background preloader

How To Remain Connected If Your Internet Gets Shut Off

How To Remain Connected If Your Internet Gets Shut Off

HOW TO COMMUNICATE IF THE U.S. GOVERNMENT SHUTS DOWN THE INTERNET USA :: Freedom and Liberty :: Print this ArticleHOW TO COMMUNICATE IF THE U.S. GOVERNMENT SHUTS DOWN THE INTERNET02-07-2011 9:48 pm - Wallace Scenario: Your government is displeased with the communication going on in your location and pulls the plug on your internet access, most likely by telling the major ISPs to turn off service. This is what happened in Egypt Jan. 25 prompted by citizen protests, with sources estimating that the Egyptian government cut off approximately 88 percent of the country's internet access. NOTE: If you have advice to add, please log in and Aadd your comments. Print out your contact list, so your phone numbers aren’t stuck in the cloud. CB Radio: Short for "Citizens Band" radio, these two-way radios allow communication over short distances on 40 channels. Ham radio: To converse over these radios, also known as "amateur radios," you have to obtain an operator's license from the FCC. Packet Radio Back to the '90s: There do exist shortwave packet-radio modems.

Designing Effective Action Alerts for the Internet An action alert is a message that someone sends out to the net asking for a specific action to be taken on a current political issue. Well-designed action alerts are a powerful way to invite people to participate in the processes of a democracy. Having seen many action alerts in my years on the Internet, I have tried to abstract some guidelines for people who wish to use them. Even if you do not plan to construct any action alerts yourself, I do not recommend that you forward anybody else's alerts unless they conform to at least the spirit of these guidelines. Although an Internet action alert should always be part of an issue campaign with a coherent strategy and clear goals, I won't discuss the larger strategic questions here. Both types of action alerts are obviously modeled on things that have been happening on paper, through telephone trees, and lately via fax machines, for a long time.

The entertainment industries' copyright lobby supports an LEWP proposal to introduce Europe-wide firewall to censor and block ‘illicit’ websites: The Pirate Bay team is rallying public support to defend the free Internet and end this threat : worldnews How To Set Up An Open Mesh Network in Your Neighborhood Mesh networks can share web connections throughout a neighborhood, spreading the reach of a broadband connection. They're an excellent way to improve a community’s web access, and could also serve a role in the infrastructure for the Next Net that Douglas Rushkoff envisions. Open Mesh is a company that offers mesh network solutions for businesses and communities. They provided Shareable with this guide to how to set up a mesh network in your own neighborhood. It is now easy for anyone to extend their wireless coverage throughout a hotel, apartment, office, neighborhood, village, coffee shop, shopping mall, campground, marina or just about anywhere else you need to extend wireless coverage. The magic that makes this work is the Open-Mesh mini routers (as small as the size of a pack of cards) that can spread a single internet connection across multiple rooms. Some basic terminology: Network: A group of computers that can talk to each other – in our case, wirelessly. Gateway: Repeater: Node:

Top 10 Countries Censoring the Web When the World Wide Web was created in 1989 by Tim Berners-Lee (not to be confused with the Internet itself, which is the core network developed many years earlier), its main objective was to enable the free exchange of information via interlinked hypertext documents. Almost 20 years later, that objective has been accomplished on most parts of the world, but not in all of them. Some countries are trying hard to keep an iron hand over the flow of information that takes place on the Web. 10. The rundown Pakistan started censoring the web in 2000, when the main target was anti-Islamic content. How does the censorship work? There are only three international gateways on the country, and all of them are controlled by the Pakistan Telecommunication Company. Internet service providers are also required by law to monitor the activity of their clients to make sure that they are not accessing prohibited websites. What kind of content is blocked? 9. 8. 7. Everything. 6. 5. 4. 3. 2. 1. Bonus: Australia

Le grand firewall européen et la guerre des Internets Les attaques aux libertés numériques sont légion. En France, on en parle même plus tellement ça devient lassant… et il va falloir tenir encore au moins un an. Le soucis d’aujourd’hui est européen. A croire que la claque qu’a pris ACTA ces derniers mois, loin de calmer certains lobbys, les a incité à opérer en dessous de table. Ce n’est pas franchement une surprise, la méthode est particulièrement courante. Korben, Numerama, 20Minutes, Owni… ont relayé aujourd’hui la mise en garde de The Pirate Bay à propos du LEWP (Law Enforcement Working Party), un mystérieux groupe travail européen dont le pedigree pourrait bien se situer quelque par entre Muriel Marland-Militello et Bachar El Assad. Ce n’est donc pas le fait qu’un groupe de travail organise la censure du Net au niveau européen qui est inquiétant. Au menu, on retrouvera nos outils préférés : Tout ça pour nous servir une recette qui a démontré dans plusieurs pays une innéfficacité crasse et surtout, des abus innéluctables :

5 minute summary: Data Retention The EU data retention directive aims at enabling the retracing of who contacted whom via telephone, mobile phone or e-mail for a period of 6 to 24 months. In the case of mobile calls or text messages via mobile phone, the user's location is also to be logged. The data that is collected about the entire population allows our movements to be traced, any calls or communications with personal and business contacts to be monitored and removes privacy in our personal relationships. Information regarding the content of communications can be deduced relating to personal interests and the individual life circumstances of the persons communicating. Access to the data is granted to the police, public prosecutors, secret services and foreign states which hope for better prosecution of crimes. Until 2007, telecommunications providers were permitted to retain only data required for billing purposes. What is the problem? We are all suffering from data retention: Current situation Act now:

The Debate Over Internet Governance: Introduction Welcome to the Debate Over Internet Governance: A Snapshot in the Year 2000 This website was prepared as a final project for the course Internet & Society: The Technologies and Politics of Control at Harvard Law School. This site aims to do that which might seem impossible in a medium that changes so quickly and so dramatically to freeze a particular moment in the debate over internet governance. [Note: as of May 2005, the legal landscape has continued to change. The moment we seek to capture here is no ordinary moment in the development of the internet. At some level, even those most wary of formal governance for the internet recognize the need for central administration of some of the internets technical aspects. If nothing else, what is clear is that the decisions made today about the technical architecture of the internet and the body which will administer that architecture will shape the internets development for years to come. As the expiration of NSIs contract with the U.S.

The Pirate Bay déclare la guerre des Internets en Europe L'Union européenne va-t-elle se doter elle aussi d'une sorte de grande muraille numérique, à l'image de celle ceinturant et censurant l'Internet en Chine ? Repérée par The Telegraph, une proposition défendue par le LEWP (Law Enforcement Working Party), un groupe de travail issu du Conseil Justice et Affaires Intérieures, prévoit de mettre en place un espace Schengen numérique, protégé par des frontières virtuelles. "La présidence du LEWP a présenté son intention de proposer des mesures concrètes visant à créer un unique espace européen sécurisé doté d'une sorte de 'frontière de Schengen virtuelle' et de 'points d'accès virtuels' sur lesquels les fournisseurs d'accès à Internet pourraient bloquer les contenus illicites en fonction d'une 'liste noire' européenne" est-il expliqué dans le chapitre cybercrime du document (.pdf). La proposition du LEWP pourrait conduire à la mise en place d'une sorte d'intranet géant en Europe, où chaque accès serait étroitement surveillé.

Forskningsavdelningen Bienvenue à l’e-G8, le Davos du web La grand messe d'Internet voulue par Nicolas Sarkozy se tient jusqu'à ce mercredi à Paris, avant le G8 de Deauville. Et la couleur industrielle de l'événement en effraie certains. Explications, avec des vrais morceaux de Maurice Lévy dedans. De la même manière que Cannes donne envie aux gens de faire des films, l’e-G8 doit être une vitrine du web. Dans la bouche de Maurice Lévy, puissant patron du groupe de communication Publicis et président de ce pré-sommet consacré aux questions numériques, cette phrase résonne comme un slogan publicitaire à destination des jeunes entrepreneurs. 1000 invités, des pointures internationales (Mark Zuckerberg de Facebook, Eric Schmidt de Google, Jeff Bezos d’Amazon, le magnat des médias Rupert Murdoch), un grand chapiteau, des ateliers, des stands où les jeunes pousses du web pourront s’exposer: le parfait environnement pour réfléchir à “l’impact d’Internet sur l’économie”… Quitte à oublier le reste. Dans les tuyaux depuis 2006 Abandon de la gouvernance?

The Great (fire)Wall of Europe. | The Waspsnest I suppose it was only a matter of time before the EUSSR got around to considering this one : Broadband providers have voiced alarm over an EU proposal to create a “Great Firewall of Europe” by blocking “illicit” web material at the borders of the bloc.Anti-censorship campaigners compared the plan to China’s notorious system for controlling citizens’ access to blogs, news websites and social networking services.The proposal emerged an obscure meeting of the Council of the European Union’s Law Enforcement Work Party (LEWP), a forum for cooperation on issues such as counter terrorism, customs and fraud. If they do try to create a European firewall along the lines of China’s then they will have to be prepared to plough in huge sums of money to get a very leaky wall. My brother is in China at the moment and was telling me about the system they have to control internet access. The only end result from this exercise will be more of our money pissed up against their firewall plans.

Information Warfare Monitor | Tracking Cyberpower

yeah im undecided as well where to put it under aswell.It seems like it can be put under a number of different categories. I just put it under general hacktivism because it is keeping the lines of communication open but on a tech level. by theworldthatis Jun 17

Related: