netwit 2.01

#INTERNET #internetcensorship ~ Internet censorship in Australia and how it compares to other countries



Internet censorship in Australia


Australia is a surprising example of internent censorship. There was a recent TV report of the opening of the Canberra Cybersecurity Centre, to which American officials were invited.

When you look at the Reporters Without Frontiers map, even if you don’t know the colour code, it is easy to work one out, with China, Saudi Arabia, Iran, Tunisia and Cuba the darkest most censored countries. This suggests Australian and South Africa are next worst, which might surprise some. Since the yellow is Britain, the U.S., etc, and Africa is a light blue: this can only mean since Africa’s internet development is not advanced it won’t censor much, but that that the yellow countries do censor to some extent.






A small amount of research shows the issue of internet censorship by country isn’t as straight forward as one might assume. Nation-State Routing: Globalizing Censorship has tables which purport to show the effect of a country’s domestic internet censorship policies on international traffic. Again, another surprise: The U.S. is top of the list followed by Britain and Germany with China 8th. Another measure shows:

“Collectively, these results show that the ‘West’ continues to exercise disproportionate influence over international routing, despite the penetration of the Internet to almost every region of the world, and the rapid development of China and India.”

Perhaps cipherpunk Julian Assange knew something we didn’t and was keen to get out of there!

Why not try Herdictweb, a project of the Berkman Center for Internet & Society at Harvard University, where you can type in a website to see if it is blocked. Can’t be bothered? Just watch the map at the top highlighting inaccesible sites and when.

refs.

Website Maps Global Web Blocks
Herdict uses volunteers to monitor Internet censorship, filtering, and outages.


Advertisements

January 22, 2011 Posted by | Citizen 2.0, Combating Online Infringement and Counterfeits Act [COICA], connective knowledge, connectivism, cyber security, cyber terrorism, Internet censorship, routing censorship, Tunisia | Leave a comment

#INTERNET #China #firewall #greatfirewallofchina





There is a US gov site which has a good summary of China and filtering, but I’ve lost it in a sudden browser shut down. And I haven’t managed to re-Google it. See it, let me know. Or anything else similarly comprehensive.

In the meantime a Der Spiegel starter from which there are some ideas to work with :

How China Leads the World in Web Censorship



January 19, 2011 Posted by | China, Citizen 2.0, cognitive infilltration, connectivism, cyber security, cyber warfare, cyber-utopianism, cyberspace, Der Spiegel, Electronic Frontier Foundation (EFF), Evgeny Morozov, Government 2.0, Govt 3.0, Indentity Ecosystem Framework, info-war, information silos, Internet, Internet filtering, internet-centrism | | Leave a comment

#SOCIALMEDIA #cyber-utopianism #internet-centrism #BBCNewsnight [http://bit.ly/fNrj7i] @evgenymorozov ~ The Power of the Internet, Not?



Eugeny Morozov{ EM about}, author of The Net Delusion, will be on Newsnight 17 Jan 2011.



January 17, 2011 Posted by | "Collateral Murder" video, actor-network theory, Afghanistan documents, anonymity online, anonymous whistleblowing, Birgitta Jónsdóttir, Bradley Manning, Canberra cyber security centre, China, Citizen 2.0, citizen journalism, cognitive infilltration, connective knowledge, connectivism, crowd sourcing, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyber-utopianism, cyberpunk, cyberspace, Cyberspace Policy Review, cypherpunk, Daniel Domscheit-Berg, Daniel Ellsberg, data journalism, data leakage, data security, data-dump journalism, Defence Signals Directorate (DSD, Department of Homeland Security, Der Spiegel, digital forensics, digital journalism, diplomatic cables, Echelon spy system, Electronic Frontier Foundation (EFF), encryption, Evgeny Morozov, FaceBook, FGI, free government information [FGI], Frontline Club, Government 2.0, hacker culture, Hrafnsson, Indentity Ecosystem Framework, info-war, information silos, insider security, insider threats, Internet, internet activism, internet-centrism, investigative journalism, Iraq War 2003, Iraq war logs, Jaron Lanier, Jónsdóttir, Julian Assange, Manning, National Center for Cybersecurity and Communications (NCCC), National Security Agency [NSA], National Strategy for Trusted Identities in Cyberspace, net neutrality, network anomalies, Network security, network theory, NSA, on-line rights, ontology, Open data, open source, organisational network analysis, P2P, P2P Foundation, Peer-to-Peer, Phorm, Pretty Good Privacy (PGP), privacy, Protecting Cyberspace as a National Asset Act (PCNAA), rogue employee, Semantic Web, silo effect, Single Person Organisation [SPO], social media, social networks, social semantic web, social silos, techno-libertarianism, The Crypto Anarchist Manifesto, Tim Burners-Lee, Tor, trust, trust models, Twitter, Virtual Private Network (VPN), virtual tunnel, visualisation, Web 2.0, WikiLeaks | Leave a comment

#TUNISIA #WIKILEAKS #socialmedia #twitrev ~ Was What Happened in Tunisia a Twitter Revolution? II



[1] The febrile debate in the social media about Tunisia is comical because the bien pensers know little about Tunisia, are rushing to conclusions with the basics, cobbling together their social network theories from what they think/guess to be a good example of a digitial revolution, and hoping for the best. Though the Internet, Web and social media, must have played a part, it’s primarily a political debate which I doubt many of the social media types are qualified to engage in – more a bit of a shouting match in a pub.

A few are getting really excited because they have written books on similar themes and think they might be writing a few more on the back of this crisis, and be invited into the TV studious as experts on the Twitter revolution. Have any, one wonders, even had a holiday Djerba?

Tunisia has been under the thumb from way back in the days of Bourguiba.

[2] The riots are a middle class phenomenon. Use your eyes! The No comment Euronews video yesterday showed middle-aged laywers still in their black robes, mingling with and shouting encouragement to the youth in centre of Tunis! And in those masses were students shouting that they were educated and had no jobs.

[3] The 1789 French Revolution was undoubtedly a revolution of the small, mobile printing press – the press facilitated the spread of ideas that led to the coup. But the French Revolution was a revolt of the middle-classes against arbitrary Monarchic rule, as was the American Revolution. Here, we need to Google our Gore Vidal YouTubes to see his barbed comments about the United States of America never having been a democracy.

[4] WikiLeaks showed two things about Tunisia:

[a] The U.S. supported Tunisia because Tunisia supported the U.S. over the war on terror. We have to ask if Tunisia might have been involved in extraordinary rendition like Morocco and Egypt were. Maybe not, but the likihood is great – Tunisia has been under authoritarian rule since 1957.

[b] The diplomatic cables showed the U.S. was aware that something was brewing in Tunisia.



January 15, 2011 Posted by | actor-network theory, Citizen 2.0, citizen journalism, connective knowledge, connectivism, cyber security, cyber-utopianism, cyberpunk, cyberspace, cypherpunk, data journalism, digital journalism, diplomatic cables, Government 2.0, info-war, Internet, P2P, Protecting Cyberspace as a National Asset Act (PCNAA), social media, social networks, techno-libertarianism, U.S. diplomatic cables, U.S.Embassy cables, Web 2.0, WikiLeaks | Leave a comment

#TUNISIA #WIKILEAKS #socialmedia #twitrev ~ Twitter revolution and the new Arab Media Space?



Tunisia and the New Arab Media Space
Marc Lynch, Foreign Policy, 15 Jan 2011


Tunisia: Can We Please Stop Talking About ‘Twitter Revolutions’
Luke Allnutt, Tanglered Web blog, 15 Jan 2011




The WDIK column
Twitter is proving to be important. It wouldn’t be so important if there were no mobile feeds into the system.

The Tunisian authorities, it is reported, had the Internet as tight as a gnats bottom – as China has. Though the news is that just before he flew the coop to Malta/France/Saudi Arabia (probably right now sitting down by the poolside with an ice-cool Carlesberg, evoking for me the iconic Heinekin scene at the end of Ice Cold in Alex…oh, perhaps not, it’s a dry country),



Internet Ali removed some of the filters. Or – as we’ll learn sooner than later – the current regime did, in order to reduce the pressure.



January 15, 2011 Posted by | actor-network theory, anonymity online, anonymous whistleblowing, China, Citizen 2.0, citizen journalism, connective knowledge, connectivism, cyber security, cyber-utopianism, cyberspace, data journalism, data leakage, data security, data-dump journalism, digital journalism, diplomatic cables, Government 2.0, Govt 3.0, Indentity Ecosystem Framework, info-war, insider security, insider threats, Internet, internet activism, internet-centrism, investigative journalism, Julian Assange, Manning, media, net neutrality, Network security, network theory, on-line rights, Open data, open source, P2P, P2P Foundation, Peer-to-Peer, privacy, Single Person Organisation [SPO], social media, social networks, techno-libertarianism, Tim Burners-Lee, trust, trust models, Twitter, U.S. diplomatic cables, U.S.Embassy cables, Web 2.0, Web 3.0, WikiLeaks, WikiLeaks vs. The Yes Men | Leave a comment

#WIKILEAKS A capacity for trust model




CEOs say creativity most important in next 5 years





Both from The Practice of Leadership blog by George Ambler.



January 15, 2011 Posted by | actor-network theory, anonymity online, anonymous whistleblowing, Citizen 2.0, citizen journalism, cognitive infilltration, connective knowledge, connectivism, conspiracy, crowd sourcing, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyber-utopianism, data leakage, data security, digital forensics, Electronic Frontier Foundation (EFF), encryption, Government 2.0, Govt 3.0, hacker culture, Indentity Ecosystem Framework, info-war, insider security, Internet, internet activism, investigative journalism, Julian Assange, National Center for Cybersecurity and Communications (NCCC), National Security Agency [NSA], National Strategy for Trusted Identities in Cyberspace, net neutrality, network anomalies, network e-discovery, Network security, network theory, on-line rights, Open data, open source, P2P, P2P Foundation, Peer-to-Peer, Semantic Web, social media, social networks, social semantic web, trust, trust models, Twitter, Web 2.0, WikiLeaks | Leave a comment

INTERNET #WEB Rethinking Conspiracy: The Political Philosophy of Julian #Assange [http://bit.ly/guyoRd]



Rethinking Conspiracy: The Polical Philosophy of Julian Assange



by


Peter Ludlow



January 12, 2011 Posted by | actor-network theory, Bradley Manning, Canberra cyber security centre, Citizen 2.0, connective knowledge, connectivism, conspiracy, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyber-utopianism, cyberspace, cypherpunk, data journalism, data leakage, Defence Signals Directorate, Department of Homeland Security, digital forensics, digital journalism, encryption, FGI, free government information [FGI], Government 2.0, Govt 3.0, hacker culture, info-war, insider security, insider threats, Internet, internet activism, Iraq war logs, Julian Assange, National Center for Cybersecurity and Communications (NCCC), National Strategy for Trusted Identities in Cyberspace, Network security, network theory, P2P, P2P Foundation, techno-libertarianism, The Crypto Anarchist Manifesto, U.S. diplomatic cables, U.S.Embassy cables, Unique Personality Organisation [UPO], WikiLeaks, WikiLeaks vs. The Yes Men | Leave a comment

#INTERNET #privacy ~ Australia’s new cyber-warefare facility [http://bit.ly/fjOrlJ]



Australia’s new cyber-warefare facility



January 12, 2011 Posted by | ASIO, Canberra cyber security centre, Citizen 2.0, cognitive infilltration, connective knowledge, connectivism, conspiracy, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyber-utopianism, cyberspace, Cyberspace Policy Review, cypherpunk, data journalism, data leakage, Defence Signals Directorate, Defence Signals Directorate (DSD, Department of Homeland Security, digital forensics, digital journalism, DSD, encryption, free government information [FGI], Government 2.0, Govt 3.0, hacker culture, Indentity Ecosystem Framework, info-war, information silos, insider security, insider threats, Internet, internet activism, Julian Assange, Manning, National Center for Cybersecurity and Communications (NCCC), National Security Agency [NSA], National Strategy for Trusted Identities in Cyberspace, net neutrality, network anomalies, Network security, on-line rights, Open data, open source, P2P, P2P Foundation, Peer-to-Peer, Phorm, privacy, Protecting Cyberspace as a National Asset Act (PCNAA), Semantic Web, silo effect, Single Person Organisation [SPO], social media, social networks, social semantic web, techno-libertarianism, The Crypto Anarchist Manifesto, Tim Burners-Lee, U.S. diplomatic cables, U.S.Embassy cables, Unique Personality Organisation [UPO], Web 2.0, Web 3.0, WikiLeaks | Leave a comment

#INTERNET #privacy #digitalforensics [@4ensics] ~ On the Web, Children Face Intensive Tracking: http://budurl.com/PrivacyWSJ



On the Web, Children Face Intensive Tracking


by


Steve Stecklow, Wall Street Journal, 17 Sept 2010
steve.stecklow@wsj.com


also:


Shunned Profiling Technology on the Verge of Comeback


* On the reappearence of badform wiki:Phorm


In my scrabble to Rolodex this blog, I haven’t bothered to make any comments of my own, letting the trend of the material indicate where I am coming from/going to. It isn’t difficult to imagine Govt 1.0 scrambling to find technologies to help them keep ahead of their populations. Govt 2.0 and Citizen 2.0 evident in many places: it won’t be long before there is talk of Govt 3.0, which will be another way of talking P2P politics/society qua Michel Bauwens





January 12, 2011 Posted by | actor-network theory, asset misuse, Citizen 2.0, connective knowledge, connectivism, conspiracy, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyber-utopianism, cypherpunk, digital forensics, encryption, Govt 3.0, hacker culture, Internet, Julian Assange, National Security Agency [NSA], National Strategy for Trusted Identities in Cyberspace, net neutrality, Network security, network theory, on-line rights, Open data, open source, Phorm, privacy, techno-libertarianism, The Crypto Anarchist Manifesto, Tim Burners-Lee, Web 2.0, Web 3.0, WikiLeaks | Leave a comment

INTERNET WEB WIKILEAKS The wider perspective










DebateGraph : WikiLeaks



December 23, 2010 Posted by | asset misuse, broadband, Bruno Latour, Citizen 2.0, compliance, connective knowledge, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyberspace, data journalism, data leakage, DebateGraph, Department of Homeland Security, digital journalism, Government 2.0, Guardian, insider threats, Internet, Iraq war logs, Julian Assange, Manning, MTI, National Center for Cybersecurity and Communications (NCCC), net neutrality, network anomalies, Network security, network theory, Open data, PCNAA, Protecting Cyberspace as a National Asset Act (PCNAA), public statistics, RIIA, rogue employee, Semantic Web, SIPRNET, Tim Burners-Lee, U.S.Embassy cables, Web 2.0, Web 3.0, WikiLeaks | Leave a comment