|By Bob Gourley||
|January 2, 2013 10:57 PM EST||
On Twitter, Mike Olson of Cloudera asked me and Alex Olesker what we thought about the use of social media in the latest dustup between Israel and Hamas in Gaza. He linked me to an article taking a broader look at the role of social media in terrorism and extremism. The following is some thoughts on how to think about the relationship of social media to social movements, extremist and benign. Tech audiences with a practical interest in tech and social movements can benefit from considering some theoretical perspectives not usually seen in most tech conversations.
2013 will likely see much more attention on information technology and social movements. In 2011, the Arab Spring and Occupy Wall Street spurred debate about the tactical applications of social media, not all of it productive. On one hand, there was a “gee whiz” tone to much of the coverage that ignored other important dynamics. In October, Thomas Frank wrote a biting article about how journalists and academics, infatuated with the idea that OWS represented a radically new (and superior) form of social movement, ignored the substantial and sometimes self-imposed barriers to its success. The same can probably be said of coverage of the Arab Spring, much of it based on a simplistic image of kids with MacBooks and iPhones toppling autocrats. On the other hand, Malcolm Gladwell and others denied the very real differences between social movements 1.0 and 2.0. Particularly useless was Gladwell’s presumption that analog-era activism was somehow more authentic and powerful than IT-mediated activism. So where to go from here?
First, social media can’t be analyzed with the presumption that social media is somehow separate from the overall web of social conflict. Rather, we should move forward with the assumption that we have one reality, composed of both organic and technological layers. Cyberspace is a sociotechnical system, which as CTOVision contributor Sean Lawson explains can be understood as follows:
[Sociotechnical systems] are large, complex systems in which the lines between the social and the technological, the human and the machine are increasingly blurry. As the passage implies, even something as seemingly simple as an airplane flying in the sky is actually just one part of a large sociotechnical system composed of various human and machine elements, from the pilot and airplane to a series of airports, communication and navigation systems, bureaucracies, regulations, rules and norms of flight, and more.
With the Arab Spring “twitter revolutions” we can see that human and machine elements and organizations all meaningfully combined to produce powerful and fundamentally emergent movements. Social media may not have been a primary cause but it also very much defined the realm of possibility for social action. Technology isn’t neutral, and certain technologies are more conducive to decentralized movements. Information age social networks have reduced transaction costs in a way earlier communications have not. There’s also a collaborative aspect that Alexis Madrigal covered in his post about the “APIs” of Occupy Wall Street.
The composition of sociotechnical systems also constantly shifts due to shifts in norms, regulations, rules, technological shifts, and bureaucratic hierarchies. Cyberspace may have some essential characteristics rooted in its function as a zone of machine-mediated communication, but it is also a designed environment with a constantly shifting landscape. Politics and networks of social capital are a part of that landscape, and this certainly includes extremist groups.
We can understand jihadi social media usage as being part of an overall assemblage of techniques, key personnel, and resources that constitutes a complex structure that can be tapped on by insurgents looking to advance their instrumental ends and communicate and discourse with an extended community of ideological fellow travelers. Israeli researcher Dima Adamsky argued in 2009 that, lacking the war colleges, doctrinal institutions, or military service journals of the West, jihadis debate theories of strategy evolve on web forums and zines. It’s still unclear how social media precisely fits into the radicalization process, despite the tendency of Western police departments to equate possession of jihadi media with radical intent. We’re on more solid ground in terms of tactical planning when we look at non-jihadi international social movements’ usage of twitter as a medium for directing protests and outsmarting police crowd control methods. Finally, there’s always the use of social media as a rapid-fire propaganda weapon that can influence external audiences and regulate and stimulate domestic audiences.
Police researcher John P. Sullivan has also written about how Mexican drug cartels have used social media to spread “narcocultura” in Mexican public life. When combined with coercive actions, narco-glorifying folk songs, provision of services, and murals, social media becomes a powerful means of making the violent image of the Mexican drug cartels part of everyday life. Jihadi groups have arguably not attained a similar level of cultural penetration, but Daveed Garteinstein-Ross and other counterterrorism experts have written about the ways in which jihadi culture–online and offline–can create a unique lifeworld for those who feel left out of secular culture.
Yet there’s a risk in looking at technology without the political and operational considerations. Terrorist organizations are clandestine in nature and practice tradecraft that limits their exposure to Western intelligence organizations. Thus assuming that covert networks function in the same way as social movements or Facebook friend groups is of limited utility. Taking down an extremist site is not equivalent to Second, there’s often a harmful tendency in tech analysis to place social media use as the dominant element of a social conflict. Reporters salivated over the IDF and Hamas Twitter-fighting each other and missed the centrality of actual combat to the outcome of the short Gaza conflict. At the end of the day, as Rear Admiral J.C. Wylie wrote, the “man on the scene with the gun” decides the war, not the kid with the iPhone.
A balanced understanding of the ways social media is vehicle for and a shaper of contentious political movements will be a net benefit to CTOs, tech reporters, and technologically-minded national security analysts. Watch this space for more on this subject in the future.
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, will discuss the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docke...
Oct. 21, 2016 02:15 PM EDT Reads: 2,190
As ridesharing competitors and enhanced services increase, notable changes are occurring in the transportation model. Despite the cost-effective means and flexibility of ridesharing, both drivers and users will need to be aware of the connected environment and how it will impact the ridesharing experience. In his session at @ThingsExpo, Timothy Evavold, Executive Director Automotive at Covisint, will discuss key challenges and solutions to powering a ride sharing and/or multimodal model in the a...
Oct. 21, 2016 02:15 PM EDT Reads: 1,426
SYS-CON Events announced today that Embotics, the cloud automation company, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Embotics is the cloud automation company for IT organizations and service providers that need to improve provisioning or enable self-service capabilities. With a relentless focus on delivering a premier user experience and unmatched customer support, Embotics is the fas...
Oct. 21, 2016 02:00 PM EDT Reads: 612
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
Oct. 21, 2016 02:00 PM EDT Reads: 6,772
SYS-CON Events announced today that Coalfire will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Coalfire is the trusted leader in cybersecurity risk management and compliance services. Coalfire integrates advisory and technical assessments and recommendations to the corporate directors, executives, boards, and IT organizations for global brands and organizations in the technology, cloud, health...
Oct. 21, 2016 01:45 PM EDT Reads: 1,449
The IoT industry is now at a crossroads, between the fast-paced innovation of technologies and the pending mass adoption by global enterprises. The complexity of combining rapidly evolving technologies and the need to establish practices for market acceleration pose a strong challenge to global enterprises as well as IoT vendors. In his session at @ThingsExpo, Clark Smith, senior product manager for Numerex, will discuss how Numerex, as an experienced, established IoT provider, has embraced a ...
Oct. 21, 2016 01:00 PM EDT Reads: 902
Cloud based infrastructure deployment is becoming more and more appealing to customers, from Fortune 500 companies to SMEs due to its pay-as-you-go model. Enterprise storage vendors are able to reach out to these customers by integrating in cloud based deployments; this needs adaptability and interoperability of the products confirming to cloud standards such as OpenStack, CloudStack, or Azure. As compared to off the shelf commodity storage, enterprise storages by its reliability, high-availabil...
Oct. 21, 2016 01:00 PM EDT Reads: 918
SYS-CON Events announced today that MathFreeOn will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. MathFreeOn is Software as a Service (SaaS) used in Engineering and Math education. Write scripts and solve math problems online. MathFreeOn provides online courses for beginners or amateurs who have difficulties in writing scripts. In accordance with various mathematical topics, there are more tha...
Oct. 21, 2016 12:15 PM EDT Reads: 863
@ThingsExpo has been named the Top 5 Most Influential Internet of Things Brand by Onalytica in the ‘The Internet of Things Landscape 2015: Top 100 Individuals and Brands.' Onalytica analyzed Twitter conversations around the #IoT debate to uncover the most influential brands and individuals driving the conversation. Onalytica captured data from 56,224 users. The PageRank based methodology they use to extract influencers on a particular topic (tweets mentioning #InternetofThings or #IoT in this ...
Oct. 21, 2016 12:00 PM EDT Reads: 8,051
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
Oct. 21, 2016 10:50 AM EDT Reads: 223
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Oct. 21, 2016 10:45 AM EDT Reads: 1,640
SYS-CON Events announced today that Transparent Cloud Computing (T-Cloud) Consortium will exhibit at the 19th International Cloud Expo®, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The Transparent Cloud Computing Consortium (T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data proces...
Oct. 21, 2016 10:30 AM EDT Reads: 1,229
Donna Yasay, President of HomeGrid Forum, today discussed with a panel of technology peers how certification programs are at the forefront of interoperability, and the answer for vendors looking to keep up with today's growing industry for smart home innovation. "To ensure multi-vendor interoperability, accredited industry certification programs should be used for every product to provide credibility and quality assurance for retail and carrier based customers looking to add ever increasing num...
Oct. 21, 2016 09:15 AM EDT Reads: 273
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and ...
Oct. 21, 2016 08:45 AM EDT Reads: 1,373
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the...
Oct. 21, 2016 08:45 AM EDT Reads: 11,126
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to impr...
Oct. 21, 2016 08:00 AM EDT Reads: 5,584
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Oct. 21, 2016 07:45 AM EDT Reads: 3,735
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Oct. 21, 2016 07:15 AM EDT Reads: 1,284
Virgil consists of an open-source encryption library, which implements Cryptographic Message Syntax (CMS) and Elliptic Curve Integrated Encryption Scheme (ECIES) (including RSA schema), a Key Management API, and a cloud-based Key Management Service (Virgil Keys). The Virgil Keys Service consists of a public key service and a private key escrow service.
Oct. 21, 2016 07:15 AM EDT Reads: 884
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Oct. 21, 2016 06:45 AM EDT Reads: 1,796