Coordination and security: How mobile communications affect insurgency

Jacob N. Shapiro, David A. Siegel

Research output: Contribution to journalArticle

12 Scopus citations

Abstract

Recent work has shown that the introduction of mobile communications can substantially alter the course of conflict. In Afghanistan and India targeting mobile communications is a central part of the insurgent campaigns. The opposite was true in Iraq. There insurgents instead threatened providers who did not do enough to maintain mobile phone networks. These differences likely arise from two competing effects of mobile communications: they make it easier for antigovernment actors to coordinate collective action, thereby increasing violence, and for pro-government civilians to collaborate with security forces allowing them to more effectively suppress rebels, thereby decreasing violence. To study these competing effects we analyze a formal model of insurgent action in which changes in the communications environment alter both (i) the ability of rebels to impose costs on civilians who cooperate with the government and (ii) the information flow to government forces seeking to suppress rebellion with military action. Our analysis highlights the importance of the threat of information sharing by non-combatants in reducing violence and offers some guidelines for policymakers in thinking about how much to support ICT development in conflict zones. In particular, we show that officials can generate reasonable expectations about whether expanding ICT access will exacerbate conflict or reduce it by assessing the relative gains to both sides from changes in ICT access along several simple dimensions.

Original languageEnglish (US)
Pages (from-to)312-322
Number of pages11
JournalJournal of Peace Research
Volume52
Issue number3
DOIs
StatePublished - May 5 2015

All Science Journal Classification (ASJC) codes

  • Sociology and Political Science
  • Safety Research
  • Political Science and International Relations

Keywords

  • ICT
  • collective action
  • insurgency

Fingerprint Dive into the research topics of 'Coordination and security: How mobile communications affect insurgency'. Together they form a unique fingerprint.

  • Cite this