Social Media Helped Create The Arab Spring, But Could Not Save It

Five years ago massive protests toppled Egyptian President Hosni Mubarak, marking the height of the Arab Spring.

Empowered by access to social media sites like Twitter, YouTube and Facebook, protesters organized across the Middle East, starting in December 2010 in Tunisia, and gathered together to speak out against oppression, inspiring hope for a better, more democratic future.

Commentators, comparing these activists to the US peace protesters of 1968, praised the effort as a democratic dawn for an area that had long been populated by autocracies. In a photo collection published by The New York Times a few months later, Irish writer Colum McCann wrote: “The light from the Arab Spring rose from the ground up; the hope is now that the darkness doesn’t fall.”

Social media, it turns out, was not a new path to democracy, but merely a tool.

The darkness has fallen. Half a decade later, the Middle East is roiling in violence and repression. Activists are being intimidated into restraint by governments that are, with the exception of Tunisia, more totalitarian than those they replaced, if any government as such really exists at all. Meanwhile, militants have harnessed the same technology to organize attacks and recruit converts, catapulting the world into instability. Instead of new robust democracies, we have a global challenge with no obvious solution. The Arab Spring carried the promise that social media and the Internet were going to unleash a new wave of positive social change. But the past five years have shown that liberty isn’t the only end toward which these tools can be turned.

Activists were able to organize and mobilize in 2011 partly because authoritarian governments didn’t yet understand very much about how to use social media. They didn’t see the potential, says NYU professor of politics Joshua Tucker, a principle investigator at the Social Media and Political Participation Lab at New York University. “There are a lot of reasons the people in power were slow to pick up on this,” he adds. “One of the things about not have a free press is it is harder to learn what was going on in the world.”

Spreading Miss-information

Today, governments take an aggressive hand in shutting down digital channels people use to organize against them. In Egypt, for example, where 26 million people are on Facebook (up from 4.7 million people in 2011), security forces arrested three people who administered nearly two-dozen Facebook pages, according to Egyptian media reports. It also detained activists who had been involved in prior protests. And at the end of December, the government shut down Facebook’s Free Basics service, which had offered free Internet services to Egyptians on mobile phones.

More than 3 million people had signed up for the program in just two months, according to Facebook. Meanwhile Turkey has made 805 requests for tweets to be removed since 2012, according to Twitter’s most recent transparency report; more than half were made last year.

These governments have also become adept at using those same channels to spread misinformation. “You can now create a narrative saying a democracy activist was a traitor and a pedophile,” says Anne Applebaum, an author who directs a program on radical political and economic change at the Legatum Institute in London. “The possibility of creating an alternative narrative is one people didn’t consider, and it turns out people in authoritarian regimes are quite good at it.”

The tools that catalyzed the Arab Spring, we've learned, are only as good or as bad as those who use them.

Even when activists are able to get their messages out, they have trouble galvanizing people to actually take action. The sentiments that gain the largest audiences often contain religious elements, according to Mansour Al-hadj, who is a director at the Middle East Media Research Institute. “The message by itself without any religious element in it, wouldn’t work in the long run,” he says. “The activists’ accounts on Twitter and Facebook are very active and they have a lot of followers, but they cannot drive masses,” he says, because their sentiments are more moderate.

Laced through media coverage of the Arab Spring was what turned out to be the naïve hope that people were inherently, unequivocally good and that unleashing their collective consciousness via social media would naturally result in good things happening. But it turns out that consciousness was not so collective after all. The tools that catalyzed the Arab Spring, we’ve learned, are only as good or as bad as those who use them. And as it turns out, bad people are also very good at social media. Militant groups like the Islamic State have been reported to recruit converts using Facebook and Twitter and use encrypted communications technology to coordinate attacks.

To be sure, the Arab Spring protests—and the subsequent political protests from Occupy Wall Street to Russian demonstrations in 2012—were significant. They introduced a new form of political and social organizing, of “hyper-networked protests, revolts, and riots.” But we’re just beginning to understand the impact of this new communications technology. Social media, it turns out, was not a new path to democracy, but merely a tool. And for a few brief months, only the young and the idealistic knew how it worked.

Wired: http://bit.ly/1PimTtc

« New UK Cybersecurity Accelerator Program
Security & Privacy Are Critical To Connected Cars »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Stratogent

Stratogent

Stratogent does IT and Cybersecurity operations. We specialize in high-touch and high-change IT environments, especially in the biotech and pharma industry verticals.

TestFort

TestFort

TestFort QA Lab is a specialized software testing company offering independent quality assurance and software testing services.

Junglemap

Junglemap

Junglemap provide nanolearning training courses on ransomware, information security and GDPR.

Crosscheck Networks

Crosscheck Networks

Crosscheck products allow you to test your APIs across different protocols and message formats with functional automation, performance, and security testing capabilities.

Excelerate Systems

Excelerate Systems

Excelerate Systems is a leading provider of IT services with a focus on Big Data, Cloud Services and Security.

Trustify

Trustify

Trustify is a Managed Security Service Provider offering a suite of world-class Cyber Risk Management services.

Tracepoint

Tracepoint

Tracepoint provide full-service cyber incident response, remediation and recovery solutions for the most time-sensitive situation your company may ever face.

Logit.io

Logit.io

Logit.io is a log analysis & management platform that provides a scalable solution for hosting the open-source tools Elasticsearch, Logstash, and Kibana.

Palitronica

Palitronica

Palitronica build cutting-edge hardware and breakthrough software that revolutionizes how we defend critical infrastructure and key resources.

Coviant Software

Coviant Software

Coviant Software delivers secure managed file transfer (MFT) software that integrates smoothly and easily with business processes.

Amazon Web Services (AWS)

Amazon Web Services (AWS)

Amazon Web Services is the world’s most comprehensive and broadly adopted cloud platform, offering fully featured services from data centers globally.

ELLIO Technology

ELLIO Technology

ELLIO Technology is a cybersecurity company that reduces alert overload, improves incident response, and helps security teams target serious attackers who pose a real threat.

ReachOut Technology

ReachOut Technology

ReachOut is a transformative approach to IT Security, Support, and Guidance. But we’re more than that. We’re passionate IT experts driven to make solutions to your problems.

Dapple Security

Dapple Security

Dapple Security is creating cutting edge technology utilizing responsible biometrics that protects people and privacy through a first-of-its-kind passwordless platform.

Cipher Net Shield

Cipher Net Shield

Cipher Net Shield specializes in secure E-wallet solutions with a strong focus on blockchain and cybersecurity, prioritizing both transaction security and the recovery of lost capital.

Saidot

Saidot

Saidot is a Finnish AI governance and alignment company committed to helping businesses safely and transparently integrate AI into their operations.