Resistance, Liberation Technology and Human Rights in the Digital Age Law, Governance and Technology Series

Resistance, Liberation Technology and Human Rights in the Digital Age Law, Governance and Technology Series

Resistance, Liberation Technology and Human Rights in the Digital Age Law, Governance and Technology Series VOLUME 7 Series Editors: POMPEU CASANOVAS, UAB Institute of Law and Technology, Bellaterra, Barcelona, Spain GIOVANNI SARTOR, University of Bologna (Faculty of Law-CIRSFID) and European University Institute, Florence, Italy Scienti fi c Advisory Board: GIANMARIA AJANI, University of Turin, Italy; KEVIN ASHLEY, University of Pittsburgh, USA; KATIE ATKINSON, University of Liverpool, UK; TREVOR J.M. BENCH-CAPON, University of Liverpool, UK; V. RICHARDS BENJAMINS, Telefonica, Spain; GUIDO BOELLA, Universita’ degli Studi di Torino, Italy; JOOST BREUKER, Universiteit van Amsterdam, The Netherlands; DANIÈLE BOURCIER, CERSA, France; TOM BRUCE, University of Cornell, USA; NURIA CASELLAS, Institute of Law and Technology, UAB, Spain; CRISTIANO CASTELFRANCHI, ISTC-CNR, Italy; G. CONRAD JACK, Thomson Reuters, USA; ROSARIA CONTE, ISTC-CNR, Italy; FRANCESCO CONTINI, IRSIG-CNR, Italy; JESÚS CONTRERAS, iSOCO, Spain; JOHN DAVIES, British Telecommunications plc, UK; JOHN DOMINGUE, The Open University, UK; JAIME DELGADO, Arquitectura de Computadors, Spain; MARCO FABRI, IRSIG-CNR, Italy; DIETER FENSEL, University of Innsbruck, Austria; ENRICO FRANCESCONI, ITTIG, Italy; FERNANDO GALINDO, Universidad de Zaragoza, Spain; ALDO GANGEMI, ISTC-CNR, Italy; MICHAEL GENESERETH, Stanford University, USA; ASUNCIÓN GÓMEZ-PÉREZ, Universidad Politécnica de Madrid, Spain; THOMAS F. GORDON, Fraunhofer FOKUS, Germany; GUIDO GOVERNATORI, NICTA, Australia; GRAHAM GREENLEAF, The University of New South Wales, Australia; MARKO GROBELNIK, Josef Stefan Institute, Slovenia; JAMES HENDLER, Rensselaer Polytechnic Institute, USA; RINKE HOEKSTRA, Universiteit van Amsterdam, The Netherlands; ETHAN KATSH, University of Massachusetts Amherst, USA; MARC LAURITSEN, Capstone Practice Systems, Inc., USA; RONALD LEENES, TILT Institute, The Netherlands; ARNO LODDER, University of Amsterdam, The Netherlands; JOSÉ MANUEL LÓPEZ COBO, Playence, Austria; PIERRE MAZZEGA, LMTG - UMR5563 CNRS/IRD/UPS, France; MARIE-FRANCINEMOENS, Katholieke Universiteit Leuven, Belgium; PABLO NORIEGA, Edi fi ci IIIA-CSIC, Spain; ANJA OSKAMP, VU University Amsterdam, The Netherlands; SASCHA OSSOWSKI, Universidad Rey Juan Carlos, Spain; UGO PAGALLO, Università degli Studi di Torino, Italy; MONICA PALMIRANI, Università di Bologna, Italy; ABDUL PALIWALA, University of Warwick, UK; ENRIC PLAZA, Edi fi ci IIIA-CSIC, Spain; MARTA POBLET, Institute of Law and Technology, UAB, Spain; DANIEL POULIN, University of Montreal, Canada; HENRY PRAKKEN, Universiteit Utrecht, The Netherlands; HAI-BIN QI, Huazhong University of Science and Technology, P.R. China; DORY REILING, Amsterdam District Court, The Netherlands; PIER CARLO ROSSI, Italy; EDWINA L. RISSLAND, University of Massachusetts, Amherst, USA; COLIN RULE, University of Massachusetts, USA; MARCO SCHORLEMMER, IIIA-CSIC, Spain; CARLES SIERRA, IIIA-CSIC, Spain; MIGEL ANGEL SICILIA, Universidad de Alcalá, Spain; RUDI STUDER, Karlsruhe Institute of Technology, Germany; DANIELA TISCORNIA, ITTIG, Italy; JOAN-JOSEP VALLBÉ, Institute of Law and Technology, UAB, Spain; TOM VAN ENGERS, Universiteit van Amsterdam, The Netherlands; FABIO VITALI, Università di Bologna, Italy; MARY-ANN WILLIAMS, The University of Technology, Sydney, Australia; RADBOUD WINKELS, University of Amsterdam, The Netherlands; ADAMWYNER, University of Liverpool, UK; HAJIME YOSHINO, Meiji Gakuin University, Japan; JOHN ZELEZNIKOW, University of Victoria, Australia For further volumes: http://www.springer.com/series/8808 Giovanni Ziccardi Resistance, Liberation Technology and Human Rights in the Digital Age Giovanni Ziccardi Department “Cesare Beccaria” Faculty of Law University of Milan Milano , Italy ISBN 978-94-007-5275-7 ISBN 978-94-007-5276-4 (eBook) DOI 10.1007/978-94-007-5276-4 Springer Dordrecht Heidelberg New York London Library of Congress Control Number: 2012949676 © Springer Netherlands 2013 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, speci fi cally the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on micro fi lms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied speci fi cally for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in its current version, and permission for use must always be obtained from Springer. Permissions for use may be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecution under the respective Copyright Law. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a speci fi c statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein. Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com) Contents 1 Opening Remarks: Hacking and Digital Dissidence.............................. 1 1.1 Using Computers for the Pursuit of Political and Social Changes and for the Bene fi t of All Mankind ..................................... 1 1.2 From Early Hackers to Digital Resistance Activities ........................ 5 1.3 The So-Called Twitter Revolutions .................................................... 7 1.4 The Worldwide Scenario, and Some Preliminary Interpretative Questions ..................................................................... 9 References ................................................................................................... 22 2 Digital Resistance, Digital Liberties and Digital Transparency ........... 27 2.1 A Preliminary De fi nition of Digital Resistance and Digital Liberties .......................................................................... 27 2.1.1 Some Focal Aspects of Digital Dissidence ............................ 27 2.1.2 Preliminary Legal and Political Remarks .............................. 28 2.1.3 The Power of Technology in Critical Contexts and the New Public Sphere .................................................... 30 2.2 The Fundamental Role of a Secure (and Peer-Reviewed) Liberation Technology: The Haystack Case-History ......................... 32 2.3 Two Key Aspects of Digital Resistance Activities, and Several Case Studies ................................................................... 36 2.3.1 The Key Aspects of Dissident Activities ............................... 36 2.3.2 Digital Resistance Case-Studies ............................................. 41 2.4 Open Government, Collaborative Transparency and Civic Hacking as a Form of Digital Resistance .......................... 47 2.4.1 The Idea of Government as a Platform for Transparency..................................................................... 47 2.4.2 The Metaphor of Government 2.0 and the Idea of Collaborative Transparency ............................................... 49 v vi Contents 2.4.3 Citizen Engagement for the Oversight of Political Activity ................................................................ 51 2.4.4 Collaborative Mapping and Digital Resistance ...................... 59 References ................................................................................................... 68 3 Hacking and Digital Dissidence Activities .............................................. 73 3.1 The Role of Hackers in the Landscape of Digital Resistance .......... 73 3.2 A First Analysis of Common Threats to Digital Freedom and to Hacker Activities ................................................... 74 3.3 Being a Hacker in This Framework ................................................. 76 3.3.1 Thinking Like a Hacker ....................................................... 76 3.3.2 State Antagonism, Fear and Violence .................................. 79 3.4 A Brand New Playground ................................................................ 81 3.4.1 Liberation Technologies ....................................................... 81 3.4.2 Anonymity and Bloggers’ Rights ........................................ 84 3.4.3 Innovation ............................................................................ 86 3.4.4 Intellectual Property and Privacy ......................................... 86 3.4.5 EPIC Activities in the Field of Privacy ................................ 88 3.4.6 Transparency ........................................................................ 89 3.5 A New Perspective on Hacking ....................................................... 90 3.5.1 The Essence of hacking ....................................................... 90 3.5.2 The Hacker Spirit

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    330 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us