Social Media Activism and State Censorship
Thomas Poell, University of Amsterdam
You may cite this paper (page numbers correspond with published version) as:
Poell, T. (2014). Social Media Activism and State Censorship. In Social Media, Politics
and the State: Protests, Revolutions, Riots, Crime and Policing in an Age of Facebook,
Twitter and YouTube, edited by D. Trottier & C. Fuchs. 189-206. London: Routledge.
Social Media Activism and State Censorship
Thomas Poell, University of Amsterdam
1. Introduction
Over the past years, commercial social media such as Twitter, Facebook and Sina Weibo,
have started to play a central role in protest communication and mobilization. Particularly
striking is the use of these media during recent protests in the Middle East and China, as the
regimes in these regions have made elaborate and aggressive efforts to control internet
communication. This chapter investigates how social media activism takes shape in the
context of pervasive censorship and state repression.
Examining this question, the first major protest event that stands out are the Iranian
post-election demonstrations of 2009. During these demonstrations over two million tweets
pertaining to the protests were sent by several hundred thousand users (Gaffney 2010).
Although doubts were later raised whether more than a few hundred of these users were
actually located in Iran, the massive exchange of tweets did suggest that social media were
quickly developing into vital platforms for sharing news about political contention in
dictatorial settings, in which it is difficult for international news organizations to operate. The
growing importance of social media for activism became even more evident in the Tunisian
and Egyptian revolutions of early 2011. During these uprisings, million of tweets tagged
#sidibouzid, #tunisia, #28jan, and #egypt were exchanged (Lotan et al. 2011). Moreover, and
perhaps more importantly, protesters in Tunisia and Egypt themselves shared a lot of news
and information through Facebook (Tufekci and Wilson 2012). Meanwhile, on the other side
of the world, the rapidly growing Chinese microblogging website Sina Weibo became the goto platform for protest communication. While China has, over the last decade, not seen any
large-scale protests against the central government, an ongoing stream of political and social
critique, as well as calls for local and regional protests flows through Weibo on a daily basis
(Bamman, O’Connor, and Smith 2012; Yang 2012).
These instances of social media activism are particularly striking, as the Iranian,
Chinese, and Tunisian state, and to a lesser extent the Egyptian state have become infamous
for their far-reaching efforts to control internet
189
communication. Moreover, these instances are remarkable, as the global online environment
as a whole is increasingly characterized by surveillance. The recent release of secret
documents by Edward Snowden shows that the US has developed several extensive online
surveillance programs, of which PRISM and UPSTREAM are the most well known. Through
these programs, the National Security Agency (NSA), with the collaboration of major
telecoms and internet corporations, keeps systematic track of phone calls and monitors online
communication within the US, but also internationally (Bamford 2013). Overall, as Deibert
and Rohozinski (2012, 21) argue, states around the world have “moved rapidly to regulate,
shape, intervene, and exercise power in cyberspace across all its spheres”. The Chinese,
Iranian, and Tunisian efforts to control internet communication are symptomatic of this
development, but they also stand out in the willingness of these states to openly use violence
and systematically censor communication. Each of these states has, over the past years, jailed
dozens of internet users, especially bloggers, for voicing political critique (Kelly and Cook
2011). Furthermore, these countries have massively blocked national and international
websites, including major social media platforms, and filtered internet communication on the
level of keywords, developing highly targeted forms of internet censorship. Finally, both
China and Iran have resorted to offensive online measures, such as denial-of-service attacks
against oppositional websites, and hacking of social media accounts of political dissidents.
(Deibert et al. 2010, 2012)
This chapter critically examines how these aggressive censorship practices shape
social media activism. In doing so, it also interrogates how the corporations that manage the
major social platforms operate in the face of pervasive internet censorship. How do the
technical and commercial strategies of these corporations affect activist communication and
mobilization in authoritarian settings? And, of course, the investigation looks at the activists
themselves. How do they, in the process of challenging dictatorial regimes, tactically
navigate the social media landscape, which is simultaneously shaped by the controlling
efforts of states, and the commercial interests of social media companies?
2. Social media ≠ neutral tools
In popular scientific discourse, social media are often portrayed as tools used by protestors
and blocked by dictatorial regimes. Writer and consultant Clay Shirky (2011) argues, for
example, that “social media have become coordinating tools for nearly all of the world's
political movements, just as most of the world's authoritarian governments are trying to limit
access to it”. In a similar vein, Larry Diamond (2010, 70) describes social media as
“liberation technology” that “enables citizens to report news, expose wrongdoing, express
opinions, mobilize protest, monitor elections,
190
scrutinize government, deepen participation, and expand the horizons of freedom”.
Simultaneously, he emphasizes that “authoritarian states such as China, Belarus, and Iran
have acquired (and shared) impressive technical capabilities to filter and control the internet,
and to identify and punish dissenters”. This understanding of social media as effective tools
for activist mobilization and communication, which regimes try hard to block and control,
also resonates in many of the press reports on the recent protests in the Middle East and
China. These reports tell tales of large numbers of protestors rapidly being mobilized through
social platforms, as well as of quickly circulating social media reports originating from the
streets of Cairo, Tunis, Teheran, and Beijing.
While this conceptualization of social media is highly attractive and easy to
comprehend, it leads to a fundamental misunderstanding of how social media activism
unfolds in dictatorial settings. It wrongly suggests, as Evgeny Morozov (2011) has pointed
out, that freedom and democracy can simply be promoted by increasing the availability of
social platforms. As various critical theorists have made clear social media do not function as
tools. Instead these media are entangled in complex sets of socio-economic, political, cultural
and technological relations, which very much premeditate and steer whether and how these
media become effective as platforms of activist mobilization and communication (Aouragh
and Alexander 2011; Bennett and Segerberg 2012; Langlois et al. 2009).
Exploring these relations, it is, first, important to see the development of social
platforms in the context of what has been labelled ‘information capitalism’, ‘communicative
capitalism’, or ‘cognitive’ capitalism, which can be defined as “a mode of accumulation in
which the object of accumulation consists mainly of knowledge, which becomes the basic
source of value, as well as the principle location of the process of valorisation” (Moulier
Boutang 2011, 57; see also Dean, 2009; Fuchs, 2011). Knowledge production, as Fuchs
(2011, 280) makes clear, not only involves corporations producing knowledge goods, but also
everyday mediated activities, including “users of MySpace, YouTube, Facebook and so on
who produce informational content”. In the case of social platforms, the most valuable
informational content is user metadata, which allows corporations such as Facebook and
Google to profile users and develop targeted advertising and services (Fuchs 2011; Van Dijck
2013).
These commercial strategies are important because they directly inform the
technological architectures and policies of social platforms, which are first and foremost
designed and managed to facilitate user profiling. Youmans and York (2012) show that this
particular techno-commercial focus can conflict with the interests and needs of activists.
Drawing from several case studies, the authors demonstrate that the policies and user
agreements of social platforms, including those of Facebook, YouTube, and Twitter, have
resulted in the banning of anonymous activist users, the removal of activist content, and the
handing over of sensitive activist user information to governments.
191
The present investigation will further develop this examination by interrogating how the
evolving technological architectures of social platforms affect activism. Work in the tradition
of software studies makes clear that these architectures -the customized sets of protocols and
algorithmic processes that characterize social platforms- very much steer user activity (Beer
2009; Chun 2011; Langlois et al. 2009). The challenge is to trace how such technological
steering affects the character and efficacy of activism.
Second, pursuing this exploration, the chapter examines how social media activism
takes shape in the context of the evolving state efforts to control internet communication.
Current research shows that the techniques and practices of internet censorship have
dramatically evolved over the past decade. In its 2012 publication, Access Contested, the
OpenNet Initiative (ONI) makes clear that over the years internet censorship tactics have
become more varied, and more focused on directing online user activity, instead of simply
blocking access to particular content. These tactics include “more ‘offensive’ methods”, such
as “computer network attacks” and the “projection of ideas favourable to a state’s strategic
interests”. They are “layered on top of the basic filters and blocks established during the
previous era”, and are combined with the intimidation and arrest of bloggers and online
activists (Deibert 2012, 10). While state repression and more offensive methods have been
most openly practiced by dictatorial regimes, these tactics have very much developed in a
global online environment increasingly characterized by surveillance. Both major internet
corporations and states everywhere have made surveillance a central element of their
operations. And, as recent evidence and research indicates, these different forms of
surveillance are strongly entangled with each other. State-led surveillance is made possible
by corporate collaboration: telecoms and social media companies provide access to a wealth
of user data, whereas the security industry delivers the necessary surveillance technology
(Fuchs 2013; Hayes 2009). The rise of this security-industrial complex is by no means
restricted to the US, as surveillance technologies are exported globally, and virtually every
national state tries to force internet companies to cooperate with its surveillance programs.
3. Social media activism and surveillance in the MENA region and China
The question is how these political and techno-commercial mechanisms take shape in
dictatorial settings, and how they steer social media activism. Addressing this question, the
various detailed studies on the Egyptian revolution are especially helpful, as they show that
both online and offline mobilization efforts were very much shaped by the Egyptian
censorship system and the always-imminent danger of police repression. First, social media
were evidently important in this context because the Egyptian state
192
tightly controlled the national television channels and the major newspapers. Social media
made it possible to broker connections between previously disconnected groups, and provide
platforms for expressing grievances against the dictatorial regime (Gerbaudo 2012, 58-59;
Lim, 2012, 244). Second, this is not to say that social media communication was
unproblematic. As Gerbaudo (2012, 62) emphasizes, a major obstacle in the mobilization
process was the “mutual distrust among Facebook users” and the “fear of police repression”.
For this reason, along with the fact that the majority of the population was not online, let
alone active on social media, offline personal networks and face-to-face communication were
especially important (Lim 2012; Rinke and Röder 2011). Third, since the state controlled
mass media essentially functioned as propaganda channels for the Mubarak regime, satellite
television, especially Al Jazeera, played a crucial role in spreading information on the
uprising to the Egyptian masses (Aouragh and Alexander 2011; Castells 2012; Eltantawy and
Wiest 2011). Thus, what the different studies show is that the uprising was articulated
through a complex media configuration, which was partly shaped by the protestors
themselves, but also for an important part by the Egyptian censorship system. Social media
were an essential element in this configuration, but so were the mainstream media and
various offline means of communication.
Important insights in how state censorship and repression shape social media activism
can also be obtained from research on recent protests in Iran and China. Rahimi (2011, 173)
describes how Iranian state-led cyber warfare against the protestors of the 2009 presidential
elections had an immediate “sociopsychological” effect. He maintains that in this period
“paranoia” over the dangers of using antifilter software “spread like wildfire”, most likely as
a result of the attempts of Iran’s Revolutionary Guard Corps to monitor oppositional online
activities. He depicts a climate of fear and uncertainty concerning online information, as large
numbers of websites are filtered and blocked, and misinformation is spread through fake
oppositional websites to deceive activists and stifle dissent. This account is confirmed by
Freedom House, which maintains in its report on post-election Iran that self-censorship in
Iran is currently “very extensive, particularly on political matters. The widespread arrests of
reporters and activists after the election, as well as perceptions of pervasive surveillance,
have created fear among online journalists and bloggers” (Kelly and Cook 2011, 192).
These observations partly correspond with the research on Chinese internet
censorship. Like Iran, the Chinese state massively blocks websites, filters online content, and
in governing internet communication very much relies on self-censorship on the part of social
media users and internet companies (Qiang 2011; Yang 2009). Yet, an important difference is
that the Chinese state has, over the past years, started to use online protest in its governing
process. Gang and Bandurski (2011, 39) maintain that the Chinese government increasingly
considers online communication as the “voice of the public”. The internet allows Chinese
politicians to read citizen’s views
193
in raw, unfiltered form, allowing them to identify and fix problems before they provoke
popular unrest (Shirky 2011, 5, 26). Following this approach, social media protest, especially
focused on local and regional issues, has been given a lot of space to develop.
Taken together, current research provides important insights in how social media
protest communication in the MENA region and China is simultaneously shaped by the
strategic manoeuvring of activists, as well as by the controlling efforts of dictatorial states.
What is still largely missing, with the exception of Youmans and York’s study, is research
that examines how social media’s techno-commercial mechanisms affect activism in in these
regions. And, more importantly, missing is research that considers how activist strategies and
techno-commercial and political steering become entangled with each other in dictatorial
settings.
4. Case Studies
To interrogate these interconnections, the investigation will draw from three case studies on
online contention in Tunisia, Iran and China. The first case study examines the role of Twitter
in the Tunisian revolution. This study is based on a content analysis, building on digital
methods and emergent coding, of a set of +100.000 tweets with the hashtag #sidibouzid,
collected between 18 December 2010 and 15 January 2011, when long-term president Ben
Ali fled the country (see Poell and Darmoni (2012) for methodology). In addition, 10 semistructured Skype interviews have been conducted with Twitter users, central to the
#sidibouzid communication. The second case study draws from 20 semi-structured
interviews, conducted through Google Talk, with college-educated Iranian bloggers. It
investigates how these bloggers have coped with internet censorship and state repression over
the past years (Poell and Zarrinbakhsh forthcoming). The last case study explores how Sina
Weibo was involved in two short episodes of political contention, which generated a lot of
traffic on the Chinese internet in 2011. It draws from collections of most circulated weibos,
the Chinese equivalent of tweets, on the two episodes (Poell, de Kloet and Zeng 2013).
These case studies will be supplemented by the wide variety of current research on
social media activism in the Middle East and China. In combination, this material provides
insight in how protestors in different parts of the world have used social media in the face of
elaborate state efforts to control their communication. In turn, to understand how states have
tried to steer social media activism, the inquiry will build on the rich body of research on
internet censorship, which has especially been developed by ONI and Freedom House.
Finally, the investigation draws from software studies and political economic research. These
approaches, which have been discussed above, help to interrogate how the technology and
business models of social platforms direct activist communication and mobilization. So far,
these different research perspectives have largely been developed separately. This
investigation will
194
show that it is vital to combine perspectives to understand how social media activism is
configured in the context of ubiquitous internet censorship and state repression.
5. Controlling states
Particularly striking is how pervasive censorship forces internet users to become highly selfconscious with regard to how they use language and present themselves online. To
communicate with each other about contentious issues, many users in especially China and
Iran adopt symbolic language, misspell potentially forbidden words, and hide their identity
by adopting a pseudonym.
For example, one of the interviewed Iranian bloggers, who works as an editor for an
online magazine, maintains that she had “to change the word ‘Dictator’ to ‘Dic-ta-tor’ and the
name of the poet Sexton to ‘Sekston’ to avoid filtering”. Another Iranian interviewee
recounts that in 2009, she tried to blog about participating in the protests around the
presidential election, but was afraid to write about it directly. So she used “codes” to describe
the people in the streets, such as “we the people with mineral water bottles at hand” (Poell
and Zarrinbakhsh forthcoming). A similar use of coded language can also be observed in
China. Qiang (2011, 210) gives the example of the widely used wordplay on the official
Chinese euphemism for censorship, which is carried out under the slogan “constructing a
harmonious society”. “The word ‘to harmonize’ in Chinese (hexie)”, he explains, “is a
homonym of the word for ‘river crab’. In folk language, crab also refers to bullies who
exercise power violently.” Consequently, the image of the crab has become “a new satirical,
politically charged icon”. And, “photos of a malicious crab travel through the blogosphere as
a silent protest.”
The use of pseudonyms is another tactic widely employed by internet users facing
censorship and state repression. One of the Iranian interviewees contents that “anonymity
gives a sense of liberation, it allowed me to say things that I would otherwise not say” (Poell
and Zarrinbakhsh forthcoming). Amir-Ebrahimi (2008, 102) notes that, in Iran, especially
“women and youth who write about their personal or private life, as well as those who
address political and social issues, do so under a pseudonym”. Similar observations can also
be made concerning China and other the Middle Eastern countries. Using a pseudonym,
however, does not make one invisible for state authorities. Qinglian (2008) stresses “those
who think that employing online pseudonyms will allow them to safely speak their minds
misunderstand the nature of the surveillance systems. The Chinese government’s Golden
Shield Project allows officials to track any internet poster’s IP address and true identity.”
At the same time, the frequent use of symbolic language, pseudonyms, and
misspelling can also be read as forms of self-censorship. They can be interpreted as the result
of states successfully steering internet users away
195
from directly expressing political critique, and confronting central state authorities. This
certainly appears to be the case in China. The Chinese regime has been rather permissive of
online parody and critique directed at especially local and regional governors, as these forms
of contestation can be used to check and curtail local administrations. Yet, simultaneously, it
has aggressively thwarted any attempt to mobilize protests against the central government.
Analysing millions of social media posts from nearly 1,400 different social media services all
over China, King, Pan, and Roberts (2012) discover that the Chinese censorship system is
specifically “aimed at curtailing collective action by silencing comments that represent,
reinforce, or spur social mobilization, regardless of content”. These authors also found that
“posts with negative, even vitriolic, criticism of the state, its leaders, and its policies are not
more likely to be censored”. Similar observations were made in our case study on contentious
communication on Weibo. A lot of jokes and critique aimed at the government remained
uncensored. Yet, posts that hinted at joined action were deleted. Occasionally, when a
scandal or protest has the potential to escalate, the Chinese state has taken further preventive
measures. This happened, for example, in February 2011, when Chinese-language websites
called for a “Jasmine Revolution” in major Chinese cities. In reaction, the state severely
curtailed social media activity: “post forwarding and photo publishing were suspended, and
searches for the word jasmine were blocked” (Canaves 2011, 77).
From the same critical point of view, it should be noted that pseudonyms, as well
anonymous logins, are not just employed by internet users to veil their identity, but that both
the Chinese and Iranian regimes have in different ways exploited online anonymity. Yang
(2009 50-51) points out that the infamous Chinese “internet commentators”, which are said to
be paid 50 cents for each message they post, tend to sign into popular online forums “with
anonymous user IDs, like any other internet user”. Under the veil of anonymity, they try to
guide the direction of public discussion in accordance with the principles of the state
propaganda departments. This resonates with the above discussed observations by Rahimi’s
(2011) concerning Iran’s Revolutionary Guard Corps, which spreads misinformation through
fake oppositional websites to deceive activists.
Whereas the Chinese and Iranian state have, over the past years, succeeded in shaping
online communication and steering social media users away from directly confronting central
authorities, the Tunisian and Egyptian states have evidently not succeeded in this effort. In
the pre-revolutionary years, both states certainly have taken repressive measures against
bloggers, and especially Tunisia developed a sophisticated censorship system. However, from
the research and press reports on the 2011 revolutions, it also becomes clear that neither state
interfered much with Facebook. Under these conditions, the Facebook page “We Are All
Khaled Said”, created in June 2010 to protest the violent death of Khaled Said at the hands of
police officers, could develop into a platform where mostly middle class Egyptian youth
196
expressed their grievances against the Mubarak regime. It was also from this page that the
call was launched and circulated for a mass demonstration on 25 January 2011. (Gerbaudo
2012; Lim 2012) Although this by no means explains why the Egyptian protests were
successful, it does indicate that there are vital differences in how dictatorial states steer and
control social media activism.
6. Commercial mechanisms and technological steering
Responding to popular claims concerning social platforms as activist tools, the corporations
managing these platforms have, albeit cautiously, positioned themselves as protesters’ allies.
Famously, Facebook’s CEO, Mark Zuckerberg, has promoted the platform, when it made its
initial public offering (IPO), as an emancipatory and liberating tool. In February 2012,
Zuckerberg wrote in a letter to investors: “By giving people the power to share, we are
starting to see people make their voices heard on a different scale from what has historically
been possible. These voices will increase in number and volume. They cannot be ignored”
(Reuters 2012).
Yet, as the research of Youmans and York (2012) indicates, the commercial
mechanisms of social media and the needs of activists do not necessarily match. This is not to
say, however, that they inevitably clash with each other. On the one hand, social
corporations, as they depend on the collection of user metadata to facilitate targeted
advertising, have a strong interest in drawing as many users as possible. Consequently, these
corporations have tried to develop their platforms in ways that accommodate at least some of
the activist needs. Responding to user feedback and recommendations by security experts,
Google has, for example, greatly improved the security on its different services, including
Google Plus, Gmail, Docs, and Search. By default, users now access these services over
HTTPS encryption, which layers the standard HTTP on top of the SSL/TLS cryptographic
protocols, making Internet communication more secure (Eckersley 2010; Sullivan 2011).
This is obviously particularly important for activists in dictatorial settings.
On the other hand, the same commercial mechanisms that occasionally correspond
with the needs of activists also frequently undermine their activities. This is most directly
evident in some of the user agreements and policies of social platforms, discussed by
Youmans and York (2012, 318-21). Particularly problematic for activist users in dictatorial
settings are the ‘real name’ policies of some of the major social network sites, including
Facebook and Google+. The terms of service of these sites require users to provide their real
name and information, which is in the corporations’ interest as real identities are easier to
monetize. This policy has clashed with efforts on the part of some activists to remain
anonymous. A striking example of this is the temporary deactivation of the ‘We Are All
Khaled Said’ Facebook
197
page. The page was created by former Google executive Wael Ghonim under the
pseudonymous account ‘ElShaheed’ (‘The martyr’). In November 2010, just before the
Egyptian parliamentary elections, Facebook deactivated the account and more importantly
the page, citing that the account violated Facebook’s terms of service. Although the page was
eventually re-launched, it shows the potential tension between the commercial strategies of
social platforms and the needs of activists. In a similar vein, social media corporations have
removed activist content. Most social media corporations police their platforms through
community mechanisms, allowing users to report each other for terms of service violations,
including offensive content and spam. These mechanisms greatly lower the cost of
monitoring user-generated material, but they also give state agents and regime supporters the
instruments to battle activist social media content, which is what happened during the Arab
Spring. While wrongfully removed content can be restored, or circulated through other
channels, the content management strategies of social media corporations are clearly prone to
abuse.
More difficult to reverse are changes in the architecture of social platforms. Informed
by their evolving business models, as well as by aggressive competition, social media
corporations constantly tinker with the architectures of their platforms. Such architectural
changes can fundamentally affect how activists communicate with each other, and they can
undermine the often-vulnerable practices of contentious communication in dictatorial
settings. This is precisely what happened in the case of Google Reader, which, for several
years, was a vital platform for Iranian and Chinese bloggers to exchange news and opinions.
The service could play a pivotal role because it allowed users to share otherwise blocked
news items and blog posts, and most crucially, attach comments to these items. The wellknown Iranian blogger Amir (2011a) explains why the service made it possible to circumvent
filtering: ‘Google Reader is not in a separated domain and thanks to its https protocol, it is
hard to filter by the government (To filter Google Reader the whole google.com domain
should be filtered).’ Since many other social platforms, such as Twitter, Facebook, YouTube,
and Flickr, and many international news websites, such as the BBC and CNN, were often
blocked in Iran, Google Reader could serve, according to Amir, as a crucial social platform
and news spreading website.
That is until October 2011, when Google scraped the social functionality of the
service, and shifted it to its new social platform Google+. Alan Green (2011), one of
Google’s software engineers, announced that “many of Reader's social features will soon be
available via Google+, so in a week's time we'll be retiring things like friending, following
and shared link blogs inside of Reader”. These were precisely the functions that made Google
Reader such an important platform for many Iranian internet users. Google’s decision drew a
storm of protests in the Iranian blogosphere (Amir 2011b; Visual Vortex 2011). In the hope
of changing the corporation’s mind, many Iranians, along with many Chinese internet users,
signed a petition started by
198
Brett Keller (2011) to “save Google Reader’. The petition quickly received more than 13,000
signatures. But these efforts were to no avail, as Google, engaged in a global competition
with Facebook, was set on developing and promoting Google+. Iranian internet users were
certainly not happy with what Google+ had to offer. Amir (2011b) stressed that unlike in
Google Reader, users cannot share the full content of a blog post in Google+, one can only
share the link. If the linked blog or news site is filtered, which is often the case, it is not
possible to access the blocked content. Eventually, in 2013, Google decided to discontinue its
reader altogether (Poell and Zarrinbakhsh forthcoming).
These changes to Google Reader are an example of the kinds of architectural changes
that social media corporations, including Facebook and Twitter, implement on a regular
basis, reshaping user activity and, consequently, activist practices in correspondence with
their global commercial strategies. Activists, like other users, have little control over these
technological developments, just as they have little insight in how social media’s algorithms
and protocols exactly steer their activities and process their data. Commercial social media
corporations have a competitive interest in black boxing the backend of their operations.
Moreover, they have a strong interest in limited access to the data that is shared and
generated on their platforms, as this data allows them to target personalized advertising and
services at their users. Consequently, activists neither have control over the social media
architectures through which they communicated, nor over the data they collectively produce
through Twitter hashtags, and Facebook pages and groups. Like any other user, they are left
to guess what exactly happens with this data, which is evidently particularly problematic for
activists facing dictatorial regimes.
7. Activist strategies
Resisting commercial steering and authoritarian state control, activists have developed a
range of strategies to tactically manoeuvre the complex social media landscape. A prominent
strategy, discussed above, is to veil one’s real message and identity by using symbolic
language, pseudonyms, and misspelling. Although research indicates that these methods are
widely used and also allow users facing dictatorial regimes to continue communicating about
controversial topics, they are not unproblematic. Not only do such veiling efforts provide
users with an unjustified sense of security, as technically sophisticated states have a variety of
methods at their disposal to track and identify users, they can be also interpreted as the result
of states successfully steering internet users away from directly expressing political critique
and confronting central state authorities. Additionally, these strategies do not liberate activists
from the commercial mechanisms of social platforms.
Another often-employed strategy is the use of internet filtering circumvention tools to
evade censorship, access blocked material, and communicate
199
about contentious issues. Research by ONI and Freedom House has demonstrated that a wide
variety of tools are used for these purposes, ranging from simple web proxies to
HTTP/SOCKS proxies and virtual private network (VPN) services (Callanan et al. 2011;
Roberts, Zuckerman, and Palfrey 2011). While there is a range of circumvention tools
available, these tools do not appear to be widely used to access blocked material. Based on an
extensive survey on the global usage of circumvention tools, Roberts et al. (2010, 2) have
come to the startling conclusion “that no more than 3% of internet users in countries that
engage in substantial filtering use circumvention tools. The actual number is likely
considerably less”. Moreover, they maintain that users tend to chose the simple web proxies,
which are less secure, instead of “more sophisticated tools”.
Although the overall use of circumvention tools in dictatorial states seems to be rather
low, research on politically more engaged groups of users suggests much higher usage rates.
Based on a survey implemented on a set of 244 politically-oriented bloggers, part of which
can also be characterized as activists, Roberts et al. (2011a, 1) reported that “79% of
respondents in heavily filtering countries use circumvention tools at least occasionally”.
Hence, using circumvention tools appears to be a widely employed activist strategy in the
examined regions. Nevertheless, it remains the question whether this tactic liberates activists
from political and commercial steering. To reach substantial publics in the current media
landscape, activists are still forced to pursue a major part of their communication and online
mobilization through commercial social platforms. Moreover, as most internet users in
filtering countries do not use circumvention tools, activists are required to develop
communication strategies within the confines of state censorship.
Perhaps the most sophisticated and effective way in which activists have resisted
political and commercial steering is by “working” the global media ecology as a whole. Our
research on Twitter and the Tunisian revolution provides insight in how this strategy is
operationalized in the MENA region. One of the interviewees in this research project, Nasser
Weddady, the civil rights outreach director for the American Islamic Congress, explains that
the use of social media is one component in an integrated approach: “We have been working
for years on developing a strategy that includes the complete media machine: understanding
media relationships between broadcasted media, printed media, satellite channels, and news
agencies”. This also entails “identifying, recruiting, and influencing correspondents in
strategically chosen places, and building relationships with them”. Weddady and the other
interviewees emphasize that developing this strategy was very much the work of global
diaspora networks, which had been constructed over the course of a decade. Sami Ben
Gharbia recounts that the construction process started in 2002 with the first Egyptian
bloggers, and picked up speed from 2006 onward because of conferences and workshops
organized in Beirut: “These physical meetings helped to create a strong activist diaspora
community.” In this process, Twitter and various other social media
200
played a vital role. Weddady relates: “We started building an audience all over the world”.
Recruiting especially focused on “young thinkers, who can be potential future leaders in their
countries” (Poell and Darmoni 2012).
During the revolutions in Tunisia and Egypt the key task of the diaspora network was,
according to Ben Gharbia, “information escape, the reproduction and structuring of
information.” This involved a variety of social platforms: “Our aim was first to get the
information out of Facebook because it's a closed platform. Not everybody has access, or
knows how and where to find the information on Facebook. In the next step, “we publish it
on a blog with a clear structure, pages, archives, where the usability of the information is
refined. It can also be re-publish on YouTube. Then we tweet the URL to inform, where one
can see the information.” Using blogs was important, as it allowed activists to increase their
control over the curation and circulation of information, making them less depend on
commercial platforms. In the case of the Tunisian revolution, especially the critical
independent collective blog Nawaat.org fulfilled this function. Furthermore, by circulating
information through Twitter it became “accessible to especially Al Jazeera, which was, like
many other television channels, nonstop following our Twitter account.” Ben Gharbia
emphasized that he and his colleagues could function as important information relays
precisely because of the diaspora network, which circulated information and did a lot of
translation work across different languages and dialects (ibid.)`.
By adopting an integrated communication strategy and building a global network, the
activists in the MENA region were less dependent on, or boxed-in by single social platforms.
They explicitly focused on circulating information across a variety of platforms. Furthermore,
they were able to escape national systems of state censorship. Obviously helped by the
significance of the Arab Spring protests, their global network and integrated media strategy
gave them the opportunity to plug their message in the global media.
8. Conclusions and recommendations
Instead of celebrating and promoting social media as activist tools in the struggle against
dictatorial regimes, this study suggests that it is particularly important to critically examine
the complex political, economic, and technological relations in which activist social media
communication is articulated. This requires research that combines insights from a number of
theoretical approaches, and that pays close attention to the particular context in which activist
processes of communication and mobilization take shape.
First, social media activism in dictatorial settings cannot be understood without
examining how systems of state censorship shape activist communication. Recent scholarship
shows that states have become progressively more sophisticated in controlling online
communication through a range of filtering techniques, as well as offensive methods. The
presented case
201
studies indicate that these controlling efforts do not necessarily stop activist communication,
but rather shape its character. To continue communicating about contentious issues, those
within comprehensive systems of state censorship have adopted a range of tactics to veil their
identities, as well as the actual content of their message. While these tactics are highly
inventive and also partly effectively in challenging dictatorial regimes, at the same time they
can be interpreted as forms of self-censorship. Especially in China and Iran, state censorship
and repression appears to have succeeded in steering people away from directly confronting
central state authorities.
Second, instead of constituting neutral or even friendly platforms from which to
challenge dictatorial regimes, social media very much shape activist communication, and
they do so in contradictory ways. To understand how this works, it is important to see,
following political economic research, that the major social platforms are first and foremost
commercial operations, focused on generating revenue by systematically collecting and
analysing user data to facilitate personalized advertising and a range of services. These
commercial objectives inform the user policies and management of social platforms, as well
as the frequent changes in their architectures. As social media corporations have a strong
interest in maximizing user activity, some of these changes and policies cater to the needs of
activists. Yet, they also often conflict with these needs, especially in circumstances in which
there are relatively few platforms available for activist communication.
Third, it remains important to closely examine how activists navigate the
contemporary media landscape. Such an examination indicates that it is indeed difficult to
emancipate oneself from political and commercial steering. Yet, especially the research on
the Arab spring protests shows that there are nevertheless ways to tactically mitigate the
impact of such steering. These tactics do, however, require substantial organizational efforts.
By constructing global activists diaspora networks and by strategically circulating and
translating content across different social platforms, activists from the MENA region were
able to resist becoming enclosed by particular platforms and systems of censorship.
These observations strongly suggest that it is crucial for policy makers, activists and
scholars concerned with social media activism in dictatorial settings to critically interrogate
how this type of activism takes shape in complex configurations in which political,
commercial and technological mechanisms mutually articulate each other. Such inquiries are
important because they show that activist communication and mobilization especially
become vulnerable to political and commercial steering, when these processes are primarily
facilitated by a small number of commercial social platforms. Consequently, it is vital to
strategically organize activist communication and mobilization across a range of social
platforms, including alternative non-commercial platforms, as well as both offline on the
local level and online across national and regional borders. Such strategy makes activists less
vulnerable to political and commercial steering, and it enhances their control over how
information circulates and is curated.
202
This ecology approach, however, requires a major organizational effort. The research
presented in this chapter implies that it can only be successfully pursued through networks
that connect the protestors on the streets to globally dispersed bloggers and activists. Through
such connections the work of circulating, translating, and curating information can be shared
and organized across different geographical locations. This is where policy makers and
NGOs can play a significant role. Developing global activist networks and setting up
alternative media platforms in challenging dictatorial regimes, attention is especially needed
on the following points. First, particularly important is the security of online communication.
Given the increasingly central role played by commercial social media in online activist
communication, it is crucial that social media corporations are constantly pressured to
enhance the security of their platforms and to take activist interests into account when
technologically developing their services and managing their platforms. Second, assistance is
also needed in developing alternative online platforms, to allow activists more independence
vis-à-vis commercial platforms in curating and circulating their content. Finally, special
attention in terms of resources and security should be devoted to the translation of online
activism into offline networks of mobilizations and capacity building. The connection
between contentious social media communication and offline forms of associations, as the
research on the Arab Spring protests showed, are of vital importance, but are also really
difficult to establish, as dictatorial regimes are very much focused on repressing such
connections.
Whatever aspect of social media activism one is focusing on, it is above all crucial to
continuously interrogate how the controlling efforts of dictatorial regimes, the commercial
and technological steering of social media corporations and the tactical manoeuvring of
activists are mutually entangled with each other. Only by critically examining these
interconnections is it possible to arrive at informed assessments of, and interventions in,
episodes of social media protest communication and mobilization.
References
Amir. 2011a. Why Google reader (Gooder) matters for us (Iranian)! Amir, October 22.
http://www.amirhm.com/2011/10/why-google-reader-gooder-matters-for-us.html.
Amir. 2011b. Why Google reader is important for us. Amir, October 29.
http://www.amirhm.com/2011/10/why-google-reader-is-important-for-us-2.html.
Amir-Ebrahimi, Masserat. 2008. Blogging from Qom, behind Walls and Veils. Comparative Studies
of South Asia, Africa and the Middle East 28 (2): 235-249.
Aouragh, Miriyam, and Anne Alexander. 2011. Sense and Nonsense of Facebook Revolutions.
International Journal of Communication 5: 1344-1358
203
Bamford, James. 2013. They Know Much More Than You Think. The New York Review of Books,
August 15.
Bamman, David, Brendan O'Connor, and Noah A. Smith. 2012. Censorship and deletion practices in
Chinese social media. First Monday, 17 (3).
http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/3943/3169.
Beer, David. 2009. Power through the algorithm? Participatory web cultures and the technological
unconsciousness. New Media & Society 11 (6): 985-1002.
Bennett, W. Lance, Alexandra Segerberg. 2012. The Logic of Connective Action. Information,
Communication & Society 15 (5): 739-768.
Callanan, Cormac, Hein Dries-Ziekenheiner., Alberto Escudero-Pascual, and Robert Guerra. 2011.
Leaping Over the Firewall: A Review of Censorship Circumvention Tools. Freedom House.
http://www.freedomhouse.org/sites/default/files/inline_images/Censorship.pdf.
Canaves, Sky. 2011. China’s social networking problem. Spectrum, IEEE 48 (6): 74-77.
Castells, Manuel. 2012. Networks of Outrage and Hope. Social Movements in the Internet Age.
Cambridge: Polity.
Chun, Wendy K.H. 2011. Programmed Visions. Software and Memory. Cambridge: MIT Press.
Dean, Jodi. 2009. Democracy and other neoliberal fantasies: Communicative capitalism and left
politics. Durham: Duke University Press.
Deibert, Ronald J., John G. Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds. 2010. Access
Controlled: The shaping of power, rights, and rule in cyberspace. Cambridge: MIT Press.
Deibert, Ronald J., John G. Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds. 2012. Access
Contested: Security, Identity and Resistance in Asian cyberspace. Cambridge: MIT Press.
Diamond, Larry. 2010. Liberation technology. Journal of Democracy 21 (3): 69–83.
Eckersley, Peter. 2010. Gmail Takes the Lead on Email Security. Electronic Frontier Foundation,
January 13. https://www.eff.org/deeplinks/2010/01/gmail-takes-lead-email-security.
Eltantawy, Nahed, and Julie Wiest. 2011. Social Media in the Egyptian Revolution: Reconsidering
Resource Mobilization Theory. International Journal of Communication 5: 1207-1224.
Fuchs, Christian. 2011. Foundations of critical media and information studies. New York: Routledge.
Fuchs, Christian. 2013. Societal and Ideological Impacts of Deep Packet Inspection Internet
Surveillance. Information, Communication & Society 16 (8): 1328-1359.
Gaffney, Devin. 2010. #iranElection: Quantifying online activism. Proceedings of WebSci10.
Gang, Qian, and David Bandurski. (2011). China's emerging public sphere. In Changing media,
changing China, edited by Susan L. Shirk, 38-76. Oxford: Oxford University Press.
Gerbaudo, Paolo. 2012. Tweets and the Streets: Social Media and Contemporary Activism. Pluto
Books: London.
Green, Alan. 2011. Upcoming changes to Reader: a new look, new Google+ features, and some cleanup. The official Google Reader Blog, October 20.
http://googlereader.blogspot.nl/2011/10/upcoming-changes-to-reader-new-look-new.html.
Hayes, Ben. 2009. NeoConOpticon. The EU Security-Industrial Complex. Amsterdam Transnational
Institute/Statewatch.
Keller, Brett. 2011. Save Google Reader.” Brett Keller. Public health & development, 21 October.
http://www.bdkeller.com/2011/10/save-google-reader/.
204
Kelly, Sanja, and Sarah Cook, eds. 2011. Freedom on the Net 2011 – A Global Assessment of Internet
and Digital Media. Ifap, http://www.ifap.ru/library/book497.pdf.
King, Gary, Jennifer Pan, and Margaret E. Roberts. 2012. “How censorship in China allows
government criticism but silences collective expression” (working paper, Institute for
Quantitative Social Science, Harvard University. http://gking.harvard.edu/publications/howcensorship-china-allows-government-criticism-silences-collective-expression.
Langlois, Ganaele, Greg Elmer, Fenwick McKelvey, and Zachary Devereaux. 2009. Networked
publics: The double articulation of code and politics on Facebook. Canadian Journal of
Communication 34 (3): 415-434.
Lim, Merlyna. 2012. Clicks, Cabs, and Coffee Houses: Social Media and Oppositional Movements in
Egypt 2004–2011. Journal of Communication 62 (2): 231–248.
Lotan, Gilad, Erhardt Graeff, Mike Ananny, Devin Gaffney, Ian Pearce, and danah boyd. 2011. The
Revolutions Were Tweeted: Information Flows During the 2011 Tunisian and Egyptian
Revolutions. International Journal of Communication 5: 1375–1405.
Morozov, Evgeny. 2011. The Net Delusion: How not to Liberate the World. London, England: Allen
Lane/Penguin.
Moulier-Boutang, Yann. 2012. Cognitive Capitalism. Cambridge, Polity.
Poell, Thomas, Jeroen de Kloet, and Guohua Zeng. 2013. Will the Real Weibo Please Stand Up?
Chinese Online Contention and Actor-Network Theory. Chinese Journal of Communication 7
(1): 1-18.
Poell, Thomas, and Kaouthar Darmoni. 2012. Twitter as a Multilingual space: the articulation of the
Tunisian revolution through #sidibouzid. NECSUS - European Journal of Media Studies 1.
http://www.necsus-ejms.org/twitter-as-a-multilingual-space-the-articulation-of-the-tunisianrevolution-through-sidibouzid-by-thomas-poell-and-kaouthar-darmoni/.
Poell, Thomas, and Niaz Zarrinbakhsh. forthcoming. Living as a Criminal: Iranian Internet censorship
and user adaptation.
Qiang, Xiao. 2011. The rise of online public opinion and its political impact. In Changing media,
changing China, edited by Susan L. Shirk, 202-224. Oxford: Oxford University Press.
Qinglian, He. 2008. The Fog of Censorship. New York: Human Rights in China.
Rahimi, Babak. 2011. The Agonistic Social Media: Cyberspace in the Formation of Dissent and
Consolidation of State Power in Postelection Iran. The Communication Review 14 (3): 158178.
Reuters. 2012. Zuckerberg's letter to investors, Reuters, February 1.
http://www.reuters.com/article/2012/02/01/us-facebook-letter-idUSTRE8102MT20120201.
Rinke, Eike M., and Maria Röder. 2011. Media ecologies, communication culture, and temporalspatial unfolding: Three components in a communication model of the Egyptian regime
change. International Journal of Communication 5: 1273-1285.
Roberts Hal, Ethan Zuckerman, and John Palfrey. 2011. 2011 Circumvention Tool Evaluation.
Berkman Center for Internet & Society.
http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2011_Circumvention_Tool_Ev
aluation_1.pdf.
Roberts Hal, Ethan Zuckerman, Jillian York, Robert Faris, and John Palfrey. 2010. 2010
Circumvention Tool Usage Report. Berkman Center for Internet & Society
http://cyber.law.harvard.edu/publications/2010/Circumvention_Tool_Usage.
Roberts H, Zuckerman E, York J, Faris R, Palfrey J (2011a) International Bloggers and Internet
Control. Berkman Center for Internet & Society.
http://cyber.law.harvard.edu/publications/2011/International_Bloggers_Internet_Control.
Shirk, Susan L. 2011. Changing media, changing China. In Changing media, changing China, edited
by Susan L. Shirk, 1-37. Oxford: Oxford University Press.
Shirky, Clay. 2011. The Political Power of Social Media Technology, the Public Sphere, and Political
Change. Foreign Affairs, January/Februrary.
http://www.foreignaffairs.com/articles/67038/clay-shirky/the-political-power-of-socialmedia.
205
Sullivan, Danny. 2011. Google To Begin Encrypting Searches & Outbound Clicks By Default With
SSL Search. Search Engine Land, October 18. http://searchengineland.com/google-to-beginencrypting-searches-outbound-clicks-by-default-97435.
Tufekci, Zeynep, and Christopher Wilson. 2012. Social Media and the Decision to Participate in
Political Protest: Observations From Tahrir Square. Journal of Communication 62: 363–379.
Van Dijck, José. 2013. The Culture of Connectivity. A Critical History of Social Media. New York:
Oxford University Press.
Visual Vortex. 2011. Gooder is Gone for Good. Visual Vortex, November 2, http://visualvortex.aminus3.com/image/2011-11-02.html.
Yang, Guobin. 2009. The Power of the Internet in China: Citizen Activism Online. New York:
Columbia University Press.
Yang, Guobin. 2012. A Chinese Internet? History, practice, and globalization. Chinese Journal of
Communication 5 (1): 49-54.
Youmans, William L., and Jillian C. York. 2012. Social Media and the Activist Toolkit: User
Agreements, Corporate Interests, and the Information Infrastructure of Modern Social
Movements. Journal of Communication 62 (2): 315–329.
206