Transcript & comments from "Twitter against Tyrants" Congressional hearing

Some choice adhoc quotes that tumbled out of my brain during the Congressional hearing on new media, titled “Twitter against Tyrants”, that I spoke on last Thursday in Washington, D.C..

“I’ve learned an important lesson in working with the Tibetan
independence movement and others:  It’s that we can’t presume what people are
willing – are or are not willing to do for their own freedom and liberty and
democracy.  We can’t say, oh, if they do that, they might get arrested or go to
jail or get killed and we can’t do that.  These are people, as we saw in Iran,
who are willing to take to the streets and die for their freedom, and you know,
the – it’s an important fact to remember to not presume that you want to
protect them.”

“I get asked this question a lot as well because I’m building,
like, an encrypted phone and people are like oh man, the Mafia is going to love
that, or something.  So it is – and my students ask me this as well – and I
don’t, from an engineer perspective, I don’t want to be the guy that said yeah,
just, I made the AK-47 and you know, it’s a great gun.  (Laughter.)  So you
have to be careful.  You need to inject morality into these things, but you do
– it’s a slippery slope.”

“I’m happy for tools like Twitter, that they can be used just as well to cover
the daily lives of Ashton and Demi or break the news of Michael Jackson’s
death.  But the fact that they can be used to broadcast updates from the
streets of Iran or spread the news of political prisoners in Tibet being
executed is a very weighty obligation and responsibility that they’ve taken on.”

Many thanks to my fellow panelists (Daniel Calingaert, Evgeny Morozov, Chris Spence and Shiyu Zhou) for the enjoyable discussion.

Shout-outs to Ushahidi, Alive in Baghdad, Lech Walesa and more in the full un-official transcript.

ITP2800 – Week 4 – Mobile Commons, TXTPower and Campaign Strategy

Week 4 – September 29 Mobile Campaigns from Text to Video: Texting, Ringtones and Camera Phones


Homework:
1) Create diagrams for your cause proposal based on the pyramid and pillar diagrams below.
2) Read the following:

3) Read this post: Turn Your Blog Into a Native iPhone App in 10 Steps
4) For those interested in Android development, you should download gReporter open-source project and get your development environment setup -> http://developer.android.com/

Here’s the audio from the first hour of class, listen to this while reviewing the text below:

Class begin with a discussion on the use of strategy from the school of non-violent direct action, as means for planning and designing mobile applications for social activism. In other words, approach mobile application design from a typical “product” or “consumer” perspective or even a thoughtful usability/design approach, may not make sense when it comes to trying to implement something to create actual change in society.

In the case of social activism, you must developer a strategy to affect an existing regime. A regime can represent a corporation, government, a specific issue, social prejudice, or any existing state of mind or structure in society that can be targeted for change. A long term strategy is necessary to keep focus on the goal.

Opportunities present themselves over time through the effort to affect change on an issue. They can be expected or unexpected. Your effort should be positioned to take advantage of them as they emerge.

Tactics are short term actions implemented to take advantage of opportunities. They can be of varying length and intensity, but must be aligned with your overall strategy. Multiple tactics can be used at once.

You must also consider deeply the structure of the existing regime you are targeting. Here is a typical governmental regime and the “Pillars of Support” which actually make a government function.

However, this same concept could be applied to more mundane campaigns such as increasing efficiency in shopping or promoting the purchase of only pasture-raised eggs at the Park Slope Food Coop:

These timeless approaches to campaigns, drawing from the likes of Sun Tzu’s “Art of War” as much as from the non-violent victories of Gandhi and Mandela, are useful and powerful constructs within which any campaign must be processed. More specifically, for mobile application design, it is critical that you consider a non-corporate, non-consumer perspective as part of your design process, and ideally throughout your campaigns efforts.

Many thanks to The International Center on Nonviolent Conflict for their great instruction, content and overall efforts in this area of work and practice. Here are some related readings on these concepts and more:

Guest Speakers

Week 4 features two excellent guest speakers. The first, Ben Stein, presented a US-oriented perspective through the work of his organization, Mobile Commons, and the many mobile advocacy campaigns they’ve implemented, including fighting for their own right to broadcast Pro-Choice SMS messages on the Verizon Wireless network. The second speaker, Tonyo Cruz, spoke to us in the midst of the Philippines cleanup from a large storm and flooding in which mobile phones were used to coordinate rescue and raise money. Tonyo’s perspective on the use of mobile in a more social, distributed, “peer to peer” manner, was an excellent contrast to the more centralized broadcast and web-based models that Ben described in the US.

Discover Simple, Private Sharing at Drop.io

Ben Stein – MobileCommons http://www.mobilecommons.com
Mobile Commons’ customers are some of the leading cause-related organizations in the world. They use our web-based application to create mobile programs based around text messaging, voice calls, and web-based interactive components. With those tools, they raise money, build their lists, add interactivity to live events, get more support from the web, and make it easier for their ideas to spread.

Our second guest of the evening was Tonyo Cruz of TXTPower– Mobileactivist, writer and journalist Philippines – Since 2001, Tonyo has helped convene TXTPower, the leading mobile activist group in the Philippines and helped initiate its many high profile campaigns.

ITP2800 – Week 3 – Nathan's Story, Secret Videos and Student Proposals

Homework for week 3:


Here’s what we talked about in class:

I announced my work in porting the Tor Project to Android. Tor is an “onion router” web proxy that allows web surfers in places like Iran and China get free, anonymous access to the web. Having secure, anonymous browsing that can route around censorship is a critical component of my Guardian secure smartphone project.

The story of Alan Turing and his impact on computing came up briefly and I just wanted to make sure everyone knew the amazing yet tragic story of his life. Just recently, an online, crowd-sourced petition effort pressured the British Government to issue a formal apology for causing his suicide, and countless others who were persecuted for their sexuality.

At some point in class, I drew a diagram that I quite enjoyed sharing, and will attempt to recreate here, since I unfortunately didn’t get a photo or capture it using the smart board. The drawing below is an attempt to demonstrate the various layers of network communication layers, both the physical medium and the amount of government/state and corporate control at each layer. Ultimately, the best opportunities for using networks with less control lie at the LAN layer and the Global layer…. though there are opportunities and technologies at all layers.

Spectrum Of Network Control

I also realized that I hadn’t given the class a background on myself, and decided to share a talk I had recently given at Parsons on my life and work. The presentation tells my story through the various computing hardware and devices I’ve owned, used, hacked and programmed in my life. Notice that the devices get smaller, more powerful and more connected over time. The slides are posted below, and then a video from the talk I gave at Parsons is below that.

Discover Simple, Private Sharing at Drop.io


the audio starts after a minute or so…

Finally, we reviewed week 2 homework, specifically “mobile videos shot under duress” and the first draft of proposals for the cause they’d like to work on and the technology they plan to use.

You can search #itp2800 on Twitter and ITP2800 on Delicious to see links to some of the homework.

That’s all for week 3…. leave a comment here if you have any questions or feedback.

Video: My "Open Data for Developers" session from #CapitolCamp

Last Friday, the NY Senate CIO hosted the first ever Capitol Camp in Albany.

Along with Remy DeCausemaker, I led a session on “Open Data for Developers”, discussing the Why?/What?/How?’s of releasing government data in open formats with open tools. Remy demonstrated the scrubbers and scrapers that his organization Civx.us has developed.

Here’s the video…

You can view the complete session notes here along with notes and information on the rest of the event. There are also uncut videos of the rest of the sessions on the NY Senate Uncut YouTube Channel.

Teaching @ NYU this Fall: "Social Activism Using Mobile Technology"

Social Activism Using Mobile Technology
H79.2800.1 Call#76846 Tues 6:30pm to 9:00pm Staff

ITP Course Listing

We all know how mobile phones and ubiquitous computing have changed communication and networking in our personal lives, but do you understand the affect they have had on political and social justice movements around the world? More importantly, do you know how this has been done, so that you can apply these techniques when your own moment to raise your voice comes? While Obama Vice-Presidential SMS announcement was a milestone for politics in the U.S., activists and organizations around the world have been using mobile phones for years to get their message out, organize their communities, safely communicate under authoritarian eyes and save lives in times of crisis.

Through studying historic, global uses of mobile technology and then teaching you how to use and apply these techniques, this course will give you the power 2B THE CHNG U WNT 2 C. The source will study and apply the use of SMS capture and broadcast systems (FrontlineSMS/RapidSMS), mobile crisis & event reporting tools (Ushahidi, VoteReport), Bluetooth broadcast systems, pirate Wifi mesh nodes, helmet-cam mobile phones and wearable UMPC/NetBook video broadcast systems. The course will also study about security and privacy of mobile phones and the possibility for open-source telephony. While the focus will be on the cutting edge, we’ll also review the historic importance of police scanners, HAM radio, walkie talkie radios and other “old school” tools that have played important roles in the civil rights movement, the environmental movement and more. Actual organizations, causes and activists will be invited to speak to the class (both in-person and via Skype from around the world) to offer their stories and observations. Opportunities to work on projects with these movements will be presented to students.

Some experience programming mobile devices (J2ME, iPhone, Android) will be useful, but not necessary. Experience in setting up at least one web server/application or blog system preferred. Having a cause you work or identify with or at least something you care about will be very important. Case studies to include:

  • The use of SMS message forwarding and multimedia attachments to share the Philippines version of the Nixon tapes
  • Streaming live video from Mt. Everest and the Great Wall of China (while hiding from the police)
  • Secure, Anonymous, Private Mobile Phones via open-source Cryptophone software and Google Android
  • Reporting in Crisis: Kenya, Congo and Gaza eyewitness acount tracking via SMS and Smartphones
  • Election Protection: making sure your vote counts – activism for the common citizen
  • Crowd Control: Organizing and directing mass mobilizations through Twitter and SMS
  • Virtual Telephony: Asterisk, Google Voice, Skype and more, and why making phone numbers virtual and disposalable matters
  • From Tsunami’s to Twitter: did you know the first micro-blogging via SMS that mattered happened in the aftermath of the 2005 tsunami?