To aid nonviolent struggle, cheap, durable and reliable copiers could be designed for use in poor countries. In the case of countries under repressive rule, such copiers could be smuggled into the country in various ways, by tourists or through commercial trade. Copiers could be developed that can be operated even without mains electricity. This might be through batteries or through an optional muscle-powered system.
Some governments and companies, concerned about the leaking of vital documents, have sought the development and introduction of photocopiers that leave some mark on each copied page indicating its source. Generally speaking, such technology is far more useful to an aggressor than to the nonviolent resistance.
Telephone and fax
The telephone is, in many respects, an ideal communication medium for nonviolent struggle. It cannot be used by a single person to send messages to a large number of passive recipients, but rather it is most suited for conversations between two people. True, it’s possible to have conference calls, but these become unwieldly with more than a handful of people.
Since telephone is so useful for communication in a nonviolent struggle, the general aim should be to keep the system going. Aggressors are unlikely to shut down an entire telephone system because society depends on it so much — including the aggressors. There are some important vulnerabilities in telephone systems that deserve attention.
First, it is possible to cut off certain phones, either an individual phone or all those in a whole building or suburb. Aggressors might want to cut off telephones used by the resistance, and the resistance might want to cut off telephones used by the aggressors. In most cases, it would not be so difficult to get around this problem: people can find other phones. Furthermore, with mobile phones the lines become less important. Generally, resisters seek to keep open lines of communication, including communication with the aggressor, so it is not desirable to cut off telephones. It would be important to keep in contact with technicians to encourage them to oppose attempts to shut down phones.
Second, and more important, is the possibility of telephone surveillance.[16] This is quite easy to do, especially with new electronic switching systems. Surveillance of conversations, however it is done, is labour-intensive: someone has to listen to the conversations long enough to make sense of them. This applies even when there are computer systems with voice recognition that are programmed to keep track of conversations only when certain key words are mentioned. Furthermore, the system can be easily foiled if people know the key words and agree not to use them — or to use them all the time! — in their conversations.
If there are only a few resisters, surveillance can be used to keep track of them. If, on the other hand, large numbers of people join the resistance, mass surveillance becomes impossible.
Surveillance becomes even less useful if the resistance operates without secrecy, as many nonviolent activists recommend. If rallies and civil disobedience actions are announced to the authorities beforehand, surveillance is rather pointless.
Nevertheless, telephone surveillance, even when it is quite infrequent and gains little useful information, is very important psychologically. Many people are frightened enough to reduce their activism. Therefore, antisurveillance measures are important. Cordless and cellular phones should be avoided, since their transmissions can easily be picked up by radio scanners, as some public figures have discovered to their embarrassment.[17] One easy method is to use other telephones, especially public telephones. Another is to use the “call forward” mechanism on some phones, to bounce a call to a different phone and thus hide the location or identity of the caller.
As well as such practical on-the-spot techniques, there are a number of technological approaches worthy of investigation. Secure methods of putting telephone messages into code — encryption — would make surveillance more difficult. Telephone systems could be designed so that taps are impossible without alerting the callers. They might also be designed so that, in an emergency, no single person could cut off phones. (In ordinary times, technicians often need to cut off phones for quite legitimate purposes.)