can easily be picked up by radio scanners, as some public figures have discovered to their embarrassment.[17] One easy method is to use other telephones, especially public telephones. Another is to use the “call forward” mechanism on some phones, to bounce a call to a different phone and thus hide the location or identity of the caller.

As well as such practical on-the-spot techniques, there are a number of technological approaches worthy of investigation. Secure methods of putting telephone messages into code — encryption — would make surveillance more difficult. Telephone systems could be designed so that taps are impossible without alerting the callers. They might also be designed so that, in an emergency, no single person could cut off phones. (In ordinary times, technicians often need to cut off phones for quite legitimate purposes.)

Another issue is caller number identification: the ability of the person called to see and capture electronically the phone number of the caller. Arguably, in some cases in an emergency it is useful for people to be able to make anonymous phone calls. On the other hand, the aggressor may try to disrupt the resistance by feeding lots of misleading information into the resistance networks, in which case caller number identification would be useful to the resistance. More investigation and the running of simulations would help in deciding in what circumstances caller number identification would be an advantage for a nonviolent resistance. [18]

Fax machines run on telephone lines, but are different in two ways: they transmit a printed document rather than sounds, and the recipient does not need to be there for the transmission to occur. Fax is a decentralised communication system and has many similarities to both the post and computer networks. Generally speaking, fax is quite useful to the resistance. “Secure” transmissions — sending a fax that can only be printed when the receiver puts in a code — are now possible with some fax machines. The main improvement for fax would be encryption, so that messages cannot be intercepted en route.

The Post

The postal system is a global communication network which is generally quite useful for nonviolent activists. A government seeking to monitor the post cannot hope to open and inspect every piece of mail without large amounts of labour and considerable disruption of everyday life. Therefore the usual procedure is selective monitoring of mail: intercepting, reading and sometimes confiscating mail sent by or to particular targeted individuals or organisations. In order to achieve this, it is helpful for all mail in a country or region to be routed through a single central post office.

To get around monitoring of the post mostly requires organisational rather than technological means. The more that collection, sorting and distribution of mail are done locally, the more difficult it is for any group to monitor or intercept the post. Also, the more decentralised are the authority structures within the postal service, the more difficult it is for an aggressor to take control using only a few trusted staff. If there are several, rather than just one, postal services — such as competing private carriers — then it becomes more difficult to take central control.

It is significant in this regard that most governments have tried to monopolise postal delivery by outlawing, heavily taxing or tightly regulating private delivery services. In the historical development of the post, this was done in order to raise revenue and to prevent enemies from communicating without the ruler’s knowledge.[19] This shows that secure and reliable postal delivery — not easily monitored centrally — is of great value to nonviolent opponents of tyranny.

More fundamental than formal ownership of postal services is the attitude of postal workers. If they are sympathetic to the resistance, then they can ensure that important letters or parcels are delivered without inspection. They are also in a good position to deliver messages from the resistance along their delivery routes. It’s also possible for the resistance to avoid interception by using false names and addresses, putting one letter inside another, and various other techniques.

There are a few technological systems that are relevant. One is automatic sorting of letters by postcode. If this is used in some way to help monitor the post, the machines could easily be disabled. In any case, it would be an interesting problem to design such equipment so that it provided no advantage for any group wishing to monitor the post. Another issue is the surveillance of postal workers using videocameras and other apparatus. Such surveillance could be used by agents of an aggressor to detect postal workers supporting the resistance. For the purposes of nonviolent resistance, it would be best to get rid of technology that puts workers under surveillance.

Conversations and Meetings

In spite of all the technological advances, face-to-face conversations remain one of the very best means of communication. Also quite useful are meetings, whether this involves 3, 30 or 300 people. The smaller the number of people in a meeting, generally, the more each person can contribute and the fewer opportunities there are for manipulation or domination. It may be worthwhile for an aggressor to send observers or arrange for surveillance of mass meetings of hundreds or thousands of people. But monitoring of hundreds or thousands of small meetings becomes impossible.

It might seem that technology is largely irrelevant to face-to-face conversations, but this is not so. Modern technology has greatly increased the capacity for surveillance, for example by electronic listening devices.[20] Investigations are needed into convenient, low-cost ways of avoiding or foiling such surveillance.

Computer Networks

Computer networks are a powerful means of communication most suitable for nonviolent struggle.[21] Such networks are interactive and cannot easily be dominated by a small number of users. Information on the network is transmitted by telephone lines and, indeed, computer networks are very similar to telephone systems. There are several major differences. First, computer networks deal mainly with text rather than voice. Second, it is much easier to save, copy and distribute text via computer networks than via phone. Third, the skills and investment required to become a skilled user of computer networks are much greater than to become a proficient user of the telephone.

The first two factors generally make computer networks a more powerful means of communication, from the point of view of nonviolent struggle, than the telephone. The third factor considerably reduces its value. As the price of computers declines and the software for hooking into networks becomes more user-friendly, computer networks will become more and more valuable as a people’s communication technology.

Computer networks — collectively called “cyberspace” — will undoubtedly play an increasing role in communication in crisis situations. They have been used to send alerts about human rights violations, to mobilise opposition to vested interests and to provide information to activists opposing repressive regimes. For example, computer networks have been used for communication by the peace movement in former Yugoslavia,[22] to resist the 1991 Soviet coup[23] and to organise publicity about persecution of minority groups in Iran.

Computer networks have several vulnerabilities, again similar to the telephone. If the telephone system is shut down, so is most computer communication. But this is not so likely because, like the telephone system, computer networks are used more and more for functions such as commercial transactions. Therefore, anyone who shut down the networks would risk alienating a large proportion of the population, including powerful organisations.

Another key problem with computer networks is surveillance, namely logging into particular accounts or intercepting particular electronic messages. The system administrator in charge of local networks has the capacity

Добавить отзыв
ВСЕ ОТЗЫВЫ О КНИГЕ В ИЗБРАННОЕ

0

Вы можете отметить интересные вам фрагменты текста, которые будут доступны по уникальной ссылке в адресной строке браузера.

Отметить Добавить цитату