Understanding the Security and Privacy Advice Given to Black Lives Matter Protesters

In 2020, there were widespread Black Lives Matter (BLM) protests in the U.S. Because many attendees were novice protesters, organizations distributed guides for staying safe at a protest, often including security and privacy advice. To understand what advice novice protesters are given, we collected 41 safety guides distributed during BLM protests in spring 2020. We identified 13 classes of digital security and privacy advice in these guides. To understand whether this advice influences protesters, we surveyed 167 BLM protesters. Respondents reported an array of security and privacy concerns, and their concerns were magnified when considering fellow protesters. While most respondents reported being aware of, and following, certain advice (e.g., choosing a strong phone passcode), many were unaware of key advice like using end-to-end encrypted messengers and disabling biometric phone unlocking. Our results can guide future advice and technologies to help novice protesters protect their security and privacy.

[1]  Mark Levine,et al.  Whose tweets? The rhetorical functions of social media use in developing the Black Lives Matter movement. , 2019, The British journal of social psychology.

[2]  Mohammad Maifi Hasan Khan,et al.  Why Do They Do What They Do?: A Study of What Motivates Users to (Not) Follow Computer Security Advice , 2016, SOUPS.

[3]  T. Monahan Counter-surveillance as Political Intervention? , 2006 .

[4]  L. Stewart,et al.  Acting the Part: Examining Information Operations Within #BlackLivesMatter Discourse , 2018, Proc. ACM Hum. Comput. Interact..

[5]  Sunny Consolvo,et al.  "...No one Can Hack My Mind": Comparing Expert and Non-Expert Security Practices , 2015, SOUPS.

[6]  C. E. Jones The Political Repression of the Black Panther Party 1966-1971 , 1988 .

[7]  Gunnar Harboe,et al.  Real-World Affinity Diagramming Practices: Bridging the Paper-Digital Gap , 2015, CHI.

[8]  Daniel Zappala,et al.  Is that you, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging Applications , 2017, SOUPS.

[9]  Kellie Morrissey,et al.  Human Computer Interaction & Health Activism , 2018, CHI Extended Abstracts.

[10]  Weiyu Zhang,et al.  Redefining youth activism through digital technology in Singapore , 2013 .

[11]  D. Lyon Airport Screening, Surveillance, and Social Sorting: Canadian Responses to 9/11 in Context , 2006 .

[12]  Richmond Y. Wong,et al.  Differential Vulnerabilities and a Diversity of Tactics , 2018, Proc. ACM Hum. Comput. Interact..

[13]  M. Angela Sasse,et al.  Employee Rule Breakers, Excuse Makers and Security Champions:: Mapping the risk perceptions and emotions that drive security behaviors , 2015, NSPW.

[14]  M. Jackson #Black Lives Matter , 2014, Communications Biology.

[15]  Elissa M. Redmiles,et al.  How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior , 2016, CCS.

[16]  Claudia A. Evans-Zepeda Technology, Activism, and Social Justice in a Digital Age , 2020 .

[17]  Elissa M. Redmiles,et al.  How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples , 2019, 2019 IEEE Symposium on Security and Privacy (SP).

[18]  Elissa M. Redmiles,et al.  First Steps Toward Measuring the Readability of Security Advice , 2018 .

[19]  Elissa M. Redmiles,et al.  I Think They're Trying to Tell Me Something: Advice Sources and Selection for Digital Security , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[20]  Julie Uldam,et al.  Corporate management of visibility and the fantasy of the post-political: Social media and surveillance , 2016, New Media Soc..

[21]  Laura A. Dabbish,et al.  A Typology of Perceived Triggers for End-User Security and Privacy Behaviors , 2019, SOUPS @ USENIX Security Symposium.

[22]  Katta Spiel,et al.  How to do better with gender on surveys , 2019, Interactions.

[23]  Cormac Herley,et al.  So long, and no thanks for the externalities: the rational rejection of security advice by users , 2009, NSPW '09.

[24]  Victoria Y. Yoon,et al.  From Facebook to the Streets: Russian Troll Ads and Black Lives Matter Protests , 2019, HICSS.

[25]  Munmun De Choudhury,et al.  Social Media Participation in an Activist Movement for Racial Equality , 2016, ICWSM.

[26]  Angela D. R. Smith,et al.  Critical Race Theory for HCI , 2020, CHI.

[27]  Rick Wash,et al.  Who Provides Phishing Training?: Facts, Stories, and People Like Me , 2018, CHI.

[28]  Lorrie Faith Cranor,et al.  Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish , 2007, SOUPS '07.

[29]  Lina Dencik,et al.  Digital Citizenship and Surveillance| The Advent of Surveillance Realism: Public Opinion and Activist Responses to the Snowden Leaks , 2017 .

[30]  Julie Uldam Social media visibility: challenges to activism , 2018 .

[31]  P. Ullrich,et al.  Protesters’ Reactions to Video Surveillance of Demonstrations: Counter-Moves, Security Cultures, and the Spiral of Surveillance and Counter-Surveillance , 2018, Surveillance & Society.

[32]  Victoria Carty,et al.  Social Movements and New Technology: The Dynamics of Cyber Activism in the Digital Age , 2018, The Palgrave Handbook of Social Movements, Revolution, and Social Transformation.

[33]  L. Stewart,et al.  Examining Trolls and Polarization with a Retweet Network , 2018 .

[34]  J. Monaghan,et al.  Private Eyes and Public Order: Policing and Surveillance in the Suppression of Animal Rights Activists in Canada , 2011 .

[35]  Deen Freelon,et al.  Beyond the Hashtags: #Ferguson, #Blacklivesmatter, and the Online Struggle for Offline Justice , 2016 .

[36]  Rick Wash,et al.  Stories as informal lessons about security , 2012, SOUPS.

[37]  Sunny Consolvo,et al.  152 Simple Steps to Stay Safe Online: Security Advice for Non-Tech-Savvy Users , 2017, IEEE Security & Privacy.

[38]  Max Gedig “‘Woke up with Death Every Morning.’ Surveillance Experiences of Black Panther Party Activists.” , 2018 .

[39]  W. Peace : Threatening Anthropology: McCarthyism and the FBI's Surveillance of Activist Anthropologists , 2005 .

[40]  Hao Peng,et al.  Event-Driven Analysis of Crowd Dynamics in the Black Lives Matter Online Social Movement , 2019, WWW.

[41]  Sunny Consolvo,et al.  The Wi-Fi privacy ticker: improving awareness & control of personal information exposure on Wi-Fi , 2010, UbiComp.

[42]  James Nicholson,et al.  "If It's Important It Will Be A Headline": Cybersecurity Information Seeking in Older Adults , 2019, CHI.

[43]  Clayton A. Davis,et al.  The social media response to Black Lives Matter: how Twitter users interact with Black Lives Matter through hashtag use , 2017 .

[44]  Oscar H. Gandy,et al.  IAMCR Data Mining : Gandy 7 / 11 / 2002 1 Data mining and surveillance in the post-9 . 11 environment , 2002 .

[45]  L. Whitehorn,et al.  Human Rights in the United States: The Unfinished Story of Political Prisoners and Cointelpro , 2001 .

[46]  Daniel J. Solove,et al.  'I've Got Nothing to Hide' and Other Misunderstandings of Privacy , 2007 .

[47]  Huey p. Newton War Against the Panthers : A Study of Repression in America , 1980 .

[48]  Simon Parkin,et al.  Finding Security Champions in Blends of Organisational Culture , 2017 .

[49]  Dennis McCafferty,et al.  Activism vs. slacktivism , 2011, Commun. ACM.

[50]  Karen Holtzblatt,et al.  Contextual design , 1997, INTR.

[51]  F. Cain The origins of political surveillance in Australia , 1983 .

[52]  J. Noakes,et al.  “What if she's from the FBI?” The effects of covert forms of social control on social movements , 2008 .

[53]  Elissa M. Redmiles,et al.  A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web , 2020, USENIX Security Symposium.

[54]  John Peloza,et al.  The Nature of Slacktivism: How the Social Observability of an Initial Act of Token Support Affects Subsequent Prosocial Action , 2014 .

[55]  Gary T. Marx,et al.  Thoughts on a Neglected Category of Social Movement Participant: The Agent Provocateur and the Informant , 1974, American Journal of Sociology.

[57]  Vince Bruno,et al.  Why employees share information security advice? Exploring the contributing factors and structural patterns of security advice sharing in the workplace , 2017, Comput. Hum. Behav..

[58]  Jillian C. York,et al.  Social Media and the Activist Toolkit: User Agreements, Corporate Interests, and the Information Infrastructure of Modern Social Movements , 2012 .

[59]  Dean Wilson,et al.  Video Activism and the ambiguities of counter-surveillance , 2010 .

[60]  Steven Furnell,et al.  Selecting security champions , 2011 .

[61]  Alberto Hermida,et al.  Twitter and video activism as tools for counter-surveillance: the case of social protests in Spain , 2018 .

[62]  Yu-Hao Lee,et al.  Does slacktivism hurt activism?: the effects of moral balancing and consistency in online activism , 2013, CHI.

[63]  A. Acquisti,et al.  Beyond the Turk: Alternative Platforms for Crowdsourcing Behavioral Research , 2016 .

[64]  Kate Starbird,et al.  Disinformation’s spread: bots, trolls and all of us , 2019, Nature.

[65]  Alvin B. Tillery What Kind of Movement is Black Lives Matter? The View from Twitter , 2019, The Journal of Race, Ethnicity, and Politics.

[66]  Aaron D. Shaw,et al.  Black Lives Matter in Wikipedia: Collective Memory and Collaboration around Online Social Movements , 2016, CSCW.

[67]  Rick Wash,et al.  Organization Interfaces—collaborative computing General Terms , 2022 .

[68]  Matthew Smith,et al.  Replication: No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert Security Practices and Advice , 2019, SOUPS @ USENIX Security Symposium.

[69]  Charla M. Burnett,et al.  Scaling Social Movements Through Social Media: The Case of Black Lives Matter , 2018, Social Media + Society.

[70]  Konstantin Beznosov,et al.  On the Impact of Touch ID on iPhone Passcodes , 2015, SOUPS.

[71]  Sarah J. Jackson,et al.  #HashtagActivism: Networks of Race and Gender Justice , 2020 .