:: Re: [Bricolabs] Resistance, Liberat…
Top Pagina
Delete this message
Reply to this message
Auteur: Paw
Datum:  
Aan: Bricolabs
Onderwerp: Re: [Bricolabs] Resistance, Liberation Technology
thanks for the link. read a few pages, and It looks good.

Also, relevant because of the current debate in Israel.
What use is encryption and VPN If journalists keep posting things on
Facebookusing their real names. Its almost as if they WANT to go to jail!

Keep spreading the PDF file. Easy to read, so It is good public
information.

On 02-04-2013 09:48, Jean-Noël Montagné wrote:
> Resistance, Liberation Technology
>
> newly published, may interest some people on bricolist. PDF download.
>
>
> Resistance, Liberation Technology
> and Human Rights in the Digital Age
> byGiovanni Ziccardi
> 300 pages, pdf
> http://cryptome.org/2013/03/hacking-digital-dissidence.pdf
>
> summary below
>
>
> JN
>
>
>
> summary
>
> *Opening Remarks: Hacking and Digital 
> Dissidence*.............................. 1
>   1.1 Using Computers for the Pursuit of Political and Social
> Changes and for the Bene fi t of All Mankind 
> ..................................... 1
>   1.2 From Early Hackers to Digital Resistance Activities 
> ........................ 5
>   1.3 The So-Called /Twitter Revolutions/ 
> .................................................... 7
>   1.4 The Worldwide Scenario, and Some Preliminary
> Interpretative Questions 
> ..................................................................... 9
>   References 
> ................................................................................................... 
> 22
> *  2 Digital Resistance, Digital Liberties and Digital Transparency* 
> ........... 27
>   2.1 A Preliminary De fi nition of /Digital Resistance/
> and /Digital Liberties/ 
> .......................................................................... 
> 27
>   2.1.1 Some Focal Aspects of Digital Dissidence 
> ............................ 27
>   2.1.2 Preliminary Legal and Political Remarks 
> .............................. 28
>   2.1.3 The Power of Technology in Critical Contexts
> and the New Public Sphere 
> .................................................... 30
>   2.2 The Fundamental Role of a Secure (and Peer-Reviewed)
> Liberation Technology: The /Haystack/  Case-History 
> ......................... 32
>   2.3 Two Key Aspects of Digital Resistance Activities,
> and Several Case Studies 
> ................................................................... 36
>   2.3.1 The Key Aspects of Dissident Activities 
> ............................... 36
>   2.3.2 Digital Resistance Case-Studies 
> ............................................. 41
>   2.4 Open Government, Collaborative Transparency
> and Civic Hacking as a Form of Digital Resistance 
> .......................... 47
>   2.4.1 The Idea of Government as a Platform
> for 
> Transparency..................................................................... 
> 47
>   2.4.2 The Metaphor of Government 2.0 and the Idea
> of Collaborative Transparency 
> ............................................... 49
>   2.4.3 Citizen Engagement for the Oversight
> of Political Activity 
> ................................................................ 51
>   2.4.4 Collaborative Mapping and Digital Resistance 
> ...................... 59
>   References 
> ................................................................................................... 
> 68
> *  3 Hacking and Digital Dissidence Activities* 
> .............................................. 73
>     3.1 The Role of Hackers in the Landscape of Digital Resistance 
> .......... 73
>     3.2 A First Analysis of Common Threats to Digital
> Freedom and to Hacker Activities 
> ................................................... 74
>     3.3 Being a Hacker in This Framework 
> ................................................. 76
>    3.3.1 Thinking Like a Hacker 
> ....................................................... 76
>    3.3.2 State Antagonism, Fear and Violence 
> .................................. 79
>     3.4 A Brand New Playground 
> ................................................................ 81
>    3.4.1 Liberation Technologies 
> ....................................................... 81
>    3.4.2 Anonymity and Bloggers' Rights 
> ........................................ 84
>    3.4.3 Innovation 
> ............................................................................ 
> 86
>    3.4.4 Intellectual Property and Privacy 
> ......................................... 86
>    3.4.5 EPIC Activities in the Field of Privacy 
> ................................ 88
>    3.4.6 Transparency 
> ........................................................................ 
> 89
>     3.5 A New Perspective on Hacking 
> ....................................................... 90
>    3.5.1 The Essence of hacking 
> ....................................................... 90
>    3.5.2 The Hacker Spirit and Some Lessons
> from the  Ushahidi  Project 
> .................................................... 91
>    3.5.3 A New Breed of Hackers 
> ..................................................... 94
>     3.6 The/Do-It-Yourself/ Approach 
> ........................................................... 97
>     3.7 The Hacker Ethic 
> ............................................................................. 
> 99
>     3.8 Hacking and Crime 
> .......................................................................... 
> 101
>     3.9 Threats to Hackers 
> ........................................................................... 
> 105
>    3.9.1 The EFF Report Unintended Consequences 
> ........................ 105
>    3.9.2 Some Signi fi cant Recent Legal Cases:
> Cease-and-Desist Actions 
> .................................................... 106
>    3.10 Hacking Electronic Voting Machines
> for the Purpose of Transparency 
> ...................................................... 117
>   References 
> ................................................................................................... 
> 122
> *  4 Digital Resistance, Digital Liberties and Human Rights* 
> ....................... 125
>     4.1 Internet and Human Rights 
> .............................................................. 125
>     4.2 Internet and the/Universal Declaration of Human Rights/ 
> ............... 130
>     4.3 The Council of Europe and the Human Rights Guidelines
> for Internet Service Providers: The Role of ISPs
> in Human Rights Environments and Protection 
> ............................... 133
>     4.4 The WSIS Declaration of Principles 
> ................................................ 134
>     4.5 The 2011 United Nations Report on the Promotion
> and Protection of the Right to Freedom of Opinion
> and Expression 
> ................................................................................. 
> 137
>     4.6 A Charter of Human Rights and Principles for the Internet 
> ............ 144
>  4.7 The "Bill of Rights" Projects 
> ........................................................... 152
>    4.7.1 The Internet Bill of Rights Drafted
> within the IGF Works 
> ........................................................... 152
>    4.7.2 The Internet Rights and Principles Dynamic
> Coalition Bill of Rights 
> ........................................................ 154
>     4.7.3 A Bill of Rights in Cyberspace 
> ............................................ 155
>     4.7.4 The EFF  Bill of Privacy Rights
> for/Social Network Users/ 
> ..................................................... 156
>    4.8 A Human Rights Approach to the Mobile Internet 
> ............................ 157
>    4.9 The Relationship Between Human Rights and Technology
> Sales to Oppressive Regimes 
> ............................................................. 159
>   References 
> ................................................................................................... 
> 159
> *  5 The Use of Liberation Technology* 
> ........................................................... 161
>    5.1 Technical Resistance Tactics 
> .............................................................. 161
>    5.2 Surveillance Self-Defense or Self-Defense Against
> Surveillance and Monitoring 
> .............................................................. 167
>    5.3 A Recent Circumvention Tool Usage Report 
> .................................... 169
>    5.4 Tools and Guides 
> ................................................................................ 
> 171
>     5.4.1 Leaping Over the Firewall: A Review of Censorship
> Circumvention Tools by/Freedom House/............................. 171
>     5.4.2 Ten Fundamental Aspects of a Typical Liberation
> Technology Tool 
> .................................................................. 176
>     5.4.3 An Interesting (Comparative) Article
> on Real Anonimity of VPN Systems Users ......................... 180
>   References 
> ................................................................................................... 
> 184
> *  6 Digital Activism, Internet Control, Transparency,*
> *Censorship, Surveillance and Human Rights:
> An International Perspective* 
> ................................................................... 187
>    6.1 An Introductory Overview 
> ................................................................. 187
>     6.1.1 The Global  OpenNet Initiative Analysis 
> .............................. 187
>     6.1.2 Techniques and Tools Commonly Used to Censor .............. 201
>    6.2 An Analysis of Several Countries with Critical
> Human Rights Issues 
> .......................................................................... 
> 203
>     6.2.1 Burma: Internet and Human Rights in a Particular
> Technological, Political and Legal Framework ................... 203
>     6.2.2 Cuba: Internet Control, User Restrictions, Legal
> and Regulatory Frameworks, Blogosphere,
> Digital Dissidents and Civil Society 
> .................................... 214
>     6.2.3 South Korea: Digital Resistance Issues 
> ............................... 227
>     6.2.4 Saudi Arabia: The Digital Liberties Landscape 
> ................... 230
>     6.2.5 Syria: Digital Liberties Issues 
> .............................................. 233
>     6.2.6 Iran: Internet and Digital Liberties Issues 
> ............................ 239
>     6.2.7 China: The Internet and Types and Levels
> of Chinese Internet Censorship 
> ............................................ 247
>  6.2.8 Turkmenistan: Censorship and Control 
> ............................... 259
>     6.2.9 Uzbekistan: Internet, Censorship and Surveillance 
> ............. 262
>    6.2.10 Vietnam: Digital Resistance and Censorship 
> ....................... 269
>    6.2.11 Australia: Internet Filtering Policies, Digital Liberties
> and Circumvention Tools 
> ..................................................... 273
>    6.2.12 Iceland: Digital Resistance Issues
> and Freedom of Information 
> ................................................ 279
>    6.2.13 India: Freedom of Speech, Freedom of Information
> and Electronic Censorship 
> ................................................... 283
>    6.2.14 Russia. Internet and Human Rights: Political
> and Technological Frameworks 
> ........................................... 290
>    6.2.15 North Korea: The Main Digital Liberties Issues 
> .................. 295
>    6.3 Revolts and Digital Dissidence in Egypt and Tunisia:
> Where It All Began 
> ............................................................................ 
> 301
>     6.3.1 A Brief Summary of Digital Dissidence in Egypt 
> ............... 301
>     6.3.2 A Brief Summary of Digital Dissidence in Tunisia 
> ............. 303
>   References 
> ................................................................................................... 
> 304
> *  7 Conclusions: The Landscape of Digital Liberties and the Future* 
> ........ 309
>    7.1 Human Rights in the Digital Era and the Role of Law 
> ...................... 309
>    7.2 Technology as an/Antibody/ 
> ................................................................ 311
>    7.3 The Technological Scenario 
> ............................................................... 313
>    7.4 The Relationships Between Hacking and Digital Resistance 
> ............ 314
>   References 
> ................................................................................................... 
> 315
> * Author 
> Index*.................................................................................................... 
> 317
> *Subject Index* 
> ................................................................................................... 
> 321

>
>
>
>
> _______________________________________________
> Brico mailing list
> Website on http://www.bricolabs.net
> Unsubscribe: http://lists.dyne.org/mailman/listinfo/brico