What We Did
Empowering Civic Engagement Through Digital Technologies
A key portion of our research was
in internet cafes. These points of internet accesswere widely accessible in each city, though mainly laid out as panopticons, where anyone standing in themiddle of the room could monitor the activities of all users. This made it difﬁcult to browse freely and toreview background processes. Nonetheless, we were able to document types of programs, speed, andinformation accessed.
, we documented our travels toverify the reliability of maps throughout the country. These maps werethen contributed to Open Street Maps, an increasingly popular toolsince the response to Cyclone Nargis in 2008 proved a need for freeinformation to aid development and disaster response.
of alternative media and censorship informationgave us insights into the extent of technical restrictions as well asaccess to training materials.
was pivotal toconduct our research safely. We used digital paper and, for calls andinformation storage, beta-tested
, a secure mobile phonebuilt on an open source operating system.
In downtown Yangon/Rangoon Dd
held an informational discussion
titled"Open Journalism" for a group of 10 journalists and bloggers. This wasmodeled after the Dd new media literacytraining with a speciﬁc focus on security-speciﬁc questions posed by participants.
At this training and around thecountry, we
disseminated new medialiteracy materials
in English & Burmese.These included e-books, short ﬁlms,public service announcements,documentary ﬁlms, human rights-orientedfeature ﬁlms, security & circumventiontechnology programs and manuals forcivic engagement.
New Media Proﬁles
andﬁlmed videos documenting the stories of former politicalprisoners, activists,musicians, andcomedians for anintimate look intothe currentsituation. Certaininterviews havebeen distributed forair inside thecountry to theestimated millionplus viewers of
Democratic Voice of Burma
Young people at the Galaxy Cyber Cafe inSittwe, Arakhan/Rakhine State.A page from
with aproﬁle of cyber attacks