Technology Use and Cybersecurity in Activism and Elections
Alexandru G. Bardas
Department of Electrical Engineering & Computer Science and ITTC, University of Kansas alexbardas@ku.edu
al.
Timeline of the Sudanese 2018-2019 Revolution
Research Questions
Methodology
Threat Landscape
Security Goals
Plausible deniability during protests and Security from Physical security Security during the blockade and the upon arrest electronic surveillance internet blackout
Defensive Practices
Use app or feature of app/phone to hide data:
- App to hide other apps
- Huawei private space
- WhatsApp archive feature
- iPhone screentime
Plausible deniability
during protests and “There was this app, but it was really working for Apple,
upon arrest basically, and then you have to open it, it’s like a calculator, iPhones, more than Android, where you can hide your apps you have to punch in a specific number for it to open the app”
“the first fingerprint would sign me into my account or my
Sanitization of phone regular phone space. The other fingerprint. I don’t even know and online activity what to say. It’s just an empty space,just like if I bought the phone right now”
Disguise and “Then for the ones that I cannot delete because I need them in concealment of data the future, I just archive the contacts” and identity
Practices:
Defensive Practices - Use app or features of app/phone to hide data
- Using coded communication
- Obscuring internet traffic through VPN use and proxies
- Use app in browser
- Access app through emulator
- Anonymization of online identity
- Need to know information sharing
“We all agreed on those phrases, when we say X we mean this and
Security from when we say Y we mean that. So these people develop codesfor
electronic surveillance communication where they say something explicitly but it would implicitly have another meaning”
“I have seen kind of --advice that you should change your
Facebook name.I myself did that. I changed my Facebook to
something very weird so that I cannot be tracked”
Security of online communications
Political influence:
Preventing online -- International sanctions prevent the use of local numbers for authenticationGovernment control over telecommunication infrastructure misinformation - Foreign governments’ ties to Sudanese government
Societal influence: Diaspora enabled 2FA using foreign number
e.g., advice from an Eastern European activist group (Signal app)
Defensive Practices
- Fact checking through manual heuristics
- Establishing trusted sources
“There are things on Twitter --you will find a small number of followers, the account handle itself will be a lot of jargon--
Security from letters, numbers. So right off you will sense they’re not real electronic surveillance accounts. Then, checking the very first 5-6 tweets, you will see a pattern of supporting the governmentin the context of the
revolution, so you would know, most of the information coming
from these accounts won’t be true”
Security of online “Most of our communication was through meetings, like in communicationsperson meetings, it wasn’t through social media”
Preventing online
misinformation Societal influence: diaspora enabled online content
moderation to prevent misinformation
Defensive Practices
- Camouflaging
- Protests’ Practices (before, after and during)
“it depends on the area that you’re protesting somewhere, some people are really on to it, towards surveying the areawe’re going to go to protest at, and knowing the exitsand the streets and
whereabouts, and whatever they can use as a route of escape if
Physical Security something happens”
“the main thing we tell them is don’t go out aloneon your first time, like you have to have someone with you who has
experienceor has gone through this a couple times so they can tell you what to do when you’re there and how to avoid things,
Security from arrests, how to know when to run, when is it time to leave and all that”
device confiscation and physical targeting “Wearing special colors,hiding inside the mass,or… there were
some techniques for those who are documenting”
Practices:
- Mesh networking / P2P Chat Apps
Defensive Practices - Use of foreign SIM cards on roaming
- Internet access through a certain provider
- Text messages and phone calls
- VPN use for availability
- Pamphlets and graffitti
“Yeah, some of them used roaming, on SIM cards that they have
Security during the from different countries’ there was no other way that you could get internet”phone numbers. But other than that, blockade and the internet blackout “one of the providers had one of its services working which is like Sudani DSL”
“And at other times we had to use VPNsbecause the telecommunication ministry, again, blocked social media. So we
Ensuring the needed to bypass that” availability and security of communications Non-adoption factors:
- Usability and functionality issues
- Lack of mass adoption crippled individual use
Activism and Technology
- Tensions in needs of different user groups
- Using a specialized communication app vs a common one
- When studying user practices, consider the geopolitical context...
- Right to privacy
○ Power held by authorities
○ Government control over telecommunications infrastructure and companies
○ History of censorship or blackout ○ International politics and sanctions
- ….and about characteristics of the users….
- Baseline digital literacy
○ Knowledge sharing and trust
○ Common security knowledge
More Information:
Defensive Technology Use During the 2018-2019 Sudanese Revolution.
In IEEE Security and Privacy Magazine (Special Issue), April/May 2022
Defensive Technology Use by Political Activists During the Sudanese Revolution. In IEEE Symposium on Security and Privacy (S&P) -- Oakland, May 2021.
Alaa Daffalla1 Lucy Simko2 Tadayoshi Kohno2 Alexandru G. Bardas1
- Department of Electrical Engineering & Computer Science and ITTC, University of Kansas
{a.daffalla, alexbardas}@ku.edu
- Paul G. Allen School of Computer Science & Engineering, University of Washington {simkol, yoshi}@cs.washington.edu
Note: Some of the slides used this presentation were also used as part of the IEEE S&P 2021 presentation
A Major Objective of Modern Political Activism
Free and Fair Elections are the Foundation of Every Healthy
Democracy
United States Mission at OSCE
Afghanistan is among the most challenging environments in the world [in which] to hold elections. It is a nascent democracy with
an ongoing violent insurgency, an unverifiable number of eligible
voters, many of whom are illiterate, and a country spread over harsh terrain. Corruption is pervasive, rule of law is tenuous
where it has any hold at all, and impunity for election-related violence and fraud is the norm.
United States Agency for International Development (USAID)
Some Terms
- Poling Center: A building where voting takes place.
- Polling Station: Booths in the polling center where voters cast their votes.
- Tazkera: National Identification Document in Afghanistan
- Voter List: A detailed record of every person who is registered in a particular polling center and eligible to vote.
All in All, How Do We Build Trust? ● Tensions in needs of different user groups
○ Using a specialized communication app vs a common one ● When studying user practices, consider the geopolitical context...
○ Right to privacy
○ Power held by authorities
● ….and about characteristics of the users….
○ Baseline digital literacy
○ Knowledge sharing and trust
○ Common security knowledge
26