SlideShare a Scribd company logo
1 of 4
Download to read offline
www.thejournalofcounterterrorism.org




                              Twitter.com
                              and Coordinated
                              Mayhem:
                              An Examination of the Incorporation of Twitter
                              by the RNC Welcoming Committee

                              By Lance Lamoreaux
                                                                                                 Riot police face off
                                                                                              with demonstrators as
                                                                                         the police block a bridge
                                                                                    into downtown St. Paul to keep
                                                                               protesters from getting close to the site
                                                                         at the 2008 Republican National Convention
                                                                     in Minnesota September 4, 2008. REUTERS/
                                                                 Damir Sagolj (UNITED STATES) US PRESIDENTIAL
                                                               ELECTION CAMPAIGN 2008 (USA)

12
                             Vol.15, No.2
                             Journal of Counterterrorism & Homeland Security International
Introduction
There are myriads of threats that jeopardize peace and stability. Among these threats, the proliferation of extremism is a peril to civilized
society. These extremist include, but are not limited to the following: religious, anarchists, anti-government, and anti-globalization. They
operate both in the United States and abroad. Advances in technology and media have enabled extremists to broadcast their propaganda
to an untold audience. These provocative messages have enticed a vulnerable following into discontent and action. Consider the riots
that occurred during World Trade Organization meetings in Seattle, the Rwandan Genocide, and the recent rioting in Greece. Instability
is increasing with the compounding of the economic crisis. The reality is that there are countless people being incited to violence and
extremism through media manipulation. The fact that these extremists are coordinating themselves through technology is especially
frightening. There is one media source that combines both dissemination and coordination - Twitter.com.




T
           his paper sets out to inform                                                                 Twitter has received recent media
           security managers of the                                                                     attention due to its ability to broad-
           practical and potential use                                                                  cast timely news. Within minutes
           of a contemporary media                                                                      of the Mumbai terrorist attacks,
resource – Twitter. The paper is divided              Twitter has received recent media                 witnesses began sending updates via
up into three parts. First, the paper                                                                   Twitter regarding what was unfold-
explains the interworking of Twitter;                 attention due to its ability to broadcast         ing. At the beginning of the attacks,
including its capabilities and shortcom-              timely news. Within minutes of the                it was estimated that messages were
ings. Second, is an account of an anar-                                                                 being posted at a rate of 70 every
chist group, the Republican National                  Mumbai terrorist attacks, witnesses               five seconds. With six million us-
Convention Welcoming Committee,                       began sending updates via Twitter                 ers around the world, Twitter has
applying the Twitter application in co-                                                                 become an everyday component in
ordinating the mayhem that occurred in                regarding what was unfolding. At                  people’s lives(8).
St. Paul during the Republican National               the beginning of the attacks, it was
Convention (RNC). Lastly, a conclu-                                                                     The Republican National
sion that calls for resourcefulness in                estimated that messages were                      Convention Welcoming
security management.                                  being posted at a rate of 70 every                Committee

What is Twitter?                                      five seconds.                                     A Twitter Case Study

 Twitter is a social networking site(1)                                                                   The Republican National Con-
that allows people to share personal                                                                      vention Welcoming Committee
updates. These updates can be view                                                                      (RNCWC) is an anarchist / anti-
publicly or they can be controlled by a pri-                                                      authoritarian group that organized them-
vate setting that only allows authorized indi-                                                    selves with the purpose of disrupting the
viduals to view updates. Updates are limited                                                      Republican National Convention(9). The
to 140 characters. Individuals may make                                                           group initiated the recruitment of anar-
updates from their cell-phones via text mes-                                                      chists from St Paul, Minnesota and from
sage, on-line, and other third party sources                                                      other anarchist groups across the United
such as “Twitter fan wiki.” Individuals can        There are also a number of third party twit- States, and created: “an informational and
also “follow” other people or organizations        ter applications that pull Twitter updates and logistical framework for radical resistance
on Twitter. To follow someone simply means         disseminate the information in applicable to the RNC”(10). According to the group’s
to receive that person’s updates(2). People and    ways. For example, Addict-o-matic(5) is a website, those wishing to work with the
organizations can update their status through a    website that retrieves information from a RNC Welcoming Committee must agree
computer terminal or by sending a text message     variety of websites into a searchable appli- to the following:
from their cell-phone.                             cation. In other words, if someone enters the
                                                   word “police” into the search bar, the page •	 A rejection of Capitalism, Imperialism,
Twitter is free to the public and the website is   will fill with top news headlines, Google           and the State;
currently only available in two languages –        Videos, Blogs, and Twitter updates. There •	 Resist the commodification of our
English and Japanese. That is not to say that      is also “TweetBeep” which is a service              shared and living Earth;
individuals and organizations cannot make          that sends e-mails when a Twitter update •	 Organize on the principles of decen-
updates in other languages(3). To use the pro-     matches one’s search. An application called         tralization, autonomy, sustainability,
gram all that is required is either a cell phone   “Twitt(url)y”(6) tracks the most popular            and mutual aid;
or internet connection(4).                         URLs shared on Twitter(7).                     •	 Work to end all relationships of domi-
www.thejournalofcounterterrorism.org

     nation and subjugation:                                                                  nication with each other in real time. The
•	   Oppose the police and prison-                                                                 information was received as text mes-
     industrial complex, and main-                                                                 sages to cell phones. Additionally, the
     tain solidarity with all targets                                                              RNCWC had dispatchers at computer
                                                 The dispatchers sent updates
     of state repression:                                                                          terminals that monitored the updates
•	   Directly confront systems of                and information that pertained                    coming in from the anarchists on the
     oppression, and respect the                                                                   streets. The dispatchers sent updates
                                                 to the other sectors. These
     need for a diversity of tac-                                                                  and information that pertained to
     tics(11).                                   profiles included: the seven                      the other sectors. These profiles
                                                                                                   included: the seven sectors, “bikes,”
                                                 sectors, “bikes,” “bridge,”
Local authorities blame much of                                                                    “bridge,” and “I 49” profiles. Further-
uncivil protest that occurred during             and “I 49” profiles. With the                     more, participants on the street sent
the Convention – the “smashing                                                                     text messages that were received by
                                                 information coming in from the
windows, slashing tires, throwing                                                                  other members of that sector. With
bags of urine and excrement and                  other sectors, the dispatchers                    the information coming in from the
physically confronting Republican                                                                  other sectors, the dispatchers and
                                                 and street level participants
delegates in the streets” – on the                                                                 street level participants were able to
RNCWC. Further mayhem caused                     were able to coordinate attacks,                  coordinate attacks, avoid arrests, and
by demonstrators includes imped-                                                                   exploit security weaknesses. Here are
                                                 avoid arrests, and exploit
ing members of the Connecticut                                                                     a few examples of real time commu-
delegation from arriving at con-                 security weaknesses.                              nication exchanged in sector 1:
vention, spitting on delegates, and
squirting bleach on delegates(12).                                                                  •	 Cops deploying on bridges off 94
                                                                                                   to seal off protesters 1:01 PM Sep 1st
The RNCWC effectively disrupted the                                                                from web.
RNC through careful organization. The                                                         •	   Mobile cops enroute to push sector 1
RNC Welcoming Committee website has a                                                              protesters north east 12:43 PM Sep 1st
link to a PowerPoint Presentation that me-                                                         from web.
ticulously outlines the group’s objectives,                                                   •	   Fight with officers at 9th and Wacouta.
shares intelligence including maps, police                                                         1 officer down. 10:41 AM Sep 1st from
statistics, government policies, Delegate                                                          web(17).
hotels, and expresses communication pro-
cedures. On the slide labeled “Communica-                                                     There was one principal dispatcher that
tions” is the following text:                                                                 coordinated the action of the other sec-
                                                                                              tors. The Twitter profile was RNC08. The
•	   Will utilize .txtmob, so bring your cell                                                 Twitter profile RNC08 had 537 people
     phones                                                                                   following its updates. The profile even
•	   Will offer scout trainings in the weeks                                                  had a link to the RNCWC’s website. The
     leading up to the RNC                                                                    link is irrefutable proof that the RNCWC
•	   Tin Can Comms Collective is develop-                                                     used Twitter to coordinate their actions
     ing a comms system                                                                       in St. Paul. The RNCWC’s website never
•	   It appears that rather than using .txt-                                                  makes any direct references to Twitter.
     mob(13), the RNCWC used Twitter                                                          Most likely the RNCWC’s organizers did
     as their communication system. One                                                       not want law enforcement to be aware of
     of the PowerPoint slides has a map                                                       their method of communication. Their
     that labels seven different sectors(14).                                                 website did state that anarchist organiza-
     On Twitter.com, there are seven cor-                                                     tions wishing to participate should contact
     responding sectors(15).                                                                  them through email. This is most likely
                                                                                              when anarchists were informed of using
The RNCWC organized by dividing St.                                                           Twitter to communicate.
Paul into sectors. Each sector had its own
Twitter profile. Participants were then as-                                                   Here are a few more examples of communi-
signed a sector. Next, the participants set     A protester holds a sign outside the 2008     cation exchanged during the mayhem in St.
                                                Republican National Convention in St. Paul,
their Twitter accounts to “follow(16),” their                                                 Paul. The principal dispatcher, RNC08(18)
                                                Minnesota September 4, 2008. REUTERS/Damir
assigned sector’s updates. This enabled         Sagolj (UNITED STATES) US PRESIDENTIAL        posted the following:
anarchists on the street to exchange commu-     ELECTION CAMPAIGN 2008 (USA)                  •	 Cops near Excel are searching people’s



14
                                        Vol.15, No.2
                                        Journal of Counterterrorism & Homeland Security International
www.thejournalofcounterterrorism.org

     bags for goggles and gas masks-- hide                                                             as anti-establishment rhetoric fills the infor-
     them! 6:12 PM Sep 2nd from web.                                                                   mation superhighway. Economic decline
•	   50 Riot Cops on Wacouta & 8th Street,                                                             only exacerbates security threats posed
     Several blocks from march 1:54 PM                                                                 by these groups. The United States is not
     Sep 2nd from web.                                                                                 only susceptible to attacks from Al-Qaeda
•	   Reinforcements needed at 7th and                                                                  but also from a slew of extremists within
     Minnesota- cops are going to use gas                                                              its own borders.
     10:30 AM Sep 1st from web.
•	   40 activists at sector one meet point.                                                            About the Author
     One van of riot cops. Wacouta com-
     mons 10:06 AM Sep 1st from web.                                                                   Mr. Lance Lamoreaux, B.A., M.L.S. Candidate, is an
•	   Police being dispatched to check out                                                              intern at The Institute of Terrorism Research and
                                                                                                       Response. He is supervised by ITRR Co-Director
     group of =~ 400 near United Hospital                                                              Michael Perelman
     / Smith also checking out Smith S,
     will be doing recon 3:56 PM Aug 30th                                                              1. Found at www.twitter.com, 2. See appendix for example
                                                                                                       3. Updates can be made in Arabic, Danish, Dutch, English, Finish,
     from web.                                                                                         French, Hungarian, Icelandic, Italian, Japanese, Norwegian,
•	   Here are a number of Twitter updates                                                              Polish, Portuguese, Russian, Spanish, Swedish, and Thai., 4.
                                                                                                       Twitter.com. 1.1FAQ. http://help.twitter.com/index.php?pg=kb.
     from RNC08_Bike(19)                                                                               page&id=26, 5. http://addictomatic.com/
•	   St Paul Police May Be Moving Ar-                                                                  6. http://twitturly.com/, 7 Twitter.com. 1.1FAQ. http://help.twitter.
                                                                                                       com/index.php?pg=kb.page&id=26, 8. Beaumont, C. (2008).
     rest Teams into Place on Cleveland                                                                “Mumbai attacks: Twitter and Flickr used to break news. Telegraph.
     and Marshall 5:35 PM Aug 29th from                                                                co.uk. 27 Nov 2008. Retrieved on 17 Dec 2008 from the World
                                                                                                       Wide Web: http://www.telegraph.co.uk/news/worldnews/asia/
     web.                                                                                              india/3530640/Mumbai-attacks-Twitter..., 9. Deleted , 10. Deleted,
•	   Minneapolis bikes are heading back to                                                             11. Deleted, 12. Farnam, T. (2008). “Republican Convention sees
                                                                                                       violent demonstrations.” The Wall Street Journal. Retrieved on 18
     summit to regroup 5:47 PM Aug 29th                                                                Dec 2008 from the World Wide Web: http://online.wsj.com/article/
     from web.                                                                                         SB122048791794897339.html?mod=googlenews_wsj
                                                                                                       13. TextMob is software that allows users to share text messages.
•	   Communication from the Twitter pro-                                                               It is currently shut down. http://www.txtmob.com/
     file RNC08_announce(20)                                                                           14. To see entire PowerPoint presentation visit: https://lists.riseup.
                                                                                                       net/www/d_read/rnc08/WCSite/2008rncwc.ppt#256,1,Slide 1,
•	   Police ordered to stay away from I94                                                              5. Twitter.com here is a link to one of the sectors: https://twitter.
     between St Paul and Minneapolis                                                                   com/rnc08_sector1, 16. Remember, to “follow” means to receive
                                                                                                       that profile’s updates., 17. Text taken from Twitter: https://twitter.
     because of 5 pointed stars on freeway.                                                            com/rnc08_sector1?page=1, 18. Text taken from Twitter: http://
     GO TEAM!!! 4:03 PM Aug 30th                                                                       twitter.com/RNC08?page=1, 19. Twitter.com. https://twitter.com/
                                                                                                       rnc08_bike, 20. https://twitter.com/rnc08announce?page=2
     from web.

Conclusion

By applying Twitter, the RNCWC was able
to coordinate mayhem and stay a step ahead
of law enforcement. Twitter is an ideal
means of communication for coordinating
large amounts of people as it is free and able
to broadcast messages to untold masses.
Law enforcement in St. Paul did an excep-
tional job of gathering intelligence before
the event. Their preparation and appropriate
response effectively prevented the RNCWC
from “crashing the party.”

Law enforcement and security managers must
continue to adapt and prepare for advanced              A protester wears a mask in front of the
technology. Typically, information on MySpace           fenced venue of the 2008 Republican National
and Twitter sites is relatively easy to infiltrate as   Convention in St. Paul, Minnesota, September
computer “undercover” work is simplified. If            2, 2008. REUTERS/Damir Sagolj (UNITED
                                                        STATES) US PRESIDENTIAL ELECTION
security personal suspect an impending attack           CAMPAIGN 2008 (USA)
involving masses of people, it is essential that
they monitor blogs and other social networking
sites for information and insight.
Stability, peace, and order hang by a thread


16
                                                Vol.15, No.2
                                                Journal of Counterterrorism & Homeland Security International

More Related Content

Similar to Iacsp Magazine V15 N2 Twitter

Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...
Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...
Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...Fredrick Ishengoma
 
Brown and Beige Aesthetic Vintage Group Project Presentation.pdf
Brown and Beige Aesthetic Vintage Group Project Presentation.pdfBrown and Beige Aesthetic Vintage Group Project Presentation.pdf
Brown and Beige Aesthetic Vintage Group Project Presentation.pdfvenuspatatag4
 
Osint data mining
Osint data miningOsint data mining
Osint data miningDaniel John
 
Using OSINT in times of social unrest
Using OSINT in times of social unrestUsing OSINT in times of social unrest
Using OSINT in times of social unrestShani Wolf
 
Biased media is a real threat to indian democracy
Biased media is a real threat to indian democracyBiased media is a real threat to indian democracy
Biased media is a real threat to indian democracyCol Mukteshwar Prasad
 
English presentation
English presentationEnglish presentation
English presentationGinaSoler10
 
Micromega repubblica newspaper interview to alex orlowski
Micromega repubblica newspaper interview to alex orlowskiMicromega repubblica newspaper interview to alex orlowski
Micromega repubblica newspaper interview to alex orlowskialexorlowski
 
Social Network Continuity Disruption Countermeasures Paper
Social Network Continuity Disruption Countermeasures PaperSocial Network Continuity Disruption Countermeasures Paper
Social Network Continuity Disruption Countermeasures Papermartindudziak
 
64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docx64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docxevonnehoggarth79783
 
Capstone_SingleSpaced
Capstone_SingleSpacedCapstone_SingleSpaced
Capstone_SingleSpacedCameron Banks
 
Twitter And Social Justice
Twitter And Social JusticeTwitter And Social Justice
Twitter And Social JusticeJodi Sperber
 
051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics TranscriptRemedy Communications
 
Citizen journalism and the impact of the internet- Section B
Citizen journalism and the impact of the internet- Section BCitizen journalism and the impact of the internet- Section B
Citizen journalism and the impact of the internet- Section Bkanda11821
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethicsUltraUploader
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationBenjamin Morley
 
Twitter - Media Agenda Setting
Twitter - Media Agenda SettingTwitter - Media Agenda Setting
Twitter - Media Agenda SettingAyushi Mona
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the WorldNitine
 
Internet use in Social Activism in Taiwan, 2014 ISA Congress, Yokohama
Internet use in Social Activism in Taiwan,  2014 ISA Congress, YokohamaInternet use in Social Activism in Taiwan,  2014 ISA Congress, Yokohama
Internet use in Social Activism in Taiwan, 2014 ISA Congress, YokohamaAlbert Tzeng
 
Capstone Lessons Learned
Capstone Lessons LearnedCapstone Lessons Learned
Capstone Lessons LearnedGuy DeMarco
 
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityMetanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityDoug Thompson
 

Similar to Iacsp Magazine V15 N2 Twitter (20)

Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...
Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...
Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...
 
Brown and Beige Aesthetic Vintage Group Project Presentation.pdf
Brown and Beige Aesthetic Vintage Group Project Presentation.pdfBrown and Beige Aesthetic Vintage Group Project Presentation.pdf
Brown and Beige Aesthetic Vintage Group Project Presentation.pdf
 
Osint data mining
Osint data miningOsint data mining
Osint data mining
 
Using OSINT in times of social unrest
Using OSINT in times of social unrestUsing OSINT in times of social unrest
Using OSINT in times of social unrest
 
Biased media is a real threat to indian democracy
Biased media is a real threat to indian democracyBiased media is a real threat to indian democracy
Biased media is a real threat to indian democracy
 
English presentation
English presentationEnglish presentation
English presentation
 
Micromega repubblica newspaper interview to alex orlowski
Micromega repubblica newspaper interview to alex orlowskiMicromega repubblica newspaper interview to alex orlowski
Micromega repubblica newspaper interview to alex orlowski
 
Social Network Continuity Disruption Countermeasures Paper
Social Network Continuity Disruption Countermeasures PaperSocial Network Continuity Disruption Countermeasures Paper
Social Network Continuity Disruption Countermeasures Paper
 
64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docx64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docx
 
Capstone_SingleSpaced
Capstone_SingleSpacedCapstone_SingleSpaced
Capstone_SingleSpaced
 
Twitter And Social Justice
Twitter And Social JusticeTwitter And Social Justice
Twitter And Social Justice
 
051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript
 
Citizen journalism and the impact of the internet- Section B
Citizen journalism and the impact of the internet- Section BCitizen journalism and the impact of the internet- Section B
Citizen journalism and the impact of the internet- Section B
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of Globalization
 
Twitter - Media Agenda Setting
Twitter - Media Agenda SettingTwitter - Media Agenda Setting
Twitter - Media Agenda Setting
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the World
 
Internet use in Social Activism in Taiwan, 2014 ISA Congress, Yokohama
Internet use in Social Activism in Taiwan,  2014 ISA Congress, YokohamaInternet use in Social Activism in Taiwan,  2014 ISA Congress, Yokohama
Internet use in Social Activism in Taiwan, 2014 ISA Congress, Yokohama
 
Capstone Lessons Learned
Capstone Lessons LearnedCapstone Lessons Learned
Capstone Lessons Learned
 
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityMetanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
 

Iacsp Magazine V15 N2 Twitter

  • 1. www.thejournalofcounterterrorism.org Twitter.com and Coordinated Mayhem: An Examination of the Incorporation of Twitter by the RNC Welcoming Committee By Lance Lamoreaux Riot police face off with demonstrators as the police block a bridge into downtown St. Paul to keep protesters from getting close to the site at the 2008 Republican National Convention in Minnesota September 4, 2008. REUTERS/ Damir Sagolj (UNITED STATES) US PRESIDENTIAL ELECTION CAMPAIGN 2008 (USA) 12 Vol.15, No.2 Journal of Counterterrorism & Homeland Security International
  • 2. Introduction There are myriads of threats that jeopardize peace and stability. Among these threats, the proliferation of extremism is a peril to civilized society. These extremist include, but are not limited to the following: religious, anarchists, anti-government, and anti-globalization. They operate both in the United States and abroad. Advances in technology and media have enabled extremists to broadcast their propaganda to an untold audience. These provocative messages have enticed a vulnerable following into discontent and action. Consider the riots that occurred during World Trade Organization meetings in Seattle, the Rwandan Genocide, and the recent rioting in Greece. Instability is increasing with the compounding of the economic crisis. The reality is that there are countless people being incited to violence and extremism through media manipulation. The fact that these extremists are coordinating themselves through technology is especially frightening. There is one media source that combines both dissemination and coordination - Twitter.com. T his paper sets out to inform Twitter has received recent media security managers of the attention due to its ability to broad- practical and potential use cast timely news. Within minutes of a contemporary media of the Mumbai terrorist attacks, resource – Twitter. The paper is divided Twitter has received recent media witnesses began sending updates via up into three parts. First, the paper Twitter regarding what was unfold- explains the interworking of Twitter; attention due to its ability to broadcast ing. At the beginning of the attacks, including its capabilities and shortcom- timely news. Within minutes of the it was estimated that messages were ings. Second, is an account of an anar- being posted at a rate of 70 every chist group, the Republican National Mumbai terrorist attacks, witnesses five seconds. With six million us- Convention Welcoming Committee, began sending updates via Twitter ers around the world, Twitter has applying the Twitter application in co- become an everyday component in ordinating the mayhem that occurred in regarding what was unfolding. At people’s lives(8). St. Paul during the Republican National the beginning of the attacks, it was Convention (RNC). Lastly, a conclu- The Republican National sion that calls for resourcefulness in estimated that messages were Convention Welcoming security management. being posted at a rate of 70 every Committee What is Twitter? five seconds. A Twitter Case Study Twitter is a social networking site(1) The Republican National Con- that allows people to share personal vention Welcoming Committee updates. These updates can be view (RNCWC) is an anarchist / anti- publicly or they can be controlled by a pri- authoritarian group that organized them- vate setting that only allows authorized indi- selves with the purpose of disrupting the viduals to view updates. Updates are limited Republican National Convention(9). The to 140 characters. Individuals may make group initiated the recruitment of anar- updates from their cell-phones via text mes- chists from St Paul, Minnesota and from sage, on-line, and other third party sources other anarchist groups across the United such as “Twitter fan wiki.” Individuals can There are also a number of third party twit- States, and created: “an informational and also “follow” other people or organizations ter applications that pull Twitter updates and logistical framework for radical resistance on Twitter. To follow someone simply means disseminate the information in applicable to the RNC”(10). According to the group’s to receive that person’s updates(2). People and ways. For example, Addict-o-matic(5) is a website, those wishing to work with the organizations can update their status through a website that retrieves information from a RNC Welcoming Committee must agree computer terminal or by sending a text message variety of websites into a searchable appli- to the following: from their cell-phone. cation. In other words, if someone enters the word “police” into the search bar, the page • A rejection of Capitalism, Imperialism, Twitter is free to the public and the website is will fill with top news headlines, Google and the State; currently only available in two languages – Videos, Blogs, and Twitter updates. There • Resist the commodification of our English and Japanese. That is not to say that is also “TweetBeep” which is a service shared and living Earth; individuals and organizations cannot make that sends e-mails when a Twitter update • Organize on the principles of decen- updates in other languages(3). To use the pro- matches one’s search. An application called tralization, autonomy, sustainability, gram all that is required is either a cell phone “Twitt(url)y”(6) tracks the most popular and mutual aid; or internet connection(4). URLs shared on Twitter(7). • Work to end all relationships of domi-
  • 3. www.thejournalofcounterterrorism.org nation and subjugation: nication with each other in real time. The • Oppose the police and prison- information was received as text mes- industrial complex, and main- sages to cell phones. Additionally, the tain solidarity with all targets RNCWC had dispatchers at computer The dispatchers sent updates of state repression: terminals that monitored the updates • Directly confront systems of and information that pertained coming in from the anarchists on the oppression, and respect the streets. The dispatchers sent updates to the other sectors. These need for a diversity of tac- and information that pertained to tics(11). profiles included: the seven the other sectors. These profiles included: the seven sectors, “bikes,” sectors, “bikes,” “bridge,” Local authorities blame much of “bridge,” and “I 49” profiles. Further- uncivil protest that occurred during and “I 49” profiles. With the more, participants on the street sent the Convention – the “smashing text messages that were received by information coming in from the windows, slashing tires, throwing other members of that sector. With bags of urine and excrement and other sectors, the dispatchers the information coming in from the physically confronting Republican other sectors, the dispatchers and and street level participants delegates in the streets” – on the street level participants were able to RNCWC. Further mayhem caused were able to coordinate attacks, coordinate attacks, avoid arrests, and by demonstrators includes imped- exploit security weaknesses. Here are avoid arrests, and exploit ing members of the Connecticut a few examples of real time commu- delegation from arriving at con- security weaknesses. nication exchanged in sector 1: vention, spitting on delegates, and squirting bleach on delegates(12). • Cops deploying on bridges off 94 to seal off protesters 1:01 PM Sep 1st The RNCWC effectively disrupted the from web. RNC through careful organization. The • Mobile cops enroute to push sector 1 RNC Welcoming Committee website has a protesters north east 12:43 PM Sep 1st link to a PowerPoint Presentation that me- from web. ticulously outlines the group’s objectives, • Fight with officers at 9th and Wacouta. shares intelligence including maps, police 1 officer down. 10:41 AM Sep 1st from statistics, government policies, Delegate web(17). hotels, and expresses communication pro- cedures. On the slide labeled “Communica- There was one principal dispatcher that tions” is the following text: coordinated the action of the other sec- tors. The Twitter profile was RNC08. The • Will utilize .txtmob, so bring your cell Twitter profile RNC08 had 537 people phones following its updates. The profile even • Will offer scout trainings in the weeks had a link to the RNCWC’s website. The leading up to the RNC link is irrefutable proof that the RNCWC • Tin Can Comms Collective is develop- used Twitter to coordinate their actions ing a comms system in St. Paul. The RNCWC’s website never • It appears that rather than using .txt- makes any direct references to Twitter. mob(13), the RNCWC used Twitter Most likely the RNCWC’s organizers did as their communication system. One not want law enforcement to be aware of of the PowerPoint slides has a map their method of communication. Their that labels seven different sectors(14). website did state that anarchist organiza- On Twitter.com, there are seven cor- tions wishing to participate should contact responding sectors(15). them through email. This is most likely when anarchists were informed of using The RNCWC organized by dividing St. Twitter to communicate. Paul into sectors. Each sector had its own Twitter profile. Participants were then as- Here are a few more examples of communi- signed a sector. Next, the participants set A protester holds a sign outside the 2008 cation exchanged during the mayhem in St. Republican National Convention in St. Paul, their Twitter accounts to “follow(16),” their Paul. The principal dispatcher, RNC08(18) Minnesota September 4, 2008. REUTERS/Damir assigned sector’s updates. This enabled Sagolj (UNITED STATES) US PRESIDENTIAL posted the following: anarchists on the street to exchange commu- ELECTION CAMPAIGN 2008 (USA) • Cops near Excel are searching people’s 14 Vol.15, No.2 Journal of Counterterrorism & Homeland Security International
  • 4. www.thejournalofcounterterrorism.org bags for goggles and gas masks-- hide as anti-establishment rhetoric fills the infor- them! 6:12 PM Sep 2nd from web. mation superhighway. Economic decline • 50 Riot Cops on Wacouta & 8th Street, only exacerbates security threats posed Several blocks from march 1:54 PM by these groups. The United States is not Sep 2nd from web. only susceptible to attacks from Al-Qaeda • Reinforcements needed at 7th and but also from a slew of extremists within Minnesota- cops are going to use gas its own borders. 10:30 AM Sep 1st from web. • 40 activists at sector one meet point. About the Author One van of riot cops. Wacouta com- mons 10:06 AM Sep 1st from web. Mr. Lance Lamoreaux, B.A., M.L.S. Candidate, is an • Police being dispatched to check out intern at The Institute of Terrorism Research and Response. He is supervised by ITRR Co-Director group of =~ 400 near United Hospital Michael Perelman / Smith also checking out Smith S, will be doing recon 3:56 PM Aug 30th 1. Found at www.twitter.com, 2. See appendix for example 3. Updates can be made in Arabic, Danish, Dutch, English, Finish, from web. French, Hungarian, Icelandic, Italian, Japanese, Norwegian, • Here are a number of Twitter updates Polish, Portuguese, Russian, Spanish, Swedish, and Thai., 4. Twitter.com. 1.1FAQ. http://help.twitter.com/index.php?pg=kb. from RNC08_Bike(19) page&id=26, 5. http://addictomatic.com/ • St Paul Police May Be Moving Ar- 6. http://twitturly.com/, 7 Twitter.com. 1.1FAQ. http://help.twitter. com/index.php?pg=kb.page&id=26, 8. Beaumont, C. (2008). rest Teams into Place on Cleveland “Mumbai attacks: Twitter and Flickr used to break news. Telegraph. and Marshall 5:35 PM Aug 29th from co.uk. 27 Nov 2008. Retrieved on 17 Dec 2008 from the World Wide Web: http://www.telegraph.co.uk/news/worldnews/asia/ web. india/3530640/Mumbai-attacks-Twitter..., 9. Deleted , 10. Deleted, • Minneapolis bikes are heading back to 11. Deleted, 12. Farnam, T. (2008). “Republican Convention sees violent demonstrations.” The Wall Street Journal. Retrieved on 18 summit to regroup 5:47 PM Aug 29th Dec 2008 from the World Wide Web: http://online.wsj.com/article/ from web. SB122048791794897339.html?mod=googlenews_wsj 13. TextMob is software that allows users to share text messages. • Communication from the Twitter pro- It is currently shut down. http://www.txtmob.com/ file RNC08_announce(20) 14. To see entire PowerPoint presentation visit: https://lists.riseup. net/www/d_read/rnc08/WCSite/2008rncwc.ppt#256,1,Slide 1, • Police ordered to stay away from I94 5. Twitter.com here is a link to one of the sectors: https://twitter. between St Paul and Minneapolis com/rnc08_sector1, 16. Remember, to “follow” means to receive that profile’s updates., 17. Text taken from Twitter: https://twitter. because of 5 pointed stars on freeway. com/rnc08_sector1?page=1, 18. Text taken from Twitter: http:// GO TEAM!!! 4:03 PM Aug 30th twitter.com/RNC08?page=1, 19. Twitter.com. https://twitter.com/ rnc08_bike, 20. https://twitter.com/rnc08announce?page=2 from web. Conclusion By applying Twitter, the RNCWC was able to coordinate mayhem and stay a step ahead of law enforcement. Twitter is an ideal means of communication for coordinating large amounts of people as it is free and able to broadcast messages to untold masses. Law enforcement in St. Paul did an excep- tional job of gathering intelligence before the event. Their preparation and appropriate response effectively prevented the RNCWC from “crashing the party.” Law enforcement and security managers must continue to adapt and prepare for advanced A protester wears a mask in front of the technology. Typically, information on MySpace fenced venue of the 2008 Republican National and Twitter sites is relatively easy to infiltrate as Convention in St. Paul, Minnesota, September computer “undercover” work is simplified. If 2, 2008. REUTERS/Damir Sagolj (UNITED STATES) US PRESIDENTIAL ELECTION security personal suspect an impending attack CAMPAIGN 2008 (USA) involving masses of people, it is essential that they monitor blogs and other social networking sites for information and insight. Stability, peace, and order hang by a thread 16 Vol.15, No.2 Journal of Counterterrorism & Homeland Security International