When is it ethical to either restrict or share information during violent conflict? Two tweets summarized the information challenges of the South Sudan Watch crisis map will face in the coming days.

 Tweet #1: Is it ethical to restrict information to the public?

Tweet by Dan_E_Solo

As of the time of this writing, the public-facing crisis map for South Sudan Watch is still disappointingly sparse. Daniel Solomon, an expert on genocide and involved in anti-genocide networks (also author of the Securing Rights blog), observed that the crowdmap was simply capturing a handful of “traditional” media reports instead of plotting real-time incidents for the public to see.

It’s possible that the public map doesn’t yet display all the information available because it’s unclear if doing so would cause more harm than good – and that’s not an easy call to make. But is it ethical to restrict information if it could better inform humanitarian intervention or even save lives by providing information directly to those on the ground? Nathaniel Raymond would refer to as the “Right to Information in Disaster,” with information being as valuable as food, water, shelter, and medicine.

 

Tweet #2: Is it ethical to reveal information about the vulnerable?

Tweet by Anahi

But experienced crisis mappers have already begun to weigh in on how dangerous sharing this information can be — especially without sufficient context. in a post on “The Conundrum of Digital Humanitarianism: When the Crowd Does Harm” Anahi (a co-founder of the Standby Task Force) cautions:

“But the truth is that the beauty of the internet, in humanitarian crisis, is also its curse: everyone can do everything and does not need to be “trained” or to be a “professional”, or to be part of a formal organization.”

Fortunately, there are opportunities for a middle ground. Organizations such as UN-OCHA can become what Patrick Meier terms an “Information DJ,” combining external information with input from local tech-savvy communities. However, Meier too warns that “enthusiasm for new technology doesn’t overtake ethical and humanitarian accountability principles around informed consent, data privacy, and do no harm.”

 

Conclusion:

It’s unclear at this point which information will be shared or even if the map will stay available to the public (or if a bounded and bifurcated public/private method is better suited to the challenge). But what is clear is that the coming challenges to crowdsourcing information for the conflict in South Sudan are not technical, but organizational and ethical.

Interested in learning more on this topic from conflict management experts around the world? Join our online course on the role of technology in addressing conflicts in South Sudan and other parts of the world including Kenya, Syria, Uganda and Myanmar. Apply now to join this January 13 – February 7 course.

Interested in our upcoming course: Technology for Conflict Management and Peacebuilding? Our next class starts Monday, February 18th. Apply today!

This week, Ushahidi announced the launch of the Uchaguzi partnership in preparation for the upcoming March 4th Kenya elections with the aim “to help Kenya have a free, fair, peaceful, and credible general election.” This announcement came after the Standby Task Force (SBTF) sent an email on February 8th informing their community of voluntary crowdmappers that the SBTF has withdrawn from Ushahidi’s map for not meeting their criteria for activation, but still encouraged their community to participate as individuals. The announcement surprised some in the Standby Task Force community, which had been preparing for deployment, but was not entirely unexpected after the SBTF’s decision to focus on deploying to “natural” disasters after their experience in Syria. The official email explained that:

“The things that we use to ensure that the security, ethics and neutrality that the SBTF stands for is protected, that there is a feedback loop (a physical, on-the-ground response to the data processed by Mapsters) and that we do no harm, e.g. we don’t damage existing in-country responses.”

The notion that external support could be counter-productive is an issue worth considering for the voluntary technical community of peacebuilders. The rise of both local crowdmapping and the global volunteer and technical communities have grown together over the past five years after the violence stemming from the last Kenyan elections gave rise to the Ushahidi platform and the Haiti earthquake saw the development of a global volunteer networks to apply them. Since that time, it’s become clear that the ethical questions surrounding application of technology to peacebuilding are as complex as ensuring technical capability, if not more so.

The challenge of protecting the privacy and security of citizen users is constantly grappled with by the organizations responsible for these tools. The upcoming Kenyan election offers a unique case to take stock of where we stand and where we are moving. Which is why it will form the basis for an activation simulation in TC109: Technology for Conflict Management and Peacebuilding. As part of the activity, we’ll be talking with Justine MacKinnon of the Standby Task Force and Rob Baker of Ushahidi. To understand more thoroughly the opportunities for new technologies to empower peacebuilders.

Of course the ethical impact of new technology is not limited to crowdsourcing, which is why we’re also going to discuss the full spectrum of issues in TC109, from using drones to protect human rights with Mark Hanis to using MapBox to display drone strikes on Pakistan in real-time. New technology often presents as many problems as it solves, and application of even the most potentially beneficial new tools without sufficient forethought can always cause more harm than good.

Class starts on Monday. We hope to see you there! Please feel free to tweet @techchange if you have any questions or send us an email: info [at] techchange.org.

Last month, the government of Sudan declared a “cyber-jihad” against youth groups and other anti-government organizations organizing protests in that country. Responding harshly to earlier protests with beatings and arrests, the government of Sudan has now turned its attention to cyberspace with teams managing what the Government calls “online defense operations.” Internet agents infiltrated organizers’ websites in an attempt to determine the identities of leading activists. The result: their Facebook accounts and phone networks compromised, activists spent upwards of 12 days in jail and were subject to the brutality of security forces. Though many have been released, they are now wary of utilizing almost any organizational strategy involving telecommunications. (more…)