Category:Security: Difference between revisions
Jump to navigation
Jump to search
| Line 20: | Line 20: | ||
#'''[http://irevolution.wordpress.com/2009/06/15/digital-security/ How To Communicate Securely in Repressive Environments].''' Patrick Meier: ''Core to effective strategic nonviolent action is the need to remain proactive and on the offensive; the rationale being that both the resistance movement and repressive regime have an equal amount of time allocated when the show-down begins. If the movement becomes idle at any point, this may give the regime the opportunity to regain the upper hand, or vice versa.'' | #'''[http://irevolution.wordpress.com/2009/06/15/digital-security/ How To Communicate Securely in Repressive Environments].''' Patrick Meier: ''Core to effective strategic nonviolent action is the need to remain proactive and on the offensive; the rationale being that both the resistance movement and repressive regime have an equal amount of time allocated when the show-down begins. If the movement becomes idle at any point, this may give the regime the opportunity to regain the upper hand, or vice versa.'' | ||
#Athina Karatzogianni Dr. 2011. "[[Cyberconflict and the Future of Warfare]]" Hall Gardner and Oleg Kobtzeff (eds.) Ashgate Companion to War, Ashgate, forthcoming''' [http://works.bepress.com/athina_karatzogianni/8] | #Athina Karatzogianni Dr. 2011. "[[Cyberconflict and the Future of Warfare]]" Hall Gardner and Oleg Kobtzeff (eds.) Ashgate Companion to War, Ashgate, forthcoming''' [http://works.bepress.com/athina_karatzogianni/8] | ||
#Patricia Hynes: [[War and the Tragedy of the Commons]], 7-part series | |||
#David Morris: The [http://www.onthecommons.org/military-and-commons Military and the Commons] | |||
=Key Tags= | =Key Tags= | ||
Revision as of 11:58, 19 September 2011
This new section will monitor 'peer to peer warfare', security, cyber-crime and similar issues.
Internet Security Resources
- FLOSS Manual for Circumvention Tools ; Bypassing Internet Censorship. [1]
- Guide to Mobile Security for Citizen Journalists; [2]
- EPIC Online Guide to Practical Privacy Tools [3]
- Anonymous Blogging with WordPress and Tor [4]
- Security in a Box
- Quick Guide to Secure Communication [5]
- Everyone's Guide to Bypassing Internet Censorship
Key Articles
- John Robb on Cyberinfrastructure Defense
- The Power of Statelessness. By Jakub Grygiel: The withering appeal of the state [6]
- How To Communicate Securely in Repressive Environments. Patrick Meier: Core to effective strategic nonviolent action is the need to remain proactive and on the offensive; the rationale being that both the resistance movement and repressive regime have an equal amount of time allocated when the show-down begins. If the movement becomes idle at any point, this may give the regime the opportunity to regain the upper hand, or vice versa.
- Athina Karatzogianni Dr. 2011. "Cyberconflict and the Future of Warfare" Hall Gardner and Oleg Kobtzeff (eds.) Ashgate Companion to War, Ashgate, forthcoming [7]
- Patricia Hynes: War and the Tragedy of the Commons, 7-part series
- David Morris: The Military and the Commons
Key Tags
For updates, see the following tags:
Pages in category "Security"
The following 200 pages are in this category, out of 409 total.
(previous page) (next page)A
- A. F. K. Organski's Power Transition Theory
- Ad Hoc Mutual Aid
- AI and Warfare
- AI Parasite
- Algorithmic Policing
- Anglo-American Neo-Darwinian Evolutionary Conflict Theory
- Ankinyi Wirranjiki Night Patrol
- Anonymous and Decentralized Networks
- Anonymous Blogging with WordPress and Tor
- Anti-Defense
- Arnold Toynbee's Theory of War Cycles
- Astroturfing
- Asymmetric Threats Contingency Alliance
- Aternatives to Emergency Medical Services
- Austro-American Group Struggle Tradition
- Autonomous Drones
B
- Baojia Distributed Defense System in China
- Basic Principles of War Propaganda
- Bev Skeggs and Seeta Peña Gangadharan on How We Are Being Tracked
- Beyond WikiLeaks
- Bilderberg
- Bio-Physical Triggers of Political Violence
- Bitcoinproof
- Bitmessage
- Black Code
- Bonnie Wills on Restorative Justice
- Brave New War
- Brittle vs Resilient Systems
C
- Capitalism of Finitude
- Chase Madar on the Passion of Bradley Manning and WikiLeaks
- Christine Peterson on Open Source Sensing
- Citizen Intelligence Agency
- Citizen Sensing
- Civic Groups-Based Mutual Aid
- Civil Aerial Mapping
- Civilization and War
- Cloud Power
- Cognitive Security
- Cognitive Security - AI
- Command of the Commons as the Military Foundation of U.S. Hegemony
- Commodify Inc
- Commons for Peace
- Commons for Peace as a Anti-Enclosure Movement
- Commons-Based Multilateralism
- Commons-Based Provisioning of Security
- Community Anti-Violence Groups
- Comparative Study of White Nationalist and ISIS Online Social Media Networks
- Conflict and the Progress of Civilization from Primates to Robots
- Conflict Theories
- Consumer-Controlled Surveillance Culture
- Content-Based Mobile Edge Networking
- Continuing Promise of the Noosphere and Noopolitik
- Cooperation and Discord in the World Political Economy
- Cooperative Resilience in the Wake of Disasters
- Corporate Espionage Against Nonprofit Organizations
- Counterveillance
- Coveillance
- Crime Sourcing
- Crisis Commons
- Crowdsourced Border Patrol
- Crowdsourced Surveillance and Networked Data
- Crypto-Anarchists
- Cryptome
- Cyber Conflict and Global Politics
- Cyber Phrenology
- Cyber Warfare Peacekeeping
- Cyber-Conflict and Global Politics
- Cyber-Mobilization
- Cyberconflict and Global Politics
- Cyberconflict and the Future of Warfare
- Cybercrime
- Cybernorms
- Cyberterrorism
- Cyberwar and Revolution
- Cyberwar Map
- Cyberwarfare
- Cypherpunks on Freedom and the Future of the Internet
D
- Dan Schiller on the Geopolitics of Technology
- Daniel Kimmage on Al-Qaeda and the Media
- Dark Wallet
- Darknet
- DARPA's Open Process Research Strategy
- Darwinian Security
- Data Protection
- Dataveillance
- David Brin on the Transparent Society
- David Graeber on Police Repression Against Occupy and Other Social Movements
- Debating Policy Repression and Activist Violence
- Decentralized Enforcement
- Decisive Ecological Warfare Strategy
- Defense Distributed
- Designing Online Channels for Digital Humanitarians
- Digital Commons as Drivers of Sovereignty
- Digital Forensic Research Lab
- Digital Humanitarian Network
- Digital Security and Privacy for Human Rights Defenders
- Digital Security Technologies
- Digitally Driven Asymmetric Conflict
- Directories of Open Grassroots Peacemaking Groups
- DISARM
- Distributed Crime Network
- Distributed Surveillance Network
- Distribution of Bads
- DIY Drones
- DIY Open-Source Aerial Surveillance
- Dmytri Kleiner and Jacob Appelbaum on Capitalism and Surveillance on the Internet
- DNA Hacking
- Dominant Capital and the New Wars
- Don Burke and Sean Dennehy on the CIA's Intellipedia Project
E
- Ecological Distributional Conflict
- Ecological Warfare and Infrastructural Risks
- Electronic Countermeasures
- Electronic Police State
- Emergency 2.0 Wiki
- Emergency Social-Repeater System
- Empire of Disorder
- Encryption
- EPIC Online Guide to Practical Privacy Tools
- Ethical Hacking, Big Data and the Crowd
- Ethics and Rights in Cyber Security
- Evaluating the Police Project - Minneapolis
- Evgeny Morozov and Charlie Beckett on the Future of Wikileaks
- Evolution of Military Technologies from the Neolithic to the Industrial Revolution
- Evolution of the Means of Destruction
- Evolution of the Online Anonymous Marketplace Ecosystem
- Evolution of War
- Evolution of War-Making Capacity Throughout Human History
- Exploring and Analyzing the Dark Web
- Exploring Digital Democracy
F
G
- Genetically Modified Grassroots Organizations
- German Sociological Libertarianism
- Giovanni Scotto
- Global Catastrophic Risk Policy
- Global Commons as New Hope for Noosphere and Noopolitik
- Governing Algorithms
- Great Power Rivalry Periods Are Characterized by Thirty-Year Wars
- Great Power Wars
- Guide to Mobile Security for Citizen Journalists
- Gustavo Arellano on the Anti-Government, Anti-Cartel Autonomous Towns of Mexico
H
- Hackers 4 Peace
- Hackers Congress
- HackXCO/es
- Hadoop
- HarassMap
- Hard Self-Replication
- Hegemonic Cycles
- Historical Prevalence of War Predicts State Capacity
- History of the Passions of War
- How 10,000 Years of War Made Humans the Greatest Cooperators on Earth
- How Commons' Rights Differ from Human Rights
- How Crime Went Online, and the Cops Followed
- How Group-Based Threats Increase Conflict
- How Twitter Is Changing Policing
- Hyperboria
I
- IARPA Open Source Indicators Program
- Impact of Wars on Long-Term Economic Growth
- Information Cascades
- Inside the Hacker World of LulzSec, Anonymous and the Global Cyber Insurgency
- Institute of Cryptoanarchy
- Instrumentation Model of Data
- Intelligent Fourth Generation Entities
- Intellipedia
- International Security Oriented Transgovernmental Networks
- Internet Access in Warzones
- Internet and Surveillance
- Internet Police
- Internet Security and the Limits of Open Source and Peer Production
- Internet Security Resources
- Invisible Handshake
- Italian Elite Theory
- IWar
J
- Jacob Appelbaum and Christian Payne on Maximum Distributed Outreach vs Total Surveillance Control
- Jacques Levy on the Global Civil War
- James Cascio on the Participatory Panopticon
- JM Berger on Extremists on Social Media, the Post-ISIS Challenge
- John Arquilla and David Ronfeldt on the Rise of the Noosphere, Noopolitik and Information-Age Statecraft
- John Arquilla on Noopolitical Statecraft
- John Robb
- John Robb on Cyberinfrastructure Defense
- John Robb on Open Source Warfare
- John Robb on Open Source Warfare and Resilient Communities
- Johnny Ryan on Wikileaks and Cyberwar
- Jonathan Zittrain and Lawrence Lessig on the Wikileaks Information Wars
- Just War Theory