References
- Appelbaum, J., Gibson, A., Grothoff, C., Müeller-Maghun, A., Poitras, L., Sontheimer, M., & Stöcker, C. (2014, 28 December). Prying eyes: inside the NSA’s war on internet security, Spiegel. Retrieved January 12, 2015, from http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html
- Asher_Wolf. (2015, 13 January). Hey, when Cameron bans Tor for everyone but spooks, where will his spies find a forest to hide in? Twitter post. Retrieved January 27, 2015, from https://twitter.com/Asher_Wolf/status/554911756967878656
- Barnard-Wills, D. (2012). Surveillance and identity: Discourse, subjectivity and the state. Farnham: Ashgate.
- boyd, d. (2011). Social network sites as networked publics: Affordances, dynamics, and implications. In Z. Papacharissi (Ed.), A networked self: Identity, community, and culture on social network sites (pp. 39–58). New York: Routledge.
- Burns, A., & Eltham, B. (2009). Twitter free Iran. Communications Policy & Research Forum 2009, 19–20 November, Sydney.
- Crawford, K. (2009, 24 June). Everything’s gone green, Unleashed. Retrieved October 2, 2015, from http://www.abc.net.au/unleashed/stories/s2606480.htm
- Dauvergne, P., & LeBaron, G. (2014). Protest Inc.: The corporatization of activism. Cambridge: Polity.
- Doctorow, C. (2009, 16 June). Cyberwar guide for Iran elections. Boing Boing. Retrieved August 28, 2014, from http://boingboing.net/2009/06/16/cyberwar-guide-for-i.html
- Earl, J., Hurwitz, H. M., Mesinas, A. M., Tolan, M., & Arlotti, A. (2013). This protest will be tweeted. Information, Communication & Society, 16(4), 459–478. doi: 10.1080/1369118X.2013.777756
- Finextra. (2014, 7 January). BofA offers to monitor Occupy protesters’ social media activity for police. Retrieved August 28, 2014, from http://www.finextra.com/news/fullstory.aspx?newsitemid=25581
- Foucault, M. (1978). The history of sexuality volume 1: An introduction. Translated from the French by Robert Hurley. New York, NY: Pantheon Books.
- Foucault, M. (1979). Discipline and punish: The birth of the prison. Translated from the French by Alan Sheridan. Harmondsworth: Penguin.
- Goldstein, J. (2007). The role of digital networked technologies in the Ukrainian Orange Revolution. The Berkman Center For Internet & Society, Research Publication No. 2007-14. Retrieved January 31, 2015, from http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Goldstein_Ukraine_2007.pdf
- Greenwald, G. (2013, 31 July). XKeyscore: NSA tool collects ‘nearly everything a user does on the internet’. The Guardian. Retrieved August 28, 2014, from http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data
- Greenwald, G. (2015, 6 January). With power of social media growing, police now monitoring and criminalizing online speech. The Intercept. Retrieved January 12, 2015, from https://firstlook.org/theintercept/2015/01/06/police-increasingly-monitoring-criminalizing-online-speech/
- Greenwald, G., & MacAskill, E. (2013, 7 June). NSA Prism program taps in to user data of Apple, Google and others. The Guardian. Retrieved June 17, 2013, from http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data
- Griffiths, E. (2014, 7 August). Data retention laws: Tony Abbott says Government ‘seeking metadata’, not targeting people’s browsing history. ABC News. Retrieved August 29, 2014, from http://www.abc.net.au/news/2014-08-06/security-laws-abbott-browsing-history-not-collected/5652364
- Haggerty, K. D., & Ericson, R. V. (2000). The surveillance assemblage. British Journal of Sociology, 51(4), 605–622. doi: 10.1080/00071310020015280
- Hampton, K., Rainie, L., Lu, W., Dwyer, M., Shin, I., & Purcell, K. (2014, August 26). Social media and the ‘spiral of silence’. Pew Research Internet Project. Retrieved August 27, 2014, from http://www.pewinternet.org/2014/08/26/social-media-and-the-spiral-of-silence/#fn-11806-1
- Hensby, A. (2016). Open networks and secret Facebook groups: Exploring cycle effects on activists’ social media use in the 2010/11 UK student protests. Social Movement Studies. Online first doi:10.1080/14742837.2016.1201421
- Hope, C. (2015, 12 January). Spies should be able to monitor all online messaging, says David Cameron. The Telegraph. Retrieved January 30, 2015, from http://www.telegraph.co.uk/technology/internet-security/11340621/Spies-should-be-able-to-monitor-all-online-messaging-says-David-Cameron.html
- Howard, P. N. (2011). The digital origins of dictatorship and democracy: Information technology and political Islam. New York, NY: Oxford University Press.
- Howard, P. N., & Hussain, M. M. (2013). Democracy’s fourth wave? Digital media and the Arab spring. New York, NY: Oxford University Press.
- Jarman, N. (2014). Preventative interventions and the right to protest. In M. Charret-Del Bove & F. Mourlon (Eds.), Pre-trial detention in 20th and 21st century common law and civil law systems (pp. 25–46). Newcastle upon Tyne: Cambridge Scholars.
- King, M. (2012, 3 February). Strange bedfellows: Stratfor, the Texas DPS … and Occupy Austin. The Austin Chronicle. Retrieved August 28, 2014, from http://www.austinchronicle.com/news/2012-02-03/strange-bedfellows/
- Kirkpatrick, D. (2010). The Facebook effect: The inside story of the company that is connecting the world. New York, NY: Simon & Schuster.
- LeClaire, J. (2014, 25 August). Are government spies tipping off Tor? Top Tech News. Retrieved January 27, 2015, from http://www.toptechnews.com/article/index.php?story_id=1220047IHQK6
- Lyon, D. (2001). Surveillance society: Monitoring everyday life. Buckingham: Open University Press.
- Lyon, D. (2015). Surveillance after snowden. Cambridge: Polity.
- Madden, M. (2014, 12 November). Public perceptions of privacy and security in the post-Snowden era. Pew Research Internet Project. Retrieved January 12, 2015, from http://www.pewinternet.org/2014/11/12/public-privacy-perceptions/
- Marichal, J. (2012). Facebook democracy: The architecture of disclosure and the threat to public life. Farnham: Ashgate.
- Moynihan, C. (2014, 22 May). Officials cast wide net in monitoring Occupy protests. The New York Times. Retrieved August 27, 2014, from http://www.nytimes.com/2014/05/23/us/officials-cast-wide-net-in-monitoring-occupy-protests.html?_r=0
- Papic, M., & Noonan, S. (2011, 3 February). Social media as a tool for protest. Stratfor Global Intelligence. Retrieved August 28, 2014, from http://www.stratfor.com/weekly/20110202-social-media-tool-protest
- Poniewozik, J. (2014, 14 August). It’s now guns vs. cameras in Ferguson. Time. Retrieved August 27, 2014, from http://time.com/3111133/ferguson-journalists-arrested-police-media/
- Rawlinson, K. (2012, 1 October). Activists warned to watch what they say as social media monitoring becomes ‘next big thing in law enforcement. The Independent. Retrieved January 26, 2015, from http://www.independent.co.uk/news/uk/crime/activists-warned-to-watch-what-they-say-as-social-media-monitoring-becomes-next-big-thing-in-law-enforcement-8191977.html
- Rose, J. (2014, 14 August). Ferguson shooting protests: In Oregon, it’s perfectly legal to film police (but audio can be tricky). The Oregonian. Retrieved August 27, 2014, from http://www.oregonlive.com/pacific-northwest-news/index.ssf/2014/08/ferguson_shooting_oregon_prote.html
- Rose, R. (2014, 13 August). Ferguson disgrace: Police fire on unarmed crowds, attack news trucks. Jezebel. Retrieved August 27, 2014, from http://jezebel.com/ferguson-disgrace-police-fire-on-unarmed-crowds-attac-1621352164
- Rosenblatt, S. (2014, 4 July). NSA likely targets anybody who’s ‘Tor-curious’. CNET. Retrieved August 27, 2014, from http://www.cnet.com/au/news/nsa-likely-targets-anybody-whos-Tor-curious/
- Schauer, F. (1978). Fear, risk and the first amendment: Unraveling the chilling effect. Boston University Law Review, 58(5), 685–732.
- Schneier, B. (2014, 15 December). Over 700 million people taking steps to avoid NSA surveillance. Schneier on Security. Retrieved January 12, 2015, from https://www.schneier.com/blog/archives/2014/12/over_700_millio.html
- Schneier, B. (2015, 13 January). David Cameron’s plan to ban encryption in the UK. Schneier on Security. Retrieved January 30, 2015, from https://www.schneier.com/blog/archives/2015/01/david_camerons_.html
- Shirky, C. (2009). How Twitter can make history. TED Talks, Retrieved October 2, 2015, from http://www.ted.com/talks/clay_shirky_how_cellphones_twitter_facebook_can_make_history.html
- Shirky, C. (2011). The political power of social media. Foreign Affairs, 90(1), 28–41.
- Spiegel Online. (2013, 29 December). Inside TAO: Documents reveal top NSA hacking unit. Retrieved August 27, 2014, from http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html
- Starr, A., Fernandez, L., & Scholl, C. (2011). Shutting down the streets: Political violence and social control in the global era. New York: New York University Press.
- Stevenson, A. (2012, 27 January). Anonymous’ Stratfor hack reveals anti-Occupy spy campaign. International Business Times. Retrieved August 28, 2014, from http://www.ibtimes.co.uk/anonymous-stratfor-hack-anti-occupy-spy-campaign-288763
- Stringer, J. (2015, 26 January). Please mind the datachasm. Open Democracy. Retrieved January 30, 2015, from https://www.opendemocracy.net/can-europe-make-it/jacob-stringer/please-mind-datachasm
- Timberg, C., & Nakashima, E. (2013, 7 December). FBI’s search for ‘Mo,’ suspect in bomb threats, highlights use of malware for surveillance. The Washington Post. Retrieved August 27, 2014, from http://www.washingtonpost.com/business/technology/fbis-search-for-mo-suspect-in-bomb-threats-highlights-use-of-malware-for-surveillance/2013/12/06/352ba174-5397-11e3-9e2c-e1d01116fd98_story_2.html
- Trottier, D. (2012). Social media as surveillance: Rethinking visibility in a converging world. Surry: Ashgate.
- Vaas, L. (2015, 14 January). David Cameron wants to ban encrypted apps like iMessage and Whatsapp. Naked Security. Retrieved January 30, 2015, from https://nakedsecurity.sophos.com/2015/01/14/david-cameron-wants-to-ban-encrypted-apps-like-imessage-and-whatsapp/
- Whitson, J. R., & Haggerty, K. D. (2008). Identity theft and the care of the virtual self. Economy and Society, 37(4), 572–594. doi: 10.1080/03085140802357950
- Wilson, J. (2014, 28 August). The internet is a cesspit of conflict, right? No – it’s an engine of consensus. The Guardian. Retrieved August 29, 2014, from http://www.theguardian.com/commentisfree/2014/aug/28/the-internet-is-a-cesspit-of-conflict-right-no-its-an-engine-of-consensus
- Yardley, W. (2011, 27 November). The branding of the Occupy movement. The New York Times. Retrieved August 29, 2014, from http://www.nytimes.com/2011/11/28/business/media/the-branding-of-the-occupy-movement.html?pagewanted=all&_r=0