It might seem that technology is largely irrelevant to face-to-face conversations, but this is not so. Modern technology has greatly increased the capacity for surveillance, for example by electronic listening devices.[20] Investigations are needed into convenient, low-cost ways of avoiding or foiling such surveillance.
Computer networks
Computer networks are a powerful means of communication most suitable for nonviolent struggle.[21] Such networks are interactive and cannot easily be dominated by a small number of users. Information on the network is transmitted by telephone lines and, indeed, computer networks are very similar to telephone systems. There are several major differences. First, computer networks deal mainly with text rather than voice. Second, it is much easier to save, copy and distribute text via computer networks than via phone. Third, the skills and investment required to become a skilled user of computer networks are much greater than to become a proficient user of the telephone.
The first two factors generally make computer networks a more powerful means of communication, from the point of view of nonviolent struggle, than the telephone. The third factor considerably reduces its value. As the price of computers declines and the software for hooking into networks becomes more user-friendly, computer networks will become more and more valuable as a people’s communication technology.
Computer networks — collectively called “cyberspace” — will undoubtedly play an increasing role in communication in crisis situations. They have been used to send alerts about human rights violations, to mobilise opposition to vested interests and to provide information to activists opposing repressive regimes. For example, computer networks have been used for communication by the peace movement in former Yugoslavia,[22] to resist the 1991 Soviet coup[23] and to organise publicity about persecution of minority groups in Iran.
Computer networks have several vulnerabilities, again similar to the telephone. If the telephone system is shut down, so is most computer communication. But this is not so likely because, like the telephone system, computer networks are used more and more for functions such as commercial transactions. Therefore, anyone who shut down the networks would risk alienating a large proportion of the population, including powerful organisations.
Another key problem with computer networks is surveillance, namely logging into particular accounts or intercepting particular electronic messages. The system administrator in charge of local networks has the capacity to monitor or cut off the accounts of individuals. Hackers are able to surreptitiously enter other people’s computer files or to read their messages.[24] There is also the less elegant method of tapping telephone lines and deciphering computer-generated data that is being transmitted.
System administrators are key individuals in computer networks. If they support the resistance, then the networks become a powerful tool for resistance. But system administrators could also serve the aggressor, whether as a result of sympathy, bribery or intimidation, for example by monitoring messages from certain individuals or by closing down their accounts. Therefore, it would be useful to design networks so that the power of system administrators is limited, either permanently or just in emergencies.
Another solution to the problem of surveillance is encryption of messages, namely putting them into code. There are various ways to do this, including some extremely powerful encryption techniques that also give a highly reliable way of verifying the sender’s identity: an electronic signature.
There was an enormous controversy over the US government’s promotion of a system of encryption designed by the National Security Agency (NSA), a multi-billion dollar spying enterprise focussing on electronic communication. The NSA’s proposed encryption system — commonly associated with one of its components, the Clipper Chip — relied on a system of coding that could be deciphered using information obtained from two specified organisations, given the permission of legal authorities. Some sceptics, though, did not trust the claims of the NSA, and believed that the agency designed the algorithm and Clipper Chip so that all messages could be read by the NSA.[25]
Generally speaking, secure communication is valuable to a nonviolent resistance, which therefore would be better served by unbreakable encryption. The most popular system outside the government is called Pretty Good Privacy or PGP.[26] It reportedly has been used by guerrillas in Burma and dissidents in Russia.