Social networks credited with role in toppling Egypt's Mubarak
Activists used Facebook, Twitter, YouTube to mobilize during protests
Computerworld - As Egypt's embattled President Hosni Mubarak gave up his presidency Friday, analysts and some of the Egyptian protestors said he'd still be in charge if not for the power of social networking.
After 18 days of tumultuous protests and stubborn refusals to leave a position he's held for 30 years, Mubarakgave up power today, handing over authority to the nation's military leaders. During a time of unrest that saw Mubarak's regime disconnect Egypt from the Internet for several days, social networking sites like Facebook and Twitter served as critical tools for the people seeking to topple the long-time ruler.
President Barack Obama this afternoon noted the role of technology in the uprising, praising Egyptians who used "their creativity, talent and technology to call for a government that represented their hopes and not their fears."
"I certainly do not think he would have left office at this point if it wasn't for social networking tools," said Brad Shimmin, principal analyst with Current Analysis. "I think they wanted all eyes to be turned away from the uprising, but the crackdowns on Internet access failed.
"Because of that, Mubarak and his regime felt they had no other choice than to step down."
When Egyptians who wanted Mubarak and his administration out began to mobilize, they turned to social networks, specifically Facebook.
Three years ago, an activist started the April 6 Movement page on Facebook to support striking workers. The page has drawn in more than 60,000 members concerned with issues like free speech, the country's poor economy and frustration with the government.
Activists also started a page on Facebook dedicated to Khaled Said, an activist blogger allegedly beaten to death by police last year.
What's been particularly interesting is that the Egyptian activists weren't simply looking for people to "like" their protest pages or to give people a place to vent their frustrations. They used social networking sites to engage people -- to motivate them into action, not just online but in the real world.
In some ways, Egyptians seemed to take a page from President Obama's social networking playbook. Obama successfully used social networking sites, like Facebook, YouTube and Twitter to help drive his 2008 presidential campaign. And his staffers knew that it wasn't enough for supporters to simply "like" his Facebook page or follow his campaign's tweets; They needed to use social media to galvanize real action in the real world.
- Internet shutdown 'will never happen again,' says Egypt's IT chief
- Social networks credited with role in toppling Egypt's Mubarak
- Google exec freed from Egyptian custody
- Why there's no such thing as an 'Internet kill switch'
- Amid protests, Egypt's tech chief goes to work
- Egyptian activist: Internet shutdown backfired
- The Internet kill switch that isn't
- Blocking Internet cost Egypt at least $90M, says OECD
- Update: Egypt restores links to Internet
- Egypt reverses 'kill switch' to restore Internet access
- How Network Connections Drive Web Application Performance Users around the globe, on all sorts of devices, expect Web applications to function as seamlessly as desktop applications. This paper discusses the...
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Web Apps White Papers | Webcasts