skip to main content
10.1145/3411764.3445061acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article
Open Access
Honorable Mention

Understanding the Security and Privacy Advice Given to Black Lives Matter Protesters

Published:07 May 2021Publication History

ABSTRACT

In 2020, there were widespread Black Lives Matter (BLM) protests in the U.S. Because many attendees were novice protesters, organizations distributed guides for staying safe at a protest, often including security and privacy advice. To understand what advice novice protesters are given, we collected 41 safety guides distributed during BLM protests in spring 2020. We identified 13 classes of digital security and privacy advice in these guides. To understand whether this advice influences protesters, we surveyed 167 BLM protesters. Respondents reported an array of security and privacy concerns, and their concerns were magnified when considering fellow protesters. While most respondents reported being aware of, and following, certain advice (e.g., choosing a strong phone passcode), many were unaware of key advice like using end-to-end encrypted messengers and disabling biometric phone unlocking. Our results can guide future advice and technologies to help novice protesters protect their security and privacy.

Skip Supplemental Material Section

Supplemental Material

References

  1. Monica Anderson, Skye Toor, Lee Rainie, and Aaron Smith. 2018. An analysis of #BlackLivesMatter and other Twitter hashtags related to political or social issues. Pew Research Center (2018).Google ScholarGoogle Scholar
  2. Ahmer Arif, Leo Graiden Stewart, and Kate Starbird. 2018. Acting the part: Examining information operations within #BlackLivesMatter discourse. Proc. ACM Hum.-Comput. Interact. 2 (2018).Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Ingolf Becker, Simon Parkin, and M. Angela Sasse. 2017. Finding security champions in blends of organisational culture. In Proc. USEC.Google ScholarGoogle ScholarCross RefCross Ref
  4. Odette Beris, Adam Beautement, and M. Angela Sasse. 2015. Employee rule breakers, excuse makers and security champions: Mapping the risk perceptions and emotions that drive security behaviors. In Proc. NSPW.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Black Lives Matter. 2020. About. https://blacklivesmatter.com/about/Google ScholarGoogle Scholar
  6. Black Lives Matter. 2020. Homepage. https://blacklivesmatter.com/Google ScholarGoogle Scholar
  7. Black Lives Matter Belfast. 2020. Safety guide. Twitter image. https://pbs.twimg.com/media/EZ1Onp7XkAACfFN.png.Google ScholarGoogle Scholar
  8. Black Lives Matter Seattle-King County. 2020. Safety while protesting: Protesting & supporting protests safely. Posted on Seattle Central College’s Library. https://libguides.seattlecentral.edu/Staying_Safer_While_Rising_Up.Google ScholarGoogle Scholar
  9. Maia J. Boyd, Jamar L. Sullivan Jr., Marshini Chetty, and Blase Ur. 2021. Supplementary Materials for Understanding the Security and Privacy Advice Given to Black Lives Matter Protesters. https://www.blaseur.com/papers/chi21-blm-appendix.pdfGoogle ScholarGoogle Scholar
  10. Larry Buchanan, Quoctrung Bui, and Jugal K. Patel. 2020. Black Lives Matter may be the largest movement in U.S. history. New York Times. https://www.nytimes.com/interactive/2020/07/03/us/george-floyd-protests-crowd-size.htmlGoogle ScholarGoogle Scholar
  11. Karoline Busse, Julia Schäfer, and Matthew Smith. 2019. Replication: No one can hack my mind. Revisiting a study on expert and non-expert security practices and advice. In Proc. SOUPS.Google ScholarGoogle Scholar
  12. Frank Cain. 1983. The Origins of Political Surveillance in Australia. Angus & Robertson Sydney.Google ScholarGoogle Scholar
  13. Victoria Carty and Francisco G. Reynoso Barron. 2019. Social movements and new technology: The dynamics of cyber activism in the digital age. In The Palgrave Handbook of Social Movements, Revolution, and Social Transformation. Springer, 373–397.Google ScholarGoogle Scholar
  14. Garrett Chase. 2017. The Early History of the Black Lives Matter Movement, and the Implications Thereof. Nevada Law Journal 18(2017), 1091.Google ScholarGoogle Scholar
  15. Ivan Cherapau, Ildar Muslukhov, Nalin Asanka, and Konstantin Beznosov. 2015. On the impact of Touch ID on iPhone passcodes. In Proc. SOUPS.Google ScholarGoogle Scholar
  16. Ward Churchill. 2001. To disrupt, discredit and destroy. Liberation, Imagination, and the Black Panther Party (2001), 93.Google ScholarGoogle Scholar
  17. Ward Churchill and Jim Vander Wall. 1990. The COINTELPRO papers. Boston: South End (1990).Google ScholarGoogle Scholar
  18. Sunny Consolvo, Jaeyeon Jung, Ben Greenstein, Pauline Powledge, Gabriel Maganis, and Daniel Avrahami. 2010. The Wi-Fi Privacy Ticker: Improving awareness & control of personal information exposure on Wi-Fi. In Proc. UbiComp.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Joseph Cox. 2017. Matt Mitchell is arming underserved communities with anti-surveillance tools. Vice. https://www.vice.com/en_us/article/ezaane/matt-mitchell-is-arming-underserved-communities-with-anti-surveillance-toolsGoogle ScholarGoogle Scholar
  20. David Cunningham and John A. Noakes. 2008. What if she’s from the FBI? The effects of covert forms of social control on social movements. In Surveillance and Governance: Crime Control and Beyond (Sociology of Crime Law and Deviance). Emerald Group Publishing Limited, 175–197.Google ScholarGoogle Scholar
  21. Duy Dang-Pham, Siddhi Pittayachawan, and Vince Bruno. 2017. Why employees share information security advice? Exploring the contributing factors and structural patterns of security advice sharing in the workplace. Computers in Human Behavior 67 (2017), 196–206.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Sauvik Das, Laura A. Dabbish, and Jason I. Hong. 2019. A typology of perceived triggers for end-user security and privacy behaviors. In Proc. SOUPS.Google ScholarGoogle Scholar
  23. Susie Day and Laura Whitehorn. 2001. Human rights in the United States: The unfinished story of political prisoners and COINTELPRO. New Political Science 23, 2 (2001), 285–297.Google ScholarGoogle ScholarCross RefCross Ref
  24. Munmun De Choudhury, Shagun Jhaver, Benjamin Sugar, and Ingmar Weber. 2016. Social media participation in an activist movement for racial equality. In Proc. ICWSM.Google ScholarGoogle Scholar
  25. Lina Dencik and Jonathan Cable. 2017. The advent of surveillance realism: Public opinion and activist responses to the Snowden leaks. International Journal of Communication 11 (2017), 763–781.Google ScholarGoogle Scholar
  26. Mallika Dutt and Nadia Rasul. 2014. Raising digital consciousness: An analysis of the opportunities and risks facing human rights activists in a digital age. Sur - International Journal on Human Rights 20 (2014), 427.Google ScholarGoogle Scholar
  27. Ugo Etudo, Victoria Y. Yoon, and Niam Yaraghi. 2019. From Facebook to the streets: Russian troll ads and Black Lives Matter protests. In Proc. HICSS.Google ScholarGoogle ScholarCross RefCross Ref
  28. Michael Fagan and Mohammad Maifi Hasan Khan. 2016. Why do they do what they do?: A study of what motivates users to (not) follow computer security advice. In Proc. SOUPS.Google ScholarGoogle Scholar
  29. Deen Freelon, Charlton D. McIlwain, and Meredith D. Clark. 2016. Beyond the hashtags: #Ferguson, #Blacklivesmatter, and the online struggle for offline justice. https://cmsimpact.org/wp-content/uploads/2016/03/beyond_the_hashtags_2016.pdfGoogle ScholarGoogle Scholar
  30. Trevor Gabriel and Steven Furnell. 2011. Selecting security champions. Computer Fraud & Security 2011, 8 (2011), 8–12.Google ScholarGoogle ScholarCross RefCross Ref
  31. Oscar H. Gandy. 2007. Data mining and surveillance in the post 9/11 environment. The Surveillance Studies Reader(2007), 147–157.Google ScholarGoogle Scholar
  32. Max Gedig. 2018. “Woke up with death every morning.” Surveillance experiences of Black Panther Party activists. In Surveillance, Race, Culture. Springer, 267–281.Google ScholarGoogle Scholar
  33. Gunnar Harboe and Elaine M. Huang. 2015. Real-world affinity diagramming practices: Bridging the paper-digital gap. In Proc. CHI.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Cormac Herley. 2009. So long, and no thanks for the externalities: The rational rejection of security advice by users. In Proc. NSPW.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Alberto Hermida and Víctor Hernández-Santaolalla. 2018. Twitter and video activism as tools for counter-surveillance: The case of social protests in Spain. Information, Communication & Society 21, 3 (2018), 416–433.Google ScholarGoogle ScholarCross RefCross Ref
  36. Kris Holt. 2020. 11 Ways To Protect Your Privacy While Protesting. Forbes. https://www.forbes.com/sites/krisholt/2020/06/07/privacy-black-lives-matter-protest-george-floyd/#70d382ce1801.Google ScholarGoogle Scholar
  37. Karen Holtzblatt and Hugh Beyer. 1997. Contextual Design: Defining Customer-Centered Systems. Elsevier.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Jelani Ince, Fabio Rojas, and Clayton Davis. 2017. The social media response to Black Lives Matter: How Twitter users interact with Black Lives Matter through hashtag use. Ethnic and Racial Studies 40 (2017), 1814–1830.Google ScholarGoogle ScholarCross RefCross Ref
  39. Iulia Ion, Rob Reeder, and Sunny Consolvo. 2015. “... no one can hack my mind”: Comparing expert and non-expert security practices. In Proc. SOUPS.Google ScholarGoogle Scholar
  40. Sarah J. Jackson, Moya Bailey, and Brooke Foucault Welles. 2020. # HashtagActivism: Networks of Race and Gender Justice. MIT Press.Google ScholarGoogle Scholar
  41. Charles E. Jones. 1988. The political repression of the Black Panther Party 1966-1971: The case of the Oakland Bay Area. Journal of Black Studies 18, 4 (1988), 415–434.Google ScholarGoogle ScholarCross RefCross Ref
  42. Esther Kim. 2020. Protesting tips for being safe and strong + #blacklivesmatter. Instagram post. https://www.instagram.com/p/CA6XErjhp2c/.Google ScholarGoogle Scholar
  43. Ken Klippenstein. 2019. FBI strategy guide FY2018-20 and threat guidance for racial extremists. https://www.scribd.com/document/421166393/FBI-Strategy-Guide-FY2018-20-and-Threat-Guidance-for-Racial-ExtremistsGoogle ScholarGoogle Scholar
  44. Kirk Kristofferson, Katherine White, and John Peloza. 2014. The nature of slacktivism: How the social observability of an initial act of token support affects subsequent prosocial action. Journal of Consumer Research 40, 6 (2014), 1149–1166.Google ScholarGoogle ScholarCross RefCross Ref
  45. Yu-Hao Lee and Gary Hsieh. 2013. Does slacktivism hurt activism? The effects of moral balancing and consistency in online activism. In Proc. CHI.Google ScholarGoogle Scholar
  46. David Lyon. 2006. Airport screening, surveillance, and social sorting: Canadian responses to 9/11 in context. Canadian Journal of Criminology and Criminal Justice 48, 3 (2006), 397–411.Google ScholarGoogle ScholarCross RefCross Ref
  47. David Lyon. 2007. Surveillance, security and social sorting: Emerging research priorities. International Criminal Justice Review 17, 3 (2007), 161–170.Google ScholarGoogle ScholarCross RefCross Ref
  48. Gary Marx. 1974. Thoughts on a neglected category of social movement participant: The agent provocateur and the informant. Amer. J. Sociology 80(1974).Google ScholarGoogle Scholar
  49. Alexandra Mateescu, Douglas Brunton, Alex Rosenblat, Desmond Patton, Zachary Gold, and danah boyd. 2015. Social media surveillance and law enforcement. Data & Civil Rights 27(2015), 2015–2027.Google ScholarGoogle Scholar
  50. Dennis McCafferty. 2011. Activism vs. slacktivism. Commun. ACM 54, 12 (2011), 17–19.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. John G McNutt. 2018. Technology, Activism, and Social Justice in a Digital Age. Oxford University Press.Google ScholarGoogle Scholar
  52. Torin Monahan. 2006. Counter-surveillance as political intervention?Social Semiotics 16, 4 (2006), 515–534.Google ScholarGoogle Scholar
  53. Marcia Mundt, Karen Ross, and Charla M. Burnett. 2018. Scaling social movements through social media: The case of Black Lives Matter. Social Media + Society 4, 4 (2018).Google ScholarGoogle Scholar
  54. Deborah Netburn. 2012. YouTube’s new face-blurring tool designed to protect activists. Los Angeles Times. https://www.latimes.com/business/la-xpm-2012-jul-18-la-fi-tn-youtube-face-blurring-20120718-story.htmlGoogle ScholarGoogle Scholar
  55. Huey P. Newton. 1980. War Against the Panthers: A Study of Repression in America. Vol. 1980. University of California, Santa Cruz.Google ScholarGoogle Scholar
  56. James Nicholson, Lynne Coventry, and Pamela Briggs. 2019. “If it’s important it will be a headline” Cybersecurity information seeking in older adults. In Proc. CHI.Google ScholarGoogle Scholar
  57. Ihudiya Finda Ogbonnaya-Ogburu, Angela D.R. Smith, Alexandra To, and Kentaro Toyama. 2020. Critical race theory for HCI. In Proc. CHI.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Eyal Peer, Laura Brandimarte, Sonam Somat, and Alessandro Acquisti. 2017. Beyond the Turk: Alternative platforms for crowdsourcing behavioral research. In Journal of Experimental Social Psychology.Google ScholarGoogle Scholar
  59. Hao Peng, Ceren Budak, and Daniel M. Romero. 2019. Event-driven analysis of crowd dynamics in the Black Lives Matter online social movement. In Proc. WWW.Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. James Pierce, Sarah Fox, Nick Merrill, and Richmond Wong. 2018. Differential vulnerabilities and a diversity of tactics: What toolkits teach us about cybersecurity. Proc. ACM Hum.-Comput. Interact. 2 (Nov. 2018).Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Prolific. 2020. Quickly find research participants you can trust. https://www.prolific.co/Google ScholarGoogle Scholar
  62. Emilee Rader, Rick Wash, and Brandon Brooks. 2012. Stories as informal lessons about security. In Proc. SOUPS.Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Elissa M. Redmiles, Sean Kross, and Michelle L. Mazurek. 2016. How I learned to be secure: A census-representative survey of security advice sources and behavior. In Proc. CCS.Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Elissa M. Redmiles, Sean Kross, and Michelle L. Mazurek. 2019. How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples. In Proc. IEEE S&P.Google ScholarGoogle ScholarCross RefCross Ref
  65. Elissa M. Redmiles, Amelia R. Malone, and Michelle L. Mazurek. 2016. I think they’re trying to tell me something: Advice sources and selection for digital security. In Proc. IEEE S&P.Google ScholarGoogle ScholarCross RefCross Ref
  66. Elissa M. Redmiles, Miraida Morales, Lisa Maszkiewicz, Rock Stevens, Everest Liu, Dhruv Kuchhal, and Michelle L. Mazurek. 2018. First steps toward measuring the readability of security advice. In Proc. ConPro.Google ScholarGoogle Scholar
  67. Elissa M. Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Sean Kross, Miraida Morales, Rock Stevens, and Michelle L. Mazurek. 2020. A comprehensive quality evaluation of security and privacy advice on the web. In Proc. USENIX Security.Google ScholarGoogle Scholar
  68. Robert W. Reeder, Iulia Ion, and Sunny Consolvo. 2017. 152 simple steps to stay safe online: Security advice for non-tech-savvy users. IEEE Security & Privacy 15, 5 (2017), 55–64.Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Katelyn Ringrose and Divya Ramjee. 2020. Watch where you walk: Law enforcement surveillance and protester privacy. California Law Review 11, 349 (2020).Google ScholarGoogle Scholar
  70. Ellen Schrecker. 2004. Threatening Anthropology: McCarthyism and the FBI’s Surveillance of Activist Anthropologists. Duke University Press.Google ScholarGoogle Scholar
  71. Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason Hong, and Elizabeth Nunge. 2007. Anti-phishing Phil: The design and evaluation of a game that teaches people not to fall for phish. In Proc. SOUPS.Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Daniel J. Solove. 2007. I’ve got nothing to hide and other misunderstandings of privacy. San Diego L. Rev. 44(2007), 745.Google ScholarGoogle Scholar
  73. Alice Speri. 2015. 1 2014 8:14 Silent vigil alert #NMOS14. The Intercept. https://assets.documentcloud.org/documents/2178934/1-2014-8-14-silent-vigil-alert-nmos14.pdfGoogle ScholarGoogle Scholar
  74. Katta Spiel, Oliver L. Haimson, and Danielle Lottridge. 2019. How to do better with gender on surveys: A guide for HCI researchers. Interactions 26, 4 (2019), 62–65.Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. Kate Starbird. 2019. Disinformation’s spread: Bots, trolls and all of us. Nature 571, 7766 (2019), 449–450.Google ScholarGoogle Scholar
  76. Leo Graiden Stewart, Ahmer Arif, A. Conrad Nied, Emma S. Spiro, and Kate Starbird. 2017. Drawing the lines of contention: Networked frame contests within# BlackLivesMatter discourse. Proc. ACM Hum.-Comput. Interact 1 (2017).Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. Leo Graiden Stewart, Ahmer Arif, and Kate Starbird. 2018. Examining trolls and polarization with a retweet network. In Proc. MIS2.Google ScholarGoogle Scholar
  78. Reem Talhouk, Kellie Morrissey, Sarah Fox, Nadia Pantidi, Emma Simpson, Lydia Emma Michie, and Madeline Balaam. 2018. Human computer interaction & health activism. In Proc. CHI EA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. Alvin B. Tillery. 2019. What kind of movement is Black Lives Matter? The view from Twitter. Journal of Race, Ethnicity and Politics 4, 2 (2019), 297–323.Google ScholarGoogle ScholarCross RefCross Ref
  80. Twitter. 2020. Protesting safely. Twitter image. https://pbs.twimg.com/media/EZZ0-koUEAAazF3.jpg.Google ScholarGoogle Scholar
  81. Marlon Twyman, Brian C. Keegan, and Aaron Shaw. 2017. Black Lives Matter in Wikipedia: Collective memory and collaboration around online social movements. In Proc. CSCW.Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. Julie Uldam. 2016. Corporate management of visibility and the fantasy of the post-political: Social media and surveillance. New Media & Society 18, 2 (2016), 201–219.Google ScholarGoogle ScholarCross RefCross Ref
  83. Julie Uldam. 2018. Social media visibility: challenges to activism. Media, Culture & Society 40, 1 (2018), 41–58.Google ScholarGoogle ScholarCross RefCross Ref
  84. Peter Ullrich and Philipp Knopp. 2018. Protesters’ reactions to video surveillance of demonstrations: Counter-moves, security cultures, and the spiral of surveillance and counter-surveillance. Surveillance & Society(2018).Google ScholarGoogle Scholar
  85. Elham Vaziripour, Justin Wu, Mark O’Neill, Jordan Whitehead, Scott Heidbrink, Kent Seamons, and Daniel Zappala. 2017. Is that you, Alice? A usability study of the authentication ceremony of secure messaging applications. In Proc. SOUPS.Google ScholarGoogle Scholar
  86. Kevin Walby and Jeffrey Monaghan. 2011. Private eyes and public order: Policing and surveillance in the suppression of animal rights activists in Canada. Social Movement Studies 10, 1 (2011), 21–37.Google ScholarGoogle ScholarCross RefCross Ref
  87. Rick Wash. 2010. Folk models of home computer security. In Proc. SOUPS.Google ScholarGoogle ScholarDigital LibraryDigital Library
  88. Rick Wash and Molly M. Cooper. 2018. Who provides phishing training? Facts, stories, and people like me. In Proc. CHI.Google ScholarGoogle Scholar
  89. Denise J. Wilkins, Andrew G. Livingstone, and Mark Levine. 2019. Whose tweets? The rhetorical functions of social media use in developing the Black Lives Matter movement. British Journal of Social Psychology 58, 4 (2019), 786–805.Google ScholarGoogle ScholarCross RefCross Ref
  90. Dean Wilson and Tanya Serisier. 2010. Video activism and the ambiguities of counter-surveillance. Surveillance & Society 8, 2 (2010), 166–180.Google ScholarGoogle ScholarCross RefCross Ref
  91. William Lafi Youmans and Jillian C. York. 2012. Social media and the activist toolkit: User agreements, corporate interests, and the information infrastructure of modern social movements. Journal of Communication 62, 2 (2012), 315–329.Google ScholarGoogle ScholarCross RefCross Ref
  92. Mihir Zaveri. 2020. ‘I need people to hear my voice’: Teens protest racism. New York Times. https://www.nytimes.com/2020/06/23/us/teens-protest-black-lives-matter.htmlGoogle ScholarGoogle Scholar
  93. Weiyu Zhang. 2013. Redefining youth activism through digital technology in Singapore. International Communication Gazette(2013).Google ScholarGoogle Scholar

Index Terms

  1. Understanding the Security and Privacy Advice Given to Black Lives Matter Protesters
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              CHI '21: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems
              May 2021
              10862 pages
              ISBN:9781450380966
              DOI:10.1145/3411764

              Copyright © 2021 Owner/Author

              Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 7 May 2021

              Check for updates

              Qualifiers

              • research-article
              • Research
              • Refereed limited

              Acceptance Rates

              Overall Acceptance Rate6,199of26,314submissions,24%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format