{"id":346,"date":"2015-06-03T18:09:28","date_gmt":"2015-06-03T16:09:28","guid":{"rendered":"http:\/\/beatricemartini.it\/blog\/?p=346"},"modified":"2015-06-03T18:13:40","modified_gmt":"2015-06-03T16:13:40","slug":"digital-civil-disobedience","status":"publish","type":"post","link":"https:\/\/beatricemartini.it\/blog\/digital-civil-disobedience\/","title":{"rendered":"Digital civil disobedience: tactics, tools and future threads"},"content":{"rendered":"<p>Protests, uprising and unrest are key elements of freedom of expression, contributing to the shape of society and public debate through history.<br \/>\nOver the centuries, individuals and groups have adopted countless tactics to reclaim rights and fight for justice \u2013 changing over time, transforming strategically according to different historical and political contexts.<\/p>\n<p>What\u2019s the current state of the art? Which are the tools adopted by protesters to raise awareness, unrest and mobilise?<br \/>\nTechnology has entered the the world of activism, and we can recognise forms of protests which combine offline and online elements, as well as expressions of dissent which exclusively operate in the digital space.<br \/>\nThis article aims to provide an overview of how digital civil disobedience looks like today, observe which tactics are in use and consider a possible path to develop the future tools which will help global citizens reclaim their rights.<\/p>\n<blockquote class=\"twitter-tweet\" lang=\"en\">\n<p dir=\"ltr\" lang=\"en\">Civil disobedience tends to be taken on by the few. But it creates an environment where broader grass roots social movements can thrive.<\/p>\n<p>\u2014 Gabriella Coleman (@BiellaColeman) <a href=\"https:\/\/twitter.com\/BiellaColeman\/status\/602454027742224384\">May 24, 2015<\/a><\/p><\/blockquote>\n<p><script src=\"\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><br \/>\n<!--more--><\/p>\n<h3>What is digital civil disobedience<\/h3>\n<p>Talking about civil disobedience and digital civil disobedience alike requires the acknowledgment of controversies and debates influencing both activists\u2019 actions and theorists\u2019 studies relating to them.<\/p>\n<p>In this context, <a href=\"http:\/\/criticallegalthinking.com\/2012\/07\/02\/civil-disobedience-between-symbolic-politics-and-real-confrontation\/\">Robin Celikates describes<\/a> <b>civil disobedience<\/b> as \u201can intentionally unlawful and principled collective act of protest (in contrast to both legal protest and \u201cordinary\u201d criminal offenses or \u201cunmotivated\u201d rioting), that (in contrast to conscientious objection, which is protected in some states as a fundamental right) has the political aim of changing specific laws, policies or institutions\u201d.<\/p>\n<p>Civil disobedience has been adopting a variety of approaches over the centuries, trying to increase the impact of protesters\u2019 mobilisation and the efficacy of their actions. Among the most popular tactics adopted: demonstrations, sit-ins, workplace occupations, blockades, strikes, tax resistance, conscientious objection, sabotage.<\/p>\n<p>Focusing on the most recent decades, we can reckon that the advent of the internet has had the most sensational effect on a growing number of countries. Since the early 90s the internet has become an increasingly (though not universally) accessible network (to the date of publishing <a href=\"http:\/\/www.internetlivestats.com\/internet-users\/\">it\u2019s estimated<\/a> that from less than 1% in 1995, today around 40% of the world population is online). This has strongly influenced a multitude of components of global citizens\u2019 lives, including the mechanics of contemporary civil disobedience, and has led to the emergence of a totally new way to express dissent, broadly called <b>digital civil disobedience<\/b>.<\/p>\n<p>The concept of digital civil disobedience is not exactly something we can straightforwardly define \u2013 not yet, at least.<br \/>\nA diversity of activist groups have been using technology to organise and develop digital tools and online actions, and their values and goals vary greatly \u2013 so greatly that even within one group a variety of positions can simultaneously emerge. A compelling snapshot of different takes on its history and currents of thought is offered by the panel discussion <a href=\"https:\/\/re-publica.de\/session\/hacktivism-or-fifty-shades-grey-hat\"><i>Hacktivism, or Fifty Shades of Grey Hat<\/i><\/a>, featuring Gabriella Coleman, Stefania Milan and Frank Rieger and hosted by Oxblood Ruffin (May 2015).<br \/>\nDigital civil disobedience is not a transposition of known civil disobedience practices into a digital space. Networked technologies have their own characteristics, capabilities and limits and give the opportunity to create new infrastructures, tools and processes to express dissent and take political action.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/hfjQoHWUOzQ?rel=0&amp;controls=0\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><br \/>\n<small><a href=\"https:\/\/re-publica.de\/session\/hacktivism-or-fifty-shades-grey-hat\"><i>Hacktivism, or Fifty Shades of Grey Hat<\/i><\/a> \u2013 featuring Gabriella Coleman, Stefania Milan and Frank Rieger and hosted by Oxblood Ruffin.<\/small><\/p>\n<h3>Forms of protest in the digital space<\/h3>\n<p>The tools, infrastructures and patterns at disposal of protesters active in the digital space are numerous and ever-growing. Some operate exclusively online, some enhance the potential of actions simultaneously happening in the offline world; some are led by networks of anonymous actors, some are powered by individuals and groups who share their identities and stories publicly.<\/p>\n<p>Drawing from analyses conducted by <a href=\"http:\/\/io9.com\/the-future-of-civil-disobedience-online-512193648\">Molly Sauter<\/a> and <a href=\"https:\/\/www.ted.com\/talks\/zeynep_tufekci_how_the_internet_has_made_social_change_easy_to_organize_hard_to_win?language=en\">Zeynep Tufekci<\/a> on different expressions of digital civil disobedience, it\u2019s possible to highlight the most prominent characters of contemporary digitally-powered disobedience activity globally.<\/p>\n<p><b>Information distribution<\/b><br \/>\nAn action of information distribution is about acquisition and release of hidden or secret information. This can present itself as<\/p>\n<ul>\n<li>whistleblowing \u2013 the act of deliberate disclosure of information deemed illegal, dishonest, or not correct within a public or private organisation<\/li>\n<li>data exfiltration \u2013 the unauthorized transfer of data<\/li>\n<li>doxing \u2013 researching and broadcasting personal information about an individual online<\/li>\n<li>crowd-sourced investigations.<\/li>\n<\/ul>\n<p>These practices can be used to expose injustice, corruption and violation of rights, reclaiming justice where policy and institutions seem to have failed (at least from the protesters\u2019 point of view). Public media is the essential actor which can help strategically sort out and broadcast the newly acquired data.<br \/>\nFor a full understanding of these methodologies, it\u2019s also important to notice that they can also be adopted with criminal intent by individuals and groups aiming to harm vulnerable subjects, like in cases of online harassment through doxing. Such criminal acts can focus exclusively on violating someone\u2019s privacy and safety, with no relation to other applications of these practices pursuing the recognition of rights, transparency and accountability. However, it\u2019s fundamental not to dismiss these practices as exclusively dangerous and hurtful: as it happened with nearly any new tool in history \u2013 from fire, to electricity, to the internet itself \u2013 depending on their intent, human beings can use whatever they have at their disposal to either build or damage. The lines, as often happens, <a href=\"http:\/\/www.theatlantic.com\/technology\/archive\/2014\/03\/doxing-an-etymology\/284283\/\">are not clear-cut<\/a>.<\/p>\n<p>Acts of information distribution have been adopted by numerous individuals and groups over the last decades. Referring to our most recent history, it\u2019s key to recall groups like WikiLeaks, and whistleblowers such Edward Snowden, Chelsea Manning, William Binney, Annie Machon.<\/p>\n<p><a href=\"https:\/\/exposingtheinvisible.org\/films\/2\/our-currency-is-information\/\" target=\"_blank\"><img data-attachment-id=\"350\" data-permalink=\"https:\/\/beatricemartini.it\/blog\/digital-civil-disobedience\/screen-shot-2015-06-03-at-5-25-53-pm\/\" data-orig-file=\"https:\/\/beatricemartini.it\/blog\/wp-content\/uploads\/2015\/06\/Screen-Shot-2015-06-03-at-5.25.53-PM.png\" data-orig-size=\"560,281\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screen Shot 2015-06-03 at 5.25.53 PM\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/beatricemartini.it\/blog\/wp-content\/uploads\/2015\/06\/Screen-Shot-2015-06-03-at-5.25.53-PM-300x151.png\" data-large-file=\"https:\/\/beatricemartini.it\/blog\/wp-content\/uploads\/2015\/06\/Screen-Shot-2015-06-03-at-5.25.53-PM.png\" loading=\"lazy\" class=\"alignnone size-full wp-image-350\" src=\"http:\/\/beatricemartini.it\/blog\/wp-content\/uploads\/2015\/06\/Screen-Shot-2015-06-03-at-5.25.53-PM.png\" alt=\"Screen Shot 2015-06-03 at 5.25.53 PM\" width=\"560\" height=\"281\" srcset=\"https:\/\/beatricemartini.it\/blog\/wp-content\/uploads\/2015\/06\/Screen-Shot-2015-06-03-at-5.25.53-PM.png 560w, https:\/\/beatricemartini.it\/blog\/wp-content\/uploads\/2015\/06\/Screen-Shot-2015-06-03-at-5.25.53-PM-300x151.png 300w\" sizes=\"(max-width: 560px) 100vw, 560px\" \/><\/a><small><i>Screenshot from\u00a0<a href=\"https:\/\/exposingtheinvisible.org\/films\/2\/our-currency-is-information\/\">Exposing the invisible. Our currency is information<\/a><\/i> \u2013 with Paul Radu. Tactical Tech Collective.<\/small><\/p>\n<p><b>Disruption<\/b><br \/>\nDisturbing the status quo by disrupting the regular flow of information can help draw attention to a cause. Among the most popular techniques to achieve such outcome there are:<\/p>\n<ul>\n<li>website defacements \u2013 attacks changing the visual appearance of a website or webpage<\/li>\n<li>distributed denial of service (DDOS) actions \u2013 attacks sent by two or more people or bots aiming to make a machine or network resource unavailable to its intended users<\/li>\n<\/ul>\n<p>The potential of this practice is in the recognition of the action from a broad audience (likely through major media outlets); its limit, consequently, is in the difficulty to raise awareness on the issue if the media doesn\u2019t report the attack.<\/p>\n<p>Disruptive tactics have been adopted since the mid-1990s by countless groups such as <a href=\"http:\/\/motherboard.vice.com\/read\/history-of-the-ddos-attack\">Electronic Disturbance Theater, the Strano Network and, more recently, Anonymous<\/a>.<\/p>\n<p><b>Mobilisation<\/b><br \/>\nDigital networked technologies allow to connect, organise and mobilise communities more efficiently than ever before in history.<\/p>\n<p>Of course, due to limitations caused by costs, connectivity and law, mobile phones, e-mails and social media are not accessible to everyone, and under dictatorships the use of networked technologies needs to be upgraded with the adoption of anonymising and privacy-enhancing technologies (see the following paragraph on Infrastructure).<\/p>\n<p>But even considering the aforementioned variables, digital networked technologies are tangibly increasingly available to global citizens and can be considered game-changing tools for activists in need to use alternate communication loops.<\/p>\n<p>They can greatly help to:<\/p>\n<ul>\n<li>circumvent media blackouts by sharing information otherwise kept under silence by government and state-controlled media;<\/li>\n<li>facilitate the formation of a collective identity supportive of the protest and mobilised to maximize the actions\u2019 impact;<\/li>\n<li>document and report wrongdoing and violations, also allowing to broadcast them beyond the national borders.<\/li>\n<\/ul>\n<p>It\u2019s important to notice that such tools have both pros and cons.<br \/>\nFor example, Twitter can be a great tool to organise efforts, forward information and share support (hashtags can be very effective, as recently proved by #Ferguson or #BlackLivesMatter). At the same time, as also recently highlighted by Jillian York during her talk <i>The cost of digital civil disobedience <\/i>(as part of the workshop <a href=\"http:\/\/www.hiig.de\/events\/civil-disobedience-beyond-the-state-ii-2\/\">Civil disobedience beyond the state II<\/a>), many activists are starting to prefer WhatsApp to it, for a variety of reasons: some find it more suitable to avoid online harassment, some find it better protects their personal safety, others assess it\u2019s more effective.<\/p>\n<p><a href=\"https:\/\/episode4.donottrack-doc.com\/en\/\" target=\"_blank\"><img data-attachment-id=\"351\" data-permalink=\"https:\/\/beatricemartini.it\/blog\/digital-civil-disobedience\/screen-shot-2015-06-03-at-5-48-27-pm\/\" data-orig-file=\"https:\/\/beatricemartini.it\/blog\/wp-content\/uploads\/2015\/06\/Screen-Shot-2015-06-03-at-5.48.27-PM.png\" data-orig-size=\"560,311\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screen Shot 2015-06-03 at 5.48.27 PM\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/beatricemartini.it\/blog\/wp-content\/uploads\/2015\/06\/Screen-Shot-2015-06-03-at-5.48.27-PM-300x167.png\" data-large-file=\"https:\/\/beatricemartini.it\/blog\/wp-content\/uploads\/2015\/06\/Screen-Shot-2015-06-03-at-5.48.27-PM.png\" loading=\"lazy\" class=\"alignnone size-full wp-image-351\" src=\"http:\/\/beatricemartini.it\/blog\/wp-content\/uploads\/2015\/06\/Screen-Shot-2015-06-03-at-5.48.27-PM.png\" alt=\"Screen Shot 2015-06-03 at 5.48.27 PM\" width=\"560\" height=\"311\" srcset=\"https:\/\/beatricemartini.it\/blog\/wp-content\/uploads\/2015\/06\/Screen-Shot-2015-06-03-at-5.48.27-PM.png 560w, https:\/\/beatricemartini.it\/blog\/wp-content\/uploads\/2015\/06\/Screen-Shot-2015-06-03-at-5.48.27-PM-300x167.png 300w\" sizes=\"(max-width: 560px) 100vw, 560px\" \/><\/a><small><i>Screenshot from\u00a0<a href=\"https:\/\/donottrack-doc.com\/en\/episode\/4\">Do not track, episode 4: The spy in my pocket<\/a><\/i> \u2013 with Harlo Holmes, Nathan Freitas, Julia Angwin, Kate Crawford, Rand Hindi. By Upian, the National Film Board of Canada, Arte, Bayerischer Rundfunk, Radio-Canada, RTS and AJ+.<\/small><\/p>\n<p><b>Infrastructure<\/b><br \/>\nWhen existing infrastructures are compromised by data gathering practices driven by governments or corporations, activists can decide to build new, and uncompromised, infrastructures.<br \/>\nOne of the most notable examples of compromised infrastructure is provided today by mass surveillance. While cited by governments and corporations alike as necessary to protect national security, fight terrorism and child pornography, it is also a practice which can violate privacy rights, limit civil and political rights and freedoms, and also <a href=\"https:\/\/firstlook.org\/theintercept\/2015\/05\/07\/appellate-court-rules-nsas-bulk-collection-phone-records-illegal\/\">be illegal<\/a> under some legal systems. It\u2019s not by chance that <a href=\"https:\/\/www.eff.org\/deeplinks\/2015\/03\/un-human-rights-council-appoints-special-rapporteur-right-privacy\">the UN Human Rights Council appointed a special rapporteur on the right to privacy<\/a>.<\/p>\n<p>Some examples of tools and infrastructures built to protect citizens\u2019 privacy in different ways:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.torproject.org\/\">Tor<\/a> \u2013 a free software and an open network intended to protect the users\u2019 privacy and freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored<\/li>\n<\/ul>\n<ul>\n<li><a href=\"https:\/\/diasporafoundation.org\/\">diaspora*<\/a> \u2013 a free personal web server that implements a distributed social networking service, based on the core values of decentralisation, freedom and privacy<\/li>\n<\/ul>\n<ul>\n<li><a href=\"https:\/\/whispersystems.org\/\">Open Whisper Systems<\/a> apps \u2013 among them: <a href=\"https:\/\/ssd.eff.org\/en\/module\/how-use-redphone-android\">RedPhone<\/a>, a free and open source Android app providing <a href=\"https:\/\/ssd.eff.org\/en\/glossary\/end-end-encryption\">end-to-end encryption<\/a> for your calls;<a href=\"https:\/\/ssd.eff.org\/en\/module\/how-use-signal-%E2%80%93-private-messenger\"> Signal<\/a>, a free and open source iPhone app that employs end-to-end encryption, allowing users to send messages and make calls while keeping their communication safe.<\/li>\n<\/ul>\n<ul>\n<li>alternate VPNs (Virtual Private Networks) \u2013 alternate network connections, for example often provided to communities experiencing state control and censorship on communications by activists from other countries (actually, having a VPN is starting to become recommendable <a href=\"http:\/\/fusion.net\/story\/132931\/if-you-use-the-internet-you-need-a-vpn-heres-why\/\">for all individuals simply using the internet<\/a>)<\/li>\n<\/ul>\n<p>The tricky point here is: these tools often require considerable operational effort in order to be adopted and only a limited number of citizens and activists around the world currently knows about them and how to use them. It makes sense: this whole scenario is very new and ever-changing. It\u2019s therefore very important for developers, tech capacity builders and educational outlets alike to work on knowledge-sharing and training efforts as well as on technical developments to provide global citizens with the most efficient tools to make their voices heard and fight for their rights.<\/p>\n<h3>What\u2019s next? A possible route<\/h3>\n<p>This article provided a brief snapshot of digital civil disobedience tactics and tools. But already in its concise form, it makes clear that this new practice space is becoming increasingly important to raise awareness of rights violations at both global and local scale and to fight for positive changes in laws, policies and institutions.<\/p>\n<p>However, as mentioned, knowledge of these tools and practices is not yet widely spread and even the most digitally equipped activists are often battling with operational limits and challenges.<br \/>\nSo, what\u2019s next?<\/p>\n<p>This question is frequently debated at the moment, and during the recent workshop <a href=\"http:\/\/www.hiig.de\/events\/civil-disobedience-beyond-the-state-ii-2\/\">Civil Disobedience Beyond the State II<\/a>, Gabriella Coleman proposed a hypothesis which sounded particularly interesting.<br \/>\nShe suggested to look at other historical examples to see in there was any fitting learning we could draw from the past to understand how to move forward.<br \/>\nThe example she picked was a notable one: the history of free software.<\/p>\n<p>In an extremely concise recap: in 1983, as a response to the emergence of proprietary software (which to varying degrees prevents users from studying, modifying and sharing the software), Richard Stallman, from the MIT Artificial Intelligence Laboratory, launched the GNU Project, a collaborative effort to create a freedom-respecting operating system. The following years saw the advent of the term &#8220;free software&#8221; (its official definition was published in 1986) and of the Free Software Foundation.<br \/>\nThe concept of free software was revolutionary \u2013 it gave end users complete freedom in using, studying, sharing and modifying the software. But its potential didn\u2019t turn into new and popular infrastructures and tools overnight.<br \/>\nIt took <a href=\"http:\/\/www.gnu.org\/philosophy\/15-years-of-free-software.html\">many years of work, by hundreds of programmers, most of them volunteers, to develop this operating system<\/a>. In 1991, Linux, the free kernel written by Linus Torvalds, was developed, and it gradually started to attract the media\u2019s attention \u2013 today, the combination of GNU and Linux is used by millions of people around the world. The late 1990s became an exciting time for the free software world. The developers of the time were \u201c<a href=\"https:\/\/books.google.de\/books?id=kIU1scm4w6QC&amp;lpg=PT243&amp;ots=XzjtxQS7d0&amp;dq=1997%20gnu%20linux%20press&amp;pg=PT10#v=onepage&amp;q&amp;f=false\">the heirs of an earlier hacking culture that thrived in the 1960s and 1970s<\/a> when computers were still new, a community that believed software should be shared, and that all would benefit as a result. [&#8230;] Thanks to the advent of relatively low-cost but powerful PCs and the global wiring on the Net, the new hackers [were] immeasurably more numerous, more productive, and more united than their forebears. They [were] linked by a command goal \u2013 writing great software \u2013 and a command code: that such software should be freely available to all.\u201d Their achievements have proved enduring.<\/p>\n<p>What we can learn from this, is that when thinking about the difficulties we are experiencing today with the tools aiming to preserve freedom of expression and right to protest, we can remember that it might be worth allowing more time to the development of such new infrastructures.<br \/>\n<a href=\"https:\/\/ssd.eff.org\/en\/glossary\/end-end-encryption\">End-to-end encryption<\/a> (ensuring that a message is turned into a secret message by its original sender, and decoded only by its final recipient) is a powerful instrument at our disposal; ever-growing numbers of developers are at work every day (as it was with free software, often as volunteers) to create the new tools to protect the rights of citizens all over the world; as the sudden availability of advanced, and relatively low-cost, devices made a big difference for the development of emerging technologies in the 90s, something comparable could potentially happen also in the near future.<br \/>\nAll this would help diversify the tools at disposal of today\u2019s protesters in the digital space \u2013 and it would be key for the efficacy of their actions, since, as proved by centuries of (offline) civil disobedience, being equipped with a variety of tactics provides stronger support and makes it harder for protests to be neutralized by law enforcement.<\/p>\n<h3>In conclusion<\/h3>\n<p>Civil disobedience is an act of protest which will always be fundamental for the collective ability to express dissent. Concurrently, new digital tools and tactics present a remarkable opportunity for the future of civil rights. Alongside already existing forms of expression of dissent, they provide global citizens and activists with instruments able to compete with the structures set up by the institutions they protest against, and offer the potential to increase the impact of their actions in the name of rights and justice.<\/p>\n<p>Understanding, adopting and improving these new practices is of essential importance for the defense of global civil liberties, and it\u2019s only with a collective effort to understand, adopt and improve this opportunity that we\u2019ll be able to help building accountable and just societies all around the world.<\/p>\n<h3>Resources<\/h3>\n<ul>\n<li><a href=\"http:\/\/criticallegalthinking.com\/2012\/07\/02\/civil-disobedience-between-symbolic-politics-and-real-confrontation\/\">Civil Disobedience -\u2009Between Symbolic Politics and Real Confrontation<\/a> \u2013 Robin Celikates , Critical Legal Thinking (July 2, 2012)<\/li>\n<li><a href=\"https:\/\/re-publica.de\/session\/hacktivism-or-fifty-shades-grey-hat\">Hacktivism, or Fifty Shades of Grey Hat<\/a> \u2013 panel discussion with Gabriella Coleman, Stefania Milan, Frank Rieger, moderated by Oxblood Ruffin (May 7, 2015)<\/li>\n<li><a href=\"http:\/\/io9.com\/the-future-of-civil-disobedience-online-512193648\">The Future of Civil Disobedience Online<\/a> \u2013 Molly Sauter, io9 (June 17, 2013)<\/li>\n<li><a href=\"http:\/\/www.academia.edu\/6185532\/Ch_4-_Whistleblowing_A_case_for_Civil_Disobedience\">Whistleblowing: A case for Civil Disobedience<\/a> \u2013 Manohar Kumar<\/li>\n<li><a href=\"http:\/\/www.theatlantic.com\/technology\/archive\/2014\/03\/doxing-an-etymology\/284283\/\">Doxing: an etymology<\/a> \u2013 Megan Garber, The Atlantic (March 6, 2014)<\/li>\n<li><a href=\"http:\/\/motherboard.vice.com\/read\/history-of-the-ddos-attack\">The history of DDoS attacks as a tool of protest<\/a> \u2013 Joseph Cox, Motherboard (October 1, 2014)<\/li>\n<li><a href=\"https:\/\/dl.dropboxusercontent.com\/u\/3643786\/American%20Behavioral%20Scientist-2013-Sauter-983-1007.pdf\">LOIC will tear us apart&#8217;: the impact of tool design &amp; media portrayals in the success of DDOS attacks<\/a> \u2013 Molly Sauter, American Behavioral Scientist (March 15, 2013)<\/li>\n<li><a href=\"https:\/\/www.ted.com\/talks\/zeynep_tufekci_how_the_internet_has_made_social_change_easy_to_organize_hard_to_win?language=en\">Online social change: easy to organize, hard to win<\/a> \u2013 Zeynep Tufekci, TED talk (October 2014)<\/li>\n<li><a href=\"https:\/\/medium.com\/message\/ferguson-is-also-a-net-neutrality-issue-6d2f3db51eb0\">What Happens to #Ferguson Affects Ferguson: Net Neutrality, Algorithmic Filtering and Ferguson<\/a> \u2013 Zeynep Tufekci, Message (August 14, 2014)<\/li>\n<li><a href=\"http:\/\/boomerang-effect.espivblogs.net\/2015\/05\/13\/why-i-refrained-from-joining-twitter\/\">Why I refrained from joining Twitter all these years\u2026but joined in the end nonetheless<\/a> \u2013 Maria Xynou (May 13, 2015)<\/li>\n<li><a href=\"http:\/\/library.witness.org\/\">Witness\u2019 library of free resources for video activists, trainers and their allies<\/a> \u2013 the resources can be sorted by by issue, content type, user type and topic and most of them are available in English, Spanish, Portuguese, Arabic, French.<\/li>\n<li><a href=\"http:\/\/www.wired.com\/2015\/05\/can-use-livestreaming-apps-promote-justice\/\">How we can use livestreaming apps to promote justice<\/a> \u2013 Sam Gregory, Wired (May 10, 2015)<\/li>\n<li><a href=\"http:\/\/fusion.net\/story\/132931\/if-you-use-the-internet-you-need-a-vpn-heres-why\/\">If you use the Internet, you need a VPN. Here\u2019s why<\/a> \u2013 Kashmir Hill, Fusion (May 15, 2015)<\/li>\n<li><a href=\"https:\/\/howto.informationactivism.org\/tools\">The Info-Activism how-to guide \u2013 Digital tools<\/a> \u2013 Tactical Technology Collective<\/li>\n<li><a href=\"https:\/\/myshadow.org\">Me &amp; my shadow<\/a> \u2013 Tactical Technology Collective<\/li>\n<li><a href=\"https:\/\/ssd.eff.org\/en\/playlist\/activist-or-protester\">Activist or protester? How to keep you and your communications safe wherever your campaigning takes you<\/a> \u2013 Electronic Frontier Foundation<\/li>\n<li><a href=\"https:\/\/ssd.eff.org\/en\/playlist\/human-rights-defender\">Human rights defender? Recipes for organizations who need to keep safe from government eavesdroppers<\/a> \u2013 Electronic Frontier Foundation<\/li>\n<li><a href=\"https:\/\/medium.com\/@avilarenata\/surveillance-in-the-south-and-threats-for-human-rights-defenders-e84d0e157132\">Surveillance in the South: human rights defenders under threat<\/a> \u2013 Renata Avila<\/li>\n<li><a href=\"https:\/\/www.derechosdigitales.org\/wp-content\/uploads\/freedom-of-expression-encryption-and-anonymity1.pdf\">Freedom of expression, encryption and anonymity<\/a> \u2013 World Wide Web Foundation, in partnership with the Centre for Internet and Human Rights at European University Viadrina, Oficina Antivigil\u00e2ncia at the Institute for Technology and Society\u200a\u2014\u200aITS Rio, Derechos Digitales.<\/li>\n<li><a href=\"https:\/\/donottrack-doc.com\/en\/\">Do Not Track<\/a> \u2013 a personalized documentary series about privacy and the web economy, by Upian, the National Film Board of Canada, Arte, Bayerischer Rundfunk, Radio-Canada, RTS and AJ+.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Protests, uprising and unrest are key elements of freedom of expression, contributing to the shape of society and public debate through history. Over the centuries, individuals and groups have adopted countless tactics to reclaim rights and fight for justice \u2013 changing over time, transforming strategically according to different historical and political contexts. What\u2019s the current &hellip; <a href=\"https:\/\/beatricemartini.it\/blog\/digital-civil-disobedience\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Digital civil disobedience: tactics, tools and future threads<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[13,33],"tags":[85,92,84,90,32,28,89,42,88,86,12,11,87,91],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Digital civil disobedience: tactics, tools and future threads | Beatrice Martini \u2013 blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/beatricemartini.it\/blog\/digital-civil-disobedience\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital civil disobedience: tactics, tools and future threads | Beatrice Martini \u2013 blog\" \/>\n<meta property=\"og:description\" content=\"Protests, uprising and unrest are key elements of freedom of expression, contributing to the shape of society and public debate through history. Over the centuries, individuals and groups have adopted countless tactics to reclaim rights and fight for justice \u2013 changing over time, transforming strategically according to different historical and political contexts. What\u2019s the current &hellip; Continue reading Digital civil disobedience: tactics, tools and future threads\" \/>\n<meta property=\"og:url\" content=\"https:\/\/beatricemartini.it\/blog\/digital-civil-disobedience\/\" \/>\n<meta property=\"og:site_name\" content=\"Beatrice Martini \u2013 blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-06-03T16:09:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-06-03T16:13:40+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/beatricemartini.it\/blog\/wp-content\/uploads\/2015\/06\/Screen-Shot-2015-06-03-at-5.25.53-PM.png\" \/>\n<meta name=\"author\" content=\"Beatrice\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Beatrice\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/beatricemartini.it\/blog\/digital-civil-disobedience\/\",\"url\":\"https:\/\/beatricemartini.it\/blog\/digital-civil-disobedience\/\",\"name\":\"Digital civil disobedience: tactics, tools and future threads | Beatrice Martini \u2013 blog\",\"isPartOf\":{\"@id\":\"https:\/\/beatricemartini.it\/blog\/#website\"},\"datePublished\":\"2015-06-03T16:09:28+00:00\",\"dateModified\":\"2015-06-03T16:13:40+00:00\",\"author\":{\"@id\":\"https:\/\/beatricemartini.it\/blog\/#\/schema\/person\/680a80473149f3a373cfd94a2dc0eff0\"},\"breadcrumb\":{\"@id\":\"https:\/\/beatricemartini.it\/blog\/digital-civil-disobedience\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/beatricemartini.it\/blog\/digital-civil-disobedience\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/beatricemartini.it\/blog\/digital-civil-disobedience\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/beatricemartini.it\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digital civil disobedience: tactics, tools and future threads\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/beatricemartini.it\/blog\/#website\",\"url\":\"https:\/\/beatricemartini.it\/blog\/\",\"name\":\"Beatrice Martini \u2013 blog\",\"description\":\"On tech and tools for justice and rights\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/beatricemartini.it\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/beatricemartini.it\/blog\/#\/schema\/person\/680a80473149f3a373cfd94a2dc0eff0\",\"name\":\"Beatrice\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beatricemartini.it\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/39f3e7ced144ed6d393d6ad6a7ab489d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/39f3e7ced144ed6d393d6ad6a7ab489d?s=96&d=mm&r=g\",\"caption\":\"Beatrice\"},\"sameAs\":[\"http:\/\/beatricemartini.it\"],\"url\":\"https:\/\/beatricemartini.it\/blog\/author\/beatrice\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital civil disobedience: tactics, tools and future threads | Beatrice Martini \u2013 blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/beatricemartini.it\/blog\/digital-civil-disobedience\/","og_locale":"en_US","og_type":"article","og_title":"Digital civil disobedience: tactics, tools and future threads | Beatrice Martini \u2013 blog","og_description":"Protests, uprising and unrest are key elements of freedom of expression, contributing to the shape of society and public debate through history. Over the centuries, individuals and groups have adopted countless tactics to reclaim rights and fight for justice \u2013 changing over time, transforming strategically according to different historical and political contexts. What\u2019s the current &hellip; Continue reading Digital civil disobedience: tactics, tools and future threads","og_url":"https:\/\/beatricemartini.it\/blog\/digital-civil-disobedience\/","og_site_name":"Beatrice Martini \u2013 blog","article_published_time":"2015-06-03T16:09:28+00:00","article_modified_time":"2015-06-03T16:13:40+00:00","og_image":[{"url":"http:\/\/beatricemartini.it\/blog\/wp-content\/uploads\/2015\/06\/Screen-Shot-2015-06-03-at-5.25.53-PM.png"}],"author":"Beatrice","twitter_misc":{"Written by":"Beatrice","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/beatricemartini.it\/blog\/digital-civil-disobedience\/","url":"https:\/\/beatricemartini.it\/blog\/digital-civil-disobedience\/","name":"Digital civil disobedience: tactics, tools and future threads | Beatrice Martini \u2013 blog","isPartOf":{"@id":"https:\/\/beatricemartini.it\/blog\/#website"},"datePublished":"2015-06-03T16:09:28+00:00","dateModified":"2015-06-03T16:13:40+00:00","author":{"@id":"https:\/\/beatricemartini.it\/blog\/#\/schema\/person\/680a80473149f3a373cfd94a2dc0eff0"},"breadcrumb":{"@id":"https:\/\/beatricemartini.it\/blog\/digital-civil-disobedience\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/beatricemartini.it\/blog\/digital-civil-disobedience\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/beatricemartini.it\/blog\/digital-civil-disobedience\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/beatricemartini.it\/blog\/"},{"@type":"ListItem","position":2,"name":"Digital civil disobedience: tactics, tools and future threads"}]},{"@type":"WebSite","@id":"https:\/\/beatricemartini.it\/blog\/#website","url":"https:\/\/beatricemartini.it\/blog\/","name":"Beatrice Martini \u2013 blog","description":"On tech and tools for justice and rights","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/beatricemartini.it\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/beatricemartini.it\/blog\/#\/schema\/person\/680a80473149f3a373cfd94a2dc0eff0","name":"Beatrice","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beatricemartini.it\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/39f3e7ced144ed6d393d6ad6a7ab489d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/39f3e7ced144ed6d393d6ad6a7ab489d?s=96&d=mm&r=g","caption":"Beatrice"},"sameAs":["http:\/\/beatricemartini.it"],"url":"https:\/\/beatricemartini.it\/blog\/author\/beatrice\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/beatricemartini.it\/blog\/wp-json\/wp\/v2\/posts\/346"}],"collection":[{"href":"https:\/\/beatricemartini.it\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beatricemartini.it\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beatricemartini.it\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/beatricemartini.it\/blog\/wp-json\/wp\/v2\/comments?post=346"}],"version-history":[{"count":9,"href":"https:\/\/beatricemartini.it\/blog\/wp-json\/wp\/v2\/posts\/346\/revisions"}],"predecessor-version":[{"id":357,"href":"https:\/\/beatricemartini.it\/blog\/wp-json\/wp\/v2\/posts\/346\/revisions\/357"}],"wp:attachment":[{"href":"https:\/\/beatricemartini.it\/blog\/wp-json\/wp\/v2\/media?parent=346"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beatricemartini.it\/blog\/wp-json\/wp\/v2\/categories?post=346"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beatricemartini.it\/blog\/wp-json\/wp\/v2\/tags?post=346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}