Advertisement

Digital Resistance, Digital Liberties and Digital Transparency

  • Giovanni Ziccardi
Chapter
Part of the Law, Governance and Technology Series book series (LGTS, volume 7)

Abstract

This Chapter introduces the concepts of “digital resistance”, “dissidents” and “collaborative electronic transparency”. The first part concerns the importance of the technology in critical contexts (“liberation technology”), with an analysis of the controversial “Haystack” case. The central part faces some topical case studies: cyber-resistance in Saudi Arabia, e-resistance among Palestinian women, digital resistance as an art form, and soldier photography of detainee abuse in Iraq. The last portion concerns open government, collaborative transparency and civic hacking as a form of digital resistance. Moving from the idea of government as a platform, the Chapter outlines the idea of collaborative transparency, the importance of citizen engagement for the oversight of political activity, actions of monitoring public spending and expenditure mapping, the importance of monitoring political and legislative activities, the use of collaborative mapping as a form of digital resistance, active election oversight, monitoring projects of violations of human rights and the concept of digital transparency as a weapon to combat public sector corruption.

Keywords

Mobile Phone Saudi Arabia Civil Society Organization Mobile Telephone Cassette Tape 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Abu El-Ata, Ahmad, and Monira. 2011. Technology and the Egyptian revolution. http://www.bsgroup.ch/fileadmin/daten/TI/PDF/Publikationen/tim-special11/Einzelartikel/tim11-Society-Ahmad_und_Monira_Aau_El-Ata.pdf. Accessed 25 Oct 2011.
  2. Bowman, Gregory W. 2004. E-mails, servers, and software: U.S. export controls for the modern era. Georgetown Journal of International Law 35: 319–378.Google Scholar
  3. Burns, Alex, and Ben Eltham. 2009. Twitter free Iran: An evaluation of twitter’s role in public diplomacy and information operations in Iran’s 2009 election crisis. http://vuir.vu.edu.au/15230/1/CPRF09BurnsEltham.pdf. Accessed 23 Oct 2011.
  4. Ciobanu, Ceslav. 2010. Lessons of ‘velvet revolutions’: From Romanian “December 89” to Moldovan “April 09”. Moldova: Quo Vadis?. http://cogito.ucdc.ro/sitev/nr_2v2/LESSONS%20OF%20VELVET%20REVOLUTIONS.pdf. Accessed 11 Oct 2011.
  5. Comninos, Alex. 2011. User-generated content and social networking in the Arab spring and beyond. http://www.apc.org/en/system/files/AlexComninos_MobileInternet.pdf. Accessed 24 Oct 2011.
  6. Croeser, Sky. 2009. The global justice movement and struggles over knowledge. http://curtin.academia.edu/SkyCroeser/Papers/111796/Croeser_2009_The_global_justice_movement_and_struggles_over_knowledge. Accessed 25 Oct 2011.
  7. Crosby, Scott, Ian Goldberg, Robert Johnson, Dawn Song, and David Wagner. 2001. A cryptanalysis of the high-bandwidth digital content protection system. http://www.cypherpunks.ca/∼iang/pubs/hdcp-drm01.pdf. Accessed 23 Oct 2011.
  8. De Beco, Gauthier. 2010. Monitoring corruption from a human rights perspective. The International Journal of Human Rights 15(7): 1107–1124.CrossRefGoogle Scholar
  9. Esfandiari, Golnaz. 2010. The twitter devolution. http://www.foreignpolicy.com/articles/2010/06/07/the_twitter_revolution_that_wasnt. Accessed 25 Oct 2011.
  10. Etling, Bruce, Robert Faris, and John Palfrey. 2010. Political change in the digital age: The fragility and promise of online organizing. http://dash.harvard.edu/handle/1/4609956. Accessed 14 Nov 2011.
  11. Eunjung Cha, Ariana. To attacks’ toll add a programmer’s grief. 2001. http://www.washingtonpost.com/ac2/wp-dyn/A1234-2001Sep20. Accessed 23 Oct 2011.
  12. Fandy, Mamoun. 1999. CyberResistance: Saudi opposition between globalization and localization. Comparative Studies in Society and History 41(1): 124–147.CrossRefGoogle Scholar
  13. Felten, Ed. 2010. Why did anybody believe Haystack? https://freedom-to-tinker.com/blog/felten/why-did-anybody-believe-haystack. Accessed 25 Oct 2011.
  14. Forte, Maximilian C. 2009. Twitter and the Iranian election protests an annotated bibliography. http://www.openanthropology.org/irantwitterbibliography.pdf. Accessed 23 Oct 2011.
  15. Fuglsang, Lars. 2005. IT and senior citizens: Using the Internet for empowering active citizenship. Science, Technology, & Human Values 30(4): 468–495.CrossRefGoogle Scholar
  16. Gheblawi, Ghazi. 2011. Libyan re-independence and reclaiming the revolution. http://boell-meo.org/downloads/Perspectives_02-27_Ghazi_Gheblawi.pdf. Accessed 23 Oct 2011.
  17. Giridharadas, Anand. 2010. Africa’s gift to silicon valley: How to track a crisis. http://www.nytimes.com/2010/03/14/weekinreview/14giridharadas.html. Accessed 26 Oct 2011.
  18. Goldstein, Joshua, and Juliana Rotich. 2008. Digitally networked technology in Kenya’s 2007–2008 post-election crisis. http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Goldstein&Rotich_Digitally_Networked_Technology_Kenyas_Crisis.pdf.pdf. Accessed 13 Nov 2011.
  19. Hellström, Johan. 2011. Mobile governance: Applications, challenges and scaling-up. In Mobile technologies for conflict management. Online dispute resolution, governance, participation, ed. Marta Poblet, 159–179. Dordrecht/Heidelberg/London/New York: Springer.Google Scholar
  20. Hodge, Nathan. 2009. Inside Moldova’s twitter revolution. http://www.wired.com/dangerroom/2009/04/inside-moldovas/. Accessed 26 Oct 2011.
  21. Horner, Lisa. 2011. A human rights approach to the mobile internet. http://www.apc.org/en/system/files/LisaHorner_MobileInternet-ONLINE.pdf. Accessed 26 Oct 2011.
  22. Huang, Andrew “bunnie”. 2002. Keeping secrets in hardware: The Microsoft XBoxTM case study. http://web.mit.edu/bunnie/www/proj/anatak/AIM-2002-008.pdf. Accessed 23 Oct 2011.
  23. Hudson, John. 2011. The “Twitter Revolution” debate: The Egyptian test case. http://www.theatlanticwire.com/global/2011/01/the-twitter-revolution-debate-the-egyptian-test-case/21296/. Accessed 23 Oct 2011.
  24. Ingram, Mathew. 2011. Was what happened in Tunisia a twitter revolution? http://gigaom.com/2011/01/14/was-what-happened-in-tunisia-a-twitter-revolution/. Accessed 23 Oct 2011.
  25. Jennings, M.Kent, and Vicky Zeitner. 2003. Internet use and civic engagement: A longitudinal analysis. Public Opinion Quarterly 67(3): 311–334.CrossRefGoogle Scholar
  26. Kabay, M.E. 2010a. Lesson in a Haystack: Kerckhoffs’principle in action. http://www.mekabay.com/nwss/833_lesson_in_a_haystack--kerckhoffs_principle.pdf. Accessed 25 Oct 2011.
  27. Kabay, M.E. 2010b. Lesson in a Haystack: Idealists take on the theocracy. http://www.mekabay.com/nwss/832_lesson_in_a_haystack--idealists_v_theocrats.pdf. Accessed 25 Oct 2011.
  28. Krapp, Peter. 2005. Terror and play, or what was hacktivism? Grey Room 21: 70–93.CrossRefGoogle Scholar
  29. Ku, Vicky. 2005. A critique of the Digital Millenium Copyright Act’s exemption on encryption research: Is the exemption too narrow? http://www.yjolt.org/files/ku-7-YJOLT-465.pdf. Accessed 16 Oct 2011.
  30. Kulesza, Joanna. 2008. Freedom of information in the global information society – The question of the internet bill of rights. University of Warmia and Mazury in Olsztyn Law Review 1: 81–95.Google Scholar
  31. La Rue, Frank, and Olof Ehrenkrona. 2010. Chairmen’s conclusion of expert meeting on human rights and the Internet. http://www.sweden.gov.se/content/1/c6/13/93/96/829645b7.pdf. Accessed 23 Oct 2011.
  32. Lane, Jill, and Ricardo Dominguez. 2003. Digital Zapatistas. TDR 47(2): 129–144.CrossRefGoogle Scholar
  33. Litra, Leonid. 2010. The evolution of multi – party system in Moldova in the post – soviet period leonid. http://www.nceeer.org/Programs/Carnegie/Reports/litra.pdf. Accessed 23 Oct 2011.
  34. Mckenzie, Jon, and Rebecca Schneider. 2000. Critical art ensemble tactical media practitioners: An interview. TDR 44(4): 136–150.CrossRefGoogle Scholar
  35. Miguel, Teresa M. 2011. The digital legal landscape in South America: Government transparency and access to information. http://conference.ifla.org/past/ifla77/194-miguel-en.pdf. Accessed 14 Nov 2011.
  36. Morozov, Evgeny. 2009a. Iran: Downside to the “Twitter Revolution”. Dissent 56(4): 10–14.CrossRefGoogle Scholar
  37. Morozov, Evgeny. 2009b. Moldova’s twitter revolution. http://neteffect.foreignpolicy.com/posts/2009/04/07/moldovas_twitter_revolution. Accessed 25 Oct 2011.
  38. Morozov, Evgeny. 2010a. The great internet freedom fraud. http://www.slate.com/articles/technology/technology/2010/09/the_great_internet_freedom_fraud.html. Accessed 25 Oct 2011.
  39. Morozov, Evgeny. 2010b. Hay-what? http://neteffect.foreignpolicy.com/posts/2010/09/02/hay_what. Accessed 25 Oct 2010.
  40. Mungiu-Pippidi, Alina, and Igor Munteanu. 2009. Moldova’s “Twitter Revolution”. Journal of Democracy 20(3): 136–142.CrossRefGoogle Scholar
  41. Munöz, Lucia Liste, and Indra de Soysa. 2011. The blog versus big brother: New and old information technology and political repression, 1980–2006. The International Journal of Human Rights 15(8): 1315–1330.CrossRefGoogle Scholar
  42. Pfister, Damien Smith. 2011. The logos of the blogosphere: Flooding the zone, invention, and attention in the Lott Imbroglio. Argumentation and Advocacy 47(3). http://vlex.com/vid/logos-blogosphere-flooding-lott-imbroglio-311259242. Accessed 11 Nov 2011.
  43. Russell, Adrienne. 2005. Editorial: Exploring digital resistance. New Media & Society 7: 513–515.Google Scholar
  44. Sambidge, A. 2012. Rights group slams Kuwaiti’s Twitter sentence. http://www.arabianbusiness.com/rights-group-slams-kuwaiti-s-twitter-sentence-461416.html. Accessed 10 June 2012.
  45. Sampaio, Lucas. 2012. Facebook bloqueia usuárias que aparecem seminuas em fotos da Marcha das Vadias. http://www1.folha.uol.com.br/tec/1097488-facebook-bloqueia-usuarias-que-aparecem-seminuas-em-fotos-da-marcha-das-vadias.shtml. Accessed 10 June 2012.
  46. Samuelson, Pamela. 2001. Anticircumvention rules: Threat to science. Science 293(5537): 2028–2031.CrossRefGoogle Scholar
  47. Sartor, Giovanni. 2010. Human rights and the future of the information society.http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1707724. Accessed 25 Oct 2011.
  48. Shalhoub-Kevorkian, Nadera. 2011. E-resistance among Palestinian Women: Coping in conflict-ridden areas. The Social Service Review 85(2): 179–204.CrossRefGoogle Scholar
  49. Sohrabi-Haghighat, M. Hadi, and Shohre Mansouri. 2010. ‘Where is my vote’. ICT politics in the aftermath of Iran’s presidential election. http://www.swinburne.edu.au/hosting/ijets/journal/V8N1/pdf/Article2Sohrabi&Mansouri.pdf. Accessed 25 Oct 2011.
  50. Solop, Frederic I. 2001. Digital democracy comes of age: Internet voting and the 2000 Arizona democratic primary election. Political Science and Politics 34(2): 289–293.Google Scholar
  51. Sunstein, Cass R. 2010. Open government and records management. http://www.archives.gov/records-mgmt/pdf/sunstein-raco2010.pdf. Accessed 1 Nov 2010.
  52. Tismaneanu, Vladimir. 2009. Moldova’s revolution against cynical and cronyist authoritarianism. http://www.rferl.org/content/Moldovas_Revolution_Against_Authoritarianism/1607656.html. Accessed 22 Oct 2011.
  53. Virak, Ou. 2011. Internet censorship: The ongoing crackdown on freedom of expression in Cambodia. http://www.ifex.org/cambodia/2011/06/20/internet_censorship.pdf. Accessed 7 Nov 2011.
  54. Wellman, Barry, and Xiaolin Zhuo. 2010. Egypt: The first Internet revolt? http://homes.chass.utoronto.ca/∼wellman/publications/egypt/PMag-1107-Egypt-offprint.pdf. Accessed 23 Oct 2011.
  55. Whitty, Noel. 2010. Soldier photography of detainee abuse in Iraq: Digital technology, human rights and the death of Baha Mousa. Human Rights Law Review 10(4): 689–714.CrossRefGoogle Scholar
  56. Wu, Min, Scott A. Craver, Edward W. Felten, and Bede Liu. 2002. Analysis of attacks on SDMI audio watermarks. http://www.ece.umd.edu/∼minwu/public_paper/icassp01_sdmi.pdf. Accessed 23 Oct 2011.
  57. Yen, Alfred C. 2003. What federal gun control can teach us about the DMCA’s anti-trafficking provisions. http://www.chicagoip.com/yenarticle.pdf. Accessed 23 Oct 2011.
  58. York, Jillian C. 2010. Haystack and media irresponsibility. http://jilliancyork.com/2010/09/13/haystack-and-media-irresponsibility/. Accessed 25 Oct 2011.
  59. Zimmermann, Philip. 2001. No regrets about developing PGP. http://www.philzimmermann.com/EN/essays/index.html. Accessed 23 Oct 2011.
  60. Zhuo, Xiaolin, Barry Wellman, and Justine Yu. 2010. Egypt: The first internet revolt? International Journal of Emerging Technologies and Society 8(1): 24–41. http://homes.chass.utoronto.ca/∼wellman/publications/egypt/PMag-1107-Egypt-offprint.pdf. Accessed 21 November 2011.
  61. Zuckerman, Ethan. 2011. The first twitter revolution? Not so fast. The internet can take some credit for toppling Tunisia’s government, but not all of it. http://www.foreignpolicy.com/articles/2011/01/14/the_first_twitter_revolution. Accessed 25 Oct 2011.

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  1. 1.Department “Cesare Beccaria” Faculty of LawUniversity of MilanMilanoItaly

Personalised recommendations