National Academies Press: OpenBook
« Previous: 3 Uses of Technology in the Field
Suggested Citation:"4 The Misuse of Technologies." National Academy of Engineering. 2013. Sensing and Shaping Emerging Conflicts: Report of a Workshop by the National Academy of Engineering and United States Institute of Peace Roundtable on Technology, Science, and Peacebuilding. Washington, DC: The National Academies Press. doi: 10.17226/18349.
×

4

The Misuse of Technologies

Two presentations at the workshop addressed the use of technologies to repress political change, perpetuate conflict, or otherwise undermine peacebuilding agendas. Countries, organizations, and individual response to the application of technology to peacebuilding, they can be expected to both counter those applications and use technologies for their own ends. Peacebuilders need to recognize these countervailing forces and plan and act accordingly if they are to make progress in reducing conflict and violence.

EXERTING CONTROL OVER INFORMATION

Ivan Sigal, executive director of Global Voices, which conveys to global audiences the voices of bloggers, writers, digital media activists, and translators who work in the developing world, began his examination of the misuses of technology by analyzing one of the two broad themes of the workshop: the means used to shape conflicts.

Conflict involves contestation, and those involved—including peacebuilders—have both intention and agency. Thus the activists represented by Global Voices have agency and seek to shape or influence their communities, as do their opponents in governments. Many of these activists use a collaborative and distributed form of knowledge to push ideas forward. To do this,

Suggested Citation:"4 The Misuse of Technologies." National Academy of Engineering. 2013. Sensing and Shaping Emerging Conflicts: Report of a Workshop by the National Academy of Engineering and United States Institute of Peace Roundtable on Technology, Science, and Peacebuilding. Washington, DC: The National Academies Press. doi: 10.17226/18349.
×

they need not only access to authority and power but also relationships in information networks that allow them to influence those networks.

In the Arab spring, maps of Twitter influence revealed important “nodes” in information networks. The individuals in question were not gatekeepers to authority and did not have exclusive access to resources, but they were good listeners and understood what kinds of skills could be of use to the communities they were addressing. For example, the activist who helped to overthrow the Ben Ali regime in Tunisia had been active in a distributed network for six or seven years testing different information strategies, including the use of big data tactics and distributed data to demonstrate why the regime was corrupt. A follow-on of WikiLeaks was Tunileaks, which led to a series of stories revealing the extent of Ben Ali’s corruption from the perspective of the US government. These stories validated the claims of the opposition and further drove the conflict.

Governments, whether oppressive or not, can react to technology-enabled peacebuilding through their own use of technology. They may try to control leaks or access to information (as described in the next section). Moreover, oppressive regimes appear to be learning from each other and collaborating in their use of technologies, Sigal noted—techniques used in Syria to conduct surveillance or filtering are almost identical to those used by Iran, and many countries in the Commonwealth of Independent States have very similar filtering systems that appear to be the result of collaboration.

Sigal also observed that countries have collaborated on Internet governance that would treat the Internet as media and therefore subject to state jurisdiction. The model of a “territorialized Internet, one where telecommunication borders and national borders are congruent, is one that is broadly appealing” among countries that seek to control Internet use. The United States and other countries “don’t have a vision for what we want the Internet to be—they do.”

Sigal also described efforts by governments to use economic rather than political means to block Internet use. The government of Kazakhstan, for example, has been able to essentially create a national firewall without declaring one by incentivizing the largest telecommunications company in the country to provide free access to any kind of data, whether file sharing, music, or videos, while people who go outside the network pay for the data they access. “Suddenly going to Google…becomes a decision. Do I want to go to Google, or do I want to go to the one that I can get for free with KazakhTelecom?” While it may be easy to criticize China for erecting

Suggested Citation:"4 The Misuse of Technologies." National Academy of Engineering. 2013. Sensing and Shaping Emerging Conflicts: Report of a Workshop by the National Academy of Engineering and United States Institute of Peace Roundtable on Technology, Science, and Peacebuilding. Washington, DC: The National Academies Press. doi: 10.17226/18349.
×

a firewall around the country, it is more difficult to argue that the price KazakhTelecom charges for people to search Google is a travesty of choice.

At a deeper level, Sigal warned about the temptation to view Big Brother as a metaphor for the evolution of cyberspace. Such a view assumes that regimes are monolithic, but they usually are not; rather, they shift or split their alliances to achieve multiple and contrasting objectives. A better paradigm is Aldous Huxley’s Brave New World. “Given enough freedom, we surveill ourselves. It’s not that there’s a watcher who will control everything that we do. [It’s] us, especially in free societies.”

Policymakers can take several steps to help communities of activists and prodemocracy organizations oppose the actions of oppressive governments. For example, some projects funded by the State Department have helped provide anonymity for activists. Since many of the technologies that repressive regimes use to track, spy on, and otherwise monitor activists come from Western companies, export controls can clamp down on the distribution of these technologies. However, this approach is more difficult with nondemocratic countries that are nominally allies, and such controls do not affect unfriendly countries where some of these technologies are made.

Some technology companies are working actively, though quietly, with activists toward positive ends. Some have hotlines and mediation processes so that if a government attempts to take down a posting, a company can assert that it is in fact a piece of rights documentation. “I want to commend those companies,” said Sigal. “That kind of process that allows for some kind of clarification about what the political value of that material is has a lot of impact.” Companies that build surveillance and privacy tools also have the option of conducting human rights audits among their clients, a strategy backed by many freedom-of-expression advocates.

A critical aspect of interpreting the information generated by technologies, said Sigal, is the creation of a frame for analysis. A set of events can occur that will not necessarily predict an outcome but make it more likely. For that reason, Global Voices analyzes, translates, and aggregates local citizen media for global audiences, focusing mostly on the developing world, and systematically tracks threats or events in fragile states. “We can see these events occur, almost like a rhythm, within a set of 50 to 60 countries around the world. That’s reactive, but it gives us a policy framework for imagining where these events might occur.”

He also noted that peacebuilding is not the only framework for looking at sensing and emerging conflicts. People involved in conflicts do not necessarily see them in a negative light. Through a lens of justice, democracy

Suggested Citation:"4 The Misuse of Technologies." National Academy of Engineering. 2013. Sensing and Shaping Emerging Conflicts: Report of a Workshop by the National Academy of Engineering and United States Institute of Peace Roundtable on Technology, Science, and Peacebuilding. Washington, DC: The National Academies Press. doi: 10.17226/18349.
×

building, or other activist frames, the same sort of data can be applied to a different agenda. He urged questioning “the normative assumption that conflict is always necessarily a bad thing. Because there is, I think, more of a continuum often between conflict which is creative, conflict which drives change, and conflict which is violent and negative.”

THE NEW SOCIAL REALITIES OF CYBERSPACE

Cyberspace has created a new social reality, said Rafal Rohozinski, principal with the SecDev Group, and laws have not been well adapted to govern this new reality. The use of new technologies to either protect or deny rights has not been defined legally or normatively. The result can be strong disruptions and distortions in political systems depending on how those systems operate.

Rohozinski observed that Western governments to some extent exhibit what he called “the complacency of empire” with respect to information technologies. The Internet was invented, developed, and propagated around the world by the West. This technology, which has grown far beyond its original intended purpose, has created a platform for extending diplomacy through NGOs. The scale, scope, and reach of NGOs have expanded in ways that would not have been possible without the Internet, as have the business models of companies such as Google that were founded on the characteristics of the Internet. As a result, people in Western countries tend to take their freedom of navigation through cyberspace entirely for granted.

But the Internet is changing. The vast majority of Internet users are no longer in North America, which represents only about 13 percent of the global Internet population and is declining. Two-thirds of all global Internet users are under the age of 35, and 40 percent are under the age of 25. Three out of five new Internet users live in states that are considered either failed or at risk of fragility. “The center for innovation, the drive to create things in this space, the impetus to try to describe it in policy terms, is no longer in Washington, no longer in Ottawa, the UK, or anywhere else. It’s shifting slowly but distinctly to the South and to the East,” said Rohozinski.

This shift will have an impact on the governance of cyberspace, Rohozinski predicted. As people have come online, so have state interests and politics. This makes sense, said Rohozinski, since “a space that is colonized by a majority of your citizens is going to have all sorts of behaviors which, if those behaviors are translated into real life, would have real consequence.” Thus, cyberspace has become a place to be regulated and policed.

Suggested Citation:"4 The Misuse of Technologies." National Academy of Engineering. 2013. Sensing and Shaping Emerging Conflicts: Report of a Workshop by the National Academy of Engineering and United States Institute of Peace Roundtable on Technology, Science, and Peacebuilding. Washington, DC: The National Academies Press. doi: 10.17226/18349.
×

Because of the way the Internet is run, governments do not have the ability to create the equivalent of a physical border around their corner of cyberspace and keep their citizens inside it while keeping others away. But they have an interest in doing so. One possibility is that in the future the Internet will no longer be neutral but will be subject to national laws. This could legitimate filtration, censorship, surveillance, and other forms of control pertaining to media, defamation, and other acts. People may no longer have the freedom of passage through cyberspace to which they are accustomed. Instead, the Internet could become much more fragmented and more like national telecommunication spaces.

One enabler of this change is that the intelligence in the Internet has shifted from the periphery to the center. Today, telecommunications providers have much more control over the Internet than in the past because they carry much more data, through television, mobile telephony, radio, and other forms of content. As a result, these companies are now able to measure, monitor, parcel, and direct traffic in ways that they could not before. As these central controllers pass cell phone service from one tower to the next, they can identify and track the user of that service. This may not matter as much in the United States as it does in other countries, but under authoritarian regimes, governments now have a way to know a lot about any individual “by essentially having them carry a digital dog tag everywhere.”

Intelligent networks that enable this kind of monitoring are spreading fast outside North America. Advanced networks have greater penetration in some parts of Africa and Latin America than elsewhere, “which means those intelligent networks are being built exactly in the places where their capabilities can be turned inwards for surveillance purposes.” Surveillance also has become a much greater undertaking since the days of wiretaps. Furthermore, because the media environment is more complex, the kind of data that individuals generate through systems to which they are connected is much richer. As a result, new players have entered into that space, both in the United States and elsewhere, and these companies can break encryption in almost real time, in part because law enforcement in the United States and elsewhere requires domestic surveillance to support the needs of law enforcement.

Governments have gotten much smarter about how to exercise their monopoly on the use of violence, force, and regulation not only within their physical borders but in cyberspace. National firewalls can prevent unwanted content going into or out of a country. Countries suffer negative consequences from erecting such barriers, so probably only about 12 to 15 do,

Suggested Citation:"4 The Misuse of Technologies." National Academy of Engineering. 2013. Sensing and Shaping Emerging Conflicts: Report of a Workshop by the National Academy of Engineering and United States Institute of Peace Roundtable on Technology, Science, and Peacebuilding. Washington, DC: The National Academies Press. doi: 10.17226/18349.
×

said Rohozinski, but more could do the same if they chose to create a border around their cyberperimeter.

Countries may also make information resources unavailable when it serves their purpose, through denial-of-service attacks, targeted filtering, or intentional disruption of protocols to make sure that opposition websites do not load. They may implement regulations and legislation to criminalize some online acts; in Belarus, for example, defamation of the president can be a cybercrime. Under this provision, the government can charge an independent media source with defamation and either filter a website or take it down. And governments can apply media law to all media content, forcing media to register locally or be subject to arbitrary filtration by the government. Finally, various activities can be criminalized, so that communication with known criminals, for instance, can become a criminal offense.

A final approach is to use technological means to identify and target dissent and to confound readers about posted information. For example, the Iranian revolutionary guard cyber command has a Facebook-like page where it posts pictures of protesters online and asks people to crowdsource who they are, which has the additional effect of intimidating people who might be considering activism. In Syria, for example, the regime uses a technique called “eggshelling” on Twitter. Eggshelling is a way for a regime to control discourse on the Internet by putting out messages with ambiguous registrations that appear to support the government’s official positions. “Nobody really quite knows what it is. Is it a rumor? Is it really government stuff? If it’s not, is it quasi-believable? The sheer volume of it ends up pushing to one side a lot of stuff that comes from the opposition, which is less connected.” In other cases, criminal gangs have been hired to harvest damaging information or spread malware. Big data also can be misused; digitized census records or weapons registrations can be sold to third-party commercial entities that then sell them to risk security companies. “Although the initial collection of that data…may have been for a very worthy cause, the way that it’s actually put to use by others ends up being antithetical to the kind of security that it was supposed to create for the community.”

Some kinds of activism require a public presence, which often requires divulging identity, Rohozinski observed. Some people may be willing to risk jail because it legitimizes their actions and their movement. In other cases, activists may not use the Internet, may work through multiple virtual private networks, or may work through external relationships. But even then, security may be impossible. “I have a community of friends who are part of the core Russian opposition movement,” said Rohozinski, “and they have

Suggested Citation:"4 The Misuse of Technologies." National Academy of Engineering. 2013. Sensing and Shaping Emerging Conflicts: Report of a Workshop by the National Academy of Engineering and United States Institute of Peace Roundtable on Technology, Science, and Peacebuilding. Washington, DC: The National Academies Press. doi: 10.17226/18349.
×

decided as part of their core tactics that they will do everything absolutely in the open. They have public meetings, and if you are not willing to be completely transparent about who you are and what your intentions are you can’t show up, because they figured they can’t beat the Russian security.”

There is some good news, said Rohozinski. “The more authoritarian a regime is, the more they’re caught in their own trap.” Governments want the benefits of modernization without the liabilities, yet the two are not easy to separate. “They want it both ways and realize that they can’t have it. They want to be connected and benefit from being members of a global community where science is cheap, where supply chains are accessible, etc., but at the same time they don’t want the politics of it.” As a result, governments do not want to jettison or ignore systems that activists can use to get around government restrictions. “Their headlong rush into the modern world also ties their hands because of the dependencies that it creates for them internally as well as externally.” What may be necessary in such an environment is to counter disinformation, as in the days of the Cold War. “Cyberspace is going from being the exceptional domain to one that reflects the complexity of real life. So I’m an optimist,” Rohozinski said.

Rohozinski also recommended looking at the work done by the World Health Organization on violence mapping and prevention as a public health issue. This work has combined precursor indicators of violence, drawn from such measures as demographics, economic conditions, reports of homicide, and the prevalence of a grey economy to gauge the likelihood of conflict at different levels. For example, the introduction of policing in ungoverned spaces in Brazil has relied heavily on this public health approach of understanding the precursors of violence, including messages sent on social media. This is a slightly different approach to the application of technology, because it is more about raising awareness. This awareness has not necessarily translated itself into action by the peacebuilding community, “but it should be incorporated.”

Rohozinski observed that security services are starting to be seen as a necessity, not an option. The professionalization of the provision of security tools will happen through market forces, which will gradually displace efforts offered through government agencies or other sources. USIP and the NAE could contribute to this evolution, he said, by acting as a focus of innovation for peacebuilding activities in both the public and private sectors.

Individuals and organizations that recognize the new reality will be the ones that survive, he said, so training is essential to ensure that they remain up to date about the tools they use. The US State Department offers many

Suggested Citation:"4 The Misuse of Technologies." National Academy of Engineering. 2013. Sensing and Shaping Emerging Conflicts: Report of a Workshop by the National Academy of Engineering and United States Institute of Peace Roundtable on Technology, Science, and Peacebuilding. Washington, DC: The National Academies Press. doi: 10.17226/18349.
×

good programs that can help prepare civil society organizations for the environments in which they operate, he said. He also pointed to organizations— domestic and international, public and private—that offer technical advice. “I don’t know if anybody has done an inventory of them, but there’s quite a few and they’re actually pretty good.”

Rohozinski concluded that cyberspace is now a domain where conflicts will occur and need to be mediated. It is a space of maneuver, not one where people have freedom of navigation. It will need to be treated like physical terrain, and individuals and organizations will need the capacity to operate in it as they do in physical space.

DISCUSSION

Several participants discussed various negative applications of technologies. Dennis King reiterated the use of new technologies to spread misinformation, disinformation, rumors, and incitement. Once incorrect information goes viral, correcting mistaken ideas can be very difficult. The fact that regimes use the new technologies to target individuals and organizations is more apparent with the use of social media than in the past. “Individuals connected to NGOs who’ve been involved in promotion of governance and technology have been imprisoned, killed, and attacked, and their NGOs have been banned,” he said. “The humanitarian space is already dwindling and shrinking. This is another way that the bad guys, the dark side, can further use [technology] to shrink the humanitarian space and access, and target civilians and human rights activists.”

Sanjana Hattotuwa asked what would happen if 3D printers could be used to make exact digital duplicates of AK47 rifles? In this and other ways, technology could be used to exacerbate rather than prevent conflict.

Chris Spence cited the social component of misuse, beyond the technical issues. People are fooled into giving up their passwords, or they let their computers be taken over by malware. “No matter what we do, the humans who aren’t thinking about this every day are the ones who are the soft targets.” Although his staff rely heavily on training, even they remain a target.

Sigal said that security is a process and not an end state. It requires continual investments as well as attention to the tools used to protect security, which can be turned against their creators to erode security. Hackers in some countries have been able to reverse engineer security tools and thereby put people at risk. “We need a Google for security,” he said, “a company that sees a business model in providing” security services.

Suggested Citation:"4 The Misuse of Technologies." National Academy of Engineering. 2013. Sensing and Shaping Emerging Conflicts: Report of a Workshop by the National Academy of Engineering and United States Institute of Peace Roundtable on Technology, Science, and Peacebuilding. Washington, DC: The National Academies Press. doi: 10.17226/18349.
×

He also added that the dark side/light side division, or skeptic versus utopian, is a misleading way of framing the issues. People accused of being utopians are often the most skeptical, because they have the practical experience of trying different things and realizing what works and what does not work.

Suggested Citation:"4 The Misuse of Technologies." National Academy of Engineering. 2013. Sensing and Shaping Emerging Conflicts: Report of a Workshop by the National Academy of Engineering and United States Institute of Peace Roundtable on Technology, Science, and Peacebuilding. Washington, DC: The National Academies Press. doi: 10.17226/18349.
×

This page intentionally left blank.

Suggested Citation:"4 The Misuse of Technologies." National Academy of Engineering. 2013. Sensing and Shaping Emerging Conflicts: Report of a Workshop by the National Academy of Engineering and United States Institute of Peace Roundtable on Technology, Science, and Peacebuilding. Washington, DC: The National Academies Press. doi: 10.17226/18349.
×
Page 33
Suggested Citation:"4 The Misuse of Technologies." National Academy of Engineering. 2013. Sensing and Shaping Emerging Conflicts: Report of a Workshop by the National Academy of Engineering and United States Institute of Peace Roundtable on Technology, Science, and Peacebuilding. Washington, DC: The National Academies Press. doi: 10.17226/18349.
×
Page 34
Suggested Citation:"4 The Misuse of Technologies." National Academy of Engineering. 2013. Sensing and Shaping Emerging Conflicts: Report of a Workshop by the National Academy of Engineering and United States Institute of Peace Roundtable on Technology, Science, and Peacebuilding. Washington, DC: The National Academies Press. doi: 10.17226/18349.
×
Page 35
Suggested Citation:"4 The Misuse of Technologies." National Academy of Engineering. 2013. Sensing and Shaping Emerging Conflicts: Report of a Workshop by the National Academy of Engineering and United States Institute of Peace Roundtable on Technology, Science, and Peacebuilding. Washington, DC: The National Academies Press. doi: 10.17226/18349.
×
Page 36
Suggested Citation:"4 The Misuse of Technologies." National Academy of Engineering. 2013. Sensing and Shaping Emerging Conflicts: Report of a Workshop by the National Academy of Engineering and United States Institute of Peace Roundtable on Technology, Science, and Peacebuilding. Washington, DC: The National Academies Press. doi: 10.17226/18349.
×
Page 37
Suggested Citation:"4 The Misuse of Technologies." National Academy of Engineering. 2013. Sensing and Shaping Emerging Conflicts: Report of a Workshop by the National Academy of Engineering and United States Institute of Peace Roundtable on Technology, Science, and Peacebuilding. Washington, DC: The National Academies Press. doi: 10.17226/18349.
×
Page 38
Suggested Citation:"4 The Misuse of Technologies." National Academy of Engineering. 2013. Sensing and Shaping Emerging Conflicts: Report of a Workshop by the National Academy of Engineering and United States Institute of Peace Roundtable on Technology, Science, and Peacebuilding. Washington, DC: The National Academies Press. doi: 10.17226/18349.
×
Page 39
Suggested Citation:"4 The Misuse of Technologies." National Academy of Engineering. 2013. Sensing and Shaping Emerging Conflicts: Report of a Workshop by the National Academy of Engineering and United States Institute of Peace Roundtable on Technology, Science, and Peacebuilding. Washington, DC: The National Academies Press. doi: 10.17226/18349.
×
Page 40
Suggested Citation:"4 The Misuse of Technologies." National Academy of Engineering. 2013. Sensing and Shaping Emerging Conflicts: Report of a Workshop by the National Academy of Engineering and United States Institute of Peace Roundtable on Technology, Science, and Peacebuilding. Washington, DC: The National Academies Press. doi: 10.17226/18349.
×
Page 41
Suggested Citation:"4 The Misuse of Technologies." National Academy of Engineering. 2013. Sensing and Shaping Emerging Conflicts: Report of a Workshop by the National Academy of Engineering and United States Institute of Peace Roundtable on Technology, Science, and Peacebuilding. Washington, DC: The National Academies Press. doi: 10.17226/18349.
×
Page 42
Next: 5 Major Issues Discussed at the Workshop »
Sensing and Shaping Emerging Conflicts: Report of a Workshop by the National Academy of Engineering and United States Institute of Peace Roundtable on Technology, Science, and Peacebuilding Get This Book
×
Buy Paperback | $32.00 Buy Ebook | $25.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

Technology has revolutionized many aspects of modern life, from how businesses operate, to how people get information, to how countries wage war. Certain technologies in particular, including not only cell phones and the Internet but also satellites, drones, and sensors of various kinds, are transforming the work of mitigating conflict and building peaceful societies. Rapid increases in the capabilities and availability of digital technologies have put powerful communications devices in the hands of most of the world's population.

These technologies enable one-to-one and one-to-many flows of information, connecting people in conflict settings to individuals and groups outside those settings and, conversely, linking humanitarian organizations to people threatened by violence. Communications within groups have also intensified and diversified as the group members use new technologies to exchange text, images, video, and audio. Monitoring and analysis of the flow and content of this information can yield insights into how violence can be prevented or mitigated. In this way technologies and the resulting information can be used to detect and analyze, or sense, impending conflict or developments in ongoing conflict.

On October 11, 2012, the National Academy of Engineering (NAE) and the United States Institute of Peace (USIP) held a workshop in Washington, DC, to identify "major opportunities and impediments to providing better real-time information to actors directly involved in situations that could lead to deadly violence." The workshop brought together experts in technology, experts in peacebuilding, and people who have worked at the intersections of those two fields on the applications of technology in conflict settings, to consider uses of technology to sense emerging and ongoing conflicts and provide information and analyses that can be used to prevent violent and deadly conflict. Sensing and Shaping Emerging Conflicts: Report of a Joint Workshop of the National Academy of Engineering and the United States Institute of Peace: Roundtable on Technology, Science, and Peacebuilding summarizes the workshop.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!