Tag Archives: Resistance

How Civil Disobedience Improves Crowdsourced Disaster Response (and Vice Versa)

Update: The most recent example of the link between disobedience and disaster response is Occupy #Sandy. As the New York Times and ABC News have noted,  “the movement’s connections and ‘altruistic drive’ has led to them being some-what more effective in the northwestern Hurricane Sandy relief movement than ‘larger, more established charity groups.'”As noted here, “the coordinators of the Occupy Sandy relief effort have been working in conjunction with supply distributors, such as the Red Cross and FEMA, while relying on the National Guard for security.” Many describe the movement’s role in response to Sandy as instrumental. The Occupy movement also worked with New York City’s office and other parts of the government. Mayor Michael Bloomberg praised Occupy for their invaluable efforts: “Thank you for everything you’ve done. You guys are great […]. You really are making a difference.” The Occupy Sandy documentary below is well worth watching. I also recommend reading this blog post.

When Philippine President Joseph Estrada was forced from office following widespread protests in 2001, he complained bitterly that “the popular uprising against him was a coup de text.” Indeed, the mass protests had been primarily organized via SMS. Fast forward to 2012 and the massive floods that re-cently paralyzed the country’s capital. Using mobile phones and social media, ordinary Filipinos crowdsourced the disaster response efforts on their own without any help from the government.

In 2010, hundreds of forest fires ravaged Russia. Within days, volunteers based in Moscow launched their own crowdsourced disaster relief effort, which was seen by many as both more effective and visible than the Kremlin’s response. These volunteers even won high profile awards in recognition of their efforts (picture below). Some were also involved in the crowdsourced response to the recent Krymsk floods. Like their Egyptian counterparts, many Russians are par-ticularly adept at using social media and mobile technologies given the years of experience they have in digital activism and civil resistance.

At the height of last year’s Egyptian revolution, a female activist in Cairo stated the following: “We use Facebook to schedule our protests, Twitter to coordinate and YouTube to tell the world.” Several weeks later, Egyptian activists used social networking platforms to organize & coordinate their own humanitarian convoys to Tripoli to provide relief to Libyan civilians affected by the fighting.

The same is true of Iranians, as witnessed during the Green Revolution in 2009. Should anyone be surprised that young, digitally savvy Iranians took the lead in using social media and mobile technologies to crowdsource relief efforts in response to the recent earthquakes in the country’s northern region? Given their distrust of the Iranian regime, should anyone be surprised that they opted to deliver the aid directly to the disaster-affected communities themselves?

Whether they are political activists on one day and volunteer humanitarians on another, the individuals behind the efforts described above use the same tools to mobilize and coordinate. And they build social capital in the process—strong and weak ties—regardless of whether they are responding to repressive policies or “natural’ disasters. Social capital facilitates collective action, which is key to political movements and humanitarian response—both on and offline. While some individuals are more politically inclined, others are more drawn to helping those in need during a disaster. Either way, these individuals are already part of overlapping social networks.

In fact, some activists may actually consider their involvement in volunteer-based humanitarian response efforts as an indirect form of nonviolent protest and civil resistance. According to The New York Times, volunteers who responded to Iran’s deadly double earthquake were “a group of young Iranians—a mix of hipsters, off-road motor club members and children of affluent families […]”. They “felt like rebels with a cause […], energized by anger over widespread accusations that Iran’s official relief organizations were not adequately helping survivors […].” Interestingly, Iran’s Supreme Leader actually endorsed this type of private, independent delivery of aid that Iranian volunteers had undertaken. He may want to think that over.

The faster and more ably citizen volunteers can respond to “natural” disasters, the more backlash there may be against governments who are not seen to respond adequately to these disasters. Their legitimacy and capacity to govern may come into question by more sectors of the population. Both Beijing and Iran have already been heavily criticized for their perceived failure in responding to the recent floods and earthquakes. More importantly, perhaps, these crowd-sourced humanitarian efforts may serve to boost the confidence of activists. As one Iranian activist noted, “By organizing our own aid convoy, we showed that we can manage ourselves […]. We don’t need others to tell us what to do.”

In neighboring Pakistan, the government failed catastrophically in its response to the devastating cyclone that struck East Pakistan in 1970. To this day, Cyclone Bhola remains the most deadly cyclone on record, killing some 500,000 people. A week after the hazard struck, the Pakistani President acknowledged that his government had made “mistakes in its handling of the relief efforts due to a lack of understanding of the magnitude of the disaster.” The lack of timely and coordinated government response resulted in massive protests agains the state, which served as an important trigger for the war of independence that led to the creation of Bangladesh. (Just imagine, SMS wasn’t even around then).

Given a confluence of grievances, “natural” disasters may potentially provide a momentary window of opportunity to catalyze regime change. This is perhaps more likely when those citizens responding to a disaster also happen to be savvy digital activists (and vice versa).

Crisis Mapping the End of Sudan’s Dictatorship?

Anyone following the twitter hashtag #SudanRevolts in recent days must be stunned by the shocking lack of coverage in the mainstream media. The protests have been escalating since June 17 when female students at the University of Khartoum began demonstrating against the regime’s austerity measures, which are increasing the prices of basic commodities and removing fuel subsidies. The dissent has quickly spread to other universities and communities.

There’s no doubt that Sudan’s dictator is in trouble. He faces international economic sanctions and a mounting US$2.5 billion budget deficit following the secession of South Sudan last year. What’s more, he is also “fighting expensive, devastating, and unpopular wars in Darfur (in the west), Blue Nile, Southern Kordofan, and the Nuba Mountains (on the border with South Sudan)” (UN Dispatch). So what next?

Enter Sudan Change Now, a Sudanese political movement with a clear mandate: peaceful but total democratic change. They seek to “defeat the present power of darkness using all necessary tools of peace resistance to achieve political stability and social peace.” The movement is thus “working on creating a common front that incorporates all victims of the current regime to ensure a unified and effective course of action to overthrow it.” Here are some important videos they have captured of the protests.

According to GlobalVoices, “The Sudanese online community believe that media coverage was an integral part of the revolutions in Egypt and Tunisia, and are therefore demanding the same for Sudan.” The political movement Sudan Change Now is thus turning to crisis mapping to cast more light on the civil resistance efforts in the Sudan:

https://sudanchangenow2012.crowdmap.com

The crisis map includes over 50 individual reports (all added in the past 24 hours) ranging from female protestors confronting armed guards to Sudanese security forces using tear gas to break up demonstrations. There are also reports of detained activists and journalists. These reports come from twitter while more recent incidents are sourced from the little mainstream media coverage that currently exists. The live map is being updated several times a day.

As my colleague Carol Gallo reminds us, “The University of Khartoum was also the birthplace of the movement that led to the overthrow of the military government in 1964.” Symbols and anniversaries are important features of civil resistance. For example, Sudan’s current ruling party came to power on June 30th, 1989. So protestors including those with Sudan Change Now are gearing up for some major demonstrations this Wednesday.

This is not the first crisis map of protests in Khartoum. In January 2011, activists launched this crisis map. I hope that protestors engaged in current civil resistance efforts take note of the lessons learned from last year’s #Jan30 demonstrations. For my doctoral dissertation, I compared the use of crisis maps by Egyptian and Sudanese activists in 2010. If I had to boil down the findings into three key words, these would be: unity, preparedness, creativity.

Unity is absolutely instrumental in civil resistance. As for preparedness, nothing should be left to chance. Prepare and plan the sequence of civil resistance efforts (along with likely reactions) and remember that protests come at the end. The ground-work must first be laid with other civil resistance tactics and thence escalated. Finally, creativity is essential, so here are some tactics that may provide some ideas. They include both traditional tactics and technology-enabled ones like digital crisis maps.

NB: I understand that the security risks of using the Ushahidi mapping platform have been indirectly communicated to the activists.

Civil Resistance 2.0: A New Database on Non-Violent Guerrilla Warfare

[Cross-posted from Meta-Activism.org]

Gene Sharp pioneered the study of nonviolent civil resistance. Some argue that his books were instrumental to the success of activists in a number of revolutions over the past 20 years ranging from the overthrow of Milosevic to ousting of Mubarak. Civil resistance has often been referred to as “nonviolent guerrilla warfare” and Sharp’s manual on “The Methods of Nonviolent Action,” for example, includes a list of 198 methods that activists can use to actively disrupt a repressive regime. These methods are divided into three sections: nonviolent protest and persuasion, noncooperation, and nonviolent intervention.

While Sharp’s 198 are still as relevant today as they were some 40 years ago, the technology space has changed radically. In Sharp’s “Dictionary of Power and Struggle: Language of Civil Resistance in Conflicts” published in 2012, Gene writes that “a multitude of additional methods will be invented in the future that have characteristics of the three classes of methods: nonviolent protest and persuasion, noncooperation, and nonviolent intervention.” About four years ago, I began to think about how technology could extend Sharp’s methods and possibly generate entirely new methods as well. This blog post was my first attempt at thinking this through and while it was my intention to develop the ideas further for my dissertation, my academic focus shifted somewhat.

With the PhD out of the way, my colleague Mary Joyce suggested we launch a research project to explore how Sharp’s methods can and are being extended as a result of information and communication technologies (ICTs). The time was ripe for this kind of research so we spent the past few months building a database of civil resistance methods 2.0 based on Sharp’s original list. We also consulted a number of experts in the field to help us populate this online database. We decided not to restrict the focus of this research  to ICTs only–i.e., any type of technology qualifies, such as drones, for example.

This database will be an ongoing initiative and certainly a live document since we’ll be crowdsourcing further input. In laying the foundations for this database, we’ve realized once again just how important creativity is when thinking about civil resistance. Advances in technology and increasing access to technology provides fertile ground for the kind of creativity that is key to making civil resistance successful.

We invite you to contribute your creativity to this database and share the link (bit.ly/CivRes20) widely with your own networks. We’ve added some content, but there is still a long way to go. Please share any clever uses of technology that you’ve come across that have or could be applied to civil resistance by adding them.

Our goal is to provide activists with a go-to resource where they can browse through lists of technology-assisted methods to inform their own efforts. In the future, we envision taking the database a step further by considering what sequencing of said methods are most effective.

The Use of Drones for Nonviolent Civil Resistance

In my previous blog post on the use of drones for human rights, I also advocated for the use of drones to support nonviolent civil resistance efforts. Obviously, like the use of any technology in such contexts, doing so presents both new opportunities and obvious dangers. In this blog post, I consider the use of DIY drones in the context of civil resistance, both vis-a-vis theory and practice. While I’ve read the civil resistance literature rather widely for my dissertation, I decided to get input from two of the world’s leading experts on the topic.

The first expert opined as follows: “Whether a given technology delivers strategic or tactical avantage is typically dependent on context. So to the extent that a drone can be useful in getting evidence that delegitimizes a movement’s opponent (i.e. exposing atrocities), and/or legitimizes a movement (i.e. docu-menting strictly nonviolent activities), and/or provides useful intelligence to a movement about an opponent’s current capabilities (i.e. the amount of supplies an adversary has), strengths, and weaknesses, then one could indeed argue that drones could provide strategic or tactical advantages.  But contextually speaking, if the amount of human and financial resources necessary to acquire and deploy a drone are a drain on beneficial activities that a movement may otherwise be undertaking, then it’s a cost/benefit analysis.”

As this New York Times article notes, the cost of drones is dropping dramatically and their applications multiplying. Even Professor Francis Fukuyama is getting in on the action. While drones were once exclusively the purview of the military, they are quickly becoming mainstream and being used by civilians. Indeed, the line dividing remote control toy planes and drones is starting to blur. Keep in mind that satellite imagery had a strong military connotation before Google Earth entered the scene a few  years ago. Indeed, greater civilian access to satellite imagery has demystified this erstwhile exclusively military technology.

A few weeks ago, a civilian used a simple Hexa Arducopter to film protests in Estonia. Around the same time, protestors in Warsaw used a small Polish RoboKopter equipped with a videocamera to get this drone’s eye view of police movement. Last year, a Hexacopter was used to film Russian protests, as repor-ted by CNN below.

As Wired editor-in-chief and drone-builder Chris Anderson notes, “no more do citizens need to wait for news choppers to get aerial footage of a major event. With drones, they can shoot their own overhead video.” Wired‘s Spencer Ackerman writes that “getting an aerial view is the next step in compelling DIY citizen video. […] An aerial view gives an entirely different perspective what constitutes a legitimate—and illegitimate—threat.”

The second civil resistance expert I consulted argued that “nonviolent move-ments definitely need good and timely information in order to engage in effective strategic planning, to be able to anticipate regime responses, etc., so we can draw on the strategic nonviolent conflict literature. And we can cite Brian Martin and Wendy Varney on how exposing regime violence (via images) targeting non-violent opposition can produce an important backfire effect, leading to loss of domestic and international support for the regime. Gene Sharp referred to it as political jiu-jitsu.”

Indeed, an arial view could capture a different perspective than state-television cameras might, and thus reveal an illegitimate act on behalf of the regime that is also not captured by cell phone cameras. To this end, an illegitimate act carried out by a repressive regime could backfire if caught on drone cameras and subsequently shared via Twitter, Flickr and/or YouTube. As Sharp writes, too much brutality may result in political jiu-jitsu where the opposition group is able to increase their unity and support while politically throwing the ruler off balance and weakening his/her regime.

I’ve blogged about Gene Sharp’s work several times on iRevolution, so I won’t expand on his bio here. In 1973, he published a book on nonviolent action in which he describes 198 tactics that civil resistance can employ in their campaign. I briefly reviewed these again within the context of DIY drones and have added some relevant ones below together with an explanation.

12. Skywriting and earthwriting: while drones are typically used for sur-veillance, they could be used for skywriting (or sky-graffiti). They could also be used to take pictures or videos of earthwriting.

18. Displays of flags and symbolic colors: just like the above, drones could also be used to fly small flags and banners, which could further spread the message of the movement. This could be safer than other methods.

31. “Haunting” officials: drones could be used to try and follow specific officials or groups of officials, especially as they are moving through the city center. They could also be used to follow military vehicles. These drones could also take pictures of said officials and military equipment, which could be used to further haunt said officials.

32. Taunting officials: in this case, drones could be used to buzz officials up close and personal. Of course, this would make it easier for the drone to get shot down. Perhaps if protestors used a fleet of DIY drones, there would be strength in numbers, creating an annoying wasp effect. For those drones that can carry some payload, leaflet could be dropped from said drones. If the pilots are particularly adept, they could also drop paint or even, well, urine.

161. Nonviolent harassment: basically same as points 31 & 32. Perhaps drones could be used to harass officials trying to give speeches. If some DIY drones are capable of carrying small but particularly loud speakers, they could be used to play music, or play back political speeches in which officials were clearly lying.

169. Nonviolent air raids: the tactics described above qualify as nonviolent air raids. Perhaps a drone could carry some firecrackers and buzz an airbase. Of course, this would likely provoke return fire with live ammunition.

184. Defiance of blockades: buzzing of blockades would demonstrate that while they can block people and cars, they care not impermeable. Those drones capable of carrying payloads could also be used to transport small packages across blockades.

194. Disclosing identities of secret agents: this is certainly more challenging and would require additional reconnaissance and intelligence information. But suspected secret agents could potentially be followed via small, DIY drones, particularly the hexacopter variety.

“At the end of the day,” according to the first expert I consulted, “a drone is a tool, and the strategic advantage it may provide will also depend on the funda-mental unity, planning, and discipline that a movement has or does not have.  For example, if a movement is lacking a fundamentally good and unifying message, no amount of technology will substitute for that, and thus the strategic value of that technology is diminished in the context of that movement.  On the other hand if a movement has a good and unifying message and levers technology to reinforce that message, then the technology can act as a multiplier and provide substantially more strategic value.

Why Architecture and Calendars Are Trojan Horses for Repressive Regimes

The simple thought first occurred to me while visiting Serbia earlier this year. As I walked in front of the country’s parliament, I recalled Steve York’s docu-mentary, “Bringing Down a Dictator.” In one particular scene, a large crowd assembles in front of the Serbian parliament chanting for the resignation of Slobodan Milosevic. Soon after, they storm the building and find thousands of election ballots rigged in the despot’s favor. I then thought of Tahrir Square and how more than a million protestors had assembled there to demand that Hosni Mubarak step down. There was one obvious place for protestors to assemble in Cairo during the recent revolts. The word Tahrir means “liberation” in Arabic. That’s what I call free advertising and framing par excellence.

These scenes play out over and over across the history of revolutions and popular resistance movements. In many ways, state architecture that is meant to project power and authority can just as easily be magnets and mobilization mechanisms for popular dissent; a hardware hack turned against it’s coders. A Trojan Horse of sorts in the computing sense of the word.

So not only was the hardware vulnerable to attack in Cairo, but the software—and indeed the name of the main variable, Tahrir—was also susceptible to “political hacking”. These factors help synchronize shared awareness and purpose in resistance movements. There’s not much that repressive regimes can do about massive hardware vulnerabilities. Yes, they can block off Tahrir for a certain period of time but the square won’t disappear. Besides, regimes require the hardware to project symbols of legitimacy and order. So these must stay but be secured by the army. The latter must also preempt any disorder. So more soldiers need to be deployed, especially around sensitive dates such as anniversaries of revolutions, massacres, independent movements etc. These politically sensitive days need not be confined to local events either. They can include dates for international events in contemporary world history.

A colleague of mine recently returned from China where he was doing research for a really interesting book he’s writing on subverting authoritarian control. He relayed how the calendar in China is getting more crowded with sensitive dates. Each date requires the state to deploy at times considerable resources to preempt or quickly put down any unrest. He described how the vast majority of people assembled at a recent protest in Beijing were actually undercover police officers in plain clothes. This is not immediately obvious when watching the news on television. The undercover officers inadvertently make the turnout look far bigger than it actually is.

As authoritarian regimes increase their efforts to control public spaces, they may require more time and resources to do so–a classic civil resistance strategy. They may sometimes resort to absurd measures like in Belarus. According to a Polish colleague of mine, the regime there has gone so far as to outlaw “doing nothing” in public venues. Previously, activists would simply assemble in numbers in specific places but do nothing—just to prove a point. The regime’s attempt to crack down on “doing nothing” makes it look foolish and susceptible to political jokes, a potent weapon in civil resistance. More here on subversive strategies.

The importance of public spaces like Tahrir in Cairo are even more evident when you look at a city like Alexandria. According to my colleague Katherine Maher, one of the main challenges for activists in Alex has been the lack of a central place for mass gathering. In fact, the lack of such hardware means that the “activism software” needs to run differently: activists in Alex are looking to organize marches instead of mass sit-ins, for example. More here on civil resistance strategies and tactics used by Egyptian activists.

Know of other “hardware” hacks? I’d love to hear them. Please feel free to share your thoughts in the comments section below. Thank you!

On Synchrony, Technology and Revolutions: The Political Power of Synchronized Resistance

Synchronized action is a powerful form of resistance against repressive regimes. Even if the action itself is harmless, like walking, meditation or worship, the public synchrony of that action by a number of individuals can threaten an authoritarian state. To be sure, synchronized public action demonstrates independency which may undermine state propaganda, reverse information cascades and thus the shared perception that the regime is both in control and unchallenged.

This is especially true if the numbers participating in synchrony reaches a tipping point. As Karl Marx writes in Das Kapital, “Merely quantitative differences, beyond a certain point, pass into qualitative changes.” We call this “emergent behavior” or “phase transitions” in the field of complexity science. Take a simple example from the physical world: the heating of water. A one degree increase in temperature is a quantitative change. But keep adding one degree and you’ll soon reach the boiling point of water and surprise! A physical phase transition occurs: liquid turns into gas.

In social systems, information creates friction and heat. Moreover, today’s information and communication technologies (ICTs) are perhaps the most revolutionary synchronizing tools for “creating heat” because of their scalability. Indeed, ICTs today can synchronize communities in ways that were unimaginable just a few short years ago. As one Egyptian activist proclaimed shortly before the fall of Mubarak, “We use Facebook to scheduled our protests, Twitter to coordinate, and YouTube to tell the world.” The heat is already on.

Synchrony requires that individuals be connected in order to synchronize. Well guess what? ICTs are mass, real-time connection technologies. There is conse-quently little doubt in my mind that “the advent and power of connection technologies—tools that connect people to vast amounts of information and to one another—will make the twenty-first century all about surprises;” surprises that take the form of “social phase transitions” (Schmidt and Cohen 2011). Indeed, ICTs can  dramatically increase the number of synchronized participants while sharply reducing the time it takes to reach the social boiling point. Some refer to this as “punctuated equilibria” or “reversed information cascades” in various academic literatures. Moreover, this can all happen significantly faster than ever before, and as argued in this previous blog post on digital activism, faster is indeed different.

Clay Shirky argues that “this basic hypothesis is an updated version of that outlined by Jürgen Habermas in his 1962 publication, The Structural Transformation of the Public Sphere: an Inquiry into a Category of Bourgeois Society. A group of people, so Habermas’s theory goes, who take on the tools of open expression becomes a public, and the presence of a synchronized public increasingly constrains undemocratic rulers while expanding the rights of that public […].” But to understand the inherent power of synchrony and then leverage it, we must first recognized that synchrony is a fundamental force of nature that goes well beyond social systems.

In his TED Talk from 2004, American mathematician Steven Strogatz argues that synchrony may be one of the most pervasive drivers in all of nature, extending from the subatomic scale to the farthest reaches of the cosmos. In many ways, this deep tendency towards spontaneous order is what pushes back against the second law of thermodynamics, otherwise known as entropy. 

Strogatz shares example from nature and shows a beautiful ballet of hundreds of birds flocking in unison. He explains that this display of synchrony has to do with defense. “When you’re small and vulnerable […] it helps to swarm to avoid and/or confuse predators.” When a predator strikes, however, all bets are off, and everyone disperses—but only temporarily. “The law of attraction,” says Strogatz, brings them right back together in synchrony within seconds. “There’s this constant splitting and reforming,” grouping and dispersion—swarming—which has several advantages. If you’re in a swarm, the odds of getting caught are far lower. There are also many eyes to spot the danger.

What’s spectacular about these ballets is how quickly they phase from one shape to another, dispersing and regrouping almost instantaneously even across vast distances. Individual changes in altitude, speed and direction are communicated and acted on across half-a-kilometer within just seconds. The same is true of fireflies in Borneo that synchronize their blinking across large distances along the river banks. Thousands and thousands of fireflies somehow overcoming the communication delay between the one firefly at one end of the bank and the other firefly at the furthest opposite end. How is this possible? The answer to this question may perhaps provide insights for social synchrony in the context of resistance against repressive regimes.

Strogatz and Duncan Watts eventually discovered the answer, which they published in their seminal paper entitled “Collective dynamics of small-world networks.” Published in the prestigious journal Nature,  the paper became the most highly cited article about networks for 10 years and the sixth most cited paper in all of physics. A small-world network is a type of network in which even though most nodes are not neighbors of one another, most can still be reached from other nodes by a small number of hops or steps. In the context of social systems, this type of network results in the “small world phenomenon of strangers being linked by a mutual acquaintance.”

These types of networks often arise out of preferential attachment, an inherently social dynamic. Indeed, small world networks pervade social systems. So what does this mean for synchrony as applied to civil resistance? Are smart-mobs synonymous with synchronized mobs? Do ICTs increase the prevalence of small world networks in social systems—thus increasing robustness and co-synchrony between social networks. Will meshed-communication technologies and features like check-in’s alter the topology of small world networks?

Examples of synchrony from nature clearly show that real-time communication and action across large distances don’t require mobile phones. Does that mean the same is possible in social systems? Is it possible to disseminate information instantaneously within a large crowd without using communication technologies? Is strategic synchrony possible in this sense? Can social networks engage in instantaneous dispersion and cohesion tactics to confuse the repressive regime and remain safe?

I recently spoke with a colleague who is one of the world’s leading experts on civil resistance, and was astonished when she mentioned (without my prompting) that many of the tactics around civil resistance have to do with synchronizing cohesion and dispersion. On a different note, some physicists argue that small world networks are more robust to perturbations than other network structures. Indeed, the small work structure may represent an evolutionary advantage.

But how are authoritarian networks structured? Are they too of the small world variety? If not, how do they compare in terms of robustness, flexibility and speed? In many ways, state repression is a form of synchrony itself—so is genocide. Synchrony is clearly not always a good thing. How is synchrony best interrupted or sabotaged? What kind of interference strategies are effective in this context?

Identifying Strategic Protest Routes for Civil Resistance: An Analysis of Optimal Approaches to Tahrir Square

My colleague Jessica recently won the Tufts GIS Poster Expo with her excellent poster on civil resistance. She used GIS data to analyze optimal approaches to Tahrir Square in Cairo. According to Jessica, many previous efforts to occupy the square had failed. So Egyptian activists spent two weeks brainstorming the best strategies to approach Tahrir Square.

Out of curiosity, Jessica began to wonder whether the use of GIS data and spatial analysis might shed some light on possible protest routes. She began her analysis by  identifying three critical strategic elements for a successful protest route:

“1) Gathering points where demonstrators initiate protests; 2) two types of routes—protest collection areas of high population density through which protesters walk to collect additional supporters and protest approach routes on major streets that accommodate large groups that are more difficult to disperse; and 3) convergence points where smaller groups of protester merge to increase strength in order to approach the destination.”

For her analysis, Jessica took gathering points and convergence points into consideration. For example, many Egyptian activist met at Mosques. So she selected optimal Mosques based on their distance to police stations (the farther the better) and high road density area “as a proxy for population density.” In terms of convergence points, smaller groups of protestors converged on major roads and intersections. The criteria that Jessica used to select these points were: distance to Tahrir Square, high density of road junctions and open space to allow for large group movement. She also took into account protest route collection areas. These tend to be “densely populated and encourage residents to join, increasing participation.” So Jessica selected these based on high road density and most direct route to Tahrir Square using major roads.

Overlaying the data and using GIS analysis on each strategic element yields the following optimal routes to Tahrir:

Jessica writes that “the results of this project demonstrate that GIS tools can be used for plotting strategic routes for protest using criteria that can change based on the unique geospatial environment. In Cairo, the optimal gathering points, strategic routes and convergence points are not always located in an obvious path (i.e. optimal mosques located in areas with low road density or convergence points without gathering points in the close proximity). The map does, however, provide protest organizers with some basic instruction on where to start, what direction to head and where to converge for the final approach.”

She does also acknowledge some of the limitations of the study owing to lack of high-resolution spatial data. I would add temporal data since civil resistance is fluid and changes, which requires rapid adaptation and re-strategizing. If her analysis could be combined with real time information coming from crowdsourced data such as U-Shahid, then I think this could be quite powerful.

For more on the civil resistance tactics used in Egypt during the revolution, please see this blog post.

How to Evaluate Success in Digital Resistance: Look at Guerrilla Warfare

The Iranian protests of 2009 are still framed as a failure. The same goes for the 2007 protests in Burma and other nonviolent movements that have combined digital technologies with civil resistance (digital resistance). Are these efforts really failures or are we simply looking through the wrong lens? What characterizes success in digital activism?

The international community and mainstream media seem to think that success means full-out regime change and overnight transitions to democracy, rule of law and respect for human rights. This state-centric framework is the wrong one to use if the goal is to critically assess the success of resistance movements. We should instead be looking at digital resistance through the lens of guerrilla warfare, or “little war” in Spanish.

Guerrilla warfare is characterized by small, highly mobile groups that employ military tactics to harass a larger enemy, striking and withdrawing almost immediately. Hit-and-run tactics against supply chains and disrupting communication lines is a guerrilla favorite.

Tactically, guerrillas avoid confrontation with larger enemy forces and seek instead to attack smaller, weaker groups to minimize losses and exhaust the opposition. They seek the support of local populations in the process. Their goal is to weaken the enemy and eventually to undermine the state’s ability to prosecute the war; victory by attrition.

Civil resistance movements use guerrilla warfare. Their tactics and strategies are almost identical. The majority of guerrilla actions do not use violence. Given the similarities between civil resistance and guerrilla campaigns, we should look into how the latter are evaluated. If we used today’s media frames to evaluate passed successful resistance movements, they would all be failures.

The history of nonviolent struggle shows that movements which were counted out when major repression first hit – such as Solidarity in Poland in 1981 and nonviolent South African anti-apartheid strikers and boycotters in the mid-1980’s – were, a few years later, on the winning side (1).

This means that an evaluation framework for digital resistance should include a broader time frame and have a more micro-level focus. We should be looking at a group’s ability to organize an underground movement, recruit, spread propaganda, elicit support from the local population, employ a rich mix of tactics to over time to harass, provoke and delegitimize a repressive regime, and a group’s ability to continue existing even after government crack downs.

On this latter point, for example, “a more comprehensive and accurate frame on [Iran and Burma] would have reminded us that such shows of force are used only when a regime feels threatened, that is, when it perceives itself in a position of potential weakness if opposition is permitted to gain any foothold” (2).