structures and Framing Processes.

I plan to carry out field research to qualitatively test these hypotheses once the first phase of my dissertation is completed. The first phase is a large-N quantitative study to determine whether increasing access to ICTs in repressive regimes is a statistically significant predictor of anti-government protests.

Patrick Philippe Meier

How To Communicate Securely in Repressive Environments

Update: The information below is now out of date, please do not blindly rely on the strategies and technologies listed!

Important: Please check the excellent comments provided by iRevolution readers below for additional tactics/technologies and corrections. The purpose of this blog post was to inform and elicit feedback so thank you very much for improving on what I’ve written!

FYI – I tried keep an up-to-date guide based on the comments below but was too busy to continue. Please see this link (Doc).

I’m preparing to give a presentation at The Fletcher Summer Institute for the Advanced Study of Nonviolent Conflict (FSI 2009). The focus of my presentation will be on digital security, i.e., how to communicate safely and securely in repressive, non-permissive environments. I’d be very grateful for feedback on the information below.

Introduction

Core to effective strategic nonviolent action is the need to remain proactive and on the offensive; the rationale being that both the resistance movement and repressive regime have an equal amount of time allocated when the show-down begins. If the movement becomes idle at any point, this may give the regime the opportunity to regain the upper hand, or vice versa. The same principle is found in Clausewitz’s writings on war.

Nonviolent resistance movements are typically driven by students, i.e., young people, who are increasingly born digital natives. With expanding access to mobile phones, social networking software and online platforms for user-generated content such as blogs, the immediate financial cost of speaking out against repressive regimes is virtually nil. So resistance movements are likely to make even more use of new communication technology and digital media in the future. In fact, they already are.

At the same time, however, the likelihood and consequences of getting caught are high, especially for those political activists without any background or training in digital security. Indeed, recent research by Digital Democracy research suggests that organizational hierarchies are being broken down as youth adopt new technologies. While this empowers them they are also put at risk since they don’t tend to be as consequence-conscious as their adult counterparts.

Empire Strikes Back

It is no myth that repressive regimes are becoming increasingly more savvy in their ability to effectively employ sophisticated filtering, censoring, monitoring technologies (often courtesy of American companies like Cisco) to crack down on resistance movements. In other words, political activists need to realize that their regimes are becoming smarter and more effective, not dumber and hardly clueless.

That said, there are notable—at times surprising—loopholes. During the recent election violence in Iran, for example, facebook.com was blocked but not facebook.com/home.php. In any case, repressive regimes will continue to block more sites impose information blockades because they tend to view new media and digital technologies as a threat.

Perhaps technologies of liberation are a force more powerful?

In order to remain on the offensive against repressive regimes, nonviolent civil resistance movements need to ensure they are up to speed on digital security, if only for defense purposes. Indeed, I am particularly struck by the number of political activists in repressive regimes who aren’t aware of the serious risks they take when they use their mobile phones or the Internet to communicate with other activists.

Adaptive Learning

One way to stay ahead is to make the learning curve less steep for political activists and to continually update them with the latest tested tactics and technologies. To be sure, one way to keep the upper hand in this cyber game of cat-and-mouse is to continue adapting and learning as quickly as possible. We need to ensure that feedback mechanisms are in place.

There are clearly trade-offs between security and convenience or usability, particularly in the context of technologies. As DigiActive notes in the graphic below, the most secure tactics and technologies may not be the most convenient or easy to deploy. Most political activists are not tech-savvy.

This means that digital activists need to design tactics and technologies that are easy to learn and deploy.

The tactics and technologies listed in the next sections fall into all four different quadrants to one extent or another. It is important that political activists at minimum master the easy and convenient digital security tactics and technologies identified in this blog post.

ACmatrix

Recall that both sides are allocated an equal amount of time to plan and execute their operations. Accelerating the learning process is one way for activist networks to remain pro-active and stay ahead of the curve. This is in part is the role that DigiActive seeks to play. Unlike the hierarchical, centralized structures of repressive regimes, networks have more flexibility and feedback loops, which make them more adaptable.

The normative motivation behind my research on digital resistance is based on the recognition by “many scholars and practitioners […] that the techniques associated with strategic nonviolent social movements are greatly enhanced by access to modern information communication technologies, such as mobile telephony, short message service (SMS), email and the World Wide Web, among others” (Walker 2007).

The potential to leverage those techniques is what makes Digital Security so important to integrate in the strategic and tactical repertoire of civil resistance movements.

Digital Security

I define digital security (DS) in the context of digital resistance as the art and science of staying safe when communicating in non-permissive environments. The reason I call it both an art and a science is to emphasize that both tactics and technology play an important role in staying safe when facing repression.

So the DS framework I want to propose is two-pronged: tactics vs. technology, and safety vs. security. I call it the 4-square approach for obvious reasons:

4square

  • DS tactics: these can be “technology free” tactics as well as tactics that apply communication technology.
  • DS technologies: these include both high-tech and low-tech technologies that are designed to improve safe and secure communication in repressive environments.
  • Personal safety: in this context refers to physical, personal safety when communicating in non-permissive environments.
  • Data Security: refers to the security of the data when communicated from one devise to another.

As the graphic above suggests, personal safety and data security are a function of both tactics and technologies. For example, data security is best ensured when combining tactics and technologies.

What follows is a list of tactics and technologies for communicating safely and securely in repressive environments. The list is divided into technology categories and the bullet points are listed in order of relative convenience and easy to more complicated but more secure.

Note that the information below is in no way meant to be exhaustive, so pleasedo send suggestions! (See also the conclusion for a list of reference and suggestions on further reading).

Digital Security Tactics

As mentioned above, DS tactics come as both technology-free tactics and tactics that relate to communication technology. For example, making sure to pay for a sim card in cash and out of sight of security cameras is a technology-free tactic  that increases the chances of staying safe. Removing the batteries from your mobile phone to prevent it from being geo-located is a tactic that relates to the technology and also increases your safety.

DS tactics can also improve data security when communicating information. “Sneakernet” is a technology-free tactic to share information. The term is used to describe tactics whereby the transfer of electronic information such computer files is done by physically carryingremovable media such as hard drives and disk drives. In contrast, using encryption software for mobile phones is a tactic that uses technology. The communication may be intercepted by eavesdroppers but they may be unable to decipher the message itself.

These tactics are listed below along with a number of other important ones. Please keep in mind that tactics are case- and context-specific. They need to be adapted to the local situation.

  • Mobile Phones
    • Purchase your mobile phone far from where you live. Buy lower-end, simple phones that do not allow third-party applications to be installed. Higher-end ones with more functionalities carry more risk. Use cash to purchase your phone and SIM card. Avoid town centers and find small or second-hand shops as these are unlikely to have security cameras. Do not give your real details if asked; many shops do not ask for proof of ID.
    • Use multiple SIM cards and multiple phones and only use pay-as-you go options; they are more expensive but required for anonymity.
    • Remove the batteries from your phone if you do not want to be geo-located and keep the SIM card out of the phone when not in use and store in separate places.Use your phone while in a moving vehicle to reduces probability of geo-location.
    • Never say anything that may incriminate you in any way.
    • Use code.
    • Use Beeping instead of SMS whenever possible. Standard text messages are visible to the network operator, including location, phone and SIM card identifiers. According to this recent paper, the Chinese government has established 2,800 SMS surveillance centers around the country to monitor and censor text messages. The Chinese firm Venus Info Tech Ltd sells real-time content monitoring and filtering for SMS.
    • Use fake names for your address book and memorize the more important numbers. Frequently delete your text messages and call history and replace them with random text messages and calls. The data on your phone is only deleted if it is written over with new data. This means that deleted SMS and contact numbers can sometimes be retrieved (with a free tool like unDeleteSMS. Check your phone’s settings to see whether it can be set to not store sent texts messages and calls.
    • Eavesdropping in mobile phone conversations is technically complicated although entirely possible using commercially available technology. Do not take mobile phones with you to meetings as they can be turned into potential listening/tracking devices. Network operators can remotely activate a phone as a recording device regardless of whether someone is using the phone or whether the phen is even switched on. This functionality is available on US networks.
    • Network operators can also access messages or contact information stored on the SIM card. If surveillance takes place with the co-operation of the operator, little can be done to prevent the spying.
    • Mobile viruses tend to spread easily via Bluetooth so the latter should be turned off when not in use.
    • Using open Bluetooth on phones in group situations, e.g., to share pictures, etc., can be dangerous. At the same time, it is difficult to incriminate any one person and a good way to share information when the cell phone network and Internet are down.
    • Discard phones that have been tracked and burn them; it is not sufficient to simply destroy the SIM card and re-use the phone.
  • Digital Cameras
    • Keep the number of sensitive pictures on your camera to a minimum.
    • Add plenty of random non-threatening pictures (not of individuals) and have these safe pictures locked so when you do a “delete all” these pictures stay on the card.
    • Keep the battery out of the camera when not in use so it can’t be turned on by others.
    • Practice taking pictures without having to look at the view screen.
  • Computers/Laptops
    • Use passphrases for all your sensitive data.
    • Keep your most sensitive files on flash disks and find safe places to hide them.
    • Have a contingency plan to physically destroy or get rid of your computer at short notice.
  • Flash disks
    • Purchase flash disks that don’t look like flash disks.
    • Keep flash disks hidden.
  • Email communication
    • Use code.
    • Use passphrases instead of passwords and change them regularly. Use letters, numbers and other characters to make them “c0mpLeX!”. Do not use personal information and changer your passphrases each month. Do not use the same password for multiple sites.
    • Never use real names for email addresses and use multiple addresses.
    • Discard older email accounts on a regular basis and create new ones.
    • Know the security, safety and privacy policies of providers and monitor any chances (see terms of service tracker).
  • Browsers and websites
    • Turn off java and other potentially malicious add-ons.
    • Learn IP addresses of visited websites so that history shows only numbers and not names.
    • When browsing on a public computer, delete your private data (search history, passwords, etc.) before you leave.
    • When signing up for an account where you will be publishing sensitive media, do not use your personal email address and don’t give personal information.
    • Don’t download any software from pop-ups,  they may be malicious and attack your computer or record your actions online.
    • Do not be logged in to any sensitive site while having another site open.
  • VoIP
    • Just because your talking online doesn’t mean you are not under surveillance.
    • As with a cell or landline, use code do not give salient details about your activities, and do not make incriminating statements.
    • Remember that your online activities can be surveilled using offline techniques.  It doesn’t matter if you are using encrypted VOIP at a cyber cafe if the person next to you is an under-cover police officer.
    • When possible, do not make sensitive VOIP calls in a cyber cafe.  It is simply too easy for someone to overhear you. If you must, use code that doesn’t stand out.
  • Blogs and social networking sites
    • Know the laws in your country pertaining to liability, libel, etc.
    • When signing up for a blog account where you will be publishing sensitive content, do not use you personal email address or information.
    • In your blog posts and profile page, do not post pictures of yourself or your friends, do not use your real name, and do not give personal details that could help identify you (town, school, employer, etc.).
    • Blog platforms like wordpress allow uses to automatically publish a post on a designated date and time. Use this functionality to auto-publish on a different day when you are away from the computer.
    • On social networks, create one account for activism under a false but real-sounding name (so your account won’t be deleted) but don’t tell your friends about it.  The last thing you want is a friend writing on your wall or tagging you in a photo and giving away your identity.
    • Even if you delete your account on a social networking site, your data will remain, so be very careful about taking part in political actions (i.e., joining sensitive groups) online.
    • Never join a sensitive group with your real account.  Use your fake account to join activism groups. (The fake account should not be linked to your fake email).
    • Don’t use paid services.  Your credit card can be linked back to you.
  • File sharing
    • Use a shared Gmail account with a common passphrase and simply save emails instead of sending. Change passphrase monthly.
    • For sharing offline, do not label storage devices (CDs, flash drives) with the true content.  If you burn a CD with an illegal video or piece of software on it, write an album label on it.
    • Don’t leave storage devices in places where they would be easily found if your office or home were searched (i.e., on a table, in a desk drawer).
    • Keep copies of your data on two flash drives and keep them hidden in separate locations.
    • When thinking of safe locations, consider who else has access. Heavily-traveled locations are less safe.
    • Don’t travel with sensitive data on you unless absolutely necessary.  If you need to, make sure to hide it on your person or “camouflage” it (label a data CD as a pop music CD). See Sneakernet.
  • Internet Cafes
    • Assume you are being watched.
    • Assume computers at cyber cafes are tracking key strokes and capturing screenshots.
    • Avoid cyber cafes without an easy exit and have a contingency plan if you need to leave rapidly.

Digital Security Technologies

When combine with the tactics described above, the following technologies can help you stay safe and keep your data relatively more secure.

  • Mobile phones
    • Use CryptoSMS, SMS 007 or Kryptext to text securely (this requires java-based phones).
    • Use Android Guardian as soon as it becomes available.
    • Access mobile versions of websites as they are usually not blocked. In addition, connecting to mobile websites provides for faster connections.
  • Digital cameras
    • Use scrubbing software such as: JPEG stripper to remove the metadata (Exif data) from your pictures before you upload/email.
    • Have a safe Secure Digital Card (SD) that you can swap in. Preferably, use a mini SD card with a mini SD-SD converter. Then place the mini SD into a compatible phone for safekeeping.
  • Computers/Laptops
    • Use a different file type to hide your sensitive files. For example, the .mov file extension will make a large file look like a movie.
    • Mac users can use Little Snitch to track all the data that goes into and out of your computer.
    • From a technical perspective, there’s no such thing as the delete function. Your deleted data is eventually written over with new data. There are two common ways to wipe sensitive data from your hard drive or storage device. You can wipe a single file or you can wipe all of the ‘unallocated’ space on the drive. Eraser is a free and open-source secure deletion tool that is extremely easy to use.
  • Email communication
    • Use https when using Gmail.
    • Use encrypted email platforms such as Hushmail and RiseUp.
  • Browsers and websites
    • Use Firefox and get certain plugins to follow website tracking such as ghostery and adblock, adart to remove ads/trackers.
    • User Tor software or Psiphon to browse privately and securely.
    • I shan’t list access points for secure browsers, Proxy servers and VPNs here. Please email me for a list.
    • Always use https in “Settings/General/Browser Connection.”
  • VoIP
    • Use Skype but not TOM Skype (Chinese version). Note that Skype is not necessarily 100% secure since no one has access to the source code to verify.
    • Off The Record (OTR) is a good encryption plugin. For example, use Pidgin with OTR (you need to add the plug-in yourself).
    • Gizmo offer encryption for voice conversations, and then only if you are calling another VoIP user, as opposed to a mobile or landline telephone. However, because neither application is open-source, independent experts have been unable to test them fully and ensure that they are secure.
    • Adium is a free IM application for Macs with built-in OTR encryption that integrates most other IM applications.
  • Blogs and social networking platforms
    • There are no safe social networks.  The best way to be safe on a social network is fake account and a proxy server.
    • The anonymous blogging platform Invisiblog no longer exists, so the best bet now is WordPress + Proxy (preferably Tor) + anonymity of content.
    • Log out of facebook.com when not using the site.
  • File sharing
    • Use Drop.io to create a private, secure media sharing site.
    • Use BasecampHQ with secure/SSL option to create more specific usernames and passwords for each user or remote site.
  • Internet Cafe
    • Tor can be installed on flash disk and used at Internet cafe and also used from LiveCDs if flash drives are not allowed.
  • Other potential tech

Conclusion

The above material was collected in part from these sources:

As mentioned above, please send suggestions and/or corrections as well as updates. And again, please do check the comments below. Thanks! Patrick Philippe Meier

Steganography 2.0: Digital Resistance against Repressive Regimes

A team of Polish steganographers at the Institute of Telecommunications in Warsaw are doing some neat work that should be of interest to digital activists. Steganography is is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.

Wojciech Mazurczyk, along with Krzysztof Szczypiorski and Milosz Smolarczyk are using the Internet’s transmission control protocol (TCP) to create fake web traffic that can mask the transmission of secret messages.

As the NewScientist explains,

“Web, file transfer, email and peer-to-peer networks all use TCP, which ensures that data packets are received securely by making the sender wait until the receiver returns a “got it” message. If no such acknowledgement arrives (on average 1 in 1000 packets gets lost or corrupted), the sender’s computer sends the packet again. This scheme is known as TCP’s retransmission mechanism – and it can be bent to the steganographer’s whim, says Mazurczyk.”

The team’s project is called Retransmission Steganography, or RSTEG, proposes to use software that deliberately asks the receiver of information to prompt a retransmission from the sender even when the data was successfully received in the first place. As Mazurczyk explains, “the sender then retransmits the packet but with some secret data inserted in it,” which means, “the message is hidden among the teeming network traffic.”

The use of RSTEG as a tactic for digital resistance could be quite effective. While eavesdroppers could monitor the fact that a first sent package is different from a second retransmitted one containing the secret message, this would be somewhat useless since all retransmitted packages differ from original ones anyway. In other words, “Retransmissions in IP networks are a ‘natural phenomenon’, and so intentional retransmissions introduced by RSTEG are not easy to detect if they are kept at a reasonable level.”

Mazurczyk and Szczypiorski are also working on a parallel project that draws on steganographic techniques to creating covert channels for Voice over Internet Protocol (VOIP) streams. This approach, called Lost Audio Packets Steganography, or LACK, “provides hybrid storage-timing covert channel by utilizing delayed audio packets.”

For more information on the technical specifications of the RSTEG and LACK techniques, please see the authors’ papers here and here respectively.

The team plans to demonstrate their approach at a workshop on network steganography in China later this year. Yes, China.

Patrick Philippe Meier

Nation-State Routing: Globalizing Censorship

I just found an interesting piece on Internet censorship at arXiv, my favorite go-to place for scientific papers that are pre-publication. Entitled “Nation-State Routing: Censorship, Wiretapping and BGP,” this empirical study is possibly the first to determine the aggregate effect of national policies on the flow of international traffic.

As government control over the treatment of Internet traffic becomes more common, many people will want to understand how international reachability depends on individual countries and to adopt strategies either for enhancing or weakening the dependence on some countries.

Introduction

States typically impose censorship to prevent domestic users from reaching questionable content. Some censorship techniques, however, “may affect all traffic traversing an [Autonomous System].” For example, Internet Service Providers (ISPs) in China, Britain and Pakistan block Internet traffic at the Internet Protocol (IP) level by “filtering based on IP addresses and URLs in the data packets, or performing internal prefix hijacks, which could affect the international traffic they transit.”

The scope and magnitude of this affect is unclear. What we do know is that one may intentionally or by accident apply censorship policies to international traffic, as demonstrated by the global YouTube outage last year as a result of a domestic Pakistani policy directive.

Methodology

The authors therefore developed a framework to study interdomain routing at the nation-state level. They first adapted the “Betweeness Centrality” metric from statistical physics to measure the importance, or centrality, of each country to Internet reachability. Second, they designed, implemented and validated a Country Path Algorithm (CPA) to infer country-paths from a pair of source and destination IP addresses.

Findings

The table below shows Country Centrality (CC) computed directly from Trace Route (TR) and Border Gate Protocol (BGP). The closer the number is to one, the more impact that country’s domestic Internet censorship policies has on international Internet traffic.

arxivtable1

The second table below lists both Country Centrality (CC) and Strong Country Centrality (SCC). The latter measures how central countries are when alternative routes are considered. When SCC equals one, this suggests a country is completely unavoidable.

arxiv-table2

“Collectively, these results show that the ‘West’ continues to exercise disproportionate influence over international routing, despite the penetration of the Internet to almost every region of the world, and the rapid development of China and India.”

This last table below lists CC and SCC measures for authoritarian countries that are known for significant domestic censorship of Internet content. Aside from China, “these countries have very little influence over global reachability.”

arxiv-table3

Next Steps

The authors of the study point to a number of interesting questions for future research. For example, it would be interesting to know how the centrality result above change over time, i.e., which countries are becoming more central over time, and why?

Another important question is what economically driven strategies single countries (or small coalitions of countries) could adopt to increase their own centrality or to reduce that of other countries?

One final and particularly important question would to find out what fraction of domestic paths are actually routed through another country? This is important because the answer to this question would “provide insight into the influence that foreign nations have over a country’s domestic routing and security, and would shed light on […] whether warrantless tapping on links in one country to another might inadvertently capture some purely domestic traffic.”

Patrick Philippe Meier