Customize

Aaron Swartz Bookclub

Discussion in 'Freedom of Expression' started by Anonymous, Jan 24, 2013.

  1. Anonymous Member

    Anyone?
    "Philosophy and Computing" to start?
  2. Anonymous Member

  3. Anonymous Member

    I was thinking along the lines of reading something he had liberated.
  4. Anonymous Member

    But Fan Man sounds good.
  5. Anonymous Member

    I just smiled. Nice thread title. Pick one, give dates for chapter (I have add) and I am in!
  6. Anonymous Member

    • [IMG]
    • [IMG]
    • [IMG]
    • [IMG]
    • [IMG]
    • [IMG]
    Anonymous Member
    2013-0051.pdf Aaron Swartz: Prison State: Mass Incarceration January 16, 2013 (1.4MB)

    Chapter 1, Discuss until next Saturday then start Chapter 2, but you can cheat and read ahead. I do not think there are Cliffs Notes for this.
  7. Anonymous Member

    cross post
    Please go liberate a public domain document and leave a wish or a thought in Aaron’s memory.
    http://aaronsw.archiveteam.org/
    Welcome to the Aaron Swartz
    Memorial JSTOR Liberator.


  8. Anonymous Member

    I am in. Thanks for this.
  9. Anonymous Member

    Hi, I'm late to book club because I had to pick up the canapés.
    Chapter 1
    Is the build up of prisons due to foresight? Is it the wise decisions made in time of increasing lawlessness in the streets?
    The demand for more prisons for crime control is an example of 'big government'. The number of private prisons is small and seems to have plateaued. Most of the increasing prison population and exponential increase in government jobs is a growth of government.
    The increase in incarcerations has marginalized larger and larger groups of people. The government acts with a "greater exercise of coercive power by some people over others. " It isn't just the growth of governmental services like schools and parks, it is social domination of one group by another... In this case male and non- caucasian.
    Is is the pleasure of domination and degradation or careful protection of the citizens?
    Ok your turn.
  10. Anonymous Member

    http://www.theatlantic.com/magazine/archive/1998/12/the-prison-industrial-complex/304669/
    ^^
    This was written about the rise of for-profit prisons.

    "Prison State" was written 2008 and he states that the number of for profit prisons has plateaued.
    He is interested in the philosophical basis of incarceration, do we do it out of fear or desire to dominate? He points out that crimes are aggression, and incarcerating people is also aggression.
    I think we can't blame rising rates of incarceration on the profit motive of the industry and corruption of politicians (although both of those things are true).
    I think he is looking at basic human drives that lead to incarcerating other people, different from the usual- looking at the human drives that caused crime.

    He shows the rise in bigger government is a few ways- increase in jobs in prisons, food service, guards, laundry. The government is growing in power and influence by incarcerating people and at the same time increasing government jobs. We are over-criminalizing behavior at this time and sending more citizens to permanent serfdom both in prison and after release. (After release they can't get a good job because they are felons so they work at substandard wages)
  11. Anonymous Member

    More thoughts
    This book and "Over-criminalization" directly relate to Aaron Swartz. Over -criminalization makes infractions into felonies, and this book shows how the prison populations have increased as a result of government actions which have helped the government grow.
    The author does not think the increase in prisons are due to privatization.
    Our justice system has had a fundamental change.
  12. Anonymous Member

    Arrrh. Just finishing chapter one, due to add and a secret mission. Haven't read the comments ITT, but will contribute/discuss tomorrow if I am not too late.
  13. Anonymous Member

    http://cryptome.org/2013/03/hacking-digital-dissidence.pdf
    Resistance, Liberation Technology
    and Human Rights in the Digital Age

    v
    1 Opening Remarks: Hacking and Digital Dissidence
    .............................. 1
    1.1 Using Computers for the Pursuit of Political and Social
    Changes and for the Bene fi t of All Mankind ..................................... 1
    1.2 From Early Hackers to Digital Resistance Activities ........................ 5
    1.3 The So-Called
    Twitter Revolutions
    .................................................... 7
    1.4 The Worldwide Scenario, and Some Preliminary
    Interpretative Questions ..................................................................... 9
    References ................................................................................................... 22
    2 Digital Resistance, Digital Liberties and Digital Transparency
    ........... 27
    2.1 A Preliminary De fi nition of
    Digital Resistance

    and
    Digital Liberties
    .......................................................................... 27
    2.1.1 Some Focal Aspects of Digital Dissidence ............................ 27
    2.1.2 Preliminary Legal and Political Remarks .............................. 28
    2.1.3 The Power of Technology in Critical Contexts
    and the New Public Sphere .................................................... 30
    2.2 The Fundamental Role of a Secure (and Peer-Reviewed)
    Liberation Technology: The
    Haystack
    Case-History ......................... 32
    2.3 Two Key Aspects of Digital Resistance Activities,
    and Several Case Studies ................................................................... 36
    2.3.1 The Key Aspects of Dissident Activities ............................... 36
    2.3.2 Digital Resistance Case-Studies ............................................. 41
    2.4 Open Government, Collaborative Transparency
    and Civic Hacking as a Form of Digital Resistance .......................... 47
    2.4.1 The Idea of Government as a Platform
    for Transparency..................................................................... 47
    2.4.2 The Metaphor of Government 2.0 and the Idea
    of Collaborative Transparency ............................................... 49
    Contents
    vi
    2.4.3 Citizen Engagement for the Oversight
    of Political Activity ................................................................ 51
    2.4.4 Collaborative Mapping and Digital Resistance ...................... 59
    References ................................................................................................... 68
    3 Hacking and Digital Dissidence Activities
    .............................................. 73
    3.1 The Role of Hackers in the Landscape of Digital Resistance .......... 73
    3.2 A First Analysis of Common Threats to Digital
    Freedom and to Hacker Activities ................................................... 74
    3.3 Being a Hacker in This Framework ................................................. 76
    3.3.1 Thinking Like a Hacker ....................................................... 76
    3.3.2 State Antagonism, Fear and Violence .................................. 79
    3.4 A Brand New Playground ................................................................ 81
    3.4.1 Liberation Technologies ....................................................... 81
    3.4.2 Anonymity and Bloggers’ Rights ........................................ 84
    3.4.3 Innovation ............................................................................ 86
    3.4.4 Intellectual Property and Privacy ......................................... 86
    3.4.5 EPIC Activities in the Field of Privacy ................................ 88
    3.4.6 Transparency ........................................................................ 89
    3.5 A New Perspective on Hacking ....................................................... 90
    3.5.1 The Essence of hacking ....................................................... 90
    3.5.2 The Hacker Spirit and Some Lessons
    from the Ushahidi Project .................................................... 91
    3.5.3 A New Breed of Hackers ..................................................... 94
    3.6 The
    Do-It-Yourself
    Approach ........................................................... 97
    3.7 The Hacker Ethic ............................................................................. 99
    3.8 Hacking and Crime .......................................................................... 101
    3.9 Threats to Hackers ........................................................................... 105
    3.9.1 The EFF Report Unintended Consequences ........................ 105
    3.9.2 Some Signi fi cant Recent Legal Cases:
    Cease-and-Desist Actions .................................................... 106
    3.10 Hacking Electronic Voting Machines
    for the Purpose of Transparency ...................................................... 117
    References ................................................................................................... 122
    4 Digital Resistance, Digital Liberties and Human Rights
    ....................... 125
    4.1 Internet and Human Rights .............................................................. 125
    4.2 Internet and the
    Universal Declaration of Human Rights
    ............... 130
    4.3 The Council of Europe and the Human Rights Guidelines
    for Internet Service Providers: The Role of ISPs
    in Human Rights Environments and Protection ............................... 133
    4.4 The WSIS Declaration of Principles ................................................ 134
    4.5 The 2011 United Nations Report on the Promotion
    and Protection of the Right to Freedom of Opinion
    and Expression ................................................................................. 137
    4.6 A Charter of Human Rights and Principles for the Internet ............ 144
    Contents
    vii
    4.7 The “Bill of Rights” Projects ........................................................... 152
    4.7.1 The Internet Bill of Rights Drafted
    within the IGF Works ........................................................... 152
    4.7.2 The Internet Rights and Principles Dynamic
    Coalition Bill of Rights ........................................................ 154
    4.7.3 A Bill of Rights in Cyberspace ............................................ 155
    4.7.4 The EFF Bill of Privacy Rights
    for
    Social Network Users
    ..................................................... 156
    4.8 A Human Rights Approach to the Mobile Internet ............................ 157
    4.9 The Relationship Between Human Rights and Technology
    Sales to Oppressive Regimes ............................................................. 159
    References ................................................................................................... 159
    5 The Use of Liberation Technology
    ........................................................... 161
    5.1 Technical Resistance Tactics .............................................................. 161
    5.2 Surveillance Self-Defense or Self-Defense Against
    Surveillance and Monitoring .............................................................. 167
    5.3 A Recent Circumvention Tool Usage Report .................................... 169
    5.4 Tools and Guides ................................................................................ 171
    5.4.1 Leaping Over the Firewall: A Review of Censorship
    Circumvention Tools by
    Freedom House
    ............................. 171
    5.4.2 Ten Fundamental Aspects of a Typical Liberation
    Technology Tool .................................................................. 176
    5.4.3 An Interesting (Comparative) Article
    on Real Anonimity of VPN Systems Users ......................... 180
    References ................................................................................................... 184
    6 Digital Activism, Internet Control, Transparency,
    Censorship, Surveillance and Human Rights:
    An International Perspective
    ................................................................... 187
    6.1 An Introductory Overview ................................................................. 187
    6.1.1 The Global OpenNet Initiative Analysis .............................. 187
    6.1.2 Techniques and Tools Commonly Used to Censor .............. 201
    6.2 An Analysis of Several Countries with Critical
    Human Rights Issues .......................................................................... 203
    6.2.1 Burma: Internet and Human Rights in a Particular
    Technological, Political and Legal Framework ................... 203
    6.2.2 Cuba: Internet Control, User Restrictions, Legal
    and Regulatory Frameworks, Blogosphere,
    Digital Dissidents and Civil Society .................................... 214
    6.2.3 South Korea: Digital Resistance Issues ............................... 227
    6.2.4 Saudi Arabia: The Digital Liberties Landscape ................... 230
    6.2.5 Syria: Digital Liberties Issues .............................................. 233
    6.2.6 Iran: Internet and Digital Liberties Issues ............................ 239
    6.2.7 China: The Internet and Types and Levels
    of Chinese Internet Censorship ............................................ 247
    Contents
    viii
    6.2.8 Turkmenistan: Censorship and Control ............................... 259
    6.2.9 Uzbekistan: Internet, Censorship and Surveillance ............. 262
    6.2.10 Vietnam: Digital Resistance and Censorship ....................... 269
    6.2.11 Australia: Internet Filtering Policies, Digital Liberties
    and Circumvention Tools ..................................................... 273
    6.2.12 Iceland: Digital Resistance Issues
    and Freedom of Information ................................................ 279
    6.2.13 India: Freedom of Speech, Freedom of Information
    and Electronic Censorship ................................................... 283
    6.2.14 Russia. Internet and Human Rights: Political
    and Technological Frameworks ........................................... 290
    6.2.15 North Korea: The Main Digital Liberties Issues .................. 295
    6.3 Revolts and Digital Dissidence in Egypt and Tunisia:
    Where It All Began ............................................................................ 301
    6.3.1 A Brief Summary of Digital Dissidence in Egypt ............... 301
    6.3.2 A Brief Summary of Digital Dissidence in Tunisia ............. 303
    References ................................................................................................... 304
    7 Conclusions: The Landscape of Digital Liberties and the Future
    ........ 309
    7.1 Human Rights in the Digital Era and the Role of Law ...................... 309
    7.2 Technology as an
    Antibody
    ................................................................ 311
    7.3 The Technological Scenario ............................................................... 313
    7.4 The Relationships Between Hacking and Digital Resistance ............ 314
    References ................................................................................................... 315
    Author Index
    .................................................................................................... 317
    Subject Index
    ................................................................................................... 321
  14. Anonymous Member

  15. Anonymous Member

  16. Anonymous Member

    3.2 A First Analysis of Common Threats to Digital
    Freedom and to Hacker Activities
  17. Anonymous Member

  18. Anonymous Member

    • Like Like x 1
  19. Anonymous Member

    Bill McGuire
    GLOBAL
    CATASTROPHES
    A Very Short Introduction
    Contents
    Preface
    ix
    List of illustrations
    xv
    1
    A Very Short Introduction to the Earth
    1
    2
    Global Warming: A Lot of Hot Air?
    23
    3
    The Ice Age Cometh
    44
    4
    The Enemy Within: Super-Eruptions, Giant Tsunamis,
    and the Coming Great Quake
    62
    5
    The Threat from Space: Asteroid and Comet Impacts
    89
    Epilogue
    113
    Appendix A: Threat Timescale
    117
    Appendix B: Geological Timescale Earth
    118
    Further reading
    119
    Index
    124
  20. Anonymous Member

  21. Anonymous Member

  22. Anonymous Member

    List of illustrations
    1 Map of the Earth’s plates
    with locations of recent
    disasters 10
    Apocalypse
    , Cassell, 1999
    2 The lithosphere 11
    Apocalypse
    , Cassell, 1999
    3 Badly damaged building
    after Indian Ocean
    tsunami 2004 15
    Tiziana Rossetto
    4 Ruins of St Pierre
    (Martinique) after 1902
    eruption 16
    © Mary Evans Picture Library
    5 Increasing concentrations

  23. Anonymous Member

    The first illustration is something like this

    [IMG]

    showing earthquakes around tectonic plates. His arguments highlight natural processes and the relation to danger.
    For example the pictures of disaster of the past
    [IMG]
    and discussion of the statistical probabilities of recurrence.

    There is an illustration I can't replicate here showing ocean currents and storms and tectonic plates.
  24. Anonymous Member


    Shiva hypothesis is-
    [quote]Named after the Hindu god of destruction, the Shiva Hypothesis is a hypothesis that purports to explain an apparent pattern in mass extinctions caused by impact events.
    The hypothesis, created by Michael Rampino of New York University, says that gravitational disturbances caused by the Solar System crossing the plane of the Milky Way galaxy are enough to disturb comets in the Oort cloud surrounding the Solar System. This sends comets in towards the inner Solar System, which raises the chance of an impact. According to the hypothesis, this results in the Earth experiencing large impact events about every 30 million years (such as the Cretaceous–Paleogene extinction event).
    [/quote]
  25. Anonymous Member

    Here are other causes of landslides- quotes from a Washington State plan

    http://www.emd.wa.gov/plans/documents/Tab_7.1.5_Landslide_final.pdf

  26. Anonymous Member

    http://cryptome.org/2013/05/patriots-profit.pdf



    10

  27. Anonymous Member

    Contents
  28. Disambiguation Global Moderator

    https://www.insidehighered.com/news...ling-rights-hacktivist-aaron-swartzs-writings
    Decision to grant a publisher the right to print the writings of Aaron Swartz -- viewed by some as a martyr of the open-access movement -- sets off a debate about copyright.
  29. Eck. Disregard.
    https://www.insidehighered.com/news...ling-rights-hacktivist-aaron-swartzs-writings
    Snip

    In an open letter, the editors and dozens of other signatories say the restrictions represent a “disconnect” between Swartz’s activism and the publishers’ own rights. “And while you may have labored with all good intentions to ‘compile’ his work in elegant and mobile form, you have done so in a way that nevertheless asserts certain ‘rights’ over that work as well as over its presentation and dissemination in these particular editions in a way that, if perfectly ‘legal,’ is also intellectually and morally dishonest,” the letter reads.

    The book includes a selection of Swartz’s writings on topics such as computers, politics and media, and opens with an original introduction by Lawrence Lessig, the Roy L. Furman Professor of Law and Leadership at Harvard Law School. Swartz’s blog posts are available for free online.

Share This Page

Customize Theme Colors

Close

Choose a color via Color picker or click the predefined style names!

Primary Color :

Secondary Color :
Predefined Skins