:: Re: [Bricolabs] Resistance, Liberat…
トップ ページ
このメッセージを削除
このメッセージに返信
著者: yto lab
日付:  
To: Bricolabs
題目: Re: [Bricolabs] Resistance, Liberation Technology
Is this exists in spanish?
Thanks!!!

Yto


On Tue, Apr 2, 2013 at 5:20 AM, Atteqa Malik <atteqa@???> wrote:

> cant access the link is it just a problem on my side?
>
>
>
> On Tue, Apr 2, 2013 at 12:48 PM, Jean-Noël Montagné <jnm@???>wrote:
>
>> **
>>
>> newly published, may interest some people on bricolist. PDF download.
>>
>>
>> Resistance, Liberation Technology
>> and Human Rights in the Digital Age
>> by Giovanni Ziccardi
>> 300 pages, pdf
>> http://cryptome.org/2013/03/hacking-digital-dissidence.pdf
>>
>> summary below
>>
>>
>> JN
>>
>>
>>
>> summary
>>
>> *Opening Remarks: Hacking and Digital Dissidence*..............................
>> 1
>>   1.1 Using Computers for the Pursuit of Political and Social
>> Changes and for the Bene fi t of All Mankind
>> ..................................... 1
>>   1.2 From Early Hackers to Digital Resistance Activities
>> ........................ 5
>>   1.3 The So-Called * Twitter Revolutions*
>> .................................................... 7
>>   1.4 The Worldwide Scenario, and Some Preliminary
>> Interpretative Questions
>> ..................................................................... 9
>>   References
>> ...................................................................................................
>> 22
>> *  2 Digital Resistance, Digital Liberties and Digital Transparency*........... 27
>>   2.1 A Preliminary De fi nition of * Digital Resistance*
>> and * Digital Liberties*
>> ..........................................................................
>> 27
>>   2.1.1 Some Focal Aspects of Digital Dissidence
>> ............................ 27
>>   2.1.2 Preliminary Legal and Political Remarks
>> .............................. 28
>>   2.1.3 The Power of Technology in Critical Contexts
>> and the New Public Sphere
>> .................................................... 30
>>   2.2 The Fundamental Role of a Secure (and Peer-Reviewed)
>> Liberation Technology: The * Haystack*  Case-History
>> ......................... 32
>>   2.3 Two Key Aspects of Digital Resistance Activities,
>> and Several Case Studies
>> ................................................................... 36
>>   2.3.1 The Key Aspects of Dissident Activities
>> ............................... 36
>>   2.3.2 Digital Resistance Case-Studies
>> ............................................. 41
>>   2.4 Open Government, Collaborative Transparency
>> and Civic Hacking as a Form of Digital Resistance
>> .......................... 47
>>   2.4.1 The Idea of Government as a Platform
>> for Transparency.....................................................................
>> 47
>>   2.4.2 The Metaphor of Government 2.0 and the Idea
>> of Collaborative Transparency
>> ............................................... 49
>>   2.4.3 Citizen Engagement for the Oversight
>> of Political Activity
>> ................................................................ 51
>>   2.4.4 Collaborative Mapping and Digital Resistance
>> ...................... 59
>>   References
>> ...................................................................................................
>> 68
>> *  3 Hacking and Digital Dissidence Activities*.............................................. 73
>>     3.1 The Role of Hackers in the Landscape of Digital Resistance
>> .......... 73
>>     3.2 A First Analysis of Common Threats to Digital
>> Freedom and to Hacker Activities
>> ................................................... 74
>>     3.3 Being a Hacker in This Framework
>> ................................................. 76
>>    3.3.1 Thinking Like a Hacker
>> ....................................................... 76
>>    3.3.2 State Antagonism, Fear and Violence
>> .................................. 79
>>     3.4 A Brand New Playground
>> ................................................................ 81
>>    3.4.1 Liberation Technologies
>> ....................................................... 81
>>    3.4.2 Anonymity and Bloggers' Rights
>> ........................................ 84
>>    3.4.3 Innovation
>> ............................................................................
>> 86
>>    3.4.4 Intellectual Property and Privacy
>> ......................................... 86
>>    3.4.5 EPIC Activities in the Field of Privacy
>> ................................ 88
>>    3.4.6 Transparency
>> ........................................................................
>> 89
>>     3.5 A New Perspective on Hacking
>> ....................................................... 90
>>    3.5.1 The Essence of hacking
>> ....................................................... 90
>>    3.5.2 The Hacker Spirit and Some Lessons
>> from the  Ushahidi  Project
>> .................................................... 91
>>    3.5.3 A New Breed of Hackers
>> ..................................................... 94
>>     3.6 The* Do-It-Yourself* Approach
>> ........................................................... 97
>>     3.7 The Hacker Ethic
>> .............................................................................
>> 99
>>     3.8 Hacking and Crime
>> ..........................................................................
>> 101
>>     3.9 Threats to Hackers
>> ...........................................................................
>> 105
>>    3.9.1 The EFF Report Unintended Consequences ........................
>> 105
>>    3.9.2 Some Signi fi cant Recent Legal Cases:
>> Cease-and-Desist Actions
>> .................................................... 106
>>    3.10 Hacking Electronic Voting Machines
>> for the Purpose of Transparency
>> ...................................................... 117
>>   References
>> ...................................................................................................
>> 122
>> *  4 Digital Resistance, Digital Liberties and Human Rights*....................... 125
>>     4.1 Internet and Human Rights
>> .............................................................. 125
>>     4.2 Internet and the* Universal Declaration of Human Rights*............... 130
>>     4.3 The Council of Europe and the Human Rights Guidelines
>> for Internet Service Providers: The Role of ISPs
>> in Human Rights Environments and Protection
>> ............................... 133
>>     4.4 The WSIS Declaration of Principles
>> ................................................ 134
>>     4.5 The 2011 United Nations Report on the Promotion
>> and Protection of the Right to Freedom of Opinion
>> and Expression
>> .................................................................................
>> 137
>>     4.6 A Charter of Human Rights and Principles for the Internet
>> ............ 144
>>  4.7 The "Bill of Rights" Projects
>> ........................................................... 152
>>    4.7.1 The Internet Bill of Rights Drafted
>> within the IGF Works
>> ........................................................... 152
>>    4.7.2 The Internet Rights and Principles Dynamic
>> Coalition Bill of Rights
>> ........................................................ 154
>>     4.7.3 A Bill of Rights in Cyberspace
>> ............................................ 155
>>     4.7.4 The EFF  Bill of Privacy Rights
>> for* Social Network Users*..................................................... 156
>>    4.8 A Human Rights Approach to the Mobile Internet
>> ............................ 157
>>    4.9 The Relationship Between Human Rights and Technology
>> Sales to Oppressive Regimes
>> ............................................................. 159
>>   References
>> ...................................................................................................
>> 159
>> *  5 The Use of Liberation Technology*........................................................... 161
>>    5.1 Technical Resistance Tactics
>> .............................................................. 161
>>    5.2 Surveillance Self-Defense or Self-Defense Against
>> Surveillance and Monitoring
>> .............................................................. 167
>>    5.3 A Recent Circumvention Tool Usage Report
>> .................................... 169
>>    5.4 Tools and Guides
>> ................................................................................
>> 171
>>     5.4.1 Leaping Over the Firewall: A Review of Censorship
>> Circumvention Tools by* Freedom House*............................. 171
>>     5.4.2 Ten Fundamental Aspects of a Typical Liberation
>> Technology Tool
>> .................................................................. 176
>>     5.4.3 An Interesting (Comparative) Article
>> on Real Anonimity of VPN Systems Users ......................... 180
>>   References
>> ...................................................................................................
>> 184
>> *  6 Digital Activism, Internet Control, Transparency,*
>> *Censorship, Surveillance and Human Rights:
>> An International Perspective*................................................................... 187
>>    6.1 An Introductory Overview
>> ................................................................. 187
>>     6.1.1 The Global  OpenNet Initiative  Analysis
>> .............................. 187
>>     6.1.2 Techniques and Tools Commonly Used to Censor ..............
>> 201
>>    6.2 An Analysis of Several Countries with Critical
>> Human Rights Issues
>> ..........................................................................
>> 203
>>     6.2.1 Burma: Internet and Human Rights in a Particular
>> Technological, Political and Legal Framework ................... 203
>>     6.2.2 Cuba: Internet Control, User Restrictions, Legal
>> and Regulatory Frameworks, Blogosphere,
>> Digital Dissidents and Civil Society ....................................
>> 214
>>     6.2.3 South Korea: Digital Resistance Issues
>> ............................... 227
>>     6.2.4 Saudi Arabia: The Digital Liberties Landscape
>> ................... 230
>>     6.2.5 Syria: Digital Liberties Issues
>> .............................................. 233
>>     6.2.6 Iran: Internet and Digital Liberties Issues
>> ............................ 239
>>     6.2.7 China: The Internet and Types and Levels
>> of Chinese Internet Censorship
>> ............................................ 247
>>  6.2.8 Turkmenistan: Censorship and Control
>> ............................... 259
>>     6.2.9 Uzbekistan: Internet, Censorship and Surveillance .............
>> 262
>>    6.2.10 Vietnam: Digital Resistance and Censorship
>> ....................... 269
>>    6.2.11 Australia: Internet Filtering Policies, Digital Liberties
>> and Circumvention Tools
>> ..................................................... 273
>>    6.2.12 Iceland: Digital Resistance Issues
>> and Freedom of Information
>> ................................................ 279
>>    6.2.13 India: Freedom of Speech, Freedom of Information
>> and Electronic Censorship
>> ................................................... 283
>>    6.2.14 Russia. Internet and Human Rights: Political
>> and Technological Frameworks ...........................................
>> 290
>>    6.2.15 North Korea: The Main Digital Liberties Issues
>> .................. 295
>>    6.3 Revolts and Digital Dissidence in Egypt and Tunisia:
>> Where It All Began
>> ............................................................................
>> 301
>>     6.3.1 A Brief Summary of Digital Dissidence in Egypt ...............
>> 301
>>     6.3.2 A Brief Summary of Digital Dissidence in Tunisia .............
>> 303
>>   References
>> ...................................................................................................
>> 304
>> *  7 Conclusions: The Landscape of Digital Liberties and the Future*........ 309
>>    7.1 Human Rights in the Digital Era and the Role of Law
>> ...................... 309
>>    7.2 Technology as an* Antibody*................................................................ 311
>>    7.3 The Technological Scenario
>> ............................................................... 313
>>    7.4 The Relationships Between Hacking and Digital Resistance
>> ............ 314
>>   References
>> ...................................................................................................
>> 315
>> * Author Index*
>> ....................................................................................................
>> 317
>> *Subject Index*...................................................................................................
>> 321

>>
>>
>>
>> _______________________________________________
>> Brico mailing list
>> Website on http://www.bricolabs.net
>> Unsubscribe: http://lists.dyne.org/mailman/listinfo/brico
>>
>
>
> _______________________________________________
> Brico mailing list
> Website on http://www.bricolabs.net
> Unsubscribe: http://lists.dyne.org/mailman/listinfo/brico
>




--
Yto Aranda

www.yto.cl
www.escaner.cl
www.abierta.cl