Iran Pursues Loyalty Test Strategy to Identify Protesters, Increasing Risk for Christians
ICC Note: The Islamic Revolutionary Guard Corps is using social media to crowdsource the identification of protest leaders. Ultimately, this strategy is a kind of loyalty test which encourages citizens to prove themselves by informing on others. The practice further isolates the Christian community and potentially pushes the church further underground.
02/10/2018 Iran (AEI) – The protests which erupted on 28 December in Mashhad and spread across Iran caught security forces by surprise. While protestors used social media to rally each other and spread word of events in other cities, the Islamic Revolutionary Guard Corps (IRGC) and its associated media turned to social media to crowdsource identification of protest leaders.
In the accompanying highlighted tweet from the IRGC-affiliated Tasnim, the news agency is asking its twitter followers to identify suspects. Other IRGC-related websites like Gerdab.ir also engaged in similar campaigns to identify protestors. While the Iranian government has gradually improved its facial recognition capabilities, efforts to mobilize regime supporters to inform on other Iranians suggests that holes still exist in Iranian security force capabilities. It also suggests that the government seeks to create a dynamic by which Iranians must prove themselves and their loyalty by informing on others. Such crowdsourcing also highlights a disincentive for the Iranian government to completely close off access to social media platforms.
The tweet’s associated hashtags—all translated from the original Persian— give insight into how the regime seeks both to rally Iranian nationalism to the “#Flag_of_Iran” and to spin the protests as an external plot. They also demonstrate how the IRGC uses the narrative of chaos in Syria to justify strict security and crack down on demands for reform or democracy.
For interviews with Claire Evans, ICC’s Regional Manager, please contact Olivia Miller, Communications Coordinator: email@example.com.