Egyptian Uprising - a 'social media revolution'?

Arab Spring: Civil Unrest Across North Africa

The 'Arab Spring'  pro-democracy uprisings and  their outcomes varied wildly, yet they had one defining characteristic in common: social media.

On 25 January 2011 hundreds of thousands of protesters started to gather in Tahrir Square and planted the seeds of unrest which, days later, finally unseated the incumbent president, Hosni Mubarak, after 30 years of power.

Almost a year after Tunisia had erupted in mass demonstrations, the central Cairo protests triggered further waves of change across the Middle East and North Africa, in what became known as the Arab Spring.

But while the nature of each pro-democracy uprising, and their ultimate success, varied wildly from country to country, they had one defining characteristic in common: social media.

At times during 2011, the term Arab Spring became interchangeable with “Twitter uprising” or “Facebook revolution”, as global media tried to make sense of what was going on.

But despite western media’s love affair with the idea, the uprisings didn’t happen because of social media. Instead, the platforms provided opportunities for organisation and protest that traditional methods couldn’t.
In the words of one protester, Fawaz Rashed: “We use Facebook to schedule the protests, Twitter to coordinate, and YouTube to tell the world.”

Nowhere was this clearer than in Egypt, where social media was well embedded in the culture of the country’s overwhelmingly young population – 60% under the age of 30.

Their online revolutionary spirit was infectious for those watching from afar. According to the Project on Information Technology and Political Islam the number of tweets posted about Egypt – many using #Jan25 in homage – jumped from 2,300 to 230,000 per day the week before Mubarak stepped down on the 11 February. Foreign Policy magazine declared the Egyptian revolution the Twitter “news moment” of the year.

But feelings of revolutionary success were short lived as Mubarak’s government was replaced by the equally repressive Muslim Brotherhood, before he was ousted by a military coup in July 2013. Eventually, the party was replaced by Abdel Fattah al-Sisi, under whom state repression, intimidation and attacks on press freedom has gone from bad to worse.

A conflicted tool

The same tool that united people to topple dictators eventually tore things  apart - Wael Ghonmin

Wael Ghonmin is one of those credited with kickstarting the Egyptian revolution with a “simple, anonymous” Facebook page: We are all Khaled Said, set up in homage to a 29-year-old man who had been tortured to death by the police.

It gathered 100,000 followers in three days and quickly became the most followed page in the Arab world.

But then “the euphoria faded, we failed to build consensus and the political struggle led to intense polarisation,” said Ghonmin at a recent Ted talk. Social media quickly became a battlefield of misinformation, rumours and trolls – “the same tool that united us to topple dictators eventually tore us apart,” he said.

Guardian: http://bit.ly/1QSuTSO

« The Tech Revolution Will Change Or Even Erase Your Job
Cyber and Reality Domains Converge As The US Targets ISIS Hackers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Lastline

Lastline

Lastline is the leader in advanced malware protection.

Technology Industries of Finland (TIF)

Technology Industries of Finland (TIF)

Technology Industries of Finland (TIF) is a business and labour market lobbying organization that promotes the competitiveness and business conditions of Finland’s most crucial export industry.

PSC

PSC

PSC is a leading PCI and PA DSS assessor and Approved Scanning Vendor.

Conceptivity +360 Cybersecurity

Conceptivity +360 Cybersecurity

Conceptivity +360 Security addresses advanced cybersecurity and supply chain security issues in policy, regulatory, legislation, standardisation, compliance and project management areas.

Black Kite

Black Kite

Black Kite (formerly NormShield) provides comprehensive Security-as-a-Service solutions focused on cyber threat intelligence, vulnerability management and continuous perimeter monitoring.

Aptible

Aptible

Security Management and Compliance for Developers. Aptible helps teams pass information security audits and deploy audit-ready apps and databases.

Calero Software

Calero Software

Calero is a leading global provider of Communications and Cloud Lifecycle Management (CLM) solutions designed to simplify the management of voice, mobile and other unified communications services.

Fingent

Fingent

Fingent develops strategic software solutions for businesses across the globe in areas including Network Security, Infrastructure Security, Application Security, Risk and Compliance.

Privakey

Privakey

Transaction Intent Verification. Privakey delivers a secure channel to streamline high risk transactions, enabling digital trust between services and their users.

Conference on Applied Machine Learning in Information Security (CAMLIS)

Conference on Applied Machine Learning in Information Security (CAMLIS)

CAMLIS is a venue for discussing applied research on machine learning, deep learning and data science in information security.

Cira Info Tech

Cira Info Tech

Cira InfoTech’s cyber security and network consulting and managed services deliver unmatched talented resources and capabilities required to design and build an agile and adaptive IT environment.

Melius Cyber Security

Melius Cyber Security

Melius Cyber Security has developed a world-leading SaaS platform, Cyber Safe Plus, built around continuous assessment and improvement through vulnerability scanning and penetration testing

Intersistemi Italia

Intersistemi Italia

Intersistemi is a leading Italian company in the field of information technology integration and digital transformation including cybersecurity.

X Technologies

X Technologies

X Technologies provide world-class engineering, information technology, information security, program management and repair services to Federal, State and commercial customers.

Accedian

Accedian

Accedian is a leader in performance analytics and end user experience solutions, dedicated to providing our customers with the ability to assure their digital infrastructure.

NetCentrics

NetCentrics

NetCentrics leverages an innovative, agile, ‘what’s-next’ approach to our customers’ IT and cyber challenges.

Kontra

Kontra

Kontra application security training is an interactive and intuitive learning experience that engages developers.