67
1 Freedom Technologists: Digital Activism and Political Change in the 21 st Century (working title) Chapter 2, Freedom Technologists John Postill RMIT University, Melbourne September 2015 Annotated bibliography In this working bibliography I bring together a large set of (mostly academic) references on a specific category of political actor that I am calling ‘freedom technologists’, namely those tech-minded individuals, groups and organisations who have a keen interest in the democratic and emancipatory potential of information and communication technologies (ICTs). In other words, freedom technologists combine technological and political notions and skills to pursue greater Internet and democratic freedoms, which they regard as being inextricably entwined (Postill 2014). Far from being techno-utopians or deluded ‘slacktivists’ (Morozov, 2013, Skoric, 2012), in my experience most freedom technologists are in fact techno-pragmatists, that is, people who take a very practical view of the limits and possibilities of new technologies for political change. This working bibliography is part of current research towards my forthcoming book Freedom Technologists: Digital Activism and Political Change in the 21 st Century (working title). Further suggestions are always welcome via email or via the comments section. This is the twenty-third post in the freedom technologists series. Keywords: technology, politics, techno-politics, hackers, hacktivism, digital activism, internet activism, digital liberation movement, political change, social protest, techno-libertarians Aday, S., Farrell, H., Lynch, M., Sides, J., Kelly, J., & Zuckerman, E. (2010). Blogs and bullets: New media in contentious politics. In this report from the United States Institute of Peace’s Centers of Innovation for Science, Technology, and Peacebuilding, and Media, Conflict, and Peacebuilding, a team of scholars from The George Washington University, in cooperation with scholars from Harvard University and Morningside Analytics, critically assesses both the “cyberutopian” and “cyberskeptic” perspectives on the impact of new media on political movements. Akser, M. (2015). The Revolution Will Be Hacktivated. Digital Transformations in Turkey: Current Perspectives in Communication Studies, 275. The democratic rights claimed to be enshrined but curtailed under the AKP government’s repressive regime was counterbalanced by Redhack, a Turkish hacktivist group online. Through their diverse tactics such as resistance, revelation

Freedom technologists bibliography

  • Upload
    rmit

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

1    

Freedom Technologists: Digital Activism and Political Change in the 21st Century (working title)

Chapter 2, Freedom Technologists  

John Postill  RMIT University, Melbourne  

September 2015    

Annotated bibliography  

In this working bibliography I bring together a large set of (mostly academic) references on a specific category of political actor that I am calling ‘freedom technologists’, namely those tech-minded individuals, groups and organisations who have a keen interest in the democratic and emancipatory potential of information and communication technologies (ICTs). In other words, freedom technologists combine technological and political notions and skills to pursue greater Internet and democratic freedoms, which they regard as being inextricably entwined (Postill 2014). Far from being techno-utopians or deluded ‘slacktivists’ (Morozov, 2013, Skoric, 2012), in my experience most freedom technologists are in fact techno-pragmatists, that is, people who take a very practical view of the limits and possibilities of new technologies for political change. This working bibliography is part of current research towards my forthcoming book Freedom Technologists: Digital Activism and Political Change in the 21st Century (working title). Further suggestions are always welcome via email or via the comments section.  

This is the twenty-third post in the freedom technologists series.  

Keywords: technology, politics, techno-politics, hackers, hacktivism, digital activism, internet activism, digital liberation movement, political change, social protest, techno-libertarians  

Aday, S., Farrell, H., Lynch, M., Sides, J., Kelly, J., & Zuckerman, E. (2010). Blogs and bullets: New media in contentious politics.  

In this report from the United States Institute of Peace’s Centers of Innovation for Science, Technology, and Peacebuilding, and Media, Conflict, and Peacebuilding, a team of scholars from The George Washington University, in cooperation with scholars from Harvard University and Morningside Analytics, critically assesses both the “cyberutopian” and “cyberskeptic” perspectives on the impact of new media on political movements.  

Akser, M. (2015). The Revolution Will Be Hacktivated. Digital Transformations in Turkey: Current Perspectives in Communication Studies, 275.  

The democratic rights claimed to be enshrined but curtailed under the AKP government’s repressive regime was counterbalanced by Redhack, a Turkish hacktivist group online. Through their diverse tactics such as resistance, revelation

2    

and countering Redhack’s activity led to a digital transformation in Turkish politics. Redhack’s opposition is towards AKP’s neo-liberal patronage policies. The resistance took many forms: (1) defacing government websites that misuse public resources. (2) revelation to counter censorship against traditional media by the AKP government. By revealing documents related to AKP government’s corruption, Redhack led the way for traditional media to bring the issue to public scrutiny. The third tactic of taking direct action in the form of counter-attack came as a result of the Gezi Park Occupy Istanbul movement. Redhack actively used television to voice their agenda and called people to action. A networked discourse analysis that looks at mediation of playful tactics by hacktivists is a new transformative phase in how cyber security shifts from terrorism into information resistance, revelation and countering.  

Alcazan et al (2012) Tecnopolítica. Internet y R-Evoluciones. Icaria.  

#Error 404. Democracy Not Found. El 15 de mayo de 2011 salimos a la calle después de meses de trabajo en la red. El 15-M es inimaginable sin internet y el uso político que las multitudes conectadas han hecho de él. El 15-M es impensable sin la red de redes, somos una red distribuida de cambio social. Con este libro queremos hacer una contribución a una lectura del 15-M abierta y en construcción, que valore su dimensión tecnopolítica. Entender la relación del 15-M con internet, con sus precedentes, con sus dispositivos de comunicación y organización, es esencial para comprender las posibilidades abiertas para la acción colectiva en la sociedad red. La r-evolución está en marcha y se multiplica de manera global. Se extiende la indignación, el deseo de cambio y emerge el potencial de transformación de las redes abiertas y distribuidas.  

Al Hussaini, A. (2011). Tunisia: Anonymous vs. Ammar–who wins the battle of censorship?. Global Voices, 3 January 2011, https://globalvoicesonline.org/2011/01/03/tunisia-anonymous-vs-ammar-who-wins-the-battle-of-censorship/  

The Tunisian censor, commonly known as Ammar, continues to wreak havoc on activists’ accounts, in a country that has been witnessing a wave of protests since the middle of December. Just today, activists claimed that the government has hacked into their email accounts, accessing their blogs and social networking sites, and disabling them. The move seems to have come in retaliation to an attack by Anonymous, which has targeted vital Tunisian government sites and gateways.  

Andrejevic, M. (2014). WikiLeaks, Surveillance, and Transparency. International Journal of Communication, 8, 2619-2630.  

The place for WikiLeaks was, in a sense, carved out in advance by the dramatic failure of conventional channels for challenging power or holding it accountable. It is a fact that deserves more attention than it gets that, in the United States, the two political newspapers of record (The New York Times and The Washington Post) issued extended public apologies for failures in their coverage during the lead-up to the invasion of Iraq. In no uncertain terms, these influential newspapers conceded that they did not provide adequate information to the populace about one of the most

3    

important decisions facing the nation—a decision that would claim the lives of tens of thousands of people and redefine international relations on a global scale. The Times noted that, on reviewing its coverage of the lead-up to the war, “we have found a number of instances of coverage that was not as rigorous as it should have been” (The Editors, 2001, para. 3)—a failure that it identified as structural.  

Appelgren, E., & Nygren, G. (2014). Data Journalism in Sweden: Introducing new methods and genres of journalism into “old” organizations. Digital Journalism, 2(3), 394-405.  

Data journalism is an evolving form of investigative journalism. In previous research and handbooks published on this topic, this form of journalism has been called computer-assisted reporting and data-driven journalism, as well as precision, computational or database journalism. In Sweden, data journalism is still fairly uncommon. The purpose of this paper is to provide an overview of the development of data journalism at seven Swedish traditional media companies, using action research methods. The content of this paper is based on an online survey of journalists and in-depth interviews with editors at these participating companies. The results indicate that, based on how this field is currently perceived by journalists in the interviews, there is a common definition of data journalism. Furthermore, the survey shows that the attitudes towards data journalism during the process of introducing new methods and genres of journalism into “old” organizations are correlated with the level of perceived experience in data journalism working methods. The main challenges facing the working methods of data journalism today are a shortage of time and the need for training and developing data journalism skills.  

Armitage, J. (ed.) (1999) ‘Special Issue on Machinic Modulations: New Cultural Theory and Technopolitics’, Angelaki: Journal of the Theoretical Humanities 4(2) (September).  

Assange, J., Appelbaum, J., Muller-Maguhn, A., & Zimmermann, J. (2012). Cypherpunks: Freedom and the Future of the Internet. Singapore Books.  

“Cypherpunks: Freedom and the Future of the Internet is an important wake-up call about a possible dystopian future, which is a technological reality now… While messengers of dangerous outcomes are always met at first with hostility and even mockery, history shows that we disregard such warnings as these at our peril.” —Naomi Wolf  

Baack, S. (2015). Datafication and empowerment: How the open data movement re-articulates notions of democracy, participation, and journalism. Big Data & Society, 2(2), 2053951715594634.  

This article shows how activists in the open data movement re-articulate notions of democracy, participation, and journalism by applying practices and values from open source culture to the creation and use of data. Focusing on the Open Knowledge Foundation Germany and drawing from a combination of interviews and content analysis, it argues that this process leads activists to develop new rationalities around

4    

datafication that can support the agency of datafied publics. Three modulations of open source are identified: First, by regarding data as a prerequisite for generating knowledge, activists transform the sharing of source code to include the sharing of raw data. Sharing raw data should break the interpretative monopoly of governments and would allow people to make their own interpretation of data about public issues. Second, activists connect this idea to an open and flexible form of representative democracy by applying the open source model of participation to political participation. Third, activists acknowledge that intermediaries are necessary to make raw data accessible to the public. This leads them to an interest in transforming journalism to become an intermediary in this sense. At the same time, they try to act as intermediaries themselves and develop civic technologies to put their ideas into practice. The article concludes with suggesting that the practices and ideas of open data activists are relevant because they illustrate the connection between datafication and open source culture and help to understand how datafication might support the agency of publics and actors outside big government and big business.  

Bailey Jr, C. W. (2013). Strong copyright+ DRM+ weak net neutrality= digital dystopia?. Information Technology and Libraries, 25(3), 116-127.  

Three critical issues—a dramatic expansion of the scope, duration, and punitive nature of copyright laws; the ability of Digital Rights Management (DRM) systems to lock-down digital content in an unprecedented fashion; and the erosion of Net neutrality, which ensures that all Internet traffic is treated equally—are examined in detail and their potential impact on libraries is assessed. How legislatures, the courts, and the commercial marketplace treat these issues will strongly influence the future of digital information for good or ill.  

Barron, B. (2007). The Importance of Network Neutrality to the Internet’s Role in the Public Sphere. Canadian Journal of Media Studies, 3(1), 90-105.  

Network Neutrality, the principle by which Internet Service Providers transmit data equally without consideration to its source, type, content or destination, is important to the creation and preservation of effective democratic communication on the Internet. While there are many faults which can be found with discussion and debate on the Internet, the Internet still represents an improvement over traditional media and media distribution networks and should be carefully protected.  

Bastos, M. T., & Mercea, D. (2015). Serial activists: Political Twitter beyond influentials and the twittertariat. New Media & Society, 1461444815584764.  

This article introduces a group of politically charged Twitter users that deviates from elite and ordinary users. After mining 20  M tweets related to nearly 200 instances of political protest from 2009 to 2013, we identified a network of individuals tweeting across geographically distant protest hashtags and revisited the term “serial activists.” We contacted 191 individuals and conducted 21 in-depth, semi-structured interviews thematically coded to provide a typology of serial activists and their struggles with institutionalized power. We found that these users have an ordinary following, but bridge disparate language communities and facilitate collective action by virtue of

5    

their dedication to multiple causes. Serial activists differ from influentials or traditional grassroots activists and their activity challenges Twitter scholarship foregrounding the two-step flow model of communication. The results add a much needed depth to the prevalent data-driven treatment of political Twitter by describing a class of extraordinarily prolific users beyond influentials and the twittertariat.  

Beckett, C. and J. Ball (2012). Wikileaks: News in the networked era. Polity.  

WikiLeaks is the most challenging journalistic phenomenon to have emerged in the digital era. It has provoked anger and enthusiasm in equal measure, from across the political and journalistic spectrum. WikiLeaks poses a series of questions to the status quo in politics, journalism and to the ways we understand political communication. It has compromised the foreign policy operations of the most powerful state in the world, broken stories comparable to great historic scoops like the Pentagon Papers, and caused the mighty international news organizations to collaborate with this tiny editorial outfit. Yet it may also be on the verge of extinction. This is the first book to examine WikiLeaks fully and critically and its place in the contemporary news environment. The authors combine inside knowledge with the latest media research and analysis to argue that the significance of Wikileaks is that it is part of the shift in the nature of news to a network system that is contestable and unstable. Welcome to Wiki World and a new age of uncertainty. Charlie Beckett July 10, 2012 at 3:34 pm: For a shorter but more approving review of this book try this: http://eandt.theiet.org/magazine/2012/02/book-reviews.cfm “a cool-headed, astute analysis of the social, political and technological context in which the now infamous website was formed. From the wider issues of government and corporate transparency to the potential impact of the leaks on the future possibility of an open Internet, the two co-authors pack a great deal into the book’s 164 pages. Throughout it remains eminently readable, thought-provoking and insightful.”  

Benkler, Y. (2006). The wealth of networks: How social production transforms markets and freedom. Yale University Press.  

With the radical changes in information production that the Internet has introduced, we stand at an important moment of transition, says Yochai Benkler in this thought-provoking book. The phenomenon he describes as social production is reshaping markets, while at the same time offering new opportunities to enhance individual freedom, cultural diversity, political discourse, and justice. But these results are by no means inevitable: a systematic campaign to protect the entrenched industrial information economy of the last century threatens the promise of today’s emerging networked information environment. In this comprehensive social theory of the Internet and the networked information economy, Benkler describes how patterns of information, knowledge, and cultural production are changing—and shows that the way information and knowledge are made available can either limit or enlarge the ways people can create and express themselves. He describes the range of legal and policy choices that confront us and maintains that there is much to be gained—or lost—by the decisions we make today.  

6    

Benkler, Y. (2011). Free Irresponsible Press: Wikileaks and the Battle over the Soul of the Networked Fourth Estate, A. Harv. CR-CLL Rev., 46, 311.  

A study of the events surrounding the Wikileaks document releases in 2010 provides a rich set of insights about the weaknesses and sources of resilience of the emerging networked fourth estate. It marks the emergence of a new model of watchdog function, one that is neither purely networked nor purely traditional, but is rather a mutualistic interaction between the two. It identifies the peculiar risks to, and sources of resilience of, the networked fourth estate in a multidimensional system of expression and restraint, and suggests the need to resolve a major potential vulnerability—the ability of private infrastructure companies to restrict speech without being bound by the constraints of legality, and the possibility that government actors will take advantage of this affordance in an extralegal public-private partnership for censorship. Finally, it offers a richly detailed event study of the complexity of the emerging networked fourth estate, and the interaction, both constructive and destructive, between the surviving elements of the traditional model and the emerging elements of the new. It teaches us that the traditional, managerial-professional sources of responsibility in a free press function imperfectly under present market conditions, while the distributed models of mutual criticism and universal skeptical reading, so typical of the Net, are far from powerless to deliver effective criticism and self-correction where necessary. The future likely is, as the Guardian put it, “a new model of co-operation” between surviving elements of the traditional, mass-mediated fourth estate, and its emerging networked models.418 The transition to this new model will likely be anything but smooth.  

Bennett, W. L., & Segerberg, A. (2012). The logic of connective action: Digital media and the personalization of contentious politics. Information, Communication & Society, 15(5), 739-768.  

From the Arab Spring and los indignados in Spain, to Occupy Wall Street (and beyond), large-scale, sustained protests are using digital media in ways that go beyond sending and receiving messages. Some of these action formations contain relatively small roles for formal brick and mortar organizations. Others involve well-established advocacy organizations, in hybrid relations with other organizations, using technologies that enable personalized public engagement. Both stand in contrast to the more familiar organizationally managed and brokered action conventionally associated with social movement and issue advocacy. This article examines the organizational dynamics that emerge when communication becomes a prominent part of organizational structure. It argues that understanding such variations in large-scale action networks requires distinguishing between at least two logics that may be in play: The familiar logic of collective action associated with high levels of organizational resources and the formation of collective identities, and the less familiar logic of connective action based on personalized content sharing across media networks. In the former, introducing digital media do not change the core dynamics of the action. In the case of the latter, they do. Building on these distinctions, the article presents three ideal types of large-scale action networks that are becoming prominent in the contentious politics of the contemporary era.  

7    

Beyer, J. L. (2014a). Expect us: online communities and political mobilization. Oxford University Press.  

Expect Us focuses on four online communities—Anonymous (4chan.org), The Pirate Bay, World of Warcraft, and the IGN.com posting boards. In all of these online communities, members engaged deeply with political issues in a range of ways. However, only two of the communities mobilized politically. If political behavior occurred on all four communities, why did only two of these sites foster political mobilization among their participants, while the other two did not? Using ethnographic methods, Expect Us argues that key structural features about the birthplaces of the four communities shaped the type of political behavior that emerged from each. The book argues that the likelihood of political mobilization rises when a site provides high levels of anonymity, low levels of formal regulation, and minimal access to small-group interaction. Once these factors are present, the nature of the communities themselves—their values and emergent norms of behavior—then appears to influence whether there is a conflict between the dominant community norms and offline legal and behavioral norms. Although this normative conflict is by no means a perfect “recipe” for predicting political mobilization, it certainly appeared to set the stage for cohesive political action by an online community. Keywords: online community, anonymity, regulation, digital rights, information politics, WikiLeaks, Anonymous, The Pirate Bay, World of Warcraft, IGN.com  

Beyer, J. L. (2014b). The emergence of a freedom of information movement: Anonymous, WikiLeaks, the Pirate party, and Iceland. Journal of Computer‐Mediated Communication, 19(2), 141-154.  

Online rhetoric about the Internet’s potential to change society, the need to reform intellectual property laws, and the evils of censorship is becoming increasingly similar across sites. The push for “freedom of information” is not restricted to online spaces, but it appears to be born from such spaces, with the concept itself shaped by the presence of the Internet and its effect on networked societies. Focusing on WikiLeaks, the Pirate Party, Anonymous, and Iceland, I describe the emerging coalescence of “freedom of information” advocates pushing for a simultaneous liberalization and homogenization of freedom of information regulations across democracies.  

Beyer, J. L., & McKelvey, F. (2015). Piracy & Social Change: You Are Not Welcome Among Us: Pirates and the State. International Journal of Communication, 9, 19.  

In a historical review focused on digital piracy, we explore the relationship between hacker politics and the state. We distinguish between two core aspects of piracy—the challenge to property rights and the challenge to state power—and argue that digital piracy should be considered more broadly as a challenge to the authority of the state. We trace generations of peer-to-peer networking, showing that digital piracy is a key component in the development of a political platform that advocates for a set of ideals grounded in collaborative culture, nonhierarchical organization, and a reliance on the network. We assert that this politics expresses itself in a philosophy that was formed

8    

together with the development of the state-evading forms of communication that perpetuate unmanageable networks. Keywords: pirates, information politics, intellectual property, state networks.  

Boler, M., Macdonald, A., Nitsou, C., & Harris, A. (2014) Connective labor and social media: Women’s roles in the ‘leaderless’ Occupy movement. Convergence: The International Journal of Research into New Media Technologies, 20(4), pp. 438-460.  

This article draws upon the insights of 75 Occupy activists from Toronto and across the United States interviewed as part of the 3-year study ‘Social Media in the Hands of Young Citizens’. This article highlights three major roles adopted by women in the so-called leaderless, horizontally structured Occupy movement – both within the offline, face-to-face General Assembly meetings held during the Occupy encampments and within the online spaces of Facebook pages, Web sites, affinity groups, and working committees. As key participants in the movement, women used social technologies such as Facebook, Twitter, and livestreaming as modes of activist engagement, developing unique roles such as that of the ‘Admin’ (Social Media Administrator), the ‘Documentarian’, and the ‘Connector’. The women’s adoption of these roles illustrates, we argue, the emerging notion of ‘connective labor’ an extended enactment of Bennett and Segerberg’s (2012) notion of ‘the logic of connective action’, augmenting its logic to reveal the often hidden labor of women in sustaining the networked and affective dimension of social movements. This article highlights the gendered, hybrid, embodied, and material nature of women’s connective labor that has supported, and in many ways sustained, the contemporary Occupy movement.  

Breindl, Y., & Briatte, F. (2013). Digital protest skills and online activism against copyright reform in France and the European Union. Policy & Internet, 5(1), 27-55.  

In the past decade, parliaments in industrialized countries have been pressured to adopt more restrictive legislation to prevent unauthorized file-sharing and enforce higher standards of digital copyright enforcement over entertainment media and computer software. A complex process of supranational and national lawmaking has resulted in several legislatures adopting such measures, with wide variations in content and implementation. These policy developments offer an interesting research puzzle, given their high political salience and the amount of controversy they have generated. Specifically, the introduction of harsher intellectual property regulations has resulted in intense “online” and “offline” collective action by skilled activists who have significantly altered the digital copyright policy field over the years. In France, grassroots movements have turned the passing of digital copyright infringement laws through Parliament into highly controversial episodes. Similarly, at the European level, the Telecoms Package Reform has given rise to an intense protest effort, carried by an ad hoc coalition of European activists. In both cases, online mobilization was an essential element of political contention against these legislative initiatives. In both cases, our analysis shows that online mobilization and contention can substantially affect policymaking by disrupting the course of parliamentary lawmaking at both the

9    

national and European levels. We provide an analytical framework to study these processes, as well as an analysis of the frames and digital network repertoires involved in the two cases under scrutiny, with reference to the nascent research agenda formed by the politics of intellectual property. Keywords: digital copyright; intellectual property; online mobilization; collective action.  

Brevini, B., Hintz, A., & McCurdy, P. (Eds.). (2013). Beyond WikiLeaks: implications for the future of communications, journalism and society. Palgrave Macmillan.  

Revelations published by the whistleblower platform WikiLeaks, including the releases of U.S. diplomatic cables in what became referred to as ‘Cablegate’, put WikiLeaks into the international spotlight and sparked intense about the role and impact of leaks in a digital era. Beyond WikiLeaks opens a space to reflect on the broader implications across political and media fields, and on the transformations that result from new forms of leak journalism and transparency activism. A select group of renowned scholars, international experts, and WikiLeaks ‘insiders’ discuss the consequences of the WikiLeaks saga for traditional media, international journalism, freedom of expression, policymaking, civil society, social change, and international politics. From short insider reports to elaborate and theoretically informed academic texts, the different chapters provide critical assessments of the current historical juncture of our mediatized society and offer outlooks of the future. Authors include, amongst others, Harvard University’s Yochai Benkler, Graham Murdoch of Loughborough University, net activism scholar, Gabriella Coleman, the Director for International Freedom of Expression at the Electronic Frontier Foundation, Jillian York, and Guardian editor, Chris Elliott. The book also includes a conversation between philosopher, Slavoj Zizek, and WikiLeaks founder, Julian Assange, and its prologue is written by Birgitta Jónsdóttir, Icelandic MP and editor of the WikiLeaks video, `Collateral Murder`.  

Briatte, F., & Gueydier, P. Artistes, lobbyistes et pirates: l’opposition de plaidoyers professionnels et activistes autour du droit d’auteur sur Internet en France, 2005-2010. In Congrès de l’Association Française de Science Politique.  

L’analyse présentée dans ce texte a d’abord consisté à rappeler le rôle d’antécédents critiques dans la situation actuelle, marquée à la fois par la tradition nationale française de protection du droit d’auteur et par les mutations de sa régulation transnationale, en réaction à l’expansion des télécommunications Internet et du développement des technologies numériques de partage de fichiers. Cette séquence, initialement dominée par un argumentaire professionnel, montre que l’irruption de plaidoyers contestataires s’y est effectuée en partie par homothétie avec les règles de fonctionnement usuelles du champ d’action stratégique constitué autour du droit d’auteur. Ce parallélisme entre les activités de plaidoyers professionnel et activiste autour de la régulation du droit d’auteur n’est pas fortuit : nos terrains de recherche respectifs montrent au contraire que ce jeu de contrastes a fait partie intégrante de la stratégie employée par les groupes d’activistes ayant le plus professionnalisé leur activité de mobilisation.  

10    

Brooke, H. (2011), The Revolution Will Be Digitised: Dispatches from the Information War, London: William Heinemann.  

There is more information in the world than ever before – but who’s in control? At the centre sits the Establishment: governments, corporations and powerful individuals who have more knowledge about us, and more power, than ever before. Circling them is a new generation of hackers, pro-democracy campaigners and internet activists who no longer accept that the Establishment should run the show. Award-winning journalist and campaigner Heather Brooke takes us inside the Information War and explores the most urgent questions of the digital age: where is the balance between freedom and security? In an online world, does privacy still exist? And will the internet empower individuals, or usher in a new age of censorship, surveillance and oppression?  

Brooke, H. 2011. “Inside the secret world of hackers,” Guardian (24 August), at http://www.guardian.co.uk/technology/2011/aug/24/inside-secret-world-of-hackers,  

If Anonymous and Lulzsec are the id of hacking, then physical hackerspaces are the heart of the higher-minded hacking ideals: freedom of information, meritocracy of ideas, a joy of learning and anti-authoritarianism. The CCC is Europe’s largest hacker organisation and also one of the oldest worldwide, having been set up in 1981 by Wau Holland and others who predicted the rising importance digital technology would have in people’s lives. CCC’s hackers are often older and run their own businesses. They hold conferences and even consult with the German government. The CCC is famous for exposing the security flaws of major technologies, from chip and PIN to smartphones. Want to know how to listen in on GSM mobile phone traffic? Here’s the place to learn (within legal constraints, of course). Among some of their more noteworthy “hacks” is pulling the fingerprints of the German interior minister from a water glass and putting them on a transparent film that could be used to fool fingerprint readers. The Club also worked with activists for voting transparency to expose flaws in computerised voting machines. These were later ruled unconstitutional in Germany and abolished in Holland.  

The CCC isn’t just about technical hacking, it is a hub of political activism based around a few common goals: transparency of governments, privacy for private people and the removal of excessive restrictions on sharing information. Many of these hacks are demonstrated at the annual conference at the Berlin Congress Centre, and it was here that Julian Assange presented WikiLeaks to an enthusiastic crowd in 2008.  

Hackerspaces aren’t just about hacking with computers. The ideals can be applied to every aspect of life including politics – which is considered just another “system” by which humans live together. Like any other system, it can therefore be hacked and these spaces offer a real-time experiment in political hacking.  

Bruce, M., Peltu, M., & Dutton, W. H. (1999). Society on the line: Information politics in the digital age. Oxford University Press.  

11    

Society on the Line presents a new way of thinking about the social and economic implications of the revolution in information and communication technologies (ICTs). It offers a clear overview of information in the digital age, and explains how social and technical choices about ICTs influence access to information, people, services, and technologies themselves.  

Cammaerts, B. (2013). Networked Resistance: the case of WikiLeaks. Journal of Computer‐Mediated Communication, 18(4), 420-436.  

In this article, WikiLeaks is embedded within broader debates relevant to both social movement and mediation theory. First, the nature of the ties between a variety of relevant actors are assessed. Second, the networked opportunities and constraints at a discursive and material level of analysis are highlighted and finally the resistance strategies they employ towards mainstream culture are addressed. It is concluded that at the heart of information and communication resistance a dynamic dialectic can be observed between mediated opportunities for disruptions and attempts of the powers that be to close down these opportunities. Furthermore, it has to be acknowledged that reliance on mainstream actors and structures for exposure, funding or hosting contentious content comes with risks for radical activists. Keywords: Opportunity Structure; Mediation; Hacktivism; Networks; WikiLeaks.  

Cammaerts, B. (2015). Pirates on the Liquid Shores of Liberal Democracy: Movement Frames of European Pirate Parties. Javnost-The Public, 22(1), 19-36.  

In this article, the movement frames of European Pirate Parties are analysed through a thematic analysis of texts relating to the Pirate Parties and transcripts of semi-structured interviews with representatives of Pirate Parties across three European countries—Germany, the United Kingdom and Belgium. At the level of the diagnostic and prognostic frames the Pirate Parties address contentious issues and discourses about civic liberties, privacy and access to knowledge in a digital era, but they also critique liberal representative democracy as such, which they argue needs to incorporate delegative models of democracy. In addition to this, a pro-social frame is presented emphasising free education and a basic income. In order to achieve these aims the Pirate Parties develop a distinct collective identity and foster political agency through activism and by participating in electoral politics. Lack of electoral appeal and low levels of membership is some countries, inability to deal with conflicts and an unwillingness to clarify the ideological position and the precise relationship between a libertarian freedom-related agenda and a social justice agenda represent challenges for the Pirate Parties.  

Carty, V., & Onyett, J. (2006). Protest, cyberactivism and new social movements: The reemergence of the peace movement post 9/11. Social Movement Studies, 5(3), 229-249.  

This paper examines ways in which the Internet and alternative forms of media have enhanced the global, yet grassroots, political mobilization in the anti-war effort in the post 9/11 environment. An examination of the role of cyberactivism in the peace movement enhances our understanding of social movements and contentious politics

12    

by analyzing how contemporary social movements are using advanced forms of technology and mass communication as a mobilizing tool and a conduit to alternative forms of media. These serve as both a means and target of protest action and have played a critical role in the organization and success of internal political mobilizing. Cyberactivism, globalization, social movements, war on terrorism, contentious politics, political opportunity structures  

Castells, M. (2013) Networks of outrage and hope: Social movements in the internet age (London: John Wiley & Sons).  

This book is an exploration of the new forms of social movements and protests that are erupting in the world today, from the Arab uprisings to the indignadas movement in Spain, and the Occupy Wall Street movement in the US. While these and similar social movements differ in many important ways, there is one thing they share in common: they are all interwoven inextricably with the creation of autonomous communication networks supported by the Internet and wireless communication. In this timely and important book, Manuel Castells – the leading scholar of our contemporary networked society – examines the social, cultural and political roots of these new social movements, studies their innovative forms of self-organization, assesses the precise role of technology in the dynamics of the movements, suggests the reasons for the support they have found in large segments of society, and probes their capacity to induce political change by influencing people’s minds.  

Chadwick, A. (2006). Internet politics: States, citizens, and new communication technologies. Oxford University Press, USA.  

In the developed world, there is no longer an issue of whether the Internet affects politics-but rather how, why, and with what consequences. With the Internet now spreading at a breathtaking rate in the developing world, the new medium is fraught with tensions, paradoxes, and contradictions. How do we make sense of these? In this major new work, Andrew Chadwick addresses such concerns, providing the first comprehensive overview of Internet politics.  

Internet Politics examines the impact of new communication technologies on political parties and elections, pressure groups, social movements, local democracy, public bureaucracies, and global governance. It also analyzes persistent and controversial policy problems, including the digital divide; the governance of the Internet itself; the tensions between surveillance, privacy, and security; and the political economy of the Internet media sector. The approach is explicitly comparative, providing numerous examples from the U.S., Britain, and many other countries. Written in a clear and accessible style, this theoretically sophisticated and up-to-date text reveals the key difference the Internet makes in how we “do” politics and how we “think about” political life.  

Chadwick, A. (2013) The Hybrid Media system: Politics and Power (Oxford: Oxford University Press).  

13    

The diffusion and rapid evolution of new communication technologies has reshaped media and politics. But who are the new power players? Written by a leading scholar in the field, The Hybrid Media System is a sweeping and compelling new theory of how political communication now works.  

Politics is increasingly defined by organizations, groups, and individuals who are best able to blend older and newer media logics, in what Andrew Chadwick terms a hybrid system. Power is wielded by those who create, tap, and steer information flows to suit their goals and in ways that modify, enable, and disable the power of others, across and between a range of older and newer media. Chadwick examines news making in all of its contemporary “professional” and “amateur” forms, parties and election campaigns, activist movements, and government communication. He presents compelling illustrations of the hybrid media system in flow, from American presidential campaigns to WikiLeaks, from live prime ministerial debates to hotly-contested political scandals, from the daily practices of journalists, campaign workers, and bloggers to the struggles of new activist organizations. This wide-ranging book maps the emerging balance of power between older and newer media technologies, genres, norms, behaviors, and organizational forms. Political communication has entered a new era. This book reveals how the clash of older and newer media logics causes chaos and disintegration but also surprising new patterns of order and integration.  

Chadwick, A. and Collister, S. (2014). Boundary-Drawing Power and the Renewal of Professional News Organizations: The Case of The Guardian and the Edward Snowden NSA Leak. International Journal of Communication, 8, 22.  

The Edward Snowden National Security Agency leak of 2013 was an important punctuating phase in the evolution of political journalism and political communication as media systems continue to adapt to the incursion of digital media logics. The leak’s mediation reveals professional news organizations’ evolving power in an increasingly congested, complex, and polycentric hybrid media system where the number of news actors has radically increased. We identify the practices through which The Guardian reconfigured and renewed its power and which enabled it to lay bare highly significant aspects of state power and surveillance. This involved exercising a form of strategic, if still contingent, control over the information and communication environments within which the Snowden story developed. This was based upon a range of practices encapsulated by a concept we introduce: boundary-drawing power.  

Christensen, C. (2014). WikiLeaks: From Popular Culture to Political Economy~ Introduction. International Journal of Communication, 8, 5.  

Despite their early work, it was the leaked material that came from Chelsea Manning that threw WikiLeaks into the international spotlight, and, thus, made the organization a topic of scholarly interest. To date, the most in-depth single work on WikiLeaks has come from Brevini, Hintz, and McCurdy (2013), but a number of other scholars have investigated the relationship between the organization and, for example, journalism (e.g., Coddington, 2012; Handley & Rutigliano, 2012; Lynch, 2010, 2013; McNair,

14    

2012; Tambini, 2013), law (e.g., Benkler, 2012; Cannon 2013; Davidson 2011; Fenster 2012; Peters 2011; Rothe & Steinmetz 2013; Wells 2012), and resistance and activism (e.g., Cammaerts, 2013; Lindgren & Lundström, 2011; Zajácz, 2013). The idea behind this collection of essays about WikiLeaks was influenced by the fact that WikiLeaks, their activities, and the sociopolitical incrustations around the organization resonate in so many areas within media studies and related disciplines—more, I would argue, than have been addressed to date. Thus, when I began to approach authors regarding potential contributions to this collection, I was interested in asking influential and innovative scholars from a wide variety of research backgrounds.  

Christensen, C., & Jónsdóttir, B. (2014). WikiLeaks, Transparency and Privacy: A Discussion with Birgitta Jónsdóttir. International Journal of Communication, 8, 9.  

Birgitta Jónsdóttir is currently a member of the Icelandic Parliament, where she represents the Pirate Party. Jónsdóttir was an early WikiLeaks volunteer and was one of the key members of the team in Iceland that put together the famous Collateral Murder video. In this wide-ranging discussion with Christian Christensen, Jónsdóttir talks about her work with WikiLeaks, politics, and her ideas about technology, transparency, and privacy. She also discusses how she has been placed under surveillance because of her work with WikiLeaks and other organizations.  

Clinton, H. R. (2012). Internet Freedom and Human Rights. Issues in Science and Technology, 28(3), 45.  

Maintaining the practice of open communication and continuing the system of multi-stakeholder management of the Internet can help advance the principles expressed in the Universal Declaration of Human Rights.  

Coleman, G. 2004. “The political agnosticism of free and open source software and the inadvertent politics of contrast,” Anthropology Quarterly, volume 77, number 3, pp. 507–519.http://dx.doi.org/10.1353/anq.2004.0035  

Free and open source software (FOSS), which is by now entrenched in the technology sector, has recently traveled far beyond this sphere in the form of artifacts, licenses, and as a broader icon for openness and collaboration. FOSS has attained a robust socio-political life as a touchstone for like-minded projects in art, law, journalism, and science—some examples being MIT’s OpenCourseWare project, School Forge, and the BBC’s decision to release all their archives under a Creative Commons license. One might suspect FOSS of having a deliberate political agenda, but when asked, FOSS developers invariably offer a firm and unambiguous “no”—usually followed by a precise lexicon for discussing the proper relationship between FOSS and politics. For example, while it is perfectly acceptable and encouraged to have a panel on free software at an anti-globalization conference, FOSS developers would suggest that it is unacceptable to claim that FOSS has as one of its goals anti-globalization, or for that matter any political program—a subtle but vital difference, which captures the uncanny, visceral, and minute semiotic acts by which developers divorce FOSS from

15    

a guided political direction. FOSS, of course, beholds a complex political life despite the lack of political intention; nonetheless, I argue that the political agnosticism of FOSS shapes the expressive life and force of its informal politics.  

Coleman, E.G. (2011). Hacker politics and publics. Public Culture, 23(3 65), 511-516.  

This article examines some of the attributes that mark geek and hacker politics as distinct from other domains of digitally based activism and offers an introductory framework to assess their political significance.  

Coleman, E.G. (2013) Code Is Speech: Hackers attempt to write themselves into the Constitution. Reason.com, April 2013, http://reason.com/archives/2013/03/21/code-is-speech  

…For open source developers, then, freedom means expression, learning, and modification, not the mere absence of a price tag. Hackers first started talking about software as speech in response to what they saw as excessive copyrighting and patenting of computer software in the 1970s and ’80s. The first widely circulated paper associating source code with free speech was “Freedom of Speech in Software,” written by programmer Peter Salin in 1991. Salin characterized computer programs as “writings,” arguing that software was unfit for patents (intended for inventions) but appropriate for copyrights and thus free speech protections (which apply to expressive content).  

Coleman, E.G. and Ralph, M. 2011. Is it a Crime? The Transgressive Politics of Hacking in Anonymous, Social Text, 28 September 2011, http://www.socialtextjournal.org/blog/2011/09/is-it-a-crime-the-transgressive-politics-of-hacking-in-anonymous.php  

Instead of merely depicting hackers as virtual pamphleteers for free speech or as digital outlaws, we need to start asking more specific questions about why and when hackers embrace particular attitudes toward different kinds of laws, explore in greater detail what they are hoping to achieve, and take greater care in examining the consequences.  

Coleman, E. G. (2013). Coding freedom: The ethics and aesthetics of hacking. Princeton University Press.  

Who are computer hackers? What is free software? And what does the emergence of a community dedicated to the production of free and open source software–and to hacking as a technical, aesthetic, and moral project–reveal about the values of contemporary liberalism? Exploring the rise and political significance of the free and open source software (F/OSS) movement in the United States and Europe, Coding Freedom details the ethics behind hackers’ devotion to F/OSS, the social codes that guide its production, and the political struggles through which hackers question the scope and direction of copyright and patent law. In telling the story of the F/OSS

16    

movement, the book unfolds a broader narrative involving computing, the politics of access, and intellectual property.  

Gabriella Coleman tracks the ways in which hackers collaborate and examines passionate manifestos, hacker humor, free software project governance, and festive hacker conferences. Looking at the ways that hackers sustain their productive freedom, Coleman shows that these activists, driven by a commitment to their work, reformulate key ideals including free speech, transparency, and meritocracy, and refuse restrictive intellectual protections. Coleman demonstrates how hacking, so often marginalized or misunderstood, sheds light on the continuing relevance of liberalism in online collaboration.  

Coleman, E.G. (2014). Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous. Verso Books.  

John Postill review: The past five years have seen a global flourishing of political initiatives in which tech-minded actors of different kinds (geeks, hackers, bloggers, online journalists, citizen politicians, etc.) have played prominent roles. From whistleblowing to online protests, from occupied squares to anti-establishment parties, these ‘freedom technologists’ can no longer be dismissed, particularly after Edward Snowden’s revelations about the surveillance abuses of America’s NSA and allied agencies. Based on long-term anthropological fieldwork, Gabriella Coleman’s Hacker, Hoaxer, Whistleblower, Spy, is a riveting account of one these new collective actors: Anonymous. https://rmit.academia.edu/JohnPostill/Book-Reviews  

Croeser, K. 2012. “Issue Crawler map of the digital liberties movement,” at https://www.dropbox.com/sh/9td0goc7xul7vw9/SbGgyDE0dM.  

Croeser, S. (2012). Contested technologies: The emergence of the digital liberties movement. First Monday, 17(8).  

The digital liberties movement is an emerging social movement that draws together activism around online censorship and surveillance, free/libre and open source software, and intellectual property. This paper uses the social movement literature’s framework to build an understanding of the movement, expanding the dominant framework by including a focus on the networks which sustain the movement. While other communities and movements have addressed these issues in the past, activists within the digital liberties movement are beginning to build a sense of a collective identity and a master frame that ties together these issues. They are doing this in online spaces, including blogs, and through campaigns around landmark issues, which also help to build the network which the movement relies upon. The 2012 campaign against the U.S. Stop Online Piracy Act has highlighted the movement’s strength, but will also, perhaps, raise challenges for digital liberties activists as they confront the tension between attempts to disavow politics and a profoundly political project.  

In the case of the DLM, there are a number of terms that have been used by media, scholars, and participants themselves to identify movement participants, including “infoanarchists” (Schwartz and Cha, 2000), “online civil libertarians” (Borland,

17    

2001), “pirates”, “(anti–)intellectual property activists” (Brown, 2005), “copyfighters” (Farivar, 2008), technology activists (Doctorow, 2011a), and free culture advocates (Bayley, 2011). The emergence of ‘Anonymous’ as an identity which is increasingly available for political action is also important in this respect: as Gabriella Coleman (2012) notes, since 2008 ‘Anonymous’ has come to be associated with “an irreverent, insurgent brand of activist politics” rather than the trolling which characterised previous actions. Participants who are figuratively and/or literally wearing the ‘Anonymous’ mask have played a significant role within the DLM, including in the recent campaigns against the Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act (PIPA). Together, these emerging collective identities demonstrate the growth of the movement.  

While participants in the DLM have on occasion been described as communists and/or socialists (Himanen, 2001; Kelly, 2009; Stallman, 2008), many within the movement have been quick to distance themselves from these labels. Lawrence Lessig, one of the leading proponents of creative commons licences and a key figure within the DLM, responded immediately to Kevin Kelly’s (2009) claims that digital culture was experiencing a “New Socialism”. Lessig (2009) writes that “none of the things that Kelly (and I) celebrate about the Internet are ‘socialist’” because they are based on freedom, rather than coercion.… These sentiments are representative of the mood within most of the movement, which eschews an open affiliation with left–wing and anti–capitalist ideologies.  

Croeser, S. (2014). Global Justice and the Politics of Information: The Struggle Over Knowledge. Routledge.  

The global social justice movement attempts to build a more equitable, democratic, and environmentally sustainable world. However, this book argues that actors involved need to recognise knowledge – including scientific and technological systems – to a greater extent than they presently do. The rise of the Occupy movement, the Arab Spring and the Wikileaks controversy has demonstrated that the internet can play an important role in helping people to organise against unjust systems. While governments may be able to control individual activists, they can no longer control the flow of information. However, the existence of new information and communications technologies does not in itself guarantee that peoples’ movements will win out against authoritarian governments or the power of economic elites. Drawing on extensive interviews and fieldwork, this book illustrates the importance of contributions from local movements around the world to the struggle for global justice. Including detailed case studies on opposition to genetically-modified crops in the south of India, and the digital liberties movement, this book is vital reading for anyone trying to understand the changing relationship between science, technology, and progressive movements around the world.  

Dahlberg-Grundberg, M. (2015). Technology as movement On hybrid organizational types and the mutual constitution of movement identity and technological infrastructure in digital activism. Convergence: The International Journal of Research into New Media Technologies, 1354856515577921.  

18    

New communication technologies bring about new ways for political groups and movements to mobilize and organize. A consequence of this might be that established interpretations of and attitudes towards social movements may have to be revisited, for example, when it comes to their internal constitution and their modes of working. This interview case study looks at the digital activist cluster Telecomix and its interventions during the Arab Spring. The study addresses how the network used technological and communicational infrastructures and platforms and how it was organizationally affected by these. By using concepts such as ‘one media bias’, ‘media ecology’, ‘hybridity’ and ‘cognitive praxis’, the article aims to conceptualize how the identity of a movement and its technological infrastructure mutually constitute each other.  

Dafermos, G. and Söderberg, J. 2009. ‘The hacker movement as the continuation of the labour struggle’, Capital & Class. 33 (1), 53-73.  

Examining the way in which capital exploits the volunteer labour of free software developers, this article argues that there is a historical continuity between hackers and labour struggle. The common denominator is their rejection of alienated work practices, which suggests that corporate involvement in the computer underground, far from inhibiting further struggles by hackers, may function as a catalyst for them.  

Deibert, R. (2008). Access denied: The practice and policy of global internet filtering. Mit Press.  

Access Denied examines the political, legal, social, and cultural contexts of Internet filtering in these states from a variety of perspectives. Chapters discuss the mechanisms and politics of Internet filtering, the strengths and limitations of the technology that powers it, the relevance of international law, ethical considerations for corporations that supply states with the tools for blocking and filtering, and the implications of Internet filtering for activist communities that increasingly rely on Internet technologies for communicating their missions. Reports on Internet content regulation in forty different countries follow, with each two-page country profile outlining the types of content blocked by category and documenting key findings.  

Deibert, R., Palfrey, J., Rohozinski, R., Zittrain, J., & Haraszti, M. (2010). Access controlled: The shaping of power, rights, and rule in cyberspace. Mit Press.  

Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China’s famous “Great Firewall of China” is one of the first national Internet filtering systems. Today the new tools for Internet controls that are emerging go beyond mere denial of information. These new techniques, which aim to normalize (or even legalize) Internet control, include targeted viruses and the strategically timed deployment of distributed denial-of-service (DDoS) attacks, surveillance at key points of the Internet’s infrastructure, take-down notices, stringent terms of usage policies, and national information shaping strategies. Access Controlled reports on this new normative terrain. The book, a

19    

project from the OpenNet Initiative (ONI), a collaboration of the Citizen Lab at the University of Toronto’s Munk Centre for International Studies, Harvard’s Berkman Center for Internet and Society, and the SecDev Group, offers six substantial chapters that analyze Internet control in both Western and Eastern Europe and a section of shorter regional reports and country profiles drawn from material gathered by the ONI around the world through a combination of technical interrogation and field research methods.  

Deibert, R., & Rohozinski, R. (2010). Liberation vs. control: The future of cyberspace. Journal of Democracy, 21(4), 43-57.  

Among theorists of new information and communication technologies, there is a persistent tension between those who see them as technologies of liberation, and those who see them as technologies of control. We argue that the dichotomy itself is misleading, suggesting a basic opposition between forces of light and forces of darkness. In fact, the situation is much more complex and needs to be qualified. Rather than seeing technologies in oppositional terms, as either “empty” vessels to be filled by human intent, or powerful forces imbued with some kind of agency that no one can withstand, technologies are complex and continuously evolving manifestations of social forces of a particular time and place. Once created, technologies in turn shape and limit the prospects for human communication and interaction in a constantly iterative manner. This dynamic is especially evident in the case of cyberspace, a domain of intense competition, one which creates an ever-changing matrix of opportunities and constraints for social forces and ideas. Social forces and ideas, in turn, are imbued with alternative rationalities which collide with each other and affect the structure of the communications environment. Unless the characteristics of cyberspace change radically in the near future, and global human culture grows monolithic, linking technological properties to a single social outcome, like liberation or control, is highly dubious.  

Deibert, R., Palfrey, J., Rohozinski, R., & Zittrain, J. (2011). Access contested: security, identity, and resistance in Asian cyberspace. MIT Press.  

A daily battle for rights and freedoms in cyberspace is being waged in Asia. At the epicenter of this contest is China–home to the world’s largest Internet population and what is perhaps the world’s most advanced Internet censorship and surveillance regime in cyberspace. Resistance to China’s Internet controls comes from both grassroots activists and corporate giants such as Google. Meanwhile, similar struggles play out across the rest of the region, from India and Singapore to Thailand and Burma, although each national dynamic is unique. Access Contested, the third volume from the OpenNet Initiative (a collaborative partnership of the Citizen Lab at the University of Toronto’s Munk School of Global Affairs, the Berkman Center for Internet and Society at Harvard University, and the SecDev Group in Ottawa), examines the interplay of national security, social and ethnic identity, and resistance in Asian cyberspace, offering in-depth accounts of national struggles against Internet controls as well as updated country reports by ONI researchers. The contributors examine such topics as Internet censorship in Thailand, the Malaysian blogosphere, surveillance and censorship around gender and sexuality in Malaysia, Internet

20    

governance in China, corporate social responsibility and freedom of expression in South Korea and India, cyber attacks on independent Burmese media, and distributed-denial-of-service attacks and other digital control measures across Asia.  

“This team has consistently produced the most important research on how and why technology matters in contemporary politics. With unique investigative tools, policy savvy, and a normative commitment to exposing the ways that tough regimes use digital media to control civil society, Access Contested demonstrates that in many ways, information technology is politics.” —Philip N. Howard, Director, Project on Information Technology and Political Islam, University of Washington; author, The Digital Origins of Dictatorship and Democracy“—  

De Rosa, A. 2012. “Open source politics: Reddit drafts ‘The Freedom of Internet Act.’,” Reuters Blogs (24 February), at http://blogs.reuters.com/anthony-derosa/2012/02/25/open-source-politics-reddit-drafts-the-freedom-of-internet-act/  

Reddit users have taken it upon themselves to draft legislation in place of SOPA and PIPA, unsatisfied with Washington politicians, who seem to have shown a willful ignorance of how the Internet actually works. Using a Google Doc open for anyone to help write and edit, they’ve come up with a draft version of “The Freedom of Internet Act”  

Dessi, G. 2012. The Icelandic constitutional experiment, Open Democracy, 23 October, http://www.opendemocracy.net/giulia-dessi/icelandic-constitutional-experiment  

This Saturday, a year after a Constitutional Council has written a draft constitution with the help of citizens, voters agreed this draft should be the basis for a new constitution. This writing experiment stands out for its surprisingly democratic process, but a closer look reveals some of its limitations.  

Diamond, L. (2010). Liberation technology. Journal of Democracy, 21(3), 69-83.  

The Internet, mobile phones, and other forms of “liberation technology” enable citizens to express opinions, mobilize protests, and expand the horizons of freedom. Autocratic governments are also learning to master these technologies, however. Ultimately, the contest between democrats and autocrats will depend not just on technology, but on political organization and strategy.  

Diamond, L., & Plattner, M. F. (2012). Liberation technology: Social media and the struggle for democracy. JHU Press. http://hci.stanford.edu/courses/cs047n/readings/diamond-libtech.pdf  

The revolutions sweeping the Middle East provide dramatic evidence of the role that technology plays in mobilizing citizen protest and upending seemingly invulnerable authoritarian regimes. A grainy cell phone video of a Tunisian street vendor’s self-immolation helped spark the massive protests that toppled longtime ruler Zine El

21    

Abidine Ben Ali, and Egypt’s “Facebook revolution” forced the ruling regime out of power and into exile. While such “liberation technology” has been instrumental in freeing Egypt and Tunisia, other cases—such as China and Iran—demonstrate that it can be deployed just as effectively by authoritarian regimes seeking to control the Internet, stifle protest, and target dissenters. This two-sided dynamic has set off an intense technological race between “netizens” demanding freedom and authoritarians determined to retain their grip on power.  

Liberation Technology brings together cutting-edge scholarship from scholars and practitioners at the forefront of this burgeoning field of study. An introductory section defines the debate with a foundational piece on liberation technology and is then followed by essays discussing the popular dichotomy of “liberation” versus “control” with regard to the Internet and the sociopolitical dimensions of such controls. Additional chapters delve into the cases of individual countries: China, Egypt, Iran, and Tunisia. This book also includes in-depth analysis of specific technologies such as Ushahidi—a platform developed to document human-rights abuses in the wake of Kenya’s 2007 elections—and alkasir—a tool that has been used widely throughout the Middle East to circumvent cyber-censorship. Liberation Technology will prove an essential resource for all students seeking to understand the intersection of information and communications technology and the global struggle for democracy. Contributors: Walid Al-Saqaf, Daniel Calingaert, Ronald Deibert, Larry Diamond, Elham Gheytanchi, Philip N. Howard, Muzammil M. Hussain, Rebecca MacKinnon, Patrick Meier, Evgeny Morozov, Xiao Qiang, Rafal Rohozinski, Mehdi Yahyanejad.  

Di Salvo, P., & Negro, G. (2015). Framing Edward Snowden: A comparative analysis of four newspapers in China, United Kingdom and United States. Journalism, 1464884915595472.  

This article sheds light on the framing of Edward Snowden in four newspapers in three different countries. The authors analysed online editions of a major American daily (The New York Times), one prominent European newspaper (The Guardian), one mouthpiece of the Chinese Communist Party (The People’s Daily) and The South China Morning Post. The study seeks to explore how the role of Edward Snowden was framed and how digital whistleblowing was descripted by newspapers with different levels of Internet control, perception and culture on whistleblowing. The research is based on the framework proposed by a recent study of the framing of Bradley Manning. The results of a content analysis will present to what extent the press supported or criticized the role of Edward Snowden and his revelations. This article used four out of its five categories (‘Hero’, ‘Victim’, ‘Villain’, ‘Whistle-Blower’) plus a new addition of ‘Mole’, proposed by the authors. The findings provide evidence of the differences in the framing of Edward Snowden and the rhetoric behind reporting about whistleblowers and Internet governance. Whistleblowing, Edward Snowden, journalism  

Doctorow, C. 2012 The problem with nerd politics, The Guardian, 15 May , http://www.theguardian.com/technology/2012/may/14/problem-nerd-politics  

22    

If people who understand technology don’t claim positions that defend the positive uses of technology, if we don’t operate within the realm of traditional power and politics, if we don’t speak out for the rights of our technically unsophisticated friends and neighbours, then we will also be lost. Technology lets us organise and work together in new ways, and to build new kinds of institutions and groups, but these will always be in the wider world, not above it.  

Dür, A., & Mateo, G. (2014). Public opinion and interest group influence: how citizen groups derailed the Anti-Counterfeiting Trade Agreement. Journal of European Public Policy, 21(8), 1199-1217.  

The Anti-Counterfeiting Trade Agreement (ACTA), which envisages stricter standards for the transnational enforcement of intellectual property rights, received strong support from business groups. Nevertheless, a campaign against the agreement that was initiated by a small number of citizen groups was successful in stopping its ratification in the European Union (EU). This result is puzzling because the anti-ACTA side controlled few material resources and should have found it difficult to have its voice heard on an issue negotiated at the international level. We explain the success of the anti-ACTA campaign by showing how interest groups managed to increase the public salience of the issue; how the increasing public salience motivated a growing number of interest groups to mobilize; and how the resulting dynamic made decision-makers opt against ratification of the agreement. The article advances scholarly understanding of the interaction between lobbying and public opinion and sheds light on the defeat of ACTA.  

Earl, J. (2014). Something Old and Something New: A Comment on “New Media, New Civics”. Policy & Internet, 6(2), 169-175.  

I argue that activists and scholars alike (including Zuckerman) should consider moving past the idea that thin forms of engagement are only meaningful when they are the bottom rung of a ladder leading to thicker and thicker activism. Research and even anecdotes that Zuckerman discusses show that sometimes bursts of thin engagement do succeed (just as sometimes, heavy on the sometimes, researchers know that thicker forms of activism succeed too). Instead, I am arguing for a literature where scholars accept that a distribution of thin and thick engagement can productively exist, instead of always implicitly denigrating thin engagements by remaining ever hopeful that engagement will eventually thicken. To do otherwise strikes me as not unlike saying you have no problem with your son being gay, but secretly hoping he meets the “right” woman.  

Earl, J., & Beyer, J. L. (2014). The Dynamics of Backlash Online: Anonymous and the Battle for WikiLeaks. In Intersectionality and Social Change (pp. 207-233). Emerald Group Publishing Limited.  

We analyze reactions to the U.S. government-led repression of WikiLeaks in late 2010 by actors such as Anonymous and the Pirate Parties to argue that the potential for backlash, which has been so prominent offline, is also a potential repercussion of repression online. In doing so, we use existing research to identify different ways in

23    

which bystanders might be pulled into conflicts, and examine our case for evidence of any of these forms of backlash. We also hypothesize that the net observed effect of repression is really the result of competing and/or amplifying backlash and deterrence effects; when this net effect is in favor of backlash, we call it a “net backlash effect” to indicate that there was more backlash than deterrence. We argue that net backlash occurs when repression recruits more bystanders into a conflict than it is able to deter in terms of already active participants. We also argue that backlash is a very likely outcome when Internet activism is repressed. Keywords: Online protest, repression, bystanders, WikiLeaks, Anonymous, Internet  

Estalella, A. 2011. Ensamblajes de esperanza: Un estudio antropológico del bloguear apasionado. PhD thesis, Universitat Oberta de Catalunya, Barcelona. http://www.estalella.eu/ensamblajes-de-esperanza  

Esta tesis investiga la esperanza que algunas personas depositan en la posibilidad de transformar la sociedad a través de la tecnología, de una tecnología específica de Internet: los blogs. Para muchos de aquellos con los que conviví durante mi trabajo de campo, los blogs son una revolución que va a transformar la sociedad, o que de hecho la está transformando durante el momento en que se realiza mi investigación. Hay quienes consideran que a través de los blogs y de su práctica de bloguear se abre la posibilidad de elaborar nuevos modos de hacer ciencia, para otros son una forma diferente de desarrollar el periodismo, una herramienta para nuevos modos de hacer política o un medio y contexto para transformar la educación. Esas son algunas de las expectativas en las cuales se explicitan sus esperanzas y que circulan en España durante los 18 meses de mi trabajo de campo durante 2006 y 2007.  

Faris, R., Roberts, H., Etling, B., Othman, D., & Benkler, Y. (2015). Score Another One for the Internet? The Role of the Networked Public Sphere in the US Net Neutrality Policy Debate. Berkman Center Research Publication, (2015-4).  

In this paper we study the public debate over net neutrality in the United States from January through November 2014. We compiled, mapped, and analyzed over 16,000 stories published on net neutrality, augmented by data from Twitter, bit.ly, and Google Trends. Using a mixed-methods approach that combines link analysis with qualitative content analysis, we describe the evolution of the debate over time and assess the role, reach, and influence of different media sources and advocacy groups in setting the agenda, framing the debate, and mobilizing collective action. We conclude that a diverse set of actors working in conjunction through the networked public sphere played a central, arguably decisive, role in turning around the Federal Communications Commission policy on net neutrality.  

Farivar, C. 2008. “Lessig, a copyfighter for Congress?” Salon.com — Machinist, at http://machinist.salon.com/blog/2008/02/20/lessig/  

Farrell, H. (2012). The consequences of the internet for politics. Annual Review of Political Science, 15, 35-52.  

24    

Political scientists are only now beginning to come to terms with the importance of the Internet to politics. The most promising way to study the Internet is to look at the role that causal mechanisms such as the lowering of transaction costs, homophilous sorting, and preference falsification play in intermediating between specific aspects of the Internet and political outcomes. This will allow scholars to disentangle the relevant causal relationships and contribute to important present debates over whether the Internet exacerbates polarization in the United States, and whether social media helped pave the way toward the Arab Spring uprisings of 2011. Over time, ever fewer political scientists are likely to study the Internet as such, as it becomes more and more a part of everyday political life. However, integrating the Internet’s effects with present debates over politics, and taking proper advantage of the extraordinary data that it can provide, requires good causal arguments and attention to their underlying mechanisms.  

Feenstra, R. A., and Keane, J. (2014). Politics in Spain: A case of monitory democracy. VOLUNTAS: International Journal of Voluntary and Nonprofit Organizations, Online First, 1–19. doi:10.1007/s11266-014-9461-2  

Analysing the current political context in Spain is a major challenge to political theory. Spain is experiencing the accumulation of trends that in recent years have focused the attention of most theorists and political scientists: discrediting of the major parties, falling numbers of party members, disaffection, etc. In parallel, this trend has been accompanied by citizen mobilisations that, since 15 May 2011, are manifest in numerous channels and strategies. The aim of this paper was to analyse the complex Spanish context from the monitory democracy proposal. The results show how in recent years processes of public scrutiny have been consolidated through a range of citizen initiatives. The study offers an in-depth analysis of the main characteristics of the most notable cases and monitoring initiatives, and also reflects on their democratising potential.  

Fell Brown, G.M. 2013. The politics of hacktivism. Socialist Alternative. http://www.socialistalternative.org/news/article20.php?id=2161  

Digital technology can offer valuable tools for activists, but on the basis of capitalism the digital playing field will remain structurally tilted in favor of the capitalists. Most of the activists in Anonymous and LulzSec and some of the activists involved in WikiLeaks are from working-class backgrounds and support workers’ struggles, but there’s a difference between supporting workers’ struggles and participating in them. Hacking can be disruptive, but it doesn’t have the same impact as strikes, sit-downs, and occupations. The state and the capitalist ruling class have enormous powers at their disposal to disrupt, persecute, and defeat hacking efforts. Reliance on hacking is not a viable strategy for decisively defeating these powers.  

Fernández-Delgado, F. C., & Balanza, M. T. V. (2012). Beyond WikiLeaks: The Icelandic Modern Media Initiative and the Creation of Free Havens. International Journal of Communication, 6, 24.  

25    

On June 16, 2010, the Icelandic Parliament unanimously approved the Icelandic Modern Media Initiative (IMMI), a legislative package that turns the concept of “tax haven” on its head by offering fundamental protections for free speech and freedom of expression. This article offers a general picture of the political context in which the IMMI is set and describes the core free speech concerns identified in it as well as the legal reforms put forward to tackle them. To conclude, we examine both the possible legal implications of the IMMI and its general significance for the emergence of the networked public sphere in general and of the networked fourth estate in particular.  

Figueras, J. (2015). Internetworked Social Movements and the Promise of Politics: A Case Study of the 15M Movement. Promoting Social Change and Democracy Through Information Technology, 116.  

This chapter analyses the Spanish social movement of the 15M, and the influence of Information and Communication Technologies on it. Drawing a distinction between liberal and republican citizenship, the first part of the chapter discusses the interactions between technology and social movements in terms of political participation. This part compares and contrasts characteristics of online-based interactions with offline mobilisations in Spain. The second part of the chapter compiles a set of features that can be found in current Internetworked Social Movements, and its meaning from the perspective of political engagement. The chapter concludes that ICTs contributed to the recuperation of republican politics with current examples that suggest that forthcoming movements will promote this kind of participation.  

Fink, K., & Anderson, C. W. (2014). Data Journalism in the United States: Beyond the “usual suspects”. Journalism Studies, (ahead-of-print), 1-15.  

Understanding the phenomenon of data journalism requires an examination of this emerging practice not just within organizations themselves, but across them, at the inter-institutional level. Using a semi-structured interview approach, we begin to map the emerging computational journalistic field. We find considerable variety among data journalists in terms of their educational backgrounds, skills, tools and goals. However, many of them face similar struggles, such as trying to define their roles within their organizations and managing scarce resources. Our cross-organizational approach allows for comparisons with similar studies in Belgium, Sweden, and Norway. The common thread in these studies is that the practice of data journalism is stratified. Divisions exist in some countries between resource-rich and resource-poor organizations and in other countries between the realm of discourse and the realm of practice.  

Fredriksson, M. (2015). Piracy & Social Change| The Pirate Party and the Politics of Communication. International Journal of Communication, 9, 16.  

This article draws on a series of interviews with members of the Pirate Party, a political party focusing on copyright and information politics, in different countries. It discusses the interviewees’ visions of democracy and technology and explains that copyright is seen as not only an obstacle to the free consumption of music and movies

26    

but a threat to the freedom of speech, the right to privacy, and a thriving public sphere. The first part of this article briefly sketches how the Pirate Party’s commitment to the democratic potential of new communication technologies can be interpreted as a defense of a digitally expanded lifeworld against the attempts at colonization by market forces and state bureaucracies. The second part problematizes this assumption by discussing the interactions between the Pirate movement and the tech industry in relation to recent theories on the connection between political agency and social media.  

Freelon, D. (2014). Online Civic Activism: Where Does It Fit?. Policy & Internet, 6(2), 192-198.  

Ethan Zuckerman (2014) raises a number of important points in his essay “New Media, New Civics.” This response will focus on one of its central concepts, online activism, as it relates to civic engagement and activism broadly writ. Zuckerman’s formulation of “participatory civics” reminds me of several similar concepts that have been developed over the past two decades or so. These include “actualizing citizenship” (Bennett, 2008), “autonomous citizenship” (Coleman, 2008), “engaged citizenship” (Dalton, 2008), “new politics” (Dahlgren, 2005), “postmodern politics” (Inglehart, 1997), “subpolitics” (Beck, Giddens, & Lash, 1994), and the civic tendencies of “Generation DotNet” (Zukin, Keeter, Andolina, Jenkins, & Delli Carpini, 2006), and “Generation Digital” (Montgomery, 2007). Each of these differs somewhat from the others, but all share in common the argument that the loosely defined “youth” of the late-modern era tend to favor individually motivated, issue-specific “activism” over government- and mass-media-focused “politics.” Zuckerman spends most of his essay attempting to set the agenda of the participatory civics debate, contributing in the process a helpful two-dimensional typology with which different civic acts may be compared.  

Freelon, D., Merritt, S., & Jaymes, T. (2015). Focus On The Tech: Internet centrism in global protest coverage. Digital Journalism, 3(2), 175-191.  

Internet centrism, the notion that online tools play substantial roles in social and political processes, is frequently invoked by journalists, pundits, and academics. Existing research has explored this idea directly in the case of protest, attempting to discern the actual magnitude of the internet’s role in protest organization and mobilization. Taking a different approach, we conduct a content analysis to examine the extent to which internet centrism is discussed in articles about the Occupy movement and the Arab Spring in mainstream US newspapers and technology blogs. Our main findings are that the role of publication type in predicting internet centrism depends upon which protest is being discussed, and the role of protest type depends upon publication type. This study lends a theoretical perspective to an under-studied journalistic phenomenon with the potential to influence how audiences think about the causes and consequences of protests.  

Fuchs, C. (2011). WikiLeaks: power 2.0? Surveillance 2.0? Criticism 2.0? Alternative media 2.0? A political-economic analysis. Global Media Journal: Australian Edition, 5(1).  

27    

The task of this paper is to analyse how WikiLeaks relates to capitalism. It deals specifically with the questions: Is WikiLeaks a counter-surveillance medium? Is it a form of alternative medium and alternative journalism? How does WikiLeaks relate to the liberal and socialist worldviews? The role of WikiLeaks as a watchdog organisation is analysed and the role of surveillance, counter-surveillance and transparency is discussed (section 2). The paper assesses how ideology and worldviews shape WikiLeaks self-understanding (section 3) and WikiLeaks is connected to journalism and alternative media theory (section 4). Finally, some conclusions about the role of WikiLeaks in contemporary capitalism are drawn (section 5).  

Fuster, M. (2012). The Free Culture and 15M Movements in Spain: Composition, Social Networks and Synergies. Social Movement Studies, 11(3-4), 386-392.  

This profile discusses the organization, goals and practices of the Spanish 15M movement. I argue that it developed as a complex, multi-layered ecosystem, mobilizing a new generation of citizens through the convergence of struggles over housing and the Free Culture and Digital Commons Movement (FCM), creating a common framework for action through social networks. Primarily in and through the actions in public squares, the 15M movement also constructed further layers of mobilization, incorporating the networks and skills of previous social movements (such as those mobilizing over inter alia education, health, alternative consumption) and connecting with previous generations who had mobilized over civil liberties in transition to democracy. Furthermore, I argue that links with the Free Culture Movement had a profound effect on the genealogy of 15M—in terms of its composition, agenda, framing and organizational logic. The methodology is based on case studies of both the FCM and 15M between December 2010 and December 2011 in Spain.  

Gharbia, S. B. (2010). The Internet freedom fallacy and the Arab digital activism. Nawaat Blog, 17.  

Goggin, G., McLelland, M., Lee, K., Frances, S., Tkach, L., Tamura, T., & Yu, H. (2013). Internet Activism in Asia-Pacific: A Comparative, Cultural History. Selected Papers of Internet Research, 3.  

As the internet has become a central delivery platform across contemporary mediascapes, activism around internet access, freedom, censorship, and openness has become more prominent. As internet freedom gathers momentum as a global media policy concept and movement, it is important to interrogate the terms in which it is constructed and understood. All too often, and certainly evident in these recent moves, is a strong, normative sense in which North American concepts of internet, media, activism and even ‘freedom’ shape the boundaries and modes of contemporary debates, policy frameworks, and action. Against this backdrop, this paper seeks to reframe contemporary notions of internet freedom, their politics, publics, actors, and movements. Drawing from the wider project on Asia-Pacific internet histories, this

28    

paper presents three case studies of internet activism –– respectively in Australia, South Korea, and Japan.  

Golumbia, D. 2015. Tor, Technocracy, Democracy  

David Golumbia, April 23, 2015 [Excerpts] In a terrific recent article describing technocracy and its prevalence in contemporary digital culture, the philosophers of technology Evan Selinger and Jathan Sadowski write:  

Unlike force wielding, iron-fisted dictators, technocrats derive their authority from a seemingly softer form of power: scientific and engineering prestige. No matter where technocrats are found, they attempt to legitimize their hold over others by offering innovative proposals untainted by troubling subjective biases and interests. Through rhetorical appeals to optimization and objectivity, technocrats depict their favored approaches to social control as pragmatic alternatives to grossly inefficient political mechanisms. Indeed, technocrats regularly conceive of their interventions in duty-bound terms, as a responsibility to help citizens and society overcome vast political frictions.  

Such technocratic beliefs are widespread in our world today, especially in the enclaves of digital enthusiasts, whether or not they are part of the giant corporate-digital leviathan. Hackers (“civic,” “ethical,” “white” and “black” hat alike), hacktivists, WikiLeaks fans, Anonymous “members,” even Edward Snowden himself walk hand-in-hand with Facebook and Google in telling us that coders don’t just have good things to contribute to the political world, but that the political world is theirs to do with what they want, and the rest of us should stay out of it: the political world is broken, they appear to think (rightly, at least in part), and the solution to that, they think (wrongly, at least for the most part), is for programmers to take political matters into their own hands.  

Greenberg, A. (2012). This machine kills secrets: Julian Assange, the Cypherpunks, and their fight to empower whistleblowers. Penguin.  

WikiLeaks brought to light a new form of whistle-blowing, using powerful cryptographic code to hide leakers’ identities while they spill the private data of government agencies and corporations. But that technology has been evolving for decades in the hands of hackers and radical activists, from the libertarian enclaves of Northern California to Berlin to the Balkans. And the secret-killing machine continues to evolve beyond WikiLeaks, as a movement of hacktivists aims to obliterate the world’s institutional secrecy. This is the story of the code and characters–idealists, anarchists, extremists–who are transforming the next generation’s notion of what activism can be. With unrivaled access to such major players as Julian Assange, Daniel Domscheit-Berg, and WikiLeaks’s shadowy engineer known as the Architect, (never before interviewed) reporter Andy Greenberg unveils the world of politically motivated hackers–who they are and how they operate.  

29    

Greenwald, G. (2014). No place to hide: Edward Snowden, the NSA, and the US surveillance state. Metropolitan Books.  

Going beyond NSA specifics, Greenwald […] takes on the establishment media, excoriating their habitual avoidance of adversarial reporting on the government and their failure to serve the interests of the people. Finally, he asks what it means both for individuals and for a nation’s political health when a government pries so invasively into the private lives of its citizens—and considers what safeguards and forms of oversight are necessary to protect democracy in the digital age. Coming at a landmark moment in American history, No Place to Hide is a fearless, incisive, and essential contribution to our understanding of the U.S. surveillance state. – See more at: http://glenngreenwald.net/#sthash.jyvVBmZB.dpuf  

Haggart, B. (2013). Fair Copyright for Canada: Lessons for Online Social Movements from the First Canadian Facebook Uprising. Canadian Journal of Political Science, 46(04), 841-861.  

Despite the growing importance of social media, their political effectiveness remains understudied. Drawing on and updating resource mobilization theory and political process theory, this article considers how social media make “political engagement more probable” and determine the success of online social movements. It does so by examining the mainstreaming of the Canadian “user rights” copyright movement, focusing on the Fair Copyright for Canada Facebook page, created in December 2007. This decentralized, grassroots, social media-focused action—the first successful campaign of its kind in Canada and one of the first in the world—changed the terms of the Canadian copyright debate and legitimized Canadian user rights. As this case demonstrates, social media have changed the type and quantity of resources needed to create and sustain social movements, creating openings for new groups and interests. Their success, however, remains dependent on the political context within which they operate.  

Haggart, B. (2014). Birth of a Movement: The Anti‐Counterfeiting Trade Agreement and the Politicization of Mexican Copyright. Policy & Internet, 6(1), 69-88.  

The literature on social movements—national and transnational—and social media has tended to focus on cases from the global North rather than the South, raising questions about its applicability to countries with low Internet penetration rates and weak civil societies. To remedy this deficit, this article presents the case of the Mexican Stop Anti-Counterfeiting Trade Agreement (ACTA) network. In 2010–11, a network of about a dozen underfunded copyright and Internet activists convinced the Mexican Senate to reject—unanimously—the ACTA, a U.S.-led plurilateral treaty that critics claimed would strengthen international intellectual property rights at the cost of fundamental Mexican Constitutional and human rights. This article argues that this victory was the result of activists’ use of social media in a way that recognized the limits and possibilities within existing Mexican political arrangements. While Stop ACTA’s success suggests social media’s utility for social movements in other

30    

developing countries, it leaves open the question as to whether it can make up for weak civil society institutions over the long-term.  

The year 2012 witnessed several dramatic developments in the increasingly contentious global intellectual property (IP) debate. On January 18th, the Internet declared war on two copyright-related bills before the U.S. Congress, the Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act. In order to draw attention to concerns that the bills would, in the name of reducing online copyright violations, fundamentally damage the open architecture of the Internet itself, thousands of websites, most notably Wikipedia and Reddit, blacked out their sites, directing their users to information about the bills and how to contact their Congressional representatives. In an unprecedented demonstration of grassroots mobilization, millions of Americans flooded Congress with calls and emails protesting the bills, famously crashing the Senate’s website (“SOPA Petition Gets Millions of Signatures,” 2012; Wikipedia, 2012). Within 24  hours, the bills were withdrawn (Sell, 2013).  

Less than 1 month later, on February 11th, more than 100,000 people1 took to the streets across Europe to protest an IP treaty, the Anti-Counterfeiting Trade Agreement (ACTA), a U.S.-led treaty that had been negotiated among several countries, including the United States, the European Union, Japan, and Mexico. Critics argued that it would have a negative effect on human rights, especially “the rights to due process, privacy, freedom of information, freedom of expression, and access to essential medicines” (Amnesty International, 2012).  

Similar to the effect of the SOPA protests, the European anti-ACTA protests compelled the European Commission (as well as several member governments) to withdraw its support in December 2012 for a treaty that the Commission had previously seemed intent on passing. The two events represented victories against well-funded and politically powerful IP interests, and offered evidence that transnational activists could stand up to powerful economic and state interests and win (Sell, 2013).  

Harlow, S., & Johnson, T. J. (2011). Overthrowing the Protest Paradigm? How The New York Times, Global Voices and Twitter Covered the Egyptian Revolution. International Journal of Communication, 5, 1359-74.  

With social-media driven protests erupting across the Arab world, this content analysis of Egyptian protest coverage in The New York Times, the Twitter feed of Times reporter Nick Kristof, and the citizen media site Global Voices, examines whether the de-legitimizing “protest paradigm” found in mainstream media is replicated in social media and blogs, and what impact their protest coverage has on their credibility. Results showed that The Times adhered to the paradigm by emphasizing the spectacle, quoting official sources, and de-valuing protesters as reporters maintained an impartial role. In contrast, Global Voices and Kristof’s Twitter feed took different approaches, legitimizing protesters and serving as commentators/analysts, even actors, in the unfolding events. Global Voices also provided more opportunities for reader interactivity.  

31    

Hart, J. A. (2011). The net neutrality debate in the United States. Journal of Information Technology & Politics, 8(4), 418-443.  

In 2006, a major telecommunications bill was held up because it did not include guarantees for something called “net neutrality.” Republicans strongly opposed these guarantees, while Democrats strongly favored them. The debate over net neutrality continued during the long campaign leading up to the 2008 presidential election. When the Obama Administration took office in 2009, the new chairman of the Federal Communications Commission, Julius Genachowski revived the idea of codifying net neutrality rules. In April 2010, the U.S. Court of Appeals in the District of Columbia Circuit ruled that the FCC did not have the authority to regulate Internet service providers under its own interpretation of the Telecommunications Act of 1996. The FCC adopted a new strategy because of the Court’s action. It opted not to undertake a major revision of the Telecommunications Act, but instead to attempt to regulate Internet service provision under modified “common carriage” rules, just as basic telephone services had been previously. An attempt will be made here to explain these choices.  

Herman, B. D., & Kim, M. (2014). The Internet Defends Itself: The Network Neutrality Debate on the Web. The Information Society, 30(1), 31-44.  

This study examines the network neutrality debate, as represented online. The research begins by conducting network analysis to identify key websites, followed by retrieving the relevant documents and using content analysis. Results demonstrate that the online version of the debate skews heavily toward the pro-network neutrality side. The web debate also includes much higher proportions of voices from nonprofit sectors, especially nongovernmental organizations. Telecommunications companies and trade groups, which anchor the anti-network neutrality coalition, are relatively quiet online. These findings show groups that are less powerful making heavy use of online communication and, in light of the political history of the issue, they also suggest online mobilizing may help reshape the dynamics of issue advocacy.  

Himanen, P. 2001. The hacker ethic, and the spirit of the information age. London: Secker and Warburg.  

Hintz, A. (2013). Dimensions of Modern Freedom of Expression: WikiLeaks, Policy Hacking, and Digital Freedoms. Beyond WikiLeaks: Implications for the Future of Communications, Journalism and Society, 146.  

The WikiLeaks project can be placed in the midst of these examples of the use of liberation technology and the various experiences of individuals and movements in advancing free expression, transparency, and social transformation. The leaks platform has bypassed information restrictions, expanded the range of publicly available information, and challenged the leading media players to change their routines and practices. Demonstrating the capacity of technical experts to challenge major powers, WikiLeaks seems to express a broader trend in which the power relations between individuals and institutions are shifting in favour of the former (Grimsson, 2011 ). In that sense, citizen journalism, the Arab Spring, and WikiLeaks

32    

may confirm some of the predictions of cyber-libertarians and techno-utopians, who have long criticized traditional institutions as outdated and have praised the power of individuals in cyberspace (Barlow, 1996).  

However, this reading of recent events may be premature. Just as social media have been used by activists to advance political change, they have been used by governments to control and deter such action, for example, by identifying protesters (as in Tunisia, Syria, and Iran). Vital online resources and funding streams have been cut to weaken dissident organizations (as happened to WikiLeaks in December 2010 and ever since).  

Hintz, A. (2015). Internet Freedoms and Restrictions. The Routledge Companion to Alternative and Community Media.  

Hintz, A., & Milan, S. 2011. Exploring information governance activism: Action repertoires, strategies and agendas. http://ecpr.eu/filestore/paperproposal/fe95f474-23ef-4b3d-855a-648832aaf6d9.pdf  

In this chapter we will introduce and analyze the experiences of several civil society coalitions and networks that have promoted policy change, focusing on those that have featured media practitioners and communication activists in key roles. Based on these cases, we will explore common characteristics of current information governance activism. In particular, we will look at the following three aspects:  

(1) Action repertoires: What action repertoires do the various social actors adopt, and how do they mobilize ‘inside’, ‘outside’, and ‘beyond’ policy arenas?  

(2) Strategies and conditions for policy change: What have been the core factors for successes and failures, what strategies have been applied, and how have social actors exploited political opportunities of political change and crisis?  

(3) Policy agendas and interaction: Do policy initiatives connect and relate their agendas, and do they combine concerns from ‘old’ and ‘new’ media platforms and thereby overcome divisions between different sets of policies (as well as between different social groups mobilizing on them)?  

Hogge, B. (2005). Global voices: blogging the world. openDemocracy, December, 13, 2005.  

In late 2004, MacKinnon and Zuckerman realised that although American weblogs were talking to one another and gaining lots of exposure in the mainstream press, blogs from the rest of the world needed a bigger audience. Their central mission, beyond supporting the right of people to speak and speak freely, became promoting the importance of listening. The result is a website which aggregates posts from weblogs around the world. The homepage of the Global Voices site is dominated by a cloud of tags listing countries from Afghanistan to Zimbabwe. Clicking on each one brings you the news from the blogosphere, with options to visit other blog summaries

33    

in the region. The site, originally maintained by Zuckerman and MacKinnon, now has a team of six regional editors. It is supplemented by a wiki running through the centre of the page, where readers can suggest other regional blogs worth monitoring. The project has grown at an enormous pace. The site received a total of 800 visits in its first four weeks. Now 300,000 individual people check the site each month. On an average day, Global Voices gets 12,000 readers, many from the mainstream press, which uses the stories as its own personal and international news desk.  

Hood, C. (2011). From FOI world to WikiLeaks world: a new chapter in the transparency story?. Governance, 24(4), 635-638.  

So just what is new about WikiLeaks world? Perhaps three things. One is the institutional form of an international organization operating in cyberspace in ways intended to frustrate retribution and regulation through national information laws (by siting itself in the most constitutionally disclosure-friendly jurisdictions, such as Iceland and Sweden) and operating as an intermediary organization through which leakers can release information to media and the public. A second novelty is arguably the sheer quantity of classified information published on the WikiLeaks Web site as mentioned earlier. Third, though WikiLeaks itself soon abandoned its initial plan to work though user-editable “wiki” architecture, there is perhaps something new in the collective searching power that wiki-type media can harness. That is illustrated by recent cases in which WikiLeaks-type Web sites have posted prominent German politicians’ doctoral theses online in an organized and successful search for plagiarized passages.  

Howard, P. N., & Hussain, M. M. (2013). Democracy’s fourth wave?: digital media and the Arab Spring. Oxford University Press.  

Did digital media really “cause” the Arab Spring, or is it an important factor of the story behind what might become democracy’s fourth wave? An unlikely network of citizens used digital media to start a cascade of social protest that ultimately toppled four of the world’s most entrenched dictators. Howard and Hussain find that the complex causal recipe includes several economic, political and cultural factors, but that digital media is consistently one of the most important sufficient and necessary conditions for explaining both the fragility of regimes and the success of social movements. This book looks at not only the unexpected evolution of events during the Arab Spring, but the deeper history of creative digital activism throughout the region.  

Huang, J. (2015). Values and Symbolism in Anonymous’s Brand Identity (MA dissertation, Duke University).  

Hacktivism is a portmanteau of computer hacking and activism (Wikipedia). Coined in 1996 by Omega, a member of cDc, “hacktivism” was linked to Article 19 of the United Nations Declaration of Human Rights (UNDHR), stating “everyone has the right to freedom of opinion and expression” (Shantz and Tomblin 63-64). Among all the hacker collectives that associate themselves with hacktivism, Anonymous, a leaderless and decentralized group of hackers, might be regarded as the most

34    

controversial one. This is because it dabbles in a series of whimsical pranks and publicity stunts but also deliberate digital attacks against government, religious, and corporate websites in the name of defending free flow of information and delivering social justice. In this paper, I will use public media content regarding Anonymous for my primary sources, including Western mainstream media’s news coverage and Anonymous’s own social media posts, to analyze the contribution Anonymous has made to the hacker subculture. Anonymous commits itself to building a distinguishable brand identity as a defender of freedom of speech, hoping to use its symbolic values to “[contribute] to a wider political landscape” (Goode 84). Anonymous’s absence of hierarchy allows anyone who shares the same principles to partake in online/offline activities and claim its title. Its slogans take on the coloration of populism, denying self-promotion, demanding greater digital democracy and serving as an antidote to “cyber-imperialism” (Coleman 391). Plus, Anonymous excels at using social media to promulgate its values and create counter-narratives. Although, more often than not, Anonymous adopts legally ambiguous and morally debatable tactics to hack and expose “wrongdoers,” this leaderless and decentralized hacker collective has become an unorthodox political and cultural icon of civil resistance.  

Hussain, M. M. (2014). Securing Technologies of Freedom after the Arab Spring: Policy Entrepreneurship and Norms Consolidation Practices in Internet Freedom Promotion. Doctoral dissertation (Ph.D.), University of Washington. https://dlib.lib.washington.edu/researchworks/handle/1773/26059  

This dissertation is an investigation of the aftermath of the Arab Spring protests of 2011-2012 and their consequences for impacting contemporary discussions and efforts to promote “internet freedom” by Western democratic states. This study focuses on the key stakeholder communities that have emerged to compete, define, and consolidate the norms and frameworks surrounding internet freedom promotion: state-based, private sector, and civil society actors. This dissertation also describes the rise and failed attempt of civil society stakeholders to infuse democratically-oriented frames for approaching digital infrastructure management with the primary interests of protecting citizen rights and political activists in autocratic states. The political economy of global digital infrastructure regulation is also examined, and the positions of state-based and private sector influences within it are articulated. In doing so, this study identifies a key tech-savvy community of practice that has delineated the most comprehensive opportunities and pitfalls of using digital media tools for democracy promotion, and is struggling to consolidate and enact these practices and norms into policy frameworks. However, these efforts are cast against the competing interests of the technology providers in colluding with repressive and democratic state powers to provide functionally equivalent anti-democratic technocratic capabilities. Thus, this story is parts network analysis, part policy analysis, and part event analysis. Throughout, the proto-regime formation approach to technology policy is emphasized in contrast to existing state-sponsored telecommunications regulatory bodies.  

Hussain, M. M. (2014). Digital Infrastructure Politics and Internet Freedom Stakeholders after the Arab Spring. Journal of International Affairs, 68(1), 37.  

35    

This article presents a brief characterization of the transformational consequences of the Arab Spring for global policy frameworks and democracy promotion efforts regarding Internet infrastructure. To do so, we begin with unpacking the battle that took place in Dubai in December 2012 at the World Conference on International Telecommunications (WCIT-12) between competing state powers, technology policy regimes, and civil society activists jockeying on the global stage to promote Internet freedom. Particular emphasis is placed on the discourses and controversies carried over from the Arab Spring surrounding Internet freedom as democracy promotion, including the growing importance of transnationally-organized and tech-savvy civil society activists who have joined these opaque policy debates. The next section focuses on highlighting the new practices and ideologies of this particularly novel “community of practice” comprising transnational tech-savvy activists who have joined the Internet freedom proto-regime. The final discussion elucidates the policy innovations and frameworks born from the interactions of this diverse stakeholder network since the Arab Spring, and contrasts them with those of the state and private sector stakeholders who traditionally hold sway in shaping information infrastructure policies. We conclude by outlining the opportunities and challenges facing these policy entrepreneurs and the democratic interests of global Internet users.  

Hussain, M. M. M. (Ed.). (2014). State power 2.0: Authoritarian entrenchment and political engagement worldwide. Ashgate Publishing, Ltd.  

Digital media and online social networking applications have changed the way in which dissent is organized with social movement leaders using online applications and digital content systems to organize collective action, activate local protest groups, network with international social movements and share their political perspectives. In the past, authoritarian regimes could control broadcast media in times of political crisis by destroying newsprint supplies, seizing radio and television stations, and blocking phone calls. It is much more difficult to control media in the digital age though there have certainly been occasions when states have successfully shut down their digital networks. What causes state-powers to block internet access, disable digital networks or even shut off internet access? How is it done, what is the impact and how do dissidents attempt to fight back? In this timely and accessible volume a collection of high profile, international scholars answer these key questions using cases from Israel, Iran, Russia, Morocco, Vietnam and Kuwait and assess the political economy of the actors, institutions and regimes involved and effected by the state-management and control of digital networks.  

Ishkanian, A. (2011). Liberation technology: dreams, politics, history. Open Democracy.  

…Most “cyber-utopians” (as Evgeny Morozov calls them) or “liberation technologists” (as some refer to themselves) recognise the obstacles in their way: in particular, that authoritarian regimes are adept at using internet censorship, surveillance and monitoring to blunt the emancipatory momentum. But they go on to argue that further technological advances can help circumvent the “the great firewall of China” and its equivalents.… The United States is playing the leading role globally in advancing “internet freedom”, reflected in its award of $20 million in 2008-10 to

36    

support the work of digital activists. A diplomatic initiative – 21st Century Statecraft – aims to make diplomacy more innovative by fusing the new technologies with traditional foreign-policy tools.  

… The Program on Liberation Technology seeks to understand how “information technology can be used to defend human rights, improve governance, empower the poor, promote economic development, and pursue a variety of other social goods.” It plans to “evaluate (through experiment and other empirical methods) which technologies and applications are having greatest success, how those successes can be replicated, and how less successful technologies and applications can be improved to deliver real economic, social, and political benefit.”  

A project that has human goals at its nominal centre yet focuses on tools and technologies always runs the risk of technological determinism and indeed fetishism. Moreover, the prior history of “toolbox” approaches to political change (albeit before an era when the internet was widespread) enjoins caution over making the discovery and spread of successful technologies the key to achieving improvements in governance, development and human rights. It may be also that these technology-centred approaches tend to encourage a context-free and amnesiac attitude that ignores the experiences even of the very recent past. In any event, the extraordinary events in the middle east and north Africa fuel the liberation technologists’ euphoria.  

Jordan, T., Taylor, P., & Rutledge, L. How, through online activism, can power be observed in the flow of information and data?.  

Juris, J.S. 2008. Networking Futures: the Movements against Corporate Globalization. Durham, N.C.: Duke University Press.  

In an account full of activist voices and on-the-ground detail, Jeffrey provides a history of anti-corporate globalization movements, an examination of their connections to local dynamics in Barcelona, and an analysis of movement-related politics, organizational forms, and decision-making. Depicting spectacular direct action protests in Barcelona and other cities, he describes how far-flung activist networks are embodied and how networking politics are performed. He further explores how activists have used e-mail lists, Web pages, and free software to organize actions, share information, coordinate at a distance, and stage “electronic civil disobedience.” Based on a powerful cultural logic, anti-corporate globalization networks have become models of and for emerging forms of radical, directly democratic politics. Activists are not only responding to growing poverty, inequality, and environmental devastation; they are also building social laboratories for the production of alternative values, discourses, and practices.  

Kahn, R., & Kellner, D. (2004). New media and internet activism: From the’Battle of Seattle’to blogging. New media & society, 6(1), 87-95.  

The examples in this article suggest how new media developments in technoculture make possible a reconfiguring of politics and culture and a refocusing of politics on everyday life. In this conjuncture, the ideas of Guy Debord and the Situationist

37    

International are especially relevant, with their stress on the construction of situations, use of technology, media of communication, and cultural forms to promote a revolution of everyday life, and to increase the realm of freedom, community, and empowerment. The ideas and practices of Debord and the Situationists have a bewitching afterlife in internet culture and its articulations with the social world. In summer 2003, new ‘flash mobs’ began emerging in major cities throughout the world, as groups of individuals answered email summons to appear in specific sites, coordinated through the use of hand-held GSP tracking systems, to carry out particular actions. These brief playful encounters, which united new cultural collectives through the use of the internet, usually involved absurdist interventions that confused shoppers, security guards, and the media, although many times their point was simply to liberate an urban space such that prevailing social norms were challenged and temporarily set aside.  

Kahn, R., & Kellner, D. (2005). Oppositional politics and the Internet: A critical/reconstructive approach. Cultural Politics, 1(1), 75-100.  

We argue that the continued growth of the Internet, both as a form of mainstream media and as a tool for organizing democratic social interactions, requires that Internet politics be retheorized from a standpoint that is both critical and reconstructive. While we undertake an approach that is critical of corporate forms and hegemonic uses of the Internet, we advocate for new software developments such as blogs and trace the oppositional deployments of the Internet made by a wide variety of groups in the cause of progressive cultural and political struggle. In this regard, we describe how the Internet has facilitated the worldwide emergence of the anti-globalization, anti-war and anti-capitalism movements, even as it has coalesced local communities and groups, and so we conclude that the future of Internet politics must be thought dialectically as both global and local. We end by noting the relevance of the ideas of Guy Debord, with his focus on the construction of situations, the use of technology, media of communication and cultural forms to promote a revolution of everyday life.  

Kapor, M. (1991). Civil liberties in cyberspace. Scientific American, 265(3), 158-164.  

Kavada, A. (2013). Internet cultures and protest movements: The cultural links between strategy, organizing and online communication.  

Kellner, D. (1997) ‘Intellectuals, the New Public Spheres, and Technopolitics’, New Political Science 41–42 (Fall): 169–88.  

A revitalization of democracy in capitalist societies will therefore require a democratic media politics. Such a politics could involve a two-fold strategy of, first, attempting to democratize existing media to make them more responsive to the “public interest, convenience, and necessity.” In the United States, the media watchdog group FAIR (Fairness and Accuracy in Media) has developed this alternative, criticizing mainstream media for failing to assume their democratic and journalistic responsibilities and calling for an expansion of voices and ideas within the

38    

media system. Another strategy involves the development of oppositional media, alternatives to the mainstream, developed outside of the established media system. On my view, both strategies are necessary for the development of a democratic media politics and it is a mistake to pursue one at the neglect of the other.  

Kelty C (2008) Two Bits: The Cultural Significance of Free Software. Durham, NC: Duke University Press.  

In Two Bits, Christopher M. Kelty investigates the history and cultural significance of Free Software, revealing the people and practices that have transformed not only software but also music, film, science, and education. Free Software is a set of practices devoted to the collaborative creation of software source code that is made openly and freely available through an unconventional use of copyright law. Kelty explains how these specific practices have reoriented the relations of power around the creation, dissemination, and authorization of all kinds of knowledge. He also makes an important contribution to discussions of public spheres and social imaginaries by demonstrating how Free Software is a “recursive public”—a public organized around the ability to build, modify, and maintain the very infrastructure that gives it life in the first place.  

Knight, S. 2013. Icelandic Activist Birgitta Jónsdóttir Reveals How WikiLeaks Changed Her Country Forever, Takepart.com, 17 October 2013, http://www.takepart.com/article/2013/10/17/how-wikileaks-changed-my-country-forever  

In 2010, Jónsdóttir and like-minded colleagues introduced legislation in Parliament for transparency reforms and journalist protection— the Icelandic Modern Media Initiative (IMMI). It and other innovative post-collapse reforms – an attempt at a new constitution, drafted using crowdsourced techniques; websites designed to get the city of Reykjavik and parliament to address popular proposals; an anonymous online submission form for whistleblowers who want to connect with journalists; and others —drew attention to Iceland as an alternative to the post-collapse reforms (or lack thereof) in the U.S. and Europe.  

Konieczny, P. (2014). The day Wikipedia stood still: Wikipedia’s editors’ participation in the 2012 anti-SOPA protests as a case study of online organization empowering international and national political opportunity structures. Current Sociology, 62(7), 994-1016.  

This article contributes to the discussions on Internet mobilization and on international social movements’ ability to influence national policy. The event studied is the ‘first Internet strike’ of 18 January 2012 aimed against the SOPA legislation proposed in the USA. Wikipedia’s volunteer editors from all around the world took part in the vote concerning whether Wikipedia should undertake a protest action aimed at influencing American policymakers. Wikipedia editors are shown to share values of the international free culture movement, though experienced editors were also likely to be conflicted about whether taking part in a protest action was not violating the site’s principle of encyclopedic neutrality. Further, Wikipedia’s

39    

participation in this protest action allowed non-US citizens to have a visible impact on the US national legislation. As such, Wikipedia can be seen as an international social movement organization, whose 24 hour-long blackout of its popular website was a major factor in the success of the anti-SOPA protests. Wikipedia’s blackout was an expression of an international political opportunity structure in the form of worldwide awareness and protests, which in turn enabled a national political opportunity structure by informing and mobilizing American citizens.  

Krotoski, A. (2011). WikiLeaks and the new, transparent world order. The Political Quarterly, 82(4), 526-530.  

Kubitschko, S. (2015). Media practices of civil society organisations: Emerging paths to legitimation and long-term engagement (Doctoral dissertation).  

In this thesis I wish to analyse the complex relationship between actors’ media- related practices, legitimacy and long-term engagement. Based on a qualitative approach my research investigates two cases –Citizens for Europe, a civil society organisations involved in issues relating to European citizenship, and the Chaos Computer Club, one of the world’s oldest and largest hacker organisations. More concretely, through face-to-face interviews, participant observation and media analysis I analyse the role media practices play for the two organisations to establish legitimation and to sustain their political engagement over time. Accordingly, my thesis seeks to provide an empirically informed interpretive account of the meaning media-related practices have for actors’ political endeavours. From a more operationalised perspective, I am trying to make a convincing argument that practices circulating around and oriented towards media technologies and infrastructures play a configurative role for actors’ ability to co-determine democratic constellations. Instead of suggesting a straightforward causal chain my thesis conceptualises the entanglements between media practices, legitimation and long-term engagement as interlocking arrangements grounded in relational dynamics. Overall, my thesis aims to compliment existing research on the role media technologies and infrastructures play for the formation of political arrangements by looking at organisation-based engagement. In doing so, my research partially bridges a current research gap concerning the relationship between organisational actors’ media-related practices and their ability to establish legitimacy and to perpetuate political engagement over time.  

Kubitschko, S. (2015). Hackers’ media practices Demonstrating and articulating expertise as interlocking arrangements. Convergence: The International Journal of Research into New Media Technologies, 1354856515579847.  

The increased level of technical abstractness poses a challenge for laypersons and politicians alike to notice the political impacts specific technical developments might bring. By presenting qualitative research on Europe’s oldest and one of the world’s largest hacker organizations – the Chaos Computer Club (CCC) – the article shows that the CCC acts as a civil society organization that brings together a wide range of knowledge, skills and experiences related to media technologies and infrastructures. By deconstructing the abstractness of a given technology, the CCC materializes its

40    

formerly unrecognized political quality. Yet, the political endeavour of closing the expert-public gap, in the interests of public democracy, is only brought to life once the outcomes of a particular hack are communicated in comprehensible manners to diverse publics and audiences. Overall the article points to the emergence of new modes and practices of expertise by conceptualizing the Club’s active demonstration of expertise through hacking and its articulation of expertise through media-related practices and interactions with institutional politics as interlocking arrangements. Today, hackers – and in particular hacker organizations – are best considered actors whose skills, knowledge and experiences are ever more relevant for political cultures and democracy at large.  

Land, Molly K. and Meier, Patrick and Belinsky, Mark and Jacobi, Emily, #ICT4HR: Information and Communication Technologies for Human Rights. World Bank Institute, Nordic Trust Fund, Open Development Technology Alliance, and ICT4Gov, November 2012. Available at SSRN: http://ssrn.com/abstract=2178484  

New technologies have been heralded as revolutionizing activism and government, providing a means for citizens to engage with others and with their government faster and more simply than ever before. The purpose of this report is to analyze the impact of new technologies on human rights. Using case studies largely from three countries, Kenya, the Democratic Republic of Congo, and the Dominican Republic, the report considers both the opportunities and risks presented by new technologies for human rights.  

The report concludes there are benefits that can be realized through the deployment of new technologies in human rights projects. New technologies offer the potential to reduce the cost of collecting information about human rights issues and to increase participation in human rights advocacy efforts. Each of these possible benefits, however, gives rise to new risks and challenges. Although new technologies can reduce the cost of information gathering, it can be difficult to ensure the accuracy of the information generated. The involvement of ordinary individuals in collecting information also presents particular challenges for security, because these individuals may lack the necessary training or professional protocols for assessing and taking measures to ensure security. Managing these risks is complicated by a tension between the approaches of human rights and technology experts. For example, the values of the technology field — a willingness to experiment and “to fail, adopt, and iterate” — can be in some tension with the need to develop considered and reasoned security protocols ahead of time. In other words, while hacking is an iterative process, security is not.  

The report concludes by presenting several recommendations designed to respond at least in part to the human rights risks identified in the report. The report does not purport to provide a blueprint for all projects seeking to employ new technologies in furtherance of human rights or development goals. The challenges that arise in any particular project will be context specific and beyond the scope of this report. Rather, the report seeks to identify, in a preliminary manner, some of the questions that might

41    

be asked at the outset in order to respond to concerns about accuracy, security, and participation.  

Landorf, Brittany, “Female Reverberations Online: An Analysis of Tunisian, Egyptian, and Moroccan Female Cyberactivism During the Arab Spring” (2014). International Studies Honors Projects. Paper 20. http://digitalcommons.macalester.edu/intlstudies_honors/20  

Digital technologies and social media networks have the potential to open new platforms for women in the public domain. During the 2011 Arab Spring revolutions, female cyberactivists used digital technologies to participate in and at times led protests. This thesis examines how Tunisian, Egyptian, and Moroccan female cyberactivists deployed social media networks to write a new body politic online. It argues throughout that female activists turned to online activism to disrupt gender relations in their countries and demand social, religious, economic, and political gender parity.  

Langman, L. (2005). From Virtual Public Spheres to Global Justice: A Critical Theory of Internetworked Social Movements*. Sociological Theory, 23(1), 42-74.  

From the early 1990s when the EZLN (the Zapatistas), led by Subcommandte Marcos, first made use of the Internet to the late 1990s with the defeat of the Multilateral Agreement on Trade and Investment and the anti-WTO protests in Seattle, Quebec, and Genoa, it became evident that new, qualitatively different kinds of social protest movements were emergent. These new movements seemed diffuse and unstructured, yet at the same time, they forged unlikely coalitions of labor, environmentalists, feminists, peace, and global social justice activists collectively critical of the adversities of neoliberal globalization and its associated militarism. Moreover, the rapid emergence and worldwide proliferation of these movements, organized and coordinated through the Internet, raised a number of questions that require rethinking social movement theory. Specifically, the electronic networks that made contemporary globalization possible also led to the emergence of “virtual public spheres” and, in turn, “Internetworked Social Movements.” Social movement theory has typically focused on local structures, leadership, recruitment, political opportunities, and strategies from framing issues to orchestrating protests. While this tradition still offers valuable insights, we need to examine unique aspects of globalization that prompt such mobilizations, as well as their democratic methods of participatory organization and clever use of electronic media. Moreover, their emancipatory interests become obscured by the “objective” methods of social science whose “neutrality” belies a tacit assent to the status quo. It will be argued that the Frankfurt School of Critical Theory offers a multi-level, multi-disciplinary approach that considers the role of literacy and media in fostering modernist bourgeois movements as well as anti-modernist fascist movements. This theoretical tradition offers a contemporary framework in which legitimacy crises are discussed and participants arrive at consensual truth claims; in this process, new forms of empowered, activist identities are fostered and negotiated that impel cyberactivism.  

42    

Le Monde, May 2015, Comment Berlin est devenue la capitale des hackers. Publié le 16-05-2015  

La capitale allemande est devenue un passage obligé des hackers et activistes du net, en s’imposant comme une anti-Silicon Valley. http://tempsreel.nouvelobs.com/monde/20150513.OBS8924/comment-berlin-est-devenu-berlin-la-capitale-des-hackers.html  

Lessig, L. 2004. Free culture: how big media uses technology and the law to lock down culture and control creativity. New York: Penguin Press.  

This is the third book by Stanford law professor Larry Lessig, and the third now in which he furthers his basic theme: that the ancien regime of intellectual property owners is locked in a battle with the capabilities of new technology. Lessig used his first book, Code and Other Laws of Cyberspace (Basic Books, 1999), to explain that the notion of cyberspace as free, open, and anarchic is simply a myth, and a dangerous one at that: the very architecture of our computers and how they communicate determine what one can and cannot do within that environment. If you can get control of that architecture, say by mandating filters on content, you can get substantial control over the culture of that communication space. In his second book, The Future of Ideas: the Fate of the Commons in a Connected World (Random House, 2001), Lessig describes how the change from real property to virtual property actually means more opportunity for control, not less. The theme that he takes up in Free Culture is his concern that certain powerful interests in our society (read: Hollywood) are using copyright law to lock down the very stuff of creativity: mainly, past creativity. http://www.kcoyle.net/free_culture.html  

Lessig, L. 2009. “Et tu, KK? (aka, No, Kevin, this is not ‘socialism’),” Lessig Blog (28 May). at http://www.lessig.org/blog/2009/05/et_tu_kk_aka_no_kevin_this_is.html  

Lewis, S. C., & Usher, N. (2014). Code, collaboration, and the future of journalism: A case study of the Hacks/Hackers global network. Digital Journalism, 2(3), 383-393.  

Amid the rise of computational and data-driven forms of journalism, it is important to consider the institutions, interactions, and processes that aim to help the social worlds of journalism and technology come together and collaborate around a common cause of news innovation. This paper examines one of the most prominent such efforts: the transnational grassroots organization called Hacks/Hackers. Through a two-year qualitative case study, we sought to understand just how journalists and technologists would engage through this organization: what kinds of interactions would occur, and what factors might facilitate collaboration? Drawing upon the science and technology studies concept of “trading zones,” we examine how Hacks/Hackers functions as an informal and transitory trading zone through which journalists and technologists can casually meet and coordinate. The level of engagement between the two groups, we found, depends on a set of social and structural factors, including institutional support and the leadership of key volunteers, and the depth of that engagement depends on

43    

sufficient mutual understanding among journalists and hackers. We discuss the implications of these findings for understanding the challenges and opportunities presented through the intersection of journalism and technology.  

Lim, M. (2013) Framing Bouazizi: ‘White lies’, hybrid network, and collective/connective action in the 2010–11 Tunisian uprising. Journalism, 14(7), 921-941.  

By delving into the detailed account of the Tunisian uprising, this article offers an explanation that sets the 2010 uprising apart from its precursors. The 2010 uprising was successful because activists successfully managed to bridge geographical and class divides as well as to converge offline and online activisms. Such connection and convergence were made possible, first, through the availability of dramatic visual evidence that turned a local incident into a spectacle. Second, by successful frame alignment with a master narrative that culturally and politically resonated with the entire population. Third, by activating a hybrid network made of the connective structures to facilitate collective action – among Tunisians who shared collective identities and collective frames – and connective action – among individuals who sought more personalized paths to contribute to the movement through digital media. Activism, Arab Spring, Bouazizi, collective action, framing, networks, social media, social movement, Tunisia  

Löblich, M. (2015). Dissent and Political Participation: The Many Faces of Communication Policy Advocacy and Activism. Communication, Culture & Critique.  

This article deals with dissent among political civil society organizations in communication policy. The research question is why these organizations ended up being on different sides of the debate on rules regarding net neutrality in the United States. Rationales, goals, routines, and resources are examined based on Anthony Giddens’s theory of structuration. This study focuses on the Federal Communications Commission’s Open Internet proceeding, and draws on interviews with 13 organizations and document analyses. A group portrait, a typology, and influencing factors provide information as to why different priorities were attributed to net neutrality and why this concept did not become a unifying theme among civil advocacy and activist organizations.  

A typology helped to identify the different positions in the Open Internet proceeding. Criteria for type construction were developed during data analysis (Kluge, 2000). The importance of net neutrality rules for organizations was chosen as one criterion, and organizations’ core concerns as second. The first criterion aimed to address the research question, while the second criterion was selected because organizations distinguished themselves through their core concern for either media structures or social structures. The importance of net neutrality rules was rated on one of three levels (important, neither important nor unimportant, unimportant). The core concern was labeled either as “media structure,” “both media structures and social structures,” or “social structures.” Some organizations were exclusively engaged in changing media structures, some saw changing social structures as linked to changing media

44    

and communication structures, and others’ core concerns were social structures and media were only one issue among many others. These two criteria created an attribute space (Kluge, 2000) by which organizations were grouped in four types (see Figure 1).  

Figure 1. Attribute Space. Note. The Believers: Open Technology Institute, Free Press, Public Knowledge, Media Access Project, The Mobilizers: Media Action Grassroots Network, Center for Rural Strategies, United Church of Christ/Office of Communication, National Hispanic Media Coalition; The Reframers: League of United Latin American Citizens, the National Association for the Advancement of Colored People, Asian American Justice Center, Minority Media and Telecommunications Council; The Cyber Enthusiast: Electronic Frontier Foundation  

… The Cyber Enthusiast  

This type consists of the EFF. The EFF is not a DC insider, did not deeply participate in the Open Internet proceeding, and did not support the FCC’s proposed rules. At first glance, its objection was surprising, because in 2007 the digital liberties’ organization, together with the Associated Press, revealed that Comcast had been secretly interfering with bit-torrent traffic (Lasar, 2010). The EFF’s legal director believes that the “Internet needs to be dumb pipes,” yet she was “not happy with the solutions” proposed by the FCC. In its comment to the proceeding, the EFF contested the FCC’s statutory authority and feared “unprecedented overreach […] also in a host of other areas” (EFF, 2010, p. 7).  

The EFF was founded in 1990 to protect free expression in the digital realm against state surveillance. It regards the government as a major threat to communications rights on the Internet (EFF, n.d.). The organization is rooted in cyber-libertarian enthusiasm. Its mistrust in the political system in general—the legal director described the U.S. congress as “completely broken”—and in the net neutrality rules in particular has to do with Silicon Valley, where the organization has a large portion of its membership. In its early years, the EFF had its headquarters on the East Coast, but soon moved to California and became a “litigation shop.” The “pressure to sell out four things in order to get one thing is very great if you are a DC player,” explained the legal director. The response to the EFF’s policy work inside the Beltway represented “a very clear answer” by its members. The legal director reported that the “set of values out here [in the Bay Area]” are very different than on the East Coast (see Turner, 2005). Against this background, it is not surprising that the group has been particularly concerned about innovators and content creators (EFF, 2010).  

Loveluck, B. (2015). Internet, une société contre l’Etat? Libéralisme informationnel et économies politiques de l’auto-organisation en régime numérique. Réseaux. Communication-technologie-société, (192), 35p.  

L’informatique en réseau a souvent été présentée comme un instrument favorisant l’auto-organisation de la société civile, à partir de modes alternatifs de distribution du pouvoir et de coordination des activités. L’histoire d’internet, abordée du point de vue de l’histoire des idées, montre que de telles propriétés ont donné lieu à la formation

45    

d’une véritable philosophie politique que nous avons appelée le libéralisme informationnel. Celle-ci a vu différents modèles d’économie politique s’affronter ; nous en présentons ici le mouvement général ainsi que les divergences internes. Nous terminons par un exposé de trois grandes formes de gouvernementalité qui en sont issues, et qui ouvrent à une critique de l’économie politique en régime numérique : la captation, la dissémination et l’auto-institution.  

Ludlow, Peter. 2001. Crypto anarchy, cyberstates, and pirate utopias. MIT Press.  

Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflects the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence of governance structures within online communities and the visions of political sovereignty shaping some of those communities. Ludlow views virtual communities as laboratories for conducting experiments in the construction of new societies and governance structures. While many online experiments will fail, Ludlow argues that given the synergy of the online world, new and superior governance structures may emerge. Indeed, utopian visions are not out of place, provided that we understand the new utopias to be fleeting localized “islands in the Net” and not permanent institutions.  

The book is organized in five sections. The first section considers the sovereignty of the Internet. The second section asks how widespread access to resources such as Pretty Good Privacy and anonymous remailers allows the possibility of “Crypto Anarchy”—essentially carving out space for activities that lie outside the purview of nation states and other traditional powers. The third section shows how the growth of e-commerce is raising questions of legal jurisdiction and taxation for which the geographic boundaries of nation-states are obsolete. The fourth section looks at specific experimental governance structures evolved by online communities. The fifth section considers utopian and anti-utopian visions for cyberspace. Contributors: Richard Barbrook, John Perry Barlow, William E. Baugh Jr., David S. Bennahum, Hakim Bey, David Brin, Andy Cameron, Dorothy E. Denning, Mark Dery, Kevin Doyle, Duncan Frissell, Eric Hughes, Karrie Jacobs, David Johnson, Peter Ludlow, Timothy C. May, Jennifer L. Mnookin, Nathan Newman, David G. Post, Jedediah S. Purdy, Charles J. Stivale  

Lynch, L. (2010). ““We’re Going to Crack the World Open”: Wikileaks and the future of investigative reporting,” Journalism Practice, 4(3): 309-318.  

This paper considers the current and future role played by the document-leaking site Wikileaks in the process of investigative journalism, by analyzing the way in which Wikileaks has articulated its own relationship with the press and then detailing how reporters have actually discovered and used the site. My research shows that Wikileaks is used both as a regular destination and as a one-time source for leaked material; additionally, it is increasingly used as a repository for leaked documents that are removed from print and online media outlets through legal action. I argue Wikileaks represents perhaps the most extreme of a number of new Web-based

46    

interventions into the troubled climate for investigative reporting, and might usefully be seen less as an “outlier” than as on the far end of continuum.  

MacKinnon, R. (2005, January). Blogging, journalism, and credibility: Battleground and common ground. In Report from a conference held January (pp. 21-22).  

[A] conference held in late January [2005] at Harvard, at which a group of 50 journalists, bloggers, news executives, media scholars, and librarians sat down to try and make sense of the new emerging media environment. Since the conference, the resignation of CNN’s Eason Jordan and the Jeff Gannon White House incident have shown how powerful weblogs can be as a new form of citizens’ media. We are entering a new era in which professionals have lost control over information . not just the reporting of it, but also the framing of what’s important for the public to know. To what extent have blogs chipped away at the credibility of mainstream media? Is credibility a zero-sum game . in which credibility gained by blogs is lost by mainstream media and vice versa?  

MacKinnon, R. (2011). China’s” networked authoritarianism”. Journal of Democracy, 22(2), 32-46.  

While social networking platforms can be powerful tools in the hands of activists seeking to bring down authoritarian governments, it is unwise to assume that access to the Internet and social networking platforms alone is sufficient for democratization of repressive regimes. The case of China demonstrates how authoritarian regimes can adapt to the Internet, even using networked technologies to bolster legitimacy. The emergence of Chinese “networked authoritarianism” highlights difficult issues of policy and corporate responsibility that must be resolved in order to ensure that the Internet and mobile technologies can fulfill their potential to support liberation and empowerment.  

MacKinnon, R. 2012. Consent of the Networked: The Struggle for Internet Freedom, Basic Books: New York, 2012.  

In the early days of the web, some hoped that these two worlds [online and offline] would simply stay apart. In 1996, civil libertarian John Perry Barlow wrote ‘A Declaration of the Independence of Cyberspace’, which demanded that the governments of the physical world not impinge on the freedom of the digital one. Yet governments and corporations did impinge, with laws, law suits, and censorship. Books by Lawrence Lessig, Shanthi Kalathil and Taylor Boas, Ronald Deibert, and Jonathan Zittrain described how the Internet was regulated, legislated, divided, and monitored. Soon the freedom of the Internet was no longer a fact, but a fragile quality.  

Almost 15 years later, in 2010, Secretary of State Clinton gave a speech, which proposed that the US government should promote a free Internet because it had the power to democratize societies by freeing their citizens to publicly dissent and organize. In 2011, journalist Evgeny Morozov made a big splash with his book The Net Delusion , which directly challenged this argument. Morozov counter-argued that

47    

the Internet does not particularly empower citizens, and perhaps even empowers repressive governments more through surveillance, propaganda, and censorship.  

A year later Rebecca MacKinnon has again shifted the discourse: yes, the Internet does have the capacity to empower citizens and thus increase and improve democracy, but that civic power is under existential threat. MacKinnon also breaks new ground by highlighting the tremendous importance of private firms in determining the political nature of the Internet. Google, Facebook, and their peers have been kind enough to have ‘created a new, globally networked public sphere’, she notes, but that supposedly public sphere is ‘largely shaped, built, owned, and operated by the private sector’ (p. 9). This fact poses a political threat as ‘Internet and telecommunication companies have gained far too much power over citizens’ lives, in ways that are insufficiently transparent or accountable to public interest’ (p. 10).  

One of her most interesting ideas is that of ‘networked authoritarianism’, the observation that a society’s citizens can be connected to one another and yet remain unfree. China, on which she is an expert, is surely the most skilled practitioner of this new form of governance. ‘Herein lies the paradox of the Chinese Internet’, she writes. ‘Public debate and even some forms of activism are expanding’ while ‘state controls and manipulation tactics have prevented democracy movements from gaining meaningful traction’ (p. 42).  

MacKinnon, R. (2012). The netizen. Development, 55(2), 201-204.  

Rebecca MacKinnon argues that it is no longer sufficient for people to assert their rights and responsibilities as citizens of nation-states. If the goals of global social justice and accountable governance are to be served, people now also need to assert their rights and responsibilities as netizens: citizens of a globally connected Internet. Keywords: Internet; digital civil society; citizen commons; cyberspace; accountable governance  

MacKinnon, R. (2012). Rights online. Index on Censorship, 41(1), 114-115.  

A manifesto by a leading digital rights campaigner and journalist.  

McCarthy, S. 2012. “Mosquitoes with cannons,” SmáriMcCarthy.com (22 January), at http://www.smarimccarthy.is/2012/01/mosquitoes-with-canons/  

I’m not much of a cyberlibertarian, but I have a soft spot for them. They had a few things right, even if suffering from frontier blindness: the overarching belief of those at the frontier of human development is always that they are untouchable. History creeps up on them in their sleep. John Perry Barlow was unequivocal in his righteous demand for sovereignty and independence for Cyberspace, he foresaw that nation states were inherently incapable of existing in a post-territorial communications space. And yet somehow, due to a splendid mix of cronyism, corruption, greed and stealth, we’ve found ourselves in the situation that national interests have strong armed the debate on a field of physical infrastructure and border-theoretical governance.  

48    

The Internet is no longer free from incursion from nation states, so anything that can be understood through the delineation of national borders, encapsulated in national interests, or affected through national political processes can affect the Internet directly. Being on the defensive is not going to be a winning strategy. Money just got tight: there’s only so much blackouting we can survive.  

So let’s go on the offensive. Instead of having traditional politics interfere with the Internet, it’s time for the Internet to interfere with traditional politics. The various Pirate Parties have moved us part of the way towards establishing a theory of networked information politics, but it’s nowhere near complete. There are a lot of deep fundamental questions that still need to be asked, and a lot of it’s going to require some deep philosophical navel gazing. But I think we can do it.  

Not really because I have a problem with the copyright mafia, even though I do. Much more because I’ve been watching meatspace politicians and their bankrupt ideologies take humanity out for too many rodeos. They’ve long since outstayed their welcome, and they must be ousted. Networked politics, information politics, is the way to fix things. Who else is in favor of aiming our cannons at bigger targets, and quitting with the grapeshot?  

Maclay, C. M. (2010). Protecting Privacy and Expression Online Can the Global Network Initiative Embrace the Character of the Net?. Access controlled: The shaping of power, rights, and rule in cyberspace, 87-108.  

… a nascent multistakeholder effort called the Global Network Initiative (GNI), of which Yahoo! is a founding member. Participants evaluate human rights risks and seek opportunities to mitigate them when considering whether and how to enter a new market, [e.g. Vietnam in the case of Yahoo!]. Yahoo!’s motivations were likely diverse, but the actions were aligned with their mission, corporate health and profitability, and the preferences of at least some shareholders.  

Global Network Initiative participants include ICT companies, nongovernmental organizations, investors, and academics. The founding group of companies comprises Google, Microsoft, and Yahoo!. Academic participants in the GNI are Annenberg School for Communication (University of Southern California); Deirdre Mulligan, Berkeley School of Information (University of California); Berkman Center for Internet and Society (Harvard University); Rebecca MacKinnon, Journalism and Media Studies Centre (University of Hong Kong); and Research Center for Information Law (University of St. Gallen). Investors participating in the GNI are Boston Common Asset Management, Calvert Group, Domini Social Investments LLC, F&C Asset Management, KLD Research & Analytics, Inc., and Trillium Asset Management. Nongovernmental organizations participating in the GNI are Center for Democracy and Technology, Committee to Protect Journalists, Electronic Frontier Foundation, Human Rights First, Human Rights in China, Human Rights Watch, International Business Leaders Forum, Internews, and World Press Freedom Committee. The United Nations Special Representative to the Secretary General on business and human rights enjoys observer status. The drafting group also included

49    

Amnesty International, Reporters Without Borders, France Telecom, Teliasonera, and Vodafone, none of whom continued to participate in the GNI after launch.  

McAfee, N. (2005). Insights for the Future of Public Media: A Report on the Global Voices Summit. Center for Social Media. http://www.cmsimpact.org/sites/default/files/documents/pages/mcafeegv05report.pdf  

[Global Voices is] a community with a history less than a year old, a community without any physical borders (though it is grappling with linguistic ones). This is a community spread across the globe of people who communicate virtually. It is the world of Global Voices http://www.globalvoicesonline.org, an online website that “rounds up” what’s happening in the blogospheres of various parts of the mostly developing world. It is a blog that takes visitors outward to other blogs, transports people to the conversation going on in the Middle East, Sub-Saharan Africa, the Americas, Eurasia, Asia, and the Pacific.  

Global Voices was conceived at a meeting in December 2004 at Harvard Law School’s Berkman Center for Internet & Society. (Rebecca MacKinnon’s report from that meeting can be found at http://www.personaldemocracy.com/node/208). That meeting brought together bloggers and scholars from around the world who began thinking about how to take a nascent, decentralized movement and harness it into a forum for creating a truly global conversation. The conversation was going on already, in bits and pieces; the website of Global Voices made it possible to connect the conversations. [See also Global Voices 2015 summit report below].  

McDonald, K. (2015). From Indymedia to Anonymous: rethinking action and identity in digital cultures. Information, Communication & Society, (ahead-of-print), 1-15.  

The period following the social mobilizations of 2011 has seen a renewed focus on the place of communication in collective action, linked to the increasing importance of digital communications. Framed in terms of personalized ‘connective action’ or the social morphology of networks, these analyses have criticized previously dominant models of ‘collective identity’, arguing that collective action needs to be understood as ‘digital networking’. These influential approaches have been significantly constructed as a response to models of communication and action evident in the rise of Independent Media Centres in the period following 1999. After considering the rise of the ‘digital networking’ paradigm linked to analyses of Indymedia, this article considers the emergence of the internet-based collaboration known as Anonymous, focusing on its origins on the 4chan manga site and its 2008 campaign against Scientology, and also considers the ‘I am the 99%’ microblog that emerged as part of the Occupy movement. The emergence of Anonymous highlights dimensions of digital culture such as the ephemeral, the importance of memes, an ethic of lulz, the mask and the grotesque. These forms of communication are discussed in the light of dominant attempts to shape digital space in terms of radical transparency, the knowable and the calculable. It is argued that these contrasting approaches may amount to opposing social models of an emerging information society, and that the

50    

analysis of contemporary conflicts and mobilizations needs to be alert to novel forms of communicative practice at work in digital cultures today.  

Meier, P. (2010) Is Ushahidi a Liberation Technology? iRevolutions, http://irevolution.net/2010/08/08/ushahidi-liberation-tech/  

…What is Liberation Technology? Larry [Diamond] defines this technology as, “… any form of information and communication technology (ICT) that can expand political, social, and economic freedom. In the contemporary era, it means essentially the modern, interrelated forms of digital ICT—the computer, the Internet, the mobile phone, and countless innovative applications for them, including “new social media” such as Facebook and Twitter.”  

As is perfectly well known, however, technology can also be used to repress. This should not be breaking news. Liberation Technology vs Digital Repression. My dissertation describes this competition as an arms-race, a cyber game of cat-and-mouse. But the technology variable is not the most critical piece, as I argue in this recent Newsweek article:  

“The technology variable doesn’t matter the most,” says Patrick Meier […] “It is the organizational structure that will matter the most. Rigid structures are unable to adapt as quickly to a rapidly changing environment as a decentralized system. Ultimately, it is a battle of organizational theory.”  

Larry rightly notes that, “In the end, technology is merely a tool, open to both noble and nefarious purposes. Just as radio and TV could be vehicles of information pluralism and rational debate, so they could also be commandeered by totalitarian regimes for fanatical mobilization and total state control. Authoritarian states could commandeer digital ICT to a similar effect. Yet to the extent that innovative citizens can improve and better use these tools, they can bring authoritarianism down—as in several cases they have.”  

A bold statement for sure. But as Larry recognizes, it is particularly challenging to disentangle political, social and technology factors. This is why more empirical research is needed in this space which is largely limited to qualitative case-studies. We need to bring mixed-methods research to the study of digital activism in repressive environments. This is why I’m part of the Meta-Activism Project (MAP) and why I’m particularly excited to be collaborating on the development of a Global Digital Activism Dataset (GDADS).  

Larry writes that Liberation Technology is also “Accountability Technology” in that “it provides efficient and powerful tools for transparency and monitoring.” This is where he describes the FrontlineSMS and Ushahidi platforms. In some respects, these tools have already served as liberation technologies. The question is, will innovative citizens improve these tools and use them more effectively to be able to bring down dictators? I’d love to know your thoughts.  

51    

Meier, P. (2011) Do “Liberation Technologies” Change the Balance of Power Between Repressive States and Civil Society? Ph.D. thesis, Fletcher School of Law and Diplomacy. https://irevolution.files.wordpress.com/2011/11/meier-dissertation-final.pdf  

Do new information and communication technologies (ICTs) empower repressive regimes at the expense of civil society, or vice versa? For example, does access to the Internet and mobile phones alter the balance of power between repressive regimes and civil society? These questions are especially pertinent today given the role that ICTs played during this year’s uprisings in Tunisia, Egypt and beyond. Indeed, as one Egyptian activist stated, “We use Facebook to schedule our protests, Twitter to coordinate and YouTube to tell the world.” But do these new ICTs—so called “liberation technologies”—really threaten repressive rule? The purpose of this dissertation is to use mixed-methods research to answer these questions.  

The first half of my doctoral study comprised a large-N econometric analysis to test whether “liberation technologies” are a statistically significant predictor of anti-government protests in countries with repressive regimes. If using the Internet and mobile phones facilitates organization, mobilization and coordina-tion, then one should expect a discernible link between an increase in access to ICTs and the frequency of protests—particularly in repressive states. The results of the quantitative analysis were combined with other selection criteria to identify two country case studies for further qualitative comparative analysis: Egypt and the Sudan.  

The second half of the dissertation assesses the impact of “liberation technologies” during the Egyptian Parliamentary Elections and Sudanese Presidential Elections of 2010. The analysis focused specifically on the use of Ushahidi—a platform often referred to as a “liberation technology.” Descriptive analysis, process tracing and semi-structured interviews were carried out for each case study. The results of the quantitative and qualitative analyses were mixed. An increase in mobile phone access was associated with a decrease in protests for four of the five regression models. Only in one model was an increase in Internet access associated with an increase in anti-government protests. As for Ushahidi, the Egyptian and Sudanese dictatorships were indeed threatened by the technology because it challenged the status quo. Evidence suggests that this challenge tipped the balance of power marginally in favor of civil society in Egypt, but not in the Sudan, and overall not significantly.  

Meier, P. (2012). Ushahidi as a liberation technology. In Liberation technology: Social media and the struggle for democracy, 95-109.  

… Focusing on the Ushahidi platform also facilitates the study of concrete uses of social media, such as election monitoring. Elsewhere in this volume, Larry Diamond has referred to the Ushahidi platform as an example of a liberation and accountability technology.What is missing, however, is research to support these claims. …U-Shahid helped to reverse or at least fight back against this government-constructed panopticon, and this may have helped to pave the way for the 2011 revolution that toppled Mubarak. The Egyptian case demonstrates the value of geomapping as an important liberation technology.  

52    

Mejias, U. A. (2012). FCJ-147 Liberation Technology and the Arab Spring: From Utopia to Atopia and Beyond. The Fibreculture Journal, (20 2012: Networked Utopias and Speculative Futures).  

While the tendency in the West to refer to the Arab Spring movements as ‘Twitter Revolutions’ has passed, a liberal discourse of ‘liberation technology’ (information and communication technologies that empower grassroots movements) continues to influence our ideas about networked participation. Unfortunately, this utopian discourse tends to circumvent any discussion of the capitalist market structure in which these tools operate. In this paper, I suggest that liberation technologies may in fact increase opportunities for political participation, but that they simultaneously create certain kinds of inequalities. I end by proposing a theoretical framework for locating alternative practices of participation and liberation.  

Monterde, A., M. Aguilera, X. Barandiaran, A. Calleja-Lopez, J. Postill 2015. Multitudinous identities: a qualitative and network analysis of the 15M collective identity, Information, Communication and Society. Vol. 18, Iss. 8.  

The emergence of network-movements since 2011 has opened the debate around the way in which social media and networked practices make possible innovative forms of collective identity. We briefly review the literature on social movements and ‘collective identity’, and show the tension between different positions stressing either organization or culture, the personal or the collective, aggregative or networking logics. We argue that the 15M (indignados) network-movement in Spain demands conceptual and methodological innovations. Its rapid emergence, endurance, diversity, multifaceted development and adaptive capacity, posit numerous theoretical and methodological challenges. We show how the use of structural and dynamic analysis of interaction networks (in combination with qualitative data) is a valuable tool to track the shape and change of what we term the ‘systemic dimension’ of collective identities in network-movements. In particular, we introduce a novel method for synchrony detection in Facebook activity to identify the distributed, yet integrated, coordinated activity behind collective identities. Applying this analytical strategy to the 15M movement, we show how it displays a specific form of systemic collective identity we call ‘multitudinous identity’, characterized by social transversality and internal heterogeneity, as well as a transient and distributed leadership driven by action initiatives. Our approach attends to the role of distributed interaction and transient leadership at a mesoscale level of organizational dynamics, which may contribute to contemporary discussions of collective identity in network-movements.  

Morin, J. F. (2014). Paradigm shift in the global IP regime: The agency of academics. Review of international political economy, 21(2), 275-309.  

The global intellectual property (IP) regime is in the midst of a paradigm shift in favour of greater access to protected work. Current explanations of this paradigm shift emphasize the agency of transnational advocacy networks, but ignore the role of academics. Scholars interested in global IP politics have failed to engage in reflexive thinking. Building on the results from a survey of 1679 IP experts, this article argues

53    

that a community of academics successfully broke the policy monopoly of practitioners over IP expertise. They instilled some scepticism concerning the social and economic impacts of IP among their students as well as in the broader community of IP experts. They also provided expert knowledge that was widely amplified by non-governmental organizations (NGOs) and some intergovernmental organizations, acting as echo chambers to reach national decision makers. By making these claims, this article illustrates how epistemic communities actively collaborate with other transnational networks, rather than competing with them, and how they can promote a paradigm change by generating, rather than reducing, uncertainty.  

Morozov, E. (2011). WikiLeaks and the perils of extreme glasnost. New Perspectives Quarterly, 28(1), 7-11.  

Is Internet freedom an absolute, universal value like freedom of speech? If there are limits, how and by whom can they be established? Is crying fire or scaling firewalls anymore acceptable in cyberspace than in physical space? What is the impact on the discourse between nations, cultures and individuals? In this section, we gather a collage of comments from various key players from Google to Wikileaks to the US State Department along with comments by one of the most cogent analysts of the Net and the president of Turkey.  

Morozov, E. (2012). The net delusion: The dark side of Internet freedom. PublicAffairs.  

Two delusions in particular concern Morozov: “cyber-utopianism”, the belief that the culture of the internet is inherently emancipatory; and “internet-centrism”, the belief that every important question about modern society and politics can be framed in terms of the internet. Put so starkly, such extreme beliefs may sound laughable, yet he sees them in action everywhere: from the misguided belief that Twitter could foment revolution in Iran in 2009 (on the eve of the elections, the country had fewer than 20,000 Twitter users) to the naive hope that instant international exposure via new media will necessarily result in a diminishing of violence in Africa and the Middle East. Moreover, Morozov argues, the west’s reckless promotion of technological tools as pro-democratic agents has provoked authoritarian regimes to crack down on online activity in some style: not just closing down or blocking websites, but using social networks to infiltrate protest groups and track down protesters, seeding their own propaganda online, and generally out-resourcing and out-smarting their beleaguered citizenry. http://www.theguardian.com/books/2011/jan/09/net-delusion-morozov-review  

Morozov, E. (2014). To save everything, click here: The folly of technological solutionism. PublicAffairs.  

Newsflash: the internet doesn’t exist. If you think there is just one thing called “the Internet” with a single logic and set of values – rather than a variety of different networked technologies, each with its own character and challenges – and that the rest of the world must be reshaped around it, then you are an “Internet-centrist”. If you think the messiness and inefficiency of political and cultural life are problems that

54    

should be fixed using technology, then you are a “solutionist”… But Morozov’s attacks go deeper than a righteous ridicule – he also interrogates the intellectual foundations of the cybertheorists, and finds that, often, they have cherry-picked ideas from the scholarly literature that are at best highly controversial in their own fields. His readings in this vein of Clay Shirky, Steven Johnson, David Weinberger and numerous other cyberintellectuals are suavely devastating. http://www.theguardian.com/global/2013/mar/20/save-everything-evgeny-morozov-review  

Mikhaylova, G. (2014). The “Anonymous” movement: hacktivism as an emerging form of political participation (Doctoral dissertation, Texas State University).  

This thesis focuses on the phenomenon of hacktivism, and specifically the hacktivist collective known as Anonymous. Hacktivists can be defined as politically motivated hackers. Hacktivists are different from other types of hackers because their motivations are driven by the pursuit of social change, as opposed to seeking profit or intellectual pursuit. Hacktivism is a new controversial form of civic participation, which will most likely continue to have an impact on the Internet and the world. A lack of detailed sociological research on hacktivists serves as the rationale for this study. This study specifically focused on the experiences of the hacktivist community in the United States, known under the name of Anonymous. This thesis focused on, but is not limited to: a) examining how members of Anonymous define themselves, as well as how security professionals (a.k.a. ethical hackers) define or view hacktivists; b) how hacktivists operate and/or organize; and c) examining hacktivist culture and ethical stances (including whether hacktivism can be considered permissible or ethical). My research employed two primary strategies: content analysis of the Anonymous message boards and in-depth interviews with security professionals. The two approaches were meant to be complimentary: while the content analysis draws a picture of how members of Anonymous see themselves and their goals; the interviews were meant to draw the picture of how others view or understand hacktivists.  

Norris Martin, K. (2014). Review of Rewire: digital cosmopolitans in the age of connection Reissued in 2014 as: Digital cosmopolitans: why we think the Internet connects us, why it doesn’t, and how to rewire it. Consumption Markets & Culture, (ahead-of-print), 1-4.  

Rewire is a thoughtful exploration, based on decades of real-world experience, of what the Internet changes and what it does not. Perhaps Zuckerman avoided a heavy-handed framework in this text because of his own experiences as the director of the MIT Center for Civic Media and founder of Geekcorps, PenPlusBytes and Global Voices Online. Zuckerman explains that although he is more proud of Global Voices than any of the other projects he has built, there was a “real sense” that he and co-founder Rebecca MacKinnon failed in their objectives. He had hoped Global Voices would influence agenda setting but instead, as he puts it, it offers “reporters a way to get quotes from countries experiencing sudden turmoil, rather than using us [Global Voices] to find important unreported stories before they break” (128). In many ways, Global Voices serves as a case study for a multitude of Zuckerman’s points. As Zuckerman suggests, in an effort to use the Internet to encounter a wider

55    

understanding of the world, Global Voices presents a lesson in the power and weakness of personal connections. With this kind of realization, through an honest evaluation of a project with which he felt such a personal connection, Zuckerman establishes a trusted ethos, a nuanced view of Internet connections without the arrogance that we perceive by many technological writers as if they can predict the future.  

Oates, S. (2015). Towards an Online Bill of Rights. In The Onlife Manifesto (pp. 229-243). Springer International Publishing.  

Online citizens need a digital ‘Bill of Rights’ that will protect their interests from being overwhelmed by commercial and state forces. Moving on from an outdated notion of cyber-utopia, citizens need to assert six key rights: the right to privacy, the right to own your own data, the right to a personal life, the right to avoid being forced offline for safety, the ability to switch off when needed as well as public spaces for civic debate online. Although different manifestoes and declarations about digital rights have asserted many of these principles, the internet still lacks effective governance or even norms to protect individuals. As a result, the social potential and positive affordances of the internet may be lost without government intervention to assert fundamental rights for online citizens. The key to unlocking the potential of self-aware, online governance lays in greater effort by state Leviathans such as the European Commission. It is time to stop talking about cyber-utopias and start creating cyber-preserves before the potential benefit of the internet to a democratic society is lost. Keywords: Digital rights Online manifesto Internet privacy Digital freedom Internet state policy Internet governance.  

Olson, P. (2012). We are anonymous: Inside the hacker world of LulzSec, Anonymous, and the global cyber insurgency. Little, Brown.  

[The] first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec.  

Poitras, L. (2014). Citizenfour. Praxis Films. https://citizenfourfilm.com  

In January 2013, Laura Poitras started receiving anonymous encrypted e-mails from “CITIZENFOUR,” who claimed to have evidence of illegal covert surveillance programs run by the NSA in collaboration with other intelligence agencies worldwide. Five months later, she and reporters Glenn Greenwald and Ewen MacAskill flew to Hong Kong for the first of many meetings with the man who turned out to be Edward Snowden. She brought her camera with her. The resulting film is history unfolding before our eyes. Written by Anonymous  

56    

Postigo, H. (2008). Capturing fair use for the YouTube generation: The digital rights movement, the Electronic Frontier Foundation and the user-centered framing of fair use. Information, communication & society, 11(7), 1008-1027.  

This article undertakes an analysis of strategic framing strategies in the Digital Rights Movement by the movement’s central Social Movement Organization (SMO), the Electronic Frontier Foundation (EFF). Through analysis of a series of interviews with key members of the EFF and analysis of the EFF’s ‘Endangered Gizmos’ campaign in response to the MGM vs Grokster case, this article shows how the organization strategically frames consumers as users’ and fair use in user-centered fashion. In so doing the EFF develops a legitimizing rationale for expanding consumer privileges in copyrighted works. The analysis shows that the user-centered notion of fair use articulates with broader historical and emerging trends in media consumption/use and thus finds accepting audiences both within the movement and outside of it.  

Postigo, H. (2012a). The digital rights movement: the role of technology in subverting digital copyright. MIT Press. See review: http://bit.ly/1hWXKap  

The movement against restrictive digital copyright protection arose largely in response to the excesses of the Digital Millennium Copyright Act (DMCA) of 1998. In this book, Hector Postigo shows that what began as an assertion of consumer rights to digital content has become something broader: a movement concerned not just with consumers and gadgets but with cultural ownership. Increasingly stringent laws and technological measures are more than inconveniences; they lock up access to our “cultural commons.” Carlos A. Arrébola finds this book gives a very detailed and objective history of the on-going debate around digital copyright.  

Postigo, H. (2012b). Cultural production and the digital rights movement. Information, Communication and Society, 15(8), 1165-1185.  

The Digital Rights Movement is an effort by activists and advocacy organizations to expand consumer rights in media content use. A central argument for legitimating those rights pivots on a view of culture as a participatory endeavour. This article focuses on the Movement’s use of the discourse of culture and digital technology describing (1) how the Movement positions culture as necessarily participatory; (2) the role of mediating technologies in achieving a culture that is participatory; and (3) the connection of those visions to a discourse of free speech in the form of what is termed here, remix speech. The article suggests that adopting this view of culture and media consumption can result in a politics of participatory culture, where the political economic arrangements of the cultural industries and consumers are realigned.  

Postill, J. 2011, Localizing the Internet: An Anthropological Account, Berghahn. Oxford and New York.  

Internet activism is playing a crucial role in the democratic reform happening across many parts of Southeast Asia. Focusing on Subang Jaya, a suburb of Kuala Lumpur, this study offers an in-depth examination of the workings of the Internet at the local level. In fact, Subang Jaya is regarded as Malaysia’s electronic governance

57    

laboratory. The author explores its field of residential affairs, a digitally mediated social field in which residents, civil servants, politicians, online journalists and other social agents struggle over how the locality is to be governed at the dawn of the ‘Information Era’. Drawing on the field theories of both Pierre Bourdieu and the Manchester School of political anthropology, this study challenges the unquestioned predominance of ‘network’ and ‘community’ as the two key sociation concepts in contemporary Internet studies. The analysis extends field theory in four new directions, namely the complex articulations between personal networking and social fields, the uneven diffusion and circulation of new field technologies and contents, intra- and inter-field political crises, and the emergence of new forms of residential sociality.  

Postill, J. 2012, ‘Digital politics and political engagement‘, in H. Horst and D. Miller (eds) Digital Anthropology. Oxford, Berg.  

The growing use of digital media by political actors of all kinds (including politicians, journalists, activists, and religious leaders) has given rise to a thriving literature, albeit one that is divided along disciplinary and technological lines. It is only very recently that the term ‘digital politics’ has begun to acquire currency. This appears to signal the birth of an interdisciplinary field that studies both the digitisation of traditional politics as well as the rise of new forms of political life originating in the digital world, such as Wikileaks or the Anonymous movement. Whilst there is as yet no digital politics textbook, three useful entry points into the subfield of Internet politics are Chadwick and Howard’s (2008) Routledge Handbook of Internet Politics, Oates, Owen and Gibson’s (2006) The Internet and Politics, and Chadwick’s (2006) Internet Politics. In this chapter I start with four review sections that cover similar ground to the material discussed in these works, although I broaden the inquiry to include mobile media. For example, I title the next section ‘digital government’ rather than ‘e-government’ – the latter a term usually associated with the internet but not with mobile technologies. The subsequent sections exemplify the application of an anthropological approach to the study of digital politics. Drawing from my own fieldwork in Malaysia and Spain, I argue that anthropology brings to this nascent field a rich political lexicon, processual analyses, ground-up comparisons and participatory research. I conclude with a brief discussion of the potential for future anthropological studies in this area.  

Postill, J. (2014) Freedom technologists and the new protest movements: a theory of protest formulas, Convergence 20 (3), pp. 402-418.  

In this article, I draw from anthropological fieldwork in Spain and secondary research on Tunisia and Iceland to explore the connection between Internet freedom activism and post-2008 protest movements. I introduce two new concepts: ‘freedom technologists’ and ‘protest formulas’. I use the term freedom technologists to refer to those social agents who combine technological and political skills to pursue greater Internet and democratic freedoms, which they regard as being inextricably entwined. Far from being techno-utopians or deluded ‘slacktivists’ (Morozov, 2013, Skoric, 2012), I argue that most freedom technologists are in fact techno-pragmatists, that is, people who take a very practical view of the limits and possibilities of new

58    

technologies for political change. I also differentiate among freedom technologists, singling out three main specialists for their strong contribution to the new movements, namely hackers/geeks, tech lawyers and online journalists. The second new coinage I develop is protest formulas. This term refers to the unique compound of societal forces and outcomes that characterizes each protest movement – as well as each phase or initiative within a movement. In this article, I track the influence of freedom technologists on emerging protest movements as they interact with other agents within these political compounds.  

Postill, J. (2014). A Critical History of Internet Activism and Social Protest in Malaysia, 1998-2011. Asiascape: Digital Asia, 1(1-2), 78-103.  

This article asks two related questions. First, to what extent has internet activism shaped social protest in Malaysia from the late 1990s to the present? Second, what can the history of internet activism and social protest in Malaysia tell us, if anything, about the 2011 global wave of protests? To address these questions I distinguish three key moments in Malaysia’s eventful history of internet activism and social protest, namely the 1998-1999 reformasi movement, the electoral ‘tsunami’ of 2008 (in which the ruling coalition lost its two-thirds majority), and the Bersih 2.0 rallies of 2011. I argue that Bersih 2.0 is best explained as both the latest episode in a series of uniquely Malaysian techno-political events and as a local variant of the global wave of protests of 2011 – a wave in which hackers, online journalists, and technology lawyers, as well as ordinary citizens using digital media, played an important part. The article ends with a summary and with suggestions for further research.  

Postman, N. (1992). Technopoly: The surrender of culture to technology. Vintage.  

Postman defines “Technopoly” as a society which believes “the primary, if not the only, goal of human labor and thought is efficiency, that technical calculation is in all respects superior to human judgment … and that the affairs of citizens are best guided and conducted by experts.” [4] Postman argues that the United States is the only country to have developed into a technopoly. He claims that the U.S has been inundated with technophiles who do not see the downside of technology. This is dangerous because technophiles want more technology and thus more information.[5] However, according to Postman, it is impossible for a technological innovation to have only a one-sided effect. With the ever-increasing amount of information available Postman argues that: “Information has become a form of garbage, not only incapable of answering the most fundamental human questions but barely useful in providing coherent direction to the solution of even mundane problems.”[6]  

Powell, A. (2012). Assessing the influence of online activism on Internet policy-making: The case of SOPA/PIPA and ACTA (March 30, 2012).  

This paper analyzes the influence of online activism, especially technical activist actions like web blackouts, on the policy-making process. It compares the actions associated with anti-SOPA campaigns in the United States with campaigns against ACTA in Europe. In order to investigate the various linked aspects of internet activism’s impact on policy change, this paper examines how online activism shifted

59    

the ways that these bills were covered by the popular press and how press coverage modeled new frames. In the United States, salient actions included suspended access to web sites including Wikipedia, symbolic actions such as ‘black outs’ of some website content, and mobilization efforts including invitations to contact elected representatives. For European advocates organizing against ACTA, this meant that some new frames for action were available in the early months of 2012. This analysis contributes to contemporary readings of ‘mediated opportunity structures’ by focusing on two new aspects: the mediatized nature of contemporary activism (especially ‘recursive’ activism that uses disruption of internet communications to draw attention to digital rights) and the significance for policy making of claims that the internet is ‘exceptional.’  

Powers, S. M., & Jablonski, M. (2015). The Real Cyber War: The Political Economy of Internet Freedom. University of Illinois Press.  

“As governments, companies, civil society, and other stakeholders struggle towards a new global information and communication order in the post-Snowden world, this equally provocative and important book cuts through the Western rhetoric of ‘Internet freedom’ and draws a sobering picture of how policy-making in this space is ultimately a fight for control over information, which is largely driven by economic and geopolitical interests rather than democratic ideals and human rights.”–Urs Gasser, Executive Director, Berkman Center for Internet & Society, Harvard University  

“More comprehensive than most work on global internet politics because it incorporates perspectives from a wider range of interests around the world. The treatment of China is strong, as are the examples from emerging nations.”–Vincent Mosco, author of To the Cloud: Big Data in a Turbulent World  

Raymond, E. (1999). The cathedral and the bazaar. Knowledge, Technology & Policy, 12(3), 23-49.  

I anatomize a successful open-source project, fetchmail, that was run as a deliberate test of some theories about software engineering suggested by the history of Linux. I discuss these theories in terms of two fundamentally different development styles, the “cathedral” model, representing most of the commercial world, versus the “bazaar” model of the Linux world. I show that these models derive from opposing assumptions about the nature of the software-debugging task. I then make a sustained argument from the Linux experience for the proposition that “Given enough eyeballs, all bugs are shallow,” suggest productive analogies with other self-correcting systems of selfish agents, and conclude with some exploration of the implications of this insight for the future of software.  

Rheingold, H. (2007). Smart mobs: The next social revolution. Basic books.  

Smart Mobs takes us on a journey around the world for a preview of the next techno-cultural shift. The coming wave, says Rheingold, is the result of super-efficient mobile communications-cellular phones, wireless-paging, and Internet-access

60    

devices-that will allow us to connect with anyone, anytime, anywhere. Rheingold offers a penetrating perspective on the new convergence of pop culture, cutting-edge technology, and social activism. He also reminds us that the real impact of mobile communications will come not from the technology itself but from how people use it, resist it, and adapt to it.  

Ritchie, W. (2012). Why Immi Matters: The First Glass Fortress in the Age of Wikileaks. Suffolk Transnat’l L. Rev., 35, 451.  

The anatomy of a leak has changed fundamentally since the days of manila envelopes changing hands in a dimly lit alley. 1 Today, any person with access to national security secrets can leak them in the name of transparency through a few simple clicks, immediately transmitting information to a computer server abroad and uploading them for the world to examine. 2 As leaking mechanisms have revolutionized, the laws across the globe have remained targeted largely at preventing dimly lit alley transfers of information. 3 The Icelandic Modern Media Initiative (IMMI) is the world’s most dramatic entry into establishing a comprehensive legal framework to address modern leaks. 4 IMMI’s emphasis on shedding sunlight on government secrets will revolutionize the concept of transparency.  

This Note examines the impact of an information safe-haven in a borderless virtual information-age. 6 Part II of this Note presents the elements of IMMI and describes the components of a modern leak, or, “WikiLeak.” 7 Part III of this Note presents the best practices of modern transparency law and discusses the evolution of modern attempts to regulate the WikiLeaks-style leak. 8 Part IV examines the limits on transparency, modern scenarios with complex issues, and the practical implications of IMMI across the globe. 9 Finally, Part V of this Note argues for the adoption of comprehensive transparency regimes to strengthen the impact of IMMI. 10  

Rowan, J. (2011). Free Culture Forum and new models for a sustainable creativity. In OKCon. http://ceur-ws.org/Vol-739/paper_24.pdf  

During the talk I will introduce the work carried out by the FCF and engage in some of the debates that have taken place in this arena. I will focus on the idea of cultural commons and how the creative industries have tended to use this pool of common knowledge as a resource that doesnt need to be cared o_ or looked after. I will look into business and social forms of organization aimed at producing culture acknowledging social production and the creative basins that lie at the centre of cultural development. After all it is our responsibility, as civil society, to oppose practices that plunder this common heritage and to block its future development. We need to defend and expand the sphere in which human creativity and knowledge can prosper freely and sustainably.  

At the first FcForum in 2009, we analysed a series of reforms that would have to be applied to existing legislation in order to ensure that the digital age is beneficial to artists, citizens and entrepreneurs. Our conclusions and proposals are published in the Charter for Innovation, Creativity and Access to Knowledge. For the 2010 edition, we shifted the focus to the economic aspects of culture and knowledge production,

61    

exploring the way in which benefits in the sense of economic pro_t, but also social and cognitive bene_ts can be generated in such a way that they lead to a sustainable culture.  

Sell, S. K. (2013). Revenge of the “Nerds”: Collective action against intellectual property maximalism in the global information age. International Studies Review, 15(1), 67-85.  

For the first time in thirty years of ever stronger intellectual property policies, a transnational coalition of Internet users was able to kill two US anti-piracy bills that were backed by some of the most politically connected and economically powerful interests in US politics. Combining insights from the literatures on social movements, networks, and Internet activism, I analyze the structure for social mobilization, the form of the coalition, the role of framing, and the use of technology contributing to its success. The literature on social movements and contentious politics addresses situations of threats or grievances that lead actors to mobilize for collective action. In this case, Goliath’s latest gambit to ratchet up intellectual property standards threatened David’s use of the Internet. This time David beat Goliath.  

Shirky, C. (2008). Here comes everybody: The power of organizing without organizations. Penguin.  

In the book, Shirky recounts how social tools such as blogging software like WordPress and Twitter, file sharing platforms like Flickr, and online collaboration platforms like Wikipedia support group conversation and group action in a way that previously could only be achieved through institutions. In the same way the printing press increased individual expression, and the telephone increased communications between individuals, Shirky argues that with the advent of online social tools, groups can form without the previous restrictions of time and cost. https://en.wikipedia.org/wiki/Here_Comes_Everybody  

Sifry, M. L. (2011). WikiLeaks and the Age of Transparency. OR Books.  

Welcome to the Age of Transparency. But political analyst and writer Micah Sifry argues that WikiLeaks is not the whole story: it is a symptom, an indicator of an ongoing generational and philosophical struggle between older, closed systems, and the new open culture of the Internet. “What is new,” he writes, “is our ability to connect, individually and together, with greater ease than at any time in human history. As a result, information is flowing more freely into the public arena, powered by seemingly unstoppable networks of people all over the world cooperating to share vital data and prevent its suppression.” Despite Assange’s arrest, the publication of secret documents continues, and websites replicating WikiLeaks’ activities have sprung up in Indonesia, Russia, the European Union, and elsewhere. As Sifry shows, this is part of a larger movement for greater governmental and corporate transparency: “when you combine connectivity with transparency—the ability for more people to see, share and shape what is going on around them—the result is a huge increase in social energy, which is being channeled in all kinds of directions.”  

62    

Smith, R. C. (2010). Reflections on the Icelandic Modern Media Initiative: A Template for Modern Media Law Reform?. Journal of Media Law, 2(2), 199-211.  

This note explains the origins of the Icelandic Modern Media Initiative (‘IMMI’) and the various legal initiatives Iceland will be undertaking to give it effect. It distinguishes the IMMI from earlier programmes of media law reform, such as that carried out in Luxembourg in 2004, focusing on the IMMI’s broad reach to encompass new and user-generated as well as more mainstream media. The note concludes by considering some of the challenges that countries face when seeking to establish a ‘safe haven’ for the media in today’s networked world and what influence the IMMI is likely to have on projects of law reform in other countries. Research areas: Icelandic media reform, WikiLeaks, source protection, libel tourism.  

Solo, A. M., & Bishop, J. (2011, July). The new field of network politics. In Proceedings of the 2011 World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP’11).  

This research paper defines a new field called network politics. Network politics refers to politics and networks. These networks include the Internet, private networks, cellular networks, telephone networks, radio networks, television networks, etc. Network politics includes the applications of networks to enable one or more individuals or organizations to engage in political communication. Furthermore, network politics includes political regulation of networks. Finally, network politics includes the accompanying issues that arise when networks are used for political communication or when there is political regulation of networks. The domain of network politics includes, but is not limited to, e-politics (social networking for driving revolutions and organizing protests, online petitions, political blogs and vlogs, whistleblower Web sites, online campaigning, e-participation, virtual town halls, e-voting, Internet freedom, access to information, net neutrality, etc.) and applications of other networks in politics (robocalling, text messaging, TV broadcasting, etc.). The definition of this field should significantly increase the pace of research and development in this important field. Keywords: politics, networks, e-politics, e-voting, Internet, Web  

Sterner, E. (2011). WikiLeaks and cyberspace cultures in conflict. Marshall Policy Outlook.  

Every few months, Wikileaks and its founder, Julian Assange, make headlines for publicizing yet more titillating information passing through the U.S. government’s classified systems. Each round of publication does real damage to U.S. national interests, compromising relations with other countries and revealing to current and potential adversaries the internal thought processes of the U.S. government. Policymakers tend to approach these problems episodically — they view Wikileaks as a specific challenge. It may be that, but it also symbolizes a burgeoning conflict between two differing views of cyberspace and how it relates to society. One perspective generally holds that cyberspace must be managed in such a way that conforms it to society’s existing institutions, particularly in matters related to national security. Another philosophy holds that cyberspace is fundamentally reordering

63    

society and that, in doing so, it will unleash new possibilities in the story of human liberty. That conflict will run for decades, with consequences not just for U.S. national security, but for the very future of cyberspace.  

Tufekci, Z. (2014). The medium and the movement: digital tools, social movement politics, and the end of the free rider problem. Policy & Internet, 6(2), 202-208.  

…Thus, technology and long-term cultural trends are converging toward non-institutional politics, and this convergence has a powerful effect on movement trajectories. Similar to Zuckerman, I have found the same reluctance to engage with institutional politics in my own research from Tahrir Square (Tufekci & Wilson, 2012) to Gezi Park (Tufekci, 2013). Similarly, many “Occupy Wall Street” participants were reluctant even to form “spokescouncils” which would represent a minimal level of formalization and institutionalization as compared with the “General Assembly” that meets daily and in which there is no boundary for membership (or lack thereof) besides showing up that day. [But see Quinn Norton’s damning report about Occupy media, cf. Constanza-Chock’s]  

Vaidhyanathan, S. 2004. “The state of copyright activism,” First Monday, volume 9, number 4, at http://firstmonday.org//article/view/1133/1053  

One of the great hopes I had while I researched and wrote Copyrights and copywrongs (New York: New York University Press, 2001), a cultural history of American copyright, during the late 1990s was that copyright debates might puncture the bubble of public consciousness and become important global policy questions. My wish has come true. Since 1998 questions about whether the United States has constructed an equitable or effective copyright system frequently appear on the pages of daily newspapers. Activist movements for both stronger and looser copyright systems have grown in volume and furor. And the U.S. Supreme Court ruled in early 2003 that the foundations of American copyright, as expressed in the Constitution, are barely relevant in an age in which both media companies and clever consumers enjoy unprecedented power over the use of works.  

von Solms, S., & van Heerden, R. (2015, February). The Consequences of Edward Snowden NSA Related Information Disclosures. In Iccws 2015-The Proceedings of the 10th International Conference on Cyber Warfare and Security (p. 358). Academic Conferences Limited.  

In June 2013, the Guardian newspaper started to disclose thousands of classified documents, which uncovered the existence of several mass surveillance programmes run by the National Security Agency (NSA) in the USA in cooperation with several European countries. These disclosures exposed a massive NSA clandestine electronic surveillance data program called PRISM as well as evidence of secret treaties amongst countries sharing surveillance data. The Guardian source was a NSA contractor, Edward Snowden, who was based in Hawaii. Edward Snowden is currently avoiding arrest after he initially fled to Hong Kong and then Russia. The leaks directly influenced US international relations in a negative manner, such as

64    

Brazil cancelling a state visit and Ecuador renouncing US trade benefits. The leaks had a financial impact on some of the massive US based IT companies; especially those who specialise in cloud based computing. Persons, companies and nations were affected by the leaks. Some secure email providers had to close down due to NSA and other government pressures to reveal their secret keys. The current estimation is that the US will lose between $25 billion to $35 billion in cloud computing based revenue due to Snowden’s leaks. The trust in US based security professionals was also degraded after it was revealed that the NSA has pushed for flawed security standards. This will impact the status and US based security professionals in the future. In this paper we present a timeline of the Snowden related leaks, and discuss the reactions to these disclosures. We also explore the direct and indirect impact of these leaks. The consequences of these disclosures include strained foreign relationships, and the knowledge that mass surveillance programmes exists.  

Walsh, C., Apperley, T., Abbott, C., Albright, J., Alverman, D., Beavis, C., … & Wood, D. (2013). Towards hacker literacies: What Facebook’s privacy snafus can teach us about empowered technological practices.  

This article highlights an emerging set of literate media practices that are simultaneously critical and participatory in nature. These practices, themselves natural responses to a shifting new media landscape, have echoes of existing media literacy paradigms, though are not fully encapsulated by them. Through an analysis of public reactions to Facebook privacy policy and feature changes that took place in the Spring of 2010, the article shows how what the author calls hacker literacies are currently being practised in situ. Hacker literacies, which draw their name from the practice of computer programmers that take existing code and reconfigure it according to their own values and for their own purposes, are unique in that they are not only empowered by participatory technologies, but empowered in relation to these technologies as well. Reactions to changes in Facebook during this time period illustrate the ways that the users of new media did not take for granted the design of these new modes of participation nor the intentions and interests of their creators. Their understanding of the malleability of this sociotechnical space and consequent actions resulted in its reformulation, a type of process the author argues will be crucial if there is to be a more fluid and equal distribution of media power in the digital age. Keywords: critical literacy, empowerment, Facebook, Hacker literacies, media literacy, new literacies, participatory culture, privacy, sociotechnical spaces.  

Ziccardi, G. (2012). Resistance, liberation technology and human rights in the digital age (Vol. 7). Springer Science & Business Media.  

This book explains strategies, techniques, legal issues and the relationships between digital resistance activities, information warfare actions, liberation technology and human rights. It studies the concept of authority in the digital era and focuses in particular on the actions of so-called digital dissidents. Moving from the difference between hacking and computer crimes, the book explains concepts of hacktivism, the information war between states, a new form of politics (such as open data movements, radical transparency, crowd sourcing and “Twitter Revolutions”), and the hacking of

65    

political systems and of state technologies. The book focuses on the protection of human rights in countries with oppressive regimes.  

Ziccardi, G. (2013). Opening Remarks: Hacking and Digital Dissidence. In Resistance, Liberation Technology and Human Rights in the Digital Age (pp. 1-25). Springer Netherlands.  

This first, introductory Chapter, aims to draw a technological and cultural link between the activities of the early hackers and the actions of digital dissidents in modern times that are taking place in different parts of the world. An initial analysis is devoted to the origins of the hacker tradition; is then described, in a general sense, the current landscape of digital resistance and liberation technologies. The themes that are covered are the importance of technology in episodes of the current political rebellion, the controversy over the role of Facebook and Twitter during recent political events (the so-called Twitter Revolutions), the problem of the digital divide and of different technological conditions in the world and, finally, the use of computer technologies for the well-being of society and for the creation of a new public sphere.  

Zuckerman, E. (2013). Rewire: Digital cosmopolitans in the age of connection. WW Norton, Incorporated.  

The Internet has given us an unprecedented ability to share knowledge and information, and yet, Zuckerman argues, we aren’t really taking advantage of that global connectivity. The Internet lets us see the whole world, but we generally look at only one small part of it, using the technology to tailor the news we receive to our interests, thus narrowing our focus. And, perhaps most important, the bigger the Internet becomes, and the more information there is available, the harder it is to find anything (and the easier it is to misinterpret or misunderstand what we do find). The challenge, Zuckerman says, isn’t access; it’s paying attention. We need to expand our focus, sample other cultures, and seek out the new and unfamiliar. It’s hard to counter the author’s well-reasoned arguments, even if his central point (hey, buddy, you’re not using the Internet right) might sting a little. –David Pitt  

Zuckerman, E. (2014). New media, new civics?. Policy & Internet, 6(2), 151-168.  

Dissatisfaction with existing governments, a broad shift to “post-representative democracy” and the rise of participatory media are leading toward the visibility of different forms of civic participation. “Participatory civics” uses tools of participatory media and relies on theories of change beyond influencing representative governments to seek change. This article offers a framework to describe participatory civics in terms of theories of change used and demands places on the participant, and examines some of the implications of the rise of participatory civics, including the challenges of deliberation in a diverse and competitive digital public sphere.  

Zuckerman, E. (2015) As a Drone Captures Global Voices at 10, a Few Thoughts from Cebu, Global Voices, https://summit2015.globalvoices.org/2015/01/as-a-drone-captures-global-voices-at-10-a-few-thoughts-from-cebu/  

66    

Posted January 31, 2015 0:11 GMT. I spent last week in Cebu, the second largest city in The Philippines, with three hundred journalists, activists and media scholars from more than sixty countries. The occasion was the Global Voices Citizen Media Summit, a biennial conference on the state of citizen media, blogging, journalism and activism. This summit coincided with the tenth anniversary of Global Voices, the citizen media website and community Rebecca MacKinnon and I helped to found in late 2004.  

We’ve held the conference six times, and it’s always been an excuse to gather core members of the Global Voices community for planning, training and building solidarity. More than 800 staff and volunteers run Global Voices, and since we have no home office, headquarters or physical presence, the conference provides a physicality and presence that’s sorely lacking in most of our interactions. Since the Summit began as an excuse for holding our internal meeting, it’s always a wonderful party and family reunion, but it’s not always been the most thoughtfully programmed event. (I’m allowed to say that because I helped program some of those conferences.)  

This year’s incarnation (which I had absolutely nothing to do with planning!) reset expectations about what the Citizen Media Summit could be. It was two packed days of panels, workshops and discussions, tackling some of the most interesting a challenging problems facing online writing and activism: threats to the open internet, social media and protests movements, trolling and online abuse, intermediary censorship.  

…I’m starting to wonder whether we’re going to be able to keep operating this way in the future. Increasingly, citizen media is private, or semi-public, which raises really interesting questions about how we use it in our journalism. For example, in China, many political discussions shifted from Weibo (which is primarily public) when the company began verifying the identities of users. Many of those discussions moved to WeChat, where groups with hundreds or thousands of members feel like listservs or bulletin boards.  

In the wake of the Occupy movement, Indignados, Gezi and other recent popular protests, it’s reasonable to ask whether protest movements are more powerful for expressing dissent than they are in making fundamental changes to systems of power. Listening to panelists speak about protests in Mexico, Syria, Ukraine and Hong Kong, I thought of Zeynep Tufekçi’s idea that digital tools have made it easier to bring people out into the streets, but may have made the groups assembled with those tools weaker and more brittle. (Because it’s so easy to bring 50,000 people to a protest, Tufekçi argues, organizers have to do a lot less work ahead of time and end up having less influence and social capital with those protesters than they did in earlier years. When the protest ends and it’s time to try and influence governance, those movements have a hard time moving into power.)  

About the author of this bibliography  

Dr John Postill is Vice-Chancellor’s Senior Research Fellow at RMIT University, Melbourne, and Digital Anthropology Fellow at University College London (UCL).

67    

His publications include Localizing the Internet (2011), Media and Nation Building (2006) and the co-edited volume Theorising Media and Practice (2010, with Birgit Bräuchler). Currently he is conducting anthropological research on new forms of digital activism and civic engagement in Indonesia, Spain and globally. He is also writing a book on the connection between techno-politics and new citizen movements around the world, as well as the co-edited volume Theorising Media and Change (with Elisenda Ardèvol and Sirpa Tenhunen). His Twitter handle is, sensibly enough, @JohnPostill  

Back to the freedom technologists series