Category:Security
This new section will monitor 'peer to peer warfare', security, cyber-crime and similar issues.
Citations
Transparency IS privacy
"Ironically, I realized long ago that the best way to keep your privacy is to act as if everything you do is in public. Only those who know you and love you and are intimate with you will realize how different you really are from that GPI profile you gave out so freely. Or, as Mikhail Naimy said long before we went digital: speech is at best an honest lie. To which I would add, the image of yourself that you project in a public space is the pathway to retaining your privacy. The Zen Koan of our freedoms: More disclosure, more privacy."
- David Lane [1]
Key Resources
Internet Security Resources
- FLOSS Manual for Circumvention Tools ; Bypassing Internet Censorship. [2]
- Guide to Mobile Security for Citizen Journalists; [3]
- EPIC Online Guide to Practical Privacy Tools [4]
- Anonymous Blogging with WordPress and Tor [5]
- Security in a Box
- Quick Guide to Secure Communication [6]
- Everyone's Guide to Bypassing Internet Censorship
Key Articles
- John Robb on Cyberinfrastructure Defense
- The Power of Statelessness. By Jakub Grygiel: The withering appeal of the state [7]
- How To Communicate Securely in Repressive Environments. Patrick Meier: Core to effective strategic nonviolent action is the need to remain proactive and on the offensive; the rationale being that both the resistance movement and repressive regime have an equal amount of time allocated when the show-down begins. If the movement becomes idle at any point, this may give the regime the opportunity to regain the upper hand, or vice versa.
- Athina Karatzogianni Dr. 2011. "Cyberconflict and the Future of Warfare" Hall Gardner and Oleg Kobtzeff (eds.) Ashgate Companion to War, Ashgate, forthcoming [8]
- Patricia Hynes: War and the Tragedy of the Commons, 7-part series
- David Morris: The Military and the Commons
Key Books
- The Internet Police: How Crime Went Online, and the Cops Followed, by Nate Anderson
"Nate Anderson is a writer for Ars Technica and has had occasion to report on many stories of crime—and investigation—online. In The Internet Police, he gets a chance to re-tell the most interesting, using those anecdotes to make points about how law enforcement reacts to technology. ... His take is always readable and informative." (https://www.eff.org/deeplinks/2013/12/effs-reading-list-books-2013)
Key Tags
For updates, see the following tags:
Pages in category "Security"
The following 107 pages are in this category, out of 389 total.
(previous page) (next page)P
R
- Radically Open Security
- Recognition Markets
- Redphone
- RedPhone
- Reflexive Conditioning and Control Through Weaponized Social Media
- Renee DiResta on the Activities of Russia’s Internet Research Agency
- Resilience
- Resilience of the Internet Interconnection Ecosystem
- Resilient Communities
- Resilient Livelihood
- Rhizome Warfare
- Risks Posed by New Wiretapping Technologies
- Rob Carslon on Safety and Security Concerns for Open Source BioDefense
- Robert Steele on Open Source Everything
S
- Sebastian Junger on How We Are Genetically Programmed for Tribal Solidarity
- Security in a Box
- Self-Assembling Dynamic Networks
- Self-Surveillance and the Threat of Digital Exposure
- Seven Policy Switches for Global Security
- SF72
- Shadowserver
- Shield of Achilles
- Silk Road
- Simple Critical Infrastructure Maps
- Smart Local Network
- Social Media as Surveillance
- Socially Chartered Agreements for Resource Security
- SOCMINT
- Softwerx
- Sources on War and Violence
- Sousveillance
- Spread of Mass Surveillance Since 1995
- State Sponsored Open Source Warfare
- Stephen Graham on the New Military Urbanism
- Steps to War Approach
- Steven Pinker on the Decline of Violence
- Steven Pressfield on Tribes
- Stop Watching Us Campaign
- Street Medics
- Study of War
- Surveillance
- Surveillance Capitalism
- Surveillance Capitalism and the Prospects of an Information Civilization
- Surveillance Philanthropy
- Systemic Risk
- Systempunkt
T
- Tech Diplomacy
- Teemu Mikkonen on the Kosovo War Internal Conflict on Wikipedia
- Terms and Conditions May Apply Documentary
- Terror Capitalism
- TextSecure
- Thermonuclear Apocalypse and the Protocols of Freedom
- Thomas Heydt-Benjamin
- Tianxia
- Todd Kuiken on Responsible Science for DIY Biologists
- Topology of Covert Conflict
- Towards a Global Concert of Major Powers
- Tracking Illicit P2P Transactions
- TrackMeNot
- Trackography
- Transparency Does Not Trump Surveillance, Only Privacy Does
- Transparent Society
- Tribalized Moral Warfare
- Tribes of Intelligence
U
W
- War and Social Organization
- War and the Progress of Civilization
- War and the Tragedy of the Commons
- War and Violence in Classical Sociology
- War Before Civilization
- War Cycles
- War of Maneuver vs War of Position
- War, Conflict and Commemoration in the Age of Digital Reproduction
- War, Peace, and the Course of History
- Weapons Systems and Political Stability
- Whither Command of the Commons
- Wiki Weapon
- Wikicrimes
- Wikileaks and the Battle for the Soul of the Networked Fourth Estate
- Wikileaks and the Networked News Ecology
- Wikileaks Bibliography
- Wikileaks' Liquid Information Leaks for a Liquid Society
- WikiLeaks, the State-Network Dichotomy and the Antinomies of Academic Reason
- WikiSecrets
- WikiWeps
- WireShark
- Wiretapping Sweden Documentary
- World According to U.S. Empire