Article proposes a critique of a policy or practice with specific action proposals or suggestions.
Article follows conventions of academic research article e.g. position in literature, cited sources, and claimed contribution.
Article is based on developments that have not yet occurred.
Article is based on formal logic or mathematical technique.
Language quality: 2/2*
Standard of English expression in article is excellent.
Scope of debate: 0/2
Article addresses an issue which is widely known and debated.
Most related sources are mentioned in article [this is an invitation to careful selection rather than a demonstration of prowess in citation collection i.e. apt and representative choices made in source citations].
Logical flow: 2/2*
Ideas are well organised in article.
The argument presented in article is new.
Review impact: 2/2
The article has been significantly changed as a result of the review process.
Reviewers indicate their appreciation of the article in the form of a 50 word statement.
This article extends existing literature on Operation Vula, placing it in the context of phone phreaking and other kinds of hacking in the early to mid 1980s. New interview material provides new details about this intriguing episode in the anti-apartheid movement.
The paper provide a precious insight into how a militant anti-apartheid organisation, African National Congress (ANC) and their Encrypted Communication System that skilfully used personal computers, digital recorders and phones to organize the struggle. It shifts our attention from normative histories of hacking to its relations to anti-racist social struggles. A perspective that not only historically relevant but necessary to think and organize in our present times.