Democracy’s Digital Defenses
New tools, many developed by the private sector, have the potential to thwart surveillance and disinformation by authoritarian governments
In early 2021, the audio-only social media app Clubhouse allowed users in mainland China to enter chat rooms and talk freely to the world—including American journalists and people in Hong Kong and Taiwan, areas usually off-limits to Chinese citizens. For a brief period, users of the app had an uncensored glimpse of the internet beyond the Great Firewall.
But Beijing moved quickly to crush the tiny, iPhone-based revolt, and Clubhouse chat rooms were banned on Feb. 8. A Stanford research team later found that a Shanghai-based startup called Agora had access to Clubhouse users’ audio files and metadata, potentially giving the Chinese Communist Party direct access to their conversations.
Democracies are discovering they can fight fire with fire, using their own digital tools to defend freedom and undermine autocracy.
Technologies aimed at surveilling populations, suppressing dissent and spreading propaganda have long been used by authoritarian governments. But in recent years, democracies are discovering they can fight fire with fire, using their own digital tools to defend freedom and undermine autocracy. New tools, many of them developed by the commercial sector as privacy safeguards, are increasingly being repurposed as democracy’s digital defenses.
During demonstrations in 2019, protesters in Hong Kong relied on the Reddit-like website LIHKG to communicate with fellow dissidents. They used the crowdsourced web-mapping service HKmap.live to avoid police and the dating app Tinder to recruit new pro-democracy activists. Dissidents have even used the augmented reality game Pokémon Go to provide cover for unauthorized gatherings. Russian opposition members have developed a “protest navigator” on Telegram, an encrypted messaging app, as well as bots that identify police locations during marches.
When governments block websites and apps or try to surveil and disrupt internet communications, demonstrators can connect via services like Bridgefy, which employs Bluetooth and mesh networks to link devices without using the internet. These peer-to-peer networks work even if a government slows down internet traffic, as Russia appears to have done amid January’s anti-Kremlin agitation, or shutters online access entirely, as Iran tried to do during unrest in 2019.
Another new class of technologies can be employed to undermine the ability of dictators to sow confusion. In the early days of the Covid-19 pandemic, Chinese operatives barraged Twitter and sent misleading texts about nationwide lockdowns directly to Americans’ phones, hoping to incite a national panic. To combat similar schemes, researchers at Indiana University developed Botometer, a tool that distinguishes social media bots from human-created content. It was used to identify and remove thousands of automated Twitter accounts spewing misinformation ahead of the 2018 midterm elections and helped to flag Covid-related misinformation in 2020.
Several programs have been developed to detect deep fake videos and other digital forgeries, including Truepic, a San Diego-based photo and video verification service, and Jigsaw’s “Assembler” technology, which helps journalists spot altered images by combining multiple image manipulation detection models. If an authoritarian government produces video forgeries designed to spread confusion—for instance, showing election officials announcing the wrong election date, or a political leader insulting key constituencies—these tools will form a first line of defense…
This article was written by
and You can read the full article there.