Filed under manual | Tags: · google, hacking, internet, research, search, security, technology, web
“The manual just released by the NSA following a FOIA request filed in April by MuckRock. The book is filled with advice for using search engines, the Internet Archive and other online tools.” (source)
Publisher Center for Digital Content of the National Security Agency, February 2007
Unclassified in May 2013
via Marcell Mars, via Wired
Filed under manual | Tags: · debt, economics, money
This manual—written by an anonymous collective of resistors, defaulters, and allies from Strike Debt and Occupy Wall Street—aims to provide specific tactics for understanding and fighting against the debt system. You’ll find detailed strategies and resources for dealing with credit card, medical, student, housing and municipal debt, tactics for navigating the pitfalls of personal bankruptcy, and information to help protect yourself from predatory lenders. Recognizing that individually we can only do so much to resist the system of debt, the manual also introduces ideas for those who have made the decision to take collective action.
Published in September 2012
Produced as a collaboration between Members of the Strike Debt assembly, Occupy Wall Street, Common Notions, Antumbra Design
Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License
Filed under manual | Tags: · art, institutional critique, organization, self-organization
Organisations do not often provide user’s manuals. This is the fifth draft user’s manual for Eastside Projects. It explains what the organisation is made of, how it was set up, who it is for, how it can be used and what it can offer. As would be the case when operating a machine or learning a subject, a manual may be necessary for the full use of of Eastside Projects. In this draft, the manual is structured as an alphabetical compendium of verbs. Each of these interconnected entries describes an activity engaged in by Eastside Projects as an organisation or a process occurring in the Eastside Projects building. Beneath each entry is a prompt to the reader to follow one of multiple narrative paths through the text. Readers unfamiliar with Eastside Projects should begin at Describing. Others suggested starting points Welcoming, Exhibiting, Narrating, Complicating, integrating.
Edited and designed by James Landon
with Gavin Wade, Celine Condorelli, Simon & Tom Bloor, Ruth Claxton
Published by Eastside Projects, Birmingham, UK
Filed under manual | Tags: · censorship, copyright, disobedience, hacktivism, internet, protest, spain
Este Manual de desobediencia a la Ley Sinde tiene el objetivo de demostrar la ineficacia radical de la Ley Sinde desde un punto de vista práctico. Los usuarios y webmasters encontrarán los métodos más útiles para sortear las barreras de la censura gubernamental.
Published in April 2011
Diagonal y Traficantes de Sueños edition
Creative License BY-SA 3.0 España
wertdeenlaces.net – Disobeying Sinde-Wert Law (Hacktivistas.net, February 2012) [English]
La primera denuncia de la ley Sinde-Wert en vivo y en directo (Hacktivistas.net, March 2012) [Spanish]
Artist and Hacktivists Sabotage Spanish Anti-Piracy Law (TorrentFreak.com, March 2012) [English]
Filed under manual | Tags: · data, encryption, law, privacy
Our lives are on our laptops – family photos, medical documents, banking information, details about what websites we visit, and so much more. Thanks to protections enshrined in the U.S. Constitution, the government generally can’t snoop through your laptop for no reason. But those privacy protections don’t safeguard travelers at the U.S. border, where the U.S. government can take an electronic device, search through all the files, and keep it for a while for further scrutiny – without any suspicion of wrongdoing whatsoever.
For doctors, lawyers, and many business professionals, these border searches can compromise the privacy of sensitive professional information, including trade secrets, attorney-client and doctor-patient communications, research and business strategies, some of which a traveler has legal and contractual obligations to protect. For the rest of us, searches that can reach our personal correspondence, health information, and financial records are reasonably viewed as an affront to privacy and dignity and inconsistent with the values of a free society.
Despite the lack of legal protections against the search itself, however, those concerned about the security and privacy of the information on their devices at the border can use technological measures in an effort to protect their data. They can also choose not to take private data across the border with them at all, and then use technical measures to retrieve it from abroad. As the explanations in this publication demonstrate, some of these technical measures are simple to implement, while others are complex and require significant technical skill.
by Seth Schoen, Marcia Hofmann, Rowan Reynolds
Published by Electronic Frontier Foundation, December 2011
Creative Commons Attribution 3.0 Unported License