Asma Assad comforts Syrian women in a photo from the offical Instagram account
Show Hide image

In Syria, the internet has become just another battleground

President Assad’s Instagram account is one of the more surreal examples of the use of social networking in the Syrian war.

The Syrian president is photographed, sharp-suited and chinless, cradling a young cancer patient. On 21 March his fashionably gaunt wife is pictured embracing a tearful mother whose child has gone missing. More than 1,000 people “like” the shot. Bashar al-Assad’s Instagram account is one of the more surreal examples of how social networking sites are being used by all sides in the Syrian conflict, in this instance to send out the message that “the Assads are doing just fine”.

There is nothing inherently liberal or democratic about the internet, and in Syria it has become just another battleground. The weapons wielded by both sides to manipulate their message, spy on the enemy and sabotage its plans are becoming increasingly sophisticated, and dangerous.

It was popular in early 2011 to describe the Arab spring uprisings as Twitter revolutions. Social networking sites did help facilitate demonstrations in North Africa, by allowing citizens to organise protests or spread information on human rights abuses, but tech often failed activists, too. At times, the governments of Egypt, Libya and Syria simply shut down internet access or phone signals nationwide. Meanwhile, western firms, such as the American company Blue Coat, provided dictators with the ability to censor websites and monitor online activity, so that a critical tweet, blog or comment could land the author in jail.

This prompted democracy activists to fight back. In August 2011, five months after the start of the conflict in their country, Syrians trying to get online confronted a strange blank screen bearing the following warning: “This is a deliberate, temporary internet breakdown. Please read carefully and spread the following message. Your internet activity is being monitored.” Users could click through for advice on how to use the internet safely, such as by going through Tor – a service that routes activity via a complex network of computers, making it very hard to track an individual’s web footprint or discover his physical location. Tor was originally developed by the US navy but is now available to anyone with a strong interest in covering tracks online: from democracy activists to al-Qaeda affiliates, fraudsters and drug dealers. The same is true of the “dark web”, the part of the internet that is not indexed by search engines. (I had wanted to speak to the western tech charities working in Syria to help activists use these tools, but for security reasons they did not want to be mentioned by name or to discuss details of their work.)

The message that confronted Syrians in August 2011, however, was not the work of an established NGO. It was organised by Telecomix, a loose collective of “hacktivists” that was founded in Sweden in 2006 but now has volunteers worldwide. Their methods range from the hi-tech – it was Telecomix hacking that exposed how the Syrian government was using Blue Coat surveillance equipment – to the inventive use of low-tech: Telecomix volunteers taught Syrian citizens how to make walkie-talkies using household objects such as clock radios. During internet blackouts in Egypt and Syria, Telecomix collected phone numbers of offices, cafés and university departments and faxed them information on how to access a dial-up internet connection it had set up using a server in Europe.

On the other side of the battle is the Syrian Electronic Army, a network of pro-Assad hackers. Some of its stunts have been immature: one of its first successes was posting a rumour on E! Online that Justin Bieber had come out as gay. But researchers at the tech firm Hewlett Packard believe the SEA is among the top ten most sophisticated hacking circles in the world. Its pranks can have huge real-world implications, too: when it hacked into Associated Press’s Twitter account last April to post a fake tweet announcing that there had been two explosions at the White House, the Dow Jones fell 150 points.

Perhaps even more worrying for anti-government activists has been the SEA’s development of malware (malicious software) targeted at Assad’s opponents. One SEA campaign sent out links for a fake security service called AntiHacker. When people clicked on the link, they inadvertently installed a remote-access tool that allowed the SEA to record keystrokes, steal passwords and capture webcam activity. Pro-government hackers have also sent out malware disguised as files documenting human rights abuses by the military, or as news links posted on Facebook accounts of prominent anti-government activists. Online, it is hard for Syrians to know whom to trust.

Even Telecomix appears to be retreating from its work in Syria. I emailed Peter Fein, a Telecomix hacker and informal spokesman for the group, though he’s now taking a break and “putting his life back together”. He wrote that Telecomix was cutting back on its activity this year, as “comms support is both more difficult and less important as things move from protests to civil war”. In 2013, the group helped evacuate some of its local contacts and their families from Syria, because things were getting “nasty”. Telecomix Syria’s Twitter feed now seems mainly focused on charting the rise and fall of internet connectivity in various parts of the country. For all the sophisticated hacking battles taking place, older methods are sometimes more reliable.

Sophie McBain is a freelance writer based in Cairo. She was previously an assistant editor at the New Statesman.

This article first appeared in the 10 April 2014 issue of the New Statesman, Tech Issue

Getty
Show Hide image

An alternative Trainspotting script for John Humphrys’ Radio 4 “Choose Life” tribute

Born chippy.

Your mole often has Radio 4’s Today programme babbling away comfortingly in the background while emerging blinking from the burrow. So imagine its horror this morning, when the BBC decided to sully this listening experience with John Humphrys doing the “Choose Life” monologue from Trainspotting.

“I chose not to choose life: I chose something else. And the reasons? There are no reasons. Who needs reasons when you’ve got Radio 4?” he concluded, as a nation cringed.

Introduced as someone who has “taken issue with modernity”, Humphrys launched into the film character Renton’s iconic rant against the banality of modern life.

But Humphrys’ role as in-studio curmudgeon is neither endearing nor amusing to this mole. Often tasked with stories about modern technology and digital culture by supposedly mischievous editors, Humphrys sounds increasingly cranky and ill-informed. It doesn’t exactly make for enlightening interviews. So your mole has tampered with the script. Here’s what he should have said:

“Choose life. Choose a job and then never retire, ever. Choose a career defined by growling and scoffing. Choose crashing the pips three mornings out of five. Choose a fucking long contract. Choose interrupting your co-hosts, politicians, religious leaders and children. Choose sitting across the desk from Justin Webb at 7.20 wondering what you’re doing with your life. Choose confusion about why Thought for the Day is still a thing. Choose hogging political interviews. Choose anxiety about whether Jim Naughtie’s departure means there’s dwindling demand for grouchy old men on flagship political radio shows. Choose a staunch commitment to misunderstanding stories about video games and emoji. Choose doing those stories anyway. Choose turning on the radio and wondering why the fuck you aren’t on on a Sunday morning as well. Choose sitting on that black leather chair hosting mind-numbing spirit-crushing game shows (Mastermind). Choose going over time at the end of it all, pishing your last few seconds on needlessly combative questions, nothing more than an obstacle to that day’s editors being credited. Choose your future. Choose life . . .”

I'm a mole, innit.