{"id":1311,"date":"2010-01-21T20:49:05","date_gmt":"2010-01-22T03:49:05","guid":{"rendered":"http:\/\/www.talesfromthe.net\/jon\/?p=1311"},"modified":"2024-01-20T04:56:21","modified_gmt":"2024-01-20T04:56:21","slug":"privacy-and-social-networks-a-grassroots-social-network-activists-perspective","status":"publish","type":"post","link":"https:\/\/2024.thenexus.today\/index.php\/2010\/01\/21\/privacy-and-social-networks-a-grassroots-social-network-activists-perspective\/","title":{"rendered":"Privacy and social networks: a grassroots social network activist&#8217;s perspective"},"content":{"rendered":"<blockquote><p>Social network sites epitomize the wave of the future, Obama&#8217;s strength in 2008, and youth. \u00c2\u00a0They&#8217;re overwhelmingly in favor of civil liberties. \u00c2\u00a0And civil liberties supporters are getting organized there.<\/p>\n<p>&#8212; <a href=\"http:\/\/www.talesfromthe.net\/jon\/?p=1113\">Social network activism and the future of civil liberties<\/a>, originally published on <em>Pam&#8217;s House Blend<\/em><\/p><\/blockquote>\n<p><em>At the annual privacy coalition meeting in Washington DC, Lillie Coney of EPIC asked me to be on a panel on &#8220;Cloud Computing and Social Networking&#8221; moderated by Rebecca MacKinnon. \u00c2\u00a0 Some of the topics she suggested I might want to cover include how the projects I&#8217;ve worked on have brought people together on social networks, and where users&#8217; control of personal information did and didn&#8217;t matter.\u00c2\u00a0 Here&#8217;s a sketchy version of what I&#8217;m thinking of saying &#8230;.<\/em><\/p>\n<ol>\n<li>social network activism is a powerful way to reach and engage people who care about\u00c2\u00a0 the issues but are currently not active supporters.\u00c2\u00a0 unique advantages include rapid information diffusion through trusted sources, public indications of strength, creating and strengthening bonds between participants, and media attention<\/li>\n<li>people can participate publicly (changing status, posting links, joining groups, contacting politicians), secretly (forwarding information by private messages or in &#8220;friends-only&#8221; groups) or passively (consuming information).\u00c2\u00a0 for secret and passive participants, control of information and privacy is extremely important<\/li>\n<li>the privacy and civil liberties community in the US has a huge opportunity to change the dynamics of the debate by devoting a lot more resources to social network activism<\/li>\n<\/ol>\n<p><!--more-->Let&#8217;s briefly look at three case studies that illustrate this.*\u00c2\u00a0 All had major successes:<\/p>\n<ul>\n<li>Get FISA Right got warrantless wiretapping and telecom immunity into the mainstream media in June\/July 2008<\/li>\n<li>Join the Impact organized over 100 simultaneous protests and 200,000 people in the streets in just 10 days<\/li>\n<li>#iranelection influenced CNN coverage immediately after the election and along with the Mousavi Facebook page has since turned into the best source of information about Iran<\/li>\n<\/ul>\n<p>Different levels of concerns about privacy for different people.\u00c2\u00a0 For GFR, virtually all communication was public.\u00c2\u00a0 It was the first time many people had been in a situation where they were being monitored by the government; there were plenty of nervous jokes about it, and I don&#8217;t know how many chose not to participate out of fear.\u00c2\u00a0 And when we tried to make the leap from our original home on my.barackobama.com to Facebook, a lot of people weren&#8217;t interested in being in such a privacy-invasive environment.\u00c2\u00a0 And who can blame them?<\/p>\n<p>For JTI, word spread through a lot of different mechanisms: email, Google Groups, Twitter, and Facebook.\u00c2\u00a0 When I signed up to attend the Seattle JTI event, or shared photos I took there, all my friends could see &#8212; including a homophobic former colleague and Deborah&#8217;s Mom.\u00c2\u00a0 Hmm.\u00c2\u00a0 For a lot of people, this is a huge problem.\u00c2\u00a0 Even worse, with Facebook&#8217;s recent privacy changes, there&#8217;s a good chance that *everybody* could see.<\/p>\n<p>With #iranelection, there&#8217;s no question that the authorities are monitoring public communications on the Twitter hashtag.\u00c2\u00a0 There&#8217;s a heartbreaking tweet from persiankiwi, a student who was very visible on the hashtag right after the election, regretting having putting a friend at risk by accidentally revealing enough information to identify him.\u00c2\u00a0 More recently there&#8217;s been a huge debate over an article in the Daily Telegraph attack accusing westerners of putting Iranians at risk by their tweeting.\u00c2\u00a0 Meanwhile on Facebook, I&#8217;ve heard that some Persians in the US who have relatives back in Iran are concerned about commenting on the Mousavi page &#8212; or even visiting it, unsure if the Iran government might have a way of discovering the information that Facebook or its advertisers track.<\/p>\n<p>So yes, privacy and control of information is hugely important from an activism perspective.<\/p>\n<p>Still even in extraordinarily dangerous situations, social network activism has had major successes &#8212; Voces contra las FARC, Egypt, Moldova, #longmarch in Pakistan, and so on.\u00c2\u00a0 Often the international community plays a big role; it&#8217;s safer and easier for people in the US and Western Europe to act as the public hubs.\u00c2\u00a0 In some circumstances Tor, Haystack, and other technologies can give tech-savvy activists some protections.\u00c2\u00a0 And of course a lot of people either are willing to take the risk &#8212; or participate without having thought the risks through.<\/p>\n<p>Compare and contrast this with privacy activism in the US.\u00c2\u00a0 It&#8217;s often a popular cause: for example, pressuring Facebook to respect its users privacy.\u00c2\u00a0 Even when it&#8217;s a contentious issue like the Patriot Act, it&#8217;s typically not dangerous to engage in online advocacy.\u00c2\u00a0 And for the most part, my guess is that the key players &#8212; the people in this room and your organizations &#8212; are not at any risk from exposing their professional life and connections on social networks.\u00c2\u00a0 &#8220;They&#8221; know that we all know each other.\u00c2\u00a0\u00c2\u00a0 We even have meetings where we get together in hotels with surveillance cameras.<\/p>\n<p>And with computers, mobile phones, and social network sites so pervasive in the US, there&#8217;s fertile ground here for education and activism on the topics that most of the media wants to ignore.\u00c2\u00a0\u00c2\u00a0 Privacy and civil liberties are unique in that they appeal to many of the best-organized online communities: progressives, libertarians, drug policy reform and pot legalizaiton advocates, migrant rights groups like the DREAM Activists, LGBTQ&#8217;s &#8230; and groups like EPIC, ACLU, CDT, EFF and others are getting increasingly well organized online.<\/p>\n<p>So as each of the organizations tomorrow discusses plans for the upcoming year, I hope they&#8217;ll describe what they&#8217;re doing on social networks &#8212; not as an afterthought, but as an integral part of their strategy.<\/p>\n<p>And putting on my hat as co-chair of this year&#8217;s <a href=\"http:\/\/cfp.acm.org\/wordpress\/?p=28\">Computers, Freedom, and Privacy conference<\/a>, we&#8217;re planning on once again having a workshop and panels on social network activism.\u00c2\u00a0 So please propose topics, speakers, panels, and tutorials\u00c2\u00a0 on this &#8211; as well as all the other CFP topics.\u00c2\u00a0 <a href=\"http:\/\/www.cfp2010.org\/wiki\/index.php\/Call_for_presentations%2C_tutorials%2C_and_workshops\">Here&#8217;s the information about how to submit a proposal<\/a>.\u00c2\u00a0 The conference is in San Jose, June 15-18.\u00c2\u00a0\u00c2\u00a0 If you can make it to the conference in person, please join us &#8212; it&#8217;s going to be great.\u00c2\u00a0 If not, we&#8217;ll get as much as we can online &#8230; via ustream, Twitter, Facebook, Google Wave, and other privacy-infringing technoolgies.<\/p>\n<p>jon<\/p>\n<p>* for more information on these and many other social network activism campaigns including #dontgo, One Million Strong For Barack, Twitter Vote Report, the Voter Suppression Wiki, the Motrin Moms, the Facebook Terms of Service protest, and #p2, please see the links in my <a href=\"http:\/\/www.talesfromthe.net\/jon\/?page_id=742\">Selected writing on activism<\/a> page<\/p>\n<hr\/>\n<p>Update, October 20, 2011: I finally removed the &#8220;(DRAFT)&#8221; from the title \ud83d\ude42<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social network sites epitomize the wave of the future, Obama&#8217;s strength in 2008, and youth. \u00c2\u00a0They&#8217;re overwhelmingly in favor of civil liberties. \u00c2\u00a0And civil liberties supporters are getting organized there. &#8212; Social network activism and the future of civil liberties, originally published on Pam&#8217;s House Blend At the annual privacy coalition meeting in Washington DC, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16,1],"tags":[],"class_list":["post-1311","post","type-post","status-publish","format-standard","hentry","category-tales-from-the-net","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/posts\/1311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/comments?post=1311"}],"version-history":[{"count":1,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/posts\/1311\/revisions"}],"predecessor-version":[{"id":4316,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/posts\/1311\/revisions\/4316"}],"wp:attachment":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/media?parent=1311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/categories?post=1311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/tags?post=1311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}