Skip to main content

Egypt: the Influence of Facebook Events and Groups

Within the dynamic and expansive electronic media landscape in Egypt, Facebook became widely used by Egyptian citizens for different reasons and in several occasions, especially when it comes to shape the public opinion in opposition to the Egyptian government.
 
For example, the Egyptian government recently announced, through the ministry of communication, a “Fair Usage Policy (FUB)” to be implemented in Egypt, aiming to limit the bandwidth consumed by internet users and determine specific downloadable amount. This policy sparked a heated protest from internet users and bloggers in Egypt causing several reactions, which were captured earlier at Global Voices Online by Tarek Amr and Marwa Rakha
This protest was reflected in the amount of initiatives launched on the social networking website Facebook asking to stop the policy, raise court cases against ISPs, stop paying for internet fees and to protest in front of ISP offices in Egypt. 

All these initiatives where launched through Facebook Events and Groups, as well as on the Egyptian blogosphere.
Following the protest of Egyptian Internet users and bloggers, the minister of communication was “forced” to reverse its plan. As a result, the Fair Usage Policy (FUB) will only be applied to new internet users and for only two months. Which is considered as a positive step for the netizens in general.
It should also be mentioned that one of the most successful story of the Egyptian online activism was achieved during the case of Emad Al Kabir, a microbus driver, who was tortured and sodomised by police - who videotaped the scene on tape. After the release of the video of torture on blogs and video sharing websites and due to public opinion and press media pressure, the officer responsible for torturing Emad Al Kabir was sentenced to three years in prison.
Although the Egyptian government is striving to control online media and arrest internet users based on their web activism, the Egyptian netizens, however, are able to achieve their demands and shape the public opinion.
* Published on Global Voices Online

Popular posts from this blog

رحلتي في التعافي على مدار ٤ سنين

مفيش اي حد حقيقي هيساعدك غير نفسك.. صدقني مهما كان القاع مظلم وحاسس الحياة متهالكة احضن نفسك طمن نفسك وامسك ايدك خطوات صغيرة. ده عبارة عن مجموعة صور كل واحد بيحكي رحلتي في التعافي والصحة النفسية والبدنية على مدار اخر ٤ سنين عملت فيهم ٣ عمليات جراحية منهم اثنين في رجلي اليمين كان جالي كذا تمزق في الغضروف، واستئصال الزايدة لانها كانت على وشك تعمل بووم. كنت بعارف جامد مع الاكتئاب والتروما، وحالتي النفسية كانت متهالكة تماما ومعاها جسمي وروحي... [قضيت فترات بصلح جسمي] وزني وصل ١٢٥ كيلو على مشاكل غضروف وصدرية وكوليسترول، كنت دبدوب بكرش ثري دي بسند عليه الكيبورد والشاي. المهم، بدأت رحلتي في التعافي خطوات صغيرة، تكريس كل وقتي في تحسين وتطوير حالتي النفسية والبدنية ومعاها الروحانية.. مزيج من الرسم، والتليون، والرقص، والطبلة، والملاكمة، وتاي تشي، وسكاي دايفينج انا فتحت باب الطيارة ونطيت كذا مرة، وسباحة، وركوب عجل يوميا، وجري، وتسلق..  بس حقيقي من كل التجارب دي اكتر حاجة دخلت فيها بقوة ومزاج هي رياضة الكاليسثنكس، واهم حاجة عملتها اني اخدت التعافي بدوام كامل واقصى التزام اقدر عليه. مكنش ...

Few words on Encryption and Egypt

In dangerous times - whether during conflict, unrest, or disinformation - encryption isn’t a luxury. It’s a life-saving layer of security for individuals and societies. Weakening it doesn’t make us safer; it makes everyone more vulnerable. And no one is safe until everyone is safe. A few words on #encryption and #Egypt's context: 1. On decryption assistance mandates and Egypt’s context Decryption assistance mandates - as in forcing companies or individuals to provide access to encrypted data - don’t really function in practice, whether in Egypt or elsewhere. In Egypt’s case, we don’t see explicit legal mechanisms for ‘lawful access’ like those proposed in Western debates, but we do see functional equivalents through other means: broad surveillance powers, vague national security clauses, pressure on service providers, infrastructure ownership by the state, and granting isps and mobile operators secret licenses that gives the security full access to backend. There’s no clear overs...