SlideShare a Scribd company logo
Mobiles in Burma (Myanmar)
                Cross-Border Movement Strategies
                Under Authoritarian Regimes




Wednesday, October 15, 2008                        1
This is Burma

                        Population: 60 million
                        Those in Exile: 4 million
                        Less than 1% mobile phone
                        market penetration
               KEY INDICATORS
                                                                                                     worst                                       best

               GDP per capita, PPP (constant 2000 international $) ........ 1,446                        3.50
               Life expectancy at birth (years) ............................................. 61         4.19
               Literacy rate (% of people age 15+) ..................................... 90              6.00
               Human development index (out of 177)............................... 130                   3.52
               Rule of law (out of 208) ...................................................... 202       1.87
               Voice and accountability (out of 208) .................................. 208              0.69
               Digital opportunity index (out of 180) .................................. 176             1.36
               Internet users (% of population) ........................................... 0.1          3.07
                                                                                                     0       1   2   3   4   5   6   7   8   9    10

              Source (by indicator): IMF 2006; World Bank 2006a, 2006a; UNDP 2006; World Bank 2006c, 2006c; ITU 2006, 2004
               OpenNet Initiative, Internet Filtering in Burma in 2005: A Country Study,
              at http://opennet.net/studies/burma/.
Wednesday, October 15, 2008                                                                                                                             2
Saffron Revolution
                Mobile phones were used by monks and other citizen
                journalists to send information to the outside world.
Wednesday, October 15, 2008                                             3
constrained context.
                 OpenNet Initiative, Pulling the Plug: A Technical Review of the Internet Shutdown in Burma, at http://opennet.net/research/bulletins/013.

                       Figure 1. Timeline of Events,
                       Aug. 19, 2007 - Oct. 13, 2007




                                                                                   Text




                Saffron Revolution
              Internet in Burma

                 Willfrom Burma are always asking forthat silencing mobiles andand assistance
              “People   governments learn information as well as requesting for help the
                 internet are a necessary step in any crackdown?
              from [the] outside world but very little of their voices reach the world and most are lost in the endless
              state of the government vacuum.” — Burmese blogger
Wednesday, October 15, 2008                                                                                                                                  4
Burma’s Borders

                       In Burma the cost of a GSM
                       sim card is 2.5 million kyat.
                       This equals approximately
                       $2000 (17,000 rand) on the
                       black market conversion
                       rate. At the official rate this
                       is approximately $393,400
                       (3,351,324 rand).                Bangladesh
                                                                         Dollars


                                                                           4.18
                                                                                   Local Currency


                                                                                             250
                                                                                                    Rand


                                                                                                    31.39

                                                        India (Delhi)      7.77              300    54.46

                                                        Thailand           6.84              200    50.14

                                                        China (Yunnan)     14.6              100    124.4


                                                        South Africa      23.48              200     200




Wednesday, October 15, 2008                                                                                 5
How information travels
                       Actions are recorded with
                       mobile phones, uploaded to
                       flash drives, taken across
                       borders, uploaded to
                       servers, sent to trusted
                       contacts.
                       Is there a better way?




Wednesday, October 15, 2008                         6
Impact of Technology
                       In Thailand, internet access
                       is frequent. There, we found
                       a correlation between
                       access to internet and self-
                       identification as an activist
                       Since then, internet access
                       has grown, including
                       affordable and reliable
                       GPRS on mobiles


Wednesday, October 15, 2008                           7
Digital Democracy
                Problem                                Solution                        .
                       Regional instability             Cross-border communication
                       World’s longest running civil    Networking among
                       war                              traditionally divided groups
                       Rampant use of child soldiers    Providing 21st century
                                                        education
                       Over 3.5 million internally
                       displaced persons and            Connecting refugees with
                       refugees                         their resettled communities
                       Severe censorship                Freedom of information


Wednesday, October 15, 2008                                                                8

More Related Content

More from Mark Belinsky

The Power of Data & Transparency: Story & Conversation in the 21st Century
The Power of Data & Transparency: Story & Conversation in the 21st CenturyThe Power of Data & Transparency: Story & Conversation in the 21st Century
The Power of Data & Transparency: Story & Conversation in the 21st Century
Mark Belinsky
 
Diplomacy in the 21st Century: How Tech Has Sifted International Relations
Diplomacy in the 21st Century: How Tech Has Sifted International RelationsDiplomacy in the 21st Century: How Tech Has Sifted International Relations
Diplomacy in the 21st Century: How Tech Has Sifted International Relations
Mark Belinsky
 
Digital Public Diplomacy
Digital Public Diplomacy Digital Public Diplomacy
Digital Public Diplomacy
Mark Belinsky
 
Equal Footing: Bringing indigenous people in Mexico to the negotiating table
Equal Footing: Bringing indigenous people in Mexico to the negotiating tableEqual Footing: Bringing indigenous people in Mexico to the negotiating table
Equal Footing: Bringing indigenous people in Mexico to the negotiating table
Mark Belinsky
 
Digital Democracy Overview
Digital Democracy OverviewDigital Democracy Overview
Digital Democracy Overview
Mark Belinsky
 
Citizens vs Disaster: How Technology Is Changing the Rules of Engagement
Citizens vs Disaster: How Technology Is Changing the Rules of EngagementCitizens vs Disaster: How Technology Is Changing the Rules of Engagement
Citizens vs Disaster: How Technology Is Changing the Rules of Engagement
Mark Belinsky
 
Library Program Technology in Ukraine & Romania
Library Program Technology in Ukraine & RomaniaLibrary Program Technology in Ukraine & Romania
Library Program Technology in Ukraine & Romania
Mark Belinsky
 
How can new media technology increase dialogue between government and the peo...
How can new media technology increase dialogue between government and the peo...How can new media technology increase dialogue between government and the peo...
How can new media technology increase dialogue between government and the peo...
Mark Belinsky
 
Tweets, Maps & Apps
Tweets, Maps & AppsTweets, Maps & Apps
Tweets, Maps & Apps
Mark Belinsky
 
What new media activists should know about libel, copyright and Open Source t...
What new media activists should know about libel, copyright and Open Source t...What new media activists should know about libel, copyright and Open Source t...
What new media activists should know about libel, copyright and Open Source t...
Mark Belinsky
 
Opening students' Eyes Through Open Data
Opening students' Eyes Through Open DataOpening students' Eyes Through Open Data
Opening students' Eyes Through Open Data
Mark Belinsky
 
Digital Democracy Overview - ITP Camp
Digital Democracy Overview - ITP CampDigital Democracy Overview - ITP Camp
Digital Democracy Overview - ITP Camp
Mark Belinsky
 
Project Einstein South Africa - 4 Topics
Project Einstein South Africa - 4 TopicsProject Einstein South Africa - 4 Topics
Project Einstein South Africa - 4 Topics
Mark Belinsky
 
Project Einstein South Africa - Going to School
Project Einstein South Africa - Going to SchoolProject Einstein South Africa - Going to School
Project Einstein South Africa - Going to School
Mark Belinsky
 
Project Einstein South Africa Introduction
Project Einstein South Africa IntroductionProject Einstein South Africa Introduction
Project Einstein South Africa Introduction
Mark Belinsky
 
Preemptive Peace - Ignite Talk
Preemptive Peace - Ignite TalkPreemptive Peace - Ignite Talk
Preemptive Peace - Ignite Talk
Mark Belinsky
 
Digital Democracy - Programs & Strategy
Digital Democracy - Programs & StrategyDigital Democracy - Programs & Strategy
Digital Democracy - Programs & Strategy
Mark Belinsky
 
Digital Democracy - Overview
Digital Democracy - OverviewDigital Democracy - Overview
Digital Democracy - Overview
Mark Belinsky
 
Digital Democracy - Handheld Human Rights Details
Digital Democracy - Handheld Human Rights DetailsDigital Democracy - Handheld Human Rights Details
Digital Democracy - Handheld Human Rights Details
Mark Belinsky
 
Forty Interesting Ways* to use your Pocket Video Camera in the Classroom
Forty Interesting Ways* to use your Pocket Video Camera in the ClassroomForty Interesting Ways* to use your Pocket Video Camera in the Classroom
Forty Interesting Ways* to use your Pocket Video Camera in the Classroom
Mark Belinsky
 

More from Mark Belinsky (20)

The Power of Data & Transparency: Story & Conversation in the 21st Century
The Power of Data & Transparency: Story & Conversation in the 21st CenturyThe Power of Data & Transparency: Story & Conversation in the 21st Century
The Power of Data & Transparency: Story & Conversation in the 21st Century
 
Diplomacy in the 21st Century: How Tech Has Sifted International Relations
Diplomacy in the 21st Century: How Tech Has Sifted International RelationsDiplomacy in the 21st Century: How Tech Has Sifted International Relations
Diplomacy in the 21st Century: How Tech Has Sifted International Relations
 
Digital Public Diplomacy
Digital Public Diplomacy Digital Public Diplomacy
Digital Public Diplomacy
 
Equal Footing: Bringing indigenous people in Mexico to the negotiating table
Equal Footing: Bringing indigenous people in Mexico to the negotiating tableEqual Footing: Bringing indigenous people in Mexico to the negotiating table
Equal Footing: Bringing indigenous people in Mexico to the negotiating table
 
Digital Democracy Overview
Digital Democracy OverviewDigital Democracy Overview
Digital Democracy Overview
 
Citizens vs Disaster: How Technology Is Changing the Rules of Engagement
Citizens vs Disaster: How Technology Is Changing the Rules of EngagementCitizens vs Disaster: How Technology Is Changing the Rules of Engagement
Citizens vs Disaster: How Technology Is Changing the Rules of Engagement
 
Library Program Technology in Ukraine & Romania
Library Program Technology in Ukraine & RomaniaLibrary Program Technology in Ukraine & Romania
Library Program Technology in Ukraine & Romania
 
How can new media technology increase dialogue between government and the peo...
How can new media technology increase dialogue between government and the peo...How can new media technology increase dialogue between government and the peo...
How can new media technology increase dialogue between government and the peo...
 
Tweets, Maps & Apps
Tweets, Maps & AppsTweets, Maps & Apps
Tweets, Maps & Apps
 
What new media activists should know about libel, copyright and Open Source t...
What new media activists should know about libel, copyright and Open Source t...What new media activists should know about libel, copyright and Open Source t...
What new media activists should know about libel, copyright and Open Source t...
 
Opening students' Eyes Through Open Data
Opening students' Eyes Through Open DataOpening students' Eyes Through Open Data
Opening students' Eyes Through Open Data
 
Digital Democracy Overview - ITP Camp
Digital Democracy Overview - ITP CampDigital Democracy Overview - ITP Camp
Digital Democracy Overview - ITP Camp
 
Project Einstein South Africa - 4 Topics
Project Einstein South Africa - 4 TopicsProject Einstein South Africa - 4 Topics
Project Einstein South Africa - 4 Topics
 
Project Einstein South Africa - Going to School
Project Einstein South Africa - Going to SchoolProject Einstein South Africa - Going to School
Project Einstein South Africa - Going to School
 
Project Einstein South Africa Introduction
Project Einstein South Africa IntroductionProject Einstein South Africa Introduction
Project Einstein South Africa Introduction
 
Preemptive Peace - Ignite Talk
Preemptive Peace - Ignite TalkPreemptive Peace - Ignite Talk
Preemptive Peace - Ignite Talk
 
Digital Democracy - Programs & Strategy
Digital Democracy - Programs & StrategyDigital Democracy - Programs & Strategy
Digital Democracy - Programs & Strategy
 
Digital Democracy - Overview
Digital Democracy - OverviewDigital Democracy - Overview
Digital Democracy - Overview
 
Digital Democracy - Handheld Human Rights Details
Digital Democracy - Handheld Human Rights DetailsDigital Democracy - Handheld Human Rights Details
Digital Democracy - Handheld Human Rights Details
 
Forty Interesting Ways* to use your Pocket Video Camera in the Classroom
Forty Interesting Ways* to use your Pocket Video Camera in the ClassroomForty Interesting Ways* to use your Pocket Video Camera in the Classroom
Forty Interesting Ways* to use your Pocket Video Camera in the Classroom
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

Mobiles In Burma 2008

  • 1. Mobiles in Burma (Myanmar) Cross-Border Movement Strategies Under Authoritarian Regimes Wednesday, October 15, 2008 1
  • 2. This is Burma Population: 60 million Those in Exile: 4 million Less than 1% mobile phone market penetration KEY INDICATORS worst best GDP per capita, PPP (constant 2000 international $) ........ 1,446 3.50 Life expectancy at birth (years) ............................................. 61 4.19 Literacy rate (% of people age 15+) ..................................... 90 6.00 Human development index (out of 177)............................... 130 3.52 Rule of law (out of 208) ...................................................... 202 1.87 Voice and accountability (out of 208) .................................. 208 0.69 Digital opportunity index (out of 180) .................................. 176 1.36 Internet users (% of population) ........................................... 0.1 3.07 0 1 2 3 4 5 6 7 8 9 10 Source (by indicator): IMF 2006; World Bank 2006a, 2006a; UNDP 2006; World Bank 2006c, 2006c; ITU 2006, 2004 OpenNet Initiative, Internet Filtering in Burma in 2005: A Country Study, at http://opennet.net/studies/burma/. Wednesday, October 15, 2008 2
  • 3. Saffron Revolution Mobile phones were used by monks and other citizen journalists to send information to the outside world. Wednesday, October 15, 2008 3
  • 4. constrained context. OpenNet Initiative, Pulling the Plug: A Technical Review of the Internet Shutdown in Burma, at http://opennet.net/research/bulletins/013. Figure 1. Timeline of Events, Aug. 19, 2007 - Oct. 13, 2007 Text Saffron Revolution Internet in Burma Willfrom Burma are always asking forthat silencing mobiles andand assistance “People governments learn information as well as requesting for help the internet are a necessary step in any crackdown? from [the] outside world but very little of their voices reach the world and most are lost in the endless state of the government vacuum.” — Burmese blogger Wednesday, October 15, 2008 4
  • 5. Burma’s Borders In Burma the cost of a GSM sim card is 2.5 million kyat. This equals approximately $2000 (17,000 rand) on the black market conversion rate. At the official rate this is approximately $393,400 (3,351,324 rand). Bangladesh Dollars 4.18 Local Currency 250 Rand 31.39 India (Delhi) 7.77 300 54.46 Thailand 6.84 200 50.14 China (Yunnan) 14.6 100 124.4 South Africa 23.48 200 200 Wednesday, October 15, 2008 5
  • 6. How information travels Actions are recorded with mobile phones, uploaded to flash drives, taken across borders, uploaded to servers, sent to trusted contacts. Is there a better way? Wednesday, October 15, 2008 6
  • 7. Impact of Technology In Thailand, internet access is frequent. There, we found a correlation between access to internet and self- identification as an activist Since then, internet access has grown, including affordable and reliable GPRS on mobiles Wednesday, October 15, 2008 7
  • 8. Digital Democracy Problem Solution . Regional instability Cross-border communication World’s longest running civil Networking among war traditionally divided groups Rampant use of child soldiers Providing 21st century education Over 3.5 million internally displaced persons and Connecting refugees with refugees their resettled communities Severe censorship Freedom of information Wednesday, October 15, 2008 8