성공한 혁명, 그 뒤엔 ‘폐쇄적 네트워크’ 있었다 – 매일경제

For years, the global narrative surrounding political upheaval has been dominated by the image of the “digital square.” From the Tahrir Square protests to the sweeping movements of the early 2010s, the world watched as hashtags became battle cries and social media platforms transformed into the primary engines of revolution. The romanticized notion was simple: a few viral posts, a surge of online momentum, and a regime would crumble under the weight of a connected populace.

However, a decade of hindsight reveals a more complex and sobering reality. While public platforms are unparalleled at mobilization—the act of getting thousands of people into the streets—they are notoriously ineffective at organization—the gritty, dangerous work of strategizing, negotiating, and building a sustainable governing structure. The difference between a fleeting protest and a successful political transition often hinges on the role of closed networks in political revolutions.

The paradox of the digital age is that while visibility is a powerful tool for awareness, This proves a liability for leadership. For a movement to move beyond the “protest phase” and into a “governance phase,” activists must move from the open visibility of Twitter (now X) or Facebook into the secure, encrypted shadows of closed networks. Without these “digital secret rooms,” movements often find themselves with plenty of energy but no direction, leading to what historians and analysts have termed the “Arab Winter.”

The Mobilization Trap: Why Public Squares Aren’t Enough

To understand why closed networks are essential, one must first understand the “mobilization trap.” Public social media platforms operate on the principle of “weak ties.” These are the casual connections—acquaintances, followers, and distant peers—that allow information to spread rapidly across a wide demographic. This is ideal for announcing a rally time or sharing a video of police brutality to incite global outrage.

The Mobilization Trap: Why Public Squares Aren't Enough
Gal Beckerman

But high-risk collective action requires “strong ties.” Strong ties are built on deep trust, shared history, and mutual accountability. When a revolution reaches the point where leaders must make strategic decisions—such as negotiating with a military junta or drafting a provisional constitution—they cannot do so in a public forum where every word is monitored by state intelligence and every disagreement is aired for the world to see.

Gal Beckerman, a senior editor at The Atlantic, has noted that the missing ingredient in many modern uprisings was the time and space required for genuine preparation. The speed of digital mobilization often outpaces the speed of organizational development. When a regime falls overnight due to a viral surge, the resulting power vacuum is rarely filled by the protesters themselves, but rather by the most organized entity remaining—which is often the military or a well-established shadow party.

The Shift to Encrypted Shadows: Signal, Telegram, and Beyond

As state surveillance evolved, so did the tools of dissent. The transition from public walls to encrypted chat apps represents a strategic evolution in how political movements operate. Modern activists now employ a hybrid strategy: using public platforms for recruitment and visibility, while shifting all tactical planning to “closed networks.”

The emergence of end-to-end encrypted (E2EE) messaging apps has fundamentally changed the landscape of political organization. Tools such as Signal, WhatsApp, and Telegram provide a layer of security that allows for the formation of “digital cells.” These closed networks serve several critical functions:

From Instagram — related to Arab Winter, Encrypted Shadows
  • Secure Coordination: Planning logistics and movement in real-time without alerting state surveillance.
  • Vetting and Trust: Using invite-only groups to ensure that strategic discussions are limited to verified, trusted members.
  • Safe Deliberation: Providing a space for internal debate and disagreement, which is essential for creating a cohesive political platform, away from the performative nature of public social media.

Beyond encryption, platforms like Discord and Slack—originally designed for gaming and corporate productivity—have been repurposed for political organizing. These apps allow for a hierarchical structure of channels, enabling a movement to separate “general announcements” from “high-level strategy” and “legal support,” mimicking the organizational structure of a traditional political party but at digital speed.

Lessons from the ‘Arab Winter’

The trajectory of the Arab Spring provides the most poignant example of the danger of relying solely on open networks. In 2011, the rapid collapse of dictatorships in Tunisia and Egypt was hailed as a triumph of the “Facebook Revolution.” However, the subsequent years saw a regression into instability, civil war, or the return of authoritarianism.

The failure was not a lack of passion, but a lack of infrastructure. The movements were decentralized by design—which made them hard for the state to decapitate—but that same decentralization made them impossible to lead. Because they lacked the “closed networks” needed to build a disciplined political cadre, they could not translate the energy of the square into the policy of the palace.

In contrast, more successful political transitions historically relied on clandestine networks—underground newspapers, secret societies, and private salons. These closed environments allowed revolutionaries to iron out ideological differences and establish a chain of command before taking power. The modern equivalent is the encrypted group chat, but the psychological and strategic requirement remains the same: secrecy is a prerequisite for stability.

The Future of Digital Dissent and State Response

The battle between closed networks and state surveillance has entered a new, more dangerous phase. Governments are no longer just trying to block websites. they are employing sophisticated spyware to infiltrate the very encrypted apps activists rely on. The use of “zero-click” exploits allows regimes to turn a secure phone into a tracking device, effectively turning a closed network into an open book for intelligence agencies.

This has led to a “cat-and-mouse” game of digital hygiene. Activists are increasingly adopting “burn phones,” utilizing operating systems like GrapheneOS, and implementing strict communication protocols to mitigate the risk of infiltration. The survival of a movement now depends as much on its technical literacy as it does on its political platform.

Key Takeaways: Mobilization vs. Organization

Comparison of Public and Closed Networks in Political Movements
Feature Public Networks (e.g., X, Facebook) Closed Networks (e.g., Signal, Discord)
Primary Goal Mobilization & Awareness Organization & Strategy
Network Type Weak Ties (Broad/Shallow) Strong Ties (Narrow/Deep)
Risk Profile High Visibility / High Exposure Low Visibility / High Security
Outcome Protest and Pressure Governance and Policy

What Happens Next?

As we move further into the decade, the intersection of AI and surveillance will likely redefine the “closed network.” AI-driven pattern analysis can now identify “clusters” of activity even within encrypted environments by analyzing metadata—who is talking to whom, when, and from where—even if the content of the messages remains secret.

The next critical checkpoint for digital rights and political organization will be the upcoming evaluations of global encryption standards and the potential for “backdoors” mandated by governments under the guise of national security. The outcome of these legal and technical battles will determine whether the “digital secret room” remains a viable tool for democratic transition or becomes a trap for those seeking change.

Do you believe the anonymity of closed networks is essential for democracy, or does it facilitate dangerous instability? Share your thoughts in the comments below and join the conversation on the future of digital activism.

Leave a Comment