Sukey

A tool for non-violent demonstrations.

Objective

To keep peaceful protesters informed with live protest information that will assist them in avoiding injury, in keeping clear of trouble spots and in avoiding unnecessary detention.

The application suite gives maximum information to those participating in a demonstration so that they can make informed decisions, as well as to those following externally who may be concerned about friends and family.

It should make full use of the crowd in gathering information which is then analysed and handed back to the crowd.

Success Criteria

The success of the project will be measured by user feedback according to the primary and secondary success criteria listed below.

Primary

Keeping people safe on demonstrations.

Anyone can use it.

Ensuring protesters are kept informed of the official demonstration route together with en-route amenities (eg WiFi, Toilets, Tube stations, First Aid, Coffee shops, Payphones etc).

Secondary

Provide a live viewing platform for interested parties not at the demonstration.

Key Elements of Solution

1. How we can help you to help each other

Website

Inform and educate.

Find out what is going on as it happens.

No matter what happens, sign up to the free SMS system.

What’s in it for the user?

What are you getting?

Stay informed and make the right decisions during the demonstration.

Avoid trouble spots and risking injury.

Get live demonstration news as it happens.

Why contribute information?

Help other peaceful demonstrators.

Provide an accurate view of events as they happen.

Show what goes on in protests.

We exist to support decisions - be a part of it.

2. Sources of information

Information sources

Information crowd sourced from demonstrators out on the street.

Text

Photos

Video

Up to the minute information from social and traditional media.

Other Options

3. Information Presentation

Simple to use, uncluttered display

Must have a degraded version for lower spec phones

Must show freedom of movement and support fast decisions

4. Back End Data Processing

Use of Swarming Algorithms

Use location data to detect freedom of movement

Prioritisation of Messaging and Reports to and from crowd

Coalesce multiple reports of same event

Must process footpaths and open spaces - not just roads

5. Security

User Security

No user identifiable data to be stored.  Ever.

Regular User Security reviews throughout build

Encrypt locations on data requests

Encryption Keys to be generated either by users or automatically and undiscoverable by team.

Junk all identifiable data from Apache logs

System Security

Protected from DDOS and seizure

Hacksafe

Multiple routing options

Multiple servers/server locations