Meet Jennifer, she took her first TechChange course on Technology for Conflict Management and Peacebuilding in October and is now facilitating multiple TechChange courses.

Drawn by our teaching model, after completing her course, she wanted to become involved as a facilitator for our courses. She is currently co-facilitating TC111: Technology for Monitoring and Evaluation with Norman Shamas, and facilitating TC105: Mobiles for International Development. Jennifer will also be facilitating TC109: Technology for Conflict Management and Peacebuilding in the coming months, bringing her full-circle in her participant-to-facilitator involvement with TechChange.

Prior to joining TechChange, Jennifer participated in several research symposiums and conferences like the Institute for Qualitative and Multi-Methods Research, the Association for the study of the Middle East and Africa Annual Conference and more. She has also served as a guest speaker for the American Red Cross and has mentored several high school and undergraduate students regarding school-sponsored and independent international development and peacebuilding start-ups.

Jennifer is an emerging comparative politics scholar and methodologist focused on answering questions related to individual and community involvement in conflict, post-conflict, and peace processes. She holds a Bachelor’s in Political Science from the Colorado College, a Masters in Public Health from Indiana University, and is a Doctoral Candidate in Political Science with the University of New Mexico.

In remembrance of Mahatma Gandhi’s birthday, today marks the International Day of Non-Violence. The UN General Assembly adopted a resolution in 2007 to mark October 2nd as the day to reaffirm “ ‘the universal relevance of the principle of non-violence’ and the desire ‘to secure a culture of peace, tolerance, understanding and non-violence.’ ”

This year’s Non-Violence Day is being celebrated in light of the ongoing protests in Hong Kong. The birthplace of Gandhi, India is celebrating the day with Prime Minister Modi’s ‘Clean India’ campaign. At TechChange, we are celebrating the Day of Non-Violence by offering a $50 discount for our Technology for Conflict Management and Peacebuilding online course that begins Monday!

Apply today with the coupon code ‘NonViolenceDay’ to get $50 off our course!

One of the challenges of using social media in peacebuilding and conflict resolution is that while it can draw together like-minded people advocating for peace, it can also be used to organize violence just as effectively. Groups like the Islamic State (also known by acronyms including IS, ISIS, or ISIL, and currently dominates large portions of Iraq and Syria) are demonstrating that social media can be used to sow fear and promote their political agenda. Not only are they demonstrating how to do this effectively, they’re also demonstrating how hard it is to intervene when a violent actor has control of the information space.

Once violence has started, the information space — including social media — becomes a proxy for conflict. Ideas are being shared and are competing for a legitimacy among the population. In the case of IS, legitimacy could include instilling a sense of fear, or notions that they can or will play the role of the state. The State Department has made an effort to try to combat IS’s messaging in the Twittersphere, but this is difficult for an institution that has long standing communication protocols and is still adapting to the fluidity of social media messaging.

So, at what level does social media help peacebuilders in an information environment?

Civil society as a powerful source for peace

Traditional conflict management institutions may not yet be flexible enough to fully engage in the social media space, but this doesn’t mean that civil society can’t be a powerful force for peace. The Active Change Foundation, a London-based non-profit, set up the social media campaign for British Muslims called #notinmyname. The project uses Twitter to share videos and photos of Muslims, particularly youth, sharing reasons why IS does not speak for them as muslims. The project has gotten over 14,000 tweets using the #notinmyname hashtag, and is flexible in a way that a large institution’s use of social media cannot be. This isn’t to say that organizations like the State Department don’t play a role in social media, but in a highly fluid environment something grassroots like #notinmyname can catch on and respond to IS’s tweets in volume and tone. Winning the information war on something like Twitter depends on both of these and it’s impossible for a single user, even a user as big as the Department of State, to match the size of a social media network like IS’s.

Civil society response with mockery and humour

Another way Muslim civil society is responding is with mockery and humor. What’s important is that these videos and Twitter campaigns are coming from within Muslim communities. Humor has played an important role in protests and movements against dictators and repressive regimes previously, and it can take on a life of its own once it has percolated out into a space like Twitter. Again, this is something that large institutions are going to have trouble instigating. The messages have to be organic and come from within the communities that face the threat of a dictator or a group like IS. Indeed, something like a humor or ridicule protest could lose its legitimacy if larger institutions like the Department of State is involved.

Social media’s power to create grassroots movements across geographies

When we look at the role of social media in peacebuilding or conflict, we have to look beyond just the nature of the message. Social media is just a broadcast tool – it pushes out whatever message the user wants. The important question becomes the strategy employed by the peacebuilding community to engage against the violent messaging of an organization like IS. The power of social media is maximized when civil society bands together across geography, developing a large networked community. How traditional peacebuilding and governance institutions engage with these organic civil society networks is important. Large institutions can help give grassroots movements increased legitimacy and the backing of a recognized institution, but they must also be careful not to undermine the community’s legitimacy when organizing a message of peace in the face of violence.

Interested in learning more about using social media for peacebuilding? Register now for our upcoming Technology for Conflict Management & Peacebuilding online course that runs October 6 – 31, 2014.

The Global Database of Events, Language and Tone (GDELT) has been gathering and databasing all the news events related to conflict and political protest dating back to 1979. GDELT continues to be fed new data through the various global news services, automatically updating every day. At the end of July GDELT released their Global Dashboard which visualizes all of their data collected from February 2014 to present on a map of the world. It’s a fantastic tool for conflict management and resolution professionals who are interested in big data, since it takes their information and puts it in a visually attractive, easily navigable format. This is an exciting development, so how does it work and what can peacebuilding practitioners get out of using GDELT’s event data?

The first thing to keep in mind is that the Dashboard is new. As it stands there are only two filters for event data (‘conflict’ or ‘protest’), but there are plans to expand these filters so that users can easily focus on the events that are of most interest. For now they’ve done a pretty good job of helping filter out conflict events, which are basically events involving kinetic violence, from protest events, which could end up being violent but are generally more along the lines of protests and social action. While basic, these are good starting points for an initial filter. The nice thing about the dashboard though is that if I have some expertise about the region or event I’m interested in gathering data on, I don’t need the filters because I can use geography and date to narrow my search. The Dashboard allows the user to take advantage of their contextual knowledge to filter the data, so while the built-in filters that come later will be helpful researchers can still use the database efficiently now.

Let’s say we’re interested in recent protest events in South Africa, but we want to know if there have been any in smaller cities, since we know that there’s likely to be a lot of political action in places like Cape Town and Johannesburg. I started with the Dashboard zoomed out to the maximum, so I could see the whole world, then went to the bottom left and set the date that I was interested in seeing news from. For this test I picked August 3, 2014. Below is what the screen looked like at this point:

GDELT Global Dashboard

We can see the whole world, and in South Africa there are big dots indicating aggregated data. Since I want to see what’s happened outside the main cities, I zoomed in until the dots started to disaggregate, then I selected the ‘protest’ filter to remove the ‘conflict’ events. Once I was zoomed in the filter was set, I found that there was a protest event in Port Elizabeth so I clicked on the dot and a box with the web addresses for news articles about a protest against money being spent on a museum appeared: GDELT Global Dashboard: South Africa

I clicked on the Google News link, which took me to the related articles that Google had collected about that protest and read one that had been reposted by a local news service from the Agence France-Presse:

"South African shantytowns residents force anti-apartheid museum to close," Agence France-Presse

I managed to do this in a few minutes using the Dashboard, work that would have taken longer if I was just doing searches for protest news out of South Africa. What makes the tool really useful is that I can search in a few different dimensions. If want to know if this is the first time there has been social action around the museum in Port Elizabeth, I can leave the map zoomed in to that location and scan through the dates going back to February. What we can do, relatively easily, is see events and narratives spatially and analyze how they change over time.

This is a big dataset, so I thought hard about what its value added is from a methodology perspective. As I dug through the data, I realized something important. I’m not sure this is a database that will be particularly useful for forecasting or predictive analysis. You might be able to identify some trends (and that’s certainly a valid task!), but since the data itself is news reports there’s going to be a lot of variation across tone and word choice, lag between event and publication, and a whole host of other things that will make predictive analysis difficult.

As a qualitative dataset though, the GDELT data has incredible value. A colleague of mine pointed out that the Dashboard can help us understand how the media conceptualizes and broadcasts violence at the local level. Understanding how news media, especially local media, report things like risk or political issues is valuable for conflict analysts and peacebuilding professionals. I would argue that this is actually more valuable than forecasting or predictive modeling; if we understand at a deeper level why people would turn to violence, and how the local media narrative distills or diffuses their perception of risk or grievance, then interventions such as negotiation, mediation and political settlements can be better tailored to the local context.

Big Data is a space that is both alluring and enigmatic for conflict resolution professionals. One of the key challenges has always been making the data available in a way that is intuitive for non-technical experts to use. GDELT’s Dashboard is a great start to this, and the possibilities for improving our understanding of conflict through the narratives we can observe in the media are going to grow rapidly in the next few years.

This post originally appeared in Insight for Conflict on September 19, 2014. 

 

TechChange COO Chris Neu is fond of pointing out that in social change, technology is only 10% of the equation while the rest is about the humans using that technology. That 10% is a pretty powerful percentage though, and when technology is used effectively, it can amplify voices of peace and empower local communities that want to find alternatives to violence. It’s easy to forget though that technology isn’t the most important part of any information and communication technology (ICT) for peacebuilding enterprise; it’s the people, both the beneficiaries and the peacebuilders (who can be one and the same!). Because what we’re doing with ICTs in any peacebuilding context involves asking people to share data and participate in interventions, we must be aware of the risks participants face and how to manage those risks. The problem is that we face a variety of risks at multiple different levels when using ICTs in any political environment, so what are a few things we can focus on while planning a project?

An Institutional Review Process as a Starting Point
There are a variety of simple starting points. For example, if you are an academic or affiliated with an academic institution, they require you to go through an institutional review process before you can do any research involving human subjects. This would include doing a crowdsourcing project using SMS text messaging or social media. Many institutions have some kind of process like this, so check before you deploy your project. While tedious, the process of defending your risk management procedures can help you identify a lot of problems before you even start. If you don’t have an internal review board, grab a copy of the ICRC’s “Professional Standards for Protection Work” and check your project design and risk management against the recommendations in Chapter 6.

Along with doing this kind of standard review, what are some other factors that are unique to ICTs that you should be aware of?

1) National Infrastructure and Regulatory Policy
The first is that ICTs are part of national infrastructure, and are regulated at the national level. When you use any kind of transmission technology in a country, the rules for how that data is transmitted, stored and shared are set at the national level as part of regulatory policy. If the government in the country you’re working in is repressive, chances are they have very broad powers to access electronic information since they wrote the regulations stipulating data privacy. In general locals will be aware of the level of surveillance in their lives, so do your legal homework about the regulations that people have actively or passively adapted to. These are usually titled something like “Telecommunications Act” or “Electronic Transmission Act”, and are often available for public viewing via the web.

2) Legal Compliance
If you’re going to go forward with an ICT-supported peacebuilding program after doing your legal homework, ethical practice starts at home. Unless you are reasonably adept at reading and interpreting legislation, did you have someone with a legislative or legal background interpret the privacy laws in the country you’re about to work in? Does your team have someone with expertise on the technical and policy aspects of using ICTs in a conflict-affected or high risk environment? Has the entire project team had some basic training in how ICTs work? For example, does everyone understand the basics of how a mobile phone works, how to protect sensitive data, and the implications of having people share data on electronic platforms? Before showing up in a conflict-zone and asking people to participate in your project, you should make sure your team understands the risks they are asking people to take.

3) Informed consent
What do the local project participants know about ICTs? In terms of safety, people are generally aware of what will get them in trouble. Always assume that your perception of risk in a country is under-informed, even if you’ve read the laws and done some regulatory analysis. With this in mind, if you’re going to ask people to take risks sharing electronic information (always assume that sharing electronic information is risky), do you have a process for assessing your participants’ knowledge of ICTs and then addressing any gaps through training? Do you and your team understand the technology and regulations well enough to make the risks to partners clear, and if they still choose to participate provide risk management training? Informed consent means making sure you and your partners are both equally clear on the risks involved in what ever project you’re doing.

Peacebuilding carries some level of inherent risk – after all, we’re dealing with conflict and violence. ICTs carry a unique set of risks, compounded by both the nature of digital information and the capacity for governments and conflict entrepreneurs to exploit this information. An effective ICT for peacebuilding program addresses these risks from both the legal and technical sides, so that implementers and local partners are equally informed and able to use the tools in the safest, most effective way.

Want to learn more about the ethical issues facing peacebuilders using technology? Enroll now in our Technology for Conflict Management and Peacebuilding online course which runs October 6 – 31, 2014

 

Image source: Tech Republic

The release of the South Sudan Ushahidi map has spurred an online dialogue on the possibilities and challenges of how we understand crowdsourcing, big data, and technology for conflict management and peacebuilding. A series of blog posts from Chris Neu of TechChange, Daniel Solomon, and myself highlighted these issues, which I wanted to combine with brief descriptions because I think they’re an interesting series for those grappling with how we make use of emerging data and technology tools in pursuit of peace and stability. It’s worth giving all four a read, since they represent a nice arc of thinking about big data for conflict prevention and peacebuilding.

  1. Can a Crisis Map End the Crisis in South Sudan? by Chris Neu. This was the first post about the South Sudan Ushahidi map that got the chain of posts started. Greg Maly had advocated getting a map up as the situation in South Sudan began deteriorating, so with the help of Rob Baker, a deployment was launched. After the map was live, comments came back in – a number were constructively critical and thought provoking. The key points were focused on the utility of the data that could realistically be provided.
  2. Two Tweets Reveal Central Problem for South Sudan Crisis Map by Chris Neu. Chris’ following post brought up the important issue of ethics when using data submitted by individuals in such a chaotic environment. “Is it ethical to restrict information to the public? Is it ethical to reveal information about the vulnerable?” Both questions are valid, but the one that gained some traction focused on the data we expect to get from conflict zones.
  3. The Murky Swamp of Mass Atrocity Data by Daniel Solomon. Up to this point this online discussion had focused on the map and software, so Daniel Solomon took the conversation and framed it in the context of conflict itself. He outlined a set of important issues about how conflict affects data, and thus how our efforts to crowdsource and use big data could actually lead to greater confusion instead of clarity.
  4. Finding Big Data’s Place in Conflict Analysis by Charles Martin-Shields. Daniel Solomon’s post inspired me to think through the methodological challenges of using Big Data for conflict analysis. The two posts got some good traction and discussion going, which is always exciting.

I wanted to pull all four posts together in one place since I found them to be useful individually, and interesting as a whole. They also provide an arc of event, critique, and potential solutions that are useful when practitioners are trying to decide how and when to use crowdsourcing or Big Data in their conflict analysis and resolution work.

Interested in this topic? Want to join the conversation and learn more? Enroll today in our Technology for Conflict Management and Peacebuilding online course to learn more about digital mapping, social media, mobile platforms, and other technologies for promoting peace.

This is a guest post by Dhairya Dalal. If you are interested in using crisis mapping and using technology for humanitarian relief, conflict prevention, and election monitoring, consider taking our course Technology for Conflict Management and Peacebuilding.

Overview

Recently, I had the opportunity to run an election monitoring simulation for TechChange’s TC109: Conflict Management and Peacebuilding course. Led by Charles Martin-Shields, TC109 taught over 40 international participants how mapping, social media, and mobile telephones could effectively support the work of conflict prevention and management.  Robert Baker taught participants how the Uchaguzi team leveraged crowd-sourcing and Ushahidi, a web based crisis mapping platform, to monitor the 2013 Kenyan elections.

For the simulation activity, my goal was to create a dynamic hands-on activity. I wanted to demonstrate how crisis mapping technologies are being used to promote free and fair elections, reduce electoral violence, and empower citizens. To provide students a realistic context, we leveraged live social media data from the Kenyan elections. Participants walked through the process of collecting data, verifying it, and critically analyzing it to provide a set of actionable information that could have been used by local Kenyan stakeholders to investigate reports of poll fraud, violence, and voter intimidation.

Below I’ll provide a brief history of election monitoring in the context of Kenyan elections and provide a more detailed look at the simulation activity.

Brief History of Election Monitoring and Uchaguzi

uchaguziIn 1969, the Republic of Kenya became a one-party state whose electoral system was based on districts that aligned with tribal areas. This fragile partitioning often generated internal friction during the electoral cycle. The post-election violence of 2007-2008 was characterized by crimes of murder, rape, forcible transfer of the population and other inhumane acts. During the 30 days of violence more than 1,220 people were killed, 3,500 injured and 350,000 displaced, as well as hundreds of rapes and the destruction of over 100,000 properties. 2

Ushahidi was developed in the wake of the 2008 post-election violence. Ushahidi, is a website that was designed to map reports of violence in Kenya after the post-election fallout. However, Usahidi has since evolved into a platform used for crisis mapping, crowd-sourced data gathering, and many other things. Since then, the name Ushahidi has come to represent the people behind the Ushahidi platform. 2

Uchaguzi was an Ushahidi deployment, formed to monitor the 2013 Kenyan general elections held this past March. The Uchaguzi project aimed to contribute to stability efforts in Kenya, by increasing transparency and accountability through active civic participation in the electoral cycles. The project leveraged existing (traditional) activities around electoral observation, such as those carried out by the Elections Observer Group (ELOG) in Kenya.3

Election Monitoring with CrowdMaps

TC109 Simulation Figure 1: TC109 Simulation map (view official Uchaguzi map here: https://uchaguzi.co.ke/)

For the simulation activity, we used Ushahidi’s CrowdMap web application. CrowdMap is a cloud-based implementation of the Ushahidi platform that allows users to quickly generate a crisis map. Crowdmap has the ability to collect and aggregate data from various sources likes SMS text messages, Twitter, and online report submissions.

To provide the participants a more realistic context, our simulation collected real tweets from the Kenyan elections that had just occured the prior week. Our simulation aggregated tweets from Uchaguzi’s official hashtag, #Uchaguzi, as well several other hashtags like #KenyanElections and #KenyaDecides. In addition students were tasked with creating reports from Uchaguzi’s facebook page and local Kenyan news sites.

The aggregated information was then geo-tagged, classified and processed by the participants. The participants created reports, which described incidents licrowdmapke instances of voter intimidation, suspected poll fraud, and reports of violence. The CrowdMap platform plotted these reports on a map of Kenya based on coordinates the participants provided during the geo-tagging phase.  The resulting map showed aggregation patterns, which would have allowed local actors to see where certain types of incidents were taking place and respond accordingly.

Conclusion: Going beyond the Technology and Cultivating Information Ecosystems

workflow   Figure 2: Uchaguzi Workflow

While technological innovations have made it easier to collect vast amounts of data in real-time during a crisis or an live event, a lot of process and human capital is still required to ensure that the data can processed and acted upon. Prior to the Kenyan elections, the Uchaguzi team established a well-planned information workflow and local relationships to ensure that information was ultimately delivered to the local police, elections monitors, and other stakeholders who could take action on the reports received. This workflow also delineated volunteer workgroups (based on Standby TaskForce’s information processing workflow) which were responsible for different parts of information collection process from Media Monitoring and Translation to Verification and Analysis.

To provide the participants an understanding of the full picture, we had them assume the role of various workgroups. They were challenged to identify how the information would be gathered, verified, classified, and distributed to local stakeholders. Participants followed the official Uchaguzi workflow and learned more about the challenges faced by the various workgroups. For example how would you translate a report submitted in Swahili? How would you determine if a report is true or falsely submitted to instigate provocation? How would you escalate reports of violence or imminent danger like a bomb threat?

Overall, the participants were able to learn about both the technology that enables the crowd-sourcing of election monitoring and the strategic and deliberate structures put in place to ensure an information feedback loop. Participants were able to gain an understanding of the complexity involved in monitoring an election using real data from the Kenyan elections. They were also given an opportunity to recommend creative suggestions and innovations that were sent to the Ushahidi team for future deployments.


About the Author:
Dhairya Dalal is a business systems analyst at Harvard University, where he is also pursuing his master’s degree in Software Engineering. Dhairya serves a curriculum consultant for TechChange and is responsible for teaching hands-on technical workshops centered around crisis mapping and open gov APIs, as well as strategic lessons on social media strategy and digital organizing.

Sources:
1:Background on the Kenyan Electoral Violence
http://www.haguejusticeportal.net/index.php?id=11604 
2: Uchaguzi Deployment
https://wiki.ushahidi.com/display/WIKI/Uchaguzi+-+Kenyan+Elections+2013
3: Uchaguzi Overview
http://reliefweb.int/report/kenya/uchaguzi-kenya-2013-launched

Interested in our upcoming course: Technology for Conflict Management and Peacebuilding? Our next class starts Monday, February 18th. Apply today!

This week, Ushahidi announced the launch of the Uchaguzi partnership in preparation for the upcoming March 4th Kenya elections with the aim “to help Kenya have a free, fair, peaceful, and credible general election.” This announcement came after the Standby Task Force (SBTF) sent an email on February 8th informing their community of voluntary crowdmappers that the SBTF has withdrawn from Ushahidi’s map for not meeting their criteria for activation, but still encouraged their community to participate as individuals. The announcement surprised some in the Standby Task Force community, which had been preparing for deployment, but was not entirely unexpected after the SBTF’s decision to focus on deploying to “natural” disasters after their experience in Syria. The official email explained that:

“The things that we use to ensure that the security, ethics and neutrality that the SBTF stands for is protected, that there is a feedback loop (a physical, on-the-ground response to the data processed by Mapsters) and that we do no harm, e.g. we don’t damage existing in-country responses.”

The notion that external support could be counter-productive is an issue worth considering for the voluntary technical community of peacebuilders. The rise of both local crowdmapping and the global volunteer and technical communities have grown together over the past five years after the violence stemming from the last Kenyan elections gave rise to the Ushahidi platform and the Haiti earthquake saw the development of a global volunteer networks to apply them. Since that time, it’s become clear that the ethical questions surrounding application of technology to peacebuilding are as complex as ensuring technical capability, if not more so.

The challenge of protecting the privacy and security of citizen users is constantly grappled with by the organizations responsible for these tools. The upcoming Kenyan election offers a unique case to take stock of where we stand and where we are moving. Which is why it will form the basis for an activation simulation in TC109: Technology for Conflict Management and Peacebuilding. As part of the activity, we’ll be talking with Justine MacKinnon of the Standby Task Force and Rob Baker of Ushahidi. To understand more thoroughly the opportunities for new technologies to empower peacebuilders.

Of course the ethical impact of new technology is not limited to crowdsourcing, which is why we’re also going to discuss the full spectrum of issues in TC109, from using drones to protect human rights with Mark Hanis to using MapBox to display drone strikes on Pakistan in real-time. New technology often presents as many problems as it solves, and application of even the most potentially beneficial new tools without sufficient forethought can always cause more harm than good.

Class starts on Monday. We hope to see you there! Please feel free to tweet @techchange if you have any questions or send us an email: info [at] techchange.org.