Submit Search
Upload
Digi Active For Mobile Active 2008 Final
•
Download as PPT, PDF
•
8 likes
•
3,219 views
Patrick Meier
Follow
Presentation given by DigiActive.org on digital activism at MobileActive 2008 conference
Read less
Read more
Technology
Business
Report
Share
Report
Share
1 of 29
Download now
Recommended
Using AMITT and ATT&CK frameworks
Using AMITT and ATT&CK frameworks
Sara-Jayne Terp
Cybersecurity
Cybersecurity
Glenn McKnight
Digital Tech, New Media, and the Internet in Nonviolent Struggle
Digital Tech, New Media, and the Internet in Nonviolent Struggle
daryncambridge
Peace processes after the pandemic: What role for technology?
Peace processes after the pandemic: What role for technology?
Sanjana Hattotuwa
Mikie
Mikie
MJBULLOCK01
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Yudhistira Nugraha
Top influential women cybersecurity
Top influential women cybersecurity
Sentryo
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Benjamin Ang
Recommended
Using AMITT and ATT&CK frameworks
Using AMITT and ATT&CK frameworks
Sara-Jayne Terp
Cybersecurity
Cybersecurity
Glenn McKnight
Digital Tech, New Media, and the Internet in Nonviolent Struggle
Digital Tech, New Media, and the Internet in Nonviolent Struggle
daryncambridge
Peace processes after the pandemic: What role for technology?
Peace processes after the pandemic: What role for technology?
Sanjana Hattotuwa
Mikie
Mikie
MJBULLOCK01
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Yudhistira Nugraha
Top influential women cybersecurity
Top influential women cybersecurity
Sentryo
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Benjamin Ang
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
WAIHIGA K.MUTURI
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
ACAD1ITG
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
CRS4 Research Center in Sardinia
Opportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptx
VincentAcapen
Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... Globally
CTIC Technology Centre
ppt on child pornography and cyber crime
ppt on child pornography and cyber crime
008_Anuj
South Africa MXIT exploratory paper
South Africa MXIT exploratory paper
Akshay Sinha
Privacy, social networks and EU policy
Privacy, social networks and EU policy
Chris Marsden
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
Gol D Roger
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
REVULN
Computer Crime
Computer Crime
Farjana Akter
Internet Safety
Internet Safety
Charles Mok
South african mobile generation
South african mobile generation
Akshay Sinha
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
gkurtz
Impact Mobile Social Media Developing Countries2
Impact Mobile Social Media Developing Countries2
Inge de Waard
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
VivekanandaGN1
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
Chelsea Porter
The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)
Michael Edson
Cyber ethics
Cyber ethics
Preet Hanspal
Meier uav experts meeting 2014
Meier uav experts meeting 2014
Patrick Meier
Digital Humanitarians: Book Slides
Digital Humanitarians: Book Slides
Patrick Meier
More Related Content
Similar to Digi Active For Mobile Active 2008 Final
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
WAIHIGA K.MUTURI
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
ACAD1ITG
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
CRS4 Research Center in Sardinia
Opportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptx
VincentAcapen
Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... Globally
CTIC Technology Centre
ppt on child pornography and cyber crime
ppt on child pornography and cyber crime
008_Anuj
South Africa MXIT exploratory paper
South Africa MXIT exploratory paper
Akshay Sinha
Privacy, social networks and EU policy
Privacy, social networks and EU policy
Chris Marsden
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
Gol D Roger
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
REVULN
Computer Crime
Computer Crime
Farjana Akter
Internet Safety
Internet Safety
Charles Mok
South african mobile generation
South african mobile generation
Akshay Sinha
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
gkurtz
Impact Mobile Social Media Developing Countries2
Impact Mobile Social Media Developing Countries2
Inge de Waard
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
VivekanandaGN1
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
Chelsea Porter
The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)
Michael Edson
Cyber ethics
Cyber ethics
Preet Hanspal
Similar to Digi Active For Mobile Active 2008 Final
(20)
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Opportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptx
Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... Globally
ppt on child pornography and cyber crime
ppt on child pornography and cyber crime
South Africa MXIT exploratory paper
South Africa MXIT exploratory paper
Privacy, social networks and EU policy
Privacy, social networks and EU policy
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Computer Crime
Computer Crime
Internet Safety
Internet Safety
South african mobile generation
South african mobile generation
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
Impact Mobile Social Media Developing Countries2
Impact Mobile Social Media Developing Countries2
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)
Cyber ethics
Cyber ethics
More from Patrick Meier
Meier uav experts meeting 2014
Meier uav experts meeting 2014
Patrick Meier
Digital Humanitarians: Book Slides
Digital Humanitarians: Book Slides
Patrick Meier
Monitoring Humanitarian Crises in the Digital Age
Monitoring Humanitarian Crises in the Digital Age
Patrick Meier
Presentation to QCRI
Presentation to QCRI
Patrick Meier
Meier where20 2012
Meier where20 2012
Patrick Meier
Ushahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENA
Patrick Meier
Ushahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENA
Patrick Meier
Digital Mapping Technologies for 21st Century Democracy
Digital Mapping Technologies for 21st Century Democracy
Patrick Meier
Red Cross: Changing the World, One Map at a Time
Red Cross: Changing the World, One Map at a Time
Patrick Meier
Recampaign 2011: Changing the World, One Map at Time
Recampaign 2011: Changing the World, One Map at Time
Patrick Meier
Re:publica 2011: Changing the World, One Map at a Time
Re:publica 2011: Changing the World, One Map at a Time
Patrick Meier
Introduction to Live Crisis Mapping & Checkin's with a Purpose
Introduction to Live Crisis Mapping & Checkin's with a Purpose
Patrick Meier
Changing the World, One Map at a Time
Changing the World, One Map at a Time
Patrick Meier
Ushahidi Presentation for UN IASC
Ushahidi Presentation for UN IASC
Patrick Meier
The Ushahidi Story: Liberation Technology in Practice
The Ushahidi Story: Liberation Technology in Practice
Patrick Meier
Ushahidi Deployments
Ushahidi Deployments
Patrick Meier
Collaborative Crisis Mapping
Collaborative Crisis Mapping
Patrick Meier
Crisis Mapping Presentation at Fletcher, November 2009
Crisis Mapping Presentation at Fletcher, November 2009
Patrick Meier
Crisis Mapping Presentation for UN OCHA
Crisis Mapping Presentation for UN OCHA
Patrick Meier
How to Communicate Securely in Repressive Regimes
How to Communicate Securely in Repressive Regimes
Patrick Meier
More from Patrick Meier
(20)
Meier uav experts meeting 2014
Meier uav experts meeting 2014
Digital Humanitarians: Book Slides
Digital Humanitarians: Book Slides
Monitoring Humanitarian Crises in the Digital Age
Monitoring Humanitarian Crises in the Digital Age
Presentation to QCRI
Presentation to QCRI
Meier where20 2012
Meier where20 2012
Ushahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENA
Digital Mapping Technologies for 21st Century Democracy
Digital Mapping Technologies for 21st Century Democracy
Red Cross: Changing the World, One Map at a Time
Red Cross: Changing the World, One Map at a Time
Recampaign 2011: Changing the World, One Map at Time
Recampaign 2011: Changing the World, One Map at Time
Re:publica 2011: Changing the World, One Map at a Time
Re:publica 2011: Changing the World, One Map at a Time
Introduction to Live Crisis Mapping & Checkin's with a Purpose
Introduction to Live Crisis Mapping & Checkin's with a Purpose
Changing the World, One Map at a Time
Changing the World, One Map at a Time
Ushahidi Presentation for UN IASC
Ushahidi Presentation for UN IASC
The Ushahidi Story: Liberation Technology in Practice
The Ushahidi Story: Liberation Technology in Practice
Ushahidi Deployments
Ushahidi Deployments
Collaborative Crisis Mapping
Collaborative Crisis Mapping
Crisis Mapping Presentation at Fletcher, November 2009
Crisis Mapping Presentation at Fletcher, November 2009
Crisis Mapping Presentation for UN OCHA
Crisis Mapping Presentation for UN OCHA
How to Communicate Securely in Repressive Regimes
How to Communicate Securely in Repressive Regimes
Recently uploaded
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
LoriGlavin3
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Lorenzo Miniero
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
BkGupta21
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
Alfredo García Lavilla
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Fwdays
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
LoriGlavin3
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Florian Wilhelm
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
LoriGlavin3
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
gvaughan
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Commit University
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
Raghuram Pandurangan
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Fwdays
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
LoriGlavin3
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Stephanie Beckett
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
mohitsingh558521
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
LoriGlavin3
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Alan Dix
Recently uploaded
(20)
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Digi Active For Mobile Active 2008 Final
1.
Mobiles for Activism
& Advocacy Examples, Challenges & Opportunities Patrick Meier Director of Research DigiActive.org MobileActive08, Johannesburg
2.
Presentation Focuses on
Grassroots Digital Activists… Limited Resources Loose Networks Anonymity Individual Actors Security Low/No Budget
3.
Examples…
4.
1. Using Mobile
Phones to Organize and Coordinate Protests …
5.
Protests…
6.
Philippines ‘01 -
“Coup de Text” Protests…
7.
Philippines ‘01 -
“Coup de Text” Spain ‘04 - “The Night of SMS” Protests…
8.
Philippines ‘01 -
“Coup de Text” Spain ‘04 - “The Night of SMS” Pakistan ‘07 - “Flash Protests” Protests…
9.
2. Using Mobile
Phone Videos to Document Human Rights Abuses …
10.
Videos…
11.
Egypt - “Exposing
Torture” Videos…
12.
Tibet - “Media
Blackout?” Egypt - “Exposing Torture” Videos…
13.
Morocco ‘08 -
“Exposing Abuse” Egypt - “Exposing Torture” Tibet ’08 - “Media Blackout?” Videos…
14.
Using a Camera
Phone and YouTube to Expose Police Brutality in Morocco
15.
3. Using
Microblogging Tools to Bridge Between Mobile Phones and Internet Activism
16.
MicroBlogging…
17.
MicroBlogging… Egypt -
“Twitter out of Jail”
18.
Egypt - “Twitter
out of Jail” China - “Live-Twittered Arrest” MicroBlogging…
19.
Egypt - “Twitter
out of Jail” China - “Live-Twittered Arrest” MicroBlogging… Egypt - “Twitter to Safety”
20.
Issues to Consider…
21.
1. Network Structure
centralized decentralized distributed source: http://en.wikipedia.org/wiki/Social_networks
22.
2. Security
23.
Surveillance Content Filtering
Traceability Network Integrity 2. Security
24.
NonID Prepaid Cards
(Anonymity) “ Mobile” Mobile Activism (On the Move) Avoid Centralization (Distribute Risk) 2. Security
25.
3. Cost
26.
NGO Budget Premium
Rate Number Prepaid Cards Top-up to Subscribe? 3. Cost
27.
4. Dissemination
28.
Calling for Action
Using Relays Distributed Public Sphere Using Complementary Tools 4. Dissemination
29.
Thank You www.DigiActive.org
[email_address] Twitter.com/DigiActive iRevolution .wordpress.com my blog
Editor's Notes
Early warning systems HHI Ushahidi Interest in digital activism and Digiactive
Download now