SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
Free and Open Source Software
         and Activism

         Dr. Sky Croeser
           Curtin University
         Bluestocking Institute

            @scroeser
       http://skycroeser.net
Introduction
●   Part One: in which the narrator makes
    apologies in advance; a field guide to spotting
    'activists'; activists' needs are briefly outlined;
    we hear tales of woe.
●   Part Two: in which we discuss relations
    between FOSS communities and activists and
    many broad generalisations are made; in
    which a not-entirely uncritical eye is turned on
    each community.
●   Part Three: in which some tentative
    suggestions are offered, with further caveats.
Caveats and limitations
●   Technical details wrong? Let me know! (During
    the question session, or afterwards.)
●   There's be some very broad brush-strokes
    here. Talk to me later for fine detail.
Who am I talking about?
●   'Likeable' movements.
●   Looser organisational forms that tend towards
    horizontal power structures.
●   Activists open to a diversity of tactics.
●   Those calling for structural change.
What do activists need?
●   Secure communications: internally (day-to-day
    and on the ground during actions), and for
    outreach.
●   Secure data storage.
●   Word processing, media, and design software.
●   Software that suits their organisational forms.
Security: not just a problem 'over
                  there'.
●   US: extensive surveillance of
    Occupy, among other groups.
●   Australia: reports that anti-coal
    activists are under surveillance
    (unconfirmed); surveillance at
    events like 2012's anti-uranium
    Lizard's Revenge action.
●   New Zealand: 'anti-terrorist' raids
    in 2007 after twelve months of
    surveillance.
Tales of woe: Haystack, 2009




Ed Felten, BBC News: "One implication of
closing the project is that you are stuck with the
expertise in the group. If you get something
wrong, it is difficult to tell."
Tales of woe: Skype
●   Initially developed with a relatively secure architecture, and
    considered to be safe by activists throughout the 2000s.
●   2006: admitted to filtering keywords from IM conversations
    in China.
●   2008: reports of surveillance by Chinese government.
●   2010: reports of spyware distributed through Skype contact
    lists (Libya), reports that Egyptian police were listening to
    Skype conversations.
●   2013: calls for more transparency from Skype on privacy
    policy.
Tales of woe: viruses targeting anti-
          China activists
●   2012: reports of a Trojan targeting Tibetan
    activists.
●   2012: reports of a Mac- and Windows-based
    Trojan targeting Uyghur activists.
Everyday hassles
●   Non-targeted viruses, financial costs, lack of
    support and training.
Ideological awkwardness
Connections
Vandana Shiva: FOSS is “a way of spreading
prosperity and knowledge in society' in the
same way as saving and swapping seeds.”
Organisations are emerging to provide FOSS
support, including Janastu (Bangalore),
Tactical Technology Collective, and Riseup.
Occupy
According to Justine Tunney, who continues to
help run OccupyWallSt.org, “There is leadership
in the sense of deference, just as people defer to
Linus Torvalds. But the moment people stop
respecting Torvalds, they can fork it”
                      - Schwartz, M. (2011, Nov 28).
                     Pre-Occupied. The New Yorker.
The politics of FOSS: Open Source
Perhaps in the end the open-source culture will
triumph not because cooperation is morally right or
software “hoarding” is morally wrong (assuming
you   believe   the   latter,   which   neither   Linus
[Torvalds] nor I do), but simply because the closed-
source world cannot win an evolutionary arms race
with open-source communities that can put orders
of magnitude more skilled time into a problem.
                                        - Eric Raymond
The politics of FOSS: Free as in
                freedom
The word “free” is ... about a way of life. The
folks who write the code throw around the word
in much the same way the Founding Fathers of
the United States used it. To many of them, the
free software revolution was also conceived in
liberty and dedicated to certain principles like the
fact that all men and women have certain
inalienable rights to change, modify, and do
whatever they please with their software in the
pursuit of happiness.
         - Peter Wayner (2000), Free for all, p. 78
Some tentative suggestions
●   Acknowledge and confront structural inequality
    with awesome steps like Codes of Conduct
    and childcare provision.
●   Accept that FOSS is political.
●   Make connections that go both ways.
●   Don't believe everything you see on the news.

Más contenido relacionado

La actualidad más candente

State of cyber sec in africa kenya
State of cyber sec in africa kenyaState of cyber sec in africa kenya
State of cyber sec in africa kenyatyruskam
 
INTERNET TECHNOLOGY
INTERNET TECHNOLOGYINTERNET TECHNOLOGY
INTERNET TECHNOLOGYwilliam john
 
Présentation of Anonymous group
Présentation of Anonymous groupPrésentation of Anonymous group
Présentation of Anonymous groupPaul Marie
 
Innovation, agility, and a fight for survival a love storyv2
Innovation, agility, and a fight for survival a love storyv2Innovation, agility, and a fight for survival a love storyv2
Innovation, agility, and a fight for survival a love storyv2Curtis A. Carver Jr.
 
Information Ethics & WikiLeaks
Information Ethics & WikiLeaksInformation Ethics & WikiLeaks
Information Ethics & WikiLeaksMichael Zimmer
 
Amanda's questions for where did that come from
Amanda's questions for where did that come fromAmanda's questions for where did that come from
Amanda's questions for where did that come from'Atheana' mmmmmhumm
 
Should the government monitor their people's activities online?
Should the government monitor their people's activities online?Should the government monitor their people's activities online?
Should the government monitor their people's activities online?DannyTio
 
G325 overview Oakmead 2014
G325 overview  Oakmead 2014 G325 overview  Oakmead 2014
G325 overview Oakmead 2014 Julian McDougall
 
Open data + open government open goodness
Open data + open government open goodnessOpen data + open government open goodness
Open data + open government open goodnessPhase2
 
Wikileaks and whistleblowing
Wikileaks and whistleblowingWikileaks and whistleblowing
Wikileaks and whistleblowingAbhimanyu Sukhwal
 
Trends in technical communication for 2010
Trends in technical communication for 2010Trends in technical communication for 2010
Trends in technical communication for 2010Scriptorium Publishing
 
#Privacy presentation
#Privacy presentation#Privacy presentation
#Privacy presentationbill kim
 
Med122 hackers lecture
Med122 hackers lectureMed122 hackers lecture
Med122 hackers lectureRob Jewitt
 

La actualidad más candente (20)

State of cyber sec in africa kenya
State of cyber sec in africa kenyaState of cyber sec in africa kenya
State of cyber sec in africa kenya
 
INTERNET TECHNOLOGY
INTERNET TECHNOLOGYINTERNET TECHNOLOGY
INTERNET TECHNOLOGY
 
Safe internet day Slovakia
Safe internet day SlovakiaSafe internet day Slovakia
Safe internet day Slovakia
 
Présentation of Anonymous group
Présentation of Anonymous groupPrésentation of Anonymous group
Présentation of Anonymous group
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
Innovation, agility, and a fight for survival a love storyv2
Innovation, agility, and a fight for survival a love storyv2Innovation, agility, and a fight for survival a love storyv2
Innovation, agility, and a fight for survival a love storyv2
 
Information Ethics & WikiLeaks
Information Ethics & WikiLeaksInformation Ethics & WikiLeaks
Information Ethics & WikiLeaks
 
Amanda's questions for where did that come from
Amanda's questions for where did that come fromAmanda's questions for where did that come from
Amanda's questions for where did that come from
 
Should the government monitor their people's activities online?
Should the government monitor their people's activities online?Should the government monitor their people's activities online?
Should the government monitor their people's activities online?
 
National security and Freedom of expresion after Wikileaks
National security and Freedom of expresion after Wikileaks National security and Freedom of expresion after Wikileaks
National security and Freedom of expresion after Wikileaks
 
Reboot11 Elvira Berlingieri
Reboot11 Elvira BerlingieriReboot11 Elvira Berlingieri
Reboot11 Elvira Berlingieri
 
G325 overview Oakmead 2014
G325 overview  Oakmead 2014 G325 overview  Oakmead 2014
G325 overview Oakmead 2014
 
WikiLeaks and Information Policy
WikiLeaks and Information PolicyWikiLeaks and Information Policy
WikiLeaks and Information Policy
 
Open data + open government open goodness
Open data + open government open goodnessOpen data + open government open goodness
Open data + open government open goodness
 
Wikileaks and whistleblowing
Wikileaks and whistleblowingWikileaks and whistleblowing
Wikileaks and whistleblowing
 
Trends in technical communication for 2010
Trends in technical communication for 2010Trends in technical communication for 2010
Trends in technical communication for 2010
 
Internet history
Internet historyInternet history
Internet history
 
#Privacy presentation
#Privacy presentation#Privacy presentation
#Privacy presentation
 
Prism
PrismPrism
Prism
 
Med122 hackers lecture
Med122 hackers lectureMed122 hackers lecture
Med122 hackers lecture
 

Similar a FOSS and activism

The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismUniversity of Sydney
 
Web Science Session 2: Social Media
Web Science Session 2: Social MediaWeb Science Session 2: Social Media
Web Science Session 2: Social MediaStefanie Panke
 
Social Media in Crisis Management: ISCRAM Summer School 2011
Social Media in Crisis Management: ISCRAM Summer School 2011Social Media in Crisis Management: ISCRAM Summer School 2011
Social Media in Crisis Management: ISCRAM Summer School 2011Connie White
 
The Justification for an Analysis of Stakeholder Input in the National Inform...
The Justification for an Analysis of Stakeholder Input in the National Inform...The Justification for an Analysis of Stakeholder Input in the National Inform...
The Justification for an Analysis of Stakeholder Input in the National Inform...Jeremy Pesner
 
Privacy, Transparency and Trust in a Digital World
Privacy, Transparency and Trust in a Digital WorldPrivacy, Transparency and Trust in a Digital World
Privacy, Transparency and Trust in a Digital Worldbetterplace lab
 
These two books should follow through out the semester till july.docx
These two books should follow through out the semester till july.docxThese two books should follow through out the semester till july.docx
These two books should follow through out the semester till july.docxchristalgrieg
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Saptarshi Ghosh
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internetJeffrey Hart
 
What Type of Digital Transformation? Reinventing Social Thought and Action...
What Type of Digital Transformation?  Reinventing  Social Thought  and Action...What Type of Digital Transformation?  Reinventing  Social Thought  and Action...
What Type of Digital Transformation? Reinventing Social Thought and Action...Douglas Schuler
 
NFAR | New Ethical Dilemmas 1.5 hour
NFAR | New Ethical Dilemmas 1.5 hourNFAR | New Ethical Dilemmas 1.5 hour
NFAR | New Ethical Dilemmas 1.5 hourmikewilhelm
 
Carly finalproject 1
Carly finalproject 1Carly finalproject 1
Carly finalproject 1cjsaha01
 
Corso pisa-2 dh-2017
Corso pisa-2 dh-2017Corso pisa-2 dh-2017
Corso pisa-2 dh-2017Luca De Biase
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingCiarán Mc Mahon
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationHinne Hettema
 
Studying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & BiasStudying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & Biasgloriakt
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTAimee Shuck
 
New approaches to openness – beyond open educational resources
New approaches to openness – beyond open educational resourcesNew approaches to openness – beyond open educational resources
New approaches to openness – beyond open educational resourcesGrainne Conole
 
Issues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human BehaviorIssues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human Behaviorgloriakt
 
Social Systems Theory 2012 #1
Social Systems Theory 2012 #1Social Systems Theory 2012 #1
Social Systems Theory 2012 #1Takashi Iba
 

Similar a FOSS and activism (20)

The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom Activism
 
Web Science Session 2: Social Media
Web Science Session 2: Social MediaWeb Science Session 2: Social Media
Web Science Session 2: Social Media
 
Social Media in Crisis Management: ISCRAM Summer School 2011
Social Media in Crisis Management: ISCRAM Summer School 2011Social Media in Crisis Management: ISCRAM Summer School 2011
Social Media in Crisis Management: ISCRAM Summer School 2011
 
The Justification for an Analysis of Stakeholder Input in the National Inform...
The Justification for an Analysis of Stakeholder Input in the National Inform...The Justification for an Analysis of Stakeholder Input in the National Inform...
The Justification for an Analysis of Stakeholder Input in the National Inform...
 
Privacy, Transparency and Trust in a Digital World
Privacy, Transparency and Trust in a Digital WorldPrivacy, Transparency and Trust in a Digital World
Privacy, Transparency and Trust in a Digital World
 
These two books should follow through out the semester till july.docx
These two books should follow through out the semester till july.docxThese two books should follow through out the semester till july.docx
These two books should follow through out the semester till july.docx
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
 
What Type of Digital Transformation? Reinventing Social Thought and Action...
What Type of Digital Transformation?  Reinventing  Social Thought  and Action...What Type of Digital Transformation?  Reinventing  Social Thought  and Action...
What Type of Digital Transformation? Reinventing Social Thought and Action...
 
NFAR | New Ethical Dilemmas 1.5 hour
NFAR | New Ethical Dilemmas 1.5 hourNFAR | New Ethical Dilemmas 1.5 hour
NFAR | New Ethical Dilemmas 1.5 hour
 
Carly finalproject 1
Carly finalproject 1Carly finalproject 1
Carly finalproject 1
 
Corso pisa-2 dh-2017
Corso pisa-2 dh-2017Corso pisa-2 dh-2017
Corso pisa-2 dh-2017
 
Diffusion of innovation
Diffusion of innovation Diffusion of innovation
Diffusion of innovation
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
Studying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & BiasStudying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & Bias
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
New approaches to openness – beyond open educational resources
New approaches to openness – beyond open educational resourcesNew approaches to openness – beyond open educational resources
New approaches to openness – beyond open educational resources
 
Issues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human BehaviorIssues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human Behavior
 
Social Systems Theory 2012 #1
Social Systems Theory 2012 #1Social Systems Theory 2012 #1
Social Systems Theory 2012 #1
 

Último

Popular Kala Jadu, Black magic expert in Karachi and Kala jadu expert in Laho...
Popular Kala Jadu, Black magic expert in Karachi and Kala jadu expert in Laho...Popular Kala Jadu, Black magic expert in Karachi and Kala jadu expert in Laho...
Popular Kala Jadu, Black magic expert in Karachi and Kala jadu expert in Laho...baharayali
 
Exploring the Meaning of Jesus’ Ascension
Exploring the Meaning of Jesus’ AscensionExploring the Meaning of Jesus’ Ascension
Exploring the Meaning of Jesus’ AscensionbluetroyvictorVinay
 
Professional Amil baba, Kala jadu specialist in Multan and Kala ilam speciali...
Professional Amil baba, Kala jadu specialist in Multan and Kala ilam speciali...Professional Amil baba, Kala jadu specialist in Multan and Kala ilam speciali...
Professional Amil baba, Kala jadu specialist in Multan and Kala ilam speciali...makhmalhalaaay
 
Hire Best Next Js Developer For Your Project
Hire Best Next Js Developer For Your ProjectHire Best Next Js Developer For Your Project
Hire Best Next Js Developer For Your ProjectCyanic lab
 
NO1 Trending Black Magic Specialist Expert Amil baba in Lahore Islamabad Rawa...
NO1 Trending Black Magic Specialist Expert Amil baba in Lahore Islamabad Rawa...NO1 Trending Black Magic Specialist Expert Amil baba in Lahore Islamabad Rawa...
NO1 Trending Black Magic Specialist Expert Amil baba in Lahore Islamabad Rawa...Amil Baba Naveed Bangali
 
Balaghat Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Balaghat Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsBalaghat Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Balaghat Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsDeepika Singh
 
From The Heart v8.pdf xxxxxxxxxxxxxxxxxxx
From The Heart v8.pdf xxxxxxxxxxxxxxxxxxxFrom The Heart v8.pdf xxxxxxxxxxxxxxxxxxx
From The Heart v8.pdf xxxxxxxxxxxxxxxxxxxssuser83613b
 
Study of the Psalms Chapter 1 verse 3 - wanderean
Study of the Psalms Chapter 1 verse 3 - wandereanStudy of the Psalms Chapter 1 verse 3 - wanderean
Study of the Psalms Chapter 1 verse 3 - wandereanmaricelcanoynuay
 
Certified Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialis...
Certified Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialis...Certified Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialis...
Certified Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialis...baharayali
 
Amil baba in Lahore /Amil baba in Karachi /Amil baba in Pakistan
Amil baba in Lahore /Amil baba in Karachi /Amil baba in PakistanAmil baba in Lahore /Amil baba in Karachi /Amil baba in Pakistan
Amil baba in Lahore /Amil baba in Karachi /Amil baba in PakistanAmil Baba Mangal Maseeh
 
Popular Kala Jadu, Kala jadu Expert in Islamabad and Kala jadu specialist in ...
Popular Kala Jadu, Kala jadu Expert in Islamabad and Kala jadu specialist in ...Popular Kala Jadu, Kala jadu Expert in Islamabad and Kala jadu specialist in ...
Popular Kala Jadu, Kala jadu Expert in Islamabad and Kala jadu specialist in ...baharayali
 
Lesson 6 - Our Spiritual Weapons - SBS.pptx
Lesson 6 - Our Spiritual Weapons - SBS.pptxLesson 6 - Our Spiritual Weapons - SBS.pptx
Lesson 6 - Our Spiritual Weapons - SBS.pptxCelso Napoleon
 
The Revelation Chapter 4 Working Copy.docx
The Revelation Chapter 4 Working Copy.docxThe Revelation Chapter 4 Working Copy.docx
The Revelation Chapter 4 Working Copy.docxFred Gosnell
 
Famous Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil baba ...
Famous Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil baba ...Famous Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil baba ...
Famous Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil baba ...baharayali
 
A Spiritual Guide To Truth v10.pdf xxxxxxx
A Spiritual Guide To Truth v10.pdf xxxxxxxA Spiritual Guide To Truth v10.pdf xxxxxxx
A Spiritual Guide To Truth v10.pdf xxxxxxxssuser83613b
 
The_Chronological_Life_of_Christ_Part_99_Words_and_Works
The_Chronological_Life_of_Christ_Part_99_Words_and_WorksThe_Chronological_Life_of_Christ_Part_99_Words_and_Works
The_Chronological_Life_of_Christ_Part_99_Words_and_WorksNetwork Bible Fellowship
 
Famous Kala Jadu, Black magic specialist in Lahore and Kala ilam expert in ka...
Famous Kala Jadu, Black magic specialist in Lahore and Kala ilam expert in ka...Famous Kala Jadu, Black magic specialist in Lahore and Kala ilam expert in ka...
Famous Kala Jadu, Black magic specialist in Lahore and Kala ilam expert in ka...baharayali
 

Último (20)

Famous Best astrologer in Islamabad / Amil baba in Islamabad/ Amil baba in UK...
Famous Best astrologer in Islamabad / Amil baba in Islamabad/ Amil baba in UK...Famous Best astrologer in Islamabad / Amil baba in Islamabad/ Amil baba in UK...
Famous Best astrologer in Islamabad / Amil baba in Islamabad/ Amil baba in UK...
 
Louise de Marillac and Care for the Elderly
Louise de Marillac and Care for the ElderlyLouise de Marillac and Care for the Elderly
Louise de Marillac and Care for the Elderly
 
Popular Kala Jadu, Black magic expert in Karachi and Kala jadu expert in Laho...
Popular Kala Jadu, Black magic expert in Karachi and Kala jadu expert in Laho...Popular Kala Jadu, Black magic expert in Karachi and Kala jadu expert in Laho...
Popular Kala Jadu, Black magic expert in Karachi and Kala jadu expert in Laho...
 
Exploring the Meaning of Jesus’ Ascension
Exploring the Meaning of Jesus’ AscensionExploring the Meaning of Jesus’ Ascension
Exploring the Meaning of Jesus’ Ascension
 
Professional Amil baba, Kala jadu specialist in Multan and Kala ilam speciali...
Professional Amil baba, Kala jadu specialist in Multan and Kala ilam speciali...Professional Amil baba, Kala jadu specialist in Multan and Kala ilam speciali...
Professional Amil baba, Kala jadu specialist in Multan and Kala ilam speciali...
 
Hire Best Next Js Developer For Your Project
Hire Best Next Js Developer For Your ProjectHire Best Next Js Developer For Your Project
Hire Best Next Js Developer For Your Project
 
NO1 Trending Black Magic Specialist Expert Amil baba in Lahore Islamabad Rawa...
NO1 Trending Black Magic Specialist Expert Amil baba in Lahore Islamabad Rawa...NO1 Trending Black Magic Specialist Expert Amil baba in Lahore Islamabad Rawa...
NO1 Trending Black Magic Specialist Expert Amil baba in Lahore Islamabad Rawa...
 
Balaghat Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Balaghat Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsBalaghat Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Balaghat Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
From The Heart v8.pdf xxxxxxxxxxxxxxxxxxx
From The Heart v8.pdf xxxxxxxxxxxxxxxxxxxFrom The Heart v8.pdf xxxxxxxxxxxxxxxxxxx
From The Heart v8.pdf xxxxxxxxxxxxxxxxxxx
 
Study of the Psalms Chapter 1 verse 3 - wanderean
Study of the Psalms Chapter 1 verse 3 - wandereanStudy of the Psalms Chapter 1 verse 3 - wanderean
Study of the Psalms Chapter 1 verse 3 - wanderean
 
Certified Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialis...
Certified Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialis...Certified Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialis...
Certified Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialis...
 
Amil baba in Lahore /Amil baba in Karachi /Amil baba in Pakistan
Amil baba in Lahore /Amil baba in Karachi /Amil baba in PakistanAmil baba in Lahore /Amil baba in Karachi /Amil baba in Pakistan
Amil baba in Lahore /Amil baba in Karachi /Amil baba in Pakistan
 
Popular Kala Jadu, Kala jadu Expert in Islamabad and Kala jadu specialist in ...
Popular Kala Jadu, Kala jadu Expert in Islamabad and Kala jadu specialist in ...Popular Kala Jadu, Kala jadu Expert in Islamabad and Kala jadu specialist in ...
Popular Kala Jadu, Kala jadu Expert in Islamabad and Kala jadu specialist in ...
 
Lesson 6 - Our Spiritual Weapons - SBS.pptx
Lesson 6 - Our Spiritual Weapons - SBS.pptxLesson 6 - Our Spiritual Weapons - SBS.pptx
Lesson 6 - Our Spiritual Weapons - SBS.pptx
 
famous No 1 astrologer / Best No 1 Amil baba in UK, Australia, Germany, USA, ...
famous No 1 astrologer / Best No 1 Amil baba in UK, Australia, Germany, USA, ...famous No 1 astrologer / Best No 1 Amil baba in UK, Australia, Germany, USA, ...
famous No 1 astrologer / Best No 1 Amil baba in UK, Australia, Germany, USA, ...
 
The Revelation Chapter 4 Working Copy.docx
The Revelation Chapter 4 Working Copy.docxThe Revelation Chapter 4 Working Copy.docx
The Revelation Chapter 4 Working Copy.docx
 
Famous Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil baba ...
Famous Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil baba ...Famous Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil baba ...
Famous Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil baba ...
 
A Spiritual Guide To Truth v10.pdf xxxxxxx
A Spiritual Guide To Truth v10.pdf xxxxxxxA Spiritual Guide To Truth v10.pdf xxxxxxx
A Spiritual Guide To Truth v10.pdf xxxxxxx
 
The_Chronological_Life_of_Christ_Part_99_Words_and_Works
The_Chronological_Life_of_Christ_Part_99_Words_and_WorksThe_Chronological_Life_of_Christ_Part_99_Words_and_Works
The_Chronological_Life_of_Christ_Part_99_Words_and_Works
 
Famous Kala Jadu, Black magic specialist in Lahore and Kala ilam expert in ka...
Famous Kala Jadu, Black magic specialist in Lahore and Kala ilam expert in ka...Famous Kala Jadu, Black magic specialist in Lahore and Kala ilam expert in ka...
Famous Kala Jadu, Black magic specialist in Lahore and Kala ilam expert in ka...
 

FOSS and activism

  • 1. Free and Open Source Software and Activism Dr. Sky Croeser Curtin University Bluestocking Institute @scroeser http://skycroeser.net
  • 2. Introduction ● Part One: in which the narrator makes apologies in advance; a field guide to spotting 'activists'; activists' needs are briefly outlined; we hear tales of woe. ● Part Two: in which we discuss relations between FOSS communities and activists and many broad generalisations are made; in which a not-entirely uncritical eye is turned on each community. ● Part Three: in which some tentative suggestions are offered, with further caveats.
  • 3. Caveats and limitations ● Technical details wrong? Let me know! (During the question session, or afterwards.) ● There's be some very broad brush-strokes here. Talk to me later for fine detail.
  • 4. Who am I talking about? ● 'Likeable' movements. ● Looser organisational forms that tend towards horizontal power structures. ● Activists open to a diversity of tactics. ● Those calling for structural change.
  • 5. What do activists need? ● Secure communications: internally (day-to-day and on the ground during actions), and for outreach. ● Secure data storage. ● Word processing, media, and design software. ● Software that suits their organisational forms.
  • 6. Security: not just a problem 'over there'. ● US: extensive surveillance of Occupy, among other groups. ● Australia: reports that anti-coal activists are under surveillance (unconfirmed); surveillance at events like 2012's anti-uranium Lizard's Revenge action. ● New Zealand: 'anti-terrorist' raids in 2007 after twelve months of surveillance.
  • 7. Tales of woe: Haystack, 2009 Ed Felten, BBC News: "One implication of closing the project is that you are stuck with the expertise in the group. If you get something wrong, it is difficult to tell."
  • 8. Tales of woe: Skype ● Initially developed with a relatively secure architecture, and considered to be safe by activists throughout the 2000s. ● 2006: admitted to filtering keywords from IM conversations in China. ● 2008: reports of surveillance by Chinese government. ● 2010: reports of spyware distributed through Skype contact lists (Libya), reports that Egyptian police were listening to Skype conversations. ● 2013: calls for more transparency from Skype on privacy policy.
  • 9. Tales of woe: viruses targeting anti- China activists ● 2012: reports of a Trojan targeting Tibetan activists. ● 2012: reports of a Mac- and Windows-based Trojan targeting Uyghur activists.
  • 10. Everyday hassles ● Non-targeted viruses, financial costs, lack of support and training.
  • 12. Connections Vandana Shiva: FOSS is “a way of spreading prosperity and knowledge in society' in the same way as saving and swapping seeds.” Organisations are emerging to provide FOSS support, including Janastu (Bangalore), Tactical Technology Collective, and Riseup.
  • 13. Occupy According to Justine Tunney, who continues to help run OccupyWallSt.org, “There is leadership in the sense of deference, just as people defer to Linus Torvalds. But the moment people stop respecting Torvalds, they can fork it” - Schwartz, M. (2011, Nov 28). Pre-Occupied. The New Yorker.
  • 14. The politics of FOSS: Open Source Perhaps in the end the open-source culture will triumph not because cooperation is morally right or software “hoarding” is morally wrong (assuming you believe the latter, which neither Linus [Torvalds] nor I do), but simply because the closed- source world cannot win an evolutionary arms race with open-source communities that can put orders of magnitude more skilled time into a problem. - Eric Raymond
  • 15. The politics of FOSS: Free as in freedom The word “free” is ... about a way of life. The folks who write the code throw around the word in much the same way the Founding Fathers of the United States used it. To many of them, the free software revolution was also conceived in liberty and dedicated to certain principles like the fact that all men and women have certain inalienable rights to change, modify, and do whatever they please with their software in the pursuit of happiness. - Peter Wayner (2000), Free for all, p. 78
  • 16. Some tentative suggestions ● Acknowledge and confront structural inequality with awesome steps like Codes of Conduct and childcare provision. ● Accept that FOSS is political. ● Make connections that go both ways. ● Don't believe everything you see on the news.