Category:Security
This new section will monitor 'peer to peer warfare', security, cyber-crime and similar issues.
Citations
Transparency IS privacy
"Ironically, I realized long ago that the best way to keep your privacy is to act as if everything you do is in public. Only those who know you and love you and are intimate with you will realize how different you really are from that GPI profile you gave out so freely. Or, as Mikhail Naimy said long before we went digital: speech is at best an honest lie. To which I would add, the image of yourself that you project in a public space is the pathway to retaining your privacy. The Zen Koan of our freedoms: More disclosure, more privacy."
- David Lane [1]
Key Resources
Internet Security Resources
- FLOSS Manual for Circumvention Tools ; Bypassing Internet Censorship. [2]
- Guide to Mobile Security for Citizen Journalists; [3]
- EPIC Online Guide to Practical Privacy Tools [4]
- Anonymous Blogging with WordPress and Tor [5]
- Security in a Box
- Quick Guide to Secure Communication [6]
- Everyone's Guide to Bypassing Internet Censorship
Key Articles
- John Robb on Cyberinfrastructure Defense
- The Power of Statelessness. By Jakub Grygiel: The withering appeal of the state [7]
- How To Communicate Securely in Repressive Environments. Patrick Meier: Core to effective strategic nonviolent action is the need to remain proactive and on the offensive; the rationale being that both the resistance movement and repressive regime have an equal amount of time allocated when the show-down begins. If the movement becomes idle at any point, this may give the regime the opportunity to regain the upper hand, or vice versa.
- Athina Karatzogianni Dr. 2011. "Cyberconflict and the Future of Warfare" Hall Gardner and Oleg Kobtzeff (eds.) Ashgate Companion to War, Ashgate, forthcoming [8]
- Patricia Hynes: War and the Tragedy of the Commons, 7-part series
- David Morris: The Military and the Commons
Key Books
- The Internet Police: How Crime Went Online, and the Cops Followed, by Nate Anderson
"Nate Anderson is a writer for Ars Technica and has had occasion to report on many stories of crime—and investigation—online. In The Internet Police, he gets a chance to re-tell the most interesting, using those anecdotes to make points about how law enforcement reacts to technology. ... His take is always readable and informative." (https://www.eff.org/deeplinks/2013/12/effs-reading-list-books-2013)
Key Tags
For updates, see the following tags:
Pages in category "Security"
The following 200 pages are in this category, out of 398 total.
(previous page) (next page)A
- A. F. K. Organski's Power Transition Theory
- Ad Hoc Mutual Aid
- AI and Warfare
- Algorithmic Policing
- Anglo-American Neo-Darwinian Evolutionary Conflict Theory
- Ankinyi Wirranjiki Night Patrol
- Anonymous and Decentralized Networks
- Anonymous Blogging with WordPress and Tor
- Anti-Defense
- Arnold Toynbee's Theory of War Cycles
- Astroturfing
- Asymmetric Threats Contingency Alliance
- Aternatives to Emergency Medical Services
- Austro-American Group Struggle Tradition
- Autonomous Drones
B
- Baojia Distributed Defense System in China
- Basic Principles of War Propaganda
- Bev Skeggs and Seeta Peña Gangadharan on How We Are Being Tracked
- Beyond WikiLeaks
- Bilderberg
- Bio-Physical Triggers of Political Violence
- Bitcoinproof
- Bitmessage
- Black Code
- Bonnie Wills on Restorative Justice
- Brave New War
- Brittle vs Resilient Systems
C
- Chase Madar on the Passion of Bradley Manning and WikiLeaks
- Christine Peterson on Open Source Sensing
- Citizen Intelligence Agency
- Citizen Sensing
- Civic Groups-Based Mutual Aid
- Civil Aerial Mapping
- Civilization and War
- Cloud Power
- Cognitive Security
- Command of the Commons as the Military Foundation of U.S. Hegemony
- Commodify Inc
- Commons for Peace
- Commons for Peace as a Anti-Enclosure Movement
- Commons-Based Multilateralism
- Commons-Based Provisioning of Security
- Community Anti-Violence Groups
- Comparative Study of White Nationalist and ISIS Online Social Media Networks
- Conflict and the Progress of Civilization from Primates to Robots
- Conflict Theories
- Consumer-Controlled Surveillance Culture
- Content-Based Mobile Edge Networking
- Continuing Promise of the Noosphere and Noopolitik
- Cooperation and Discord in the World Political Economy
- Cooperative Resilience in the Wake of Disasters
- Corporate Espionage Against Nonprofit Organizations
- Counterveillance
- Coveillance
- Crime Sourcing
- Crisis Commons
- Crowdsourced Border Patrol
- Crowdsourced Surveillance and Networked Data
- Crypto-Anarchists
- Cryptome
- Cyber Conflict and Global Politics
- Cyber Phrenology
- Cyber Warfare Peacekeeping
- Cyber-Conflict and Global Politics
- Cyber-Mobilization
- Cyberconflict and Global Politics
- Cyberconflict and the Future of Warfare
- Cybercrime
- Cybernorms
- Cyberterrorism
- Cyberwar and Revolution
- Cyberwar Map
- Cyberwarfare
- Cypherpunks on Freedom and the Future of the Internet
D
- Dan Schiller on the Geopolitics of Technology
- Daniel Kimmage on Al-Qaeda and the Media
- Dark Wallet
- Darknet
- DARPA's Open Process Research Strategy
- Darwinian Security
- Data Protection
- Dataveillance
- David Brin on the Transparent Society
- David Graeber on Police Repression Against Occupy and Other Social Movements
- Debating Policy Repression and Activist Violence
- Decentralized Enforcement
- Decisive Ecological Warfare Strategy
- Defense Distributed
- Designing Online Channels for Digital Humanitarians
- Digital Commons as Drivers of Sovereignty
- Digital Forensic Research Lab
- Digital Humanitarian Network
- Digital Security and Privacy for Human Rights Defenders
- Digital Security Technologies
- Digitally Driven Asymmetric Conflict
- Directories of Open Grassroots Peacemaking Groups
- DISARM
- Distributed Crime Network
- Distributed Surveillance Network
- Distribution of Bads
- DIY Drones
- DIY Open-Source Aerial Surveillance
- Dmytri Kleiner and Jacob Appelbaum on Capitalism and Surveillance on the Internet
- DNA Hacking
- Dominant Capital and the New Wars
- Don Burke and Sean Dennehy on the CIA's Intellipedia Project
E
- Ecological Distributional Conflict
- Ecological Warfare and Infrastructural Risks
- Electronic Countermeasures
- Electronic Police State
- Emergency 2.0 Wiki
- Emergency Social-Repeater System
- Empire of Disorder
- Encryption
- EPIC Online Guide to Practical Privacy Tools
- Ethical Hacking, Big Data and the Crowd
- Ethics and Rights in Cyber Security
- Evaluating the Police Project - Minneapolis
- Evgeny Morozov and Charlie Beckett on the Future of Wikileaks
- Evolution of Military Technologies from the Neolithic to the Industrial Revolution
- Evolution of the Means of Destruction
- Evolution of the Online Anonymous Marketplace Ecosystem
- Evolution of War
- Evolution of War-Making Capacity Throughout Human History
- Exploring and Analyzing the Dark Web
- Exploring Digital Democracy
F
G
- Genetically Modified Grassroots Organizations
- German Sociological Libertarianism
- Giovanni Scotto
- Global Catastrophic Risk Policy
- Global Commons as New Hope for Noosphere and Noopolitik
- Governing Algorithms
- Great Power Rivalry Periods Are Characterized by Thirty-Year Wars
- Great Power Wars
- Guide to Mobile Security for Citizen Journalists
- Gustavo Arellano on the Anti-Government, Anti-Cartel Autonomous Towns of Mexico
H
- Hackers 4 Peace
- Hackers Congress
- HackXCO/es
- Hadoop
- HarassMap
- Hard Self-Replication
- Hegemonic Cycles
- Historical Prevalence of War Predicts State Capacity
- How 10,000 Years of War Made Humans the Greatest Cooperators on Earth
- How Commons' Rights Differ from Human Rights
- How Crime Went Online, and the Cops Followed
- How Group-Based Threats Increase Conflict
- How Twitter Is Changing Policing
- Hyperboria
I
- IARPA Open Source Indicators Program
- Impact of Wars on Long-Term Economic Growth
- Information Cascades
- Inside the Hacker World of LulzSec, Anonymous and the Global Cyber Insurgency
- Institute of Cryptoanarchy
- Instrumentation Model of Data
- Intelligent Fourth Generation Entities
- Intellipedia
- International Security Oriented Transgovernmental Networks
- Internet Access in Warzones
- Internet and Surveillance
- Internet Police
- Internet Security and the Limits of Open Source and Peer Production
- Internet Security Resources
- Invisible Handshake
- Italian Elite Theory
- IWar
J
- Jacob Appelbaum and Christian Payne on Maximum Distributed Outreach vs Total Surveillance Control
- James Cascio on the Participatory Panopticon
- JM Berger on Extremists on Social Media, the Post-ISIS Challenge
- John Arquilla and David Ronfeldt on the Rise of the Noosphere, Noopolitik and Information-Age Statecraft
- John Arquilla on Noopolitical Statecraft
- John Robb
- John Robb on Cyberinfrastructure Defense
- John Robb on Open Source Warfare
- John Robb on Open Source Warfare and Resilient Communities
- Johnny Ryan on Wikileaks and Cyberwar
- Jonathan Zittrain and Lawrence Lessig on the Wikileaks Information Wars