|
> > |
META TOPICPARENT | name="SecondEssay" |
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.
Privacy and Protest in the Digital Age
-- By EdenEsemuede - 29 Nov 2023
Introduction
Increased prominence and access to the internet mean that higher percentages of people are engaged in political protest. 1 The internet is a powerful tool for protest coordination, especially in the United States. In theory, it makes sense to coordinate protests through the Internet. The increased access to people outside of your social circles provided by a website or public Twitter account means that many like-minded people can coalesce around a cause, overcoming physical barriers. However, these very same coordinating devices are, and in the near future will be used to incriminate people just trying to exercise their constitutional rights.
With that in mind, I find it pertinent to discuss a history of protest- how getting people together worked before we had the internet to do it for us. Then, I will discuss how modern conventions, such as the internet and a cellphone, are used for tracking purposes. Finally, I will discuss the legality of these practices.
Body
Protest Then
To start with a historical discussion, the process of gaining sympathy for a cause and protest was very different in the 60s than it is now. Back then, getting nationwide attention for a cause or an idea started with traditional news media. Images of Jim Crow-related deaths and newspaper headlines about harmful policies shaped the public consciousness. When it came to getting people involved in a protest, Community leaders (Religious organizations, Grassroots activists, etc) would implore people in their circle to get up and get involved by posting flyers, fostering discussion during meetings, and getting official headcounts before the event. Their support was highly dependent on messaging, phrasing, and intersecting goals. It was critical that leaders of a protest like the March on Washington agree on shared goals because each faction’s financial support could mean the difference between an entire sector of people on the ground, or counter-protesting.
Protest Now
In the modern age, protest organization works differently. An organizer for a small protest may post in a group chat of like-minded individuals. Larger protests may start with an Instagram page or website. However, the IP addresses of people who access sites like these can be found and potentially turned over to local and federal law enforcement. Evidence on how unsafe this information is is mixed. In 2017, the Department of Justice served a website with a search warrant, asking for the IP address of disruptj20.org visitors after protesting Trump’s inauguration. Similarly, the Customs and Border Protection ordered Twitter to hand over the phone number, mailing, and IP addresses associated with Trump dissenters @ALT_USCIS, which was only dropped after a lawsuit from Twitter. (Guardian) However, that leaves organizers at the mercy of the platform. With this in mind, organizers might want to consider different ways of getting information out to potential protest partners.
Concerns for the average, non-organizing protestor are different from that of organizers. Utica Police Department spokesman Lt. Bryan Coromato says that while social media makes it easy for police officers to see what will happen at a peaceful protest, the department isn’t “sitting around with certain people's names or certain group's names and observing their posts or their profiles on whatever social media sites just to see what they're doing.” (Govtech). However, they certainly have the capability considering their contracts with companies like Cellbrite, who can download all information stored in a phone, alongside contracts with companies like Gofeedia and Media Sonar, who extract private information from Twitter, Facebook, and Instagram. (Cityrecord, nysfocus).
Law
As expected, the legality of these actions is always in question. Adjudication around police in the protest sphere tends to focus on what they can access once someone is in custody. One can combat this by putting a 6+ digit passcode on your phone before you go to a protest, so police can’t force you to unlock it immediately, and wearing a mask with reflective sunglasses to avoid facial recognition software. While rules against self-incrimination exist for simply accessing the phone from your end, police seemingly have endless power to get search warrants for the information posted over the internet, whether from a website or from a ””””””private”””” Facebook messenger chat. (Koebler, Vice). Time and time again, the broad wish to survey protestor actions has passed the loose requirements of probable cause, and until new legislation passes to limit it, these searches will only get more invasive.
Conclusion
With this in mind, it might be tempting to suggest that we go back to the protesting methods of old. After all, if the March on Washington managed to get 250,000 people together without a single Instagram post, it could potentially happen again. However, the internet is only so dangerous for privacy because police officers recognize it as an otherwise unstoppable force for bringing people together, so one should incorporate it at a level that maximizes both visibility and safety. Protestors should plan as little of their activity as possible in unencrypted forums. While a website may serve as a good digital flyer, more specific aspects of protests, such as planned speakers, planned attendees, series of events, and public disruption should always be kept private. Until the law changes, this will have to be a protest organizer’s new norm.
Sources
MAIN ARTICLE: https://www.theguardian.com/world/2017/aug/14/donald-trump-inauguration-protest-website-search-warrant-dreamhost
https://www.crmvet.org/tim/tim63b.htm#1963mow (march on WA)
https://web.archive.org/web/20170110224042/http://www.disruptj20.org/
https://www.theguardian.com/world/2017/aug/14/donald-trump-inauguration-protest-website-search-warrant-dreamhost
https://www.theverge.com/21276979/phone-protest-demonstration-activism-digital-how-to-security-privacy
https://www.theverge.com/2017/9/12/16298192/apple-iphone-face-id-legal-security-fifth-amendment
https://www.acludc.org/en/how-defend-against-police-surveillance-protests
https://www.govtech.com/gov-experience/how-social-media-has-changed-the-way-political-movements-organize.html
https://a856-cityrecord.nyc.gov/RequestDetail/20230309019 (nyc cityrecord)
https://nysfocus.com/2023/01/13/state-police-social-media-surveillance-including-dataminr-shadowdragon-geofeedia (nysfocus)
https://www.vice.com/en/article/n7zevd/this-is-the-data-facebook-gave-police-to-prosecute-a-teenager-for-abortion
You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable.
To restrict access to your paper simply delete the "#" character on the next two lines:
Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list. |
|