Telecommunications For Nonviol

скачати

Telecommunications For Nonviol Essay, Research Paper

Telecommunications for Nonviolent Struggle

Telecommunications can play a vital role in nonviolent resistance to

aggression or repression, as shown by numerous historical examples. Yet

there has been no systematic development of telecommunications research,

policy or training for this purpose.

We interviewed a number of experts in telecommunications to learn how these

technologies could be used in nonviolence struggle. We report our general

findings and list a series of recommendations for use and design of

telecommunications in nonviolent struggle. This pilot project reveals the

radical implications of orienting telecommunications for nonviolent rather

than violent struggle.

Examples

Communications are absolutely crucial to nonviolent struggle against

aggression and repression. The following cases illustrate some of the roles

of telecommunications.

* In April 1961, there was a military coup in Algeria, then a part of France,

by generals who opposed de Gaulle’s willingness to negotiate with Algerian

rebels. Popular opposition in France to the coup led de Gaulle to make a

media announcement calling for resistance. In Algeria, many pilots opposed

to the coup simply flew their aircraft out of the country. Many soldiers

hindered operations, for example by “misplacing” orders and communications;

others simply stayed in their barracks. The coup collapsed within four days

without a shot being fired against it (Roberts, 1975).

* In August 1968, Czechoslovakia was invaded by troops from the Soviet Union

and four other Warsaw Pact states. The reason was the liberalisation of

communist rule in Czechoslovakia, threatening ruling elites in Moscow. There

was no resistance to the invasion from Czechoslovak military forces, nor from

the West. But there was an amazing spontaneous nonviolent resistance

(Windsor and Roberts, 1969).

Many of the invading soldiers had been told that they were there to smash a

capitalist takeover. When told the truth by Czechoslovak people, many became

unreliable and were transferred out of the country within a few days. They

were replaced by troops from the Soviet far east who did not speak Russian.

This shows the crucial importance of knowing the language of the aggressor

troops.

The radio network was crucial to the resistance (Hutchinson, 1969). The

network permitted simultaneous broadcasting from the same frequency from

different locations. This meant that when Soviet troops tracked down and

closed one transmitter, another immediately took over. The radio announcers

announced strikes, recommended using nonviolent methods only, and provided

information about troop movements, impending arrests and licence numbers of

KGB cars. Jamming equipment being brought in by the Soviet military was

delayed by railway workers. The radio broadcasts made this the first

European invasion exposed to intense publicity.

In the circumstances, the resistance was remarkably effective in frustrating

the Soviet political aim of setting up a puppet government within a short

time. The active phase of the resistance lasted just a week, but it was not

until April 1969 that a puppet government was installed.

* Indonesian military forces invaded the former Portuguese colony of East

Timor in 1975. Their occupation led to the deaths of perhaps a third of the

population through killings and starvation. By cutting off communications to

the outside world, outrage over this repression was minimised. The

Australian government aided in this communications blockade by shutting down

a short-wave transmitter in the Northern Territory.

In November 1991, a massacre of nonviolent protesters in Dili, the capital of

East Timor, rekindled international concern over the Indonesian occupation.

This killing attracted attention because of the presence of foreign observers

and videotapes of the killings, illustrating the importance of communications

in generating opposition to repression.

* In Fiji in 1987 there were two military coups. Because Fiji has numerous

small islands, short-wave radios are a standard means of communication.

Therefore, it was impossible to cut off communication with the outside world.

Wide publicity about the coups led to international protest, bans by some

trade unions on goods shipments, and a dramatic decline in tourism, a major

export earner for Fiji (Martin, 1988).

* In 1989, Chinese troops massacred hundreds of pro-democracy protesters in

Beijing. In the aftermath, the Chinese government tried to cut off

telecommunications to other countries. But fax machines continued to

operate, providing information to outsiders and enabling informed overseas

protests. When the Chinese government publicised a telephone number for

reporting of “dissident elements,” this information was leaked overseas, and

people from around the world jammed the number by making continual calls,

preventing it from being used for its original purpose.

* The Soviet coup in August 1991 failed, in part, due to lack of control over

telecommunications. Yeltsin’s supporters got out their basic message -

refuse to cooperate with the coup leaders and defend the Russian parliament -

using radio, faxes, computer networks and leaflets.

These examples show the crucial importance of communications in nonviolent

resistance to aggression and repression. Killings of unarmed civilians can

generate enormous outrage, both in local populations and around the world.

By contrast, killings of guerrilla fighters gain relatively little attention

- violence against violence is seen as legitimate, even when the sides are

very unbalanced.

But killing or beating of civilians has to be publicised. If repression is

carried out in secret, there is little impact. Communications and publicity

are vital. Communication of accurate information is a key to the effective

work of Amnesty International.

Social defence

Social defence is nonviolent community resistance to aggression as an

alternative to military defence. Instead of having an army, a community

would oppose aggression using demonstrations, fasts, refusals to obey,

strikes, boycotts, sit-ins and other types of nonviolent action. This form

of defence also goes by the names nonviolent defence, civilian defence and

civilian-based defence.

At first glance, it seems implausible that social defence could possibly work

against a well-armed aggressor. As the above examples show, the use of only

nonviolent methods can be very effective in undermining the commitment of

soldiers. Most soldiers under military dictatorships and authoritarian

regimes are conscripts who don’t want to go to war. When they encounter an

“enemy” who doesn’t use violence, it becomes much more difficult for them to

use violence. The thing to remember is that armies can succeed only if

soldiers are willing to follow orders.

There is not enough space here to begin to discuss the arguments for and

against social defence. (Some good sources are Boserup and Mack, 1974;

Galtung, 1976; Roberts, 1967; Sharp, 1990). Suffice it to say that we

believe social defence is worthy of further investigation and testing. Our

project is part of that process.

The project

Schweik Action Wollongong is a small voluntary group of people who work on

projects relating to social defence. The group is named after Hasek’s

fictional character the good soldier Schweik, who created havoc in the

Austrian army during World War One by pretending to be extremely stupid

(Hasek, 1974). Various members of the group are also active in other social

movements as well as holding down regular jobs. We keep in regular contact

with like-minded individuals and groups throughout Australia and overseas.

Our project on telecommunications and social defence commenced in mid 1990

and followed on from a preliminary investigation into the Australian postal

system. We have focussed on this area because the connection between

communication and social defence is a vital one.

We interviewed a diverse range of people from the areas of satellite

communications, computer engineering, ham radio, computer systems development

and community radio. We started by interviewing people we knew and branched

out as we asked the people interviewed who else we should be contacting. The

interviews were usually conducted by two members of our group, one of whom

took notes. The notes were written up and circulated amongst members of the

group. Care was taken to ensure the anonymity of the interviewees.

From our point of view, the interviews had a very useful twofold purpose.

Not only were they a valuable and interesting source of information on

telecommunications capabilities, but they also allowed us to talk to other

people about social defence. In this way the interviews were a goal in

themselves, namely raising the issue of nonviolent struggle, as well as a

method for gaining information about telecommunications.

Main results

We describe some of our main findings according to the type of technology

used.

The telephone system is a wonderful means for mobilising against repression.

It is readily available to nearly everyone, requires very little knowledge or

training to use, and can be used to contact virtually any part of the world.

Most importantly, it is a network means for communication. Anyone can

contact almost anyone and there is no central control or censorship over what

people say on the phone.

There are two important limitations to the telephone. First, it can readily

be tapped, and individuals usually don’t know when this is happening.

Tapping can do little to stop a large-scale opposition, because there must

ultimately be people who listen to tapped conversations. If there are enough

people in the resistance, the regime can monitor only a small fraction of

relevant calls. Tapping in this situation is effective through its

psychological intimidation of callers who think someone is listening to their

calls.

A simple way to get around tapping is to use public telephones, or simply a

friend’s telephone. For answering of phones, some of the systems which

forward a call to another number are useful: the location of the person

answering the phone is not readily known to the caller (or someone listening

in). Also worth considering, as preparation for emergency situations, are

machines that change the pitch and vocal quality of a voice, and encryption

technology (which puts the message into code).

The second important limitation of the telephone system is that it can be cut

off selectively or entirely. This can be used against the regime or the

resistance, depending on loyalties of technicians on the inside. Generally,

the resistance would be wise to keep the telephone system operating. For

that matter, any modern industrial society depends on telephones for everyday

functioning. So it is unlikely that the entire system would be cut off

except for short times, such as the aftermath of a coup or massacre.

Resisters should build links with technical workers to ensure that the chance

of this is minimised.

As telephone systems become more computerised, the possibilities for central

authorities to monitor calls or cut off certain numbers increases. These

developments are making telephones less valuable for nonviolent struggle.

Fax is an extension of the telephone system to printed documents. All the

same considerations apply, except that documents received are often available

to anyone who happens to be around. Faxes with security codes overcome this

problem. (This is similar to the lack of security in telephone answering

machines.) Fax machines are much less common than telephones and require a

bit of training, but are basically easy to use. Using faxes is much better

when lengthy or complex information needs to be sent out.

Computer networks are excellent for person-to-person communication, but can

also be used to send messages to several addresses at once, or put material

on a computer bulletin board for all to read. They have the same limitations

as the telephone system, namely the potential for being monitored or cut off

by a master user (the person who controls the system and knows all the

passwords).

Unlike telephones, computers are not so easy to use and are available to only

a small fraction of the population, being relatively expensive. Computers

are becoming cheaper, more widely available and more user-friendly each year,

and will undoubtedly play an increasing role in communication in crisis

situations.

In the case of emergency, it would be advantageous to be able to run computer

networks on a different basis. For example, the master user’s power to shut

down or monitor accounts could be terminated. Such a change could be

programmed to occur, for example, whenever a specified number of users

inserted a special command within a certain time interval. Methods for doing

this, and their implications, remain to be studied.

Many computer networks could be disrupted by turning off a single key

machine. To reduce this vulnerability, there could be a duplicate site as a

backup.

Computers have the capacity to store vast quantities of information, and this

leads to new considerations. Some databases – for example, containing

information on social critics – would be sought by a regime. One possibility

would be to have plans to hide, encrypt or destroy sensitive information in

case of emergency.

Short-wave radio is another excellent network form of telecommunications. It

can be used to talk person-to-person across the globe. Furthermore, it

operates as a stand-alone system, so that the plug cannot be pulled from any

central location.

Calls on short-wave can be overheard by others with suitable equipment; as in

the case of telephone, the more people who use the medium, the less the risk

to any one. The location of short-wave transmitters can be pinpointed, but

the transmission site can readily be moved. An ideal way to ensure continued

international communications in a crisis would be to have a short-wave system

in every home, plus many additional public systems for anyone’s use.

A combination of short-wave transmission and computer data produces packet

radio, in which packets of data are transmitted. These transmissions cannot

be listened in on, though they could be deciphered with special equipment.

Packet transmissions can be sent up to amateur radio satellites and broadcast

down to receivers later, even halfway around the world. Combined with

encryption, this provides an extremely safe and secure method of sending

masses of information.

The main disadvantage of short-wave radio is the limited availability of the

technology and knowledge of how to use it.

CB radio is similar to short-wave radio, except for a much more restricted

range.

Television and mainstream radio are much less useful against a repressive

regime. Indeed, they are prime targets for takeover. The main reason is

that a few people control the content and the transmissions; everyone else

consumes the message. In this situation, the loyalty of both technicians and

broadcasters is crucial. If stations are taken over, perhaps the best

counter move would be for technicians to cause faults hindering transmission.

But this cannot be the basis for a programme of resistance, since immense

pressures can be brought against recalcitrant workers, or new compliant ones

brought in.

With some advance planning, a takeover could be delayed and hindered for at

least days or weeks, if not resisted indefinitely. But often the threat is

not immediately recognised by all workers, so it can be difficult to obtain

agreement for such action.

Community radio stations, in which community groups control programme content

and participate in making station policy, are much better placed to continue

speaking out. Preparations for emergencies at such stations have the added

advantage of making many groups aware of the necessity for action in a

crisis.

Illegal political radio broadcasts are also possible, and indeed clandestine

radio is a regular feature of resistance movements. Complications arise

because many clandestine broadcasters are run by government spy agencies,

which sometimes pose as resistance stations (Soley and Nichols, 1987).

In the longer term, it would be desirable to reduce dependence on the

broadcast technologies of television and mainstream radio and increase the

use of network technologies such as telephone.

It is important to remember that other forms of communications are important

besides telecommunications. This includes talking face-to-face, pamphlets,

graffiti, posters and the ordinary post. Telecommunications can aid

resistance to aggression and repression, but they are not essential.

It is also important to remember that technology is useless unless people are

willing to act. In this sense, politics, not technology, is the key to

resistance.

Recommendations

Even with the present state of technology and people’s awareness,

telecommunications can be an important part of nonviolent resistance to

aggression and repression. But there are also many things which can improve

the effectiveness of telecommunications for this purpose. We list them here

under five categories.

1. Realising present capabilities. Right now, people are quite capable of

using existing telecommunications to oppose a repressive regime. People need

to be made aware of their own capabilities.

If the mass media of television and mainstream radio, plus large-circulation

newspapers, are taken over, there are still plenty of avenues for independent

communication. The telephone system is the most obvious. Only a small

fraction of phones can be effectively monitored, so most people can use them

without risk; they need to realise this. Those who are at risk should

realise the possibilities for using other phones.

Those who have access to computer networks should be made aware of the

potential for communication. This includes people working for banks,

universities and large companies. Similarly, short-wave operators should be

made aware of the crucial importance of their technology.

Technicians in vital areas – such as television broadcasting or computer

networks – need to be aware of how they can help maintain communications

among those resisting repression.

2. Learning to use existing technology. Most people know how to use

telephones. Many more can learn how to use fax machines and computer

networks. Run a practice session with friends.

An even greater commitment is needed to learn to use short-wave radio or

packet radio. It is important for these skills to be more widely shared in

the community.

3. Preparation. Knowing how to use telecommunications is one thing; being

prepared to use them in a crisis is another.

Having a procedure for telephoning people in an organisation or network is

important. The system should work even when some people are not available or

some telephone lines are interrupted.

Developing lists of fax numbers is another useful step. On a computer

network, lists of important contacts could be kept ready for an emergency,

and perhaps hidden in a coded group so that others cannot inspect the list.

Another important part of preparation is simulations. A group of people can

run a drill, testing out their communication systems in the face of a few

disrupters. In this way the strengths and weaknesses of different systems

can be tested. Also, people can become accustomed to acting promptly and

sensibly in a crisis situation.

4. Designing technology. Telecommunications systems should be designed to

provide maximum support to a popular, nonviolent resistance, and minimal help

to a repressive regime. This seems never to have been a consideration in

system design before, so it is difficult to be precise about what is

required.

Is it possible to design a telephone system so that a speaker is warned if

another party is listening in on a call? Is it possible to design a

telephone system in which every phone can become – at least in emergencies -

as non-traceable as a public phone? Is it possible to design a telephone

system so that user-specified encryption is standard? Or in which encryption

is introduced across the system whenever a specified fraction of technicians

(or users) signal that this is warranted? Is “public key encryption,” or

some other system, the best way to support popular nonviolent struggles?

Is it possible to design a computer network so that the master user’s control

over accounts is overridden when a certain fraction of users demand this

within a specified period? Is it possible to design a computer system in

which encryption or hiding of data bases is automatic when there is

unauthorised entry?

There are many other such questions. Perhaps, too, these are not the

appropriate questions. The most effective design of a telecommunications

system to operate against a repressive regime will depend on practical tests

which cannot all be specified in advance. It is certainly the case that

there are a host of difficult and fascinating design problems.

It is important to remember that the design is not simply a technical issue,

since the most effective design depends on an assessment of people’s skills,

commitment and behaviour in a crisis situation. Good design will discourage

aggressors and encourage resistance. In this context, being seen to be

effective is part of what makes a system effective in practice.

5. Organising society. Telecommunications is only one part of nonviolent

resistance to aggression. Other areas are important too. A decentralised,

self-reliant energy system – rather than dependence on supplies generated at

a few central facilities – will make a community much more capable of

resisting threats from an aggressor. Similarly, greater self-reliance in

transport and agriculture would aid a community in defending itself. Workers

should be able to take control of their workplaces and resist demands of a

repressive regime.

All of this implies considerable changes in the organisation of society:

production and distribution of goods, services, transport, etc. In each

case, there are implications for communication. For example, if a regime

tried to repress dissent by interrupting deliveries of food, then it would be

vital to have reliable communication about available supplies, local gardens,

needy people, etc.

All of this would require preparation, organisation, commitment and training.

Conclusion

The development of telecommunications for nonviolent resistance to aggression

and repression depends on participation by many people to deal with local

situations. This is a preliminary report of our project. We welcome

comments, corrections and suggestions for future investigation, and hope to

hear about the ideas and experiences of others.

Schweik Action Wollongong

PO Box 492, Wollongong East

NSW 2520, Australia

Phone: +61-42-287860.

Fax: +61-42-213452.

E-mail: B.Martin@uow.edu.au

References

1. Boserup, Anders and Andrew Mack (1974) War Without Weapons: Non-violence

in National Defence (London: Frances Pinter).

2. Galtung, Johan (1976) Peace, War and Defense. Essays in Peace Research,

Volume Two (Copenhagen: Christian Ejlers).

3. Hasek, Jaroslav (1974) The Good Soldier Svejk and His Fortunes in the

World War, translated by Cecil Parrott (Harmondsworth: Penguin).

4. Hutchinson, Royal D. (1969) Czechoslovakia 1968: The Radio and the

Resistance (Copenhagen: Institute for Peace and Conflict Research).

5. Martin, Brian (1988) “Lessons in nonviolence from the Fiji coups”, Gandhi

Marg, vol. 10, no. 6, September, pp. 326-339.

6. Roberts, Adam, ed. (1967) The Strategy of Civilian Defence: Non-violent

Resistance to Aggression (London: Faber and Faber).

7. Roberts, Adam (1975) “Civil resistance to military coups”, Journal of

Peace Research, vol. 12, pp. 19-36.

8. Sharp, Gene with the assistance of Bruce Jenkins (1990) Civilian-Based

Defense: A Post-Military Weapons System (Princeton: Princeton University

Press).

9. Soley, Lawrence C. and John S. Nichols (1987) Clandestine Radio

Broadcasting: A Study of Revolutionary and Counterrevolutionary Electronic

Communication (New York: Praeger).

10. Windsor, Philip and Adam Roberts (1969) Czechoslovakia 1968: Reform,

Repression and Resistance (London: Chatto and Windus).

Додати в блог або на сайт

Цей текст може містити помилки.

A Free essays | Essay
36.3кб. | download | скачати


Related works:
Telecommunications
Telecommunications
Telecommunications 2
Telecommunications
Telecommunications
Telecommunications And The Telephone
THE TELECOMMUNICATIONS ACT OF 1984
Telecommunications Systems
It And Telecommunications Systems
© Усі права захищені
написати до нас