Freedom Technologists: Digital Activism and Political Change in the 21st Century
(working title)
Chapter 2, Freedom Technologists
John Postill
RMIT University, Melbourne
September 2015
Annotated bibliography
In this working bibliography I bring together a large set of (mostly academic)
references on a specific category of political actor that I am calling ‘freedom
technologists’, namely those tech-minded individuals, groups and organisations who
have a keen interest in the democratic and emancipatory potential of information and
communication technologies (ICTs). In other words, freedom technologists combine
technological and political notions and skills to pursue greater Internet and democratic
freedoms, which they regard as being inextricably entwined (Postill 2014). Far from
being techno-utopians or deluded ‘slacktivists’ (Morozov, 2013, Skoric, 2012), in my
experience most freedom technologists are in fact techno-pragmatists, that is, people
who take a very practical view of the limits and possibilities of new technologies for
political change. This working bibliography is part of current research towards my
forthcoming book Freedom Technologists: Digital Activism and Political Change in
the 21st Century (working title). Further suggestions are always welcome via email or
via the comments section.
This is the twenty-third post in the freedom technologists series.
Keywords: technology, politics, techno-politics, hackers, hacktivism, digital
activism, internet activism, digital liberation movement, political change, social
protest, techno-libertarians
Aday, S., Farrell, H., Lynch, M., Sides, J., Kelly, J., & Zuckerman, E. (2010).
Blogs and bullets: New media in contentious politics.
In this report from the United States Institute of Peace’s Centers of Innovation for
Science, Technology, and Peacebuilding, and Media, Conflict, and Peacebuilding, a
team of scholars from The George Washington University, in cooperation with
scholars from Harvard University and Morningside Analytics, critically assesses both
the “cyberutopian” and “cyberskeptic” perspectives on the impact of new media on
political movements.
Akser, M. (2015). The Revolution Will Be Hacktivated. Digital Transformations
in Turkey: Current Perspectives in Communication Studies, 275.
The democratic rights claimed to be enshrined but curtailed under the AKP
government’s repressive regime was counterbalanced by Redhack, a Turkish
hacktivist group online. Through their diverse tactics such as resistance, revelation
1
and countering Redhack’s activity led to a digital transformation in Turkish politics.
Redhack’s opposition is towards AKP’s neo-liberal patronage policies. The resistance
took many forms: (1) defacing government websites that misuse public resources. (2)
revelation to counter censorship against traditional media by the AKP government.
By revealing documents related to AKP government’s corruption, Redhack led the
way for traditional media to bring the issue to public scrutiny. The third tactic of
taking direct action in the form of counter-attack came as a result of the Gezi Park
Occupy Istanbul movement. Redhack actively used television to voice their agenda
and called people to action. A networked discourse analysis that looks at mediation of
playful tactics by hacktivists is a new transformative phase in how cyber security
shifts from terrorism into information resistance, revelation and countering.
Alcazan et al (2012) Tecnopolítica. Internet y R-Evoluciones. Icaria.
#Error 404. Democracy Not Found. El 15 de mayo de 2011 salimos a la calle después
de meses de trabajo en la red. El 15-M es inimaginable sin internet y el uso político
que las multitudes conectadas han hecho de él. El 15-M es impensable sin la red de
redes, somos una red distribuida de cambio social. Con este libro queremos hacer una
contribución a una lectura del 15-M abierta y en construcción, que valore su
dimensión tecnopolítica. Entender la relación del 15-M con internet, con sus
precedentes, con sus dispositivos de comunicación y organización, es esencial para
comprender las posibilidades abiertas para la acción colectiva en la sociedad red. La
r-evolución está en marcha y se multiplica de manera global. Se extiende la
indignación, el deseo de cambio y emerge el potencial de transformación de las redes
abiertas y distribuidas.
Al Hussaini, A. (2011). Tunisia: Anonymous vs. Ammar–who wins the battle of
censorship?. Global Voices, 3 January 2011,
https://globalvoicesonline.org/2011/01/03/tunisia-anonymous-vs-ammar-whowins-the-battle-of-censorship/
The Tunisian censor, commonly known as Ammar, continues to wreak havoc on
activists’ accounts, in a country that has been witnessing a wave of protests since the
middle of December. Just today, activists claimed that the government has hacked
into their email accounts, accessing their blogs and social networking sites, and
disabling them. The move seems to have come in retaliation to an attack by
Anonymous, which has targeted vital Tunisian government sites and gateways.
Andrejevic, M. (2014). WikiLeaks, Surveillance, and Transparency.
International Journal of Communication, 8, 2619-2630.
The place for WikiLeaks was, in a sense, carved out in advance by the dramatic
failure of conventional channels for challenging power or holding it accountable. It is
a fact that deserves more attention than it gets that, in the United States, the two
political newspapers of record (The New York Times and The Washington Post) issued
extended public apologies for failures in their coverage during the lead-up to the
invasion of Iraq. In no uncertain terms, these influential newspapers conceded that
they did not provide adequate information to the populace about one of the most
2
important decisions facing the nation—a decision that would claim the lives of tens of
thousands of people and redefine international relations on a global scale. The Times
noted that, on reviewing its coverage of the lead-up to the war, “we have found a
number of instances of coverage that was not as rigorous as it should have been” (The
Editors, 2001, para. 3)—a failure that it identified as structural.
Appelgren, E., & Nygren, G. (2014). Data Journalism in Sweden: Introducing
new methods and genres of journalism into “old” organizations. Digital
Journalism, 2(3), 394-405.
Data journalism is an evolving form of investigative journalism. In previous research
and handbooks published on this topic, this form of journalism has been called
computer-assisted reporting and data-driven journalism, as well as precision,
computational or database journalism. In Sweden, data journalism is still fairly
uncommon. The purpose of this paper is to provide an overview of the development
of data journalism at seven Swedish traditional media companies, using action
research methods. The content of this paper is based on an online survey of journalists
and in-depth interviews with editors at these participating companies. The results
indicate that, based on how this field is currently perceived by journalists in the
interviews, there is a common definition of data journalism. Furthermore, the survey
shows that the attitudes towards data journalism during the process of introducing
new methods and genres of journalism into “old” organizations are correlated with the
level of perceived experience in data journalism working methods. The main
challenges facing the working methods of data journalism today are a shortage of time
and the need for training and developing data journalism skills.
Armitage, J. (ed.) (1999) ‘Special Issue on Machinic Modulations: New Cultural
Theory and Technopolitics’, Angelaki: Journal of the Theoretical Humanities
4(2) (September).
Assange, J., Appelbaum, J., Muller-Maguhn, A., & Zimmermann, J. (2012).
Cypherpunks: Freedom and the Future of the Internet. Singapore Books.
“Cypherpunks: Freedom and the Future of the Internet is an important wake-up call
about a possible dystopian future, which is a technological reality now… While
messengers of dangerous outcomes are always met at first with hostility and even
mockery, history shows that we disregard such warnings as these at our peril.” —
Naomi Wolf
Baack, S. (2015). Datafication and empowerment: How the open data movement
re-articulates notions of democracy, participation, and journalism. Big Data &
Society, 2(2), 2053951715594634.
This article shows how activists in the open data movement re-articulate notions of
democracy, participation, and journalism by applying practices and values from open
source culture to the creation and use of data. Focusing on the Open Knowledge
Foundation Germany and drawing from a combination of interviews and content
analysis, it argues that this process leads activists to develop new rationalities around
3
datafication that can support the agency of datafied publics. Three modulations of
open source are identified: First, by regarding data as a prerequisite for generating
knowledge, activists transform the sharing of source code to include the sharing of
raw data. Sharing raw data should break the interpretative monopoly of governments
and would allow people to make their own interpretation of data about public issues.
Second, activists connect this idea to an open and flexible form of representative
democracy by applying the open source model of participation to political
participation. Third, activists acknowledge that intermediaries are necessary to make
raw data accessible to the public. This leads them to an interest in transforming
journalism to become an intermediary in this sense. At the same time, they try to act
as intermediaries themselves and develop civic technologies to put their ideas into
practice. The article concludes with suggesting that the practices and ideas of open
data activists are relevant because they illustrate the connection between datafication
and open source culture and help to understand how datafication might support the
agency of publics and actors outside big government and big business.
Bailey Jr, C. W. (2013). Strong copyright+ DRM+ weak net neutrality= digital
dystopia?. Information Technology and Libraries, 25(3), 116-127.
Three critical issues—a dramatic expansion of the scope, duration, and punitive
nature of copyright laws; the ability of Digital Rights Management (DRM) systems
to lock-down digital content in an unprecedented fashion; and the erosion of Net
neutrality, which ensures that all Internet traffic is treated equally—are examined in
detail and their potential impact on libraries is assessed. How legislatures, the courts,
and the commercial marketplace treat these issues will strongly influence the future
of digital information for good or ill.
Barron, B. (2007). The Importance of Network Neutrality to the Internet’s Role
in the Public Sphere. Canadian Journal of Media Studies, 3(1), 90-105.
Network Neutrality, the principle by which Internet Service Providers transmit data
equally without consideration to its source, type, content or destination, is important
to the creation and preservation of effective democratic communication on the
Internet. While there are many faults which can be found with discussion and debate
on the Internet, the Internet still represents an improvement over traditional media and
media distribution networks and should be carefully protected.
Bastos, M. T., & Mercea, D. (2015). Serial activists: Political Twitter beyond
influentials and the twittertariat. New Media & Society, 1461444815584764.
This article introduces a group of politically charged Twitter users that deviates from
elite and ordinary users. After mining 20 M tweets related to nearly 200 instances of
political protest from 2009 to 2013, we identified a network of individuals tweeting
across geographically distant protest hashtags and revisited the term “serial activists.”
We contacted 191 individuals and conducted 21 in-depth, semi-structured interviews
thematically coded to provide a typology of serial activists and their struggles with
institutionalized power. We found that these users have an ordinary following, but
bridge disparate language communities and facilitate collective action by virtue of
4
their dedication to multiple causes. Serial activists differ from influentials or
traditional grassroots activists and their activity challenges Twitter scholarship
foregrounding the two-step flow model of communication. The results add a much
needed depth to the prevalent data-driven treatment of political Twitter by describing
a class of extraordinarily prolific users beyond influentials and the twittertariat.
Beckett, C. and J. Ball (2012). Wikileaks: News in the networked era. Polity.
WikiLeaks is the most challenging journalistic phenomenon to have emerged in the
digital era. It has provoked anger and enthusiasm in equal measure, from across the
political and journalistic spectrum. WikiLeaks poses a series of questions to the status
quo in politics, journalism and to the ways we understand political communication. It
has compromised the foreign policy operations of the most powerful state in the
world, broken stories comparable to great historic scoops like the Pentagon Papers,
and caused the mighty international news organizations to collaborate with this tiny
editorial outfit. Yet it may also be on the verge of extinction. This is the first book to
examine WikiLeaks fully and critically and its place in the contemporary news
environment. The authors combine inside knowledge with the latest media research
and analysis to argue that the significance of Wikileaks is that it is part of the shift in
the nature of news to a network system that is contestable and unstable. Welcome to
Wiki World and a new age of uncertainty. Charlie Beckett July 10, 2012 at 3:34 pm:
For a shorter but more approving review of this book try this:
http://eandt.theiet.org/magazine/2012/02/book-reviews.cfm
“a cool-headed, astute analysis of the social, political and technological context in
which the now infamous website was formed. From the wider issues of government
and corporate transparency to the potential impact of the leaks on the future
possibility of an open Internet, the two co-authors pack a great deal into the book’s
164 pages. Throughout it remains eminently readable, thought-provoking and
insightful.”
Benkler, Y. (2006). The wealth of networks: How social production transforms
markets and freedom. Yale University Press.
With the radical changes in information production that the Internet has introduced,
we stand at an important moment of transition, says Yochai Benkler in this thoughtprovoking book. The phenomenon he describes as social production is reshaping
markets, while at the same time offering new opportunities to enhance individual
freedom, cultural diversity, political discourse, and justice. But these results are by no
means inevitable: a systematic campaign to protect the entrenched industrial
information economy of the last century threatens the promise of today’s emerging
networked information environment. In this comprehensive social theory of the
Internet and the networked information economy, Benkler describes how patterns of
information, knowledge, and cultural production are changing—and shows that the
way information and knowledge are made available can either limit or enlarge the
ways people can create and express themselves. He describes the range of legal and
policy choices that confront us and maintains that there is much to be gained—or
lost—by the decisions we make today.
5
Benkler, Y. (2011). Free Irresponsible Press: Wikileaks and the Battle over the
Soul of the Networked Fourth Estate, A. Harv. CR-CLL Rev., 46, 311.
A study of the events surrounding the Wikileaks document releases in 2010 provides
a rich set of insights about the weaknesses and sources of resilience of the emerging
networked fourth estate. It marks the emergence of a new model of watchdog
function, one that is neither purely networked nor purely traditional, but is rather a
mutualistic interaction between the two. It identifies the peculiar risks to, and sources
of resilience of, the networked fourth estate in a multidimensional system of
expression and restraint, and suggests the need to resolve a major potential
vulnerability—the ability of private infrastructure companies to restrict speech
without being bound by the constraints of legality, and the possibility that government
actors will take advantage of this affordance in an extralegal public-private
partnership for censorship. Finally, it offers a richly detailed event study of the
complexity of the emerging networked fourth estate, and the interaction, both
constructive and destructive, between the surviving elements of the traditional model
and the emerging elements of the new. It teaches us that the traditional, managerialprofessional sources of responsibility in a free press function imperfectly under
present market conditions, while the distributed models of mutual criticism and
universal skeptical reading, so typical of the Net, are far from powerless to deliver
effective criticism and self-correction where necessary. The future likely is, as the
Guardian put it, “a new model of co-operation” between surviving elements of the
traditional, mass-mediated fourth estate, and its emerging networked models.418 The
transition to this new model will likely be anything but smooth.
Bennett, W. L., & Segerberg, A. (2012). The logic of connective action: Digital
media and the personalization of contentious politics. Information,
Communication & Society, 15(5), 739-768.
From the Arab Spring and los indignados in Spain, to Occupy Wall Street (and
beyond), large-scale, sustained protests are using digital media in ways that go
beyond sending and receiving messages. Some of these action formations contain
relatively small roles for formal brick and mortar organizations. Others involve wellestablished advocacy organizations, in hybrid relations with other organizations, using
technologies that enable personalized public engagement. Both stand in contrast to the
more familiar organizationally managed and brokered action conventionally
associated with social movement and issue advocacy. This article examines the
organizational dynamics that emerge when communication becomes a prominent part
of organizational structure. It argues that understanding such variations in large-scale
action networks requires distinguishing between at least two logics that may be in
play: The familiar logic of collective action associated with high levels of
organizational resources and the formation of collective identities, and the less
familiar logic of connective action based on personalized content sharing across
media networks. In the former, introducing digital media do not change the core
dynamics of the action. In the case of the latter, they do. Building on these
distinctions, the article presents three ideal types of large-scale action networks that
are becoming prominent in the contentious politics of the contemporary era.
6
Beyer, J. L. (2014a). Expect us: online communities and political mobilization.
Oxford University Press.
Expect Us focuses on four online communities—Anonymous (4chan.org), The Pirate
Bay, World of Warcraft, and the IGN.com posting boards. In all of these online
communities, members engaged deeply with political issues in a range of ways.
However, only two of the communities mobilized politically. If political behavior
occurred on all four communities, why did only two of these sites foster political
mobilization among their participants, while the other two did not? Using
ethnographic methods, Expect Us argues that key structural features about the
birthplaces of the four communities shaped the type of political behavior that emerged
from each. The book argues that the likelihood of political mobilization rises when a
site provides high levels of anonymity, low levels of formal regulation, and minimal
access to small-group interaction. Once these factors are present, the nature of the
communities themselves—their values and emergent norms of behavior—then
appears to influence whether there is a conflict between the dominant community
norms and offline legal and behavioral norms. Although this normative conflict is by
no means a perfect “recipe” for predicting political mobilization, it certainly appeared
to set the stage for cohesive political action by an online community. Keywords:
online community, anonymity, regulation, digital rights, information politics,
WikiLeaks, Anonymous, The Pirate Bay, World of Warcraft, IGN.com
Beyer, J. L. (2014b). The emergence of a freedom of information movement:
Anonymous, WikiLeaks, the Pirate party, and Iceland. Journal of Computer‐
Mediated Communication, 19(2), 141-154.
Online rhetoric about the Internet’s potential to change society, the need to reform
intellectual property laws, and the evils of censorship is becoming increasingly
similar across sites. The push for “freedom of information” is not restricted to online
spaces, but it appears to be born from such spaces, with the concept itself shaped by
the presence of the Internet and its effect on networked societies. Focusing on
WikiLeaks, the Pirate Party, Anonymous, and Iceland, I describe the emerging
coalescence of “freedom of information” advocates pushing for a simultaneous
liberalization and homogenization of freedom of information regulations across
democracies.
Beyer, J. L., & McKelvey, F. (2015). Piracy & Social Change: You Are Not
Welcome Among Us: Pirates and the State. International Journal of
Communication, 9, 19.
In a historical review focused on digital piracy, we explore the relationship between
hacker politics and the state. We distinguish between two core aspects of piracy—the
challenge to property rights and the challenge to state power—and argue that digital
piracy should be considered more broadly as a challenge to the authority of the state.
We trace generations of peer-to-peer networking, showing that digital piracy is a key
component in the development of a political platform that advocates for a set of ideals
grounded in collaborative culture, nonhierarchical organization, and a reliance on the
network. We assert that this politics expresses itself in a philosophy that was formed
7
together with the development of the state-evading forms of communication that
perpetuate unmanageable networks. Keywords: pirates, information politics,
intellectual property, state networks.
Boler, M., Macdonald, A., Nitsou, C., & Harris, A. (2014) Connective labor and
social media: Women’s roles in the ‘leaderless’ Occupy movement. Convergence:
The International Journal of Research into New Media Technologies, 20(4), pp.
438-460.
This article draws upon the insights of 75 Occupy activists from Toronto and across
the United States interviewed as part of the 3-year study ‘Social Media in the Hands
of Young Citizens’. This article highlights three major roles adopted by women in the
so-called leaderless, horizontally structured Occupy movement – both within the
offline, face-to-face General Assembly meetings held during the Occupy
encampments and within the online spaces of Facebook pages, Web sites, affinity
groups, and working committees. As key participants in the movement, women used
social technologies such as Facebook, Twitter, and livestreaming as modes of activist
engagement, developing unique roles such as that of the ‘Admin’ (Social Media
Administrator), the ‘Documentarian’, and the ‘Connector’. The women’s adoption of
these roles illustrates, we argue, the emerging notion of ‘connective labor’ an
extended enactment of Bennett and Segerberg’s (2012) notion of ‘the logic of
connective action’, augmenting its logic to reveal the often hidden labor of women in
sustaining the networked and affective dimension of social movements. This article
highlights the gendered, hybrid, embodied, and material nature of women’s
connective labor that has supported, and in many ways sustained, the contemporary
Occupy movement.
Breindl, Y., & Briatte, F. (2013). Digital protest skills and online activism against
copyright reform in France and the European Union. Policy & Internet, 5(1), 2755.
In the past decade, parliaments in industrialized countries have been pressured to
adopt more restrictive legislation to prevent unauthorized file-sharing and enforce
higher standards of digital copyright enforcement over entertainment media and
computer software. A complex process of supranational and national lawmaking has
resulted in several legislatures adopting such measures, with wide variations in
content and implementation. These policy developments offer an interesting research
puzzle, given their high political salience and the amount of controversy they have
generated. Specifically, the introduction of harsher intellectual property regulations
has resulted in intense “online” and “offline” collective action by skilled activists who
have significantly altered the digital copyright policy field over the years. In France,
grassroots movements have turned the passing of digital copyright infringement laws
through Parliament into highly controversial episodes. Similarly, at the European
level, the Telecoms Package Reform has given rise to an intense protest effort, carried
by an ad hoc coalition of European activists. In both cases, online mobilization was an
essential element of political contention against these legislative initiatives. In both
cases, our analysis shows that online mobilization and contention can substantially
affect policymaking by disrupting the course of parliamentary lawmaking at both the
8
national and European levels. We provide an analytical framework to study these
processes, as well as an analysis of the frames and digital network repertoires
involved in the two cases under scrutiny, with reference to the nascent research
agenda formed by the politics of intellectual property. Keywords: digital copyright;
intellectual property; online mobilization; collective action.
Brevini, B., Hintz, A., & McCurdy, P. (Eds.). (2013). Beyond WikiLeaks:
implications for the future of communications, journalism and society. Palgrave
Macmillan.
Revelations published by the whistleblower platform WikiLeaks, including the
releases of U.S. diplomatic cables in what became referred to as ‘Cablegate’, put
WikiLeaks into the international spotlight and sparked intense about the role and
impact of leaks in a digital era. Beyond WikiLeaks opens a space to reflect on the
broader implications across political and media fields, and on the transformations that
result from new forms of leak journalism and transparency activism. A select group of
renowned scholars, international experts, and WikiLeaks ‘insiders’ discuss the
consequences of the WikiLeaks saga for traditional media, international journalism,
freedom of expression, policymaking, civil society, social change, and international
politics. From short insider reports to elaborate and theoretically informed academic
texts, the different chapters provide critical assessments of the current historical
juncture of our mediatized society and offer outlooks of the future. Authors include,
amongst others, Harvard University’s Yochai Benkler, Graham Murdoch of
Loughborough University, net activism scholar, Gabriella Coleman, the Director for
International Freedom of Expression at the Electronic Frontier Foundation, Jillian
York, and Guardian editor, Chris Elliott. The book also includes a conversation
between philosopher, Slavoj Zizek, and WikiLeaks founder, Julian Assange, and its
prologue is written by Birgitta Jónsdóttir, Icelandic MP and editor of the WikiLeaks
video, `Collateral Murder`.
Briatte, F., & Gueydier, P. Artistes, lobbyistes et pirates: l’opposition de
plaidoyers professionnels et activistes autour du droit d’auteur sur Internet en
France, 2005-2010. In Congrès de l’Association Française de Science Politique.
L’analyse présentée dans ce texte a d’abord consisté à rappeler le rôle d’antécédents
critiques dans la situation actuelle, marquée à la fois par la tradition nationale
française de protection du droit d’auteur et par les mutations de sa régulation
transnationale, en réaction à l’expansion des télécommunications Internet et du
développement des technologies numériques de partage de fichiers. Cette séquence,
initialement dominée par un argumentaire professionnel, montre que l’irruption de
plaidoyers contestataires s’y est effectuée en partie par homothétie avec les règles de
fonctionnement usuelles du champ d’action stratégique constitué autour du droit
d’auteur. Ce parallélisme entre les activités de plaidoyers professionnel et activiste
autour de la régulation du droit d’auteur n’est pas fortuit : nos terrains de recherche
respectifs montrent au contraire que ce jeu de contrastes a fait partie intégrante de la
stratégie employée par les groupes d’activistes ayant le plus professionnalisé leur
activité de mobilisation.
9
Brooke, H. (2011), The Revolution Will Be Digitised: Dispatches from the
Information War, London: William Heinemann.
There is more information in the world than ever before – but who’s in control? At
the centre sits the Establishment: governments, corporations and powerful individuals
who have more knowledge about us, and more power, than ever before. Circling them
is a new generation of hackers, pro-democracy campaigners and internet activists who
no longer accept that the Establishment should run the show. Award-winning
journalist and campaigner Heather Brooke takes us inside the Information War and
explores the most urgent questions of the digital age: where is the balance between
freedom and security? In an online world, does privacy still exist? And will the
internet empower individuals, or usher in a new age of censorship, surveillance and
oppression?
Brooke, H. 2011. “Inside the secret world of hackers,” Guardian (24 August), at
http://www.guardian.co.uk/technology/2011/aug/24/inside-secret-world-ofhackers,
If Anonymous and Lulzsec are the id of hacking, then physical hackerspaces are the
heart of the higher-minded hacking ideals: freedom of information, meritocracy of
ideas, a joy of learning and anti-authoritarianism. The CCC is Europe’s largest hacker
organisation and also one of the oldest worldwide, having been set up in 1981 by Wau
Holland and others who predicted the rising importance digital technology would
have in people’s lives. CCC’s hackers are often older and run their own businesses.
They hold conferences and even consult with the German government. The CCC is
famous for exposing the security flaws of major technologies, from chip and PIN to
smartphones. Want to know how to listen in on GSM mobile phone traffic? Here’s the
place to learn (within legal constraints, of course). Among some of their more
noteworthy “hacks” is pulling the fingerprints of the German interior minister from a
water glass and putting them on a transparent film that could be used to fool
fingerprint readers. The Club also worked with activists for voting transparency to
expose flaws in computerised voting machines. These were later ruled
unconstitutional in Germany and abolished in Holland.
The CCC isn’t just about technical hacking, it is a hub of political activism based
around a few common goals: transparency of governments, privacy for private people
and the removal of excessive restrictions on sharing information. Many of these hacks
are demonstrated at the annual conference at the Berlin Congress Centre, and it was
here that Julian Assange presented WikiLeaks to an enthusiastic crowd in 2008.
Hackerspaces aren’t just about hacking with computers. The ideals can be applied to
every aspect of life including politics – which is considered just another “system” by
which humans live together. Like any other system, it can therefore be hacked and
these spaces offer a real-time experiment in political hacking.
Bruce, M., Peltu, M., & Dutton, W. H. (1999). Society on the line: Information
politics in the digital age. Oxford University Press.
10
Society on the Line presents a new way of thinking about the social and economic
implications of the revolution in information and communication technologies (ICTs).
It offers a clear overview of information in the digital age, and explains how social
and technical choices about ICTs influence access to information, people, services,
and technologies themselves.
Cammaerts, B. (2013). Networked Resistance: the case of WikiLeaks. Journal of
Computer‐ Mediated Communication, 18(4), 420-436.
In this article, WikiLeaks is embedded within broader debates relevant to both social
movement and mediation theory. First, the nature of the ties between a variety of
relevant actors are assessed. Second, the networked opportunities and constraints at a
discursive and material level of analysis are highlighted and finally the resistance
strategies they employ towards mainstream culture are addressed. It is concluded that
at the heart of information and communication resistance a dynamic dialectic can be
observed between mediated opportunities for disruptions and attempts of the powers
that be to close down these opportunities. Furthermore, it has to be acknowledged that
reliance on mainstream actors and structures for exposure, funding or hosting
contentious content comes with risks for radical activists. Keywords: Opportunity
Structure; Mediation; Hacktivism; Networks; WikiLeaks.
Cammaerts, B. (2015). Pirates on the Liquid Shores of Liberal Democracy:
Movement Frames of European Pirate Parties. Javnost-The Public, 22(1), 19-36.
In this article, the movement frames of European Pirate Parties are analysed through a
thematic analysis of texts relating to the Pirate Parties and transcripts of semistructured interviews with representatives of Pirate Parties across three European
countries—Germany, the United Kingdom and Belgium. At the level of the diagnostic
and prognostic frames the Pirate Parties address contentious issues and discourses
about civic liberties, privacy and access to knowledge in a digital era, but they also
critique liberal representative democracy as such, which they argue needs to
incorporate delegative models of democracy. In addition to this, a pro-social frame is
presented emphasising free education and a basic income. In order to achieve these
aims the Pirate Parties develop a distinct collective identity and foster political agency
through activism and by participating in electoral politics. Lack of electoral appeal
and low levels of membership is some countries, inability to deal with conflicts and
an unwillingness to clarify the ideological position and the precise relationship
between a libertarian freedom-related agenda and a social justice agenda represent
challenges for the Pirate Parties.
Carty, V., & Onyett, J. (2006). Protest, cyberactivism and new social movements:
The reemergence of the peace movement post 9/11. Social Movement Studies,
5(3), 229-249.
This paper examines ways in which the Internet and alternative forms of media have
enhanced the global, yet grassroots, political mobilization in the anti-war effort in the
post 9/11 environment. An examination of the role of cyberactivism in the peace
movement enhances our understanding of social movements and contentious politics
11
by analyzing how contemporary social movements are using advanced forms of
technology and mass communication as a mobilizing tool and a conduit to alternative
forms of media. These serve as both a means and target of protest action and have
played a critical role in the organization and success of internal political mobilizing.
Cyberactivism, globalization, social movements, war on terrorism, contentious
politics, political opportunity structures
Castells, M. (2013) Networks of outrage and hope: Social movements in the
internet age (London: John Wiley & Sons).
This book is an exploration of the new forms of social movements and protests that
are erupting in the world today, from the Arab uprisings to the indignadas movement
in Spain, and the Occupy Wall Street movement in the US. While these and similar
social movements differ in many important ways, there is one thing they share in
common: they are all interwoven inextricably with the creation of autonomous
communication networks supported by the Internet and wireless communication. In
this timely and important book, Manuel Castells – the leading scholar of our
contemporary networked society – examines the social, cultural and political roots of
these new social movements, studies their innovative forms of self-organization,
assesses the precise role of technology in the dynamics of the movements, suggests
the reasons for the support they have found in large segments of society, and probes
their capacity to induce political change by influencing people’s minds.
Chadwick, A. (2006). Internet politics: States, citizens, and new communication
technologies. Oxford University Press, USA.
In the developed world, there is no longer an issue of whether the Internet affects
politics-but rather how, why, and with what consequences. With the Internet now
spreading at a breathtaking rate in the developing world, the new medium is fraught
with tensions, paradoxes, and contradictions. How do we make sense of these? In this
major new work, Andrew Chadwick addresses such concerns, providing the first
comprehensive overview of Internet politics.
Internet Politics examines the impact of new communication technologies on political
parties and elections, pressure groups, social movements, local democracy, public
bureaucracies, and global governance. It also analyzes persistent and controversial
policy problems, including the digital divide; the governance of the Internet itself; the
tensions between surveillance, privacy, and security; and the political economy of the
Internet media sector. The approach is explicitly comparative, providing numerous
examples from the U.S., Britain, and many other countries. Written in a clear and
accessible style, this theoretically sophisticated and up-to-date text reveals the key
difference the Internet makes in how we “do” politics and how we “think about”
political life.
Chadwick, A. (2013) The Hybrid Media system: Politics and Power (Oxford:
Oxford University Press).
12
The diffusion and rapid evolution of new communication technologies has reshaped
media and politics. But who are the new power players? Written by a leading scholar
in the field, The Hybrid Media System is a sweeping and compelling new theory of
how political communication now works.
Politics is increasingly defined by organizations, groups, and individuals who are best
able to blend older and newer media logics, in what Andrew Chadwick terms a hybrid
system. Power is wielded by those who create, tap, and steer information flows to suit
their goals and in ways that modify, enable, and disable the power of others, across
and between a range of older and newer media. Chadwick examines news making in
all of its contemporary “professional” and “amateur” forms, parties and election
campaigns, activist movements, and government communication. He presents
compelling illustrations of the hybrid media system in flow, from American
presidential campaigns to WikiLeaks, from live prime ministerial debates to hotlycontested political scandals, from the daily practices of journalists, campaign workers,
and bloggers to the struggles of new activist organizations. This wide-ranging book
maps the emerging balance of power between older and newer media technologies,
genres, norms, behaviors, and organizational forms. Political communication has
entered a new era. This book reveals how the clash of older and newer media logics
causes chaos and disintegration but also surprising new patterns of order and
integration.
Chadwick, A. and Collister, S. (2014). Boundary-Drawing Power and the
Renewal of Professional News Organizations: The Case of The Guardian and the
Edward Snowden NSA Leak. International Journal of Communication, 8, 22.
The Edward Snowden National Security Agency leak of 2013 was an important
punctuating phase in the evolution of political journalism and political
communication as media systems continue to adapt to the incursion of digital media
logics. The leak’s mediation reveals professional news organizations’ evolving power
in an increasingly congested, complex, and polycentric hybrid media system where
the number of news actors has radically increased. We identify the practices through
which The Guardian reconfigured and renewed its power and which enabled it to lay
bare highly significant aspects of state power and surveillance. This involved
exercising a form of strategic, if still contingent, control over the information and
communication environments within which the Snowden story developed. This was
based upon a range of practices encapsulated by a concept we introduce: boundarydrawing power.
Christensen, C. (2014). WikiLeaks: From Popular Culture to Political Economy~
Introduction. International Journal of Communication, 8, 5.
Despite their early work, it was the leaked material that came from Chelsea Manning
that threw WikiLeaks into the international spotlight, and, thus, made the organization
a topic of scholarly interest. To date, the most in-depth single work on WikiLeaks has
come from Brevini, Hintz, and McCurdy (2013), but a number of other scholars have
investigated the relationship between the organization and, for example, journalism
(e.g., Coddington, 2012; Handley & Rutigliano, 2012; Lynch, 2010, 2013; McNair,
13
2012; Tambini, 2013), law (e.g., Benkler, 2012; Cannon 2013; Davidson 2011;
Fenster 2012; Peters 2011; Rothe & Steinmetz 2013; Wells 2012), and resistance and
activism (e.g., Cammaerts, 2013; Lindgren & Lundström, 2011; Zajácz, 2013). The
idea behind this collection of essays about WikiLeaks was influenced by the fact that
WikiLeaks, their activities, and the sociopolitical incrustations around the
organization resonate in so many areas within media studies and related disciplines—
more, I would argue, than have been addressed to date. Thus, when I began to
approach authors regarding potential contributions to this collection, I was interested
in asking influential and innovative scholars from a wide variety of research
backgrounds.
Christensen, C., & Jónsdóttir, B. (2014). WikiLeaks, Transparency and Privacy:
A Discussion with Birgitta Jónsdóttir. International Journal of Communication,
8, 9.
Birgitta Jónsdóttir is currently a member of the Icelandic Parliament, where she
represents the Pirate Party. Jónsdóttir was an early WikiLeaks volunteer and was one
of the key members of the team in Iceland that put together the famous Collateral
Murder video. In this wide-ranging discussion with Christian Christensen, Jónsdóttir
talks about her work with WikiLeaks, politics, and her ideas about technology,
transparency, and privacy. She also discusses how she has been placed under
surveillance because of her work with WikiLeaks and other organizations.
Clinton, H. R. (2012). Internet Freedom and Human Rights. Issues in Science
and Technology, 28(3), 45.
Maintaining the practice of open communication and continuing the system of multistakeholder management of the Internet can help advance the principles expressed in
the Universal Declaration of Human Rights.
Coleman, G. 2004. “The political agnosticism of free and open source software
and the inadvertent politics of contrast,” Anthropology Quarterly, volume 77,
number 3, pp. 507–519.http://dx.doi.org/10.1353/anq.2004.0035
Free and open source software (FOSS), which is by now entrenched in the technology
sector, has recently traveled far beyond this sphere in the form of artifacts, licenses,
and as a broader icon for openness and collaboration. FOSS has attained a robust
socio-political life as a touchstone for like-minded projects in art, law, journalism, and
science—some examples being MIT’s OpenCourseWare project, School Forge, and
the BBC’s decision to release all their archives under a Creative Commons license.
One might suspect FOSS of having a deliberate political agenda, but when asked,
FOSS developers invariably offer a firm and unambiguous “no”—usually followed by
a precise lexicon for discussing the proper relationship between FOSS and politics.
For example, while it is perfectly acceptable and encouraged to have a panel on free
software at an anti-globalization conference, FOSS developers would suggest that it is
unacceptable to claim that FOSS has as one of its goals anti-globalization, or for that
matter any political program—a subtle but vital difference, which captures the
uncanny, visceral, and minute semiotic acts by which developers divorce FOSS from
14
a guided political direction. FOSS, of course, beholds a complex political life despite
the lack of political intention; nonetheless, I argue that the political agnosticism of
FOSS shapes the expressive life and force of its informal politics.
Coleman, E.G. (2011). Hacker politics and publics. Public Culture, 23(3 65), 511516.
This article examines some of the attributes that mark geek and hacker politics as
distinct from other domains of digitally based activism and offers an introductory
framework to assess their political significance.
Coleman, E.G. (2013) Code Is Speech: Hackers attempt to write themselves into
the Constitution. Reason.com, April 2013,
http://reason.com/archives/2013/03/21/code-is-speech
…For open source developers, then, freedom means expression, learning, and
modification, not the mere absence of a price tag. Hackers first started talking about
software as speech in response to what they saw as excessive copyrighting and
patenting of computer software in the 1970s and ’80s. The first widely circulated
paper associating source code with free speech was “Freedom of Speech in Software,”
written by programmer Peter Salin in 1991. Salin characterized computer programs as
“writings,” arguing that software was unfit for patents (intended for inventions) but
appropriate for copyrights and thus free speech protections (which apply to expressive
content).
Coleman, E.G. and Ralph, M. 2011. Is it a Crime? The Transgressive Politics of
Hacking in Anonymous, Social Text, 28 September 2011,
http://www.socialtextjournal.org/blog/2011/09/is-it-a-crime-the-transgressivepolitics-of-hacking-in-anonymous.php
Instead of merely depicting hackers as virtual pamphleteers for free speech or as
digital outlaws, we need to start asking more specific questions about why and when
hackers embrace particular attitudes toward different kinds of laws, explore in greater
detail what they are hoping to achieve, and take greater care in examining the
consequences.
Coleman, E. G. (2013). Coding freedom: The ethics and aesthetics of hacking.
Princeton University Press.
Who are computer hackers? What is free software? And what does the emergence of a
community dedicated to the production of free and open source software–and to
hacking as a technical, aesthetic, and moral project–reveal about the values of
contemporary liberalism? Exploring the rise and political significance of the free and
open source software (F/OSS) movement in the United States and Europe, Coding
Freedom details the ethics behind hackers’ devotion to F/OSS, the social codes that
guide its production, and the political struggles through which hackers question the
scope and direction of copyright and patent law. In telling the story of the F/OSS
15
movement, the book unfolds a broader narrative involving computing, the politics of
access, and intellectual property.
Gabriella Coleman tracks the ways in which hackers collaborate and examines
passionate manifestos, hacker humor, free software project governance, and festive
hacker conferences. Looking at the ways that hackers sustain their productive
freedom, Coleman shows that these activists, driven by a commitment to their work,
reformulate key ideals including free speech, transparency, and meritocracy, and
refuse restrictive intellectual protections. Coleman demonstrates how hacking, so
often marginalized or misunderstood, sheds light on the continuing relevance of
liberalism in online collaboration.
Coleman, E.G. (2014). Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of
Anonymous. Verso Books.
John Postill review: The past five years have seen a global flourishing of political
initiatives in which tech-minded actors of different kinds (geeks, hackers, bloggers,
online journalists, citizen politicians, etc.) have played prominent roles. From
whistleblowing to online protests, from occupied squares to anti-establishment
parties, these ‘freedom technologists’ can no longer be dismissed, particularly after
Edward Snowden’s revelations about the surveillance abuses of America’s NSA and
allied agencies. Based on long-term anthropological fieldwork, Gabriella Coleman’s
Hacker, Hoaxer, Whistleblower, Spy, is a riveting account of one these new collective
actors: Anonymous. https://rmit.academia.edu/JohnPostill/Book-Reviews
Croeser, K. 2012. “Issue Crawler map of the digital liberties movement,” at
https://www.dropbox.com/sh/9td0goc7xul7vw9/SbGgyDE0dM.
Croeser, S. (2012). Contested technologies: The emergence of the digital liberties
movement. First Monday, 17(8).
The digital liberties movement is an emerging social movement that draws together
activism around online censorship and surveillance, free/libre and open source
software, and intellectual property. This paper uses the social movement literature’s
framework to build an understanding of the movement, expanding the dominant
framework by including a focus on the networks which sustain the movement. While
other communities and movements have addressed these issues in the past, activists
within the digital liberties movement are beginning to build a sense of a collective
identity and a master frame that ties together these issues. They are doing this in
online spaces, including blogs, and through campaigns around landmark issues, which
also help to build the network which the movement relies upon. The 2012 campaign
against the U.S. Stop Online Piracy Act has highlighted the movement’s strength, but
will also, perhaps, raise challenges for digital liberties activists as they confront the
tension between attempts to disavow politics and a profoundly political project.
In the case of the DLM, there are a number of terms that have been used by media,
scholars, and participants themselves to identify movement participants, including
“infoanarchists” (Schwartz and Cha, 2000), “online civil libertarians” (Borland,
16
2001), “pirates”, “(anti–)intellectual property activists” (Brown, 2005), “copyfighters”
(Farivar, 2008), technology activists (Doctorow, 2011a), and free culture advocates
(Bayley, 2011). The emergence of ‘Anonymous’ as an identity which is increasingly
available for political action is also important in this respect: as Gabriella Coleman
(2012) notes, since 2008 ‘Anonymous’ has come to be associated with “an irreverent,
insurgent brand of activist politics” rather than the trolling which characterised
previous actions. Participants who are figuratively and/or literally wearing the
‘Anonymous’ mask have played a significant role within the DLM, including in the
recent campaigns against the Stop Online Piracy Act (SOPA) and the Protect
Intellectual Property Act (PIPA). Together, these emerging collective identities
demonstrate the growth of the movement.
While participants in the DLM have on occasion been described as communists
and/or socialists (Himanen, 2001; Kelly, 2009; Stallman, 2008), many within the
movement have been quick to distance themselves from these labels. Lawrence
Lessig, one of the leading proponents of creative commons licences and a key figure
within the DLM, responded immediately to Kevin Kelly’s (2009) claims that digital
culture was experiencing a “New Socialism”. Lessig (2009) writes that “none of the
things that Kelly (and I) celebrate about the Internet are ‘socialist’” because they are
based on freedom, rather than coercion.… These sentiments are representative of the
mood within most of the movement, which eschews an open affiliation with left–wing
and anti–capitalist ideologies.
Croeser, S. (2014). Global Justice and the Politics of Information: The Struggle
Over Knowledge. Routledge.
The global social justice movement attempts to build a more equitable, democratic,
and environmentally sustainable world. However, this book argues that actors
involved need to recognise knowledge – including scientific and technological
systems – to a greater extent than they presently do. The rise of the Occupy
movement, the Arab Spring and the Wikileaks controversy has demonstrated that the
internet can play an important role in helping people to organise against unjust
systems. While governments may be able to control individual activists, they can no
longer control the flow of information. However, the existence of new information
and communications technologies does not in itself guarantee that peoples’
movements will win out against authoritarian governments or the power of economic
elites. Drawing on extensive interviews and fieldwork, this book illustrates the
importance of contributions from local movements around the world to the struggle
for global justice. Including detailed case studies on opposition to geneticallymodified crops in the south of India, and the digital liberties movement, this book is
vital reading for anyone trying to understand the changing relationship between
science, technology, and progressive movements around the world.
Dahlberg-Grundberg, M. (2015). Technology as movement On hybrid
organizational types and the mutual constitution of movement identity and
technological infrastructure in digital activism. Convergence: The International
Journal of Research into New Media Technologies, 1354856515577921.
17
New communication technologies bring about new ways for political groups and
movements to mobilize and organize. A consequence of this might be that established
interpretations of and attitudes towards social movements may have to be revisited,
for example, when it comes to their internal constitution and their modes of working.
This interview case study looks at the digital activist cluster Telecomix and its
interventions during the Arab Spring. The study addresses how the network used
technological and communicational infrastructures and platforms and how it was
organizationally affected by these. By using concepts such as ‘one media bias’,
‘media ecology’, ‘hybridity’ and ‘cognitive praxis’, the article aims to conceptualize
how the identity of a movement and its technological infrastructure mutually
constitute each other.
Dafermos, G. and Söderberg, J. 2009. ‘The hacker movement as the continuation
of the labour struggle’, Capital & Class. 33 (1), 53-73.
Examining the way in which capital exploits the volunteer labour of free software
developers, this article argues that there is a historical continuity between hackers and
labour struggle. The common denominator is their rejection of alienated work
practices, which suggests that corporate involvement in the computer underground,
far from inhibiting further struggles by hackers, may function as a catalyst for them.
Deibert, R. (2008). Access denied: The practice and policy of global internet
filtering. Mit Press.
Access Denied examines the political, legal, social, and cultural contexts of Internet
filtering in these states from a variety of perspectives. Chapters discuss the
mechanisms and politics of Internet filtering, the strengths and limitations of the
technology that powers it, the relevance of international law, ethical considerations
for corporations that supply states with the tools for blocking and filtering, and the
implications of Internet filtering for activist communities that increasingly rely on
Internet technologies for communicating their missions. Reports on Internet content
regulation in forty different countries follow, with each two-page country profile
outlining the types of content blocked by category and documenting key findings.
Deibert, R., Palfrey, J., Rohozinski, R., Zittrain, J., & Haraszti, M. (2010). Access
controlled: The shaping of power, rights, and rule in cyberspace. Mit Press.
Internet filtering, censorship of Web content, and online surveillance are increasing in
scale, scope, and sophistication around the world, in democratic countries as well as
in authoritarian states. The first generation of Internet controls consisted largely of
building firewalls at key Internet gateways; China’s famous “Great Firewall of China”
is one of the first national Internet filtering systems. Today the new tools for Internet
controls that are emerging go beyond mere denial of information. These new
techniques, which aim to normalize (or even legalize) Internet control, include
targeted viruses and the strategically timed deployment of distributed denial-ofservice (DDoS) attacks, surveillance at key points of the Internet’s infrastructure,
take-down notices, stringent terms of usage policies, and national information shaping
strategies. Access Controlled reports on this new normative terrain. The book, a
18
project from the OpenNet Initiative (ONI), a collaboration of the Citizen Lab at the
University of Toronto’s Munk Centre for International Studies, Harvard’s Berkman
Center for Internet and Society, and the SecDev Group, offers six substantial chapters
that analyze Internet control in both Western and Eastern Europe and a section of
shorter regional reports and country profiles drawn from material gathered by the ONI
around the world through a combination of technical interrogation and field research
methods.
Deibert, R., & Rohozinski, R. (2010). Liberation vs. control: The future of
cyberspace. Journal of Democracy, 21(4), 43-57.
Among theorists of new information and communication technologies, there is a
persistent tension between those who see them as technologies of liberation, and those
who see them as technologies of control. We argue that the dichotomy itself is
misleading, suggesting a basic opposition between forces of light and forces of
darkness. In fact, the situation is much more complex and needs to be qualified.
Rather than seeing technologies in oppositional terms, as either “empty” vessels to be
filled by human intent, or powerful forces imbued with some kind of agency that no
one can withstand, technologies are complex and continuously evolving
manifestations of social forces of a particular time and place. Once created,
technologies in turn shape and limit the prospects for human communication and
interaction in a constantly iterative manner. This dynamic is especially evident in the
case of cyberspace, a domain of intense competition, one which creates an everchanging matrix of opportunities and constraints for social forces and ideas. Social
forces and ideas, in turn, are imbued with alternative rationalities which collide with
each other and affect the structure of the communications environment. Unless the
characteristics of cyberspace change radically in the near future, and global human
culture grows monolithic, linking technological properties to a single social outcome,
like liberation or control, is highly dubious.
Deibert, R., Palfrey, J., Rohozinski, R., & Zittrain, J. (2011). Access contested:
security, identity, and resistance in Asian cyberspace. MIT Press.
A daily battle for rights and freedoms in cyberspace is being waged in Asia. At the
epicenter of this contest is China–home to the world’s largest Internet population and
what is perhaps the world’s most advanced Internet censorship and surveillance
regime in cyberspace. Resistance to China’s Internet controls comes from both
grassroots activists and corporate giants such as Google. Meanwhile, similar struggles
play out across the rest of the region, from India and Singapore to Thailand and
Burma, although each national dynamic is unique. Access Contested, the third volume
from the OpenNet Initiative (a collaborative partnership of the Citizen Lab at the
University of Toronto’s Munk School of Global Affairs, the Berkman Center for
Internet and Society at Harvard University, and the SecDev Group in Ottawa),
examines the interplay of national security, social and ethnic identity, and resistance
in Asian cyberspace, offering in-depth accounts of national struggles against Internet
controls as well as updated country reports by ONI researchers. The contributors
examine such topics as Internet censorship in Thailand, the Malaysian blogosphere,
surveillance and censorship around gender and sexuality in Malaysia, Internet
19
governance in China, corporate social responsibility and freedom of expression in
South Korea and India, cyber attacks on independent Burmese media, and distributeddenial-of-service attacks and other digital control measures across Asia.
“This team has consistently produced the most important research on how and why
technology matters in contemporary politics. With unique investigative tools, policy
savvy, and a normative commitment to exposing the ways that tough regimes use
digital media to control civil society, Access Contested demonstrates that in many
ways, information technology is politics.” —Philip N. Howard, Director, Project on
Information Technology and Political Islam, University of Washington; author, The
Digital Origins of Dictatorship and Democracy“—
De Rosa, A. 2012. “Open source politics: Reddit drafts ‘The Freedom of Internet
Act.’,” Reuters Blogs (24 February), at http://blogs.reuters.com/anthonyderosa/2012/02/25/open-source-politics-reddit-drafts-the-freedom-of-internetact/
Reddit users have taken it upon themselves to draft legislation in place of SOPA and
PIPA, unsatisfied with Washington politicians, who seem to have shown a willful
ignorance of how the Internet actually works. Using a Google Doc open for anyone to
help write and edit, they’ve come up with a draft version of “The Freedom of Internet
Act”
Dessi, G. 2012. The Icelandic constitutional experiment, Open Democracy, 23
October, http://www.opendemocracy.net/giulia-dessi/icelandic-constitutionalexperiment
This Saturday, a year after a Constitutional Council has written a draft constitution
with the help of citizens, voters agreed this draft should be the basis for a new
constitution. This writing experiment stands out for its surprisingly democratic
process, but a closer look reveals some of its limitations.
Diamond, L. (2010). Liberation technology. Journal of Democracy, 21(3), 69-83.
The Internet, mobile phones, and other forms of “liberation technology” enable
citizens to express opinions, mobilize protests, and expand the horizons of freedom.
Autocratic governments are also learning to master these technologies, however.
Ultimately, the contest between democrats and autocrats will depend not just on
technology, but on political organization and strategy.
Diamond, L., & Plattner, M. F. (2012). Liberation technology: Social media and
the struggle for democracy. JHU Press.
http://hci.stanford.edu/courses/cs047n/readings/diamond-libtech.pdf
The revolutions sweeping the Middle East provide dramatic evidence of the role that
technology plays in mobilizing citizen protest and upending seemingly invulnerable
authoritarian regimes. A grainy cell phone video of a Tunisian street vendor’s selfimmolation helped spark the massive protests that toppled longtime ruler Zine El
20
Abidine Ben Ali, and Egypt’s “Facebook revolution” forced the ruling regime out of
power and into exile. While such “liberation technology” has been instrumental in
freeing Egypt and Tunisia, other cases—such as China and Iran—demonstrate that it
can be deployed just as effectively by authoritarian regimes seeking to control the
Internet, stifle protest, and target dissenters. This two-sided dynamic has set off an
intense technological race between “netizens” demanding freedom and authoritarians
determined to retain their grip on power.
Liberation Technology brings together cutting-edge scholarship from scholars and
practitioners at the forefront of this burgeoning field of study. An introductory section
defines the debate with a foundational piece on liberation technology and is then
followed by essays discussing the popular dichotomy of “liberation” versus “control”
with regard to the Internet and the sociopolitical dimensions of such controls.
Additional chapters delve into the cases of individual countries: China, Egypt, Iran,
and Tunisia. This book also includes in-depth analysis of specific technologies such
as Ushahidi—a platform developed to document human-rights abuses in the wake of
Kenya’s 2007 elections—and alkasir—a tool that has been used widely throughout
the Middle East to circumvent cyber-censorship. Liberation Technology will prove an
essential resource for all students seeking to understand the intersection of
information and communications technology and the global struggle for democracy.
Contributors: Walid Al-Saqaf, Daniel Calingaert, Ronald Deibert, Larry Diamond,
Elham Gheytanchi, Philip N. Howard, Muzammil M. Hussain, Rebecca MacKinnon,
Patrick Meier, Evgeny Morozov, Xiao Qiang, Rafal Rohozinski, Mehdi Yahyanejad.
Di Salvo, P., & Negro, G. (2015). Framing Edward Snowden: A comparative
analysis of four newspapers in China, United Kingdom and United States.
Journalism, 1464884915595472.
This article sheds light on the framing of Edward Snowden in four newspapers in
three different countries. The authors analysed online editions of a major American
daily (The New York Times), one prominent European newspaper (The Guardian),
one mouthpiece of the Chinese Communist Party (The People’s Daily) and The South
China Morning Post. The study seeks to explore how the role of Edward Snowden
was framed and how digital whistleblowing was descripted by newspapers with
different levels of Internet control, perception and culture on whistleblowing. The
research is based on the framework proposed by a recent study of the framing of
Bradley Manning. The results of a content analysis will present to what extent the
press supported or criticized the role of Edward Snowden and his revelations. This
article used four out of its five categories (‘Hero’, ‘Victim’, ‘Villain’, ‘WhistleBlower’) plus a new addition of ‘Mole’, proposed by the authors. The findings
provide evidence of the differences in the framing of Edward Snowden and the
rhetoric behind reporting about whistleblowers and Internet governance.
Whistleblowing, Edward Snowden, journalism
Doctorow, C. 2012 The problem with nerd politics, The Guardian, 15 May ,
http://www.theguardian.com/technology/2012/may/14/problem-nerd-politics
21
If people who understand technology don’t claim positions that defend the positive
uses of technology, if we don’t operate within the realm of traditional power and
politics, if we don’t speak out for the rights of our technically unsophisticated friends
and neighbours, then we will also be lost. Technology lets us organise and work
together in new ways, and to build new kinds of institutions and groups, but these will
always be in the wider world, not above it.
Dür, A., & Mateo, G. (2014). Public opinion and interest group influence: how
citizen groups derailed the Anti-Counterfeiting Trade Agreement. Journal of
European Public Policy, 21(8), 1199-1217.
The Anti-Counterfeiting Trade Agreement (ACTA), which envisages stricter
standards for the transnational enforcement of intellectual property rights, received
strong support from business groups. Nevertheless, a campaign against the agreement
that was initiated by a small number of citizen groups was successful in stopping its
ratification in the European Union (EU). This result is puzzling because the antiACTA side controlled few material resources and should have found it difficult to
have its voice heard on an issue negotiated at the international level. We explain the
success of the anti-ACTA campaign by showing how interest groups managed to
increase the public salience of the issue; how the increasing public salience motivated
a growing number of interest groups to mobilize; and how the resulting dynamic
made decision-makers opt against ratification of the agreement. The article advances
scholarly understanding of the interaction between lobbying and public opinion and
sheds light on the defeat of ACTA.
Earl, J. (2014). Something Old and Something New: A Comment on “New
Media, New Civics”. Policy & Internet, 6(2), 169-175.
I argue that activists and scholars alike (including Zuckerman) should consider
moving past the idea that thin forms of engagement are only meaningful when they
are the bottom rung of a ladder leading to thicker and thicker activism. Research and
even anecdotes that Zuckerman discusses show that sometimes bursts of thin
engagement do succeed (just as sometimes, heavy on the sometimes, researchers
know that thicker forms of activism succeed too). Instead, I am arguing for a literature
where scholars accept that a distribution of thin and thick engagement can
productively exist, instead of always implicitly denigrating thin engagements by
remaining ever hopeful that engagement will eventually thicken. To do otherwise
strikes me as not unlike saying you have no problem with your son being gay, but
secretly hoping he meets the “right” woman.
Earl, J., & Beyer, J. L. (2014). The Dynamics of Backlash Online: Anonymous
and the Battle for WikiLeaks. In Intersectionality and Social Change (pp. 207233). Emerald Group Publishing Limited.
We analyze reactions to the U.S. government-led repression of WikiLeaks in late
2010 by actors such as Anonymous and the Pirate Parties to argue that the potential
for backlash, which has been so prominent offline, is also a potential repercussion of
repression online. In doing so, we use existing research to identify different ways in
22
which bystanders might be pulled into conflicts, and examine our case for evidence of
any of these forms of backlash. We also hypothesize that the net observed effect of
repression is really the result of competing and/or amplifying backlash and deterrence
effects; when this net effect is in favor of backlash, we call it a “net backlash effect”
to indicate that there was more backlash than deterrence. We argue that net backlash
occurs when repression recruits more bystanders into a conflict than it is able to deter
in terms of already active participants. We also argue that backlash is a very likely
outcome when Internet activism is repressed. Keywords: Online protest, repression,
bystanders, WikiLeaks, Anonymous, Internet
Estalella, A. 2011. Ensamblajes de esperanza: Un estudio antropológico del
bloguear apasionado. PhD thesis, Universitat Oberta de Catalunya, Barcelona.
http://www.estalella.eu/ensamblajes-de-esperanza
Esta tesis investiga la esperanza que algunas personas depositan en la posibilidad de
transformar la sociedad a través de la tecnología, de una tecnología específica de
Internet: los blogs. Para muchos de aquellos con los que conviví durante mi trabajo de
campo, los blogs son una revolución que va a transformar la sociedad, o que de hecho
la está transformando durante el momento en que se realiza mi investigación. Hay
quienes consideran que a través de los blogs y de su práctica de bloguear se abre la
posibilidad de elaborar nuevos modos de hacer ciencia, para otros son una forma
diferente de desarrollar el periodismo, una herramienta para nuevos modos de hacer
política o un medio y contexto para transformar la educación. Esas son algunas de las
expectativas en las cuales se explicitan sus esperanzas y que circulan en España
durante los 18 meses de mi trabajo de campo durante 2006 y 2007.
Faris, R., Roberts, H., Etling, B., Othman, D., & Benkler, Y. (2015). Score
Another One for the Internet? The Role of the Networked Public Sphere in the
US Net Neutrality Policy Debate. Berkman Center Research Publication, (2015-4).
In this paper we study the public debate over net neutrality in the United States from
January through November 2014. We compiled, mapped, and analyzed over 16,000
stories published on net neutrality, augmented by data from Twitter, bit.ly, and
Google Trends. Using a mixed-methods approach that combines link analysis with
qualitative content analysis, we describe the evolution of the debate over time and
assess the role, reach, and influence of different media sources and advocacy groups
in setting the agenda, framing the debate, and mobilizing collective action. We
conclude that a diverse set of actors working in conjunction through the networked
public sphere played a central, arguably decisive, role in turning around the Federal
Communications Commission policy on net neutrality.
Farivar, C. 2008. “Lessig, a copyfighter for Congress?” Salon.com — Machinist,
at http://machinist.salon.com/blog/2008/02/20/lessig/
Farrell, H. (2012). The consequences of the internet for politics. Annual Review
of Political Science, 15, 35-52.
23
Political scientists are only now beginning to come to terms with the importance of
the Internet to politics. The most promising way to study the Internet is to look at the
role that causal mechanisms such as the lowering of transaction costs, homophilous
sorting, and preference falsification play in intermediating between specific aspects of
the Internet and political outcomes. This will allow scholars to disentangle the
relevant causal relationships and contribute to important present debates over whether
the Internet exacerbates polarization in the United States, and whether social media
helped pave the way toward the Arab Spring uprisings of 2011. Over time, ever fewer
political scientists are likely to study the Internet as such, as it becomes more and
more a part of everyday political life. However, integrating the Internet’s effects with
present debates over politics, and taking proper advantage of the extraordinary data
that it can provide, requires good causal arguments and attention to their underlying
mechanisms.
Feenstra, R. A., and Keane, J. (2014). Politics in Spain: A case of monitory
democracy. VOLUNTAS: International Journal of Voluntary and Nonprofit
Organizations, Online First, 1–19. doi:10.1007/s11266-014-9461-2
Analysing the current political context in Spain is a major challenge to political
theory. Spain is experiencing the accumulation of trends that in recent years have
focused the attention of most theorists and political scientists: discrediting of the
major parties, falling numbers of party members, disaffection, etc. In parallel, this
trend has been accompanied by citizen mobilisations that, since 15 May 2011, are
manifest in numerous channels and strategies. The aim of this paper was to analyse
the complex Spanish context from the monitory democracy proposal. The results
show how in recent years processes of public scrutiny have been consolidated through
a range of citizen initiatives. The study offers an in-depth analysis of the main
characteristics of the most notable cases and monitoring initiatives, and also reflects
on their democratising potential.
Fell Brown, G.M. 2013. The politics of hacktivism. Socialist Alternative.
http://www.socialistalternative.org/news/article20.php?id=2161
Digital technology can offer valuable tools for activists, but on the basis of capitalism
the digital playing field will remain structurally tilted in favor of the capitalists. Most
of the activists in Anonymous and LulzSec and some of the activists involved in
WikiLeaks are from working-class backgrounds and support workers’ struggles, but
there’s a difference between supporting workers’ struggles and participating in them.
Hacking can be disruptive, but it doesn’t have the same impact as strikes, sit-downs,
and occupations. The state and the capitalist ruling class have enormous powers at
their disposal to disrupt, persecute, and defeat hacking efforts. Reliance on hacking is
not a viable strategy for decisively defeating these powers.
Fernández-Delgado, F. C., & Balanza, M. T. V. (2012). Beyond WikiLeaks: The
Icelandic Modern Media Initiative and the Creation of Free Havens.
International Journal of Communication, 6, 24.
24
On June 16, 2010, the Icelandic Parliament unanimously approved the Icelandic
Modern Media Initiative (IMMI), a legislative package that turns the concept of “tax
haven” on its head by offering fundamental protections for free speech and freedom
of expression. This article offers a general picture of the political context in which the
IMMI is set and describes the core free speech concerns identified in it as well as the
legal reforms put forward to tackle them. To conclude, we examine both the possible
legal implications of the IMMI and its general significance for the emergence of the
networked public sphere in general and of the networked fourth estate in particular.
Figueras, J. (2015). Internetworked Social Movements and the Promise of
Politics: A Case Study of the 15M Movement. Promoting Social Change and
Democracy Through Information Technology, 116.
This chapter analyses the Spanish social movement of the 15M, and the influence of
Information and Communication Technologies on it. Drawing a distinction between
liberal and republican citizenship, the first part of the chapter discusses the
interactions between technology and social movements in terms of political
participation. This part compares and contrasts characteristics of online-based
interactions with offline mobilisations in Spain. The second part of the chapter
compiles a set of features that can be found in current Internetworked Social
Movements, and its meaning from the perspective of political engagement. The
chapter concludes that ICTs contributed to the recuperation of republican politics with
current examples that suggest that forthcoming movements will promote this kind of
participation.
Fink, K., & Anderson, C. W. (2014). Data Journalism in the United States:
Beyond the “usual suspects”. Journalism Studies, (ahead-of-print), 1-15.
Understanding the phenomenon of data journalism requires an examination of this
emerging practice not just within organizations themselves, but across them, at the
inter-institutional level. Using a semi-structured interview approach, we begin to map
the emerging computational journalistic field. We find considerable variety among
data journalists in terms of their educational backgrounds, skills, tools and goals.
However, many of them face similar struggles, such as trying to define their roles
within their organizations and managing scarce resources. Our cross-organizational
approach allows for comparisons with similar studies in Belgium, Sweden, and
Norway. The common thread in these studies is that the practice of data journalism is
stratified. Divisions exist in some countries between resource-rich and resource-poor
organizations and in other countries between the realm of discourse and the realm of
practice.
Fredriksson, M. (2015). Piracy & Social Change| The Pirate Party and the
Politics of Communication. International Journal of Communication, 9, 16.
This article draws on a series of interviews with members of the Pirate Party, a
political party focusing on copyright and information politics, in different countries. It
discusses the interviewees’ visions of democracy and technology and explains that
copyright is seen as not only an obstacle to the free consumption of music and movies
25
but a threat to the freedom of speech, the right to privacy, and a thriving public
sphere. The first part of this article briefly sketches how the Pirate Party’s
commitment to the democratic potential of new communication technologies can be
interpreted as a defense of a digitally expanded lifeworld against the attempts at
colonization by market forces and state bureaucracies. The second part problematizes
this assumption by discussing the interactions between the Pirate movement and the
tech industry in relation to recent theories on the connection between political agency
and social media.
Freelon, D. (2014). Online Civic Activism: Where Does It Fit?. Policy & Internet,
6(2), 192-198.
Ethan Zuckerman (2014) raises a number of important points in his essay “New
Media, New Civics.” This response will focus on one of its central concepts, online
activism, as it relates to civic engagement and activism broadly writ. Zuckerman’s
formulation of “participatory civics” reminds me of several similar concepts that have
been developed over the past two decades or so. These include “actualizing
citizenship” (Bennett, 2008), “autonomous citizenship” (Coleman, 2008), “engaged
citizenship” (Dalton, 2008), “new politics” (Dahlgren, 2005), “postmodern politics”
(Inglehart, 1997), “subpolitics” (Beck, Giddens, & Lash, 1994), and the civic
tendencies of “Generation DotNet” (Zukin, Keeter, Andolina, Jenkins, & Delli
Carpini, 2006), and “Generation Digital” (Montgomery, 2007). Each of these differs
somewhat from the others, but all share in common the argument that the loosely
defined “youth” of the late-modern era tend to favor individually motivated, issuespecific “activism” over government- and mass-media-focused “politics.” Zuckerman
spends most of his essay attempting to set the agenda of the participatory civics
debate, contributing in the process a helpful two-dimensional typology with which
different civic acts may be compared.
Freelon, D., Merritt, S., & Jaymes, T. (2015). Focus On The Tech: Internet
centrism in global protest coverage. Digital Journalism, 3(2), 175-191.
Internet centrism, the notion that online tools play substantial roles in social and
political processes, is frequently invoked by journalists, pundits, and academics.
Existing research has explored this idea directly in the case of protest, attempting to
discern the actual magnitude of the internet’s role in protest organization and
mobilization. Taking a different approach, we conduct a content analysis to examine
the extent to which internet centrism is discussed in articles about the Occupy
movement and the Arab Spring in mainstream US newspapers and technology blogs.
Our main findings are that the role of publication type in predicting internet centrism
depends upon which protest is being discussed, and the role of protest type depends
upon publication type. This study lends a theoretical perspective to an under-studied
journalistic phenomenon with the potential to influence how audiences think about the
causes and consequences of protests.
Fuchs, C. (2011). WikiLeaks: power 2.0? Surveillance 2.0? Criticism 2.0?
Alternative media 2.0? A political-economic analysis. Global Media Journal:
Australian Edition, 5(1).
26
The task of this paper is to analyse how WikiLeaks relates to capitalism. It deals
specifically with the questions: Is WikiLeaks a counter-surveillance medium? Is it a
form of alternative medium and alternative journalism? How does WikiLeaks relate to
the liberal and socialist worldviews? The role of WikiLeaks as a watchdog
organisation is analysed and the role of surveillance, counter-surveillance and
transparency is discussed (section 2). The paper assesses how ideology and
worldviews shape WikiLeaks self-understanding (section 3) and WikiLeaks is
connected to journalism and alternative media theory (section 4). Finally, some
conclusions about the role of WikiLeaks in contemporary capitalism are drawn
(section 5).
Fuster, M. (2012). The Free Culture and 15M Movements in Spain:
Composition, Social Networks and Synergies. Social Movement Studies, 11(3-4),
386-392.
This profile discusses the organization, goals and practices of the Spanish 15M
movement. I argue that it developed as a complex, multi-layered ecosystem,
mobilizing a new generation of citizens through the convergence of struggles over
housing and the Free Culture and Digital Commons Movement (FCM), creating a
common framework for action through social networks. Primarily in and through the
actions in public squares, the 15M movement also constructed further layers of
mobilization, incorporating the networks and skills of previous social movements
(such as those mobilizing over inter alia education, health, alternative consumption)
and connecting with previous generations who had mobilized over civil liberties in
transition to democracy. Furthermore, I argue that links with the Free Culture
Movement had a profound effect on the genealogy of 15M—in terms of its
composition, agenda, framing and organizational logic. The methodology is based on
case studies of both the FCM and 15M between December 2010 and December 2011
in Spain.
Gharbia, S. B. (2010). The Internet freedom fallacy and the Arab digital
activism. Nawaat Blog, 17.
Goggin, G., McLelland, M., Lee, K., Frances, S., Tkach, L., Tamura, T., & Yu,
H. (2013). Internet Activism in Asia-Pacific: A Comparative, Cultural History.
Selected Papers of Internet Research, 3.
As the internet has become a central delivery platform across contemporary
mediascapes, activism around internet access, freedom, censorship, and openness has
become more prominent. As internet freedom gathers momentum as a global media
policy concept and movement, it is important to interrogate the terms in which it is
constructed and understood. All too often, and certainly evident in these recent
moves, is a strong, normative sense in which North American concepts of internet,
media, activism and even ‘freedom’ shape the boundaries and modes of contemporary
debates, policy frameworks, and action. Against this backdrop, this paper seeks to
reframe contemporary notions of internet freedom, their politics, publics, actors, and
movements. Drawing from the wider project on Asia-Pacific internet histories, this
27
paper presents three case studies of internet activism –– respectively in Australia,
South Korea, and Japan.
Golumbia, D. 2015. Tor, Technocracy, Democracy
David Golumbia, April 23, 2015 [Excerpts] In a terrific recent article describing
technocracy and its prevalence in contemporary digital culture, the philosophers of
technology Evan Selinger and Jathan Sadowski write:
Unlike force wielding, iron-fisted dictators, technocrats derive their authority from a
seemingly softer form of power: scientific and engineering prestige. No matter where
technocrats are found, they attempt to legitimize their hold over others by offering
innovative proposals untainted by troubling subjective biases and interests. Through
rhetorical appeals to optimization and objectivity, technocrats depict their favored
approaches to social control as pragmatic alternatives to grossly inefficient political
mechanisms. Indeed, technocrats regularly conceive of their interventions in dutybound terms, as a responsibility to help citizens and society overcome vast political
frictions.
Such technocratic beliefs are widespread in our world today, especially in the
enclaves of digital enthusiasts, whether or not they are part of the giant corporatedigital leviathan. Hackers (“civic,” “ethical,” “white” and “black” hat alike),
hacktivists, WikiLeaks fans, Anonymous “members,” even Edward Snowden himself
walk hand-in-hand with Facebook and Google in telling us that coders don’t just have
good things to contribute to the political world, but that the political world is theirs to
do with what they want, and the rest of us should stay out of it: the political world is
broken, they appear to think (rightly, at least in part), and the solution to that, they
think (wrongly, at least for the most part), is for programmers to take political matters
into their own hands.
Greenberg, A. (2012). This machine kills secrets: Julian Assange, the
Cypherpunks, and their fight to empower whistleblowers. Penguin.
WikiLeaks brought to light a new form of whistle-blowing, using powerful
cryptographic code to hide leakers’ identities while they spill the private data of
government agencies and corporations. But that technology has been evolving for
decades in the hands of hackers and radical activists, from the libertarian enclaves of
Northern California to Berlin to the Balkans. And the secret-killing machine
continues to evolve beyond WikiLeaks, as a movement of hacktivists aims to
obliterate the world’s institutional secrecy. This is the story of the code and
characters–idealists, anarchists, extremists–who are transforming the next
generation’s notion of what activism can be. With unrivaled access to such major
players as Julian Assange, Daniel Domscheit-Berg, and WikiLeaks’s shadowy
engineer known as the Architect, (never before interviewed) reporter Andy Greenberg
unveils the world of politically motivated hackers–who they are and how they
operate.
28
Greenwald, G. (2014). No place to hide: Edward Snowden, the NSA, and the US
surveillance state. Metropolitan Books.
Going beyond NSA specifics, Greenwald […] takes on the establishment media,
excoriating their habitual avoidance of adversarial reporting on the government and
their failure to serve the interests of the people. Finally, he asks what it means both
for individuals and for a nation’s political health when a government pries so
invasively into the private lives of its citizens—and considers what safeguards and
forms of oversight are necessary to protect democracy in the digital age. Coming at a
landmark moment in American history, No Place to Hide is a fearless, incisive, and
essential contribution to our understanding of the U.S. surveillance state. – See more
at: http://glenngreenwald.net/#sthash.jyvVBmZB.dpuf
Haggart, B. (2013). Fair Copyright for Canada: Lessons for Online Social
Movements from the First Canadian Facebook Uprising. Canadian Journal of
Political Science, 46(04), 841-861.
Despite the growing importance of social media, their political effectiveness remains
understudied. Drawing on and updating resource mobilization theory and political
process theory, this article considers how social media make “political engagement
more probable” and determine the success of online social movements. It does so by
examining the mainstreaming of the Canadian “user rights” copyright movement,
focusing on the Fair Copyright for Canada Facebook page, created in December 2007.
This decentralized, grassroots, social media-focused action—the first successful
campaign of its kind in Canada and one of the first in the world—changed the terms
of the Canadian copyright debate and legitimized Canadian user rights. As this case
demonstrates, social media have changed the type and quantity of resources needed to
create and sustain social movements, creating openings for new groups and interests.
Their success, however, remains dependent on the political context within which they
operate.
Haggart, B. (2014). Birth of a Movement: The Anti‐Counterfeiting Trade
Agreement and the Politicization of Mexican Copyright. Policy & Internet, 6(1),
69-88.
The literature on social movements—national and transnational—and social media
has tended to focus on cases from the global North rather than the South, raising
questions about its applicability to countries with low Internet penetration rates and
weak civil societies. To remedy this deficit, this article presents the case of the
Mexican Stop Anti-Counterfeiting Trade Agreement (ACTA) network. In 2010–11, a
network of about a dozen underfunded copyright and Internet activists convinced the
Mexican Senate to reject—unanimously—the ACTA, a U.S.-led plurilateral treaty
that critics claimed would strengthen international intellectual property rights at the
cost of fundamental Mexican Constitutional and human rights. This article argues that
this victory was the result of activists’ use of social media in a way that recognized
the limits and possibilities within existing Mexican political arrangements. While
Stop ACTA’s success suggests social media’s utility for social movements in other
29
developing countries, it leaves open the question as to whether it can make up for
weak civil society institutions over the long-term.
The year 2012 witnessed several dramatic developments in the increasingly
contentious global intellectual property (IP) debate. On January 18th, the Internet
declared war on two copyright-related bills before the U.S. Congress, the Stop Online
Piracy Act (SOPA) and the Protect Intellectual Property Act. In order to draw
attention to concerns that the bills would, in the name of reducing online copyright
violations, fundamentally damage the open architecture of the Internet itself,
thousands of websites, most notably Wikipedia and Reddit, blacked out their sites,
directing their users to information about the bills and how to contact their
Congressional representatives. In an unprecedented demonstration of grassroots
mobilization, millions of Americans flooded Congress with calls and emails
protesting the bills, famously crashing the Senate’s website (“SOPA Petition Gets
Millions of Signatures,” 2012; Wikipedia, 2012). Within 24 hours, the bills were
withdrawn (Sell, 2013).
Less than 1 month later, on February 11th, more than 100,000 people1 took to the
streets across Europe to protest an IP treaty, the Anti-Counterfeiting Trade Agreement
(ACTA), a U.S.-led treaty that had been negotiated among several countries,
including the United States, the European Union, Japan, and Mexico. Critics argued
that it would have a negative effect on human rights, especially “the rights to due
process, privacy, freedom of information, freedom of expression, and access to
essential medicines” (Amnesty International, 2012).
Similar to the effect of the SOPA protests, the European anti-ACTA protests
compelled the European Commission (as well as several member governments) to
withdraw its support in December 2012 for a treaty that the Commission had
previously seemed intent on passing. The two events represented victories against
well-funded and politically powerful IP interests, and offered evidence that
transnational activists could stand up to powerful economic and state interests and
win (Sell, 2013).
Harlow, S., & Johnson, T. J. (2011). Overthrowing the Protest Paradigm? How
The New York Times, Global Voices and Twitter Covered the Egyptian
Revolution. International Journal of Communication, 5, 1359-74.
With social-media driven protests erupting across the Arab world, this content
analysis of Egyptian protest coverage in The New York Times, the Twitter feed of
Times reporter Nick Kristof, and the citizen media site Global Voices, examines
whether the de-legitimizing “protest paradigm” found in mainstream media is
replicated in social media and blogs, and what impact their protest coverage has on
their credibility. Results showed that The Times adhered to the paradigm by
emphasizing the spectacle, quoting official sources, and de-valuing protesters as
reporters maintained an impartial role. In contrast, Global Voices and Kristof’s
Twitter feed took different approaches, legitimizing protesters and serving as
commentators/analysts, even actors, in the unfolding events. Global Voices also
provided more opportunities for reader interactivity.
30
Hart, J. A. (2011). The net neutrality debate in the United States. Journal of
Information Technology & Politics, 8(4), 418-443.
In 2006, a major telecommunications bill was held up because it did not include
guarantees for something called “net neutrality.” Republicans strongly opposed these
guarantees, while Democrats strongly favored them. The debate over net neutrality
continued during the long campaign leading up to the 2008 presidential election.
When the Obama Administration took office in 2009, the new chairman of the
Federal Communications Commission, Julius Genachowski revived the idea of
codifying net neutrality rules. In April 2010, the U.S. Court of Appeals in the District
of Columbia Circuit ruled that the FCC did not have the authority to regulate Internet
service providers under its own interpretation of the Telecommunications Act of
1996. The FCC adopted a new strategy because of the Court’s action. It opted not to
undertake a major revision of the Telecommunications Act, but instead to attempt to
regulate Internet service provision under modified “common carriage” rules, just as
basic telephone services had been previously. An attempt will be made here to explain
these choices.
Herman, B. D., & Kim, M. (2014). The Internet Defends Itself: The Network
Neutrality Debate on the Web. The Information Society, 30(1), 31-44.
This study examines the network neutrality debate, as represented online. The
research begins by conducting network analysis to identify key websites, followed by
retrieving the relevant documents and using content analysis. Results demonstrate that
the online version of the debate skews heavily toward the pro-network neutrality side.
The web debate also includes much higher proportions of voices from nonprofit
sectors, especially nongovernmental organizations. Telecommunications companies
and trade groups, which anchor the anti-network neutrality coalition, are relatively
quiet online. These findings show groups that are less powerful making heavy use of
online communication and, in light of the political history of the issue, they also
suggest online mobilizing may help reshape the dynamics of issue advocacy.
Himanen, P. 2001. The hacker ethic, and the spirit of the information age.
London: Secker and Warburg.
Hintz, A. (2013). Dimensions of Modern Freedom of Expression: WikiLeaks,
Policy Hacking, and Digital Freedoms. Beyond WikiLeaks: Implications for the
Future of Communications, Journalism and Society, 146.
The WikiLeaks project can be placed in the midst of these examples of the use of
liberation technology and the various experiences of individuals and movements in
advancing free expression, transparency, and social transformation. The leaks
platform has bypassed information restrictions, expanded the range of publicly
available information, and challenged the leading media players to change their
routines and practices. Demonstrating the capacity of technical experts to challenge
major powers, WikiLeaks seems to express a broader trend in which the power
relations between individuals and institutions are shifting in favour of the former
(Grimsson, 2011 ). In that sense, citizen journalism, the Arab Spring, and WikiLeaks
31
may confirm some of the predictions of cyber-libertarians and techno-utopians, who
have long criticized traditional institutions as outdated and have praised the power of
individuals in cyberspace (Barlow, 1996).
However, this reading of recent events may be premature. Just as social media have
been used by activists to advance political change, they have been used by
governments to control and deter such action, for example, by identifying protesters
(as in Tunisia, Syria, and Iran). Vital online resources and funding streams have been
cut to weaken dissident organizations (as happened to WikiLeaks in December 2010
and ever since).
Hintz, A. (2015). Internet Freedoms and Restrictions. The Routledge Companion
to Alternative and Community Media.
Hintz, A., & Milan, S. 2011. Exploring information governance activism: Action
repertoires, strategies and agendas.
http://ecpr.eu/filestore/paperproposal/fe95f474-23ef-4b3d-855a648832aaf6d9.pdf
In this chapter we will introduce and analyze the experiences of several civil society
coalitions and networks that have promoted policy change, focusing on those that
have featured media practitioners and communication activists in key roles. Based on
these cases, we will explore common characteristics of current information
governance activism. In particular, we will look at the following three aspects:
(1) Action repertoires: What action repertoires do the various social actors adopt, and
how do they mobilize ‘inside’, ‘outside’, and ‘beyond’ policy arenas?
(2) Strategies and conditions for policy change: What have been the core factors for
successes and failures, what strategies have been applied, and how have social actors
exploited political opportunities of political change and crisis?
(3) Policy agendas and interaction: Do policy initiatives connect and relate their
agendas, and do they combine concerns from ‘old’ and ‘new’ media platforms and
thereby overcome divisions between different sets of policies (as well as between
different social groups mobilizing on them)?
Hogge, B. (2005). Global voices: blogging the world. openDemocracy, December,
13, 2005.
In late 2004, MacKinnon and Zuckerman realised that although American weblogs
were talking to one another and gaining lots of exposure in the mainstream press,
blogs from the rest of the world needed a bigger audience. Their central mission,
beyond supporting the right of people to speak and speak freely, became promoting
the importance of listening. The result is a website which aggregates posts from
weblogs around the world. The homepage of the Global Voices site is dominated by a
cloud of tags listing countries from Afghanistan to Zimbabwe. Clicking on each one
brings you the news from the blogosphere, with options to visit other blog summaries
32
in the region. The site, originally maintained by Zuckerman and MacKinnon, now has
a team of six regional editors. It is supplemented by a wiki running through the centre
of the page, where readers can suggest other regional blogs worth monitoring. The
project has grown at an enormous pace. The site received a total of 800 visits in its
first four weeks. Now 300,000 individual people check the site each month. On an
average day, Global Voices gets 12,000 readers, many from the mainstream press,
which uses the stories as its own personal and international news desk.
Hood, C. (2011). From FOI world to WikiLeaks world: a new chapter in the
transparency story?. Governance, 24(4), 635-638.
So just what is new about WikiLeaks world? Perhaps three things. One is the
institutional form of an international organization operating in cyberspace in ways
intended to frustrate retribution and regulation through national information laws (by
siting itself in the most constitutionally disclosure-friendly jurisdictions, such as
Iceland and Sweden) and operating as an intermediary organization through which
leakers can release information to media and the public. A second novelty is arguably
the sheer quantity of classified information published on the WikiLeaks Web site as
mentioned earlier. Third, though WikiLeaks itself soon abandoned its initial plan to
work though user-editable “wiki” architecture, there is perhaps something new in the
collective searching power that wiki-type media can harness. That is illustrated by
recent cases in which WikiLeaks-type Web sites have posted prominent German
politicians’ doctoral theses online in an organized and successful search for
plagiarized passages.
Howard, P. N., & Hussain, M. M. (2013). Democracy’s fourth wave?: digital
media and the Arab Spring. Oxford University Press.
Did digital media really “cause” the Arab Spring, or is it an important factor of the
story behind what might become democracy’s fourth wave? An unlikely network of
citizens used digital media to start a cascade of social protest that ultimately toppled
four of the world’s most entrenched dictators. Howard and Hussain find that the
complex causal recipe includes several economic, political and cultural factors, but
that digital media is consistently one of the most important sufficient and necessary
conditions for explaining both the fragility of regimes and the success of social
movements. This book looks at not only the unexpected evolution of events during
the Arab Spring, but the deeper history of creative digital activism throughout the
region.
Huang, J. (2015). Values and Symbolism in Anonymous’s Brand Identity (MA
dissertation, Duke University).
Hacktivism is a portmanteau of computer hacking and activism (Wikipedia). Coined
in 1996 by Omega, a member of cDc, “hacktivism” was linked to Article 19 of the
United Nations Declaration of Human Rights (UNDHR), stating “everyone has the
right to freedom of opinion and expression” (Shantz and Tomblin 63-64). Among all
the hacker collectives that associate themselves with hacktivism, Anonymous, a
leaderless and decentralized group of hackers, might be regarded as the most
33
controversial one. This is because it dabbles in a series of whimsical pranks and
publicity stunts but also deliberate digital attacks against government, religious, and
corporate websites in the name of defending free flow of information and delivering
social justice. In this paper, I will use public media content regarding Anonymous for
my primary sources, including Western mainstream media’s news coverage and
Anonymous’s own social media posts, to analyze the contribution Anonymous has
made to the hacker subculture. Anonymous commits itself to building a
distinguishable brand identity as a defender of freedom of speech, hoping to use its
symbolic values to “[contribute] to a wider political landscape” (Goode 84).
Anonymous’s absence of hierarchy allows anyone who shares the same principles to
partake in online/offline activities and claim its title. Its slogans take on the coloration
of populism, denying self-promotion, demanding greater digital democracy and
serving as an antidote to “cyber-imperialism” (Coleman 391). Plus, Anonymous
excels at using social media to promulgate its values and create counter-narratives.
Although, more often than not, Anonymous adopts legally ambiguous and morally
debatable tactics to hack and expose “wrongdoers,” this leaderless and decentralized
hacker collective has become an unorthodox political and cultural icon of civil
resistance.
Hussain, M. M. (2014). Securing Technologies of Freedom after the Arab Spring:
Policy Entrepreneurship and Norms Consolidation Practices in Internet Freedom
Promotion. Doctoral dissertation (Ph.D.), University of Washington.
https://dlib.lib.washington.edu/researchworks/handle/1773/26059
This dissertation is an investigation of the aftermath of the Arab Spring protests of
2011-2012 and their consequences for impacting contemporary discussions and
efforts to promote “internet freedom” by Western democratic states. This study
focuses on the key stakeholder communities that have emerged to compete, define,
and consolidate the norms and frameworks surrounding internet freedom promotion:
state-based, private sector, and civil society actors. This dissertation also describes the
rise and failed attempt of civil society stakeholders to infuse democratically-oriented
frames for approaching digital infrastructure management with the primary interests
of protecting citizen rights and political activists in autocratic states. The political
economy of global digital infrastructure regulation is also examined, and the positions
of state-based and private sector influences within it are articulated. In doing so, this
study identifies a key tech-savvy community of practice that has delineated the most
comprehensive opportunities and pitfalls of using digital media tools for democracy
promotion, and is struggling to consolidate and enact these practices and norms into
policy frameworks. However, these efforts are cast against the competing interests of
the technology providers in colluding with repressive and democratic state powers to
provide functionally equivalent anti-democratic technocratic capabilities. Thus, this
story is parts network analysis, part policy analysis, and part event analysis.
Throughout, the proto-regime formation approach to technology policy is emphasized
in contrast to existing state-sponsored telecommunications regulatory bodies.
Hussain, M. M. (2014). Digital Infrastructure Politics and Internet Freedom
Stakeholders after the Arab Spring. Journal of International Affairs, 68(1), 37.
34
This article presents a brief characterization of the transformational consequences of
the Arab Spring for global policy frameworks and democracy promotion efforts
regarding Internet infrastructure. To do so, we begin with unpacking the battle that
took place in Dubai in December 2012 at the World Conference on International
Telecommunications (WCIT-12) between competing state powers, technology policy
regimes, and civil society activists jockeying on the global stage to promote Internet
freedom. Particular emphasis is placed on the discourses and controversies carried
over from the Arab Spring surrounding Internet freedom as democracy promotion,
including the growing importance of transnationally-organized and tech-savvy civil
society activists who have joined these opaque policy debates. The next section
focuses on highlighting the new practices and ideologies of this particularly novel
“community of practice” comprising transnational tech-savvy activists who have
joined the Internet freedom proto-regime. The final discussion elucidates the policy
innovations and frameworks born from the interactions of this diverse stakeholder
network since the Arab Spring, and contrasts them with those of the state and private
sector stakeholders who traditionally hold sway in shaping information infrastructure
policies. We conclude by outlining the opportunities and challenges facing these
policy entrepreneurs and the democratic interests of global Internet users.
Hussain, M. M. M. (Ed.). (2014). State power 2.0: Authoritarian entrenchment and
political engagement worldwide. Ashgate Publishing, Ltd.
Digital media and online social networking applications have changed the way in
which dissent is organized with social movement leaders using online applications
and digital content systems to organize collective action, activate local protest groups,
network with international social movements and share their political perspectives. In
the past, authoritarian regimes could control broadcast media in times of political
crisis by destroying newsprint supplies, seizing radio and television stations, and
blocking phone calls. It is much more difficult to control media in the digital age
though there have certainly been occasions when states have successfully shut down
their digital networks. What causes state-powers to block internet access, disable
digital networks or even shut off internet access? How is it done, what is the impact
and how do dissidents attempt to fight back? In this timely and accessible volume a
collection of high profile, international scholars answer these key questions using
cases from Israel, Iran, Russia, Morocco, Vietnam and Kuwait and assess the political
economy of the actors, institutions and regimes involved and effected by the statemanagement and control of digital networks.
Ishkanian, A. (2011). Liberation technology: dreams, politics, history. Open
Democracy.
…Most “cyber-utopians” (as Evgeny Morozov calls them) or “liberation
technologists” (as some refer to themselves) recognise the obstacles in their way: in
particular, that authoritarian regimes are adept at using internet censorship,
surveillance and monitoring to blunt the emancipatory momentum. But they go on to
argue that further technological advances can help circumvent the “the great firewall
of China” and its equivalents.… The United States is playing the leading role globally
in advancing “internet freedom”, reflected in its award of $20 million in 2008-10 to
35
support the work of digital activists. A diplomatic initiative – 21st Century Statecraft
– aims to make diplomacy more innovative by fusing the new technologies with
traditional foreign-policy tools.
… The Program on Liberation Technology seeks to understand how “information
technology can be used to defend human rights, improve governance, empower the
poor, promote economic development, and pursue a variety of other social goods.” It
plans to “evaluate (through experiment and other empirical methods) which
technologies and applications are having greatest success, how those successes can be
replicated, and how less successful technologies and applications can be improved to
deliver real economic, social, and political benefit.”
A project that has human goals at its nominal centre yet focuses on tools and
technologies always runs the risk of technological determinism and indeed fetishism.
Moreover, the prior history of “toolbox” approaches to political change (albeit before
an era when the internet was widespread) enjoins caution over making the discovery
and spread of successful technologies the key to achieving improvements in
governance, development and human rights. It may be also that these technologycentred approaches tend to encourage a context-free and amnesiac attitude that
ignores the experiences even of the very recent past. In any event, the extraordinary
events in the middle east and north Africa fuel the liberation technologists’ euphoria.
Jordan, T., Taylor, P., & Rutledge, L. How, through online activism, can power
be observed in the flow of information and data?.
Juris, J.S. 2008. Networking Futures: the Movements against Corporate
Globalization. Durham, N.C.: Duke University Press.
In an account full of activist voices and on-the-ground detail, Jeffrey provides a
history of anti-corporate globalization movements, an examination of their
connections to local dynamics in Barcelona, and an analysis of movement-related
politics, organizational forms, and decision-making. Depicting spectacular direct
action protests in Barcelona and other cities, he describes how far-flung activist
networks are embodied and how networking politics are performed. He further
explores how activists have used e-mail lists, Web pages, and free software to
organize actions, share information, coordinate at a distance, and stage “electronic
civil disobedience.” Based on a powerful cultural logic, anti-corporate globalization
networks have become models of and for emerging forms of radical, directly
democratic politics. Activists are not only responding to growing poverty, inequality,
and environmental devastation; they are also building social laboratories for the
production of alternative values, discourses, and practices.
Kahn, R., & Kellner, D. (2004). New media and internet activism: From
the’Battle of Seattle’to blogging. New media & society, 6(1), 87-95.
The examples in this article suggest how new media developments in technoculture
make possible a reconfiguring of politics and culture and a refocusing of politics on
everyday life. In this conjuncture, the ideas of Guy Debord and the Situationist
36
International are especially relevant, with their stress on the construction of situations,
use of technology, media of communication, and cultural forms to promote a
revolution of everyday life, and to increase the realm of freedom, community, and
empowerment. The ideas and practices of Debord and the Situationists have a
bewitching afterlife in internet culture and its articulations with the social world. In
summer 2003, new ‘flash mobs’ began emerging in major cities throughout the world,
as groups of individuals answered email summons to appear in specific sites,
coordinated through the use of hand-held GSP tracking systems, to carry out
particular actions. These brief playful encounters, which united new cultural
collectives through the use of the internet, usually involved absurdist interventions
that confused shoppers, security guards, and the media, although many times their
point was simply to liberate an urban space such that prevailing social norms were
challenged and temporarily set aside.
Kahn, R., & Kellner, D. (2005). Oppositional politics and the Internet: A
critical/reconstructive approach. Cultural Politics, 1(1), 75-100.
We argue that the continued growth of the Internet, both as a form of mainstream
media and as a tool for organizing democratic social interactions, requires that
Internet politics be retheorized from a standpoint that is both critical and
reconstructive. While we undertake an approach that is critical of corporate forms and
hegemonic uses of the Internet, we advocate for new software developments such as
blogs and trace the oppositional deployments of the Internet made by a wide variety
of groups in the cause of progressive cultural and political struggle. In this regard, we
describe how the Internet has facilitated the worldwide emergence of the antiglobalization, anti-war and anti-capitalism movements, even as it has coalesced local
communities and groups, and so we conclude that the future of Internet politics must
be thought dialectically as both global and local. We end by noting the relevance of
the ideas of Guy Debord, with his focus on the construction of situations, the use of
technology, media of communication and cultural forms to promote a revolution of
everyday life.
Kapor, M. (1991). Civil liberties in cyberspace. Scientific American, 265(3), 158164.
Kavada, A. (2013). Internet cultures and protest movements: The cultural links
between strategy, organizing and online communication.
Kellner, D. (1997) ‘Intellectuals, the New Public Spheres, and Technopolitics’,
New Political Science 41–42 (Fall): 169–88.
A revitalization of democracy in capitalist societies will therefore require a
democratic media politics. Such a politics could involve a two-fold strategy of, first,
attempting to democratize existing media to make them more responsive to the
“public interest, convenience, and necessity.” In the United States, the media
watchdog group FAIR (Fairness and Accuracy in Media) has developed this
alternative, criticizing mainstream media for failing to assume their democratic and
journalistic responsibilities and calling for an expansion of voices and ideas within the
37
media system. Another strategy involves the development of oppositional media,
alternatives to the mainstream, developed outside of the established media system. On
my view, both strategies are necessary for the development of a democratic media
politics and it is a mistake to pursue one at the neglect of the other.
Kelty C (2008) Two Bits: The Cultural Significance of Free Software. Durham,
NC: Duke University Press.
In Two Bits, Christopher M. Kelty investigates the history and cultural significance of
Free Software, revealing the people and practices that have transformed not only
software but also music, film, science, and education. Free Software is a set of
practices devoted to the collaborative creation of software source code that is made
openly and freely available through an unconventional use of copyright law. Kelty
explains how these specific practices have reoriented the relations of power around
the creation, dissemination, and authorization of all kinds of knowledge. He also
makes an important contribution to discussions of public spheres and social
imaginaries by demonstrating how Free Software is a “recursive public”—a public
organized around the ability to build, modify, and maintain the very infrastructure that
gives it life in the first place.
Knight, S. 2013. Icelandic Activist Birgitta Jónsdóttir Reveals How WikiLeaks
Changed Her Country Forever, Takepart.com, 17 October 2013,
http://www.takepart.com/article/2013/10/17/how-wikileaks-changed-my-countryforever
In 2010, Jónsdóttir and like-minded colleagues introduced legislation in Parliament
for transparency reforms and journalist protection— the Icelandic Modern Media
Initiative (IMMI). It and other innovative post-collapse reforms – an attempt at a new
constitution, drafted using crowdsourced techniques; websites designed to get the city
of Reykjavik and parliament to address popular proposals; an anonymous online
submission form for whistleblowers who want to connect with journalists; and others
—drew attention to Iceland as an alternative to the post-collapse reforms (or lack
thereof) in the U.S. and Europe.
Konieczny, P. (2014). The day Wikipedia stood still: Wikipedia’s editors’
participation in the 2012 anti-SOPA protests as a case study of online
organization empowering international and national political opportunity
structures. Current Sociology, 62(7), 994-1016.
This article contributes to the discussions on Internet mobilization and on
international social movements’ ability to influence national policy. The event studied
is the ‘first Internet strike’ of 18 January 2012 aimed against the SOPA legislation
proposed in the USA. Wikipedia’s volunteer editors from all around the world took
part in the vote concerning whether Wikipedia should undertake a protest action
aimed at influencing American policymakers. Wikipedia editors are shown to share
values of the international free culture movement, though experienced editors were
also likely to be conflicted about whether taking part in a protest action was not
violating the site’s principle of encyclopedic neutrality. Further, Wikipedia’s
38
participation in this protest action allowed non-US citizens to have a visible impact on
the US national legislation. As such, Wikipedia can be seen as an international social
movement organization, whose 24 hour-long blackout of its popular website was a
major factor in the success of the anti-SOPA protests. Wikipedia’s blackout was an
expression of an international political opportunity structure in the form of worldwide
awareness and protests, which in turn enabled a national political opportunity
structure by informing and mobilizing American citizens.
Krotoski, A. (2011). WikiLeaks and the new, transparent world order. The
Political Quarterly, 82(4), 526-530.
Kubitschko, S. (2015). Media practices of civil society organisations: Emerging
paths to legitimation and long-term engagement (Doctoral dissertation).
In this thesis I wish to analyse the complex relationship between actors’ mediarelated practices, legitimacy and long-term engagement. Based on a qualitative
approach my research investigates two cases –Citizens for Europe, a civil society
organisations involved in issues relating to European citizenship, and the Chaos
Computer Club, one of the world’s oldest and largest hacker organisations. More
concretely, through face-to-face interviews, participant observation and media
analysis I analyse the role media practices play for the two organisations to establish
legitimation and to sustain their political engagement over time. Accordingly, my
thesis seeks to provide an empirically informed interpretive account of the meaning
media-related practices have for actors’ political endeavours. From a more
operationalised perspective, I am trying to make a convincing argument that practices
circulating around and oriented towards media technologies and infrastructures play a
configurative role for actors’ ability to co-determine democratic constellations.
Instead of suggesting a straightforward causal chain my thesis conceptualises the
entanglements between media practices, legitimation and long-term engagement as
interlocking arrangements grounded in relational dynamics. Overall, my thesis aims
to compliment existing research on the role media technologies and infrastructures
play for the formation of political arrangements by looking at organisation-based
engagement. In doing so, my research partially bridges a current research gap
concerning the relationship between organisational actors’ media-related practices
and their ability to establish legitimacy and to perpetuate political engagement over
time.
Kubitschko, S. (2015). Hackers’ media practices Demonstrating and articulating
expertise as interlocking arrangements. Convergence: The International Journal
of Research into New Media Technologies, 1354856515579847.
The increased level of technical abstractness poses a challenge for laypersons and
politicians alike to notice the political impacts specific technical developments might
bring. By presenting qualitative research on Europe’s oldest and one of the world’s
largest hacker organizations – the Chaos Computer Club (CCC) – the article shows
that the CCC acts as a civil society organization that brings together a wide range of
knowledge, skills and experiences related to media technologies and infrastructures.
By deconstructing the abstractness of a given technology, the CCC materializes its
39
formerly unrecognized political quality. Yet, the political endeavour of closing the
expert-public gap, in the interests of public democracy, is only brought to life once
the outcomes of a particular hack are communicated in comprehensible manners to
diverse publics and audiences. Overall the article points to the emergence of new
modes and practices of expertise by conceptualizing the Club’s active demonstration
of expertise through hacking and its articulation of expertise through media-related
practices and interactions with institutional politics as interlocking arrangements.
Today, hackers – and in particular hacker organizations – are best considered actors
whose skills, knowledge and experiences are ever more relevant for political cultures
and democracy at large.
Land, Molly K. and Meier, Patrick and Belinsky, Mark and Jacobi, Emily,
#ICT4HR: Information and Communication Technologies for Human Rights.
World Bank Institute, Nordic Trust Fund, Open Development Technology
Alliance, and ICT4Gov, November 2012. Available at SSRN:
http://ssrn.com/abstract=2178484
New technologies have been heralded as revolutionizing activism and government,
providing a means for citizens to engage with others and with their government faster
and more simply than ever before. The purpose of this report is to analyze the impact
of new technologies on human rights. Using case studies largely from three countries,
Kenya, the Democratic Republic of Congo, and the Dominican Republic, the report
considers both the opportunities and risks presented by new technologies for human
rights.
The report concludes there are benefits that can be realized through the deployment of
new technologies in human rights projects. New technologies offer the potential to
reduce the cost of collecting information about human rights issues and to increase
participation in human rights advocacy efforts. Each of these possible benefits,
however, gives rise to new risks and challenges. Although new technologies can
reduce the cost of information gathering, it can be difficult to ensure the accuracy of
the information generated. The involvement of ordinary individuals in collecting
information also presents particular challenges for security, because these individuals
may lack the necessary training or professional protocols for assessing and taking
measures to ensure security. Managing these risks is complicated by a tension
between the approaches of human rights and technology experts. For example, the
values of the technology field — a willingness to experiment and “to fail, adopt, and
iterate” — can be in some tension with the need to develop considered and reasoned
security protocols ahead of time. In other words, while hacking is an iterative process,
security is not.
The report concludes by presenting several recommendations designed to respond at
least in part to the human rights risks identified in the report. The report does not
purport to provide a blueprint for all projects seeking to employ new technologies in
furtherance of human rights or development goals. The challenges that arise in any
particular project will be context specific and beyond the scope of this report. Rather,
the report seeks to identify, in a preliminary manner, some of the questions that might
40
be asked at the outset in order to respond to concerns about accuracy, security, and
participation.
Landorf, Brittany, “Female Reverberations Online: An Analysis of Tunisian,
Egyptian, and Moroccan Female Cyberactivism During the Arab Spring” (2014).
International Studies Honors Projects. Paper 20.
http://digitalcommons.macalester.edu/intlstudies_honors/20
Digital technologies and social media networks have the potential to open new
platforms for women in the public domain. During the 2011 Arab Spring revolutions,
female cyberactivists used digital technologies to participate in and at times led
protests. This thesis examines how Tunisian, Egyptian, and Moroccan female
cyberactivists deployed social media networks to write a new body politic online. It
argues throughout that female activists turned to online activism to disrupt gender
relations in their countries and demand social, religious, economic, and political
gender parity.
Langman, L. (2005). From Virtual Public Spheres to Global Justice: A Critical
Theory of Internetworked Social Movements*. Sociological Theory, 23(1), 42-74.
From the early 1990s when the EZLN (the Zapatistas), led by Subcommandte
Marcos, first made use of the Internet to the late 1990s with the defeat of the
Multilateral Agreement on Trade and Investment and the anti-WTO protests in
Seattle, Quebec, and Genoa, it became evident that new, qualitatively different kinds
of social protest movements were emergent. These new movements seemed diffuse
and unstructured, yet at the same time, they forged unlikely coalitions of labor,
environmentalists, feminists, peace, and global social justice activists collectively
critical of the adversities of neoliberal globalization and its associated militarism.
Moreover, the rapid emergence and worldwide proliferation of these movements,
organized and coordinated through the Internet, raised a number of questions that
require rethinking social movement theory. Specifically, the electronic networks that
made contemporary globalization possible also led to the emergence of “virtual public
spheres” and, in turn, “Internetworked Social Movements.” Social movement theory
has typically focused on local structures, leadership, recruitment, political
opportunities, and strategies from framing issues to orchestrating protests. While this
tradition still offers valuable insights, we need to examine unique aspects of
globalization that prompt such mobilizations, as well as their democratic methods of
participatory organization and clever use of electronic media. Moreover, their
emancipatory interests become obscured by the “objective” methods of social science
whose “neutrality” belies a tacit assent to the status quo. It will be argued that the
Frankfurt School of Critical Theory offers a multi-level, multi-disciplinary approach
that considers the role of literacy and media in fostering modernist bourgeois
movements as well as anti-modernist fascist movements. This theoretical tradition
offers a contemporary framework in which legitimacy crises are discussed and
participants arrive at consensual truth claims; in this process, new forms of
empowered, activist identities are fostered and negotiated that impel cyberactivism.
41
Le Monde, May 2015, Comment Berlin est devenue la capitale des hackers.
Publié le 16-05-2015
La capitale allemande est devenue un passage obligé des hackers et activistes du net,
en s’imposant comme une anti-Silicon Valley.
http://tempsreel.nouvelobs.com/monde/20150513.OBS8924/comment-berlin-estdevenu-berlin-la-capitale-des-hackers.html
Lessig, L. 2004. Free culture: how big media uses technology and the law to lock
down culture and control creativity. New York: Penguin Press.
This is the third book by Stanford law professor Larry Lessig, and the third now in
which he furthers his basic theme: that the ancien regime of intellectual property
owners is locked in a battle with the capabilities of new technology. Lessig used his
first book, Code and Other Laws of Cyberspace (Basic Books, 1999), to explain that
the notion of cyberspace as free, open, and anarchic is simply a myth, and a
dangerous one at that: the very architecture of our computers and how they
communicate determine what one can and cannot do within that environment. If you
can get control of that architecture, say by mandating filters on content, you can get
substantial control over the culture of that communication space. In his second book,
The Future of Ideas: the Fate of the Commons in a Connected World (Random
House, 2001), Lessig describes how the change from real property to virtual property
actually means more opportunity for control, not less. The theme that he takes up in
Free Culture is his concern that certain powerful interests in our society (read:
Hollywood) are using copyright law to lock down the very stuff of creativity: mainly,
past creativity. http://www.kcoyle.net/free_culture.html
Lessig, L. 2009. “Et tu, KK? (aka, No, Kevin, this is not ‘socialism’),” Lessig Blog
(28 May). at
http://www.lessig.org/blog/2009/05/et_tu_kk_aka_no_kevin_this_is.html
Lewis, S. C., & Usher, N. (2014). Code, collaboration, and the future of
journalism: A case study of the Hacks/Hackers global network. Digital
Journalism, 2(3), 383-393.
Amid the rise of computational and data-driven forms of journalism, it is important to
consider the institutions, interactions, and processes that aim to help the social worlds
of journalism and technology come together and collaborate around a common cause
of news innovation. This paper examines one of the most prominent such efforts: the
transnational grassroots organization called Hacks/Hackers. Through a two-year
qualitative case study, we sought to understand just how journalists and technologists
would engage through this organization: what kinds of interactions would occur, and
what factors might facilitate collaboration? Drawing upon the science and technology
studies concept of “trading zones,” we examine how Hacks/Hackers functions as an
informal and transitory trading zone through which journalists and technologists can
casually meet and coordinate. The level of engagement between the two groups, we
found, depends on a set of social and structural factors, including institutional support
and the leadership of key volunteers, and the depth of that engagement depends on
42
sufficient mutual understanding among journalists and hackers. We discuss the
implications of these findings for understanding the challenges and opportunities
presented through the intersection of journalism and technology.
Lim, M. (2013) Framing Bouazizi: ‘White lies’, hybrid network, and
collective/connective action in the 2010–11 Tunisian uprising. Journalism, 14(7),
921-941.
By delving into the detailed account of the Tunisian uprising, this article offers an
explanation that sets the 2010 uprising apart from its precursors. The 2010 uprising
was successful because activists successfully managed to bridge geographical and
class divides as well as to converge offline and online activisms. Such connection and
convergence were made possible, first, through the availability of dramatic visual
evidence that turned a local incident into a spectacle. Second, by successful frame
alignment with a master narrative that culturally and politically resonated with the
entire population. Third, by activating a hybrid network made of the connective
structures to facilitate collective action – among Tunisians who shared collective
identities and collective frames – and connective action – among individuals who
sought more personalized paths to contribute to the movement through digital media.
Activism, Arab Spring, Bouazizi, collective action, framing, networks, social media,
social movement, Tunisia
Löblich, M. (2015). Dissent and Political Participation: The Many Faces of
Communication Policy Advocacy and Activism. Communication, Culture &
Critique.
This article deals with dissent among political civil society organizations in
communication policy. The research question is why these organizations ended up
being on different sides of the debate on rules regarding net neutrality in the United
States. Rationales, goals, routines, and resources are examined based on Anthony
Giddens’s theory of structuration. This study focuses on the Federal Communications
Commission’s Open Internet proceeding, and draws on interviews with 13
organizations and document analyses. A group portrait, a typology, and influencing
factors provide information as to why different priorities were attributed to net
neutrality and why this concept did not become a unifying theme among civil
advocacy and activist organizations.
A typology helped to identify the different positions in the Open Internet proceeding.
Criteria for type construction were developed during data analysis (Kluge, 2000). The
importance of net neutrality rules for organizations was chosen as one criterion, and
organizations’ core concerns as second. The first criterion aimed to address the
research question, while the second criterion was selected because organizations
distinguished themselves through their core concern for either media structures or
social structures. The importance of net neutrality rules was rated on one of three
levels (important, neither important nor unimportant, unimportant). The core concern
was labeled either as “media structure,” “both media structures and social structures,”
or “social structures.” Some organizations were exclusively engaged in changing
media structures, some saw changing social structures as linked to changing media
43
and communication structures, and others’ core concerns were social structures and
media were only one issue among many others. These two criteria created an attribute
space (Kluge, 2000) by which organizations were grouped in four types (see Figure
1).
Figure 1. Attribute Space. Note. The Believers: Open Technology Institute, Free
Press, Public Knowledge, Media Access Project, The Mobilizers: Media Action
Grassroots Network, Center for Rural Strategies, United Church of Christ/Office of
Communication, National Hispanic Media Coalition; The Reframers: League of
United Latin American Citizens, the National Association for the Advancement of
Colored People, Asian American Justice Center, Minority Media and
Telecommunications Council; The Cyber Enthusiast: Electronic Frontier Foundation
… The Cyber Enthusiast
This type consists of the EFF. The EFF is not a DC insider, did not deeply participate
in the Open Internet proceeding, and did not support the FCC’s proposed rules. At
first glance, its objection was surprising, because in 2007 the digital liberties’
organization, together with the Associated Press, revealed that Comcast had been
secretly interfering with bit-torrent traffic (Lasar, 2010). The EFF’s legal director
believes that the “Internet needs to be dumb pipes,” yet she was “not happy with the
solutions” proposed by the FCC. In its comment to the proceeding, the EFF contested
the FCC’s statutory authority and feared “unprecedented overreach […] also in a host
of other areas” (EFF, 2010, p. 7).
The EFF was founded in 1990 to protect free expression in the digital realm against
state surveillance. It regards the government as a major threat to communications
rights on the Internet (EFF, n.d.). The organization is rooted in cyber-libertarian
enthusiasm. Its mistrust in the political system in general—the legal director
described the U.S. congress as “completely broken”—and in the net neutrality rules in
particular has to do with Silicon Valley, where the organization has a large portion of
its membership. In its early years, the EFF had its headquarters on the East Coast, but
soon moved to California and became a “litigation shop.” The “pressure to sell out
four things in order to get one thing is very great if you are a DC player,” explained
the legal director. The response to the EFF’s policy work inside the Beltway
represented “a very clear answer” by its members. The legal director reported that the
“set of values out here [in the Bay Area]” are very different than on the East Coast
(see Turner, 2005). Against this background, it is not surprising that the group has
been particularly concerned about innovators and content creators (EFF, 2010).
Loveluck, B. (2015). Internet, une société contre l’Etat? Libéralisme
informationnel et économies politiques de l’auto-organisation en régime
numérique. Réseaux. Communication-technologie-société, (192), 35p.
L’informatique en réseau a souvent été présentée comme un instrument favorisant
l’auto-organisation de la société civile, à partir de modes alternatifs de distribution du
pouvoir et de coordination des activités. L’histoire d’internet, abordée du point de vue
de l’histoire des idées, montre que de telles propriétés ont donné lieu à la formation
44
d’une véritable philosophie politique que nous avons appelée le libéralisme
informationnel. Celle-ci a vu différents modèles d’économie politique s’affronter ;
nous en présentons ici le mouvement général ainsi que les divergences internes. Nous
terminons par un exposé de trois grandes formes de gouvernementalité qui en sont
issues, et qui ouvrent à une critique de l’économie politique en régime numérique : la
captation, la dissémination et l’auto-institution.
Ludlow, Peter. 2001. Crypto anarchy, cyberstates, and pirate utopias. MIT Press.
Peter Ludlow extends the approach he used so successfully in High Noon on the
Electronic Frontier, offering a collection of writings that reflects the eclectic nature of
the online world, as well as its tremendous energy and creativity. This time the
subject is the emergence of governance structures within online communities and the
visions of political sovereignty shaping some of those communities. Ludlow views
virtual communities as laboratories for conducting experiments in the construction of
new societies and governance structures. While many online experiments will fail,
Ludlow argues that given the synergy of the online world, new and superior
governance structures may emerge. Indeed, utopian visions are not out of place,
provided that we understand the new utopias to be fleeting localized “islands in the
Net” and not permanent institutions.
The book is organized in five sections. The first section considers the sovereignty of
the Internet. The second section asks how widespread access to resources such as
Pretty Good Privacy and anonymous remailers allows the possibility of “Crypto
Anarchy”—essentially carving out space for activities that lie outside the purview of
nation states and other traditional powers. The third section shows how the growth of
e-commerce is raising questions of legal jurisdiction and taxation for which the
geographic boundaries of nation-states are obsolete. The fourth section looks at
specific experimental governance structures evolved by online communities. The fifth
section considers utopian and anti-utopian visions for cyberspace. Contributors:
Richard Barbrook, John Perry Barlow, William E. Baugh Jr., David S. Bennahum,
Hakim Bey, David Brin, Andy Cameron, Dorothy E. Denning, Mark Dery, Kevin
Doyle, Duncan Frissell, Eric Hughes, Karrie Jacobs, David Johnson, Peter Ludlow,
Timothy C. May, Jennifer L. Mnookin, Nathan Newman, David G. Post, Jedediah S.
Purdy, Charles J. Stivale
Lynch, L. (2010). ““We’re Going to Crack the World Open”: Wikileaks and the
future of investigative reporting,” Journalism Practice, 4(3): 309-318.
This paper considers the current and future role played by the document-leaking site
Wikileaks in the process of investigative journalism, by analyzing the way in which
Wikileaks has articulated its own relationship with the press and then detailing how
reporters have actually discovered and used the site. My research shows that
Wikileaks is used both as a regular destination and as a one-time source for leaked
material; additionally, it is increasingly used as a repository for leaked documents that
are removed from print and online media outlets through legal action. I argue
Wikileaks represents perhaps the most extreme of a number of new Web-based
45
interventions into the troubled climate for investigative reporting, and might usefully
be seen less as an “outlier” than as on the far end of continuum.
MacKinnon, R. (2005, January). Blogging, journalism, and credibility:
Battleground and common ground. In Report from a conference held January
(pp. 21-22).
[A] conference held in late January [2005] at Harvard, at which a group of 50
journalists, bloggers, news executives, media scholars, and librarians sat down to try
and make sense of the new emerging media environment. Since the conference, the
resignation of CNN’s Eason Jordan and the Jeff Gannon White House incident have
shown how powerful weblogs can be as a new form of citizens’ media. We are
entering a new era in which professionals have lost control over information . not just
the reporting of it, but also the framing of what’s important for the public to know. To
what extent have blogs chipped away at the credibility of mainstream media? Is
credibility a zero-sum game . in which credibility gained by blogs is lost by
mainstream media and vice versa?
MacKinnon, R. (2011). China’s” networked authoritarianism”. Journal of
Democracy, 22(2), 32-46.
While social networking platforms can be powerful tools in the hands of activists
seeking to bring down authoritarian governments, it is unwise to assume that access to
the Internet and social networking platforms alone is sufficient for democratization of
repressive regimes. The case of China demonstrates how authoritarian regimes can
adapt to the Internet, even using networked technologies to bolster legitimacy. The
emergence of Chinese “networked authoritarianism” highlights difficult issues of
policy and corporate responsibility that must be resolved in order to ensure that the
Internet and mobile technologies can fulfill their potential to support liberation and
empowerment.
MacKinnon, R. 2012. Consent of the Networked: The Struggle for Internet
Freedom, Basic Books: New York, 2012.
In the early days of the web, some hoped that these two worlds [online and offline]
would simply stay apart. In 1996, civil libertarian John Perry Barlow wrote ‘A
Declaration of the Independence of Cyberspace’, which demanded that the
governments of the physical world not impinge on the freedom of the digital one. Yet
governments and corporations did impinge, with laws, law suits, and censorship.
Books by Lawrence Lessig, Shanthi Kalathil and Taylor Boas, Ronald Deibert, and
Jonathan Zittrain described how the Internet was regulated, legislated, divided, and
monitored. Soon the freedom of the Internet was no longer a fact, but a fragile quality.
Almost 15 years later, in 2010, Secretary of State Clinton gave a speech, which
proposed that the US government should promote a free Internet because it had the
power to democratize societies by freeing their citizens to publicly dissent and
organize. In 2011, journalist Evgeny Morozov made a big splash with his book The
Net Delusion , which directly challenged this argument. Morozov counter-argued that
46
the Internet does not particularly empower citizens, and perhaps even empowers
repressive governments more through surveillance, propaganda, and censorship.
A year later Rebecca MacKinnon has again shifted the discourse: yes, the Internet
does have the capacity to empower citizens and thus increase and improve
democracy, but that civic power is under existential threat. MacKinnon also breaks
new ground by highlighting the tremendous importance of private firms in
determining the political nature of the Internet. Google, Facebook, and their peers
have been kind enough to have ‘created a new, globally networked public sphere’, she
notes, but that supposedly public sphere is ‘largely shaped, built, owned, and operated
by the private sector’ (p. 9). This fact poses a political threat as ‘Internet and
telecommunication companies have gained far too much power over citizens’ lives, in
ways that are insufficiently transparent or accountable to public interest’ (p. 10).
One of her most interesting ideas is that of ‘networked authoritarianism’, the
observation that a society’s citizens can be connected to one another and yet remain
unfree. China, on which she is an expert, is surely the most skilled practitioner of this
new form of governance. ‘Herein lies the paradox of the Chinese Internet’, she writes.
‘Public debate and even some forms of activism are expanding’ while ‘state controls
and manipulation tactics have prevented democracy movements from gaining
meaningful traction’ (p. 42).
MacKinnon, R. (2012). The netizen. Development, 55(2), 201-204.
Rebecca MacKinnon argues that it is no longer sufficient for people to assert their
rights and responsibilities as citizens of nation-states. If the goals of global social
justice and accountable governance are to be served, people now also need to assert
their rights and responsibilities as netizens: citizens of a globally connected Internet.
Keywords: Internet; digital civil society; citizen commons; cyberspace; accountable
governance
MacKinnon, R. (2012). Rights online. Index on Censorship, 41(1), 114-115.
A manifesto by a leading digital rights campaigner and journalist.
McCarthy, S. 2012. “Mosquitoes with cannons,” SmáriMcCarthy.com (22
January), at http://www.smarimccarthy.is/2012/01/mosquitoes-with-canons/
I’m not much of a cyberlibertarian, but I have a soft spot for them. They had a few
things right, even if suffering from frontier blindness: the overarching belief of those
at the frontier of human development is always that they are untouchable. History
creeps up on them in their sleep. John Perry Barlow was unequivocal in his righteous
demand for sovereignty and independence for Cyberspace, he foresaw that nation
states were inherently incapable of existing in a post-territorial communications
space. And yet somehow, due to a splendid mix of cronyism, corruption, greed and
stealth, we’ve found ourselves in the situation that national interests have strong
armed the debate on a field of physical infrastructure and border-theoretical
governance.
47
The Internet is no longer free from incursion from nation states, so anything that can
be understood through the delineation of national borders, encapsulated in national
interests, or affected through national political processes can affect the Internet
directly. Being on the defensive is not going to be a winning strategy. Money just got
tight: there’s only so much blackouting we can survive.
So let’s go on the offensive. Instead of having traditional politics interfere with the
Internet, it’s time for the Internet to interfere with traditional politics. The various
Pirate Parties have moved us part of the way towards establishing a theory of
networked information politics, but it’s nowhere near complete. There are a lot of
deep fundamental questions that still need to be asked, and a lot of it’s going to
require some deep philosophical navel gazing. But I think we can do it.
Not really because I have a problem with the copyright mafia, even though I do.
Much more because I’ve been watching meatspace politicians and their bankrupt
ideologies take humanity out for too many rodeos. They’ve long since outstayed their
welcome, and they must be ousted. Networked politics, information politics, is the
way to fix things. Who else is in favor of aiming our cannons at bigger targets, and
quitting with the grapeshot?
Maclay, C. M. (2010). Protecting Privacy and Expression Online Can the Global
Network Initiative Embrace the Character of the Net?. Access controlled: The
shaping of power, rights, and rule in cyberspace, 87-108.
… a nascent multistakeholder effort called the Global Network Initiative (GNI), of
which Yahoo! is a founding member. Participants evaluate human rights risks and
seek opportunities to mitigate them when considering whether and how to enter a new
market, [e.g. Vietnam in the case of Yahoo!]. Yahoo!’s motivations were likely
diverse, but the actions were aligned with their mission, corporate health and
profitability, and the preferences of at least some shareholders.
Global Network Initiative participants include ICT companies, nongovernmental
organizations, investors, and academics. The founding group of companies comprises
Google, Microsoft, and Yahoo!. Academic participants in the GNI are Annenberg
School for Communication (University of Southern California); Deirdre Mulligan,
Berkeley School of Information (University of California); Berkman Center for
Internet and Society (Harvard University); Rebecca MacKinnon, Journalism and
Media Studies Centre (University of Hong Kong); and Research Center for
Information Law (University of St. Gallen). Investors participating in the GNI are
Boston Common Asset Management, Calvert Group, Domini Social Investments
LLC, F&C Asset Management, KLD Research & Analytics, Inc., and Trillium Asset
Management. Nongovernmental organizations participating in the GNI are Center for
Democracy and Technology, Committee to Protect Journalists, Electronic Frontier
Foundation, Human Rights First, Human Rights in China, Human Rights Watch,
International Business Leaders Forum, Internews, and World Press Freedom
Committee. The United Nations Special Representative to the Secretary General on
business and human rights enjoys observer status. The drafting group also included
48
Amnesty International, Reporters Without Borders, France Telecom, Teliasonera, and
Vodafone, none of whom continued to participate in the GNI after launch.
McAfee, N. (2005). Insights for the Future of Public Media: A Report on the
Global Voices Summit. Center for Social Media.
http://www.cmsimpact.org/sites/default/files/documents/pages/mcafeegv05report.
pdf
[Global Voices is] a community with a history less than a year old, a community
without any physical borders (though it is grappling with linguistic ones). This is a
community spread across the globe of people who communicate virtually. It is the
world of Global Voices http://www.globalvoicesonline.org, an online website that
“rounds up” what’s happening in the blogospheres of various parts of the mostly
developing world. It is a blog that takes visitors outward to other blogs, transports
people to the conversation going on in the Middle East, Sub-Saharan Africa, the
Americas, Eurasia, Asia, and the Pacific.
Global Voices was conceived at a meeting in December 2004 at Harvard Law
School’s Berkman Center for Internet & Society. (Rebecca MacKinnon’s report from
that meeting can be found at http://www.personaldemocracy.com/node/208). That
meeting brought together bloggers and scholars from around the world who began
thinking about how to take a nascent, decentralized movement and harness it into a
forum for creating a truly global conversation. The conversation was going on
already, in bits and pieces; the website of Global Voices made it possible to connect
the conversations. [See also Global Voices 2015 summit report below].
McDonald, K. (2015). From Indymedia to Anonymous: rethinking action and
identity in digital cultures. Information, Communication & Society, (ahead-ofprint), 1-15.
The period following the social mobilizations of 2011 has seen a renewed focus on
the place of communication in collective action, linked to the increasing importance
of digital communications. Framed in terms of personalized ‘connective action’ or the
social morphology of networks, these analyses have criticized previously dominant
models of ‘collective identity’, arguing that collective action needs to be understood
as ‘digital networking’. These influential approaches have been significantly
constructed as a response to models of communication and action evident in the rise
of Independent Media Centres in the period following 1999. After considering the rise
of the ‘digital networking’ paradigm linked to analyses of Indymedia, this article
considers the emergence of the internet-based collaboration known as Anonymous,
focusing on its origins on the 4chan manga site and its 2008 campaign against
Scientology, and also considers the ‘I am the 99%’ microblog that emerged as part of
the Occupy movement. The emergence of Anonymous highlights dimensions of
digital culture such as the ephemeral, the importance of memes, an ethic of lulz, the
mask and the grotesque. These forms of communication are discussed in the light of
dominant attempts to shape digital space in terms of radical transparency, the
knowable and the calculable. It is argued that these contrasting approaches may
amount to opposing social models of an emerging information society, and that the
49
analysis of contemporary conflicts and mobilizations needs to be alert to novel forms
of communicative practice at work in digital cultures today.
Meier, P. (2010) Is Ushahidi a Liberation Technology? iRevolutions,
http://irevolution.net/2010/08/08/ushahidi-liberation-tech/
…What is Liberation Technology? Larry [Diamond] defines this technology as, “…
any form of information and communication technology (ICT) that can expand
political, social, and economic freedom. In the contemporary era, it means essentially
the modern, interrelated forms of digital ICT—the computer, the Internet, the mobile
phone, and countless innovative applications for them, including “new social media”
such as Facebook and Twitter.”
As is perfectly well known, however, technology can also be used to repress. This
should not be breaking news. Liberation Technology vs Digital Repression. My
dissertation describes this competition as an arms-race, a cyber game of cat-andmouse. But the technology variable is not the most critical piece, as I argue in this
recent Newsweek article:
“The technology variable doesn’t matter the most,” says Patrick Meier […] “It is the
organizational structure that will matter the most. Rigid structures are unable to adapt
as quickly to a rapidly changing environment as a decentralized system. Ultimately, it
is a battle of organizational theory.”
Larry rightly notes that, “In the end, technology is merely a tool, open to both noble
and nefarious purposes. Just as radio and TV could be vehicles of information
pluralism and rational debate, so they could also be commandeered by totalitarian
regimes for fanatical mobilization and total state control. Authoritarian states could
commandeer digital ICT to a similar effect. Yet to the extent that innovative citizens
can improve and better use these tools, they can bring authoritarianism down—as in
several cases they have.”
A bold statement for sure. But as Larry recognizes, it is particularly challenging to
disentangle political, social and technology factors. This is why more empirical
research is needed in this space which is largely limited to qualitative case-studies.
We need to bring mixed-methods research to the study of digital activism in
repressive environments. This is why I’m part of the Meta-Activism Project (MAP)
and why I’m particularly excited to be collaborating on the development of a Global
Digital Activism Dataset (GDADS).
Larry writes that Liberation Technology is also “Accountability Technology” in that
“it provides efficient and powerful tools for transparency and monitoring.” This is
where he describes the FrontlineSMS and Ushahidi platforms. In some respects, these
tools have already served as liberation technologies. The question is, will innovative
citizens improve these tools and use them more effectively to be able to bring down
dictators? I’d love to know your thoughts.
50
Meier, P. (2011) Do “Liberation Technologies” Change the Balance of Power
Between Repressive States and Civil Society? Ph.D. thesis, Fletcher School of Law
and Diplomacy. https://irevolution.files.wordpress.com/2011/11/meierdissertation-final.pdf
Do new information and communication technologies (ICTs) empower repressive
regimes at the expense of civil society, or vice versa? For example, does access to the
Internet and mobile phones alter the balance of power between repressive regimes and
civil society? These questions are especially pertinent today given the role that ICTs
played during this year’s uprisings in Tunisia, Egypt and beyond. Indeed, as one
Egyptian activist stated, “We use Facebook to schedule our protests, Twitter to
coordinate and YouTube to tell the world.” But do these new ICTs—so called
“liberation technologies”—really threaten repressive rule? The purpose of this
dissertation is to use mixed-methods research to answer these questions.
The first half of my doctoral study comprised a large-N econometric analysis to test
whether “liberation technologies” are a statistically significant predictor of antigovernment protests in countries with repressive regimes. If using the Internet and
mobile phones facilitates organization, mobilization and coordina-tion, then one
should expect a discernible link between an increase in access to ICTs and the
frequency of protests—particularly in repressive states. The results of the quantitative
analysis were combined with other selection criteria to identify two country case
studies for further qualitative comparative analysis: Egypt and the Sudan.
The second half of the dissertation assesses the impact of “liberation technologies”
during the Egyptian Parliamentary Elections and Sudanese Presidential Elections of
2010. The analysis focused specifically on the use of Ushahidi—a platform often
referred to as a “liberation technology.” Descriptive analysis, process tracing and
semi-structured interviews were carried out for each case study. The results of the
quantitative and qualitative analyses were mixed. An increase in mobile phone access
was associated with a decrease in protests for four of the five regression models. Only
in one model was an increase in Internet access associated with an increase in antigovernment protests. As for Ushahidi, the Egyptian and Sudanese dictatorships were
indeed threatened by the technology because it challenged the status quo. Evidence
suggests that this challenge tipped the balance of power marginally in favor of civil
society in Egypt, but not in the Sudan, and overall not significantly.
Meier, P. (2012). Ushahidi as a liberation technology. In Liberation technology:
Social media and the struggle for democracy, 95-109.
… Focusing on the Ushahidi platform also facilitates the study of concrete uses of
social media, such as election monitoring. Elsewhere in this volume, Larry Diamond
has referred to the Ushahidi platform as an example of a liberation and accountability
technology.What is missing, however, is research to support these claims. …UShahid helped to reverse or at least fight back against this government-constructed
panopticon, and this may have helped to pave the way for the 2011 revolution that
toppled Mubarak. The Egyptian case demonstrates the value of geomapping as an
important liberation technology.
51
Mejias, U. A. (2012). FCJ-147 Liberation Technology and the Arab Spring:
From Utopia to Atopia and Beyond. The Fibreculture Journal, (20 2012:
Networked Utopias and Speculative Futures).
While the tendency in the West to refer to the Arab Spring movements as ‘Twitter
Revolutions’ has passed, a liberal discourse of ‘liberation technology’ (information
and communication technologies that empower grassroots movements) continues to
influence our ideas about networked participation. Unfortunately, this utopian
discourse tends to circumvent any discussion of the capitalist market structure in
which these tools operate. In this paper, I suggest that liberation technologies may in
fact increase opportunities for political participation, but that they simultaneously
create certain kinds of inequalities. I end by proposing a theoretical framework for
locating alternative practices of participation and liberation.
Monterde, A., M. Aguilera, X. Barandiaran, A. Calleja-Lopez, J. Postill 2015.
Multitudinous identities: a qualitative and network analysis of the 15M collective
identity, Information, Communication and Society. Vol. 18, Iss. 8.
The emergence of network-movements since 2011 has opened the debate around the
way in which social media and networked practices make possible innovative forms
of collective identity. We briefly review the literature on social movements and
‘collective identity’, and show the tension between different positions stressing either
organization or culture, the personal or the collective, aggregative or networking
logics. We argue that the 15M (indignados) network-movement in Spain demands
conceptual and methodological innovations. Its rapid emergence, endurance,
diversity, multifaceted development and adaptive capacity, posit numerous theoretical
and methodological challenges. We show how the use of structural and dynamic
analysis of interaction networks (in combination with qualitative data) is a valuable
tool to track the shape and change of what we term the ‘systemic dimension’ of
collective identities in network-movements. In particular, we introduce a novel
method for synchrony detection in Facebook activity to identify the distributed, yet
integrated, coordinated activity behind collective identities. Applying this analytical
strategy to the 15M movement, we show how it displays a specific form of systemic
collective identity we call ‘multitudinous identity’, characterized by social
transversality and internal heterogeneity, as well as a transient and distributed
leadership driven by action initiatives. Our approach attends to the role of distributed
interaction and transient leadership at a mesoscale level of organizational dynamics,
which may contribute to contemporary discussions of collective identity in networkmovements.
Morin, J. F. (2014). Paradigm shift in the global IP regime: The agency of
academics. Review of international political economy, 21(2), 275-309.
The global intellectual property (IP) regime is in the midst of a paradigm shift in
favour of greater access to protected work. Current explanations of this paradigm shift
emphasize the agency of transnational advocacy networks, but ignore the role of
academics. Scholars interested in global IP politics have failed to engage in reflexive
thinking. Building on the results from a survey of 1679 IP experts, this article argues
52
that a community of academics successfully broke the policy monopoly of
practitioners over IP expertise. They instilled some scepticism concerning the social
and economic impacts of IP among their students as well as in the broader community
of IP experts. They also provided expert knowledge that was widely amplified by
non-governmental organizations (NGOs) and some intergovernmental organizations,
acting as echo chambers to reach national decision makers. By making these claims,
this article illustrates how epistemic communities actively collaborate with other
transnational networks, rather than competing with them, and how they can promote a
paradigm change by generating, rather than reducing, uncertainty.
Morozov, E. (2011). WikiLeaks and the perils of extreme glasnost. New
Perspectives Quarterly, 28(1), 7-11.
Is Internet freedom an absolute, universal value like freedom of speech? If there are
limits, how and by whom can they be established? Is crying fire or scaling firewalls
anymore acceptable in cyberspace than in physical space? What is the impact on the
discourse between nations, cultures and individuals? In this section, we gather a
collage of comments from various key players from Google to Wikileaks to the US
State Department along with comments by one of the most cogent analysts of the Net
and the president of Turkey.
Morozov, E. (2012). The net delusion: The dark side of Internet freedom.
PublicAffairs.
Two delusions in particular concern Morozov: “cyber-utopianism”, the belief that the
culture of the internet is inherently emancipatory; and “internet-centrism”, the belief
that every important question about modern society and politics can be framed in
terms of the internet. Put so starkly, such extreme beliefs may sound laughable, yet he
sees them in action everywhere: from the misguided belief that Twitter could foment
revolution in Iran in 2009 (on the eve of the elections, the country had fewer than
20,000 Twitter users) to the naive hope that instant international exposure via new
media will necessarily result in a diminishing of violence in Africa and the Middle
East. Moreover, Morozov argues, the west’s reckless promotion of technological tools
as pro-democratic agents has provoked authoritarian regimes to crack down on online
activity in some style: not just closing down or blocking websites, but using social
networks to infiltrate protest groups and track down protesters, seeding their own
propaganda online, and generally out-resourcing and out-smarting their beleaguered
citizenry. http://www.theguardian.com/books/2011/jan/09/net-delusion-morozovreview
Morozov, E. (2014). To save everything, click here: The folly of technological
solutionism. PublicAffairs.
Newsflash: the internet doesn’t exist. If you think there is just one thing called “the
Internet” with a single logic and set of values – rather than a variety of different
networked technologies, each with its own character and challenges – and that the rest
of the world must be reshaped around it, then you are an “Internet-centrist”. If you
think the messiness and inefficiency of political and cultural life are problems that
53
should be fixed using technology, then you are a “solutionist”… But Morozov’s
attacks go deeper than a righteous ridicule – he also interrogates the intellectual
foundations of the cybertheorists, and finds that, often, they have cherry-picked ideas
from the scholarly literature that are at best highly controversial in their own fields.
His readings in this vein of Clay Shirky, Steven Johnson, David Weinberger and
numerous other cyberintellectuals are suavely devastating.
http://www.theguardian.com/global/2013/mar/20/save-everything-evgeny-morozovreview
Mikhaylova, G. (2014). The “Anonymous” movement: hacktivism as an emerging
form of political participation (Doctoral dissertation, Texas State University).
This thesis focuses on the phenomenon of hacktivism, and specifically the hacktivist
collective known as Anonymous. Hacktivists can be defined as politically motivated
hackers. Hacktivists are different from other types of hackers because their
motivations are driven by the pursuit of social change, as opposed to seeking profit or
intellectual pursuit. Hacktivism is a new controversial form of civic participation,
which will most likely continue to have an impact on the Internet and the world. A
lack of detailed sociological research on hacktivists serves as the rationale for this
study. This study specifically focused on the experiences of the hacktivist community
in the United States, known under the name of Anonymous. This thesis focused on,
but is not limited to: a) examining how members of Anonymous define themselves, as
well as how security professionals (a.k.a. ethical hackers) define or view hacktivists;
b) how hacktivists operate and/or organize; and c) examining hacktivist culture and
ethical stances (including whether hacktivism can be considered permissible or
ethical). My research employed two primary strategies: content analysis of the
Anonymous message boards and in-depth interviews with security professionals. The
two approaches were meant to be complimentary: while the content analysis draws a
picture of how members of Anonymous see themselves and their goals; the interviews
were meant to draw the picture of how others view or understand hacktivists.
Norris Martin, K. (2014). Review of Rewire: digital cosmopolitans in the age of
connection Reissued in 2014 as: Digital cosmopolitans: why we think the Internet
connects us, why it doesn’t, and how to rewire it. Consumption Markets & Culture,
(ahead-of-print), 1-4.
Rewire is a thoughtful exploration, based on decades of real-world experience, of
what the Internet changes and what it does not. Perhaps Zuckerman avoided a heavyhanded framework in this text because of his own experiences as the director of the
MIT Center for Civic Media and founder of Geekcorps, PenPlusBytes and Global
Voices Online. Zuckerman explains that although he is more proud of Global Voices
than any of the other projects he has built, there was a “real sense” that he and cofounder Rebecca MacKinnon failed in their objectives. He had hoped Global Voices
would influence agenda setting but instead, as he puts it, it offers “reporters a way to
get quotes from countries experiencing sudden turmoil, rather than using us [Global
Voices] to find important unreported stories before they break” (128). In many ways,
Global Voices serves as a case study for a multitude of Zuckerman’s points. As
Zuckerman suggests, in an effort to use the Internet to encounter a wider
54
understanding of the world, Global Voices presents a lesson in the power and
weakness of personal connections. With this kind of realization, through an honest
evaluation of a project with which he felt such a personal connection, Zuckerman
establishes a trusted ethos, a nuanced view of Internet connections without the
arrogance that we perceive by many technological writers as if they can predict the
future.
Oates, S. (2015). Towards an Online Bill of Rights. In The Onlife Manifesto (pp.
229-243). Springer International Publishing.
Online citizens need a digital ‘Bill of Rights’ that will protect their interests from
being overwhelmed by commercial and state forces. Moving on from an outdated
notion of cyber-utopia, citizens need to assert six key rights: the right to privacy, the
right to own your own data, the right to a personal life, the right to avoid being forced
offline for safety, the ability to switch off when needed as well as public spaces for
civic debate online. Although different manifestoes and declarations about digital
rights have asserted many of these principles, the internet still lacks effective
governance or even norms to protect individuals. As a result, the social potential and
positive affordances of the internet may be lost without government intervention to
assert fundamental rights for online citizens. The key to unlocking the potential of
self-aware, online governance lays in greater effort by state Leviathans such as the
European Commission. It is time to stop talking about cyber-utopias and start creating
cyber-preserves before the potential benefit of the internet to a democratic society is
lost. Keywords: Digital rights Online manifesto Internet privacy Digital freedom
Internet state policy Internet governance.
Olson, P. (2012). We are anonymous: Inside the hacker world of LulzSec,
Anonymous, and the global cyber insurgency. Little, Brown.
[The] first full account of how a loosely assembled group of hackers scattered across
the globe formed a new kind of insurgency, seized headlines, and tortured the fedsand the ultimate betrayal that would eventually bring them down. Parmy Olson goes
behind the headlines and into the world of Anonymous and LulzSec with
unprecedented access, drawing upon hundreds of conversations with the hackers
themselves, including exclusive interviews with all six core members of LulzSec.
Poitras, L. (2014). Citizenfour. Praxis Films. https://citizenfourfilm.com
In January 2013, Laura Poitras started receiving anonymous encrypted e-mails from
“CITIZENFOUR,” who claimed to have evidence of illegal covert surveillance
programs run by the NSA in collaboration with other intelligence agencies
worldwide. Five months later, she and reporters Glenn Greenwald and Ewen
MacAskill flew to Hong Kong for the first of many meetings with the man who
turned out to be Edward Snowden. She brought her camera with her. The resulting
film is history unfolding before our eyes. Written by Anonymous
55
Postigo, H. (2008). Capturing fair use for the YouTube generation: The digital
rights movement, the Electronic Frontier Foundation and the user-centered
framing of fair use. Information, communication & society, 11(7), 1008-1027.
This article undertakes an analysis of strategic framing strategies in the Digital Rights
Movement by the movement’s central Social Movement Organization (SMO), the
Electronic Frontier Foundation (EFF). Through analysis of a series of interviews with
key members of the EFF and analysis of the EFF’s ‘Endangered Gizmos’ campaign in
response to the MGM vs Grokster case, this article shows how the organization
strategically frames consumers as users’ and fair use in user-centered fashion. In so
doing the EFF develops a legitimizing rationale for expanding consumer privileges in
copyrighted works. The analysis shows that the user-centered notion of fair use
articulates with broader historical and emerging trends in media consumption/use and
thus finds accepting audiences both within the movement and outside of it.
Postigo, H. (2012a). The digital rights movement: the role of technology in
subverting digital copyright. MIT Press. See review: http://bit.ly/1hWXKap
The movement against restrictive digital copyright protection arose largely in
response to the excesses of the Digital Millennium Copyright Act (DMCA) of 1998.
In this book, Hector Postigo shows that what began as an assertion of consumer rights
to digital content has become something broader: a movement concerned not just with
consumers and gadgets but with cultural ownership. Increasingly stringent laws and
technological measures are more than inconveniences; they lock up access to our
“cultural commons.” Carlos A. Arrébola finds this book gives a very detailed and
objective history of the on-going debate around digital copyright.
Postigo, H. (2012b). Cultural production and the digital rights movement.
Information, Communication and Society, 15(8), 1165-1185.
The Digital Rights Movement is an effort by activists and advocacy organizations to
expand consumer rights in media content use. A central argument for legitimating
those rights pivots on a view of culture as a participatory endeavour. This article
focuses on the Movement’s use of the discourse of culture and digital technology
describing (1) how the Movement positions culture as necessarily participatory; (2)
the role of mediating technologies in achieving a culture that is participatory; and (3)
the connection of those visions to a discourse of free speech in the form of what is
termed here, remix speech. The article suggests that adopting this view of culture and
media consumption can result in a politics of participatory culture, where the political
economic arrangements of the cultural industries and consumers are realigned.
Postill, J. 2011, Localizing the Internet: An Anthropological Account, Berghahn.
Oxford and New York.
Internet activism is playing a crucial role in the democratic reform happening across
many parts of Southeast Asia. Focusing on Subang Jaya, a suburb of Kuala Lumpur,
this study offers an in-depth examination of the workings of the Internet at the local
level. In fact, Subang Jaya is regarded as Malaysia’s electronic governance
56
laboratory. The author explores its field of residential affairs, a digitally mediated
social field in which residents, civil servants, politicians, online journalists and other
social agents struggle over how the locality is to be governed at the dawn of the
‘Information Era’. Drawing on the field theories of both Pierre Bourdieu and the
Manchester School of political anthropology, this study challenges the unquestioned
predominance of ‘network’ and ‘community’ as the two key sociation concepts in
contemporary Internet studies. The analysis extends field theory in four new
directions, namely the complex articulations between personal networking and social
fields, the uneven diffusion and circulation of new field technologies and contents,
intra- and inter-field political crises, and the emergence of new forms of residential
sociality.
Postill, J. 2012, ‘Digital politics and political engagement‘, in H. Horst and D.
Miller (eds) Digital Anthropology. Oxford, Berg.
The growing use of digital media by political actors of all kinds (including politicians,
journalists, activists, and religious leaders) has given rise to a thriving literature, albeit
one that is divided along disciplinary and technological lines. It is only very recently
that the term ‘digital politics’ has begun to acquire currency. This appears to signal
the birth of an interdisciplinary field that studies both the digitisation of traditional
politics as well as the rise of new forms of political life originating in the digital
world, such as Wikileaks or the Anonymous movement. Whilst there is as yet no
digital politics textbook, three useful entry points into the subfield of Internet politics
are Chadwick and Howard’s (2008) Routledge Handbook of Internet Politics, Oates,
Owen and Gibson’s (2006) The Internet and Politics, and Chadwick’s (2006) Internet
Politics. In this chapter I start with four review sections that cover similar ground to
the material discussed in these works, although I broaden the inquiry to include
mobile media. For example, I title the next section ‘digital government’ rather than ‘egovernment’ – the latter a term usually associated with the internet but not with
mobile technologies. The subsequent sections exemplify the application of an
anthropological approach to the study of digital politics. Drawing from my own
fieldwork in Malaysia and Spain, I argue that anthropology brings to this nascent field
a rich political lexicon, processual analyses, ground-up comparisons and participatory
research. I conclude with a brief discussion of the potential for future anthropological
studies in this area.
Postill, J. (2014) Freedom technologists and the new protest movements: a theory
of protest formulas, Convergence 20 (3), pp. 402-418.
In this article, I draw from anthropological fieldwork in Spain and secondary research
on Tunisia and Iceland to explore the connection between Internet freedom activism
and post-2008 protest movements. I introduce two new concepts: ‘freedom
technologists’ and ‘protest formulas’. I use the term freedom technologists to refer to
those social agents who combine technological and political skills to pursue greater
Internet and democratic freedoms, which they regard as being inextricably entwined.
Far from being techno-utopians or deluded ‘slacktivists’ (Morozov, 2013, Skoric,
2012), I argue that most freedom technologists are in fact techno-pragmatists, that is,
people who take a very practical view of the limits and possibilities of new
57
technologies for political change. I also differentiate among freedom technologists,
singling out three main specialists for their strong contribution to the new movements,
namely hackers/geeks, tech lawyers and online journalists. The second new coinage I
develop is protest formulas. This term refers to the unique compound of societal
forces and outcomes that characterizes each protest movement – as well as each phase
or initiative within a movement. In this article, I track the influence of freedom
technologists on emerging protest movements as they interact with other agents
within these political compounds.
Postill, J. (2014). A Critical History of Internet Activism and Social Protest in
Malaysia, 1998-2011. Asiascape: Digital Asia, 1(1-2), 78-103.
This article asks two related questions. First, to what extent has internet activism
shaped social protest in Malaysia from the late 1990s to the present? Second, what
can the history of internet activism and social protest in Malaysia tell us, if anything,
about the 2011 global wave of protests? To address these questions I distinguish three
key moments in Malaysia’s eventful history of internet activism and social protest,
namely the 1998-1999 reformasi movement, the electoral ‘tsunami’ of 2008 (in which
the ruling coalition lost its two-thirds majority), and the Bersih 2.0 rallies of 2011. I
argue that Bersih 2.0 is best explained as both the latest episode in a series of uniquely
Malaysian techno-political events and as a local variant of the global wave of protests
of 2011 – a wave in which hackers, online journalists, and technology lawyers, as
well as ordinary citizens using digital media, played an important part. The article
ends with a summary and with suggestions for further research.
Postman, N. (1992). Technopoly: The surrender of culture to technology. Vintage.
Postman defines “Technopoly” as a society which believes “the primary, if not the
only, goal of human labor and thought is efficiency, that technical calculation is in all
respects superior to human judgment … and that the affairs of citizens are best guided
and conducted by experts.” [4] Postman argues that the United States is the only
country to have developed into a technopoly. He claims that the U.S has been
inundated with technophiles who do not see the downside of technology. This is
dangerous because technophiles want more technology and thus more information.[5]
However, according to Postman, it is impossible for a technological innovation to
have only a one-sided effect. With the ever-increasing amount of information
available Postman argues that: “Information has become a form of garbage, not only
incapable of answering the most fundamental human questions but barely useful in
providing coherent direction to the solution of even mundane problems.”[6]
Powell, A. (2012). Assessing the influence of online activism on Internet policymaking: The case of SOPA/PIPA and ACTA (March 30, 2012).
This paper analyzes the influence of online activism, especially technical activist
actions like web blackouts, on the policy-making process. It compares the actions
associated with anti-SOPA campaigns in the United States with campaigns against
ACTA in Europe. In order to investigate the various linked aspects of internet
activism’s impact on policy change, this paper examines how online activism shifted
58
the ways that these bills were covered by the popular press and how press coverage
modeled new frames. In the United States, salient actions included suspended access
to web sites including Wikipedia, symbolic actions such as ‘black outs’ of some
website content, and mobilization efforts including invitations to contact elected
representatives. For European advocates organizing against ACTA, this meant that
some new frames for action were available in the early months of 2012. This analysis
contributes to contemporary readings of ‘mediated opportunity structures’ by focusing
on two new aspects: the mediatized nature of contemporary activism (especially
‘recursive’ activism that uses disruption of internet communications to draw attention
to digital rights) and the significance for policy making of claims that the internet is
‘exceptional.’
Powers, S. M., & Jablonski, M. (2015). The Real Cyber War: The Political
Economy of Internet Freedom. University of Illinois Press.
“As governments, companies, civil society, and other stakeholders struggle towards a
new global information and communication order in the post-Snowden world, this
equally provocative and important book cuts through the Western rhetoric of ‘Internet
freedom’ and draws a sobering picture of how policy-making in this space is
ultimately a fight for control over information, which is largely driven by economic
and geopolitical interests rather than democratic ideals and human rights.”–Urs
Gasser, Executive Director, Berkman Center for Internet & Society, Harvard
University
“More comprehensive than most work on global internet politics because it
incorporates perspectives from a wider range of interests around the world. The
treatment of China is strong, as are the examples from emerging nations.”–Vincent
Mosco, author of To the Cloud: Big Data in a Turbulent World
Raymond, E. (1999). The cathedral and the bazaar. Knowledge, Technology &
Policy, 12(3), 23-49.
I anatomize a successful open-source project, fetchmail, that was run as a deliberate
test of some theories about software engineering suggested by the history of Linux. I
discuss these theories in terms of two fundamentally different development styles, the
“cathedral” model, representing most of the commercial world, versus the “bazaar”
model of the Linux world. I show that these models derive from opposing
assumptions about the nature of the software-debugging task. I then make a sustained
argument from the Linux experience for the proposition that “Given enough eyeballs,
all bugs are shallow,” suggest productive analogies with other self-correcting systems
of selfish agents, and conclude with some exploration of the implications of this
insight for the future of software.
Rheingold, H. (2007). Smart mobs: The next social revolution. Basic books.
Smart Mobs takes us on a journey around the world for a preview of the next technocultural shift. The coming wave, says Rheingold, is the result of super-efficient
mobile communications-cellular phones, wireless-paging, and Internet-access
59
devices-that will allow us to connect with anyone, anytime, anywhere. Rheingold
offers a penetrating perspective on the new convergence of pop culture, cutting-edge
technology, and social activism. He also reminds us that the real impact of mobile
communications will come not from the technology itself but from how people use it,
resist it, and adapt to it.
Ritchie, W. (2012). Why Immi Matters: The First Glass Fortress in the Age of
Wikileaks. Suffolk Transnat’l L. Rev., 35, 451.
The anatomy of a leak has changed fundamentally since the days of manila envelopes
changing hands in a dimly lit alley. 1 Today, any person with access to national
security secrets can leak them in the name of transparency through a few simple
clicks, immediately transmitting information to a computer server abroad and
uploading them for the world to examine. 2 As leaking mechanisms have
revolutionized, the laws across the globe have remained targeted largely at preventing
dimly lit alley transfers of information. 3 The Icelandic Modern Media Initiative
(IMMI) is the world’s most dramatic entry into establishing a comprehensive legal
framework to address modern leaks. 4 IMMI’s emphasis on shedding sunlight on
government secrets will revolutionize the concept of transparency.
This Note examines the impact of an information safe-haven in a borderless virtual
information-age. 6 Part II of this Note presents the elements of IMMI and describes
the components of a modern leak, or, “WikiLeak.” 7 Part III of this Note presents the
best practices of modern transparency law and discusses the evolution of modern
attempts to regulate the WikiLeaks-style leak. 8 Part IV examines the limits on
transparency, modern scenarios with complex issues, and the practical implications of
IMMI across the globe. 9 Finally, Part V of this Note argues for the adoption of
comprehensive transparency regimes to strengthen the impact of IMMI. 10
Rowan, J. (2011). Free Culture Forum and new models for a sustainable
creativity. In OKCon. http://ceur-ws.org/Vol-739/paper_24.pdf
During the talk I will introduce the work carried out by the FCF and engage in some
of the debates that have taken place in this arena. I will focus on the idea of cultural
commons and how the creative industries have tended to use this pool of common
knowledge as a resource that doesnt need to be cared o_ or looked after. I will look
into business and social forms of organization aimed at producing culture
acknowledging social production and the creative basins that lie at the centre of
cultural development. After all it is our responsibility, as civil society, to oppose
practices that plunder this common heritage and to block its future development. We
need to defend and expand the sphere in which human creativity and knowledge can
prosper freely and sustainably.
At the first FcForum in 2009, we analysed a series of reforms that would have to be
applied to existing legislation in order to ensure that the digital age is beneficial to
artists, citizens and entrepreneurs. Our conclusions and proposals are published in the
Charter for Innovation, Creativity and Access to Knowledge. For the 2010 edition, we
shifted the focus to the economic aspects of culture and knowledge production,
60
exploring the way in which benefits in the sense of economic pro_t, but also social
and cognitive bene_ts can be generated in such a way that they lead to a sustainable
culture.
Sell, S. K. (2013). Revenge of the “Nerds”: Collective action against intellectual
property maximalism in the global information age. International Studies Review,
15(1), 67-85.
For the first time in thirty years of ever stronger intellectual property policies, a
transnational coalition of Internet users was able to kill two US anti-piracy bills that
were backed by some of the most politically connected and economically powerful
interests in US politics. Combining insights from the literatures on social movements,
networks, and Internet activism, I analyze the structure for social mobilization, the
form of the coalition, the role of framing, and the use of technology contributing to its
success. The literature on social movements and contentious politics addresses
situations of threats or grievances that lead actors to mobilize for collective action. In
this case, Goliath’s latest gambit to ratchet up intellectual property standards
threatened David’s use of the Internet. This time David beat Goliath.
Shirky, C. (2008). Here comes everybody: The power of organizing without
organizations. Penguin.
In the book, Shirky recounts how social tools such as blogging software like
WordPress and Twitter, file sharing platforms like Flickr, and online collaboration
platforms like Wikipedia support group conversation and group action in a way that
previously could only be achieved through institutions. In the same way the printing
press increased individual expression, and the telephone increased communications
between individuals, Shirky argues that with the advent of online social tools, groups
can form without the previous restrictions of time and cost.
https://en.wikipedia.org/wiki/Here_Comes_Everybody
Sifry, M. L. (2011). WikiLeaks and the Age of Transparency. OR Books.
Welcome to the Age of Transparency. But political analyst and writer Micah Sifry
argues that WikiLeaks is not the whole story: it is a symptom, an indicator of an
ongoing generational and philosophical struggle between older, closed systems, and
the new open culture of the Internet. “What is new,” he writes, “is our ability to
connect, individually and together, with greater ease than at any time in human
history. As a result, information is flowing more freely into the public arena, powered
by seemingly unstoppable networks of people all over the world cooperating to share
vital data and prevent its suppression.” Despite Assange’s arrest, the publication of
secret documents continues, and websites replicating WikiLeaks’ activities have
sprung up in Indonesia, Russia, the European Union, and elsewhere. As Sifry shows,
this is part of a larger movement for greater governmental and corporate transparency:
“when you combine connectivity with transparency—the ability for more people to
see, share and shape what is going on around them—the result is a huge increase in
social energy, which is being channeled in all kinds of directions.”
61
Smith, R. C. (2010). Reflections on the Icelandic Modern Media Initiative: A
Template for Modern Media Law Reform?. Journal of Media Law, 2(2), 199-211.
This note explains the origins of the Icelandic Modern Media Initiative (‘IMMI’) and
the various legal initiatives Iceland will be undertaking to give it effect. It
distinguishes the IMMI from earlier programmes of media law reform, such as that
carried out in Luxembourg in 2004, focusing on the IMMI’s broad reach to
encompass new and user-generated as well as more mainstream media. The note
concludes by considering some of the challenges that countries face when seeking to
establish a ‘safe haven’ for the media in today’s networked world and what influence
the IMMI is likely to have on projects of law reform in other countries. Research
areas: Icelandic media reform, WikiLeaks, source protection, libel tourism.
Solo, A. M., & Bishop, J. (2011, July). The new field of network politics. In
Proceedings of the 2011 World Congress in Computer Science, Computer
Engineering, and Applied Computing (WORLDCOMP’11).
This research paper defines a new field called network politics. Network politics
refers to politics and networks. These networks include the Internet, private networks,
cellular networks, telephone networks, radio networks, television networks, etc.
Network politics includes the applications of networks to enable one or more
individuals or organizations to engage in political communication. Furthermore,
network politics includes political regulation of networks. Finally, network politics
includes the accompanying issues that arise when networks are used for political
communication or when there is political regulation of networks. The domain of
network politics includes, but is not limited to, e-politics (social networking for
driving revolutions and organizing protests, online petitions, political blogs and vlogs,
whistleblower Web sites, online campaigning, e-participation, virtual town halls, evoting, Internet freedom, access to information, net neutrality, etc.) and applications
of other networks in politics (robocalling, text messaging, TV broadcasting, etc.). The
definition of this field should significantly increase the pace of research and
development in this important field. Keywords: politics, networks, e-politics, evoting, Internet, Web
Sterner, E. (2011). WikiLeaks and cyberspace cultures in conflict. Marshall
Policy Outlook.
Every few months, Wikileaks and its founder, Julian Assange, make headlines for
publicizing yet more titillating information passing through the U.S. government’s
classified systems. Each round of publication does real damage to U.S. national
interests, compromising relations with other countries and revealing to current and
potential adversaries the internal thought processes of the U.S. government.
Policymakers tend to approach these problems episodically — they view Wikileaks as
a specific challenge. It may be that, but it also symbolizes a burgeoning conflict
between two differing views of cyberspace and how it relates to society. One
perspective generally holds that cyberspace must be managed in such a way that
conforms it to society’s existing institutions, particularly in matters related to national
security. Another philosophy holds that cyberspace is fundamentally reordering
62
society and that, in doing so, it will unleash new possibilities in the story of human
liberty. That conflict will run for decades, with consequences not just for U.S.
national security, but for the very future of cyberspace.
Tufekci, Z. (2014). The medium and the movement: digital tools, social
movement politics, and the end of the free rider problem. Policy & Internet, 6(2),
202-208.
…Thus, technology and long-term cultural trends are converging toward noninstitutional politics, and this convergence has a powerful effect on movement
trajectories. Similar to Zuckerman, I have found the same reluctance to engage with
institutional politics in my own research from Tahrir Square (Tufekci & Wilson,
2012) to Gezi Park (Tufekci, 2013). Similarly, many “Occupy Wall Street”
participants were reluctant even to form “spokescouncils” which would represent a
minimal level of formalization and institutionalization as compared with the “General
Assembly” that meets daily and in which there is no boundary for membership (or
lack thereof) besides showing up that day. [But see Quinn Norton’s damning report
about Occupy media, cf. Constanza-Chock’s]
Vaidhyanathan, S. 2004. “The state of copyright activism,” First Monday,
volume 9, number 4, at http://firstmonday.org//article/view/1133/1053
One of the great hopes I had while I researched and wrote Copyrights and
copywrongs (New York: New York University Press, 2001), a cultural history of
American copyright, during the late 1990s was that copyright debates might puncture
the bubble of public consciousness and become important global policy questions. My
wish has come true. Since 1998 questions about whether the United States has
constructed an equitable or effective copyright system frequently appear on the pages
of daily newspapers. Activist movements for both stronger and looser copyright
systems have grown in volume and furor. And the U.S. Supreme Court ruled in early
2003 that the foundations of American copyright, as expressed in the Constitution, are
barely relevant in an age in which both media companies and clever consumers enjoy
unprecedented power over the use of works.
von Solms, S., & van Heerden, R. (2015, February). The Consequences of
Edward Snowden NSA Related Information Disclosures. In Iccws 2015-The
Proceedings of the 10th International Conference on Cyber Warfare and Security
(p. 358). Academic Conferences Limited.
In June 2013, the Guardian newspaper started to disclose thousands of classified
documents, which uncovered the existence of several mass surveillance programmes
run by the National Security Agency (NSA) in the USA in cooperation with several
European countries. These disclosures exposed a massive NSA clandestine electronic
surveillance data program called PRISM as well as evidence of secret treaties
amongst countries sharing surveillance data. The Guardian source was a NSA
contractor, Edward Snowden, who was based in Hawaii. Edward Snowden is
currently avoiding arrest after he initially fled to Hong Kong and then Russia. The
leaks directly influenced US international relations in a negative manner, such as
63
Brazil cancelling a state visit and Ecuador renouncing US trade benefits. The leaks
had a financial impact on some of the massive US based IT companies; especially
those who specialise in cloud based computing. Persons, companies and nations were
affected by the leaks. Some secure email providers had to close down due to NSA and
other government pressures to reveal their secret keys. The current estimation is that
the US will lose between $25 billion to $35 billion in cloud computing based revenue
due to Snowden’s leaks. The trust in US based security professionals was also
degraded after it was revealed that the NSA has pushed for flawed security standards.
This will impact the status and US based security professionals in the future. In this
paper we present a timeline of the Snowden related leaks, and discuss the reactions to
these disclosures. We also explore the direct and indirect impact of these leaks. The
consequences of these disclosures include strained foreign relationships, and the
knowledge that mass surveillance programmes exists.
Walsh, C., Apperley, T., Abbott, C., Albright, J., Alverman, D., Beavis, C., … &
Wood, D. (2013). Towards hacker literacies: What Facebook’s privacy snafus
can teach us about empowered technological practices.
This article highlights an emerging set of literate media practices that are
simultaneously critical and participatory in nature. These practices, themselves natural
responses to a shifting new media landscape, have echoes of existing media literacy
paradigms, though are not fully encapsulated by them. Through an analysis of public
reactions to Facebook privacy policy and feature changes that took place in the Spring
of 2010, the article shows how what the author calls hacker literacies are currently
being practised in situ. Hacker literacies, which draw their name from the practice of
computer programmers that take existing code and reconfigure it according to their
own values and for their own purposes, are unique in that they are not only
empowered by participatory technologies, but empowered in relation to these
technologies as well. Reactions to changes in Facebook during this time period
illustrate the ways that the users of new media did not take for granted the design of
these new modes of participation nor the intentions and interests of their creators.
Their understanding of the malleability of this sociotechnical space and consequent
actions resulted in its reformulation, a type of process the author argues will be crucial
if there is to be a more fluid and equal distribution of media power in the digital age.
Keywords: critical literacy, empowerment, Facebook, Hacker literacies, media
literacy, new literacies, participatory culture, privacy, sociotechnical spaces.
Ziccardi, G. (2012). Resistance, liberation technology and human rights in the
digital age (Vol. 7). Springer Science & Business Media.
This book explains strategies, techniques, legal issues and the relationships between
digital resistance activities, information warfare actions, liberation technology and
human rights. It studies the concept of authority in the digital era and focuses in
particular on the actions of so-called digital dissidents. Moving from the difference
between hacking and computer crimes, the book explains concepts of hacktivism, the
information war between states, a new form of politics (such as open data movements,
radical transparency, crowd sourcing and “Twitter Revolutions”), and the hacking of
64
political systems and of state technologies. The book focuses on the protection of
human rights in countries with oppressive regimes.
Ziccardi, G. (2013). Opening Remarks: Hacking and Digital Dissidence. In
Resistance, Liberation Technology and Human Rights in the Digital Age (pp. 125). Springer Netherlands.
This first, introductory Chapter, aims to draw a technological and cultural link
between the activities of the early hackers and the actions of digital dissidents in
modern times that are taking place in different parts of the world. An initial analysis is
devoted to the origins of the hacker tradition; is then described, in a general sense, the
current landscape of digital resistance and liberation technologies. The themes that are
covered are the importance of technology in episodes of the current political rebellion,
the controversy over the role of Facebook and Twitter during recent political events
(the so-called Twitter Revolutions), the problem of the digital divide and of different
technological conditions in the world and, finally, the use of computer technologies
for the well-being of society and for the creation of a new public sphere.
Zuckerman, E. (2013). Rewire: Digital cosmopolitans in the age of connection.
WW Norton, Incorporated.
The Internet has given us an unprecedented ability to share knowledge and
information, and yet, Zuckerman argues, we aren’t really taking advantage of that
global connectivity. The Internet lets us see the whole world, but we generally look at
only one small part of it, using the technology to tailor the news we receive to our
interests, thus narrowing our focus. And, perhaps most important, the bigger the
Internet becomes, and the more information there is available, the harder it is to find
anything (and the easier it is to misinterpret or misunderstand what we do find). The
challenge, Zuckerman says, isn’t access; it’s paying attention. We need to expand our
focus, sample other cultures, and seek out the new and unfamiliar. It’s hard to counter
the author’s well-reasoned arguments, even if his central point (hey, buddy, you’re
not using the Internet right) might sting a little. –David Pitt
Zuckerman, E. (2014). New media, new civics?. Policy & Internet, 6(2), 151-168.
Dissatisfaction with existing governments, a broad shift to “post-representative
democracy” and the rise of participatory media are leading toward the visibility of
different forms of civic participation. “Participatory civics” uses tools of participatory
media and relies on theories of change beyond influencing representative
governments to seek change. This article offers a framework to describe participatory
civics in terms of theories of change used and demands places on the participant, and
examines some of the implications of the rise of participatory civics, including the
challenges of deliberation in a diverse and competitive digital public sphere.
Zuckerman, E. (2015) As a Drone Captures Global Voices at 10, a Few Thoughts
from Cebu, Global Voices, https://summit2015.globalvoices.org/2015/01/as-adrone-captures-global-voices-at-10-a-few-thoughts-from-cebu/
65
Posted January 31, 2015 0:11 GMT. I spent last week in Cebu, the second largest city
in The Philippines, with three hundred journalists, activists and media scholars from
more than sixty countries. The occasion was the Global Voices Citizen Media
Summit, a biennial conference on the state of citizen media, blogging, journalism and
activism. This summit coincided with the tenth anniversary of Global Voices, the
citizen media website and community Rebecca MacKinnon and I helped to found in
late 2004.
We’ve held the conference six times, and it’s always been an excuse to gather core
members of the Global Voices community for planning, training and building
solidarity. More than 800 staff and volunteers run Global Voices, and since we have
no home office, headquarters or physical presence, the conference provides a
physicality and presence that’s sorely lacking in most of our interactions. Since the
Summit began as an excuse for holding our internal meeting, it’s always a wonderful
party and family reunion, but it’s not always been the most thoughtfully programmed
event. (I’m allowed to say that because I helped program some of those conferences.)
This year’s incarnation (which I had absolutely nothing to do with planning!) reset
expectations about what the Citizen Media Summit could be. It was two packed days
of panels, workshops and discussions, tackling some of the most interesting a
challenging problems facing online writing and activism: threats to the open internet,
social media and protests movements, trolling and online abuse, intermediary
censorship.
…I’m starting to wonder whether we’re going to be able to keep operating this way in
the future. Increasingly, citizen media is private, or semi-public, which raises really
interesting questions about how we use it in our journalism. For example, in China,
many political discussions shifted from Weibo (which is primarily public) when the
company began verifying the identities of users. Many of those discussions moved to
WeChat, where groups with hundreds or thousands of members feel like listservs or
bulletin boards.
In the wake of the Occupy movement, Indignados, Gezi and other recent popular
protests, it’s reasonable to ask whether protest movements are more powerful for
expressing dissent than they are in making fundamental changes to systems of power.
Listening to panelists speak about protests in Mexico, Syria, Ukraine and Hong Kong,
I thought of Zeynep Tufekçi’s idea that digital tools have made it easier to bring
people out into the streets, but may have made the groups assembled with those tools
weaker and more brittle. (Because it’s so easy to bring 50,000 people to a protest,
Tufekçi argues, organizers have to do a lot less work ahead of time and end up having
less influence and social capital with those protesters than they did in earlier years.
When the protest ends and it’s time to try and influence governance, those movements
have a hard time moving into power.)
About the author of this bibliography
Dr John Postill is Vice-Chancellor’s Senior Research Fellow at RMIT University,
Melbourne, and Digital Anthropology Fellow at University College London (UCL).
66
His publications include Localizing the Internet (2011), Media and Nation Building
(2006) and the co-edited volume Theorising Media and Practice (2010, with
Birgit Bräuchler). Currently he is conducting anthropological research on new forms
of digital activism and civic engagement in Indonesia, Spain and globally. He is also
writing a book on the connection between techno-politics and new citizen movements
around the world, as well as the co-edited volume Theorising Media and Change
(with Elisenda Ardèvol and Sirpa Tenhunen). His Twitter handle is, sensibly enough,
@JohnPostill
Back to the freedom technologists series
67