Militia Groups and National Security in Kenya: a Case Study of Eastland’S, Nairobi

Total Page:16

File Type:pdf, Size:1020Kb

Militia Groups and National Security in Kenya: a Case Study of Eastland’S, Nairobi UNIVERSITY OF NAIROBI INSTITUTE OF DIPLOMACY AND INTERNATIONAL STUDIES Militia Groups and National Security in Kenya: A Case Study of Eastland’s, Nairobi SAMUEL. M. WACHENJE SUPERVISOR: DR MARTIN. O. OUMA A PROJECT SUBMITTED IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE AWARD OF MASTERS OF ARTS DEGREE IN INTERNATIONAL STUDIES AT THE INSTITUTE OF DIPLOMACY AND INTERNATIONAL STUDIES (IDIS), UNIVERSITY OF NAIROBI March, 2015 Declaration I hereby declare that this research project is my original work and has not been submitted for a degree award in any other university. Samuel. M. Wachenje Signed…………………………… Date…………............................... This project has been submitted for examination with my approval as University Supervisor Dr Martin. O. Ouma Signed..............…………………… Date…...........…………….. i Dedication I dedicate this work to all those who gallantly put their lives on the line as they strive to protect/save lives, alleviate human suffering and promote peace in an environment rife with conflict and violence as well as to those who have longed for security, stability and peace which has often proven elusive. May their yearnings materialize and live to cherish good tidings in secure, stable and peaceful environment. ii Acknowledgement The writing of this dissertation has been very challenging and without the support, patience and guidance of the following people, this study could not have been completed. To them I owe my deepest gratitude. To my supervisor Dr. Martin Ouma who found time to guide me despite many other academic and professional commitments. His wisdom, knowledge, commitment to the highest standards inspired and motivated me. Also, great appreciation goes to my colleagues at NDC and my family who in various ways inspired and encourage me throughout the process. To all I say may God bless you. iii Abstract There is a negative relationship between militias and national security. Militias tend to challenge the operations of a state in many ways. This ranges from undermining state‟s monopoly in the use of force to illegal taxation, serious intimidation and predation of citizens. Consequently, there has been sustained global and national scholarly and policy focus on specific ways militias emerge, their practices and how they undermine national security. This study falls within this terrain of militias and national security. It has examined the question of militias and their impact on Kenya‟s national security with particular focus on militia activities in the Eastlands parts of Kenya‟s capital city Nairobi. The area has witnessed high concentration of militias cum organized criminal groups. Special attention has being given to Mungiki which has been dominant. Theoretically, the study has been guided by multi-sectoral and multilevel approach to security and securitization theory. Multi-sectoral and multilevel approach is based on the argument that threats to security are both militarized and non-militarized. Also, they affect various sectors notably military, political, economic, societal and environmental. Securitization theory which is closely associated with Copenhagen and Paris schools of security acknowledges the reality that different states have varied security priorities. Significantly, the theory moves security agenda from been an objective phenomenon to being subjective and contextual depending on these priorities. These way many issues can be brought under the umbrella of security. Methodologically, the study is both qualitative and quantitative owing to the nature of data the researcher sought. It used both primary and secondary data. Primary data was collected through interviews and informal conversations whereas qualitative data was mainly collected through desk study review. The main finding of the study is that militias have undermined Kenya‟s national security. They have challenged state‟s monopoly in the use of force, corrupted its institutions, are used as tools of violence by political and economic actors, created an architecture of fear in the areas they operate severely weakening human security, have exacerbated poverty and unemployment. However, despite the challenges they pose, they have also played a key role in provision of public services and security in ungoverned urban spaces long neglected by the government. iv Table of Contents Declaration ..................................................................................................................................................... i Dedication ..................................................................................................................................................... ii Acknowledgement ....................................................................................................................................... iii Abstract ........................................................................................................................................................ iv Abbreviations ............................................................................................................................................. ix List of Tables and Charts .............................................................................................................................. x CHAPTER ONE ........................................................................................................................................... 1 INTRODUCTION AND BACKGROUND TO THE STUDY .................................................................... 1 1.1. Introduction ............................................................................................................................................ 1 1.2. Background to the Study ........................................................................................................................ 1 1.3. Statement of the Research Problem ....................................................................................................... 6 1.4. Objectives of the Study .......................................................................................................................... 7 1.5. Research Questions ................................................................................................................................ 7 1.6. Justification of the Study ....................................................................................................................... 8 1.7. Literature Review ................................................................................................................................... 8 1.7.1. Evolution of the Concept of Security .................................................................................................. 9 1.7.2. Militia Groups, their Development and National Security ............................................................... 15 1.7.3: Militia Groups in Kenya ................................................................................................................... 21 1.7.4. Gaps in Literature ............................................................................................................................. 29 1.7.5. Operationalization of Key Terms and Concepts ............................................................................... 29 1.8. Theoretical Framework ........................................................................................................................ 30 1.9. Methodology ........................................................................................................................................ 33 1.9.1 Methods of data Collection ......................................................................................................... 34 1.9.2 Methods of Data Analysis ........................................................................................................... 34 1.10. Study Layout ...................................................................................................................................... 35 CHAPTER TWO ........................................................................................................................................ 36 FACTORS UNDERLYING THE RISE AND CONTINUED GROWTH OF MILITIA GROUPS IN KENYA ...................................................................................................................................................... 36 2.1. Introduction .......................................................................................................................................... 36 2.2. Definition of the Term Militia ............................................................................................................. 36 2.3. Types of Militias .................................................................................................................................. 38 v 2.4. Evolution of Militias in Kenya............................................................................................................. 39 2.5. Factors behind the Rise of Militias in Kenya ....................................................................................... 44 2.5.1. Negative Ethnicity and Political Competition................................................................................... 45 2.5.2. Political Culture of Impunity and Extra State Violence .................................................................... 48 2.5.3. Socio-economic Factors: Underdevelopment, Poverty,
Recommended publications
  • USA -V- Julian Assange Judgment
    JUDICIARY OF ENGLAND AND WALES District Judge (Magistrates’ Court) Vanessa Baraitser In the Westminster Magistrates’ Court Between: THE GOVERNMENT OF THE UNITED STATES OF AMERICA Requesting State -v- JULIAN PAUL ASSANGE Requested Person INDEX Page A. Introduction 2 a. The Request 2 b. Procedural History (US) 3 c. Procedural History (UK) 4 B. The Conduct 5 a. Second Superseding Indictment 5 b. Alleged Conduct 9 c. The Evidence 15 C. Issues Raised 15 D. The US-UK Treaty 16 E. Initial Stages of the Extradition Hearing 25 a. Section 78(2) 25 b. Section 78(4) 26 I. Section 78(4)(a) 26 II. Section 78(4)(b) 26 i. Section 137(3)(a): The Conduct 27 ii. Section 137(3)(b): Dual Criminality 27 1 The first strand (count 2) 33 The second strand (counts 3-14,1,18) and Article 10 34 The third strand (counts 15-17, 1) and Article 10 43 The right to truth/ Necessity 50 iii. Section 137(3)(c): maximum sentence requirement 53 F. Bars to Extradition 53 a. Section 81 (Extraneous Considerations) 53 I. Section 81(a) 55 II. Section 81(b) 69 b. Section 82 (Passage of Time) 71 G. Human Rights 76 a. Article 6 84 b. Article 7 82 c. Article 10 88 H. Health – Section 91 92 a. Prison Conditions 93 I. Pre-Trial 93 II. Post-Trial 98 b. Psychiatric Evidence 101 I. The defence medical evidence 101 II. The US medical evidence 105 III. Findings on the medical evidence 108 c. The Turner Criteria 111 I.
    [Show full text]
  • Protestformen Im Cyberspace Möglichkeiten Und Grenzen Aus Zivilgesellschaftlicher Sicht
    SOCIOLOGY IN SWITZERLAND Towards Cybersociety and Vireal Social Relations Protestformen im Cyberspace Möglichkeiten und Grenzen aus zivilgesellschaftlicher Sicht Hernani Marques [email protected] Zürich, September 2012 Bibliographische Zitation: Marques, Hernani: Protestformen im Cyberspace. Möglichkeiten und Grenzen aus zivilgesellschaftlicher Sicht. In: Sociology in Switzerland: Towards Cybersociety and Vireal Social Relations. Online Publications. Zürich 2012. http://socio.ch/intcom/t_hmarques.pdf Hernani Marques: Protestformen im Cyberspace http://socio.ch/intcom/t_hmarques.pdf Inhaltsverzeichnis 1 Einleitung .................................................................................................................................. 3 1.1 Gegenstand .................................................................................................................................................. 3 1.2 Fokus und Aufbau ......................................................................................................................................... 4 2 Theorie ...................................................................................................................................... 5 2.1 Gegenstand .................................................................................................................................................. 5 2.1.1 Meinungsäusserung ............................................................................................................................................... 5
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Revisiting the Goldenberg Ghosts,Knowing
    Remembering Zindzi, the Other Mandela By Isaac Otidi Amuke On 10 February 1985, the world’s attention was drawn to the courageous defiance of 25-year- old Zindzi Mandela, the youngest of two daughters born to political prisoner Nelson Mandela and anti- apartheid revolutionary Winnie Madikizela-Mandela. The occasion was a rally at Soweto’s Jabulani Stadium organised by the anti-apartheid caucus, the United Democratic Front (UDF), to celebrate the awarding of the Nobel Peace Prize to Johannesburg’s Bishop Desmond Tutu. In the absence of her parents (Mandela in jail and Madikizela-Mandela banned and banished in Brandfort) anti- apartheid stalwart Albertina Sisulu took the role of guardian, standing next to Zindzi. Zindzi sang, danced and occasionally punched her clenched fist into the air to chants of Amandla!, before reading her father’s historic letter to the nation. Apartheid South Africa’s President P.W. Botha had used prison back channels to offer Mandela the option of an early conditional release, having served two decades. In declining Botha’s overtures, Mandela sought to respond through a public communique, hence his decision to deploy Zindzi to the front lines. Zindzi did not disappoint. Having grown into her own as an activist and witness to the barbarism the apartheid state had unleashed on Black South Africans, and especially on the Mandela–Madikizela- Mandela family, Zindzi powerfully delivered the nine-minute message, which was punctuated by recurring recitals of ‘‘my father and his comrades”. Her chosen refrain meant that Zindzi wasn’t only relaying Mandela’s words, but was also speaking on behalf of tens of political prisoners who lacked a medium through which to engage the masses.
    [Show full text]
  • 1 TRANSCRIPT Executive Session on Wikileaks Sponsored by the Joan
    1 TRANSCRIPT Executive Session on WikiLeaks Sponsored by the Joan Shorenstein Center on the Press, Politics and Public Policy Harvard Kennedy School Thursday, February 3, 2011, 9:00 AM – 2:00 PM Longfellow Room, Charles Hotel Pavilion Participants Graham Allison, Douglas Dillon Professor of Government, HKS; Director, Belfer Center for Science and International Affairs; former Assistant Secretary of Defense Matthew Baum, Marvin Kalb Professor of Global Communications and Professor of Public Policy, HKS Nicholas Burns, Sultan of Oman Professor of the Practice of International Relations, HKS; former U.S. Ambassador to Greece and former U.S. Ambassador to NATO Robert Calo, Shorenstein Fellow; Senior Lecturer, UC Berkeley Graduate School of Journalism James Carroll, columnist, Boston Globe; author of many books including An American Requiem Susan Crawford, Professor, Cardozo Law School; former Special Assistant to President Obama for Science, Technology and Innovation Policy Tom Fiedler, Dean, College of Communications, Boston University; former editor, Miami Herald Seth Flaxman, HKS student Megan Garber, Nieman Journalism Lab Alexis Gelber, Shorenstein Fellow; formerly, Newsweek magazine Edith Holway, Fellows and Programs Administrator, Shorenstein Center Alex Jones, Director, Shorenstein Center Eric Joyce, Project Minerva, Belfer Center Alex Keyssar, Matthew W. Stirling Jr. Professor of History and Social Policy, HKS Neil Lewis, Shorenstein Fellow; formerly, The New York Times Matt Mabe, HKS student Tim Maurer, HKS student Nicco Mele, Adjunct
    [Show full text]
  • Hanscres Loaded 788 Tweets
    hanscres loaded 788 tweets Hide Replies Hide Retweets Change User • How can the President of Ecuador have any sway at home when he can't even control the activities in one of his Emba… https://t.co/L7NIKo6cjP Nov 23, 2017 • RT @LouiseMensch: @handsome_hand_ @abh1984 @MarlaMHughes @DrDenaGrayson @dianeault5 @frogcycle @Alfree7619 @HillaryClinton @DeripaskaOleg @… Nov 22, 2017 • RT @KateHarding: After two women accused you of sexual assault, you went into hiding and set about destroying democracy. https://t.co/zdKOT… Nov 22, 2017 • We get asked all the time, why does Julian #assange of #wikileaks detest Hillary Clinton so much? One fateful after… https://t.co/vxVwWMTAZM Nov 22, 2017 • RT @supportJAdotcom: @JerriBarney @BarrettBrown_ @greekemmy judging by the fallout regarding recent revelations of #Assange and #Trump / #R… Nov 21, 2017 • The Ecuadorian Govt have invited Julian #assange to ride up on the Presidential Landrover at their next National Da… https://t.co/r9TQLcZahO Nov 21, 2017 • RT @JerriBarney: @supportJAdotcom @BarrettBrown_ @greekemmy That list becomes more of a joke everyday. She is feverishly trying to make it… Nov 21, 2017 • Puts a tear in your eye reading that doesn't it LOL. Emmy is just your average garden variety stalking nut-job Ste… https://t.co/olzRAP5j0J Nov 21, 2017 • They should have checked Google's T&C's instead of blinding following what their Messiah #assange of #wikileaks. T… https://t.co/CdqquKNq8N Nov 21, 2017 • After what has been leaked in the last few weeks about you Julian #assange, how on earth can you even mention the w… https://t.co/a9L2wqDaWR Nov 21, 2017 • RT @Brett_A_Taylor: I am CRYING.
    [Show full text]
  • Human Rights Watch All Rights Reserved
    HUMAN RIGHTS HIGH STAKES Political Violence and the 2013 Elections in Kenya WATCH High Stakes Political Violence and the 2013 Elections in Kenya Copyright © 2013 Human Rights Watch All rights reserved. Printed in the United States of America ISBN: 1-56432-986-0 Cover design by Rafael Jimenez Human Rights Watch is dedicated to protecting the human rights of people around the world. We stand with victims and activists to prevent discrimination, to uphold political freedom, to protect people from inhumane conduct in wartime, and to bring offenders to justice. We investigate and expose human rights violations and hold abusers accountable. We challenge governments and those who hold power to end abusive practices and respect international human rights law. We enlist the public and the international community to support the cause of human rights for all. Human Rights Watch is an international organization with staff in more than 40 countries, and offices in Amsterdam, Beirut, Berlin, Brussels, Chicago, Geneva, Goma, Johannesburg, London, Los Angeles, Moscow, Nairobi, New York, Paris, San Francisco, Tokyo, Toronto, Tunis, Washington DC, and Zurich. For more information, please visit our website: http://www.hrw.org FEBRUARY 2013 ISBN: 1-56432-986-0 High Stakes Political Violence and the 2013 Elections in Kenya Map of Kenya .................................................................................................................................... ii Summary ..........................................................................................................................................
    [Show full text]
  • Diplomarbeit
    DIPLOMARBEIT „Mediendiskurse zur digitalen (Gegen-) Öffentlichkeit am Beispiel der Internetplattform WikiLeaks“ Verfasserin Renée Thaller angestrebter akademischer Grad Magistra der Philosophie Wien, 2013 Studienkennzahl lt. Studienblatt: A 317 Studienrichtung lt. Studienblatt: Diplomstudium Theater-, Film- und Medienwissenschaft Betreuer: Univ.-Prof. Mag. Dr. habil. Ramón Reichert - 2 - Inhaltsverzeichnis Abstract Seite 3 Einleitung Seite 4 1. Was ist WikiLeaks Seite 6 1.1. Aufbau der Website (Oberfläche, Inhalt) Seite 11 1.2. Nutzerbedingte Veränderungen der Website Seite 23 1.3. Diskursrelevante Wissensbestände Seite 27 2. angewandte Diskursforschung am Beispiel Collateral Murder Seite 31 2.1. Diskurskonzeption Seite 32 2.2. Videoanalyse Collateral Murder Seite 44 2.3. Bildanalyse collateralmurder.com Seite 54 3. Akteure des WikiLeaks-Online-Diskurses Seite 58 3.1. Argumentationsmuster, Topoi Seite 59 3.2. Massenmediale Inszenierung von WikiLeaks und Julian Assange Seite 71 3.3. Machtwirkungen und Normalisierungsprozesse Seite 91 4. Schlussbemerkung Seite 92 Bibliographie Seite 94 Lebenslauf Seite 97 - 3 - Abstract Die Internetplattform wikileaks.org publiziert geleakte Informationen, viele davon sind geheim eingestufte Originaldokumente aus verschiedenen Bereichen der Politik und der Wirtschaft, und stellt diese Informationen jedem Menschen mit Internetzugang zur Verfügung. Auf diese Weise möchte WikiLeaks das gesellschaftspolitische System verbessern, da WikiLeaks der Ansicht ist, dass nur eine transparente Regierung die Voraussetzung für eine „gute“ Regierung (good governance 1) bildet. Die Informationen können anonym hochgeladen werden, so dass der Informant geschützt ist, und WikiLeaks archiviert diese Wissensbestände, damit sie nicht in Vergessenheit geraten und immer wieder rezipiert werden können. Die Website ist hypertextuell aufgebaut und bedient sich unterschiedlicher multimedialer Mittel (Zusatztexte, Bilder, Videos, etc.), um komplizierte Gegebenheiten zu simplifizieren und diese zu belegen.
    [Show full text]
  • The Fifth Estate
    THE FIFTH ESTATE ** * OVER BLACK: A WHISPER OF VOICES, barely audible at first. Confessional, personal, people sharing SECRETS. WE FADE IN: EXT. GUARDIAN - LONDON, ENGLAND - NEAR MIDNIGHT A looming modern structure, steel and glass, home of... July 2010 The Guardian - London, England The whisper builds, pushing us into -- INT. GUARDIAN, BULLPEN - LONDON, ENGLAND - NEAR MIDNIGHT A low buzz, a hustle of activity, journalists swirling. REPORTER NICK DAVIES, 50s, handsome, hustles along with RUMPLED EDITOR ALAN RUSBRIDGER, 50s. Alan's on a blackberry. NICK DAVIES If we hold the shooting in Kabul we can keep it all to 14 pages. They pass ONE SHEETS tacked to the wall, we note the FRONT PAGE -- MASSIVE LEAK OF SECRET FILES EXPOSES TRUE AFGHAN WAR. ALAN RUSBRIDGER (off his blackberry) The Times wants to go. Alan glances over at Nick. Nick frowns. NICK DAVIES Let me talk to Rosenbach. INT. ANKE'S APARTMENT - BERLIN, GERMANY - NIGHT (SAME TIME) A quiet room. CLOSE ON a laptop screen, The Guardian website, no mention of the Afghan War Logs. The cursor moves, hits the REFRESH BUTTON. The screen refreshes. Nothing's changed. The cursor HITS the button again. The screen refreshes, again it's the same. As the cursor hits the button AGAIN -- EXT. POTSDAMER PLATZ - BERLIN, GERMANY - NIGHT (SAME TIME) A SMALL BUILDING overshadowed by an array of GRAND MODERNITY. Der Spiegel - Berlin, Germany A rumble of German voices take us into -- INT. DER SPIEGEL, STARK'S OFFICE - BERLIN - NIGHT (SAME TIME) A small office, ICONIC SPIEGEL COVERS on the walls. A BUTTONED UP EDITOR, STARK, 40s, stands over a PROGRAMMER working on the front page of SPIEGEL ONLINE.
    [Show full text]
  • Universal Periodic Review (UPR)
    Contribution to the Universal Periodic Review Mechanism 8th session of the Working Group of the Universal Periodic Review (UPR) A Joint UPR Submission on The Republic of Kenya by International PEN, the International Publishers Association (NGOs in Consultative Status with ECOSOC) PEN Kenyan Centre and Index on Censorship 2 November 2009 International PEN, PEN Kenyan Centre, the International Publisher’s Association and Index on Censorship welcome the opportunity provided by the Office of the High Commissioner on Human Rights to comment on the human rights situation in the Republic of Kenya, about which it has increasingly serious concerns. This document provides an overview of the current situation for writers and print journalists in the country and examples of specific cases of those whose right to freedom of expression and association has been restricted. Introduction In a television interview in Nairobi in August 2009, US Secretary of State Hillary Rodham Clinton highlighted the role that Kenya’s “vibrant free press” and civil society play in fighting corruption. The comment has proved controversial. There is no doubt that the press and civil society in the country have grown since the 1991 constitutional reform that brought in multiparty politics. The liberalisation of the media and the easing of government constraints have allowed Kenyans to exercise their right to freedom of opinion and expression1 more fully, particularly on political matters. Today there is a proliferation of private newspapers and TV and radio stations in English, Swahili and local languages, as well as civil society groups representing a broad range of interests. The days of state-controlled media, government censorship and writers and journalists being locked up for their views are over.
    [Show full text]
  • Andrew O'hagan · Ghosting: Julian Assange
    http://www.lrb.co.uk/v36/n05/andrew-ohagan/ghosting This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. (More Information) × LOG IN REGISTER FOR ONLINE ACCESS Search the LRB LATEST ARCHIVE BOOKSHOP CONTACT US ABOUT THE LRB SUBSCRIBE CURRENT ISSUE CONTENTS LETTERS CLASSIFIED AUDIO & VIDEO BLOG RSS Vol. 36 No. 5 · 6 March 2014 facebook617 twitter 276 pages 5-26 | 26467 words larger | smaller Ghosting Andrew O’Hagan Andrew O’Hagan’s new On 5 January 2011, at 8.30 p.m., I was messing about at home when the phone buzzed on the sofa. It novel, The Illuminations, will was a text from Jamie Byng, the publisher of Canongate. ‘Are you about?’ it said. ‘I have a somewhat be published next year. left-field idea. It’s potentially very exciting. But I need to discuss urgently.’ Canongate had bought, for £600,000, a memoir by the WikiLeaks founder, Julian Assange. The book had also been bought for a high sum by Sonny Mehta at Knopf in New York and Jamie had sold foreign rights to a slew of big MORE BY THIS houses. He said he expected it to be published in forty languages. Assange didn’t want to write the CONTRIBUTOR book himself but didn’t want the book’s ghostwriter to be anybody who already knew a lot about him. I told Jamie that I’d seen Assange at the Frontline Club the year before, when the first WikiLeaks Guilt stories emerged, and that he was really interesting but odd, maybe even a bit autistic.
    [Show full text]
  • Protestformen Im Cyberspace Möglichkeiten Und Grenzen Aus Zivilgesellschaftlicher Sicht
    Das Internet als Faktor des sozialen und kulturellen Wandels - Seminararbeit bei Prof. Dr. Hans Geser; FS 2012, Soziologisches Institut, Universität Zürich Protestformen im Cyberspace Möglichkeiten und Grenzen aus zivilgesellschaftlicher Sicht Hernani Marques Abgabedatum: 30.6.2012 Inhaltsverzeichnis 1 Einleitung 3 1.1 Gegenstand . 4 1.2 Fokus und Aufbau . 5 2 Theorie 7 2.1 Gegenstand . 7 2.1.1 Meinungsäusserung . 8 2.1.2 Petition . 8 2.1.3 Graffiti . 9 2.1.4 Demonstration . 10 2.1.5 Streik / Boykott . 11 2.1.6 Sitzblockade . 12 2.1.7 Selbstermächtigung . 13 2.1.8 “Terrorismus” . 15 2.2 Die verschiedenen Protestkulturen und deren -struktur . 16 3 Empirie 18 3.1 Gegenstand . 18 3.2 Fall WANK: Eine virulente politische Äusserung . 18 3.3 Fall Opendata.ch: Die Initiative zu einer maschinenlesbaren Regie- rung . 21 3.4 Fall Avaaz.org: Der Protest mit digitalen Petitionen . 22 3.5 Fall CCC / AK Vorrat: Der gesetzliche Kampf um informationelle Selbstbestimmung . 24 3.6 Fall Torservers.net: Die technologische Selbstermächtigung zur infor- mationellen Selbstbestimmung . 26 3.7 Fall WikiLeaks: Informationsfreiheit durch Selbstermächtigung . 28 3.8 Fall Anonymous / LulzSec: Informationsfreiheit durch Selbstermäch- tigung, digitalen Sitzblockaden und Defacements . 31 3.9 Fall Estland: Die bedeutende Störung der ICT-Infrastruktur eines Landes durch digitale Sitzblockladen und Defacements? . 37 1 4 Diskussion 38 4.1 Gegenstand . 38 4.2 Die Frage der Selbstermächtigung: Legitimität vs. Legalität . 38 4.3 Die Anonymitätsfrage: Mangelnde Anerkennung vs. Gefahr der Re- pression . 39 4.4 Die Organisationsfrage: Mangelnde Fassbarkeit vs. mangelnde Inklu- sion . 40 4.5 Die Frage der Wirksamkeit: Kurzfristiger vs.
    [Show full text]