Egyptian Uprising - a 'social media revolution'?

Arab Spring: Civil Unrest Across North Africa

The 'Arab Spring'  pro-democracy uprisings and  their outcomes varied wildly, yet they had one defining characteristic in common: social media.

On 25 January 2011 hundreds of thousands of protesters started to gather in Tahrir Square and planted the seeds of unrest which, days later, finally unseated the incumbent president, Hosni Mubarak, after 30 years of power.

Almost a year after Tunisia had erupted in mass demonstrations, the central Cairo protests triggered further waves of change across the Middle East and North Africa, in what became known as the Arab Spring.

But while the nature of each pro-democracy uprising, and their ultimate success, varied wildly from country to country, they had one defining characteristic in common: social media.

At times during 2011, the term Arab Spring became interchangeable with “Twitter uprising” or “Facebook revolution”, as global media tried to make sense of what was going on.

But despite western media’s love affair with the idea, the uprisings didn’t happen because of social media. Instead, the platforms provided opportunities for organisation and protest that traditional methods couldn’t.
In the words of one protester, Fawaz Rashed: “We use Facebook to schedule the protests, Twitter to coordinate, and YouTube to tell the world.”

Nowhere was this clearer than in Egypt, where social media was well embedded in the culture of the country’s overwhelmingly young population – 60% under the age of 30.

Their online revolutionary spirit was infectious for those watching from afar. According to the Project on Information Technology and Political Islam the number of tweets posted about Egypt – many using #Jan25 in homage – jumped from 2,300 to 230,000 per day the week before Mubarak stepped down on the 11 February. Foreign Policy magazine declared the Egyptian revolution the Twitter “news moment” of the year.

But feelings of revolutionary success were short lived as Mubarak’s government was replaced by the equally repressive Muslim Brotherhood, before he was ousted by a military coup in July 2013. Eventually, the party was replaced by Abdel Fattah al-Sisi, under whom state repression, intimidation and attacks on press freedom has gone from bad to worse.

A conflicted tool

The same tool that united people to topple dictators eventually tore things  apart - Wael Ghonmin

Wael Ghonmin is one of those credited with kickstarting the Egyptian revolution with a “simple, anonymous” Facebook page: We are all Khaled Said, set up in homage to a 29-year-old man who had been tortured to death by the police.

It gathered 100,000 followers in three days and quickly became the most followed page in the Arab world.

But then “the euphoria faded, we failed to build consensus and the political struggle led to intense polarisation,” said Ghonmin at a recent Ted talk. Social media quickly became a battlefield of misinformation, rumours and trolls – “the same tool that united us to topple dictators eventually tore us apart,” he said.

Guardian: http://bit.ly/1QSuTSO

« The Tech Revolution Will Change Or Even Erase Your Job
Cyber and Reality Domains Converge As The US Targets ISIS Hackers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CyberDefenses

CyberDefenses

CyberDefenses services combine best-in-class cybersecurity oversight, managed services and training to help our clients truly address their cybersecurity challenges.

a1qa

a1qa

a1qa specializes in the delivery of full-cycle software QA and application testing services.

HUB International

HUB International

HUB is one of the largest insurance brokers in the world. HUB Risk Services provides the full range of expert consulting to identify risks, reduce exposure to loss and manage claims issues.

United Security Providers

United Security Providers

United Security Providers is a leading specialist in information security, protecting IT infrastructures and applications for companies with high demands on security.

Wipe-Global

Wipe-Global

Wipe-Global is specialized in data erasure with an international established service partner network.

National CyberWatch Center

National CyberWatch Center

National CyberWatch Center is a cybersecurity consortium working to advance cybersecurity education and strengthen the national workforce.

Iowa Cyber Hub

Iowa Cyber Hub

Iowa Cyber Hub is a cybersecurity education partnership between Iowa State University and Des Moines Area Community College.

Parameter Security

Parameter Security

Parameter Security is a provider of ethical hacking and information security services.

Omnipotech

Omnipotech

Omnipotech is a complete managed service provider. From desktop to datacenter, all the technology support you need, under one umbrella.

Shevirah

Shevirah

Shevirah specializes in products for automated mobile and IoT device vulnerability assessment, penetration testing, and mobile security awareness training.

ISTC Foundation

ISTC Foundation

ISTC Foundation is one of the leading innovation centers in Armenia, founded by joint initiative of IBM, USAID, Armenian Government and Enterprise Incubator Foundation.

Control System Cyber Security Association International (CS2AI)

Control System Cyber Security Association International (CS2AI)

CS2AI is the premier global not for profit workforce development organization supporting professionals of all levels charged with securing control systems.

Speedinvest

Speedinvest

Speedinvest is one of Europe’s most active early-stage investors with a focus on Deep Tech, Fintech, Industrial Tech, Network Effects, and Digital Health.

DEFENTEK - National Security Informatics

DEFENTEK - National Security Informatics

Defentek (aka National Security Informatics) is a technology consortium covering a broad spectrum of intelligence computing solutions and interception technologies.

Allentis

Allentis

Allentis provide adapted solutions to ensure the security and performance of your information system.

Orpheus Cyber

Orpheus Cyber

Orpheus Cyber provides predictive and actionable intelligence to our clients - enabling them to anticipate, prepare for and respond to the cyber threats they face.