Backbone

CYB*RES IS BACK

cr4vbannerino

Unisciti alla Resistenza Cibernetica!

Ecco perchè “Partecipare a Cyb*Res! Agire l’utopia!

Cyber Resistance 2015

2015, Siamo nell’era del potere digitale. Siamo potenziate con dispositivi che Star Trek ci ha fatto sognare, ma nel frattempo pochi monopoli al mondo leggono e sorvegliano la società in tempo reale.
Sanno dove sei, con chi sei, cosa fai. Non gli importa davvero di te, tu per loro sei solo un numero. Ma se hanno abbastanza numeri, possono sapere cosa vuole la cittadinanza, il paese, o zoomare fino a uno specifico quartiere o a un’azienda.
Internet è una rete di liberazione: ognuna può comunicare con chi vuole e, tramite le applicazioni, quello che comunichi diventa specialistico: foto, ricette, voglia di far sesso, mappe. Senza intermediari.
Internet è anche uno strumento di controllo di massa, se solo poche aziende collezionano la maggior parte dei dati, creando un diario parallelo delle attività di ogni utente.
Come si rivoluziona il mondo? Mettendo in discussione il quotidiano. E riflettendo sul modello di guadagno di Google, Facebook e Apple, credo che a molte di voi sorgano dubbi: come mai queste belle cose sono tutte gratis?
Lo scopo del tecnopolitico di questi anni è preservare, anche nel cyberspazio, i diritti conquistati nel mondo fisico.
Solo che non esiste Stato, Re o Dio in rete che possa proteggerti. Esisti tu, in un mondo di cavi, satelliti, applicazioni e aziende che si stanno arricchendo succhiando la storia collettiva.
Riconoscere il controllo sociale e l’influenza informativa, nelle funzionalità hardware e software di Apple, Facebook e dei loro soci quotati in borsa: questo è lo sguardo critico al mondo digitale.
La natura di queste minacce è sistemica, perché prende valore nel tempo e dalla massa. Non importa se prendono i dati tuoi o della casalinga di Voghera: per analizzare porzioni di mondo, importa solo che i dati siano tanti e costanti. Tu utente, devi solo usare la loro applicazione, loro memorizzano e il resto vien da sé.
Queste implicazioni sono difficili da vedersi per l’homo sapiens non digitalis: per questo c’è Cyber Resistance.
Il 10 e 11 Aprile troverai:

Autodifesa digitale: perchè quando il tuo telefono smart o il tuo Stato non possono (o vogliono) protegger i tuoi dati: tu lo puoi fare.
Analisi critica della tecnologia: Non è il paradiso, non è l’inferno, è un’infrastruttura a nostra disposizione.
Hacking: nel senso di utilizzo creativo ed imprevisto di quello che è in mano a tutti, ad esempio, tecnologie parassite nei social network 😉

More (and program) here


Time to Act – International Day of Privacy June 13th 2015

via @Luise_Ungut

Video Script to read: http://pastebin.com/MCwT9kbB

Privacy means freedom. If privacy is restricted, this consequently means a restriction of freedom.

A freedom that is actually assured to us be laws and constitutions of our governments.

But what is happening now, right in front of our eyes? These laws and constitutions are being spurned by some politicians. With specious justifications it is tried OVER AND OVER again to introduce the retention of data which actually concerns all citizens and so makes each and every one of us AND YOU a possible suspect. The EU is secretly trying to tie the so-called “Deep Packet Inspection known as D P I” into EU-right.

International Day of Privacy 2015

Info:

Call to action Blogpost: https://translate.google.de/translate?sl=de&tl=en&js=y&prev=_t&hl=de&ie=UTF-8&u=https://anonnewsde.org/2015/03/idp-062015/&edit-text= ( G Translated, Original in german: https://anonnewsde.org/2015/03/idp-062015/ )

Twitter:

https://twitter.com/IDP2014
https://twitter.com/AnonNewsINT or German = @AnonNewsDE

Hashtags:

#IDP2015 #IDP15 #Surveillance #DataRetention #EU #DPI

Videos in other Languages:

German: https://www.youtube.com/watch?v=gOtdsdc-zIg

(cc) Music: https://machinimasound.com/license/
(cc) Animated Backgrounds: http://www.freevideobacks.com


Gender and tech pop-up institute: Potato installed successfully

potatoeAt the beginning of December last year, 76 women and a small group of men – human rights advocates, feminists, techies, activists – descended on an ageing East German ‘Schloss’ (manor house) near the border of Poland for seven days of training, collaboration, discussion, and knowledge exchange. (And potatoes! Lots of potatoes.)

As could probably be expected from that description alone, the Gender and Tech Pop-up Institute promised to be an intense, interesting, inspiring week.

But first: Why a gender and tech event?

The problem of online harassment and threats against women and their collaborators, coming from both governments and non-state individuals and groups, has become more visible in the last few years. Vocal women are too often trapped in a situation where the  internet is crucial to their work – for coordinating actions, gaining wider reach, etc – but is also the place where they are surveilled, harassed and punished for speaking out.

For women, the internet is not a safe space, and it is all too common to see the work of feminists and activists being deleted, (self)censored, and actively prevented from being seen, heard or read. Logically, these trends diminish both the freedom of expression and privacy rights of the people targeted.  Our aim with this event was to try to find new approaches to privacy and digital security that would include a gender and cultural diversity approach.

350 applications

Through a process of rigorous review,  350 applications were pared down to 51 participants coming from a wide range of countries, including Cambodia, India, Indonesia, Myanmar, Pakistan, Philippines, Argentina, Brazil, Guatemala, Honduras, Mexico, Nicaragua, Venezuela, Democratic Republic of Congo, Kenya, Nigeria, Uganda, Egypt, Turkey, Bosnia Herzegovina and Macedonia, with six self-funded participants from Serbia, Canada, Germany, Sweden and the US.

We also had a great group of 18 facilitators, who came from organisations such as SAFE, Protection International and Donestech (as well as APC and Tactical Tech); add the logistics team and some visitors, and we were about 80 in total.

Tracks, skillshares, hands-on sessions, and a hackerspace

The mornings were mostly organised along two tracks: a Digital Security Training Skills track (for those who already had some tech background but who wanted to hone their training skills), and a Privacy Advocacy track, which looked at  issues like mass and targeted surveillance, managing digital shadows and online identities and tackling tech-related  violence.

Afternoons were reserved for hands-on sessions (ie, learning specific tools) and skillshares run by participants, including sessions on wikis and digital libraries,  self-doxing, interviewing survivors of violence, feminist servers, self care, self-defence, VPNs, regional discussion groups, and others.

Movies, conversation, tech sharing, and making houses out of biscuits

After dinner the evening programme kicked in, including lots of self-organised, participant-driven sessions:  movies,  discussion groups, stenciling, board games, card games, creating a ‘herstory’ exhibition, gingerbread-house-making… as well as bar shifts at our makeshift bar ‘Gabi’s’ for the night owls, complete with impromptu dancing and the occasional outbreak of balloon-volleyball.

Evenings were also when the self-organised and popular hackerspace got going, which became the go-to place to gain knowledge and share skills around practical tech stuff in a chilled-out atmosphere.

And because a week is never complete without some loud group singing, on Sunday night we put some fairy-lights around the piano, set up the guitars and speakers and projectors and enjoyed some exclusive one-night-only performances. Top acts included a piano song, a poetry reading,  music-less karaoke, various guitar jams (with or without improvised rap),  and of course the unforgettable ‘Left-Handed-Declaration of Human Lefts’.

And suddenly it was Monday

While everyone was no doubt ready for some rest and quiet by the end of the week, those feelings were mixed with sad goodbyes. From our side, we learned a lot and hope that those of you who were there did too. Big thanks to our collaborators APC and to all our facilitators and to everyone who traveled halfway across the world to join the event; we’re excited to see new partnerships emerge.
Thanks also to everyone who applied – the selection process involved some tough decisions. We are, however, currently working on supporting and developing similar, more regional events in other countries, so there will hopefully be more opportunities in future.

Read more

We’re working toward releasing an edited version of the event documentation later in the year.

Updates and questions

Sign up to our newsletter In the Loop and follow us @info_activism!

And if you have particular questions or suggestions around this new area of exploration at Tactical Tech, please contact alexandra[at]tacticaltech.org.

Source: Gender and Tech Pop-up Institute by Tactical Technological Collective


Hacking the Vision Machine

visionmachineFarocki’s and Paglen’s detourning of control images, Dernbach, R

This paper argues that photographer Trevor Paglen and filmmaker Harun Farocki engage in a form of hacking of control images of surveillance organizations. Paglen’s photo series follow the traces of secret military bases and unregistered spy satellites, while Farocki accompanies in his films the transition of prisons from disciplinary institutions to institutions of control. Both artists expose in their works not only the process of surveillance itself, but the necessary blind spots that every attempt to survey has. This is achieved by aesthetic practices that detourn and dismantle the protocols of surveillance institutions. Engaging in the creation and maintenance of counter-knowledge, Paglen’s and Farock’s works open faultlines for political imagination. Uncovering the technocratic rationality that governs control images enables them to develop new forms of counter-surveillance that undermine the principle of control.

Download Hacking the Vision Machine (pdf) from Teknokultura


Surveillance by any other name?

cameraplayersUnderstanding counter surveillance as critical discourse and practice, Galdon Clavell, G.

Abstract

In the last few years several artistic projects have been inspired by surveillance practices and the social processes they capture. In the same way that Surveillance Studies have debated the differences between different forms of counter surveillance, many of these projects offer different understandings of what it means to recreate, co-opt or expose surveillance, and so they relate to surveillance in different ways. By selecting six of these art projects and looking at what they say about power, technology and agency, this paper uses art as a stepping stone to explore questions that remain open in the academic debate -what does it mean to subvert the surveillance society? What are the differences between recreation, co-option and exposure when raising awareness of the day-to-day aspects of the surveillance society? By looking at different surveillance-related artistic projects and the issues they raise, this paper explores how counter surveillance, sousveillance, privacy and data protection have been presented in artistic practices, and mirrors them against recurring themes and arguments in Surveillance Studies. While most academic debates are based on academic contributions, this paper brings new insights into the current state of Surveillance Studies using artistic practices and the reflections they bring about as a starting point, to find surprising similarities between these two perspectives –and their current shortcomings.

Download Surveillance by any other name? (pdf) from Teknokultura


Travel Surveillance Assemblages

seductive-dog-knows-what-you-like-30518Sophia C. Vackimes, independent researcher

Abstract

Soothing sounds, calming light, appeasing stories about security screeners and X-ray machines that can see the skin under clothing — all of these are implements that have slowly come to airports near all of us thanks to a total makeover of airport security measures planned mainly by the Transportation Security Administration. Recently, the TSA’s Checkpoint Evolution Project has aimed soothe passengers in the screening line with music designed to calm us down while light panels complement it by emitting agreeable colors. Calmed while standing in line, passengers can read stories about the security officers, which the TSA hopes will make travellers feel comfortable with their screeners. The ideal is that most of the security implementations we are subjected to as we travel are perceived to be invasive, or control us, but rather to “protect us” from unforeseen catastrophes. This paper looks at how the original insidiousness of surveillance methods is slowly being erased making surveillance acceptable as design parameters are incorporated into all sorts of surveillance technologies in order to make traveling more “comfortable”.

Download Travel Surveillance Assemblages (pdf) from Teknokultura


A Question of Momentum

picture-33Critical Reflections on Individual Options for Surveillance Resistance, Lee, A.

Abstract

With the increased visibility of global surveillance systems (such as PRISM) to the public, there have been growing calls for more resistance against surveillance. This article critically engages with the options for resistance suggested by Gary T. Marx (2009), focusing on those that affect the social and material circumstances of individuals, and ignoring the symbolic ones. Through this, the role of technological momentum in global surveillance systems, and the high cost of resistance for individuals are highlighted. I argue that because of the technological momentum and cost of resistance, many options for resistance are problematic for individuals.

Download A Question of Momentum (pdf) from Teknokultura


Backbone 409

backbone409

June 14–15 2014, Calafou, Barcelona

A gathering of projects actively building infrastructures for a free Internet from an anti-capitalist point of view: autonomous servers, open networks, online services, platforms, open hardware, free software, etc.

If you want to join us, please fill up this webform as soon as you can to register for food and hosting.

Why “Backbone 409“?