![Defend Dissent cover image Read more about Defend Dissent](https://open.umn.edu/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MjE4NywicHVyIjoiYmxvYl9pZCJ9fQ==--df3750147667e20d45b076cb5963483e4a54d2e5/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJyZXNpemUiOiI0OTB4MTAwMCJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--1d221d0e87311391d13a7728d03226e2fff3667a/Title-Page-Defend-Dissent-350x453.png)
Defend Dissent
Glencora Borradaile, Oregon State University
Copyright Year:
ISBN 13: 9781955101059
Publisher: Oregon State University
Language: English
Formats Available
Versions
Conditions of Use
Attribution-NonCommercial
CC BY-NC
Reviews
![whole star](/assets/common/stars/star-whole-6b1c8ac779f7926af95e3f0ef5c3cc4fbf11c9041897194ff1b09168d47e4a2a.webp)
![whole star](/assets/common/stars/star-whole-6b1c8ac779f7926af95e3f0ef5c3cc4fbf11c9041897194ff1b09168d47e4a2a.webp)
![whole star](/assets/common/stars/star-whole-6b1c8ac779f7926af95e3f0ef5c3cc4fbf11c9041897194ff1b09168d47e4a2a.webp)
![whole star](/assets/common/stars/star-whole-6b1c8ac779f7926af95e3f0ef5c3cc4fbf11c9041897194ff1b09168d47e4a2a.webp)
![empty star](/assets/common/stars/star-empty-fe32949e9c8b9c8d3e1f3bcee40b875f34bebc3d7cf7231a55064471c371839b.webp)
This is a remarkable text for various reasons. First, it is accessible and comprehensive. Second, it is available in English and Spanish. Third, while it is somewhat simplistic and potentially a liability, it is offset by making it accessible to... read more
This is a remarkable text for various reasons. First, it is accessible and comprehensive. Second, it is available in English and Spanish. Third, while it is somewhat simplistic and potentially a liability, it is offset by making it accessible to the uninitiated reader who needs to understand the importance of cyber reality from a basic to an intermediate level. The book provides both a historical and a substantive introduction and development of what is involved in cryptography (in this case, the importance of protecting information in the era of digital communication). On the way, it also gives the reader enough information to educate oneself on the origins, advances, challenges, and threats to privacy in cyber communication. The only caution is that, as the author explains, a particular point of view drives the narrative, which is concerned with the intrusion of the authorities/government into the actions of individuals and groups deemed dangerous to society (with a particular focus on the United States). The reader is therefore cautioned to take those elements of the discussion with some reservations as there is a definitive critical position that does not necessarily consider the imperatives of security that a state or society require in the information age. International relations, after all, is not only cooperative but also confrontational. There are continuous assaults by state and non-state actors on the information and critical infrastructure of states and societies that can and do cause mayhem, to say the least. The book would greatly benefit from an index. Without it, it is almost impossible to find information unless one uses the table of contents, and the links are very general. It is possible to easily generate an index, and this would be an essential task for a second version of the book.
The material presented is generally accurate regarding the data and documentation provided. A great deal of research has been undertaken, and it shows. The information is clearly presented, including several visual aids. There is little counterfactual information to be found, but that is not necessarily a liability as the documentation is adequate and appropriate for the scope and nature of the book. Again, the particular views presented by the author are not incorrect but require some critical perspective by the reader, who may wish to go further into a bibliography that may present alternative interpretations than those presented by the author
This book is accurate at the time of publication, and a historical analysis does it well. The rapidly changing world of information technology will likely allow for revisions, but the accessible nature of the structure and language of the materials will allow for such updates. As the author includes some practical advice at the end of the book, this section will likely be one that will be overtaken by events, even though the generic nature of the information provided is exceptionally well organized and presented.
One of the text's strengths is the precise language used in English and Spanish. It is accessible and easy to read the book. For some, this may appear too simplistic. Still, as stated in the first part of this review, the author most likely intended the material to be for something other than a highly trained and sophisticated audience, nor does she make that claim. Instead, it is a straightforward narrative that seeks to inform and educate and does so quite successfully. The author makes that clear in the introduction if a particular position is taken. Therefore, this perspective is relevant but not intrusive or trivializing of the rich information provided.
The author makes a great effort to be consistent throughout the book. In this regard, there is a successful presentation of the material so that the reader is taken through both the historical and substantive account without losing the thread of the discussion or being distracted when the material is introduced and incorporated into the discussion. Again, this is a part of the work's organizational and structural consistency, the choice to keep the discussion simple, and the complexity of the notes and references. The book is accessible to a wide range of readers, from the uninitiated to those with a developed degree of competence.
The author specifically notes that the text can be read in sections and does not have to be read sequentially. Each section is almost entirely independent in terms of the material presented. The author’s summary states, “This book can be read linearly, or you can pick and choose what you would like to learn about. Each chapter is prefaced with what you should read first (for background) and concludes with what you might want to read next.”
The book is very well organized and flows logically. The author does not intend it to be comprehensive but rather illustrative, and states, “I want the book to be short enough to read in a weekend.” (p. 2). In that, she is successful. Nevertheless, it is essential to consider that there may be some gaps or areas left for the reader to pursue on one’s own. Fortunately, the author provides an ample bibliography with live links. Where the reader has to be careful to go beyond the author’s bibliography to complement the author's choices, this is further developed in the first part of the review.
The book’s two versions, English and Spanish, are well-proofread and offer no significant issues regarding readability or access to links. Evidence shows that care was taken to ensure this formal aspect of the publication was carefully reviewed. The notes in the Spanish version are in English. This is understandable as sources to which they link are primarily in English.
As noted in all previous comments, both the English and Spanish versions are mostly grammatically correct and have been edited with some care. There is no problem with this aspect of the text. It is accessible, and this is an asset, especially considering that some of the issues discussed can sometimes become rather complex.
This question always raises difficulties because the expectation is that every text has to be inclusive, which may not be possible due to the nature of the subject matter. In this case, there are practical limitations due to how the author defines the topic. That in no way indicates a lack of respect for diversity, equity, and inclusion issues. In fact, the author is concerned with the repression of dissent. Nevertheless, the author makes efforts in this direction. While she focuses on the United States, she does use examples that emphasize the attention on groups that are usually considered outsiders, such as minorities or groups that are identified as opponents of the US government. There is a passing reference to South Africa (p. 9)
The title can be deceptive as it involves encryption and information technology related to dissent. The text would greatly benefit from an index. Without it, it is almost impossible to find information unless one uses the table of contents, and the links are very general. It is possible to generate an index quickly, which would be an essential task for a second version of the book.
Table of Contents
- Introduction: Why Digital Security?
- Part 1: An Introduction to Cryptography
- Part 2: Digital Suppression of Social Movements (in the US)
- Part 3: Defending Social Movements (in the US)
- Conclusion: Selecting Digital Security Tools
Ancillary Material
Submit ancillary resourceAbout the Book
Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material—from surveillance used against contemporary US protests to the African National Congress’s use of partially manual encryption in fighting apartheid in South Africa in the 80s.
This book can be read linearly, or you can pick and choose what you would like to learn about. Each chapter is prefaced with what you should read first (for background) and concludes with what you might want to read next.
About the Contributors
Author
Glencora Borradaile, Oregon State University