FRAW site index
Free Range Library index

Free Range Library
categories:

Anarchism & Action

Climate Change

Croughtonwatch

Cyberwar

Direct Action & Protest

Economics

Energy

Electrosmog

Extreme Energy

Extr. Energy Climate

Extr. Energy Economics

Extr. Energy Nature

Extr. Energy Pollution

Extr. Energy Radiation

Food & Agriculture

FOSS & Linux

Hacktivism

Land Rights

'Limits to Growth'

Neo-Luddism

Nuclear

Peace

Peak Oil

Planning System

Politics

Simplicity

Technology

Toxics

Transport

UCG

UK Government

UK Parliament

Vegans/Vegetarians

Waste

50 most recently added files index

Free Range Library indexes last updated 16:20, 17/03/2017

This form allows you to search the resource IDs and resource titles of the files in the Free Range Library. If a full match to a key cannot be found, a list of partial matches is returned.

library logo

The Free Range Virtual Library:

Hacktivism, Digital Rights and On-line Activism

The "Hacktivism, Digital Rights and On-line Activism" library area covers issues related to the use of technology for social and political activism, campaigns, as well as the state and corporate use of technology to exert economic, civil and political control. It also provides social science resources on the politics of technology. For that reason this issue overlaps with both the "direct action" and "free software" areas of the FRAW site.

This is the 'date-ordered' files listing for this category. To view the index ordered by he file ID name, click here. For a list of the most recent 30 files added to this category, click here.

Free Range Library indexes last updated 16:20, 17/03/2017

Files list ordered by publication date (100 files):

'abelson2015'
1/100
Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications, MIT Computer Science and Artificial Intelligence Laboratory, 06/07/2015

'tcedelman2014'
2/100
TransCanada–Edelman studies on countering protests on the 'Energy East' Canadian pipeline, TransCanada, 05/08/2014

'milaero2014'
3/100
Electronic warfare to be part of all military operations, Military Aerospace, August 2014

'ward2014'
4/100
The Data Retention and Investigatory Powers Bill, House of Commons Library, 14/07/2014

'hrwaclu2014'
5/100
With Liberty to Monitor All: How Large-Scale US Surveillance is Harming Journalism, Law, and American Democracy, Human Rights Watch/American Civil Liberties Union, July 2014

'shehabi2014'
6/100
The energy and greenhouse-gas implications of internet video streaming in the United States, Environmental Research Letters, vol.9 no.054007, 28/05/2014

'fireeye2014'
7/100
Cybersecurity's Maginot Line: A Real-World Assessment of the Defense-in-Depth Model, FireEye/Mandiant, May 2014

'csirofutures2014'
8/100
Enabling Australia's Digital Future: cyber security trends and implications, CSIRO Futures, April 2014

'usarmy2014'
9/100
Field Manual no.3-38: Cyber Electromagnetic Activities, US Army, 12/02/2014

'buckels2014'
10/100
Trolls just want to have fun, Personality and Individual Differences, 08/02/2014

'stratfordjohnston2014'
11/100
In The Matter Of State Surveillance, Brick Court Chambers, 22/01/2014

'workbrimley2014'
12/100
20YY: Preparing for War in the Robotic Age, Center for a New American Security, January 2014

'brownmcm2013'
13/100
Online Freedom of Expression, Assembly, Association and the Media in Europe, Council of Europe, October 2013

'hmic2013'
14/100
A review of progress made against the recommendations in HMIC's 2012 report on the national police units which provide intelligence on criminality associated with protest, Her Majesty's Chief Inspector of Constabulary, 27/06/2013

'duda2013'
15/100
Cybernetics, Anarchism and Self-organisation, Anarchist Studies, vol.21 no.1 pp.52-72, 28/05/2013

'mckinsey2013'
16/100
Disruptive technologies: Advances that will transform life, business, and the global economy, McKinsey Global Institute, May 2013

'epsteinrobertson2013'
17/100
Democracy at Risk: Manipulating Search Rankings Can Shift Voting Preferences Substantially Without Voter Awareness, US Association for Psychological Science, May 2013

'solove2013'
18/100
Privacy Self-Management And The Consent Dilemma, Harvard Law Review, 27/04/2013

'ipp2013'
19/100
Corporate and police spying on activists undermines democracy, University of Bath, 26/03/2013

'rosnaymartin2012'
20/100
The Digital Public Domain, Open Book Publishers, March 2013

'nctc2013'
21/100
Watchlisting Guidance, US National Counterterrorism Centre, March 2013

'globescan2013'
22/100
Environmental Concerns 'At Record Lows': Global Poll, Globescan, 25/02/2013

'ruskin2013'
23/100
Spooky Business: Corporate Espionage Against Nonprofit Organizations, Essential Information, 2013

'juvin2010'
24/100
Draft Report on the impact of advertising on consumer behaviour, EP Committee on the Internal Market and Consumer Protection, 16/08/2012

'pearce2012'
25/100
Open Source Research in Sustainability, Sustainability: The Journal of Record, vol.5 no.4 pp.238-243, August 2012

'mcafee2012'
26/100
Hacktivism: Cyberspace has become the new medium for political voices, McAfee Labs, July 2012

'hmic2010'
27/100
Adapting to protest: Protests on private land, Her Majesty's Chief Inspector of Constabulary, 29/06/2012

'hodsonbusseri2012'
28/100
Bright Minds and Dark Attitudes: Lower Cognitive Ability Predicts Greater Prejudice Through Right-Wing Ideology and Low Intergroup Contact, Psychological Science, vol.23(2) pp187-195, 07/02/2012

'hmic2012'
29/100
A review of national police units which provide intelligence on criminality associated with protest, Her Majesty's Chief Inspector of Constabulary, 02/02/2012

'ifixit2011'
30/100
Self-Repair Manifesto, iFixit, 2012

'mckinsey2011'
31/100
Big data: The next frontier for innovation, competition, and productivity, McKinsey Global Institute, May 2011

'deltica2011'
32/100
The Cost Of Cyber Crime: A Detica Report In Partnership With The Office Of Cyber Security And Information Assurance In The Cabinet Office, Cabinet Office, 14/02/2011

'hmic2011'
33/100
Policing Public Order, Her Majesty's Chief Inspector of Constabulary, 08/02/2011

'bsrgni2011'
34/100
Protecting Human Rights in the Digital Age, BSR/Global Network Initiative, February 2011

'oecdcybersec2011'
35/100
Reducing Systemic Cybersecurity Risk, OECD, 14/01/2011

'commoncause2010'
36/100
Common Cause: The Case for Working with our Cultural Values, WWF-UK, September 2010

'udrmw2010'
37/100
Universal Declaration Of The Rights Of Mother Earth, World People's Conference on Climate Change and the Rights of Mother Earth, 22/04/2010

'hardy2010'
38/100
Operation Titstorm: Hacktivism or Cyberterrorism?, University of New South Wales Law Journal, vol.33 no.2, 2010

'cfap2009'
39/100
New Tools for Old Traumas: Using 21st Century Technologies to Combat Human Rights Atrocities, Center for American Progress, October 2009

'hmic2009'
40/100
Adapting To Protest, Her Majesty's Chief Inspector of Constabulary, 07/07/2009

'demos2009'
41/100
Resilient Nation, Demos, April 2009

'dhs2009'
42/100
Domestic Extremism Lexicon, US Department for Homeland Security, 26/03/2009

'jchr2009'
43/100
Demonstrating respect for rights?: A human rights approach to policing protest, UK Parliament, 03/03/2009

'lscc2009'
44/100
Surveillance: Citizens and the State, House of Lords, 29/01/2009

'usdhs2009'
45/100
Leftwing Extremists Likely to Increase Use of Cyber Attacks over the Coming Decade, US Department for Homeland Security, 26/01/2009

'boykoff2009'
46/100
We Speak for the Trees: Media Reporting on the Environment, Annual Review of Environment and Resources, 2009

'balzarotti2008'
47/100
Are Your Votes Really Counted?: Testing the Security of Real-world Electronic Voting Systems, Computer Security Group, University of California, Santa Barbara, 24/07/2008

'chac2008'
48/100
A Surveillance Society? (vol.1), House of Commons, 20/05/2008

'xu2008'
49/100
The Secrets of the Little Pamphlet: Hippies, Hackers, and the Youth International Party Line, Christina Xu, 12/05/2008

'zerzan2008'
50/100
Twilight of the Machines, John Zerzan, April 2008

'klang2001'
51/100
Resistance & Technology: Functionally Equivalent Resistance – A non-discriminatory view of technology, University of Göteborg, 14/02/2008

'iyengar2008'
52/100
Selective Exposure to Campaign Communication: The Role of Anticipated Agreement and Issue Public Membership, The Journal of Politics, vol.70 no.1 pp.186-200, January 2008

'boldrinlevine2008'
53/100
Against Intellectual Monopoly, CUP, 2008

'icocoi2007'
54/100
A Surveillance Society: Executive Summary of Qualitative Research, Information Commissioner's Office/Central Office of Information, 15/11/2007

'liberty2007'
55/100
Overlooked: Surveillance and personal privacy in modern Britain, Liberty, October 2007

'parsons2007'
56/100
The Environmental Impact of Disposable Versus Re-Chargeable Batteries for Consumer Use, International Journal of Life-Cycle Assessment, vol.12 no.3 pp.197-203, May 2007

'gelderloos2007'
57/100
How Nonviolence Protects the State, South End Press, May 2007

'druid2007'
58/100
Mnemonic Password Formulas: Remembering Secure Passwords, Uninformed, May 2007

'darimini2007'
59/100
A Handbook for Coding Cultures, d/Lux/MediaArts & Campbelltown Arts Centre, March 2007

'canvas2007'
60/100
A Guide to Effective Nonviolent Struggle, CANVAS, 2007

'acpo2007'
61/100
Practice Advice: Introduction To Intelligence-Led Policing, Association of Chief Police Officers, 2007

'monahan2006'
62/100
Counter-surveillance as Political Intervention?, Social Semiotics, vol.16 no.4, December 2006

'icoapp2006'
63/100
A Report on the Surveillance Society – Appendices, Information Commissioner's Office, September 2006

'ico2006'
64/100
A Report on the Surveillance Society, Information Commissioner's Office, September 2006

'halpin2006'
65/100
Reinventing Technology: Artificial Intelligence from the Top of a Sycamore Tree, Institute for Communicating and Collaborative Systems, March 2006

'kojm2006'
66/100
How Safe?: The ways of viruses in Linux, Linux Magazine, no.62, January 2006

'vonbuschpalmas2006'
67/100
Abstract Hacktivism: The making of a hacker culture, Openmute, 2006

'moretzsohn2006'
68/100
'Citizen Journalism' and the Myth of Redemptive Technology, Brazilian Journalism Research, vol.2 no.2 pp.29-46, 2006

'canvas2006'
69/100
Nonviolent Struggle: 50 Crucial Points, CANVAS, 2006

'rsf2005'
70/100
Handbook For Bloggers And Cyber-Dissidents, Reporters Without Borders, September 2005

'acponim2005'
71/100
Guidance On The National Intelligence Model 2005, Centrex/Association of Chief Police Officers, September 2005

'honim2005'
72/100
Code Of Practice: National Intelligence Model, Home Office, January 2005

'dodncw2005'
73/100
The Implementation of Network-Centric Warfare, US Department of Defense, 2005

'aclu2004'
74/100
The Surveillance-Industrial Complex: How the American Government Is Conscripting Businesses and Individuals in the Construction of a Surveillance Society, The American Civil Liberties Union, August 2004

'lessig2004'
75/100
Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity, Penguin Press, 30/03/2004

'klang2004'
76/100
Civil Disobedience Online, Journal of Information, Communication & Ethics in Society, vol.2 no.2 pp.75-83, 2004

'deathenv2004'
77/100
The Death of Environmentalism: Global Warming Politics in a Post-Environmental World, Michael Shellenberger, Ted Nordhaus, 2004

'albertshayes2003'
78/100
Power to the Edge: Command and Control in the Information Age, Command and Control Research Program, US Department of Defense, June 2003

'alberts2001'
79/100
Understanding Information Age Warfare, Command and Control Research Program, US Department of Defense, August 2001

'denning2001'
80/100
Activism, Hacktivism, And Cyberterrorism: The Internet As A Tool For Influencing Foreign Policy, RAND Corporation, July 2001

'securitywatch2001'
81/100
Hacktivists of the world, divide, SecurityWatch, 23/04/2001

'msnbc2001'
82/100
Summit under cyber siege?, MSNBC, 20/04/2001

'randmr13822001'
83/100
Networks and Netwars: The Future of Terror, Crime, and Militancy, RAND Corporation, 2001

'yan2000'
84/100
The memorability and security of passwords – some empirical results, University of Cambridge, September 2000

'kelly2000'
85/100
Infowar: The Hacktivists, Hilton Cordell Productions, 2000

'juniper2000'
86/100
Digital Zapatismo: The Zapatista Netwar, David Kim Juniper, 2000

'wray1998'
87/100
Transforming Luddite Resistance into Virtual Luddite Resistance, Earth First! Journal, 07/04/1998

'hammill1997'
88/100
From Crossbows To Cryptography: Thwarting The State Via Technology, Chuck Hammill, November 1997

'kalof1997'
89/100
Understanding the Social Construction of Environmental Concern, Human Ecology Review, vol.4 no.4 pp101-105, 1997

'mobbs1996'
90/100
The Campaigners' Computer Maintenance Mantra, Free Range Network, July 1996

'gibbons1995'
91/100
Reveille For Radicals: Lessons From the Life of Saul Alinsky, Rev. John E. Gibbons, 26/02/1995

'hansen1991'
92/100
The media and the social construction of the environment, Media, Culture and Society, vol.13 pp444-458, 1991

'mentor1986'
93/100
The Hacker Manifesto, The Mentor, 08/01/1986

'ellul1985'
94/100
Preconceived Ideas About Mediated Information, The Media Revolution in America and in Western Europe, pp.95-107, 1985

'sharp1973'
95/100
198 Methods of Non-violent Action, Albert Einstein Institute, 1973

'ellul1959'
96/100
The Obstacles to Communication Arising from Propaganda Habits, Student World, vol.52 no.4 pp.401-10, 1959

'ellul1957'
97/100
Information and Propaganda, Diogenes, vol.5 pp.61-77, 1957

'bernays1947'
98/100
The Engineering of Consent, Edward L. Bernays, 1947

'bernays1928'
99/100
Propaganda, Edward L. Bernays, 1928

'opensourcecommunism'
100/100
When you program open source, you're programming Communism, Anonymous, 0000