Ten Years of Hacking and Media Activism Autistici/ Inventati 2 Theory on Demand

Total Page:16

File Type:pdf, Size:1020Kb

Ten Years of Hacking and Media Activism Autistici/ Inventati 2 Theory on Demand +KAOS TEN YEARS OF HACKING AND MEDIA ACTIVISM AUTISTICI/ INVENTATI +KAOS. TEN YEARS OF HACKING AND MEDIA ACTIVISM A SERIES OF READERS PUBLISHED BY THE INSTITUTE OF NETWORK CULTURES ISSUE NO.: 23 INSTITUTE OF NETWORK CULTURES +KAOS TEN YEARS OF HACKING AND MEDIA ACTIVISM AUTISTICI/ INVENTATI 2 THEORY ON DEMAND Theory on Demand #23 +KAOS. Ten Years of Hacking and Media Activism With forewords by Maxigas, Ferry Byte, and Sandrone Dazieri. Authors: Autistici/Inventati Editor: Laura Beritelli Translation: Laura Beritelli, Trish Byrne, reginazabo, blicero, and other anonymous supporters who we are very thankful to. Editorial Support: Miriam Rasch Cover design: Katja van Stiphout Design: Inga Luchs EPUB development: Inga Luchs Publisher: Institute of Network Cultures, Amsterdam, 2017 ISBN: 978-94-92302-16-8 English Edition, April 2017 First published in Italian as +Kaos. 10 anni di hacking e mediattivismo, Agenzia X, 2012. Contact Institute of Network Cultures Phone: +3120 5951865 Email: [email protected] Web: http://www.networkcultures.org This publication is available through various print on demand services and freely downloadable from http://networkcultures.org/publications This publication is licensed under the Creative Commons Attribution-NonCommercial-NoD- erivatives 4.0 International (CC BY-NC-SA 4.0). +KAOS. TEN YEARS OF HACKING AND MEDIA ACTIVISM 3 This book is dedicated to the community of our users. +KAOS. TEN YEARS OF HACKING AND MEDIA ACTIVISM 5 CONTENTS Prefactious by Ferry Byte 7 Preface by Maxigas 11 Introduction to the English Edition by A/I 19 Foreword by Sandrone Dazieri 21 PART I: From 1990 to 2001 From the Panther to Genoa G8 22 Setting the Scene, 1990-2000 Hacktivism, 1990-2000 The ECN Experience The Greater Milan Area – Autistici Florence – Inventati Bologna First Meeting The Foundation Online Training Direct Communication Indymedia The Joy of Doing Hackmeeting in Catania: A Train Load of 486s Genoa PART II: From 2001 to 2006 From the Genoa Aftermath to the Politics of Emergency 71 Setting the Scene, 2001-2006 Hacktivism, 2001-2006 After Genoa 2001 European Social Forum Kaos Tour and Communications Strategies Legal Cases – Trenitalia, 2004 Towards Plan R*: A/I’s Inadvertent Centrality Legal Cases – Aruba Crackdown, 2004-2005 Plan R* Download a Copy, Upload an Idea No(b)logs 6 THEORY ON DEMAND PART III: From 2006 to 2011 Recent Years or Before the World Changed 105 Setting the Scene, 2006-2011 Hacktivism, 2006-2011 A Collaborative Network Legal Cases Orwell’s Grandchildren Legal Cases – The Norwegian Crackdown Toilet Duties by Ginox Glossary 126 References 140 +KAOS. TEN YEARS OF HACKING AND MEDIA ACTIVISM 7 PREFACTIOUS: THE INVENTED VOICES OF A UNIQUE AND UNREPEATABLE AUTISM Prepare yourselves to read a book where cryptography1-obsessed activists lay bare their organization, and the digital communication that has totally or partially accompanied your existence in recent years under the banner of media activism, literally materializes and even gets nicknamed, repeatedly. If you are compulsive users of Autistici/Inventati’s or Indymedia Italy’s grassroots servers, this is the right place to figure out the mechanics that underlie the Italian media activists’ digital communications. The unveiling of these mechanics will surprise you, but most of all, it will necessarily change you and allow your consciences to evolve (from the current state of things), thus impacting upon your perception of how the world, not only the digital, works. This book has been surprising to me, who belongs neither to Autistici and Inventati’s gener- ation nor crew, but consider myself – genealogically and ideally – their elder brother. After the preface I wrote about Mela Marcia,2 I welcome the opportunity of writing a new, factious preface, or a prefactious. In fact, you have to be partly a partisan if you want to fully appreciate this book, whose merits include the ability to turn the greater part of the people who decide to read this book into partisans, even if they are not fans of Italian media activism. One of the worthiest aspects of this book is its narrative approach, revealing the real nature of the relationship between politics and media (be they digital or not), between real powers and temporary forms of counterpower. I gobbled up this book; its narrative literally overwhelmed me – a wild stream of voices tracing back a decade-long history of passion and rage, gaffes and ideas. These feelings character- ized the activities of a large collective of digital activists who became talked about the world over. The greatest merit of this choral story – a virtual transcription of many oral underground subcultures that have emerged like an underground river – is its ability to humanize a certain kind of digital communication; knowing that behind a service, an acronym, a blogging platform, an anonymous remailer, there is a certain nickname, a person in flesh and blood – with her character, gender, age, and opinions – certainly adds an extra value to what we have enjoyed through our laptop screens during these long, hard years. Hard, that’s what they were – hard, painful, and demanding. That’s how they appear in this book, and that’s how they should be described by someone who has had the will and reso- lution to talk on the web about an Italian movement that in the last few years has witnessed killings, arrests, and jail, as though a revolution had exploded or a ghost was haunting the world… But the voices of the movement against the high speed train or of the anti-globaliza- tion protests deserve(d) a lot more attention, also in view of the latest developments and espe- cially of the policies – often unreasonable and socially useless – these struggles try to resist. 1 Please refer to the glossary at the end. 2 Mela Marcia: ‘Rotten Apple’, a collectively authored critical history of Apple Inc., published by Agenzia X in Milan. Collettivo NGN, Mela Marcia, Milano: Agenzia X, 2010. 8 THEORY ON DEMAND Over ten years these folks have had to face the G8 and the TAV, as well as the fierce attack by the recording industry and the Italian copyright enforcement agency against the free sharing of information online. During this decade businesses and political organizations have reacted with violence to counter-information3 efforts they found offensive. There has been a series of trials and server seizures. Privacy has melted like snow in the face of Facebook’s sun, and our digital lives have been swept away by the tsunami of globalization, by the airbus of the finan- cial crisis. Our world has been devastated in just one decade. So don’t be astonished if you see them in their dark clothes, with their suspicious gazes and their sharp tongues. They’ve kept their crude, direct style in order to stay focused during these hard, challenging years. But the underlying tone of this book does not carry a sense of sadness, nostalgia, or defeat. What prevails throughout the whole story is humor, a good friend of cleverness and critique. This is actually the last resource we can use to survive under siege, when we feel the tech- no-control breathing down our neck… They’re watching us, even if we’ve only set up a network of encrypted communications for food recipes! This book is full of stories, but it also leaves a lot untold. Perhaps this is the important part of its fundamental message: while motivations and justifications are often hard to explain, the guiding thread is extremely sober – it is made of reflections and actions which are undeniably aimed towards a notion of common good, and of improvement of individual and collective perspectives. The red thread of this book is the movements that fight for an alternative to the current state of affairs. As you read this book, you will hear the hissing of The Matrix in the background – the parallel history of the technical evolution of online communication, as seen from the uncomfortable vantage point of a willing, self-declared avant-garde. Having had the opportunity of experi- menting with a range of technological potentialities for the first time, these people enjoyed the privilege of turning into high-tech Cassandras, of saying repeatedly ‘I told you so!’ to smaller or larger audiences who were mostly reluctant to understand and challenge the latest developments. In a handful of years, we went from listening to night time radio transmissions of weird sounds like bzz... scrthcchh… ftbleehh…, recording them on audio tapes (!?!) to be properly modu- lated and demodulated (wow! that’s what the name ‘modem’ comes from!), and using them as software for our friend’s ZX Spectrum (because he was the only one who could afford to buy it), to the wonders of the social-networked world. But in between there were the bulletin board systems (BBSs), the birth of the web, newsgroups, Internet-relay chat (IRC) channels, mailing lists, email, blogs, online videos, and all the social media… A decade seen through 3 Counter-information: A term commonly used in 1970s in Italy to describe responses to the censored or distorted versions of events published in the mainstream media. This alternative press encompassed both activist publishers and investigative journalists lifting the lid on the shady incidents. These efforts were especially significant amidst the so-called ‘strategy of tension’ – bombings orchestrated by sectors of the state, carried out by the far right, and used to justify repression of the left – and in specific incidents such as the death of the anarchist Pinelli through defenestration. The concept of counter- information has been superseded by that of ‘alternative media’, but is arguably best understood as both a product of media history (the period where news and information was still highly centralized, especially in the case of TV) and a moment in the history of ideas, where it was believed that if only people knew the truth they could, and would, act to change society.
Recommended publications
  • Alive Dead Media 2020: Tracker and Chip Music
    Alive Dead Media 2020: Tracker and Chip Music 1st day introduction, Markku Reunanen Pics gracefully provided by Wikimedia Commons Arrangements See MyCourses for more details, but for now: ● Whoami, who’s here? ● Schedule of this week: history, MilkyTracker with Yzi, LSDJ with Miranda Kastemaa, holiday, final concert ● 80% attendance, two tunes for the final concert and a little jingle today ● Questions about the practicalities? History of Home Computer and Game Console Audio ● This is a vast subject: hundreds of different devices and chips starting from the late 1970s ● In the 1990s starts to become increasingly standardized (or boring, if you may :) so we’ll focus on earlier technology ● Not just hardware: how did you compose music with contemporary tools? ● Let’s hear a lot of examples – not using Zoom audio The Home Computer Boom ● At its peak in the 1980s, but started somewhat earlier with Apple II (1977), TRS-80 (1977) and Commodore PET (1977) ● Affordable microprocessors, such as Zilog Z80, MOS 6502 and the Motorola 6800 series ● In the 1980s the market grew rapidly with Commodore VIC-20 (1980) and C-64 (1982), Sinclair ZX Spectrum (1982), MSX compatibles (1983) … and many more! ● From enthusiast gadgets to game machines Enter the 16-bits ● Improving processors: Motorola 68000 series, Intel 8088/8086/80286 ● More colors, more speed, more memory, from tapes to floppies, mouse(!) ● Atari ST (1984), Commodore Amiga (1985), Apple Macintosh (1984) ● IBM PC and compatibles (1981) popular in the US, improving game capability Not Just Computers ● The same technology powered game consoles of the time ● Notable early ones: Fairchild Channel F (1976), Atari VCS aka.
    [Show full text]
  • Confronting the Challenges of Participatory Culture: Media Education for the 21St Century
    An occasional paper on digital media and learning Confronting the Challenges of Participatory Culture: Media Education for the 21st Century Henry Jenkins, Director of the Comparative Media Studies Program at the Massachusetts Institute of Technology with Katie Clinton Ravi Purushotma Alice J. Robison Margaret Weigel Building the new field of digital media and learning The MacArthur Foundation launched its five-year, $50 million digital media and learning initiative in 2006 to help determine how digital technologies are changing the way young people learn, play, socialize, and participate in civic life.Answers are critical to developing educational and other social institutions that can meet the needs of this and future generations. The initiative is both marshaling what it is already known about the field and seeding innovation for continued growth. For more information, visit www.digitallearning.macfound.org.To engage in conversations about these projects and the field of digital learning, visit the Spotlight blog at spotlight.macfound.org. About the MacArthur Foundation The John D. and Catherine T. MacArthur Foundation is a private, independent grantmaking institution dedicated to helping groups and individuals foster lasting improvement in the human condition.With assets of $5.5 billion, the Foundation makes grants totaling approximately $200 million annually. For more information or to sign up for MacArthur’s monthly electronic newsletter, visit www.macfound.org. The MacArthur Foundation 140 South Dearborn Street, Suite 1200 Chicago, Illinois 60603 Tel.(312) 726-8000 www.digitallearning.macfound.org An occasional paper on digital media and learning Confronting the Challenges of Participatory Culture: Media Education for the 21st Century Henry Jenkins, Director of the Comparative Media Studies Program at the Massachusetts Institute of Technology with Katie Clinton Ravi Purushotma Alice J.
    [Show full text]
  • A History of End-To-End Encryption and the Death of PGP
    25/05/2020 A history of end-to-end encryption and the death of PGP Hey! I'm David, a security engineer at the Blockchain team of Facebook (https://facebook.com/), previously a security consultant for the Cryptography Services of NCC Group (https://www.nccgroup.com). I'm also the author of the Real World Cryptography book (https://www.manning.com/books/real-world- cryptography?a_aid=Realworldcrypto&a_bid=ad500e09). This is my blog about cryptography and security and other related topics that I Ûnd interesting. A history of end-to-end encryption and If you don't know where to start, you might want to check these popular the death of PGP articles: posted January 2020 - How did length extension attacks made it 1981 - RFC 788 - Simple Mail Transfer Protocol into SHA-2? (/article/417/how-did-length- extension-attacks-made-it-into-sha-2/) (https://tools.ietf.org/html/rfc788) (SMTP) is published, - Speed and Cryptography the standard for email is born. (/article/468/speed-and-cryptography/) - What is the BLS signature scheme? (/article/472/what-is-the-bls-signature- This is were everything starts, we now have an open peer-to-peer scheme/) protocol that everyone on the internet can use to communicate. - Zero'ing memory, compiler optimizations and memset_s (/article/419/zeroing-memory- compiler-optimizations-and-memset_s/) 1991 - The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations The US government introduces the 1991 Senate Bill 266, (/article/461/the-9-lives-of-bleichenbachers- which attempts to allow "the Government to obtain the cat-new-cache-attacks-on-tls- plain text contents of voice, data, and other implementations/) - How to Backdoor Di¸e-Hellman: quick communications when appropriately authorized by law" explanation (/article/360/how-to-backdoor- from "providers of electronic communications services di¸e-hellman-quick-explanation/) and manufacturers of electronic communications - Tamarin Prover Introduction (/article/404/tamarin-prover-introduction/) service equipment".
    [Show full text]
  • Battle of the Clipper Chip - the New York Times
    Battle of the Clipper Chip - The New York Times https://www.nytimes.com/1994/06/12/magazine/battle-of-the-clipp... https://nyti.ms/298zenN Battle of the Clipper Chip By Steven Levy June 12, 1994 See the article in its original context from June 12, 1994, Section 6, Page 46 Buy Reprints VIEW ON TIMESMACHINE TimesMachine is an exclusive benefit for home delivery and digital subscribers. About the Archive This is a digitized version of an article from The Times’s print archive, before the start of online publication in 1996. To preserve these articles as they originally appeared, The Times does not alter, edit or update them. Occasionally the digitization process introduces transcription errors or other problems; we are continuing to work to improve these archived versions. On a sunny spring day in Mountain View, Calif., 50 angry activists are plotting against the United States Government. They may not look subversive sitting around a conference table dressed in T-shirts and jeans and eating burritos, but they are self-proclaimed saboteurs. They are the Cypherpunks, a loose confederation of computer hackers, hardware engineers and high-tech rabble-rousers. The precise object of their rage is the Clipper chip, offically known as the MYK-78 and not much bigger than a tooth. Just another tiny square of plastic covering a silicon thicket. A computer chip, from the outside indistinguishable from thousands of others. It seems 1 of 19 11/29/20, 6:16 PM Battle of the Clipper Chip - The New York Times https://www.nytimes.com/1994/06/12/magazine/battle-of-the-clipp..
    [Show full text]
  • 0714685003.Pdf
    CONTENTS Foreword xi Acknowledgements xiv Acronyms xviii Introduction 1 1 A terrorist attack in Italy 3 2 A scandal shocks Western Europe 15 3 The silence of NATO, CIA and MI6 25 4 The secret war in Great Britain 38 5 The secret war in the United States 51 6 The secret war in Italy 63 7 The secret war in France 84 8 The secret war in Spain 103 9 The secret war in Portugal 114 10 The secret war in Belgium 125 11 The secret war in the Netherlands 148 12 The secret war in Luxemburg 165 ix 13 The secret war in Denmark 168 14 The secret war in Norway 176 15 The secret war in Germany 189 16 The secret war in Greece 212 17 The secret war in Turkey 224 Conclusion 245 Chronology 250 Notes 259 Select bibliography 301 Index 303 x FOREWORD At the height of the Cold War there was effectively a front line in Europe. Winston Churchill once called it the Iron Curtain and said it ran from Szczecin on the Baltic Sea to Trieste on the Adriatic Sea. Both sides deployed military power along this line in the expectation of a major combat. The Western European powers created the North Atlantic Treaty Organization (NATO) precisely to fight that expected war but the strength they could marshal remained limited. The Soviet Union, and after the mid-1950s the Soviet Bloc, consistently had greater numbers of troops, tanks, planes, guns, and other equipment. This is not the place to pull apart analyses of the military balance, to dissect issues of quantitative versus qualitative, or rigid versus flexible tactics.
    [Show full text]
  • The Political Clubs of United Russia: Incubators of Ideology Or Internal Dissent?
    The Political Clubs of United Russia: Incubators of Ideology or Internal Dissent? Thesis Presented in Partial Fulfillment of the Requirements for the Degree of Master of Arts in the Graduate School of The Ohio State University By Eileen Marie Kunkler, B.A. Graduate Program in Slavic and East European Studies The Ohio State University 2010 Thesis Committee: Goldie Shabad, Adviser Trevor Brown Copyright by Eileen Marie Kunkler 2010 Abstract In 2008, three political clubs were officially formed within the United Russia party structure: the Social-Conservative Club, the Liberal-Conservative Club, and the State-Patriotic Club. Membership of these clubs includes many powerful Duma representatives. Officially, their function is to help develop strategies for implementing the government‟s Strategy 2020. However, a closer examination of these clubs suggests that they also may function as an ideology incubator for the larger party and as a safety valve for internal party dissent. To answer the question of what the true function of these clubs is an attempt will be made to give: a brief overview of Unity‟s and Fatherland-All Russia‟s formation; a description of how United Russia formed; a summary of the ideological currents within United Russia from 2001-2009; a discussion of the three clubs; and a comparative analysis of these clubs to the Christian Democratic party of Italy and the Liberal Democratic Party of Japan. Based on this evidence, it will be argued that primary purpose of these clubs is to contain intra-party conflict. ii Dedication Dedicated to my family and friends iii Acknowledgements I wish to thank my adviser, Goldie Shabad, for all of her help, advice, and patience in working on this project with me.
    [Show full text]
  • History of the Internet-English
    Sirin Palasri Steven Huter ZitaWenzel, Ph.D. THE HISTOR Y OF THE INTERNET IN THAILAND Sirin Palasri Steven G. Huter Zita Wenzel (Ph.D.) The Network Startup Resource Center (NSRC) University of Oregon The History of the Internet in Thailand by Sirin Palasri, Steven Huter, and Zita Wenzel Cover Design: Boonsak Tangkamcharoen Published by University of Oregon Libraries, 2013 1299 University of Oregon Eugene, OR 97403-1299 United States of America Telephone: (541) 346-3053 / Fax: (541) 346-3485 Second printing, 2013. ISBN: 978-0-9858204-2-8 (pbk) ISBN: 978-0-9858204-6-6 (English PDF), doi:10.7264/N3B56GNC ISBN: 978-0-9858204-7-3 (Thai PDF), doi:10.7264/N36D5QXN Originally published in 1999. Copyright © 1999 State of Oregon, by and for the State Board of Higher Education, on behalf of the Network Startup Resource Center at the University of Oregon. This work is licensed under a Creative Commons Attribution- NonCommercial 3.0 Unported License http://creativecommons.org/licenses/by-nc/3.0/deed.en_US Requests for permission, beyond the Creative Commons authorized uses, should be addressed to: The Network Startup Resource Center (NSRC) 1299 University of Oregon Eugene, Oregon 97403-1299 USA Telephone: +1 541 346-3547 Email: [email protected] Fax: +1 541-346-4397 http://www.nsrc.org/ This material is based upon work supported by the National Science Foundation under Grant No. NCR-961657. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
    [Show full text]
  • Telecommunications Infrastructure for Electronic Delivery 3
    Telecommunications Infrastructure for Electronic Delivery 3 SUMMARY The telecommunications infrastructure is vitally important to electronic delivery of Federal services because most of these services must, at some point, traverse the infrastructure. This infrastructure includes, among other components, the Federal Government’s long-distance telecommunications program (known as FTS2000 and operated under contract with commercial vendors), and computer networks such as the Internet. The tele- communications infrastructure can facilitate or inhibit many op- portunities in electronic service delivery. The role of the telecommunications infrastructure in electronic service delivery has not been defined, however. OTA identified four areas that warrant attention in clarifying the role of telecommunications. First, Congress and the administration could review and update the mission of FTS2000 and its follow-on contract in the context of electronic service delivery. The overall perform- ance of FTS2000 shows significant improvement over the pre- vious system, at least for basic telephone service. FTS2000 warrants continual review and monitoring, however, to assure that it is the best program to manage Federal telecommunications into the next century when electronic delivery of Federal services likely will be commonplace. Further studies and experiments are needed to properly evaluate the benefits and costs of FTS2000 follow-on options from the perspective of different sized agencies (small to large), diverse Federal programs and recipients, and the government as a whole. Planning for the follow-on contract to FTS2000 could consider new or revised contracting arrangements that were not feasible when FTS2000 was conceived. An “overlapping vendor” ap- proach to contracting, as one example, may provide a “win-win” 57 58 I Making Government Work situation for all parties and eliminate future de- national infrastructure will be much stronger if bates about mandatory use and service upgrades.
    [Show full text]
  • Final Exploitation Plan
    D9.10 – Final Exploitation Plan Jorge Lpez (Atos), Alessandra Tedeschi (DBL), Julian Williams (UDUR), abio Massacci (UNITN), Raminder Ruprai (NGRID), Andreas Schmitz ( raunhofer), Emilio Lpez (URJC), Michael Pellot (TMB), Zden,a Mansfeldov. (ISASCR), Jan J/r0ens ( raunhofer) Pending of approval from the Research Executive Agency - EC Document Number D1.10 Document Title inal e5ploitation plan Version 1.0 Status inal Work Packa e WP 1 Deliverable Type Report Contractual Date of Delivery 31 .01 .20 18 Actual Date of Delivery 31.01.2018 Responsible Unit ATOS Contributors ISASCR, UNIDUR, UNITN, NGRID, DBL, URJC, raunhofer, TMB (eyword List E5ploitation, ramewor,, Preliminary, Requirements, Policy papers, Models, Methodologies, Templates, Tools, Individual plans, IPR Dissemination level PU SECONO.ICS Consortium SECONOMICS ?Socio-Economics meets SecurityA (Contract No. 28C223) is a Collaborative pro0ect) within the 7th ramewor, Programme, theme SEC-2011.E.8-1 SEC-2011.7.C-2 ICT. The consortium members are: UniversitG Degli Studi di Trento (UNITN) Pro0ect Manager: prof. abio Massacci 1 38100 Trento, Italy abio.MassacciHunitn.it www.unitn.it DEEP BLUE Srl (DBL) Contact: Alessandra Tedeschi 2 00113 Roma, Italy Alessandra.tedeschiHdblue.it www.dblue.it raunhofer -Gesellschaft zur Irderung der angewandten Contact: Prof. Jan J/r0ens 3 orschung e.V., Hansastr. 27c, 0an.0uer0ensHisst.fraunhofer.de 80E8E Munich, Germany http://www.fraunhofer.de/ UNIVERSIDAD REL JUAN CARLOS, Contact: Prof. David Rios Insua 8 Calle TulipanS/N, 28133, Mostoles david.riosHur0c.es
    [Show full text]
  • Text of the German Application of Art of Coding
    This is the Text of the German application of Art of Coding (www.http://demoscene-the-art-of-coding.net) with the purpose of bringing the demoscene onto the ​ ​ list of UNESCO intangible cultural heritage of humanity. The application was submitted in Oct 2019 and has been written in an collaborative community effort led by Tobias Kopka supported by Andre Kudra, Stephan Maienhöfer, Gleb Albert, Christian Brandt, Andreas Lange and many more who gave their hands at Digitale Kultur und Tastatur und Maus e.V. The structure depends on the form, which is given by the German UNESCO. In spite the structure differs from forms used in other countries text modules can be used for application in other countries. The texts in square brackets are part of the German form. Also every kind of feedback is welcome, which could be taken into account for future use. Use ‘team (at) demoscene-the-art-of-coding.net’ 1. Type of Immaterial Cultural Heritage [Please tick the applicable sections and elaborate in keywords (multi-selection possible, but not mandatory)] Section A) verbally passed on traditions and expressions [keywords]: own technical vocabulary, own idiom with specialized terminology, English is lingua franca Section B) performing arts (music, theatre, dance) [keywords]: composition, performant, live, public presentation, animation Section C) social tradition, (seasonal) celebration and ritual [keywords]: demoparties, competitions, visitor voting, price ceremonies Section D) Knowledge and customs, related to nature or the universe [keywords]: digitalized living environment, cyberspace, virtual reality Section E) traditional craftsmanship [keywords]: coding, composition, animation, adoption, do-it-yourself Section F) other 2.
    [Show full text]
  • Get Ready for the Future
    GET READY FOR THE FUTURE Tel: +39 02 27 201 352 www.teledata-i.com [email protected] 40 YEARS OF HISTORY Teledata has been designing and manufacturing safety electronic devices for 40 years. In the early years, the company started its business manufacturing ad hoc electronic solutions for aerospace applications for national and foreign leader companies. This allowed the know-how of the company to achieve the highest levels in cutting-edge electronics sector. During this period the company widened its horizons developing specific solutions for the safety field, which in the early eighties occupied a market in which no standard solution existed. Over the years, Teledata continued investing in the safety field combining system design with large-scale manufacturing of high technological content. The company continued with the design and manufacturing of electronic devices, while constantly generating and increasing the value chain benefiting the final customers. Teledata today offers a self production range of safety system, fire prevention and video surveillance products; it has an important presence on the international market, and gives an important contribution to export the Made in Italy excellence. The company participates in several national and international work committees sharing experience, necessiteses, goals, actions and values to have previews and perspectives for tomorrow’s market. 1 www.teledata-i.com Arab National Bank Riyadh Banks and Financial Buildings Sites realized in Italy 13000 Sites realized abroad 1800 Poste Italiane
    [Show full text]
  • Book of Abstracts
    BOOK OF ABSTRACTS 2ND AIPH ANNUAL CONFERENCE PISA – 11-15 JUNE 2018 Table of contents AIPH1 - LIBRARIES AND PUBLIC HISTORY: RESOURCES AND METHODS 12 Learning from the Scientific Literature: Information Literacy Education in Libraries and Beyond 12 Public Libraries as a Hub for Sources on Local History and Culture 13 Special Libraries, Personal Collections: Which Role for Public History? 13 School Libraries and Archives for Public History 14 AIPH2 - THE VALORIZATION OF THE CULTURAL HERITAGE THROUGH THE CULTURAL ITINERARIES AS AN ELEMENT OF TOURISTIC PROMOTION OF THE TERRITORIES 14 Building an itinerary with historical foundations: the case of “Cammino di S. Giulia” 15 The definition of landscape, how it is perceived, its historical features and peculiarities within the “cammini” 15 The construction of a Cultural Itinerary between historical and landscape valorization and practicability 16 An Itinerary of the Ex-Voto Between Sicily and Malta: The Sixteenth-Century Frescoes of the Convent of the Cross in Scicli 16 An itinerary of the Ex-Voto in Sicily: the polychrome majolica of the Sanctuary of “Maria SS. del Ponte” in Caltagirone 17 AIPH3 - PROFESSIONAL FIELDS FOR PUBLIC HISTORY IN ITALY 18 Public History practises for engaged theatre 18 Oral and digital archives: a public approach 19 Urban renovation, literature and Public History 19 Cultural Heritage: valorization networks between universities, private foundations and cultural institutes 20 AIPH4 - BUSINESS ARCHIVES: EXPERIENCES AND PERSPECTIVES REGARDING PARTICIPATORY ARCHIVES 20 Fondazione Dalmine. Promoting industrial culture 21 Communicating the archive: oral sources and theater as a vehicle for emotions 22 The business archive as a tool of dialogue and participation 23 AggiungiPROmemoria “participatory archive” Lab 23 AIPH5 - LEADERSHIP AND DEMOCRACY IN A MASS SOCIETY EXHIBITIONS ON GRAMSCI, NENNI, MORO, TRENTIN BIOGRAPHIES BY IMAGES AND DOCUMENTS 24 Antonio Gramsci and the Great War 25 Nenni, Father of the Republic 25 Images of a Life.
    [Show full text]