[
    {
        "key": "MCBJN3KT",
        "version": 21226,
        "library": {
            "type": "group",
            "id": 225433,
            "name": "Digital Security and Awareness",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/digital_security_and_awareness",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/225433/items/MCBJN3KT",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/digital_security_and_awareness/items/MCBJN3KT",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 66073,
                "username": "gossett",
                "name": "Gabe Gossett",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/gossett",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Lipmanowicz",
            "parsedDate": "2014",
            "numChildren": 0
        },
        "data": {
            "key": "MCBJN3KT",
            "version": 21226,
            "itemType": "book",
            "title": "The surprising power of liberating structures: simple rules to unleash a culture of innovation",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Henri",
                    "lastName": "Lipmanowicz"
                },
                {
                    "creatorType": "contributor",
                    "firstName": "Keith",
                    "lastName": "McCandless"
                }
            ],
            "abstractNote": "Chapter 1. Small changes, big differences -- Chapter 2. Why microstructures matter : how invisible structures shape everything that gets done -- Chapter 3. Liberating structures for everyone : how easy it is for anyone to radically improve the way people work together -- Chapter 4. Liberating leadership : how leaders can avoid perpetuating the problems they complain about -- Chapter 5. Getting started : first steps -- Chapter 6. From first steps to strings -- Chapter 7. From strings to storyboards., \"Smart leaders know that they would greatly increase productivity and innovation if only they could get everyone fully engaged. So do professors, facilitators and all changemakers. The challenge is how. Liberating Structures are novel, practical and no-nonsense methods to help you accomplish this goal with groups of any size.\", Prepare to be surprised by how simple and easy they are for anyone to use. This book shows you how with detailed descriptions for putting them into practice plus tips on how to get started and traps to avoid. It takes the design and facilitation methods experts use and puts them within reach of anyone in any organization or initiative, from the frontline to the C-suite., Part One: The Hidden Structure of Engagement will ground you with the conceptual framework and vocabulary of Liberating Structures. It contrasts Liberating Structures with conventional methods and shows the benefits of using them to transform the way people collaborate, learn, and discover solutions together., Part Two: Getting Started and Beyond offers guidelines for experimenting in a wide range of applications from small group interactions to system-wide initiatives: meetings, projects, problem solving, change initiatives, product launches, strategy development, etc., Part Three: Stories from the Field illustrates the endless possibilities Liberating Structures offer with stories from users around the world, in all types of organizations - from healthcare to academic to military to global business enterprises, from judicial and legislative environments to R & D., Part Four: The Field Guide for Including, Engaging, and Unleashing Everyone describes how to use each of the 33 Liberating Structures with step-by-step explanations of what to do and what to expect., Includes bibliographical references (pages 317-320) and index.",
            "series": "",
            "seriesNumber": "",
            "volume": "",
            "numberOfVolumes": "",
            "edition": "",
            "date": "2014",
            "publisher": "Liberating Structures Press",
            "place": "Seattle, WA",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "numPages": "",
            "ISBN": "978-0-615-89337-2",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "The surprising power of liberating structures",
            "language": "eng",
            "libraryCatalog": "onesearch.library.wwu.edu",
            "callNumber": "HD58.7 .L566 2014",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Communication in organizations.",
                    "type": 1
                },
                {
                    "tag": "Organizational behavior.",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {
                "owl:sameAs": "http://zotero.org/groups/350648/items/G669KCZM"
            },
            "dateAdded": "2021-06-21T18:01:32Z",
            "dateModified": "2021-06-21T18:01:32Z"
        }
    },
    {
        "key": "EMDWAA8Z",
        "version": 21165,
        "library": {
            "type": "group",
            "id": 225433,
            "name": "Digital Security and Awareness",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/digital_security_and_awareness",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/225433/items/EMDWAA8Z",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/digital_security_and_awareness/items/EMDWAA8Z",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1641582,
                "username": "Rebecca Wilder",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rebecca_wilder",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Harwell",
            "parsedDate": "2019-12-24",
            "numChildren": 8
        },
        "data": {
            "key": "EMDWAA8Z",
            "version": 21165,
            "itemType": "newspaperArticle",
            "title": "Colleges are turning students’ phones into surveillance machines, tracking the locations of hundreds of thousands",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Drew",
                    "lastName": "Harwell"
                }
            ],
            "abstractNote": "The systems highlight how widespread surveillance has increasingly become a fact of life: Students “should have all the rights, responsibilities and privileges that an adult has. So why do we treat them so differently?”",
            "publicationTitle": "Washington Post",
            "publisher": "",
            "place": "",
            "date": "December 24, 2019",
            "volume": "",
            "issue": "",
            "edition": "",
            "section": "",
            "pages": "",
            "ISSN": "",
            "DOI": "",
            "citationKey": "",
            "url": "https://www.washingtonpost.com/technology/2019/12/24/colleges-are-turning-students-phones-into-surveillance-machines-tracking-locations-hundreds-thousands/",
            "accessDate": "2019-12-24T23:30:27Z",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "en",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Smartphones"
                },
                {
                    "tag": "beacons"
                },
                {
                    "tag": "behavioral shaping"
                },
                {
                    "tag": "coercion"
                },
                {
                    "tag": "consent"
                },
                {
                    "tag": "education"
                },
                {
                    "tag": "predictive analytics"
                },
                {
                    "tag": "privacy"
                },
                {
                    "tag": "retention"
                },
                {
                    "tag": "wifi"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2019-12-24T23:30:27Z",
            "dateModified": "2019-12-24T23:51:47Z"
        }
    },
    {
        "key": "DHBYLYDW",
        "version": 21164,
        "library": {
            "type": "group",
            "id": 225433,
            "name": "Digital Security and Awareness",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/digital_security_and_awareness",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/225433/items/DHBYLYDW",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/digital_security_and_awareness/items/DHBYLYDW",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/225433/items/EMDWAA8Z",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1641582,
                "username": "Rebecca Wilder",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rebecca_wilder",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "DHBYLYDW",
            "version": 21164,
            "parentItem": "EMDWAA8Z",
            "itemType": "note",
            "note": "<p>\"Several students said they didn’t mind a system designed to keep them honest. But one of them, a freshman athlete at Temple University who asked to speak anonymously to avoid team punishment, said the SpotterEDU app has become a nightmare, marking him absent when he’s sitting in class and marking him late when he’s on time.</p>\n<div>\n<p>He said he squandered several of his early lectures trying to convince the app he was present, toggling his settings in desperation as professors needled him to put the phone away. He then had to defend himself to campus staff members, who believed the data more than him.</p>\n<p>His teammates, he said, have suffered through their own technical headaches, but they’ve all been told they’ll get in trouble if they delete the app from their phones.</p>\n<p>[...] SpotterEDU’s terms of use say its data is not guaranteed to be “accurate, complete, correct, adequate, useful, timely, reliable or otherwise.”</p>\n</div>",
            "tags": [
                {
                    "tag": "TOS"
                },
                {
                    "tag": "consent"
                }
            ],
            "relations": {},
            "dateAdded": "2019-12-24T23:45:09Z",
            "dateModified": "2019-12-24T23:51:07Z"
        }
    },
    {
        "key": "64FN6V49",
        "version": 21163,
        "library": {
            "type": "group",
            "id": 225433,
            "name": "Digital Security and Awareness",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/digital_security_and_awareness",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/225433/items/64FN6V49",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/digital_security_and_awareness/items/64FN6V49",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/225433/items/EMDWAA8Z",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1641582,
                "username": "Rebecca Wilder",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rebecca_wilder",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "64FN6V49",
            "version": 21163,
            "parentItem": "EMDWAA8Z",
            "itemType": "note",
            "note": "<p>\"Chris Gilliard, a professor at Macomb Community College in Michigan who testified before Congress last month on privacy and digital rights, said he worries about the expanding reach of “surveillance creep”: If these systems work so well in college, administrators might argue, why not high school or anywhere else?</p>\n<div>\n<p>The systems, he added, are isolating for students who don’t own smartphones, coercive for students who do and unnecessary for professors, who can accomplish the task with the same pop quizzes and random checks they’ve used for decades. “You’re forcing students into a position,” he said: “Be tracked or be left out.”\"</p>\n</div>",
            "tags": [
                {
                    "tag": "surveillance creep"
                }
            ],
            "relations": {},
            "dateAdded": "2019-12-24T23:47:52Z",
            "dateModified": "2019-12-24T23:48:20Z"
        }
    },
    {
        "key": "L855Y2A8",
        "version": 21159,
        "library": {
            "type": "group",
            "id": 225433,
            "name": "Digital Security and Awareness",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/digital_security_and_awareness",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/225433/items/L855Y2A8",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/digital_security_and_awareness/items/L855Y2A8",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/225433/items/EMDWAA8Z",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1641582,
                "username": "Rebecca Wilder",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rebecca_wilder",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "L855Y2A8",
            "version": 21159,
            "parentItem": "EMDWAA8Z",
            "itemType": "note",
            "note": "<p>\"The Chicago-based company has experimented with ways to make the surveillance fun, gamifying students’ schedules with colorful Bitmoji or digital multiday streaks. But the real value may be for school officials, who Carter said can split students into groups, such as “students of color” or “out-of-state students,” for further review. When asked why an official would want to segregate out data on students of color, Carter said many colleges already do so, looking for patterns in academic retention and performance, adding that it “can provide important data for retention. Even the first few months of recorded data on class attendance and performance can help predict how likely a group of students is to” stay enrolled.\"</p>",
            "tags": [
                {
                    "tag": "gamification"
                },
                {
                    "tag": "predictive analytics"
                },
                {
                    "tag": "retention"
                }
            ],
            "relations": {},
            "dateAdded": "2019-12-24T23:40:48Z",
            "dateModified": "2019-12-24T23:41:22Z"
        }
    },
    {
        "key": "NBG8D3TG",
        "version": 21158,
        "library": {
            "type": "group",
            "id": 225433,
            "name": "Digital Security and Awareness",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/digital_security_and_awareness",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/225433/items/NBG8D3TG",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/digital_security_and_awareness/items/NBG8D3TG",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/225433/items/EMDWAA8Z",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1641582,
                "username": "Rebecca Wilder",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rebecca_wilder",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "NBG8D3TG",
            "version": 21158,
            "parentItem": "EMDWAA8Z",
            "itemType": "note",
            "note": "<p>\"School and company officials call location monitoring a powerful booster for student success: If they know more about where students are going, they argue, they can intervene before problems arise. But some schools go even further, using systems that calculate personalized “risk scores” based on factors such as whether the student is going to the library enough.\"</p>",
            "tags": [
                {
                    "tag": "risk assessment"
                },
                {
                    "tag": "risk scores"
                }
            ],
            "relations": {},
            "dateAdded": "2019-12-24T23:38:07Z",
            "dateModified": "2019-12-24T23:38:27Z"
        }
    },
    {
        "key": "YU7RMRPU",
        "version": 21157,
        "library": {
            "type": "group",
            "id": 225433,
            "name": "Digital Security and Awareness",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/digital_security_and_awareness",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/225433/items/YU7RMRPU",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/digital_security_and_awareness/items/YU7RMRPU",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/225433/items/EMDWAA8Z",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1641582,
                "username": "Rebecca Wilder",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rebecca_wilder",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "YU7RMRPU",
            "version": 21157,
            "parentItem": "EMDWAA8Z",
            "itemType": "note",
            "note": "<p>\"But some professors and education advocates argue that the systems represent a new low in intrusive technology, breaching students’ privacy on a massive scale. The tracking systems, they worry, will infantilize students in the very place where they’re expected to grow into adults, further training them to see surveillance as a normal part of living, whether they like it or not.\"</p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2019-12-24T23:34:34Z",
            "dateModified": "2019-12-24T23:37:46Z"
        }
    },
    {
        "key": "WKPQYLTX",
        "version": 21157,
        "library": {
            "type": "group",
            "id": 225433,
            "name": "Digital Security and Awareness",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/digital_security_and_awareness",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/225433/items/WKPQYLTX",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/digital_security_and_awareness/items/WKPQYLTX",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/225433/items/EMDWAA8Z",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1641582,
                "username": "Rebecca Wilder",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rebecca_wilder",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "WKPQYLTX",
            "version": 21157,
            "parentItem": "EMDWAA8Z",
            "itemType": "note",
            "note": "<p>\"One company that uses school WiFi networks to monitor movements says it gathers 6,000 location data points per student every day.\"</p>",
            "tags": [
                {
                    "tag": "scope of surveillance"
                }
            ],
            "relations": {},
            "dateAdded": "2019-12-24T23:37:15Z",
            "dateModified": "2019-12-24T23:37:38Z"
        }
    },
    {
        "key": "PU5WX9LJ",
        "version": 21151,
        "library": {
            "type": "group",
            "id": 225433,
            "name": "Digital Security and Awareness",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/digital_security_and_awareness",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/225433/items/PU5WX9LJ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/digital_security_and_awareness/items/PU5WX9LJ",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/225433/items/EMDWAA8Z",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1641582,
                "username": "Rebecca Wilder",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rebecca_wilder",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "PU5WX9LJ",
            "version": 21151,
            "parentItem": "EMDWAA8Z",
            "itemType": "note",
            "note": "<p>\"When Syracuse University freshmen walk into professor Jeff Rubin’s Introduction to Information Technologies class, seven small Bluetooth beacons hidden around the Grant Auditorium lecture hall connect with an app on their smartphones and boost their “attendance points.”</p>\n<p>And when they skip class? The<span> </span><a style=\"text-decoration: none; color: #1955a5; border-bottom: 1px solid #d5d5d5;\" rel=\"noopener\" href=\"https://spotteredu.com/\" target=\"_blank\">SpotterEDU</a><span> </span>app sees that, too, logging their absence into a campus database that tracks them over time and can sink their grade. It also alerts Rubin, who later contacts students to ask where they’ve been. His 340-person lecture has never been so full.</p>\n<p>“They want those points,” he said. “They know I’m watching and acting on it. So, behaviorally, they change.”\"</p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2019-12-24T23:32:37Z",
            "dateModified": "2019-12-24T23:33:24Z"
        }
    },
    {
        "key": "MSMUKAJS",
        "version": 21148,
        "library": {
            "type": "group",
            "id": 225433,
            "name": "Digital Security and Awareness",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/digital_security_and_awareness",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/225433/items/MSMUKAJS",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/digital_security_and_awareness/items/MSMUKAJS",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/225433/items/EMDWAA8Z",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1641582,
                "username": "Rebecca Wilder",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rebecca_wilder",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "MSMUKAJS",
            "version": 21148,
            "parentItem": "EMDWAA8Z",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Snapshot",
            "accessDate": "2019-12-24T23:30:31Z",
            "url": "https://www.washingtonpost.com/technology/2019/12/24/colleges-are-turning-students-phones-into-surveillance-machines-tracking-locations-hundreds-thousands/",
            "note": "",
            "contentType": "text/html",
            "charset": "utf-8",
            "filename": "colleges-are-turning-students-phones-into-surveillance-machines-tracking-locations-hundreds-tho.html",
            "md5": null,
            "mtime": null,
            "tags": [],
            "relations": {},
            "dateAdded": "2019-12-24T23:30:31Z",
            "dateModified": "2019-12-24T23:30:31Z"
        }
    },
    {
        "key": "DV8PHD46",
        "version": 21147,
        "library": {
            "type": "group",
            "id": 225433,
            "name": "Digital Security and Awareness",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/digital_security_and_awareness",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/225433/items/DV8PHD46",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/digital_security_and_awareness/items/DV8PHD46",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/225433/items/5NMYRJLI",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1641582,
                "username": "Rebecca Wilder",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rebecca_wilder",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "DV8PHD46",
            "version": 21147,
            "parentItem": "5NMYRJLI",
            "itemType": "note",
            "note": "<p>\"What had been regarded as waste material — “data exhaust” spewed into Google’s servers during the combustive action of Search — was quickly reimagined as a critical element in the transformation of Google’s search engine into a reflexive process of continuous learning and improvement.</p>\n<p>At that early stage of Google’s development, the feedback loops involved in improving its Search functions produced a balance of power: Search needed people to learn from, and people needed Search to learn from. This symbiosis enabled Google’s algorithms to learn and produce ever-more relevant and comprehensive search results. More queries meant more learning; more learning produced more relevance. More relevance meant more searches and more users.\"</p>",
            "tags": [
                {
                    "tag": "Search Engines"
                },
                {
                    "tag": "algorithmic regulation"
                },
                {
                    "tag": "data exhaust"
                },
                {
                    "tag": "query"
                },
                {
                    "tag": "relevance"
                }
            ],
            "relations": {},
            "dateAdded": "2019-09-05T18:50:52Z",
            "dateModified": "2019-09-05T18:52:07Z"
        }
    },
    {
        "key": "4CPBMZVJ",
        "version": 21144,
        "library": {
            "type": "group",
            "id": 225433,
            "name": "Digital Security and Awareness",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/digital_security_and_awareness",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/225433/items/4CPBMZVJ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/digital_security_and_awareness/items/4CPBMZVJ",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/225433/items/5NMYRJLI",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1641582,
                "username": "Rebecca Wilder",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rebecca_wilder",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "4CPBMZVJ",
            "version": 21144,
            "parentItem": "5NMYRJLI",
            "itemType": "note",
            "note": "<p>\"Thanks to this wide embrace, Google successfully imposed computer mediation on broad new domains of human behavior as people searched online and engaged with the web through a growing roster of Google services. As these new activities were informated for the first time, they produced wholly new data resources. For example, in addition to key words, each Google search query produces a wake of collateral data such as the number and pattern of search terms, how a query is phrased, spelling, punctuation, dwell times, click patterns, and location.\"</p>",
            "tags": [
                {
                    "tag": "query"
                }
            ],
            "relations": {},
            "dateAdded": "2019-09-05T17:46:13Z",
            "dateModified": "2019-09-05T17:46:20Z"
        }
    },
    {
        "key": "5NMYRJLI",
        "version": 21143,
        "library": {
            "type": "group",
            "id": 225433,
            "name": "Digital Security and Awareness",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/digital_security_and_awareness",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/225433/items/5NMYRJLI",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/digital_security_and_awareness/items/5NMYRJLI",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1641582,
                "username": "Rebecca Wilder",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rebecca_wilder",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Zuboff",
            "parsedDate": "2019-09-05",
            "numChildren": 8
        },
        "data": {
            "key": "5NMYRJLI",
            "version": 21143,
            "itemType": "blogPost",
            "title": "How Google Discovered the Value of Surveillance",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Shoshana",
                    "lastName": "Zuboff"
                }
            ],
            "abstractNote": "In 2002, still reeling from the dot-com crash, Google realized they’d been harvesting a very valuable raw material — your behavior.",
            "blogTitle": "Longreads",
            "websiteType": "",
            "date": "2019-09-05T10:00:28+00:00",
            "DOI": "",
            "citationKey": "",
            "url": "https://longreads.com/2019/09/05/how-google-discovered-the-value-of-surveillance/",
            "accessDate": "2019-09-05T17:28:43Z",
            "ISSN": "",
            "shortTitle": "",
            "language": "en",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "AI"
                },
                {
                    "tag": "Alphabet"
                },
                {
                    "tag": "Google"
                },
                {
                    "tag": "Nest"
                },
                {
                    "tag": "Smart homes"
                },
                {
                    "tag": "big data"
                },
                {
                    "tag": "data extraction"
                },
                {
                    "tag": "personal information"
                },
                {
                    "tag": "personalization"
                },
                {
                    "tag": "privacy"
                },
                {
                    "tag": "query"
                },
                {
                    "tag": "scope of surveillance"
                },
                {
                    "tag": "surveillance"
                },
                {
                    "tag": "surveillance capitalism"
                },
                {
                    "tag": "trust"
                },
                {
                    "tag": "wifi"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2019-09-05T17:28:43Z",
            "dateModified": "2019-09-05T17:45:57Z"
        }
    },
    {
        "key": "XYRZIV9I",
        "version": 21141,
        "library": {
            "type": "group",
            "id": 225433,
            "name": "Digital Security and Awareness",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/digital_security_and_awareness",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/225433/items/XYRZIV9I",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/digital_security_and_awareness/items/XYRZIV9I",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/225433/items/5NMYRJLI",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1641582,
                "username": "Rebecca Wilder",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rebecca_wilder",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "XYRZIV9I",
            "version": 21141,
            "parentItem": "5NMYRJLI",
            "itemType": "note",
            "note": "<p>\"Although the saying tells us “If it’s free, then you are the product,” that is also incorrect. We are the sources of surveillance capitalism’s crucial surplus: the objects of a technologically advanced and increasingly inescapable raw-material-extraction operation. Surveillance capitalism’s actual customers are the enterprises that trade in its markets for future behavior.\"</p>",
            "tags": [
                {
                    "tag": "predictive analytics"
                }
            ],
            "relations": {},
            "dateAdded": "2019-09-05T17:36:15Z",
            "dateModified": "2019-09-05T17:36:26Z"
        }
    },
    {
        "key": "9U59Z5PA",
        "version": 21140,
        "library": {
            "type": "group",
            "id": 225433,
            "name": "Digital Security and Awareness",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/digital_security_and_awareness",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/225433/items/9U59Z5PA",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/digital_security_and_awareness/items/9U59Z5PA",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/225433/items/5NMYRJLI",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1641582,
                "username": "Rebecca Wilder",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rebecca_wilder",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "9U59Z5PA",
            "version": 21140,
            "parentItem": "5NMYRJLI",
            "itemType": "note",
            "note": "<p>\"Google also benefited from historical events when a national security apparatus galvanized by the attacks of 9/11 was inclined to nurture, mimic, shelter, and appropriate surveillance capitalism’s emergent capabilities for the sake of total knowledge and its promise of certainty.\"</p>",
            "tags": [
                {
                    "tag": "national security"
                }
            ],
            "relations": {},
            "dateAdded": "2019-09-05T17:34:45Z",
            "dateModified": "2019-09-05T17:34:55Z"
        }
    },
    {
        "key": "R9KMHE95",
        "version": 21139,
        "library": {
            "type": "group",
            "id": 225433,
            "name": "Digital Security and Awareness",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/digital_security_and_awareness",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/225433/items/R9KMHE95",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/digital_security_and_awareness/items/R9KMHE95",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/225433/items/5NMYRJLI",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1641582,
                "username": "Rebecca Wilder",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rebecca_wilder",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "R9KMHE95",
            "version": 21139,
            "parentItem": "5NMYRJLI",
            "itemType": "note",
            "note": "<p>\"Digital connection is now a means to others’ commercial ends. At its core, surveillance capitalism is parasitic and self-referential. It revives Karl Marx’s old image of capitalism as a vampire that feeds on labor, but with an unexpected turn. Instead of labor, surveillance capitalism feeds on every aspect of every human’s experience. Google invented and perfected surveillance capitalism in much the same way that a century ago General Motors invented and perfected managerial capitalism. Google was the pioneer of surveillance capitalism in thought and practice, the deep pocket for research and development, and the trailblazer in experimentation and implementation, but it is no longer the only actor on this path. Surveillance capitalism quickly spread to Facebook and later to Microsoft. Evidence suggests that Amazon has veered in this direction, and it is a constant challenge to Apple, both as an external threat and as a source of internal debate and conflict.\"</p>",
            "tags": [
                {
                    "tag": "Amazon"
                },
                {
                    "tag": "Apple"
                },
                {
                    "tag": "Facebook"
                },
                {
                    "tag": "surveillance capitalism"
                }
            ],
            "relations": {},
            "dateAdded": "2019-09-05T17:33:43Z",
            "dateModified": "2019-09-05T17:34:16Z"
        }
    },
    {
        "key": "YJVD5HY7",
        "version": 21138,
        "library": {
            "type": "group",
            "id": 225433,
            "name": "Digital Security and Awareness",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/digital_security_and_awareness",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/225433/items/YJVD5HY7",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/digital_security_and_awareness/items/YJVD5HY7",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/225433/items/5NMYRJLI",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1641582,
                "username": "Rebecca Wilder",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rebecca_wilder",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "YJVD5HY7",
            "version": 21138,
            "parentItem": "5NMYRJLI",
            "itemType": "note",
            "note": "<p>\"By 2018, the assumptions of the Aware Home were gone with the wind. Where did they go? What was that wind? The Aware Home, like many other visionary projects, imagined a digital future that empowers individuals to lead more-effective lives. What is most critical is that in the year 2000 this vision naturally assumed an unwavering commitment to the privacy of individual experience. Should an individual choose to render her experience digitally, then she would exercise exclusive rights to the knowledge garnered from such data, as well as exclusive rights to decide how such knowledge might be put to use. Today these rights to privacy, knowledge, and application have been usurped by a bold market venture powered by unilateral claims to others’ experience and the knowledge that flows from it. What does this sea change mean for us, for our children, for our democracies, and for the very possibility of a human future in a digital world? It is the darkening of the digital dream into a voracious and utterly novel commercial project that I call <em>surveillance capitalism</em>.\"</p>",
            "tags": [
                {
                    "tag": "privacy design"
                },
                {
                    "tag": "surveillance capitalism"
                }
            ],
            "relations": {},
            "dateAdded": "2019-09-05T17:31:26Z",
            "dateModified": "2019-09-05T17:31:41Z"
        }
    },
    {
        "key": "ARDIKAN3",
        "version": 21137,
        "library": {
            "type": "group",
            "id": 225433,
            "name": "Digital Security and Awareness",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/digital_security_and_awareness",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/225433/items/ARDIKAN3",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/digital_security_and_awareness/items/ARDIKAN3",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/225433/items/5NMYRJLI",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1641582,
                "username": "Rebecca Wilder",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rebecca_wilder",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "ARDIKAN3",
            "version": 21137,
            "parentItem": "5NMYRJLI",
            "itemType": "note",
            "note": "<p>\"Should the customer refuse to agree to Nest’s stipulations, the terms of service indicate that the functionality and security of the thermostat will be deeply compromised, no longer supported by the necessary updates meant to ensure its reliability and safety. The consequences can range from frozen pipes to failed smoke alarms to an easily hacked internal home system.\"</p>",
            "tags": [
                {
                    "tag": "TOS"
                }
            ],
            "relations": {},
            "dateAdded": "2019-09-05T17:31:00Z",
            "dateModified": "2019-09-05T17:31:07Z"
        }
    },
    {
        "key": "WPS483B2",
        "version": 21134,
        "library": {
            "type": "group",
            "id": 225433,
            "name": "Digital Security and Awareness",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/digital_security_and_awareness",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/225433/items/WPS483B2",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/digital_security_and_awareness/items/WPS483B2",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/225433/items/5NMYRJLI",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1641582,
                "username": "Rebecca Wilder",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rebecca_wilder",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "WPS483B2",
            "version": 21134,
            "parentItem": "5NMYRJLI",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Snapshot",
            "accessDate": "2019-09-05T17:28:47Z",
            "url": "https://longreads.com/2019/09/05/how-google-discovered-the-value-of-surveillance/",
            "note": "",
            "contentType": "text/html",
            "charset": "utf-8",
            "filename": "how-google-discovered-the-value-of-surveillance.html",
            "md5": null,
            "mtime": null,
            "tags": [],
            "relations": {},
            "dateAdded": "2019-09-05T17:28:47Z",
            "dateModified": "2019-09-05T17:28:47Z"
        }
    },
    {
        "key": "36TWB6NM",
        "version": 21133,
        "library": {
            "type": "group",
            "id": 225433,
            "name": "Digital Security and Awareness",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/digital_security_and_awareness",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/225433/items/36TWB6NM",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/digital_security_and_awareness/items/36TWB6NM",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1641582,
                "username": "Rebecca Wilder",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rebecca_wilder",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Hern",
            "parsedDate": "2019-08-30",
            "numChildren": 3
        },
        "data": {
            "key": "36TWB6NM",
            "version": 21133,
            "itemType": "newspaperArticle",
            "title": "Google says hackers have put ‘monitoring implants’ in iPhones for years",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Alex",
                    "lastName": "Hern"
                }
            ],
            "abstractNote": "Visiting hacked sites was enough for server to gather users’ images and contacts",
            "publicationTitle": "The Guardian",
            "publisher": "",
            "place": "",
            "date": "2019-08-30T07:03:07.000Z",
            "volume": "",
            "issue": "",
            "edition": "",
            "section": "Technology",
            "pages": "",
            "ISSN": "0261-3077",
            "DOI": "",
            "citationKey": "",
            "url": "https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says",
            "accessDate": "2019-08-31T02:50:24Z",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "en-GB",
            "libraryCatalog": "www.theguardian.com",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Alphabet",
                    "type": 1
                },
                {
                    "tag": "Apple",
                    "type": 1
                },
                {
                    "tag": "Google",
                    "type": 1
                },
                {
                    "tag": "Internet",
                    "type": 1
                },
                {
                    "tag": "Smartphones",
                    "type": 1
                },
                {
                    "tag": "hackers"
                },
                {
                    "tag": "iPhone",
                    "type": 1
                },
                {
                    "tag": "malware"
                },
                {
                    "tag": "scope of surveillance"
                },
                {
                    "tag": "telecoms"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2019-08-31T02:50:24Z",
            "dateModified": "2019-08-31T02:53:13Z"
        }
    },
    {
        "key": "9EXG7X9F",
        "version": 21133,
        "library": {
            "type": "group",
            "id": 225433,
            "name": "Digital Security and Awareness",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/digital_security_and_awareness",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/225433/items/9EXG7X9F",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/digital_security_and_awareness/items/9EXG7X9F",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/225433/items/36TWB6NM",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1641582,
                "username": "Rebecca Wilder",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rebecca_wilder",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "9EXG7X9F",
            "version": 21133,
            "parentItem": "36TWB6NM",
            "itemType": "note",
            "note": "<p>\"The operation, which lasted two and a half years, used a small collection of hacked websites to deliver malware on to the iPhones of visitors. Users were compromised simply by visiting the sites: no interaction was necessary, and some of the methods used by the hackers affected even fully up-to-date phones.</p>\n<p>Once hacked, the user’s deepest secrets were exposed to the attackers. Their location was uploaded every minute; their device’s keychain, containing all their passwords, was uploaded, as were their chat histories on popular apps including WhatsApp, Telegram and iMessage, their address book, and their Gmail database.\"</p>",
            "tags": [
                {
                    "tag": "Gmail"
                },
                {
                    "tag": "Telegram"
                },
                {
                    "tag": "WhatsApp"
                },
                {
                    "tag": "chat"
                },
                {
                    "tag": "keychain"
                },
                {
                    "tag": "passwords"
                }
            ],
            "relations": {},
            "dateAdded": "2019-08-31T02:52:16Z",
            "dateModified": "2019-08-31T02:53:01Z"
        }
    },
    {
        "key": "STZSUYAQ",
        "version": 21132,
        "library": {
            "type": "group",
            "id": 225433,
            "name": "Digital Security and Awareness",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/digital_security_and_awareness",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/225433/items/STZSUYAQ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/digital_security_and_awareness/items/STZSUYAQ",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/225433/items/36TWB6NM",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1641582,
                "username": "Rebecca Wilder",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rebecca_wilder",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "STZSUYAQ",
            "version": 21132,
            "parentItem": "36TWB6NM",
            "itemType": "note",
            "note": "<p>\"“All that users can do is be conscious of the fact that mass exploitation still exists and behave accordingly; treating their mobile devices as both integral to their modern lives, yet also as devices which when compromised, can upload their every action into a database to potentially be used against them.”\"</p>",
            "tags": [
                {
                    "tag": "mass exploitation"
                }
            ],
            "relations": {},
            "dateAdded": "2019-08-31T02:51:52Z",
            "dateModified": "2019-08-31T02:52:00Z"
        }
    },
    {
        "key": "NTW9QUJY",
        "version": 21128,
        "library": {
            "type": "group",
            "id": 225433,
            "name": "Digital Security and Awareness",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/digital_security_and_awareness",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/225433/items/NTW9QUJY",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/digital_security_and_awareness/items/NTW9QUJY",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/225433/items/36TWB6NM",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1641582,
                "username": "Rebecca Wilder",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rebecca_wilder",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "NTW9QUJY",
            "version": 21128,
            "parentItem": "36TWB6NM",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Snapshot",
            "accessDate": "2019-08-31T02:50:27Z",
            "url": "https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says",
            "note": "",
            "contentType": "text/html",
            "charset": "utf-8",
            "filename": "hackers-monitoring-implants-iphones-google-says.html",
            "md5": null,
            "mtime": null,
            "tags": [],
            "relations": {},
            "dateAdded": "2019-08-31T02:50:27Z",
            "dateModified": "2019-08-31T02:50:27Z"
        }
    },
    {
        "key": "8MGUKBPZ",
        "version": 21127,
        "library": {
            "type": "group",
            "id": 225433,
            "name": "Digital Security and Awareness",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/digital_security_and_awareness",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/225433/items/8MGUKBPZ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/digital_security_and_awareness/items/8MGUKBPZ",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/225433/items/X26SM6FJ",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1641582,
                "username": "Rebecca Wilder",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rebecca_wilder",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "8MGUKBPZ",
            "version": 21127,
            "parentItem": "X26SM6FJ",
            "itemType": "note",
            "note": "<p>\"An email distribution list associated with the taskforce included addressees in the FBI, the Bureau of Land Management, the Department of Justice (DoJ), the National Forest Service (NFS), Oregon state police (OSP), and various Oregon municipal police and sheriffs departments. But some of its recipients are outside any government agency, most notably Mark Pfeifle, the CEO of the political consultancy <a class=\"u-underline\" href=\"http://otrstrategies.com/\" data-link-name=\"in body link\">Off The Record Strategies</a>.</p>\n<p>Pfeifle was previously <a class=\"u-underline\" href=\"https://www.muckrock.com/news/archives/2017/jul/20/DAPL-pr-iraq-war/\" data-link-name=\"in body link\">a Bush </a><a class=\"u-underline\" href=\"https://www.muckrock.com/news/archives/2017/jul/20/DAPL-pr-iraq-war/\" data-link-name=\"in body link\">administration PR adviser on national security</a>. More recently, Pfeifle worked with law enforcement on a counter-information operation against the Dakota Access Pipeline protesters.\"</p>",
            "tags": [
                {
                    "tag": "BLM"
                },
                {
                    "tag": "DOJ"
                },
                {
                    "tag": "NFS"
                }
            ],
            "relations": {},
            "dateAdded": "2019-08-09T01:38:11Z",
            "dateModified": "2019-08-09T01:41:22Z"
        }
    },
    {
        "key": "WNZCMDI5",
        "version": 21127,
        "library": {
            "type": "group",
            "id": 225433,
            "name": "Digital Security and Awareness",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/digital_security_and_awareness",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/225433/items/WNZCMDI5",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/digital_security_and_awareness/items/WNZCMDI5",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/225433/items/X26SM6FJ",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1641582,
                "username": "Rebecca Wilder",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rebecca_wilder",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "WNZCMDI5",
            "version": 21127,
            "parentItem": "X26SM6FJ",
            "itemType": "note",
            "note": "<p>\"Emails circulated on the SWOJTF email list include activists’ social media posts, emails and rally announcements.\"</p>",
            "tags": [
                {
                    "tag": "Email"
                },
                {
                    "tag": "scope of surveillance"
                },
                {
                    "tag": "social media monitoring"
                }
            ],
            "relations": {},
            "dateAdded": "2019-08-09T01:40:44Z",
            "dateModified": "2019-08-09T01:41:04Z"
        }
    }
]