Successfully reported this slideshow.

Civil Resistance 2.0: 198 Methods Upgraded

5,981 views

Published on

Final version of my webinar presentation of bit.ly/CivilResistance for the International Center on Nonviolent Conflict (November 29, 2012).

Published in: Technology
  • Be the first to comment

Civil Resistance 2.0: 198 Methods Upgraded

  1. 1. source: Flickr/moroccanmary CIVIL RESISTANCE 2.0 A Crowdsourced Project on 21st Century Nonviolence Mary Joyce @ the International Center on Nonviolent Conflict November 29, 2012 Digital Activism Research Project University of Washington www.digital-activism.org
  2. 2. GENE SHARP source: humanfilm.nointroduction for a man who needs no introduction
  3. 3. GENE SHARP activistNobel Peace Prize nominee scholar canonical list of 198 methods of nonviolent action (1973) most influential living theorist of nonviolent struggle source: humanfilm.no introduction for a man who needs no introduction
  4. 4. THE YOUNG TURKS source: Fllickr/Ushahidi source: Fllickr/Moroccanmarywho definitely do need an introduction
  5. 5. THE YOUNG TURKS Patrick Meier Mary Joyce source: Fllickr/Ushahidi source: Fllickr/MoroccanmaryDirector of Social & Humanitarian Innovation Co-Founder of the at the Qatar Foundation Digital Activism Research Project PhD - Tufts University MA/PhD Student - UW researches digital technology and researches digital activism in nonviolence in repressive regimes resource-constrained societies who definitely do need an introduction
  6. 6. THE MISSION source: Fllickr/Elvert Barnes Meld digital tools with nonviolence methods
  7. 7. BUT FIRST source: Fllickr/Picture Perfect Posetwo notes of warning
  8. 8. ACTIVIST SECURITY Do not attempt digital activism without first considering the political context in your own country.• Social media is public, meaning the digital actions of you and the people you connect with can be watched by your government.• Governments are also getting very good at cracking passwords and linking accounts to physical locations, meaning you can be identified and harmed in the physical world.• Read “Digital Security for Activists” (https://oldhelp.riseup.net/assets/ digital_security_for_activists.pdf) or “Protecting Your Security Online” (https:// www.accessnow.org/blog/protecting-your-security-online-english-text-only1)
  9. 9. NETWORKED AUTHORITARIANISMWhile activists are using digital tools to change the power structure, repressive govts are using the same tools to prevent that change.• Censorship of opposition content, so few people in your country will ever see it (particularly in MENA and China)• Surveillance of activists, both for chilling effect and to actually apprehend and punish (particularly in MENA and China)• Propaganda of their own position, successfully using social media to maintain support for the status quo (particularly in CIS)• Read: Rebecca MacKinnon, Katy Pearce, Evgeny Morozov (above typology is his)
  10. 10. WHY?
  11. 11. NONVIOLENCE IS NOW DIGITAL Whether nonviolence experts acknowledge it or not.
  12. 12. ACTIVISTS WILL BENEFIT If digital practices are analyzed by experts in nonviolence.
  13. 13. bit.ly/Civi lResistance source: Fllickr/lightsinmotion Follow me
  14. 14. THE PROJECTCivil Resistance 2.0 : 198 Methods Upgraded
  15. 15. THE METHOD Open-edit crowdsourcing
  16. 16. ORGANIZATIONSharp’s method + enhancement + new form + implementation
  17. 17. AN EXAMPLEMethod 1: Public Speeches
  18. 18. NOT ONLY THE GOOD NEWS Method 43: Public Mourning
  19. 19. ENHANCEMENT Of the 54 methods of Protest and Persuasion therewere only 2 for which we could not find digital enhancements Though the sections for Noncooperation and Intervention have received fewer notes, coordination of most of these methods could also be facilitated by digital tools like SMS, email, chat, and encrypted versions of these technologies.
  20. 20. NEW FORMS Most means of Protest and Persuasion can now occur online as well as offline. Because Noncooperation and Intervention requiredirect engagement with institutions of power, new forms require that the institution of power have an online extension that can be targeted, such as a “denial of service” attack on a government website.
  21. 21. 10 NEW METHODS1. Maps and Maptivism 6. Influence Search Engine Results2. QR Codes 7. Livestreaming3. Digital File-Sharing 8. Check-ins4. Nonviolent Media Hijacking 9. Self-Surveillance5. “Trend” a Hashtag 10. Flash Mobs
  22. 22. MAPS AND MAPTIVISMThe digital and global amplifying the physical and local.
  23. 23. QR CODES source: frogloop.com source: oneicity.comLinking physical, mobile, and web.
  24. 24. DIGITAL FILE-SHARING this could be a tactical manual Use infrastructure accessible and familiar to your audience,young people use this software for pirating movies and music.
  25. 25. NONVIOLENTLY HIJACK MEDIAsource: http://adkyle.com Using their own media presence to undermine brand power.
  26. 26. “TREND” A HASHTAGA prominent position for the opposition narrative.
  27. 27. INFLUENCE SEARCH RESULTS A safer method of public satire.
  28. 28. LIVESTREAMINGAnyone can mass broadcast the opposition narrative.
  29. 29. CHECK-INSActivists can check-in to signal participation to friends or leave directly after check-in, creating a protest rally of “ghosts”
  30. 30. SELF-SURVEILLANCESurveillance is not only a method of repression.
  31. 31. FLASH MOBS Minsk, 2006source: smartmobs.com source: feedbackagency.com source: andrewcarr.org This is a great dilemma action.
  32. 32. MORE CHANGES NEEDED? Method 11 is Records, Radio, and Television source: clevescene.comsource: guardian.co.uk source: cleanenergyjobact.com
  33. 33. AN INVITATION bit.ly/ CivilResistance source: Flick/Hello Turkey ToeTo advance strategic nonviolence in the 21st century Digital Activism Research Project University of Washington www.digital-activism.org

×