Difference between revisions of "Building a taxonomy of digital civil disobedience tactics"
Jump to navigation
Jump to search
Willowbl00 (talk | contribs) |
|||
Line 7: | Line 7: | ||
Please feel welcome to add further examples or recommended resources [https://pad.riseup.net/p/NPDev2016-digitalcivildisobediencetaxonomy on this public etherpad]. Thank you! | Please feel welcome to add further examples or recommended resources [https://pad.riseup.net/p/NPDev2016-digitalcivildisobediencetaxonomy on this public etherpad]. Thank you! | ||
− | Open Critique of Power | + | ==Open Critique of Power== |
* Blog posts criticizing government policies and actions as Glenn Greenwald and The Intercept do | * Blog posts criticizing government policies and actions as Glenn Greenwald and The Intercept do | ||
* Public shaming politicians | * Public shaming politicians | ||
Line 17: | Line 17: | ||
* Ignore information in order to hide/ bury it | * Ignore information in order to hide/ bury it | ||
− | Boycott and Divest | + | ==Boycott and Divest== |
* Boycotting sites | * Boycotting sites | ||
* Unregistering accounts | * Unregistering accounts | ||
Line 23: | Line 23: | ||
* Divest (401k etc.) | * Divest (401k etc.) | ||
− | Misinformation or Dis-information | + | ==Misinformation or Dis-information== |
* Jamming websites (fake news sites) satire | * Jamming websites (fake news sites) satire | ||
* Deceptive social network bio info to confuse censors (e.g. Twitter bio's changing to location: Iran) | * Deceptive social network bio info to confuse censors (e.g. Twitter bio's changing to location: Iran) | ||
Line 30: | Line 30: | ||
* Registering fake domains with spoof info | * Registering fake domains with spoof info | ||
− | Release Not-Public Information to Public | + | ==Release Not-Public Information to Public== |
* Doxxing | * Doxxing | ||
* Leaking Docs. E.g. [http://www.dailydot.com/layer8/fop-hack-fraternal-order-of-police/ F.O.P.] | * Leaking Docs. E.g. [http://www.dailydot.com/layer8/fop-hack-fraternal-order-of-police/ F.O.P.] | ||
Line 37: | Line 37: | ||
* Scraping Linkedin for government/military secrets | * Scraping Linkedin for government/military secrets | ||
− | Noise/ Overwhelm/ Denial of Service | + | ==Noise/ Overwhelm/ Denial of Service== |
* Cyber attacks | * Cyber attacks | ||
* Spamming email | * Spamming email | ||
Line 45: | Line 45: | ||
* DDoS infrastructure. E.g. Imm(?) system | * DDoS infrastructure. E.g. Imm(?) system | ||
− | Offline | + | ==Offline== |
* Turn off the lights for 1 hour/ 1 min? | * Turn off the lights for 1 hour/ 1 min? | ||
* Monetary donations | * Monetary donations | ||
* Organizing in person rallies via Facebook e.g. Occupy, demonstrations in Middle East | * Organizing in person rallies via Facebook e.g. Occupy, demonstrations in Middle East | ||
− | Knowledge Sharing | + | ==Knowledge Sharing== |
* Telling the story of an activist | * Telling the story of an activist | ||
* Creating/ sharing [https://en.wikipedia.org/wiki/The_Anarchist_Cookbook The Anarchist Cookbook] | * Creating/ sharing [https://en.wikipedia.org/wiki/The_Anarchist_Cookbook The Anarchist Cookbook] | ||
Line 61: | Line 61: | ||
* Tactical Tech Collective resources | * Tactical Tech Collective resources | ||
− | Supporting Circumvention Technology | + | ==Supporting Circumvention Technology== |
* Circumventing personal information capture to access resources e.g. using a fake email to download an activist resource | * Circumventing personal information capture to access resources e.g. using a fake email to download an activist resource | ||
* Set up Tor relay | * Set up Tor relay | ||
* Writing encryption software as a sort of protest and direct opposition to the surveillance state (e.g. Signal) | * Writing encryption software as a sort of protest and direct opposition to the surveillance state (e.g. Signal) | ||
− | Signal Boost | + | ==Signal Boost== |
* Checking in at Standing Rock | * Checking in at Standing Rock | ||
* Mass check-ins e.g. Standing Rock Facebook check-ins | * Mass check-ins e.g. Standing Rock Facebook check-ins | ||
Line 80: | Line 80: | ||
On the session's topic, an overview including an additional list of selected readings: [https://beatricemartini.it/blog/digital-civil-disobedience/ Digital civil disobedience: tactics, tools and future threads] (June 2015) | On the session's topic, an overview including an additional list of selected readings: [https://beatricemartini.it/blog/digital-civil-disobedience/ Digital civil disobedience: tactics, tools and future threads] (June 2015) | ||
+ | |||
+ | [[Categories: 2016, Taxonomies, Tactics, Activism, Circumvention, Reading List]] |
Revision as of 18:53, 22 November 2016
Participants brainstormed different ways to express dissent in the digital space.
The notes produced during the brainstorming phase were then clustered. Then participants labeled the clusters, identifying emerging categories.
The following is a transcription of the notes produced, organized by category.
Please feel welcome to add further examples or recommended resources on this public etherpad. Thank you!
Open Critique of Power
- Blog posts criticizing government policies and actions as Glenn Greenwald and The Intercept do
- Public shaming politicians
- Create and share media/propaganda memes
- Criticizing Trump on Twitter
- Social (network) shaming e.g. Cecil The Lion
- Call your senator with specific message
- Visualizing formal + informal relationships + networks of power
- Ignore information in order to hide/ bury it
Boycott and Divest
- Boycotting sites
- Unregistering accounts
- Use purchasing power to withdraw support from complicit companies
- Divest (401k etc.)
Misinformation or Dis-information
- Jamming websites (fake news sites) satire
- Deceptive social network bio info to confuse censors (e.g. Twitter bio's changing to location: Iran)
- Fake Twitter accounts
- Fake press release from corporations
- Registering fake domains with spoof info
Release Not-Public Information to Public
- Doxxing
- Leaking Docs. E.g. F.O.P.
- Whistleblowing by Chelsea Manning of the "collateral murder" video to Wikileaks
- Leaking evidence of criminal behavior as Snowden leaked to Glenn Greenwald and Laura Poitras
- Scraping Linkedin for government/military secrets
Noise/ Overwhelm/ Denial of Service
- Cyber attacks
- Spamming email
- Spamming telephones
- Spamming Faq(?)/ Pranks
- DDoS
- DDoS infrastructure. E.g. Imm(?) system
Offline
- Turn off the lights for 1 hour/ 1 min?
- Monetary donations
- Organizing in person rallies via Facebook e.g. Occupy, demonstrations in Middle East
Knowledge Sharing
- Telling the story of an activist
- Creating/ sharing The Anarchist Cookbook
- Resource sharing
- Teaching Tools
- Mobilisation Lab resources
- Audio Anarchy
- Days of war, nights of love
- Beautiful Trouble
- Tactical Tech Collective resources
Supporting Circumvention Technology
- Circumventing personal information capture to access resources e.g. using a fake email to download an activist resource
- Set up Tor relay
- Writing encryption software as a sort of protest and direct opposition to the surveillance state (e.g. Signal)
Signal Boost
- Checking in at Standing Rock
- Mass check-ins e.g. Standing Rock Facebook check-ins
- Facebook massive check in to Standing Rock
- "Signal Boost" for offline actions
- Petitions
- Change profile picture
- Profile picture switches + overlays
- Facebook profile picture change or additions. i.e. I support trans rights
- Coopting the opponents signifiers. E.g. Jews + Jewish allies using "((( )))" to co-opt anti-semite use of the sign to ID Jews on Twitter
- (Digital) Day of Action(s) e.g. #climatechangeisreal on Earth Day 2015
On the session's topic, an overview including an additional list of selected readings: Digital civil disobedience: tactics, tools and future threads (June 2015)
Categories: 2016, Taxonomies, Tactics, Activism, Circumvention, Reading List