Egyptian Uprising - a 'social media revolution'?

Arab Spring: Civil Unrest Across North Africa

The 'Arab Spring'  pro-democracy uprisings and  their outcomes varied wildly, yet they had one defining characteristic in common: social media.

On 25 January 2011 hundreds of thousands of protesters started to gather in Tahrir Square and planted the seeds of unrest which, days later, finally unseated the incumbent president, Hosni Mubarak, after 30 years of power.

Almost a year after Tunisia had erupted in mass demonstrations, the central Cairo protests triggered further waves of change across the Middle East and North Africa, in what became known as the Arab Spring.

But while the nature of each pro-democracy uprising, and their ultimate success, varied wildly from country to country, they had one defining characteristic in common: social media.

At times during 2011, the term Arab Spring became interchangeable with “Twitter uprising” or “Facebook revolution”, as global media tried to make sense of what was going on.

But despite western media’s love affair with the idea, the uprisings didn’t happen because of social media. Instead, the platforms provided opportunities for organisation and protest that traditional methods couldn’t.
In the words of one protester, Fawaz Rashed: “We use Facebook to schedule the protests, Twitter to coordinate, and YouTube to tell the world.”

Nowhere was this clearer than in Egypt, where social media was well embedded in the culture of the country’s overwhelmingly young population – 60% under the age of 30.

Their online revolutionary spirit was infectious for those watching from afar. According to the Project on Information Technology and Political Islam the number of tweets posted about Egypt – many using #Jan25 in homage – jumped from 2,300 to 230,000 per day the week before Mubarak stepped down on the 11 February. Foreign Policy magazine declared the Egyptian revolution the Twitter “news moment” of the year.

But feelings of revolutionary success were short lived as Mubarak’s government was replaced by the equally repressive Muslim Brotherhood, before he was ousted by a military coup in July 2013. Eventually, the party was replaced by Abdel Fattah al-Sisi, under whom state repression, intimidation and attacks on press freedom has gone from bad to worse.

A conflicted tool

The same tool that united people to topple dictators eventually tore things  apart - Wael Ghonmin

Wael Ghonmin is one of those credited with kickstarting the Egyptian revolution with a “simple, anonymous” Facebook page: We are all Khaled Said, set up in homage to a 29-year-old man who had been tortured to death by the police.

It gathered 100,000 followers in three days and quickly became the most followed page in the Arab world.

But then “the euphoria faded, we failed to build consensus and the political struggle led to intense polarisation,” said Ghonmin at a recent Ted talk. Social media quickly became a battlefield of misinformation, rumours and trolls – “the same tool that united us to topple dictators eventually tore us apart,” he said.

Guardian: http://bit.ly/1QSuTSO

« The Tech Revolution Will Change Or Even Erase Your Job
Cyber and Reality Domains Converge As The US Targets ISIS Hackers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Cyber Security Associates (CSA)

Cyber Security Associates (CSA)

Cyber Security Associates provides cyber consultancy and cyber managed services which help to detect, protect and educate against the ever-changing cyber threat.

CrowdStrike

CrowdStrike

CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks.

Kudelski Security

Kudelski Security

Kudelski Security is an international cybersecurity company providing innovative, independent and tailored security solutions for large enterprise and public sector clients.

Exatel

Exatel

Exatel is Poland’s leading provider of ICT security services.

Echoworx

Echoworx

Echoworx primary and exclusive focus is providing organizations with secure email services.

Featurespace

Featurespace

Featurespace is a world-leader in Adaptive Behavioural Analytics and creator of the ARIC platform for fraud and risk management.

Data Protection People

Data Protection People

Data Protection People are specialists in Data Privacy, Governance, and Information Security.

DivvyCloud

DivvyCloud

DivvyCloud protects your cloud and container environments from misconfigurations, policy violations, threats, and IAM challenges.

Cingo Solutions

Cingo Solutions

Cingo Solutions is a Managed Detection & Response company providing specialized data security services.

Cyber Smart Defense

Cyber Smart Defense

Cyber Smart Defense is a specialist provider of penetration testing services and IT security audits.

ByteSnipers

ByteSnipers

ByteSnipers specialize in penetration testings and secure development services. Our focus is on your security.

E2E Technologies

E2E Technologies

E2E Technologies are a proactive, SLA-beating, managed service provider that busts the common stereotypes surrounding IT.

Bittnet Training

Bittnet Training

Bittnet Training is the leader in the IT Training market in Romania. We develop the IT skills of IT professionals as well as those who wish to start a career in IT.

Tenchi Security

Tenchi Security

Tenchi Security are specialized in Third-Party Cyber Risk Management (TPCRM) and aim to reduce information asymmetry when it comes to third and Nth-Party security and compliance risk management.

Chorus

Chorus

Chorus are a leading Managed Security Service Provider (MSSP), and member of the Microsoft Intelligent Security Association (MISA), with three Microsoft Advanced Specialisations in security.

Vana Solutions

Vana Solutions

Vana Solutions is an Information Technology Services company. We help commercial & federal organizations select, adapt, and integrate the right technology solution so you can move faster.