How modern tech regulations and data gathering compromise activists.

Posted on

by


Download PDF Version

Abstract.

Social media has amplified voices from various communities and played a crucial role in implementing social change through bringing awareness to these issues via social networking platforms. However, increased government surveillance, data collection by big tech companies, and privacy breaches have compromised activists and advocates themselves. In this paper, the methods of how social media compromises activists’ identities will be discussed. By understanding how these identities are compromised, the ensuing risks and sometimes extremely harsh consequences will be exemplified through a case study of those who opposed the Iranian regime during recent years, including how the government attained intelligence about activists who opposed them, and the price these activists paid due to their compromised information.

A brief history of online activism.

In historical context, we can look at one of the most influential activists that has used online tools to help achieve social change: Julian Assange and his platform known as Wikileaks.  Assange began his work into activism during the 1990’s but became widely known around the year 2007 when he released a video, he had titled Collateral murder (Manne, 2011). The video had been received by Chelsea Manning, known at the time as Bradley Manning. The video itself contained footage showing the murder of 15 civilians by US military personnel in an Apache attack helicopter. The release of the video also happened alongside the release of what became known as the Afghan War logs, about 92,000 documents detailing various aspects of the war in Afghanistan, particularly, events which would have been considered criminal by most nations (Manne, 2011). Assange leveraged various online platforms in order to spread the leaks and still does to this day, although it is done on his behalf now as he is currently imprisoned in the UK. While it may seem that we have only high-profile activists that could be the centre of attention such as Julian Assange, Edward Snowden or Bradley Manning, some issues that call for social change are promoted collectively, and the individuals may also be targeted in a collective manner also.

In more recent years, the world has seen the attention women in Iran have received globally, pushing for social change in regard to women’s rights and equality. The protest began in opposition against the Iranian government enforcing that women must wear the hijab, but over time, the protest evolved into one that opposed the ruling government and its heavy handedness in the country when it came to equality and women’s rights more broadly. University of Oxford Scholar Mahsa Alimardani has stated the importance of social media activism in this instance (Alterman, 2022), stating that while social media itself does not necessarily change circumstances, it does bring attention to the issue, which in turn brings in more support from people to pressure the authorities for change. However, the Iranian government are aware of this, and have leveraged social media themselves to promote influence of their own agenda, by using their access to large media organizations, while simultaneously limiting access to the internet for citizens, and also promoting their own views via social media (Schapowal & Schnur, n.d.). This demonstrates the double-edged sword social media can be for activists, bringing both attention to their cause, but attention to themselves, and in this instance, being leveraged by the government themselves.

While it would be easy to state that this kind of oppressive action may only occur in countries where totalitarian governments exist, it would be to our benefit to remember the rhetoric some western politicians have used in regard to online activists. For example, the current United States President Joe Biden once referred to Julian Assange a “high tech terrorist” (Manne, 2011), with Sarah Palin likening him to Osama Bin Laden, while Hillary Clinton and Donald Trump expressed similar sentiments. This opposition to an activist who exposed a war crime crosses the political spectrum from left to right, showing that any activist regardless of position could be a target of any party, whether conservative or progressive. This demonstrates that for activists, the issue of compromised identities and consequences for it is not an issue based on political spectrum and leanings, but one of citizenry and being subject to authorities or corporate entities abusing their power and influence.

Compromised identities.

When an activist’s identity is compromised, it can cause many complications for the individual or many individuals, often putting them in significant danger. We have seen the examples of Julian Assange, Chelsea Manning, and the activists in Iran, and these are only a few. Activists, especially those using technology may often be well equipped with the tools to hide their identity if they choose to, such as Julian Assange or Edward Snowden who are well seasoned when it comes to hacking, programming, and cybersecurity protocols. However, with social media becoming more popular, activists now have easy access to platforms where they can spread information about their cause, but can come with the risk of compromising their identity with new metadata policies by social media sites. This is the issue many activists face now, and part of the problem is the terms of service these platforms use.

Papacharissi (2010) suggests that Facebook for example considers the data it collects from users as proprietary for marketing purposes. This may be true, or their original intention, but perhaps not the intention of other parties. Governments and authorities globally have begun to enact measures or regulations where if they deem an individual’s personal data to be of interest, they may compel social media sites to divulge the information to them. Papacharisso (2010) emphasizes the importance of ownership of ones data as different platforms, and data begin to coincide with each other, becoming a type of monolith where data have may once been owned by one platform could now be owned by many. For instance, Meta now owns Facebook, Instagram, and WhatsApp messenger. If an SNS can be copyrighted and that data created becomes proprietarily owned by the umbrella company, this could be a kind of treasure trove for interested parties looking into circumventing, discrediting, or in extreme cases, imprisoning activists, such as the 170 prisoners of conscience imprisoned in Vietnam (Pearson, 2020) for criticizing their government. Corporations may also take advantage of this, such as BP, who conducted surveillance on activists who opposed their green policies, stating they were deceiving the public and that the policies were essentially a public relations stunt (Uldam, 2018).

It may well be that Meta wants this data for marketing only, as previously stated, but that does not necessitate that governments or malicious actors would not try to attain this data for their own means, regardless of how genuine Meta’s initial intentions may be. This is not to mention the metadata retention laws being implemented in countries like Australia, where ISP’s must retain users’ metadata for 2 years (Sadler, 2023), an act that has already been exploited by private companies extending far beyond the original requirements of only 22 law enforcement agencies, showing the potential for corporate influence over activists if they choose to do so.

Consequences

The result of diminishing privacy, particularly for online activists, can be seen across the globe. We know the big names of Julian Assange, Chelsea Manning, and Edward Snowden, but there are others who may have received less attention in the media, such as activists in Iran over recent years. According to the Freedom House Report (2016), 27 percent of the world’s population live in countries where people have been imprisoned for opposing against the ruling government. Iran is one of these countries. This has become far more common in Iran since the early 2000’s, particularly around the time of the Green Movement (Faris & Rahimi, 2015), which opposed the election results in 2009 which led to opposition leader Mousavi being defeated. Alongside Green Movement supporters using social media, perhaps the most well-known social media activist for this movement was Mousavi himself. Prior to using social media for intelligence to crackdown on the movement, the Iranian regime at the time attempted to suppress activists by more typical methods. Initially, and even before the Green Movement, the Iranian government had a history of imprisoning bloggers dissidents (Faris & Rahimi, 2015), among other methods like violent suppression. The Iranian government then saw the value in the possible intelligence they could gain on its opposition via social media that was not state controlled, and in a strategic move, unblocked Facebook for use by citizens (Faris & Rahimi, 2015). Prior to this, Iranian citizens were unable to access Facebook. This strategy of unblocking Facebook as suggested by Rahimi (2015) was implemented specifically as an intelligence gathering resource, with a priority placed on pro Mousavi supporters. This move gives a strong indication in how the Iranian regime viewed Facebook during this period, as a source of information for those who opposed them. This also coincided with attacks in the same year on Twitter which had been used by activists. The Iranian Cyber Army (Arrington, 2009) is a group suspected to be affiliated with the Iranian government.

This intelligence gathering move via social media may have had an effect, but internet control was the next attempt that occurred several years later. Essentially, this involved creating an internal internet for Iranian citizens, much like China, also with heavy state control and censorship (Faris & Rahimi, 2015). This involved creating parallel like websites that worked like conventional social media websites, such as Facebook. In essence, an internal, Iranian only social network with government control. This allowed the Iranian government to exert control over the information that Iranian citizens were subject to, generally, information that painted the government in a positive light. Although very oppressive, this also demonstrates that the Iranian government had seen the effect of online activism, enough so to deem it such a threat that it had to be controlled. Although tech savvy activists could work around this, those with less experience could still be monitored by the government, while giving the regime the simultaneous advantage of controlling the flow of information being spread. This exposure is what allowed for continued imprisonment and violent action by the government against activists, but in a more targeted and concentrated fashion. This undoubtedly was an effective tactic in helping the government suppress the Green Movement, which was ultimately defeated.

While the movement was defeated, Iran developed a culture of protest and activism in later years as characterized by protests during the last few years related to issues of economy, human rights, water shortages and political corruption. However, the current regime still exerts high levels of control over its online infrastructure, so the identities and information about activists is still very easily compromised, which can lead to violent repercussions, imprisonment or other consequences as previously stated. Iran is only one example of this, and it extends to countries like Saudi Arabia and citizens being imprisoned during the Arab Spring (Pan & Siegel, 2020), or activists arrested during the Hong Kong protests (Griffiths, 2020). We should also not assume that this is not something occurring in the western world. Barack Obama signed the Cybersecurity Act in 2015 (Rep. Dent, 2015), which worked as something of an extension to the Patriot Act (Jaeger et al., 2003), allowing for more access to citizens personal metadata, messages, email, and online interactions through social media. In essence, a measure that can compromise activists’ identities.

These are only a few of the currently imprisoned online activists. As can be seen in these examples, many of their actions can be considered quite harmless, amounting only to critique for the most part. To demonstrate the continued risk of actions being taken against online activists, the Freedom House report (2016) found that 27 percent of the world’s population live in countries where people have been jailed for critique against the government, while 67 percent reside in countries where it is illegal to criticize the government or currently ruling body. If these countries implement laws or regulations that are like Vietnam’s Article 17, disallowing criticism of the state, coupled with governments instating laws compelling social media platforms to hand over identity data where they see fit, we can see how easily a dissident’s identity, safety, and even their life can be put at risk.

Conclusion

Our ability to oppose authority without compromising our safety is integral to societal development. Today, our online identity is linked to that safety. We should not assume that legal always equals morally correct. The opposing position activists take is sometimes necessary to provide the catalyst for change, such as Rosa Parks refusing to sit at the back of a bus, leading to the civil rights movement. While it may be argued that some should take better measures to hide their identity, is the necessity of citizens having to hide their identity from authorities to oppose it not a commentary on that authority in itself and the justification for needing anonymity to begin with? Our willingness to incentivize change should come with the simple right to do so, without fear of social media and authorities cooperating in order to stifle that change.

 

References

Alterman, J. B. (2022). Protest, Social Media, and Censorship in Iran. https://www.csis.org/analysis/protest-social-media-and-censorship-iran

Arrington, M. (2009, December 18). Twitter Hacked, Defaced By ‘Iranian Cyber Army’. TechCrunch. https://techcrunch.com/2009/12/17/twitter-reportedly-hacked-by-iranian-cyber-army/

Griffiths, J. (2020, July 29). Four Hong Kong student activists arrested for ‘secession’ over social media posts | CNN. https://edition.cnn.com/2020/07/29/asia/hong-kong-security-law-election-intl-hnk/index.html

House, F. (2016). Freedom on the net 2016.http://www.europeanrights.eu/public/commenti/BRO6Freedom_on_the_Net_2016__Freedom_House.pdf

Jaeger, P. T., Bertot, J. C., & McClure, C. R. (2003). The impact of the USA Patriot Act on collection and analysis of personal information under the Foreign Intelligence Surveillance Act. Government Information Quarterly, 20(3), 295–314. https://doi.org/10.1016/S0740-624X(03)00057-1

Manne, R. (2011). The Cypherpunk Revolutionary Robert Manne on Julian Assange. The Monthly, Mar 2011, 16–35. https://doi.org/10.3316/ielapa.810907890305223

Faris, D. M., & Rahimi, B. (2015). Social Media in Iran: Politics and Society After 2009. State University of New York Press. http://ebookcentral.proquest.com/lib/curtin/detail.action?docID=4396603

Papacharissi, Z. (2010). A Networked Self: Identity, Community, and Culture on Social Network Sites. Taylor & Francis Group. http://ebookcentral.proquest.com/lib/curtin/detail.action?docID=574608

Pan, J., & Siegel, A. A. (2020). How Saudi Crackdowns Fail to Silence Online Dissent. American Political Science Review, 114(1), 109–125. https://doi.org/10.1017/S0003055419000650

Pearson, J. (2020, November 30). Vietnam steps up online crackdown, jailed activists at record high—Amnesty. Reuters. https://www.reuters.com/article/vietnam-security-socialmedia-idUSKBN28A2GC

Rep. Dent, C. W. [R-P.-15. (2015, December 18). Text – H.R.2029 – 114th Congress (2015-2016): Consolidated Appropriations Act, 2016 (12/18/2015) [Legislation]. http://www.congress.gov/

Sadler, D. (2023, February). Government acts to finally reform metadata regime. Information Age. https://ia.acs.org.au/article/2023/government-acts-to-finally-reform-metadata-regime.html

Schapowal, K., & Schnur, D. (n.d.). Iranian Political Narratives: A Social Media Analysis.

Uldam, J. (2018). Social media visibility: Challenges to activism. Media, Culture & Society, 40(1), 41–58. https://doi.org/10.1177/0163443717704997


Search Site

Your Experience

We would love to hear about your experience at our conference this year via our DCN XIV Feedback Form.

Comments

12 responses to “How modern tech regulations and data gathering compromise activists.”

  1. Danny.Y.Chan Avatar
    Danny.Y.Chan

    Hi Dane,
    Great job on your paper! It is well-researched and provides a thorough analysis of the issue. I particularly liked the analysis of the challenges faced by online activists in maintaining their privacy and safety in the face of government and corporate surveillance.
    Your paper also raises important questions about the role of social media platforms in compromising activists’ privacy and the potential for governments and corporations to exploit user data. I think this touches on a very important issue in today’s digital age.

    I would like to give some suggestions for you to consider; It would be helpful to define some of the acronyms used in the paper, such as SNS and ISP, to ensure that all readers can follow the content.
    In the conclusion, you state that “Our willingness to incentivize change should come with the simple right to do so, without fear of social media and authorities cooperating in order to stifle that change.” It would be good to expand on this idea and exploring potential solutions to this issue.

    My paper is also along the line of user data privacy and how data breaches threatens the community and individuals. I’d love to hear your thoughts about it.

    Cheers!

    Danny

    1. Dane Goulter Avatar
      Dane Goulter

      Hi Danny,
      Thanks for your response to my paper and the feedback. I agree that it is an important issue today, particularly regarding privacy. Many of us have heard of activists and what they do, so I wanted to try delve into the methods and risk for them personally. Perhaps often we notice the people activists fight for, but maybe some of us could be forgetting the activists safety at times.

      After checking, I agree I should have clarified some of them acronyms. I would like to read your paper also, could you possibly reply with a link to it here?

      Thanks again!
      Dane

  2. Yiyun.Wang Avatar
    Yiyun.Wang

    Hi Dane,

    Thank you for your paper about Online and offline radical activities. As you have discussed, online radical activists do suffer from surveillance and threats.
    As a Chinese, I don’t think internal internet controls are really that exaggerated and I can still use a VPN to access the external internet (it just costs more money). Also China had a procession against the lockdown of COVID-19 last year. Although it was a non-radical procession, a lot of people were arrested by the police (I don’t know what happened to them after being arrested). But the procession was effective and within a few days the lockdown was lifted in China, which is indeed an example of successful social change. For me personally, the restrictions are a means of maintaining government rule, deterring the masses and keeping society stable. But the processions in Hong Kong were radical and violent as far as I know. I think violent protests and radicalism can lead to more severe blockades and threaten the lives and freedom of online activists in countries with strict government control. I want to know if you want to protest against something, would you choose to post more information to make people aware or be a radical?

    Cheers!
    Yiyun

    1. Dane Goulter Avatar
      Dane Goulter

      Hi Yiyun,
      Thank you very much for your response! I also followed some of the protests in China and across Hong Kong. It was a little difficult to decipher as it can be difficult in other countries to see what is accurate, compared to internal media (and that also depends on how credible each media source is too!). One example I can think of between corporate and government collusion to silence someone was a someone from Hong Kong. He was a player in an online card game and at the end of his game, he quickly said something in regard to the Hong Kong protests. The game developer which is based in the US, banned him from playing the game after that. Although this is speculation, I imagine it is because they did not want their game to be shut down in China. They did later apologise for it, but the damage to their reputation had already been done.

      For me, I think spreading information would be more for awareness. Such as when Edward Snowden spread information about internal spying on citizens, his goal was simply to make people aware. I think people can oppose governments having too much power, without necessarily being radical in their views. There could be some difficulty though in that sometimes people may get so attached to their views or opposition, that they may become closed to other perspectives also.

      Thanks again,
      Dane

  3. Iesha Roberts Avatar
    Iesha Roberts

    Hi Dane!

    I’m glad you wrote about this! I’ve been keeping an eye on the changes in social media recently, especially with regards to acquisition and legislation in other countries (namely, USA – have you read recently about the ban TikTok bill? There’s a lot more under the hood there than just banning TikTok, which is pretty scary. There was also the recent, ah, incident regarding a certain site and Utah requiring proof of identity and a photo).

    I really agree with your point in the conclusion, that citizens having to go to such lengths to hide their identity as activists from authorities and wider social media is a commentary on that authority. It’s pretty alarming, actually!

    Thanks for the read! This was super well researched and very interesting.
    Cheers!

    1. Dane Goulter Avatar
      Dane Goulter

      Hi Iesha ,

      Thanks for your comment :). I have kept up with some of the issues surrounding TikTok. I recently had a look at some of their terms of service, which I think a lot of people do not read. Theres some alarming things in there, particularly concerning privacy and permission rights to your phone and its contents. I’ve never actually used it myself, however.

      It is a shame some people need to go to these lengths yes. When they don’t we can see examples of what can happen to them, such as Chelsea Manning or Julian Assange.

  4. Mitchell.Broadbent Avatar
    Mitchell.Broadbent

    Hi Dane,

    Fantastic paper! Thanks for giving us the opportunity to read about such an interesting and worthwhile topic. As important as being active online can be, it is important to understand the associated risks and potential dangers.

    There are certainly strategies that can help mitigate those risks such as anonymity/pseudonyms, TOR, etc. But often, in the case of whistleblowers, the important information being leaked is identifying to the activists involved.

    An example which I don’t think you mentioned in your paper (as it pertains to rival activists or opponents rather than governments), is the concept of doxxing activists. This is where personally identifiable information such as identities and addresses are leaked online which can have disastrous effects such as harassment and violence.

    Do you think there are certain imperative policies that governments in free societies should adopt towards the web to ensure that activists can operate freely online without fear of exposure or retribution?

    Thanks

    1. Dane Goulter Avatar
      Dane Goulter

      Hi Mitchell,

      Thank you for your comment. That is true what you say about TOR, pseudonyms and such, I just wonder if some activists less tech oriented may not realise how much information can be found. For example, the incognito window option in Google Chrome might appear fairly private to some people, although it is very far from it.

      I have seen some examples of doxxing, some which resulted in peoples homes being raided by police. I would like to believe that governments would adopt some measures to help activists remain anonymous, but often when whistleblowers leak something, it is about government corruption itself. Considering the complete lack of assistance Australia’s governments have given to Julian Assange for example, I hold little hope for it, but would like to see it happen regardless.

  5. Dane Goulter Avatar
    Dane Goulter

    Thank you to everyone who contributed and commented on my paper :).

  6. Taylor.Neal Avatar
    Taylor.Neal

    Just finished reading your paper, and I must say, you’ve done a ripper job at delving into the challenges faced by activists on social media. I was particularly gripped by your case studies of Julian Assange and the Iranian women’s rights movement, they really bring to life the harsh realities of activism in the digital age.

    One thing I reckon could be interesting to look at a bit more would be the part the big tech companies play in all this. Have they been doing anything to protect activists from having their identities exposed? Also, are there any major differences between how each platform deals with these issues? It’d be cool to hear your thoughts on this.

    1. Dane Goulter Avatar
      Dane Goulter

      Hi Taylor,

      Thank you for your response. As far as big tech companies go in protecting activists privacy, I think it is often actually the opposite. Google for example is generally considered the worlds largest data collector. From things like collecting data on your devices, browsing behaviour, app usage, locations, they even use data inside your Gmail account for various purposes. Some of this data definitely could be used against activists in certain circumstances, such as browsing behaviour, or inbox data. Strangely enough, tech companies have often attracted people who are often in support of privacy, civil liberty and so on, so to see that trend changing today somewhat is odd. On the one hand we often have tech companies taking action or support in certain movements, like Google updating Google Home to have a supportive message about the black lives matter protest, yet on the other hand, they would collect all of this data on the very same activists in that movement.

      In some countries and circumstances I do not think it would be too dangerous (though still sometimes is, such as Australian governments never offering to support Julian Assange in recent years), but in certain countries, you could see how it could present a real danger to some people, such as the women in Iran.

      There is a high level of corporatisation on the internet now, and with that I do think some moral adjustment. If we look back to the 90s or early 2000s, we see tech people like julian Assange, or Aaron Swartz who was one of the founders of Reddit, had a real emphasis on accountability, exposing corruption or crime, free expression and so on. I do believe that is partly a product of hacker culture and the hacker community which almost universally support the freedom to protest or dissent without being victimised. That seems to have grown out of the wild west period of the internet. Now that the internet is far more corporate and business oriented than that time, tech companies seem to have adjusted and adopted some of the more questionable business tactics that you would find in more old fashioned business management.

      A recent example, and although it did not begin as activism, this has caused a lot of outrage and support in one community. A playing card game called Magic: The Gathering had a player order a pack of cards. For reasons unknown, the company sent him a pack of cards that were yet to be released and he showed them on the internet. Very soon after, he received a knock on his door from some people identifying themselves as from the Pinkerton group who were there to collect what they said were stolen goods. If you have ever watched a cowboy western, you may have heard of the Pinkerton group who during the beginning in those times, were essentially a group of thugs hired to intimidate, attack, harass or even murder people, though they called themselves private security. It is that very same group which has survived until today and call themselves a private security and detective agency. The person whom they went to collect the so called stolen goods from reported that they had been harassing his neighbours, threatened him in front of his family with jail time, fines and “other” consequences.

      This has now evolved into a large community who play the game into actively trying to expose what was done to this person online, essentially a type of activism. Many long time players have said they will drop the game and refuse to buy from the company again. The company publishing the game said they would never hire anyone to harass someone, even though that is exactly what happened and is confirmed they did indeed hire the Pinkerton group to recover their goods they mistakenly sent to him to begin with.

      I think this is a good example of corporatisation of the internet, the extent that companies will go to, and why privacy and identity protections are needed. If this company went to this extent over a packet of cards, what might they do to activists who campaign against them and cause them an actual loss in revenue? The cards sent to this player did not cause them any actual losses, yet this was the extent to which they were willing to go, so to speculate that they would go to a further extent with those that could cause real losses to their business would be a fair assumption I would say.

Skip to content