Keeping Connected When the Mobile Social Network Goes Offline

Total Page:16

File Type:pdf, Size:1020Kb

Keeping Connected When the Mobile Social Network Goes Offline Øystein Løkken Sigholt Keeping Connected When the Mobile Social Network Goes Offline Master’s thesis in Communication Technology Supervisor: Besmir Tola June 2019 Master’s thesis Master’s NTNU Engineering Communication Technology Communication Department of Information Security and Department of Information Faculty of Information Technology and Electrical Technology of Information Faculty Norwegian University of Science and Technology of Science University Norwegian Øystein Løkken Sigholt Keeping Connected When the Mobile Social Network Goes Offline Master’s thesis in Communication Technology Supervisor: Besmir Tola June 2019 Norwegian University of Science and Technology Faculty of Information Technology and Electrical Engineering Department of Information Security and Communication Technology Title: Keeping Connected When the Mobile Social Network Goes Offline Student: Øystein Løkken Sigholt Problem description: Smartphone users today are used to being connected at all times. At the same time, there are vast amounts of remote areas that are without cell coverage. In addition, natural disasters may cause Internet connectivity outages. As a user moves out off cellular coverage, or is unable to reach the central server for any reason, connectivity is lost. As a consequence, Internet-based mobile social applications will not be able to provide their services and the end-users will become isolated until Internet connectivity is restored, even if the users that are exploiting the service are within a few meters of each other. Modern smartphones are equipped with a number of radio interfaces that enable wireless communication among devices in close proximity. Leveraging these capabili- ties could be used to establish connectivity between neighboring devices even in the most remote out-of-coverage locations. Important challenges concerning this approach are the security issues that arise when the centralized mutually trusted entity becomes unavailable. How can end users make sure that they are not communicating with an impostor, and how to protect the confidentiality and integrity of each message? The goal of this work is to propose, implement and experimentally validate a simple system that can be used to securely and easily enable communication in existing social applications in situations with no Internet connectivity. The proposed system will use WiFi Direct to connect neighboring devices, and apply mutual TLS to facilitate fast, reliable and secure identification of connected parties based on identity certificates issued by the central server before connection loss. Responsible professor: Yuming Jiang, IIK Supervisor: Besmir Tola, IIK Abstract The objective of this project is to propose, implement and test a technique that social smartphone applications can use to keep their users connected in situations where they are unable to connect to the application server, but close enough to each other to support device-to-device communication. The proposed idea and key contribution of this project are as follows: Each client is issued a certificate by a central authorization entity that they can use to identify themselves at any time. If a client is unable to connect to the application server, it will start looking for nearby peers using WiFi Direct, and attempt to form a group with them. Once a WiFi Direct group is formed, the group owner will temporarily assume the role of application server. Each group member and the group owner will then verify each others identity and connect using mutual Transport Layer Security (mTLS), facilitating secure communication. Sammendrag Dette prosjektets mål er å foreslå, implementere og teste en teknikk som sosiale smarttelefonapplikasjoner kan bruke for å koble sammen brukere i situasjoner der de ikke er i stand til å nå applikasjonsserveren, men nær nok hverandre til å støtte peer-til-peer-kommunikasjon. Den foreslåtte ideen og hovedbidraget fra prosjektet er som følger: Hver bruker får utstedt et sertifikat fra en sentral autorisasjonsenhet som de kan bruke til å identifisere seg. Hvis en klient ikke er i stand til å nå applikasjonsserveren, vil den begynne å lete etter andre enheter i samme situasjon i nærheten ved å bruke WiFi Direct og forsøke å danne en gruppe med dem. Når en slik gruppe har blitt dannet, vil gruppeeieren midlertidig overta rollen som applikasjonsserver. Hvert gruppemedlem og gruppens eier vil så verifisere hverandres identitet og koble til hverandre ved hjelp av gjensidig Transport Layer Security (mTLS), og dermed muliggjøre sikker kommunikasjon. Preface This thesis is being submitted as part of a master’s degree at the De- partment of Information Security and Communication Technology at the Norwegian University of Science and Technology (NTNU). As a result of the current work, a scientific paper has been produced which is soon to be submitted to WiMob 2019, The 15th International Conference on Wireless and Mobile Computing, Networking and Commu- nications. I would like to thank my supervisor Besmir Tola for his invaluable advice and continuous feedback, and professor Yuming Jiang for his encouragement and guidance. Trondheim, Thursday 6th June, 2019 Øystein Løkken Sigholt Contents List of Figures ix List of Tables xi List of Acronyms xiii 1 Introduction1 1.1 Background and Motivation....................... 1 1.2 Related Work............................... 2 1.3 Open Challenges............................. 4 1.4 Scope ................................... 4 1.5 Methodology and Tools ......................... 5 1.5.1 The Design Phase ........................ 5 1.5.2 The Implementation Phase ................... 5 1.5.3 The Validation Phase ...................... 6 2 Proposed Approach7 2.1 System Architecture........................... 7 2.1.1 The Authentication Component................. 7 2.1.2 The Server Component ..................... 9 2.1.3 The Client Component...................... 11 2.2 Exploited Technologies.......................... 12 2.2.1 WiFi Direct............................ 13 2.2.2 Mutual Transport Layer Security (mTLS)........... 16 2.2.3 Cryptography........................... 16 3 Implementation 23 3.1 The Dedicated Server .......................... 23 3.1.1 Certificate Generation...................... 23 3.2 The Client Application.......................... 24 3.2.1 The Main Activity........................ 24 3.2.2 The Chat Activity........................ 24 3.2.3 The Debug Activity ....................... 25 vii 3.2.4 Technical Details......................... 26 3.3 Cross Platform Code Reuse....................... 27 3.3.1 API Variation........................... 28 3.3.2 Serialization............................ 28 3.4 Cryptography............................... 29 3.4.1 Rivest Shamir Adleman (RSA)................. 29 3.4.2 Elliptic Curve Cryptography .................. 29 3.5 User Experience ............................. 31 4 Experimental Results 33 4.1 Security Validation............................ 33 4.1.1 Data Link Layer Security .................... 33 4.1.2 Transport Layer Security .................... 34 4.1.3 Application Layer Security ................... 35 4.2 Overhead ................................. 37 4.2.1 Connection............................ 37 4.2.2 Messaging............................. 39 4.2.3 Other Messaging Applications.................. 42 5 Discussion 47 5.1 Connectivity ............................... 47 5.2 Security.................................. 47 5.3 Overhead ................................. 48 5.4 User Experience ............................. 49 6 Conclusion 51 6.1 Future Work ............................... 52 6.1.1 Messaging Protocol........................ 52 6.1.2 Data Transport.......................... 53 6.1.3 Denial of Service Resilience................... 54 References 55 Appendices A Scientific Paper 59 List of Figures 2.1 System Architecture: Sign up and Online Operation........... 9 2.2 Message Packet................................ 11 2.3 System Architecture: Offline Operation .................. 12 2.4 WiFi Probe Request and Response..................... 14 2.5 WiFi Direct Topology ............................ 16 2.6 Legacy Client Connection Sequence Diagram ............... 17 2.7 TLS Handshake Protocol Message Flow.................. 18 2.8 Symmetric Cryptography Encryption and Decryption .......... 18 2.9 Public Key Cryptography Key Generation................. 19 2.10 Public Key Cryptography Signature .................... 20 2.11 Public Key Cryptography Encryption and Decryption.......... 20 3.1 Client Application Main Activity...................... 25 3.2 Client Application Chat Activity...................... 26 3.3 Connectivity Behavior State Machine ................... 27 3.4 WiFi Direct Connection Prompt ...................... 31 3.5 WiFi Connected, No Internet........................ 32 4.1 IEEE 802.11 Data Frame .......................... 34 4.2 WiFi PSK Transmitted Using NSD..................... 35 4.3 TLS Handshake Failure ........................... 35 4.4 Message Flow as Seen by theGO...................... 36 4.5 Message Signature Validation........................ 36 4.6 Automatic WiFi Direct Group Authentication and Connection Delay CDF 38 4.7 Message Packet Instantiation Time..................... 40 4.8 Message Packet Decryption Time...................... 40 4.9 Signal Protocol Message Data Structure.................. 43 4.10 Signal Message Example........................... 44 4.11 Bramble Transport Protocol Frames.................... 45 5.1 WhatsApp Security Code.......................... 50 ix
Recommended publications
  • IT's 10 P.M. Do You Know What Apps Your Kids Are Using?!?!?
    Instagram Facebook Twitter Snapchat Musical.ly WhatsApp kik SayAt.Me Marco Polo Monkey Ask.Fm House Party Fire Chat After School Sarahah VIDEO-MESSAGING APPS • VIDEO APPS LIKE MARCO POLO, HOUSE PARTY AND FIRECHAT ARE THE NEW CHAT ROOMS • MARCO POLO, WHICH HAS BEEN DOWNLOADED AT LEAST 10 MILLION TIMES ON THE GOOGLE PLAY STORE, TOUTS ITSELF AS A VIDEO “WALKIE-TALKIE.” YOU MAKE A VIDEO AND SEND IT. IN RESPONSE YOUR FRIEND MAKES A VIDEO. ALL THE VIDEOS LIVE IN A QUEUE; YOU ADD A VIDEO WHEN IT’S CONVENIENT. YELLOW • YELLOW, WHICH HAS BEEN CALLED “TINDER FOR TEENS” (SWIPE RIGHT IF YOU WANT TO BECOME FRIENDS WITH SOMEONE; SWIPE LEFT IF YOU DON’T), OPENS WITH A GEO-LOCATOR. THERE IS A 13-YEAR- OLD AGE MINIMUM, WHICH THERE’S NO WAY OF VERIFYING. ANONYMOUS APPS • ANONYMOUS APPS HAVE BEEN DEVELOPED FOR PEOPLE INTERESTED IN A FACELESS AND NAMELESS DOCUMENTATION OF THEIR LIVES (AS OPPOSED TO A SELFIE), DRAWING IN CHILDREN WHO LEARNED FROM EARLIER GENERATIONS ABOUT THE CONSEQUENCES OF AN OFFENSIVE ONLINE FOOTPRINT. • THERE ARE A NUMBER OF ANONYMOUS APPS ON THE MARKET — AFTER SCHOOL, SARAHAH, SAYAT.ME, MONKEY AND ASK.FM ARE SOME OF THE MOST POPULAR — ALL OF THEM PROMISING THE SAME FEATURE: SPILL INTIMATE FEELINGS ABOUT YOURSELF OR, ON THE FLIP SIDE, SPREAD RUMORS AND ATTACK FRIENDS, WITHOUT ANY TRACE OF WHO SAID WHAT. EPHEMERAL APPS • MANY ADULTS HAVE HEARD OF SNAPCHAT AND INSTAGRAM STORIES, BUT WHAT ABOUT LIVE.LY, A RISING LIVE-STREAMING APP WITH A LARGE TEENAGE AUDIENCE? • ALL THREE WORK LIKE A DISAPPEARING MAGIC ACT.
    [Show full text]
  • Sharing and Caring Countries Report
    Sharing and Caring COST ACTION CA16121 Member Countries Report on the Collaborative Economy May 2018 3 Table of Contents PREFACE .................................................................................................................................. 6 AUSTRIA ................................................................................................................................... 8 BELGIUM ................................................................................................................................ 11 BOSNIA & HERZEGOVINA ................................................................................................. 15 BULGARIA ............................................................................................................................. 16 CYPRUS .................................................................................................................................. 19 CROATIA ................................................................................................................................ 19 ESTONIA ................................................................................................................................. 21 FINLAND ................................................................................................................................ 25 FRANCE .................................................................................................................................. 27 GERMANY .............................................................................................................................
    [Show full text]
  • RFS Final Report
    LEGISLATIVE COUNCIL Parliamentary Paper No 358 General Purpose Standing Committee No 5 Report on Inquiry into the NSW Rural Fire Service Ordered to be printed 23 June 2000 Report No6 - June 2000 i LEGISLATIVE COUNCIL Inquiry into the NSW Rural Fire Service How to contact the Committee Members of General Purpose Standing Committee No 5 can be contacted through the committee secretariat. Written correspondence and inquiries should be directed to: The Director General Purpose Standing Committees Legislative Council Parliament House, Macquarie Street Sydney NSW 2000 Email [email protected] Telephone 61-2-9230 3544 Facsimile 61-2-9230 3416 Website www.parliament.nsw.gov.au ISBN 0-7347-6407-3 ii GENERAL PURPOSE STANDING COMMITTEE NO 5 Table of Contents COMMITTEE MEMBERSHIP ............................................................................................................................. VI TERMS OF REFERENCE....................................................................................................................................VII RECOMMENDATIONS ..................................................................................................................................... VIII ABBREVIATIONS .............................................................................................................................................. XIII CHAIRMAN’S FOREWORD ............................................................................................................................... XV 1 INTRODUCTION.......................................................................................................................................
    [Show full text]
  • Humanitarian Futures for Messaging Apps
    HUMANITARIAN FUTURES FOR MESSAGING APPS UNDERSTANDING THE OPPORTUNITIES AND RISKS FOR HUMANITARIAN ACTION Syrian refugees, landed on Lesbos in Greece, looking for a mobile signal to check their location and notify relatives that they arrived safely. International Committee of the Red Cross 19, avenue de la Paix 1202 Geneva, Switzerland T +41 22 734 60 01 F +41 22 733 20 57 E-mail: [email protected] www.icrc.org January 2017 Front cover: I. Prickett/UNHCR HUMANITARIAN FUTURES FOR MESSAGING APPS UNDERSTANDING THE OPPORTUNITIES AND RISKS FOR HUMANITARIAN ACTION This report, commissioned by the International Committee of the Red Cross (ICRC), is the product of a collaboration between the ICRC, The Engine Room and Block Party. The content of this report does not reflect the official opinion of the ICRC. Responsibility for the information and views expressed in the report lies entirely with The Engine Room and Block Party. Commissioning Editors: Jacobo Quintanilla and Philippe Stoll (ICRC). Lead Researcher: Tom Walker (The Engine Room). Content: Eytan Oren (Block Party), Zara Rahman (The Engine Room), Nisha Thompson, and Carly Nyst. Editors: Michael Wells and John Borland. Project Manager: Waiyee Leong (ICRC). The ICRC, The Engine Room and Block Party request due acknowledgement and quotes from this publication to be referenced as: ICRC, The Engine Room and Block Party, Humanitarian Futures for Messaging Apps, January 2017. This report is available at www.icrc.org, https://theengineroom.org and http://weareblockparty.com. This work is licensed under the Creative Commons Attribution-ShareAlike 4.0 International License. To view a copy of this license, visit: http://creativecommons.org/licenses/by-sa/4.0/.
    [Show full text]
  • Hongkong Protest Using Firechat
    FireChat Introduction: FireChat is a “peer-to-peer mesh networking” based mobile application developed by Open Garden that allows users to send messages using Bluetooth or Wi-Fi; it works without any Internet Connection or mobile phone coverage. FireChat provides a new type of communication called “firechats”. These live and anonymous discussion groups can hold as many as 10,000 people simultaneously. Gain in Popularity: The app first gained popularity in Iran and Iraq following government restrictions on Internet use. In June, more than 40,000 Iraqis downloaded this application. It was also used by students in Taiwan during the „Sunflower movement‟ Hong Kong Protest: Recently, the app has reached a massive popularity in Hong Kong. According to Reuters [1], the posts and links related to “Hong Kong protests” are being removed from search engines, social networks and other websites. The pro-democracy protesters reported that their contents posted in popular Chinese micro blog „Weibo‟, Search engine „Baidu „and messages on WeChat are being censored. The Chinese authorities also banned Instagram. To bypass the censorship, the protestors have begun using the FireChat application to communicate with other protesters. The app gained more than 200,000 new users within few hours. Wired noted [2] that there were 2 million chat sessions initiated within two days. The app is seeing about 20,000 concurrent users in Hong Kong. The application became the most downloaded app from Hong Kong iOS Apple Store. According to Android application store, the app has now been downloaded more than 10,00,000 times. Using: To begin, a user needs to sign up by providing his full name, username and email ID.
    [Show full text]
  • Asia Chats- Update on Line, Kakaotalk, and Firechat in China
    Research Brief The Citizen Lab July 2014 Asia Chats: Update on Line, KakaoTalk, and FireChat in China Media coverage: CBC News, TechPresident, and Slate. On July 10 we reported that messaging applications LINE and KakaoTalk were being disrupted in China as a result of DNS tampering and HTTP request filtering. We also found that Flickr and Microsoft OneDrive were blocked in the country. Since that time we have done daily tests of these domains from servers in China. We find that Flickr and OneDrive remain consistently blocked, but LINE and KakaoTalk show inconsistent fluctuation between accessibility and inaccessibility. We also analyze security and privacy issues in the mobile app FireChat and test accessibility of the service in China. ACCESSIBILITY OF KAKAOTALK, LINE, FLICKR, ONEDRIVE IN CHINA In our previous post, we established that injected DNS replies was the primary mechanism by which KakaoTalk and LINE was being blocked in China. We test the domains that we investigated in our previous post twice daily from July 12 – 23, 2014 to measure the consistency of the blocks. We resolved the DNS records of the following domains in China: Domain Tested Service flickr.com Photo sharing service kakao.com KakaoTalk – Cross platform messaging app line.naver.jp LINE – Cross platform messaging app onedrive.live.com Cloud file sharing service 1 July 2014 Our tests return known fake DNS replies that have been previously observed in China, as noted in a presentation from John-Paul Verkamp at the CAIDA Active Internet Measurements Workshop (see slide 6). These possible fake response addresses are summarized below: IP Network 8.7.198.45 LEVEL3 – Level 3 Communications, Inc.,US 78.16.49.15 AS-BTIRE BT Communications Ireland Limited,IE 37.61.54.158 BAKINTER-AS Baktelekom,AZ 93.46.8.89 FASTWEB Fastweb SpA,IT 46.82.174.68 DTAG Deutsche Telekom AG,DE 159.106.121.75 59.24.3.173 KIXS-AS-KR Korea Telecom,KR 203.98.7.65 CLIX-NZ TelstraClear Ltd,NZ 243.185.187.39 127.0.0.1 Localhost We tested the domains to see whether or not they would return these known bad DNS responses.
    [Show full text]
  • Privacidad Y Seguridad En Internet: La Web Oscura (Junio De 2016)
    1 Privacidad y seguridad en internet: la web oscura (junio de 2016) Boris A. Gómez Universidad Tecnológica de Panamá Artículo para “The Hacking Day - Project” – www.thehackingday.com Resumen - La privacidad y seguridad en las comunicaciones obtengan acceso a los dispositivos? son inquietudes legítimas de quienes viven en regímenes represivos o, simplemente, de quienes desean evitar que sus Existen diversas tecnologías para resguardar privacidad y actividades personales sean observadas. El enrutamiento de seguridad, y la web oscura es una de las más reconocidas, sin cebolla, como también se le conoce a la red Tor, fue diseñado embargo, esa seguridad que brinda conduce a que muchos especialmente para ofrecer esta clase de seguridad y privacidad, delincuentes oculten sus actividades en ella. Las tecnologías pero existen muchas dudas sobre su efectividad, por lo que en que mejor representan a la web oscura son Tor e i2P, siendo este artículo revisamos sus fortalezas y deficiencias. El artículo Tor la red más utilizada y estudiada a nivel mundial, por lo estuvo enfocado en Tor, por ser la tecnología de la web oscura que ha estado expuesta a múltiples ataques. más reconocida, respaldada y estudiada a nivel mundial, aunque Por otra parte, la web oscura es un reto para las autoridades es necesario anotar que la seguridad en internet no depende exclusivamente de Tor. La cadena de seguridad está compuesta quienes, además de identificar, recopilar evidencias y ubicar a de múltiples elementos que deben considerarse al momento de los delincuentes que se ocultan en ella, necesitan probar, en intentar resguardarnos en esta red, por lo que el desconocimiento los tribunales, que esas evidencias han sido recopiladas de esta realidad puede ocasionar que la identidad y la ubicación conforme a la ley.
    [Show full text]
  • Digital Developments: Extremists’ Use of Modern Communications Tools
    Digital Developments: Extremists’ Use of Modern Communications Tools March 2019 Digital Developments Extremists’ Use of Modern Communication Tools The rapid adoption of state-of-the-art communication tools—with an emphasis on Internet-based applications—has been critical to the organization, expansion, and success of terrorist networks. Terror groups use modern communication technology in myriad ways, from fundraising, radicalization, and recruitment, to issuing threats, inciting violence, and planning attacks. While Osama bin Laden used fax machines and satellite phones in the 1990s, the early 2000s saw a boom in new media applications that enabled terrorists to communicate undetected across borders more swiftly and effectively. The Internet essentially became another extremist battlefield. Encrypted software became a popular modus operandi for jihadists, and many groups established media departments and online recruitment magazines such as al-Qaeda’s Inspire. ISIS’s communications tactics, such as its high production value beheading videos and its “Mujatweets,” have grabbed international headlines. The terror group has hacked thousands of international websites, replacing their content with pro-ISIS messages. In January 2015, ISIS hacked the social media accounts of the U.S. Central Command and posted the personal contact information of numerous retired military officers, waging psychological warfare on men and women in uniform. Lone-wolf terrorists have also taken advantage of advancements in digital communications. In March 2019, a suspected white supremacist livestreamed shooting attacks on two New Zealand mosques that left at least 50 people dead. The suspect broadcasted the massacre on his Facebook account, where he also posted his manifesto. Terrorists’ use of communication technology has shifted tremendously in the past two decades, demanding a greater understanding of these new threats—and a strategy to deal with them.
    [Show full text]
  • Encryption, Cell Phone
    SOURCE: https://www.airsassociation.org/services-new/airs-knowledge-network-n/airs- articles/item/16855-tech-tips-to-help-stay-safe-in-trump-s- america?utm_content=buffer0b73e&utm_medium=social&utm_source=facebook.com&u tm_campaign=buffer Tech tips to help stay safe in America Posted by John Ruggiero https://www.airsassociation.org/services-new/airs-knowledge-network-n/airs- articles/itemlist/user/1550-johnruggiero Tech is as much a liability as it is an opportunity, as this election demonstrated. The next few years will be scary for many reasons, and to some more than others, and part of that will be the continued and likely expanded exploitation of the technologies and services we’ve come to rely on. Communities likely to be targeted by the 45th President policies may want to take a few steps online to help ensure their safety and privacy. The 45th President has gone on the record asking for backdoors to encryption and devices, saying he supports surveillance, and is against Net Neutrality. Policies pursuant to these goals will necessarily put your data at risk. The following are privacy tips anyone can use, but they are particularly relevant for anyone who, for example, plans to participate in protests or grassroots organizing, or for undocumented immigrants who would like to decrease their online presence. I’ve listed them roughly in order of importance. Ditch SMS and use end-to-end encryption If the 45th President makes good on his promise to make deportation of undocumented immigrants, you can expect police to bring the same measures they use in serious crimes to bear on this task.
    [Show full text]
  • Feather River Charter School
    Feather River Charter School Regular Scheduled Board Meeting Date and Time Tuesday February 23, 2021 at 6:00 PM PST Location 3840 Rosin Court #100 Sacramento, CA 95834 Zoom Link: https://zoom.us/j/96568347400 Meeting ID: 965 6834 7400 Join by Phone: (669) 900-6833 Agenda Purpose Presenter Time I. Opening Items 6:00 PM A. Record Attendance 1 m B. Call the Meeting to Order David 1 m Brockmyer C. Approval of the Agenda Vote David 1 m Brockmyer D. Public Comments 2 m E. Executive Director's Report Jenell 10 m Sherman F. Approve Minutes Approve 1 m Minutes Approve minutes for Regular Scheduled Board Meeting on January 26, 2021 G. Approve Minutes Approve 1 m Minutes Approve minutes for Special Board Meeting on January 26, 2021 II. Finance 6:17 PM Powered by BoardOnTrack 1 of1 of301 3 Feather River Charter School - Regular Scheduled Board Meeting - Agenda - Tuesday February 23, 2021 at 6:00 PM Purpose Presenter Time A. January Financials & Second Interim Report Vote Darlington 10 m Ahaiwe B. Budget Considerations for 2021-2022 School Year Discuss Jenell 10 m Sherman C. 2021-2022 Staff Contracts Vote Jenell 5 m Sherman D. 2021-2022 Compensation Policy Vote Jenell 5 m Sherman III. Academic Excellence 6:47 PM A. Title IX Sexual Harassment Policy & Grievance Vote Jenell 5 m Procedures Sherman B. Transgender & Gender Nonconforming Students Vote Jenell 5 m Policy Sherman C. Anti-Harassment / Discrimination / Intimidation / Vote Jenell 5 m Bullying / Retaliation Policy Sherman IV. Operations 7:02 PM A. Notice of Non-Discrimination Vote Jenell 5 m Sherman B.
    [Show full text]
  • Insularized Connectedness: Mobile Chat Applications and News Production
    Media and Communication (ISSN: 2183–2439) 2019, Volume 7, Issue 1, Pages 179–188 DOI: 10.17645/mac.v7i1.1802 Article Insularized Connectedness: Mobile Chat Applications and News Production Colin Agur Hubbard School of Journalism and Mass Communication, University of Minnesota – Twin Cities, Minneapolis, MN 55455, USA; E-Mail: [email protected] Submitted: 29 October 2018 | Accepted: 16 January 2019 | Published: 19 February 2019 Abstract Focusing on recent political unrest in Hong Kong, this article examines how mobile chat applications (e.g., WhatsApp, WeChat, LINE, Facebook Messenger and others) have permeated journalism. In Hong Kong, mobile chat apps have served as tools for foreign correspondents to follow stories, identify sources, and verify facts; they have also helped reporting teams manage large flows of multimedia information in real-time. To understand the institutional, technological, and cul- tural factors at play, this article draws on 34 interviews the author conducted with journalists who use mobile chat apps in their reporting. Building on the concept of media logic, the article explores technology-involved social interactions and their impact on media work, while acknowledging the agency of users and audiences within a cultural context. It argues that mobile chat apps have become hosts for a logic of connectedness and insularity in media work, and this has led to new forms of co-production in journalism. Keywords chat apps; Hong Kong; journalism; media logic; mobile communication Issue This article is part of the issue “Emerging Technologies in Journalism and Media: International Perspectives on Their Nature and Impact”, edited by John Pavlik (Rutgers University, USA). © 2019 by the author; licensee Cogitatio (Lisbon, Portugal).
    [Show full text]
  • SIGCHI Conference Paper Format
    Mediating the Undercurrents: Using Social Media to Sustain a Social Movement Yong Ming Kow 1 Yubo Kou 2 Bryan Semaan 3 Waikuen Cheng 1 1 City University of Hong Kong, Hong Kong SAR, China, 2 University of California, Irvine, CA, 3 Syracuse University, Syracuse, NY [email protected], [email protected], [email protected], [email protected] ABSTRACT Beyond these public discourses, few researchers have While studies of social movements have mostly examined examined the undercurrents, including the emergent prevalent public discourses, undercurrents—the backstage activities and social tensions that underlie and, in turn, practices consisting of meaning-making processes, sustain these movements. narratives, and situated work—have received less attention. Through a qualitative interview study with sixteen Research studies on social movements often emphasize participants, we examine the role of social media in high-level structures and ideologies, while paying little supporting the undercurrents of the Umbrella Movement in attention to micro-level activities and interpretive processes Hong Kong. Interviews focused on an intense period of the [3,26]. In fact, the collective action frame is also influenced movement exemplified by sit-in activities inspired by by invisible interactions where meaning-making occurs at Occupy Wall Street in the United States. Whereas the use the grassroots level [3,26,27]. Large-scale civic action is of Facebook for public discourse was similar to what has complex, wherein the collective frame and the direction of been reported in other studies, we found that an ecology of the movement drift along with inner challenges, messiness, social media tools such as Facebook, WhatsApp, Telegram, and spontaneity of the actions of its participants [3,26].
    [Show full text]