Skip to main content

Privacy and Social Movements

  • Conference paper
  • First Online:
Internet Science (INSCI 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11551))

Included in the following conference series:

  • 2871 Accesses

Abstract

Privacy is an often controversial, misunderstood, and underestimated concept, including on purpose by actors like governments or the Silicon Valley giants of Google, Apple, Facebook, and Amazon (GAFA). Unfortunately, due to today’s technologies, the potential for intrusions into personal privacy have increased exponentially. Even though there are different laws that protect privacy (i.e. GDPR) what is considered to be private by individuals and what is legally protected as private can differ. Different apps have different privacy policies, which leads to the protection of usually limited types of information, but not others. This situation is dangerous for social movements. Hackers and academics have been developing tools like Tor and Signal to encrypt our messages, and protect the right to privacy and anonymity. However, so much more needs to be done, both from a technical perspective, and through advocacy. Individuals, NGOs, activists: Everyone is a potential target of surveillance. In this paper we discuss the impact of privacy violations on social movements and the tools for encrypted messaging currently used by social movements. We show that the misunderstandings around privacy by users and the causes that prevent the developing of better tools for social movements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.theguardian.com/news/series/cambridge-analytica-files.

  2. 2.

    https://www.bbc.com/news/world-middle-east-40276568.

  3. 3.

    https://ssd.eff.org/en/module/problem-mobile-phones.

  4. 4.

    https://signal.org/blog/private-contact-discovery/.

  5. 5.

    https://www.wired.com/2016/12/encryption-app-signal-fights-censorship-clever-workaround/.

  6. 6.

    http://www.passwordresearch.com/stats/statistic409.html.

References

  1. McDermott, M.: State surveillance of black social movements lives on in 2017. Telesur (2017)

    Google Scholar 

  2. Joseph, G., Hussain, M.: FBI tracked an activist involved with black lives matter as they travelled across the U.S., documents show. The intercept (2018)

    Google Scholar 

  3. Leistert, O.: Resistance against cyber-surveillance within social movements and how surveillance adapts. Surveill. Soc. 9(4), 441 (2012)

    Article  Google Scholar 

  4. Mayer, J., Mutchler, P., Mitchell, J.C.: Evaluating the privacy properties of telephone metadata. Proc. Nat. Acad. Sci. 113(20), 5536–5541 (2016)

    Article  Google Scholar 

  5. Risen, J., Poitras, L.: N.S.A. gathers data on social connections of U.S. citizens. The Guardian (2013)

    Google Scholar 

  6. Johansen, C., Mujaj, A., Arshad, H., Noll, J.: The Snowden phone: a comparative survey of secure instant messaging mobile applications (authors’ version). arXiv preprint arXiv:1807.07952 (2018)

  7. Sayadi, E.: Would your internet activity put you at risk of going to jail in Egypt? Accessnow (2018)

    Google Scholar 

  8. Halpin, H., Ermoshina, K., Musiani, F.: Co-ordinating developers and high-risk users of privacy-enhanced secure messaging protocols. In: Cremers, C., Lehmann, A. (eds.) SSR 2018. LNCS, vol. 11322, pp. 56–75. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-04762-7_4

    Chapter  Google Scholar 

  9. Abu-Salma, R., Sasse, M.A., Bonneau, J., Danilova, A., Naiakshina, A., Smith, M.: Obstacles to the adoption of secure communication tools. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 137–153. IEEE (2017)

    Google Scholar 

  10. Wyke, T.: Is science becoming too hard even for scientists? Experts worry academic papers are now so unintelligible that no one can read them. MailOnline (2015)

    Google Scholar 

  11. Schröder, S., Huber, M., Wind, D., Rottermanner, C.: When signal hits the fan: on the usability and security of state-of-the-art secure mobile messaging. In: European Workshop on Usable Security. IEEE (2016)

    Google Scholar 

  12. Syverson, P., Dingledine, R., Mathewson, N.: Tor: the second generation onion router. In: Usenix Security (2004)

    Google Scholar 

Download references

Acknowledgments

We would like to thank the reviewers for their helpful comments and suggestions, and to Moxie Marlinspike for clarifying the situation with regards to Wire and phone number collection. The author is funded in part by the European Commission H2020 NEXTLEAP Project (Grant No. 6882).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Iness Ben Guirat .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ben Guirat, I. (2019). Privacy and Social Movements. In: Bodrunova, S., et al. Internet Science. INSCI 2018. Lecture Notes in Computer Science(), vol 11551. Springer, Cham. https://doi.org/10.1007/978-3-030-17705-8_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-17705-8_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-17704-1

  • Online ISBN: 978-3-030-17705-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics