Submit Search
Upload
Digi Active For Mobile Active 2008 Final
•
Download as PPT, PDF
•
8 likes
•
3,219 views
Patrick Meier
Follow
Presentation given by DigiActive.org on digital activism at MobileActive 2008 conference
Read less
Read more
Technology
Business
Report
Share
Report
Share
1 of 29
Download now
Recommended
Using AMITT and ATT&CK frameworks
Using AMITT and ATT&CK frameworks
Sara-Jayne Terp
Cybersecurity
Cybersecurity
Glenn McKnight
Digital Tech, New Media, and the Internet in Nonviolent Struggle
Digital Tech, New Media, and the Internet in Nonviolent Struggle
daryncambridge
Peace processes after the pandemic: What role for technology?
Peace processes after the pandemic: What role for technology?
Sanjana Hattotuwa
Mikie
Mikie
MJBULLOCK01
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Yudhistira Nugraha
Top influential women cybersecurity
Top influential women cybersecurity
Sentryo
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Benjamin Ang
Recommended
Using AMITT and ATT&CK frameworks
Using AMITT and ATT&CK frameworks
Sara-Jayne Terp
Cybersecurity
Cybersecurity
Glenn McKnight
Digital Tech, New Media, and the Internet in Nonviolent Struggle
Digital Tech, New Media, and the Internet in Nonviolent Struggle
daryncambridge
Peace processes after the pandemic: What role for technology?
Peace processes after the pandemic: What role for technology?
Sanjana Hattotuwa
Mikie
Mikie
MJBULLOCK01
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Yudhistira Nugraha
Top influential women cybersecurity
Top influential women cybersecurity
Sentryo
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Benjamin Ang
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
WAIHIGA K.MUTURI
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
ACAD1ITG
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
CRS4 Research Center in Sardinia
Opportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptx
VincentAcapen
Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... Globally
CTIC Technology Centre
ppt on child pornography and cyber crime
ppt on child pornography and cyber crime
008_Anuj
South Africa MXIT exploratory paper
South Africa MXIT exploratory paper
Akshay Sinha
Privacy, social networks and EU policy
Privacy, social networks and EU policy
Chris Marsden
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
Gol D Roger
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
REVULN
Computer Crime
Computer Crime
Farjana Akter
Internet Safety
Internet Safety
Charles Mok
South african mobile generation
South african mobile generation
Akshay Sinha
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
gkurtz
Impact Mobile Social Media Developing Countries2
Impact Mobile Social Media Developing Countries2
Inge de Waard
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
VivekanandaGN1
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
Chelsea Porter
The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)
Michael Edson
Cyber ethics
Cyber ethics
Preet Hanspal
Meier uav experts meeting 2014
Meier uav experts meeting 2014
Patrick Meier
Digital Humanitarians: Book Slides
Digital Humanitarians: Book Slides
Patrick Meier
More Related Content
Similar to Digi Active For Mobile Active 2008 Final
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
WAIHIGA K.MUTURI
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
ACAD1ITG
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
CRS4 Research Center in Sardinia
Opportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptx
VincentAcapen
Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... Globally
CTIC Technology Centre
ppt on child pornography and cyber crime
ppt on child pornography and cyber crime
008_Anuj
South Africa MXIT exploratory paper
South Africa MXIT exploratory paper
Akshay Sinha
Privacy, social networks and EU policy
Privacy, social networks and EU policy
Chris Marsden
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
Gol D Roger
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
REVULN
Computer Crime
Computer Crime
Farjana Akter
Internet Safety
Internet Safety
Charles Mok
South african mobile generation
South african mobile generation
Akshay Sinha
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
gkurtz
Impact Mobile Social Media Developing Countries2
Impact Mobile Social Media Developing Countries2
Inge de Waard
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
VivekanandaGN1
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
Chelsea Porter
The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)
Michael Edson
Cyber ethics
Cyber ethics
Preet Hanspal
Similar to Digi Active For Mobile Active 2008 Final
(20)
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Opportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptx
Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... Globally
ppt on child pornography and cyber crime
ppt on child pornography and cyber crime
South Africa MXIT exploratory paper
South Africa MXIT exploratory paper
Privacy, social networks and EU policy
Privacy, social networks and EU policy
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Computer Crime
Computer Crime
Internet Safety
Internet Safety
South african mobile generation
South african mobile generation
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
Impact Mobile Social Media Developing Countries2
Impact Mobile Social Media Developing Countries2
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)
Cyber ethics
Cyber ethics
More from Patrick Meier
Meier uav experts meeting 2014
Meier uav experts meeting 2014
Patrick Meier
Digital Humanitarians: Book Slides
Digital Humanitarians: Book Slides
Patrick Meier
Monitoring Humanitarian Crises in the Digital Age
Monitoring Humanitarian Crises in the Digital Age
Patrick Meier
Presentation to QCRI
Presentation to QCRI
Patrick Meier
Meier where20 2012
Meier where20 2012
Patrick Meier
Ushahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENA
Patrick Meier
Ushahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENA
Patrick Meier
Digital Mapping Technologies for 21st Century Democracy
Digital Mapping Technologies for 21st Century Democracy
Patrick Meier
Red Cross: Changing the World, One Map at a Time
Red Cross: Changing the World, One Map at a Time
Patrick Meier
Recampaign 2011: Changing the World, One Map at Time
Recampaign 2011: Changing the World, One Map at Time
Patrick Meier
Re:publica 2011: Changing the World, One Map at a Time
Re:publica 2011: Changing the World, One Map at a Time
Patrick Meier
Introduction to Live Crisis Mapping & Checkin's with a Purpose
Introduction to Live Crisis Mapping & Checkin's with a Purpose
Patrick Meier
Changing the World, One Map at a Time
Changing the World, One Map at a Time
Patrick Meier
Ushahidi Presentation for UN IASC
Ushahidi Presentation for UN IASC
Patrick Meier
The Ushahidi Story: Liberation Technology in Practice
The Ushahidi Story: Liberation Technology in Practice
Patrick Meier
Ushahidi Deployments
Ushahidi Deployments
Patrick Meier
Collaborative Crisis Mapping
Collaborative Crisis Mapping
Patrick Meier
Crisis Mapping Presentation at Fletcher, November 2009
Crisis Mapping Presentation at Fletcher, November 2009
Patrick Meier
Crisis Mapping Presentation for UN OCHA
Crisis Mapping Presentation for UN OCHA
Patrick Meier
How to Communicate Securely in Repressive Regimes
How to Communicate Securely in Repressive Regimes
Patrick Meier
More from Patrick Meier
(20)
Meier uav experts meeting 2014
Meier uav experts meeting 2014
Digital Humanitarians: Book Slides
Digital Humanitarians: Book Slides
Monitoring Humanitarian Crises in the Digital Age
Monitoring Humanitarian Crises in the Digital Age
Presentation to QCRI
Presentation to QCRI
Meier where20 2012
Meier where20 2012
Ushahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENA
Digital Mapping Technologies for 21st Century Democracy
Digital Mapping Technologies for 21st Century Democracy
Red Cross: Changing the World, One Map at a Time
Red Cross: Changing the World, One Map at a Time
Recampaign 2011: Changing the World, One Map at Time
Recampaign 2011: Changing the World, One Map at Time
Re:publica 2011: Changing the World, One Map at a Time
Re:publica 2011: Changing the World, One Map at a Time
Introduction to Live Crisis Mapping & Checkin's with a Purpose
Introduction to Live Crisis Mapping & Checkin's with a Purpose
Changing the World, One Map at a Time
Changing the World, One Map at a Time
Ushahidi Presentation for UN IASC
Ushahidi Presentation for UN IASC
The Ushahidi Story: Liberation Technology in Practice
The Ushahidi Story: Liberation Technology in Practice
Ushahidi Deployments
Ushahidi Deployments
Collaborative Crisis Mapping
Collaborative Crisis Mapping
Crisis Mapping Presentation at Fletcher, November 2009
Crisis Mapping Presentation at Fletcher, November 2009
Crisis Mapping Presentation for UN OCHA
Crisis Mapping Presentation for UN OCHA
How to Communicate Securely in Repressive Regimes
How to Communicate Securely in Repressive Regimes
Recently uploaded
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
ngoud9212
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
The Digital Insurer
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
BookNet Canada
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Lorenzo Miniero
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Miki Katsuragi
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Patryk Bandurski
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Dubai Multi Commodity Centre
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Alex Barbosa Coqueiro
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
null - The Open Security Community
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Mattias Andersson
costume and set research powerpoint presentation
costume and set research powerpoint presentation
phoebematthew05
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Pixlogix Infotech
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Scott Keck-Warren
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
UiPathCommunity
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
BookNet Canada
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Fwdays
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
Fwdays
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Addepto
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions
Recently uploaded
(20)
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
costume and set research powerpoint presentation
costume and set research powerpoint presentation
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Digi Active For Mobile Active 2008 Final
1.
Mobiles for Activism
& Advocacy Examples, Challenges & Opportunities Patrick Meier Director of Research DigiActive.org MobileActive08, Johannesburg
2.
Presentation Focuses on
Grassroots Digital Activists… Limited Resources Loose Networks Anonymity Individual Actors Security Low/No Budget
3.
Examples…
4.
1. Using Mobile
Phones to Organize and Coordinate Protests …
5.
Protests…
6.
Philippines ‘01 -
“Coup de Text” Protests…
7.
Philippines ‘01 -
“Coup de Text” Spain ‘04 - “The Night of SMS” Protests…
8.
Philippines ‘01 -
“Coup de Text” Spain ‘04 - “The Night of SMS” Pakistan ‘07 - “Flash Protests” Protests…
9.
2. Using Mobile
Phone Videos to Document Human Rights Abuses …
10.
Videos…
11.
Egypt - “Exposing
Torture” Videos…
12.
Tibet - “Media
Blackout?” Egypt - “Exposing Torture” Videos…
13.
Morocco ‘08 -
“Exposing Abuse” Egypt - “Exposing Torture” Tibet ’08 - “Media Blackout?” Videos…
14.
Using a Camera
Phone and YouTube to Expose Police Brutality in Morocco
15.
3. Using
Microblogging Tools to Bridge Between Mobile Phones and Internet Activism
16.
MicroBlogging…
17.
MicroBlogging… Egypt -
“Twitter out of Jail”
18.
Egypt - “Twitter
out of Jail” China - “Live-Twittered Arrest” MicroBlogging…
19.
Egypt - “Twitter
out of Jail” China - “Live-Twittered Arrest” MicroBlogging… Egypt - “Twitter to Safety”
20.
Issues to Consider…
21.
1. Network Structure
centralized decentralized distributed source: http://en.wikipedia.org/wiki/Social_networks
22.
2. Security
23.
Surveillance Content Filtering
Traceability Network Integrity 2. Security
24.
NonID Prepaid Cards
(Anonymity) “ Mobile” Mobile Activism (On the Move) Avoid Centralization (Distribute Risk) 2. Security
25.
3. Cost
26.
NGO Budget Premium
Rate Number Prepaid Cards Top-up to Subscribe? 3. Cost
27.
4. Dissemination
28.
Calling for Action
Using Relays Distributed Public Sphere Using Complementary Tools 4. Dissemination
29.
Thank You www.DigiActive.org
[email_address] Twitter.com/DigiActive iRevolution .wordpress.com my blog
Editor's Notes
Early warning systems HHI Ushahidi Interest in digital activism and Digiactive
Download now