The same considerations apply to communication among those who resist an oppressor. With a one-directional means of communication, resistance leaders can certainly get their messages to supporters with minimum effort — but these leaders become quite vulnerable to both repression and cooption. Even more importantly, without dialogue, the resistance cannot take into account the views of current and possible supporters, and cannot foster the capacities of others to use skills and take initiatives.
If the only means of communication in a society were interactive, network systems — face-to-face discussion, telephone, short-wave and CB radio, and computer networks — then an aggressor or oppressor would have the greatest difficulty in controlling the population. Network communication technologies do not by themselves eliminate hierarchy and exploitation, but they do aid resistance. The telephone can be used to issue orders, but it is far too labour-intensive for controlling large populations. Also, the subordinate can always talk back.
James C. Scott’s idea of public and hidden transcripts is relevant here.[36] In situations of domination, such as slavery, aristocrat-peasant relations and landlord-tenant relations, the public record or transcript tells the story of the dominators. There is also a hidden transcript in which the side of the oppressed is revealed. According to Scott, the oppressed are well aware of their oppression: the concept of false consciousness is false. The hidden transcript can be a rehearsal for a challenge to powerholders, a challenge that can develop quickly when the mechanisms holding back resistance are weakened.
In the modern world, mass media are a form of public transcript. The mass media under dictatorships omit the perspective of the oppressed, who therefore must use other media — covert discussions, graffiti, leaflets and clandestine radio, as well as symbolic communication at funerals, concerts and other “legitimate” events — to share experiences. This also applies to some aspects of life in societies with representative government: for example, police treatment of stigmatised minorities, or oppression and alienation in working life, are seldom portrayed in the mass media. Thus, mass media are useful tools for dominators, whereas network media are useful for developing the voices of the weak.
Galtung’s “great chain of nonviolence” provides another way to explain the advantage of network media for nonviolent resistance. With mass media, the chance of a chain of reasonable speech situations between the oppressed and the oppressors is limited. With network media, the chance is increased, and the denser the interlinkings of the communication network, the greater the ease of dialogical communication.
Several of the examples given in this chapter support the conclusion that mass media are selectively useful for oppressors. For example, control over the mass media was crucial to government and military control in the shutting down and censoring of the press during the Emergency in India, in the cutting off of electronic communication during the military coup in Poland and throughout the continuing occupation of East Timor. Similarly, control over the mass media was a crucial factor in the Fiji coups and in the Shah’s Iran. But in these two cases the opposition had access to alternative sources of information, via short-wave radio in Fiji and cassette tapes in Iran.
On the other hand, some of the cases seem to contradict the idea that mass media are selectively useful for oppressors. Radio broadcasts were vital to nonviolent resistance in the Algerian generals’ revolt, the Czechoslovak resistance to the Warsaw Pact invasion, and the collapse of the East German communist regime. In each of these cases, a one-directional medium served a nonviolent resistance to repression. What made this possible was a short-term congruence between those who controlled the medium and a dialogue-based mass movement. French conscripts in Algeria, through their own experiences and interactions, were already predisposed to refuse cooperation. De Gaulle’s broadcast made them aware that they were supported by the French government and the French people.
In the case of Czechoslovakia, the liberalisation of communist rule during 1968 was a mass-based process that challenged the normal control — including control of the media — by those following the Soviet line. The Czechoslovak radio system was temporarily a powerful force for the nonviolent resisters, in a situation where there was a high intensity of face-to-face dialogue, both among the population and between Czechoslovaks and invading soldiers. It is also worth noting that capture of the radio network by the Soviet army decisively ended the active phase of the resistance.
In East Germany in 1989, the Communist Party retained control over the local mass media. West German radio and television provided a window into alternative views, including news of events in East Germany itself, that fed into the protest by East Germans, which itself was based on a commonality of experience.
These cases suggest that one-directional media can sometimes be useful to a nonviolent movement against repression, but only under certain conditions. There must be a strong underlying unity of purpose, itself the outgrowth of common experience and dialogue. Also, the one-directional media are used in a challenging mode, against an even more pervasive or powerful system of persuasion or control.
This conclusion can be summarised by saying that one-directional media are selectively useful for oppression and network media are selectively useful for resistance to oppression.[37] Technologies are not neutral, but nor are they tied to certain uses only. Technologies are stamped by the social groups and goals involved in their creation and application. But the uses of technologies are not fixed by their creators: users can adapt them to some extent. For example, the US military originally set up the computer network that later evolved into the Internet which has become one of the most participatory media available.
Generally speaking, the greater the opportunity for users to choose, use and modify the technology, the greater its potential for fostering popular participation and the more likely it is to be useful for nonviolent action against repression. Interactive network media can aid nonviolent action most of all when they are generally accessible, easy to use, difficult for dominators to control, and when they encourage widespread development of appropriate skills.
6. SURVIVAL
For a society to engage effectively in a struggle, whether violent or nonviolent, it must be able to maintain the necessities of life, such as food and shelter. In industrialised societies, many important systems, including agriculture, energy, water, transport and housing, have become highly vulnerable to either military attack or sabotage.
Take the electricity system, for example: a few bombs or just some calculated breaches of proper procedures could put large generating plants and transmission stations out of action. If computer programs that ensure a balance between electricity supply and demand were intentionally altered, a system breakdown could easily be triggered.
Fuel supplies are only somewhat more secure. Oil refineries are perhaps the most vulnerable point: a few knowledgable workers could put them out of commission. Oil pipelines and ocean tankers are also easy targets for determined saboteurs.[1]
Water supplies for many cities are quite vulnerable to attack. All it would take is destruction of a few large dams or poisoning of the water supply.
Food supplies are far more vulnerable to disruption than just a century ago. Production is now heavily dependent on fertilisers and pesticides; factories producing these could be put out of action. Biologically sophisticated saboteurs might be able to spread pests and diseases to major crop areas. Few people still live on the land; city populations depend on shipment of large quantities of food from agricultural areas.
36.
James C. Scott,
37.
In the appendix, this terminology is explained in the context of theories of technology.
1.
On energy vulnerability see Wilson Clark and Jake Page,