Coordination and security

Recent work has shown that the introduction of mobile communications can substantially alter the course of conflict. In Afghanistan and India targeting mobile communications is a central part of the insurgent campaigns. The opposite was true in Iraq. There insurgents instead threatened providers who did not do enough to maintain mobile phone networks. These differences likely arise from two competing effects of mobile communications: they make it easier for antigovernment actors to coordinate collective action, thereby increasing violence, and for pro-government civilians to collaborate with security forces allowing them to more effectively suppress rebels, thereby decreasing violence. To study these competing effects we analyze a formal model of insurgent action in which changes in the communications environment alter both (i) the ability of rebels to impose costs on civilians who cooperate with the government and (ii) the information flow to government forces seeking to suppress rebellion with military action. Our analysis highlights the importance of the threat of information sharing by non-combatants in reducing violence and offers some guidelines for policymakers in thinking about how much to support ICT development in conflict zones. In particular, we show that officials can generate reasonable expectations about whether expanding ICT access will exacerbate conflict or reduce it by assessing the relative gains to both sides from changes in ICT access along several simple dimensions.

[1]  Jacob N. Shapiro The Terrorist's Dilemma , 2013 .

[2]  Raffaello Pantucci The Terrorist's Dilemma: Managing Violent Covert Organizations , 2013 .

[3]  Nils B. Weidmann,et al.  Is the Phone Mightier Than the Sword? Cellphones and Insurgent Violence in Iraq , 2015, International Organization.

[4]  M. Muckian Structural Vulnerabilities of Networked Insurgencies: Adapting to the New Adversary , 2006, The US Army War College Quarterly: Parameters.

[5]  Jacob N. Shapiro,et al.  Can Hearts and Minds Be Bought? The Economics of Counterinsurgency in Iraq , 2008, Journal of Political Economy.

[6]  R. Jensen The Digital Provide: Information (Technology), Market Performance, and Welfare in the South Indian Fisheries Sector , 2007 .

[7]  J. Aker Information from Markets Near and Far: Information Technology, Search Costs and Grain Markets , 2009 .

[8]  Erik Melander,et al.  Introducing the UCDP Georeferenced Event Dataset , 2013 .

[9]  K. Muralidharan,et al.  The Political Economy of Public Sector Absence : Experimental Evidence from Pakistan ⇤ , 2014 .

[10]  Clay Shirky The political power of social media: Technology, the public sphere, and political change , 2011 .

[11]  Jenny C. Aker,et al.  Is Information Power? Using Mobile Phones and Free Newspapers during an Election in Mozambique , 2013, Review of Economics and Statistics.

[12]  J. Aker Information from Markets Near and Far: Mobile Phones and Agricultural Markets in Niger , 2010 .

[13]  J. Kavanagh Liberation technology , 1989 .

[14]  Florian M. Hollenbach,et al.  Technology and Collective Action: The Effect of Cell Phone Coverage on Political Violence in Africa , 2013, American Political Science Review.

[15]  M. Callen,et al.  Institutional Corruption and Election Fraud: Evidence from a Field Experiment in Afghanistan† , 2015 .

[16]  R. Kelly Garrett,et al.  Revolutionary Secrets: Technology’s Role in the South African Anti-Apartheid Movement , 2007 .

[17]  Clay Shirky The Political Power of Social Media , 2010 .