Commentary
Find our newspaper columns, blogs, and other commentary pieces in this section. Our research focuses on Advanced Biology, High-Tech Geopolitics, Strategic Studies, Indo-Pacific Studies & Economic Policy
Empowerment and Fragility
Zeynep Tufecki’s book, Twitter and Tear Gas, is an insightful analysis of the impact of social media on protests and social movements in today’s radically networked societies.
Zeynep Tufecki’s book, Twitter and Tear Gas, is an insightful analysis of the impact of social media on protests and social movements in today’s radically networked societies.
Most of the commentary about the role of social media in creating political communities either glorifies these media platforms (think Arab Spring) or vilifies them for their propensity to spread fake news and to create echo chambers (think Trump’s election campaign). Zeynep Tufecki’s book, Twitter and Tear Gas, however, provides a much-needed nuanced analysis on how digital platforms have altered the way in which a social movement’s dynamics play out. With the aim of understanding the challenges and strengths of digital activism, Tufecki tells a fascinating story of how social media empowers protests while simultaneously also exacerbating the fragilities of these movements.It is well known by now that the primary strength of networked public protests is the speed with which a large number of people and resources can be mobilised. This is because social media makes it easy to find people who share your political viewpoints even across geographical boundaries. What is not obvious, however, is that the speed and ease of participation also become a weakness of the networked movements. This is because ad hoc planning doesn’t allow for building capacities among protesters, which is needed to sustain a movement in the long-term. Often this results in the networked movements facing a tactical freeze in the face of changing circumstances.Read more here>
C is for Cyber
The book Listening In by Prof Susan Landau studies the clash between the individual’s need for privacy and the law enforcement agencies’ need for access to information. It traces the evolution of cyber security and is a must read for aspiring cyber security professionals and those interested in privacy debates and cyber wars.
Susan Landau’s Listening In is an encyclopedia of cyber security, but misses out on the opportunity to set the stage for policy dialogue.
After the San Bernadino terrorist shootings of 2015, the FBI recovered an iPhone belonging to one of the attackers. FBI and Apple Inc came to loggerheads when Apple declined the FBI’s request to create software that would unlock the security protection on the iPhone. FBI wanted “exceptional access” to be built into the encryption systems on Apple’s iPhone, using the pretext of national security. However, Apple argued that in an age of cyber attacks, weakening of security should be the last thing to do, even if that means that the data of terrorists and criminals remain hidden from law enforcement. The basis of Apple’s argument was that security loopholes would be eventually found and exploited by hackers, presumably causing more harm to national security.Using the above case as the background for her book Listening In Cyber Security in an Insecure Age, Susan Landau, a cryptography and cybersecurity expert, studies the clash between the individual’s need for privacy and the law enforcement agencies’ need for access to information. Landau unequivocally bats for not weakening security standards, even if that makes government investigations difficult. She sets the stage for her argument for stronger encryption standards by narrating one example after another of cyber espionage, exploits and attacks, and how these have been getting more sophisticated over time. She traces the first cyber espionage to 1986. With the involvement of the CIA, KGB, and a student in Germany hacking into systems at an energy research lab at Berkeley, this story makes for a fascinating read.Read more here>