Internet Freedom and Technology

Titlesort descending Author Abstract
'You Who?' - Trust in Web 2.0 Mark McElhaw This how-to guide explains how trust on the web is changing and what you need to do to improve the trustworthiness of your site.
10 Steps for Planning a Successful Webinar Chris Peters and Kami Griffiths This tip sheet by TechSoup explains how to organize and produce online seminars for non-profit organizations.
2010 Circumvention Tool Usage Report Hal Roberts, Ethan Zuckerman, Jillian York, Rob Faris, John Palfrey This paper evaluates the usage of blocking-resistant circumvention tools, simple web proxies, and VPN services and finds that overall usage of circumvention tools is still very small in proportion to...
2010 Report on Distributed Denial of Service (DDoS) Attacks Ethan Zuckerman, Hal Roberts, Ryan McGrady, Jillian York, John Palfrey This paper evaluates the impact of distributed denial of service (DDoS) attacks on independent media and human rights sites in nine countries, as well as the broader impact of DDoS worldwide, and...
6 Ideas For Those Needing Defensive Technology to Protect Free Speech from Authoritarian Regimes and 4 Ways the Rest of Us Can Help Peter Eckersley This guide by the Electronic Frontier Foundation provides six ideas for those needing defensive technology to protect free speech from authoritarian regimes and four ways the those outside repressive...
8 Steps For Building Community On Twitter: Tips For Membership Organizations Maddie Grant This is a quick eight-step guide of how to set up a Twitter account for your organization whether you work for a professional society, trade association or a cause-related nonprofit.
A Guide for Bloggers to Overcome Censorship Julien Pain, Dan Gillmor et al. This guide offers tips and advice for bloggers in repressive regime contexts. Bloggers can find information on how to secure their information and identity as well as how to circumvent censorship....
A Guide to New Media in Iran Center for International Media Assistance This report examines how social networking tools such as Twitter, Facebook, blogs, YouTube, Flickr, and Wikipedia have changed the way Iranian citizens communicate with each other as well as with the...
Access Denied: The Practice and Policy of Global Internet Filtering Ronald Deibert, John Palfrey, Rafal Rohozinski, Jonathan Zittrain et al. This comprehensive guide explores the way that countries around the world have sought to filter internet access to their citizens. It includes chapters on the politics andmechanisms of internet...
Access Point Configuration WirelessU This short guide explains how to configure wireless access points and routers.    
Al Jazeera Unplugged 101 This YouTube channel presents videos on how to use several forms of social media.
Anatomy of a Botnet Arbor Networks The Internet, a vast environment for both good and bad, has allowed a large criminal element to thrive. For evidence, look no further than the escalating growth of botnets and distributed denial of...
Basic Antenna Theory Ryszard Struzak This guide serves as an introduction to antennas for WiFi, touching concepts like directivity and gain. It mentions radiation patterns and other properties of antennas as well. A few examples of...
Bill and Melinda Gates: Why giving away our wealth has been the most satisfying thing we've done In 1993, Bill and Melinda Gates took a walk on the beach and made a big decision: to give their Microsoft wealth back to society. In conversation with Chris Anderson, the couple talks about their...
Bill Gates: Teachers need real feedback Until recently, many teachers only got one word of feedback a year: “satisfactory.” And with no feedback, no coaching, there’s just no way to improve. Bill Gates suggests that even great teachers can...
Blogging, Web Publishing, and Creative Activism with Network Security Mehdi Jami This manual is written by veteran journalist and media management expert Mehdi Jami. It improves the skills of civic minded Iranians already producing web content and builds the ability of activists...
Blogging: Reaching a Global Audience Easily and Affordably – from Anywhere Teresa Crawford Teresa Crawford, who set up the new HumaniNet blog, describes how a blog can enable field managers to share information seamlessly with decision makers and supporters, at almost no cost.
Camera Phone Images, Videos and Live Streaming: A Contemporary Visual Trend Gaby David In light of recent political turmoil around the world, this report investigates the increasing importance of camera phone images and videos in citizen journalism and reporting in areas of the world...
Clay Shirky: How the Internet will (one day) transform government The open-source world has learned to deal with a flood of new, oftentimes divergent, ideas using hosting services like GitHub — so why can’t governments? In this rousing talk Clay Shirky shows how...
Community, ICTs and Gender Programme for Women's Networking Support (PARM LAC-APC) This short guide explains ways to consider gender perspective in order to achieve fairness and equality of opportunities between women and men in the use and appropriation of technology, in...
Computer Crimes in Iran: Online repression in practice Article 19 This report presents a collection of narratives from Iranian civil society activists who have become victims of the Iranian regime’s sophisticated censorship apparatus and its suppression of digital...
Consent of the Networked Rebecca MacKinnon In “Consent of the Networked,” journalist, online censorship expert, and digital freedom activist Rebecca MacKinnon dispels the notion that the Internet and communications technology guarantee...
Creating a Social Media Strategy for Your NGOs Virtual Activism Digital Activism is broadly defined as "the practice of using digital technology for political and social change," and has proven itself an effective means of civil resistance in several contexts....
Ctrl + Alt + Delete: Iran's Response to the Internet IHRDC This IHRDC report documents Iran’s response to the rise of the Internet as a form of mass media. The report looks at new internet-related laws and the creation of multiple regulatory bodies, as well...
Cyber Army of Iran Behrouz Kamalian In this interview, Behrouz Kamalian discusses the new cyber army of Iran and the speculations about it. This resource is only available in Persian.
Digital Activism Through the Lens of Social Movement Theory Mary Joyce This article seeks to promote a new understanding of digital activism through the lens of social movement theory.
Digitally Networked Technology in Kenya’s 2007-2008 Post-Election Crisis Joshua Goldstein & Juliana Rotich This case study of the 2007-2008 election crisis in Kenya is part of a series produced by the Internet and Democracy Project at Harvard’s Berkman Center for Internet and Society. The project looks at...
Enemies of the Internet - Iran: Cyberspace Ayatollahs Reporters Without Borders This report provides details on the Iranian government’s efforts to block internet access within Iran. Content filtering, control over Internet service providers, the interception of communications,...
Enemies of the Internet 2012 Reporters Without Borders In its annual Internet Enemies index, Reporters Without Borders identifies 12 countries that are “enemies to the Internet” and 14 others that are “under surveillance.” For each country, including...
Enemies of the Internet 2013: Surveillance Reporters Without Borders The 2013 “Enemies of the Internet” report focuses on the subject of online surveillance. It takes a close look at the activities of five countries and five companies that are “leaders” in this domain...
Enemies of the Internet 2014: Entities at the Heart OF Censorship and Surveillance Reporters Without Borders The 2014 “Enemies of the Internet” report, which Reporters Without Borders publishes every year on World Day Against Cyber-Censorship (12 March), spotlights the government units and agencies that...
Everything You Need to Know About Web 2.0 TechSoup On this page, you'll find articles on a variety of Web 2.0 tools and technologies. These new tools include, but are by no means limited to, blogs, social networking applications, RSS, social...
Evolving Tactics of Internet Control and the Push for Greater Freedom Sanja Kelly and Sarah Cook, Freedom House This Freedom House article assesses repressive Internet policies worldwide and reports key trends in the tactics used by governments to control content online. Freedom House found a proliferation of...
Exploring the World of Wikis: Collaborative Web sites organize information, encourage participation Brian Satterfield This article by Brian Satterfield looks at what wikis are, how you can set one up, and how it might help your organization.
False Freedom: Online Censorship in the Middle East and North Africa Human Rights Watch This 144-page report documents online censorship and cases in which Internet users have been detained for their online activities in countries across the region, including Tunisia, Iran, Syria and...
Farsi Blogs Office of Studies and Media Development This research examines the approaches of Persian language blogs to political issues during Ahmadinejad’s presidency. This resource is only available in Persian.
Five Tips for Secure Wireless Web Surfing Brian Satterfield This short training article by TechSoup explains how to maintain online security when using a public wireless hotspot.
Forced Confessions: Targeting Iran's Cyber-Journalists Iran Human Rights Documentation Center This IHRDC publication is a compilation of witness statements by three Iranian bloggers and cyber-journalists who were arrested and detained by the Iranian government in 2004 and 2005. Two of the...
Free Speech Debate This website serves as a global forum of discussion about principles of freedom of expression on the internet. It presents controversial examples of regulation of the internet in order to stimulate...
Freedom on the Net 2009: A Global Assessment of Internet and Digital Media Freedom House This is the first in a new series of Freedom House reports, detailing the level of internet freedom in various countries, including Iran.
Freedom on the Net 2011: A Global Assessment of Internet and Digital Media Freedom House Over the past decade, the influence of the Internet as a means to spread information and challenge government-imposed media controls has steadily expanded. However, as more people use the internet to...
Freedom on the Net 2012: A Global Assessment of Internet and Digital Media Freedom House To illuminate the nature of evolving threats and identify areas of growing opportunity, Freedom House has conducted a comprehensive study of Internet freedom in 47 countries around the globe,...
Freedom on the Net 2013: A Global Assessment of Internet and Digital Media Freedom House Freedom on the Net 2013 is the fourth report in a series of comprehensive studies of internet freedom around the globe and covers developments in 60 countries that occurred between May 2012 and April...
Freedom on the Net 2014: Tightening the Net: Governments Expand Online Controls Freedom House Freedom on the Net 2014 – the fifth annual comprehensive study of internet freedom around the globe, covering developments in 65 countries that occurred between May 2013 and May 2014 –finds internet...
Freedom on the Net 2015: Privatizing Censorship, Eroding Privacy Freedom House Freedom on the Net 2015 finds internet freedom around the world in decline for a fifth consecutive year as more governments censored information of public interest while also expanding surveillance...
Global Network Initiative 2012 Annual Report Global Network Initiative (GNI) In its annual report, the Global Network Initiative (GNI) recounts its activities to advance freedom of expression and privacy rights worldwide. The GNI is a multi-stakeholder group of companies,...
Global Network Initiative 2013 Annual Report Global Network Initiative (GNI) The Global Network Initiative 2013 Annual Report charts the initiative’s progress protecting free expression and privacy in the ICT sector during the past year.
Guide to Anonymous Blogging with Tor Global Voices This step by step guide recognizes the importance of blogging and provides a secure method for citizens in repressive regimes to blog anonymously using Tor.
Guide to Twitter for Activism Andreas Jungherr The guide provides information on Twitter activism. It begins with an introduction to the platform and its terminology and then lays out five uses of Twitter for activists, each illustrated by a case...
Handbook for Bloggers and Cyber-Dissidents Reporters Without Borders The handbook has technical advice and tips about how to set up a good blog. The second part of the handbook is about ways to get around filtering systems.
How Much Power does your Laptop really need HumaniNet This article explains the ins and outs of laptop power consumption and describes a number of ways through which you can extend the battery life of your laptop computer.
How To Accelerate Your Internet: A practical guide to Bandwidth Management and Optimization using Open Source Software R. Flickenger This book provides practical information on how to gain the largest possible benefit from your connection to the Internet. By prioritizing certain kinds of network activity, reducing the impact of...
How to Access Blocked Website with Dynaweb Alliance for Youth Movements With repressive regimes becoming increasingly censorship-savvy, it comes ever more important for activists to utilize circumvention tools such as, Dynaweb, to access blocked websites.
How to be Safe on the Internet Shahrvandyar This article outlines major internet threats and the best ways that users can protect themselves from them. To see the article, click here. This resource is only available in Persian.
How to Choose the Right Circumvention Tool Alliance for Youth Movements Different repressive contexts present different security concerns to activists and this guide by the Alliance for Youth Movements examines different circumvention tools and their pros and cons.
How-to Booklet Front Line Defenders Security in a Box includes a how-to booklet, which addresses a number of important digital security issues. It also provides a collection of hands-on guides, each of which includes a particular...
Human Rights and Internet Governance Carl Bildt, Marietje Schaake, Alice Munyua et al. This is the the fourth edition of the MIND magazine, published by the Internet and Society Collaboratory. This volume focuses on the struggle for freedom of speech and human rights on the internet,...
Human Rights and Technology Sales: How Corporations Can Avoid Assisting Repressive Regimes By Cindy Cohn, Trevor Timm & Jillian C. York In this white paper, the Electronic Frontier Foundation calls on corporations, especially those that sell surveillance and filtering tools, to avoid assisting repressive regimes by increasing their...
Human Rights Council Resolution on the Promotion, Protection and Enjoyment of Human Rights on the Internet Human Rights Council In July 2012, Human Rights Council adopted resolution 20/8 on the promotion, protection and enjoyment of human rights on the Internet. The resolution affirms “that the same rights that people have...
Intermediary Censorship Ethan Zuckerman   Internet censorship occurs around the world through a multitude of methods. This article looks specifically at the emerging trend of intermediary censorship, where government directives mandate...
Internet Freedom in the 21st Century: Integrating New Technologies into Diplomacy and Development US Department of State This article outlines Secretary of State Hillary Clinton's 2010 foreign policy address on Internet freedom. It emphasizes a commitment to defending the freedom of expression and the free flow of...
Internet Freedom: A Foreign Policy Imperative in the Digital Age Richard Fontaine and Will Rogers, Center for a New American Security This Center for a New American Security report concludes that the United States needs a comprehensive Internet freedom strategy that aids efforts to use the Internet for advancing tolerance and free...
Internet Rights And Wrongs: Choices & Challenges In A Networked World Former U.S. Secretary of State Hillary Rodham Clinton In this 2011 speech, former U.S. Secretary of State Hillary Clinton discussed the tensions and complexities of Internet freedom, citing examples from Iran and Egypt. Clinton argued freedom on the...
Introduction to Facebook Activism Dan Schultz An introduction on how to use Facebook in your activism campaign. Includes real-life examples of Facebook activism campaigns from Egypt, Burma, and Morocco.
Introduction to Open Source Marco Zennaro This WirelessU training presentation covers an introduction to the concept of "Open", an introduction to Linux and its features as well as an insight on the topic of Open Source and Development.
Introduction to Wide-Area WiFi Wireless U This guide is a basic introduction to using WiFi for wide area networks. Link types (point-to-point, point-to-multipoint, etc.) as well as radio operating modes (master, managed, ad-hoc) are covered.
Juliana Rotich: Meet BRCK, Internet access built for Africa Tech communities are booming all over Africa, says Nairobi-based Juliana Rotich, cofounder of the open-source software Ushahidi. But it remains challenging to get and stay connected in a region with...
Keren Elazari: Hackers: the Internet's Immune System The beauty of hackers, says cybersecurity expert Keren Elazari, is that they force us to evolve and improve. Yes, some hackers are bad guys, but many are working to fight government corruption and...
Laura Snyder: The Philosophical Breakfast Club In 1812, four men at Cambridge University met for breakfast. What began as an impassioned meal grew into a new scientific revolution, in which these men — who called themselves “natural philosophers...
Leaping Over the Firewall: A Review of Censorship Circumvention Tools Cormac Callanan, Hein Dries-Ziekenheiner, Alberto Escudero-Pascual & Robert Guerra This document provides a comparison among different circumvention tools, both in terms of their technical merits, as well as how users of these tools describe their experience with them. The...
Legal Guide for Bloggers Electronic Frontier Foundation This guide includes a collection of blogger-specific FAQs addressing everything from fair use to defamation law to workplace whistle-blowing.
Liberation Technology Larry Diamond In this article Larry Diamond defines liberation technology as technology that  enables citizens to report news, expose wrongdoing, express opinions, mobilize protest, monitor elections, scrutinize...
Liberation Technology: Whither Internet Control Evgeny Morozov In this article, Evgeny Morozov discusses the promotion of "Internet freedom" and, by extension, opposing "Internet control", highlighting digital tactics of repression such as censorship and...
Liberation vs. Control: The Future of Cyberspace Ronald Deibert & Rafal Rohozinski Using Iran's Green Movement and Burma's Saffron Revolution as examples, this article looks at the ways in which human ingenuity combines with technology to further social change.
Mapping Digital Media: Citizen Journalism and the Internet Nadine Jurrat This paper delves in to all aspects of citizen journalism: its history, its various forms, its role in international news, and its significance as well as its risks. The paper calls for a clearer...
Mapping Iran’s Online Public: Politics and Culture in the Persian Blogosphere John Kelly and Bruce Etling This study uses computational social network mapping in over 60,000 Persian blogs to determine the most important topics in the Persian blogosphere. The study also looks into how the blogosphere has...
MMTK Wireless materials Association for Progressive Communications (APC) These materials cover topics ranging from antennas to wireless security, assuming a reasonable understanding of TCP/IP networking and experience as a network administrator.
Mobile Audio Recording in the Field (And How To Get a Clear Sound from the Streets) Mobile Active This technical how-to guide provides a step by step guide for citizen journalists to create sound recordings, including tips on setting up your environment, recording and publishing audio, and FAQs.
Mobile Surveillance – A Primer MobileActive The rise of citizen journalism and social media has many benefits but also poses serious risks for those who utilize mobile devices for social change. This report and how-to guide examines the...
NOI (New Organizing Institute) This website provides courses on leadership and social media free of charge.
Online Guide to Practical Privacy Tools Electronic Privacy Information Center This guide to online privacy tools covers secure email services, anonymizers, HTML filters, email and file privacy, secure instant messaging, encryption, file erasing programs, and more.
Power from the People: Assessing the New Online Participatory Tools for Your Organization Colin Delany In this guide, Colin Delany walks through the benefits and costs of common participatory tools like blogs, YouTube and MySpace and suggests which are likely to be useful for you.
Promoting Global Internet Freedom: Policy and Technology Patricia Moloney Figliola, Congressional Research Service This Congressional Research Service report provides detailed information about federal and private sector efforts in the United States to promote and support global Internet freedom, as well as a...
Protecting Your Security Online Access Now This guide was developed for citizens in the Middle East and North Africa who want to use technology safely to communicate, organize, and share data (news reports, information, media). This guide is...
Radio for Development WirelessU This short guide explores how radio technology can complement and accelerate human development.
Recommendations on the Right to Be Forgotten La Quadrature du Net and Reporters Without Borders The European Union Court of Justice ruling of 13 May 2014 on a case brought by Google Spain highlighted the problems for the protection of freedom of expression and the right to information posed by...
Remarks on Internet Freedom Former U.S. Secretary of State- Hillary Rodham Clinton In this 2010 speech, former U.S. Secretary of State Hillary Clinton reset U.S. policy on Internet freedom, emphasizing the vital need for governments, companies and technology providers to ensure...
Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression Frank La Rue In this 2011 submission to the Human Rights Council, the Special Rapporteur explores key trends and challenges to the right of all individuals to seek, receive and share information through the...
Screen Sharing Tools and Technology: A Mini-Guide Kolabora This article explains what screen sharing is, looks at typical features of screen sharing applications, and reviews some of the most popular screen sharing tools.
Security on the Internet Mehdi Yahya Nejad The article explains how to protect your security when opening PDF files. This resource is only available in Persian.
Security on the Internet, Notice to Passengers to Iran Mehdi Yahya Nejad This article offers advice and guidance for activists traveling to Iran. This resource is only available in Persian.
Security Threat Report 2014: Smarter, Shadier, Stealthier Malware Sophos Malware and related IT security threats have grown and matured. Malicious code authors are far more adept at camouflaging their work—using the dark parts of the Internet—creating new threats. The...
Sergey Brin: Why Google Glass? It's not a demo, more of a philosophical argument: Why did Sergey Brin and his team at Google want to build an eye-mounted camera/computer, codenamed Glass? Onstage at TED2013, Brin calls for a new...
SMS Quick Start Guide Changemakers & kiwanja.net This how-to guide examines the role of SMS messaging in creating social change. This resource describes how to run an SMS campaign and takes into consideration cost, audience, location and security...
Socialbrite This website provides visitors with a wealth of information on how to use technology in social activism.
Sophos Security Threat Report 2011 Sophos As peoples’ interaction with technology and social media evolved in 2010, cybercriminals developed new ways to prey on Internet users. This report identifies the threats, the way they work, and...
Tavaana’s Interview with Nima Rashedan In this interview, Nima Rashedan talks about internet filtering in Iran, domestic internet and new technologies. To view the interview, click here.
Technology Case Studies Tavaana This compilation of selected Tavaana case studies examines the use of technology in civic movements worldwide. These exclusive Tavaana case studies are designed to offer an Iranian audience concise...
The Role of Governments in Protecting and Furthering Internet Freedom Ministry of Foreign Affairs of the Netherlands This Dutch Ministry of Foreign Affairs report outlines how governments can foster the continued evolution of an Internet environment that supports human creativity, expression and knowledge sharing...
The Role of New Media in the 2009 Iranian Elections Laura Mottaz In presentations and discussions during a panel discussion held by the Center for International Media Assistance (CIMA), new media practitioners, Iran specialists, and interested observers attempted...
The Role of the Internet in Burma’s Saffron Revolution Mridul Chowdhury, Berkman Center for Internet and Society In 2007, activists flooded the Internet with images and videos of Burmese monks leading large, peaceful demonstrations against the government. The Burmese government responded by shutting down the...
The Virtual Activist 2.0 Net Action This is a comprehensive online training course on the use of technology for organizing and advocacy. It covers the use of email for outreach, organizing, and advocacy, other web-based advocacy and...
Using content to create connections among people Anecdote Shawn Callahan at Anecdote offers this white paper on using blogs as an inexpensive, relatively easy solution for strengthening communication in communities of practice. Callahan proposes blogging as...
Virtual Collaboration Dave Pollard This brief blog entry offers a table comparing the strengths and weaknesses of different online tools for collaboration.
What is social media? Antony Mayfield The term "social media" refers to a generation of online tools which promote participation, openness, conversation, community and connectedness. This guide from iCrossing introduces the concept of...
Wi-Fi for Dummies: Securing Network Access While on the Run Scott Granneman The article provides recommendations on the most secure software to use, as well as plug-ins to further enhance security when you’re chatting, emailing, or just browsing while at a wireless hotspot....
Wireless Networking in the Developing World Jane Butler, Ermanno Pietrosemoli, Marco Zennaro et al. This book provides a complete and comprehensive handbook for designing and building low cost networks with information ranging from basic radio physics and network design to equipment and...
Working Towards a Deeper Understanding of Digital Safety for Children and Young People in Developing Nations Berkman Center for Internet and Society This paper provides a tentative map of issues related to digital safety for youth in developing nations and give insights into the current state of the respective research based on an exploratory...
Subscribe to Internet Freedom and Technology

What Tavaana Students Have to Say

The best aspect of the course was the simplicity and the practical nature of the subjects we were taught. They were put together in a way that was accessible and easily comprehensible, so much so that it made my fear of studying the political sciences disappear and made me want to take part in courses like this again.
- Parham, Foundations of Democracy course graduate