Egyptian Uprising - a 'social media revolution'?

Arab Spring: Civil Unrest Across North Africa

The 'Arab Spring'  pro-democracy uprisings and  their outcomes varied wildly, yet they had one defining characteristic in common: social media.

On 25 January 2011 hundreds of thousands of protesters started to gather in Tahrir Square and planted the seeds of unrest which, days later, finally unseated the incumbent president, Hosni Mubarak, after 30 years of power.

Almost a year after Tunisia had erupted in mass demonstrations, the central Cairo protests triggered further waves of change across the Middle East and North Africa, in what became known as the Arab Spring.

But while the nature of each pro-democracy uprising, and their ultimate success, varied wildly from country to country, they had one defining characteristic in common: social media.

At times during 2011, the term Arab Spring became interchangeable with “Twitter uprising” or “Facebook revolution”, as global media tried to make sense of what was going on.

But despite western media’s love affair with the idea, the uprisings didn’t happen because of social media. Instead, the platforms provided opportunities for organisation and protest that traditional methods couldn’t.
In the words of one protester, Fawaz Rashed: “We use Facebook to schedule the protests, Twitter to coordinate, and YouTube to tell the world.”

Nowhere was this clearer than in Egypt, where social media was well embedded in the culture of the country’s overwhelmingly young population – 60% under the age of 30.

Their online revolutionary spirit was infectious for those watching from afar. According to the Project on Information Technology and Political Islam the number of tweets posted about Egypt – many using #Jan25 in homage – jumped from 2,300 to 230,000 per day the week before Mubarak stepped down on the 11 February. Foreign Policy magazine declared the Egyptian revolution the Twitter “news moment” of the year.

But feelings of revolutionary success were short lived as Mubarak’s government was replaced by the equally repressive Muslim Brotherhood, before he was ousted by a military coup in July 2013. Eventually, the party was replaced by Abdel Fattah al-Sisi, under whom state repression, intimidation and attacks on press freedom has gone from bad to worse.

A conflicted tool

The same tool that united people to topple dictators eventually tore things  apart - Wael Ghonmin

Wael Ghonmin is one of those credited with kickstarting the Egyptian revolution with a “simple, anonymous” Facebook page: We are all Khaled Said, set up in homage to a 29-year-old man who had been tortured to death by the police.

It gathered 100,000 followers in three days and quickly became the most followed page in the Arab world.

But then “the euphoria faded, we failed to build consensus and the political struggle led to intense polarisation,” said Ghonmin at a recent Ted talk. Social media quickly became a battlefield of misinformation, rumours and trolls – “the same tool that united us to topple dictators eventually tore us apart,” he said.

Guardian: http://bit.ly/1QSuTSO

« The Tech Revolution Will Change Or Even Erase Your Job
Cyber and Reality Domains Converge As The US Targets ISIS Hackers »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Red Hat

Red Hat

Red Hat is a leader in open source software development. Our software security team proactively identifies weaknesses before they become problems.

softScheck

softScheck

softScheck is an IT security consultancy. Services range from pentesting and compliance testing to security auditing of software and IT infrastructure.

TeachPrivacy

TeachPrivacy

TeachPrivacy provides computer-based privacy and data security training that is engaging, memorable, and understandable.

StepStone

StepStone

StepStone is one of the leading online job platforms in Germany, and other countries, covering all industry sectors including IT and cybersecurity.

SPARTA Consortium

SPARTA Consortium

SPARTA tackles hard innovation challenges, leading the way in building transformative capabilities and forming a world-leading cybersecurity competence network across the EU.

CloudBolt Software

CloudBolt Software

CloudBolt provide solutions for your toughest cloud challenges. From automation, to cost and security, and hybrid IT governance — we have you covered.

Assure IT

Assure IT

Assure IT is a Singapore company specialising in technology governance, risk and compliance.

Gunnison Consulting Group

Gunnison Consulting Group

Gunnison Consulting Group serves the Federal Government with high quality IT consulting services.

1Touch.io

1Touch.io

1touch.io Inventa is an AI-based, sustainable data discovery and classification platform that provides automated, near real-time discovery, mapping, and cataloging of all sensitive data.

TuxCare

TuxCare

TuxCare make Linux more secure. We take care of Linux so that organizations can use Linux to support environments that require high levels of Cybersecurity, stability, and availability.

EdgeWatch

EdgeWatch

EdgeWatch is a platform that helps information accredited security practitioners discover, monitor, and analyze devices that are accessible from the Internet.

Threat Con

Threat Con

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences.

aFFirmFirst

aFFirmFirst

aFFirmFirst is a unique software solution offering a simple yet effective way for businesses to protect and control their online images and logo, as well as allowing one-click website verification.

Cybersecurity Elastic Laboratory (CEL)

Cybersecurity Elastic Laboratory (CEL)

CEL specialize in providing top-tier services in vulnerability diagnosis and penetration testing, offering a comprehensive suite of solutions to mitigate cyber risks.

Lumos

Lumos

Lumos, the Unified Access Platform to manage all access to apps and data.

QRC Assurance & Solutions

QRC Assurance & Solutions

QRC is a PCI QSA, QPA, ISO accredited, CPA and CERT-IN empanelled organization with vast experience in conducting certification, regulatory audits, pen testing services, training and more.