Personal Democracy Plus Our premium content network. LEARN MORE You are not logged in. LOG IN NOW >

First POST: Disruptors

BY Micah L. Sifry | Tuesday, May 20 2014

How the NSA collects every phone call made in the Bahamas; why the FCC's proposed rulemaking on net neutrality is problematic; how Mayor Bill de Blasio plans to upgrade NYC's broadband; and much, much more. Read More

First POST: Vitam Et Bello

BY Micah L. Sifry | Wednesday, February 5 2014

The British government is reportedly using DDOS against Anonymous; the chair of the House Intelligence Committee seems to think professional journalism equals thievery; Syria's opposition activists are losing their Facebook pages; and much, much more. Read More

First POST: Taking Over

BY Micah L. Sifry | Tuesday, November 26 2013

How privacy concerns will fit into the next populist wave in US politics; Glenn Greenwald and Paul Carr spar; why the number of lobbyists in Washington is probably double what you think; and much, much more. Read More

WeGov

An Interview with Crypt0nymous On Operation Maryville

BY Carola Frediani | Wednesday, October 30 2013

Last week a crowd of a few hundred peoplegathered at the courthouse square in Maryville, Missouri, along with dozens of reporters and a few people adorned in Guy Fawkes "Anonymous" masks. The international spotlight on this tiny college town would have been unthinkable even ten days earlier. Demonstrators, both in the streets and online, were supporting a teenage girl whose alleged rapist walked out of court without a single charge. Those protesting believed prosecutors dropped the charges because the suspect, a 17-year-old football player, was the grandson of Rex Barnett, a former state legislator. Italian journalist Carola Frediani, the author of an in-depth book on Anonymous, conducted an interview with one of the Anons involved in the Maryville protest, Crypt0nymous, and we present an edited version of their conversation below. Read More

Split by SouthWest: My SXSW 2012 Diary

BY Micah L. Sifry | Thursday, March 15 2012

danah boyd and Alex Howard at SXSW 2012 (Photo by Micah L. Sifry)

PDM editorial director Micah L. Sifry spent last Friday through Monday at South by SouthWest Interactive, attending panels, keynotes and hanging out. Here's his report: SXSW is still a place where sessions packed with thousands of attendees cheer for the iconoclasts and the game-changers. It is also much more of a business networking conference than an internet futurists' playpen. In short, it has a split personality. Read More

PdFLeaks II: Jonsdottir, Shirky, Abrams, Hockenberry and Coleman, Jan. 24 at NYU

BY Micah L. Sifry | Tuesday, January 18 2011

Personal Democracy Forum, in partnership with New York University's Interactive Technology Program, is pleased to present our second symposium on WikiLeaks and Internet Freedom this coming Monday, January 24, from 6-8pm. ... Read More

Upcoming PdF Events in NYC

BY Daniel Teweles | Wednesday, January 12 2011

PdF is pleased to announce three upcoming events in New York City that we think you'll find continue to tap into the zeitgeist in an engaging and intellectually provocative way. PdF Presents: A Symposium on WikiLeaks and ... Read More

News Briefs

RSS Feed friday >

In China, Local Governments Play Whac-a-Mole With Taxi Apps

It seems these days that car-hailing apps exist only to give cities grief. In New York, car sharing start-ups like Lyft ignore labor, safety insurance laws and in China, the situation is no different except in one regard: taxi hailing apps in China are proliferating at a faster rate than in the U.S. In China, however, the taxi system is very much in its infancy and local Chinese governments are struggling to control the proliferation of new apps that flout the law. GO

thursday >

The Uncertain Future of India's Plan to Biometrically Identify Everyone

Since its launch in 2010, people in India have raised a number of questions and concerns about the Aadhaar card —formally known as Unique Identification (UID)— citing its effects on privacy rights, potential security flaws, and failures in functionality. GO

More