The Growing Threat of Car Hacking | Mandiant | Fireeye

Total Page:16

File Type:pdf, Size:1020Kb

The Growing Threat of Car Hacking | Mandiant | Fireeye FireEye iSIGHT Intelligence CONNECTED CARS: THE OPEN ROAD FOR HACKERS SPECIAL REPORT / JUNE 2016 WI-FI INTERNET ACCESS Wireless access points frequently featured in new vehicles raise the potential for abuse if they are VEHICLE-TO-VEHICLE COMMUNICATIONS poorly secured and connected to Commonly referred to as V2V, vehicles will increasingly the vehicle’s other systems. Ever- communicate with one another autonomously in order to assist with increasing bandwidth capabilities vehicle spacing and lane changing, while using other data that can potentially increase the damage a improve vehicle operation.1 Eventually, vehicle-to-infrastructure (V2I) malicious actor could cause. will allow vehicles to communicate with traffic signals and road INTRODUCTION signs in order to better manage traffic flow and share data on road usage. Manipulating driver assist systems that use V2V or V2I could undermine safety and potentially cause collisions. THE ACCELERATION OF THE “INTERNET OF THINGS” (IOT) VEHICLE REVOLUTION HAS INCREASED SYSTEMS THE CONNECTIVITY OF EXTERIOR PASSENGER VEHICLES, WHICH IS LIKELY TO IMPACT AVERAGE CONSUMERS SIGNIFICANTLY. Today, most vehicle functions – steering, acceleration, braking, remote start, and even unlocking the doors – are controlled by software that accepts commands from a diverse array of digital systems operating both inside and outside the vehicle. However, this software contains millions of lines of code, and in these lines of code there may be vulnerabilities that can be exploited by individuals with malicious intent. FireEye iSIGHT Intelligence analysts and Mandiant consultants reviewed the key threats to interior and exterior vehicle systems and assessed the top five threats created by vehicle software vulnerabilities. These include: COLLISION AVOIDANCE Braking assist systems often use radar or other sensors to detect an imminent crash. A compromised vehicle could send manipulated Unauthorized physical Theft of personally Deliberate manipulation Hijacking vehicle systems Extortion enabled by data to the ECUs that control this feature, access to vehicles identifiable information of vehicle operation to enable malicious cyber ransomware that renders either causing it to fail to engage or engage TIRE PRESSURE MONITORING SYSTEM (TPMS) from manufacturer or activity vehicles inoperable until Systems that monitor tire pressure frequently third-party storage a ransom is paid braking unexpectedly, leading to a forced stop systems or passenger injury. communicate over a short-range wireless connection that could be used as an infection vector for vehicle- specific malware. Multiple universities have already demonstrated vulnerabilities within the TPMS.2 1 “Vehicle-to-Infrastructure (V2I) Communications for Safety,” U.S. Department of Transportation, October 27, 2015, http://www.its.dot.gov/factsheets/v2isafety_factsheet.htm 2 Bright, Peter, “Cars hacked through wireless tire sensors,” arstechnica, August 10, 2015, http://arstechnica.com/security/2010/08/cars-hacked-through-wireless-tyre-sensors/ 2 SPECIAL REPORT / CONNECTED CARS: THE OPEN ROAD FOR HACKERS SPECIAL REPORT / CONNECTED CARS: THE OPEN ROAD FOR HACKERS 3 VEHICLE OPERATION ELECTRONIC KEYLESS ENTRY CONTROL UNITS (ECUS) Thieves have used signal boosters The ECUs that control steering, braking, and interception devices to gain and acceleration can be manipulated unauthorized access to locked TELEMATICS SYSTEM in a compromised vehicle. The vehicles through their keyless Many modern vehicles offer sophisticated telematics systems that incorporate speedometer or engine temperature entry systems.4 The latest trend the radio, Bluetooth and USB connections, GPS, and cellular assist functions. Most gauge can also be forced to show in automotive innovation includes recently, vehicles increasingly feature Wi-Fi access points that provide a small false data, either falsely indicating or mobile applications for keyless wireless LAN to vehicle occupants. Each of these communications technologies masking vehicle malfunction. entry and even remote start. offers a means to compromise and potentially control the vehicle. 15:49 VEHICLE INTERIORSYSTEMS MUSIC PLAYER PHONE First name Last name Today 8:30 First name Last name Yesterday 11:39 First name Last name Yesterday 16:30 0:52 4:23 Hail to the Thief, Radiohead First name Last name Yesterday 21:43 VEHICLE OPERATIONS BROWSER 74 35 PSI - + 60 72 - + ONBOARD DIAGNOSTICS (OBD) PORT CLIMATE CONTROL: A self-diagnostic port where one can A vehicle’s interior climate can affect a driver’s comfort and therefore the plug-in devices used to measure driving ability to safely drive the vehicle. Manipulating climate control systems habits, conduct mechanical diagnostics, through compromised ECUs could blast the heat during the middle of or enhance driver experience is a potential summer, possibly forcing the driver to stop and exit the vehicle. vector for malware.3 For instance, a mechanic could inadvertently infect multiple vehicles using a compromised diagnostic tool. 3 Darren Pauli, “Mechanic computers used to pwn cars in new model-agnostic attack ,” The Register, March 13, 2016, http://www.theregister.co.uk/2016/03/13/mechanic_computers_used_to_pwn_cars_in_new_modelagnostic_attack/ 4 Nick Bilton, “Keeping Your Car Safe from Electronic Thieves,” New York Times, April 15, 2015, http://www.nytimes.com/2015/04/16/style/keeping-your-car-safe-from-electronic-thieves.html 4 SPECIAL REPORT / CONNECTED CARS: THE OPEN ROAD FOR HACKERS SPECIAL REPORT / CONNECTED CARS: THE OPEN ROAD FOR HACKERS 5 TELEMATICS 15:49 GPS NAVIGATION Threat actors 2D could potentially spoof the GPS 0.1 MIILE display to lead Jones Street the driver off the road or collect stored 0.5 MIILE Sansome Street destinations to obtain travel 0.3 MIILE patterns AUDIO Lombard Street RISK SECTION INTRODUCTION SYSTEM Infection vector 16:02 ARRIVAL TIME via USB or 13 MINS streaming media MUSIC PLAYER PHONE First name Last name While analyzing the current and potential risks to vehicles, Today 8:30 CONTACT LIST FireEye reviewed published information to assess various First name Last name The information Yesterday 11:39 held in your threat scenarios, their likelihood of occurring, and their car’s computer First name Last name Yesterday 16:30 could potentially potential impact. We assess the top five risks created by 0:52 4:23 include PII Hail to the Thief, Radiohead First name Last name vehicle software vulnerabilities to be: Yesterday 21:43 VEHICLE OPERATIONS BROWSER 74 35 PSI Unauthorized physical Theft of personally Deliberate manipulation Hijacking vehicle systems Extortion enabled by access to vehicles identifiable information of vehicle operation to enable malicious cyber ransomware that renders WEB from manufacturer or activity vehicles inoperable until BROWSER third-party storage a ransom is paid Web browsers systems often often contain exploitable - + 60 72 - + vulnerabilities USB Infection vector via compromised mobile phones or other devices 6 SPECIAL REPORT / CONNECTED CARS: THE OPEN ROAD FOR HACKERS SPECIAL REPORT / CONNECTED CARS: THE OPEN ROAD FOR HACKERS 7 FIVE RISKS FOR THREATS TO CAR VECTORS RISK 1 RISK 2 GAINING UNAUTHORIZED PHYSICAL ACCESS TO VEHICLES STEALING PERSONALLY IDENTIFIABLE INFORMATION Collecting personally identifiable attack vector could also be extended requirements (both locally and Close access entry methods that enable unauthorized entry into vehicles are information (PII) is a high priority to accessing pattern-of-life data – cloud-based) for vehicles are still the easiest to conduct and therefore among the most common. They present for many criminals, hacktivists, ostensibly innocuous data concerning immature, meaning privacy policies the most immediate and realistic threat to technology-enhanced vehicles, and nation-state threat actors. travel destinations, driving style, and among manufacturers are inconsistent notably because many vehicle manufacturers have opted to replace physical Modern vehicles collect significant potential speeding or traffic violations. and consumers are potentially left ignition systems with keyless systems that utilize mobile phone applications amounts of PII in the course of their vulnerable to exploitation. or wireless keyfobs.5 Most unauthorized entry methods exploit the wireless operation in order to interface with In addition, automated maintenance or communications between the vehicle and the keyfob carried by the driver.6 the myriad of after-market devices diagnostics services that communicate Threat actors may be interested in that communicate with the vehicle’s with a dealership may also offer a the following types of information that operating system. As a result, vehicles potential attack vector for criminals could potentially be accessed through Attackers exploit vulnerabilities in vehicle connectivity technologies to gain unauthorized entry or THREAT can now become an additional attack seeking PII held on dealership a vehicle’s system or stored on the SCENARIO access to a vehicle. vector for parties interested in stealing or manufacturer systems. Laws vehicle itself: High financial information. This novel stipulating protection and storage Likelihood • Thieves have long sought to gain physical entry to locked vehicles. The ability to do so without incurring damage to the vehicle or leaving behind physical evidence lowers any deterrent factor. VEHICLE INFORMATION PERSONAL INFORMATION • Multiple close access and short-range exploitation capabilities could provide Make, Model, Year Owner Name, Address,
Recommended publications
  • How to Make Use of Data in a Car: Connected Cars, Payment Tech, Analytics, and Other Opportunities
    HOW TO MAKE USE OF DATA IN A CAR: CONNECTED CARS, PAYMENT TECH, ANALYTICS, AND OTHER OPPORTUNITIES Andrew Ray David Monteiro May 13, 2020 Tess Blair @MLGlobalTech © 2018 Morgan, Lewis & Bockius LLP Morgan Lewis Automotive Hour Webinar Series Series of automotive industry focused webinars led by members of the Morgan Lewis global automotive team. The 10-part 2020 program is designed to provide a comprehensive overview on a variety of topics related to clients in the automotive industry. Upcoming sessions: JUNE 10 | Employee Benefits in the Automotive and Mobility Context JULY 15 | Working with, or Operating, a Tech Startup in the Automotive and Mobility Sectors AUGUST 5 | Electric Vehicles and Their Energy Impact SEPTEMBER 23 | Autonomous Vehicles Regulation and State Developments NOVEMBER 11 | Environmental Developments and Challenges in the Automotive Space DECEMBER 9 | Capitalizing on Emerging Technology in the Automotive and Mobility Space 2 Table of Contents Section 01 – Introductions Section 02 – Market Overview Section 03 – Data Acquisition and Use Section 04 – Regulatory and Enforcement Risks 3 SECTION 01 INTRODUCTIONS Today’s Presenters Andrew Ray David Monteiro Tess Blair Washington, DC Dallas Philadelphia Tel +1.202.373.6585 Tel +1.214.466.4133 Tel +1.215.963.5161 [email protected] [email protected] [email protected] 5 SECTION 02 MARKET OVERVIEW 7 Market Overview • 135 million Americans spend 51 minutes on average commuting to work five days a week. • Connected commerce experience represents a $230 billion market. • Since 2010, investors have poured $20.8 billion into connectivity and infotainment technologies. Source: “2019 Digital Drive Report,” P97 / PYMNTS.com; “Start me up: Where mobility investments are going,” McKinsey & Company.
    [Show full text]
  • Society Persuasion In
    PERSUASION IN SOCIETY HERBERT W. SIMONS with JOANNE MORREALE and BRUCE GRONBECK Table of Contents List of Artwork in Persuasion in Society xiv About the Author xvii Acknowledgments xix Preface xx Part 1: Understanding Persuasion 1. The Study of Persuasion 3 Defining Persuasion 5 Why Is Persuasion Important? 10 Studying Persuasion 14 The Behavioral Approach: Social-Scientific Research on the Communication-Persuasion Matrix 15 The Critical Studies Approach: Case Studies and “Genre-alizations” 17 Summary 20 Questions and Projects for Further Study 21 2. The Psychology of Persuasion: Basic Principles 25 Beliefs and Values as Building Blocks of Attitudes 27 Persuasion by Degrees: Adapting to Different Audiences 29 Schemas: Attitudes as Knowledge Structures 32 From Attitudes to Actions: The Role of Subjective Norms 34 Elaboration Likelihood Model: Two Routes to Persuasion 34 Persuasion as a Learning Process 36 Persuasion as Information Processing 37 Persuasion and Incentives 38 Persuasion by Association 39 Persuasion as Psychological Unbalancing and Rebalancing 40 Summary 41 Questions and Projects for Further Study 42 3. Persuasion Broadly Considered 47 Two Levels of Communication: Content and Relational 49 Impression Management 51 Deception About Persuasive Intent 51 Deceptive Deception 52 Expression Games 54 Persuasion in the Guise of Objectivity 55 Accounting Statements and Cost-Benefit Analyses 55 News Reporting 56 Scientific Reporting 57 History Textbooks 58 Reported Discoveries of Social Problems 59 How Multiple Messages Shape Ideologies 59 The Making of McWorld 63 Summary 66 Questions and Projects for Further Study 68 Part 2: The Coactive Approach 4. Coactive Persuasion 73 Using Receiver-Oriented Approaches 74 Being Situation Sensitive 76 Combining Similarity and Credibility 79 Building on Acceptable Premises 82 Appearing Reasonable and Providing Psychological Income 85 Using Communication Resources 86 Summary 88 Questions and Projects for Further Study 89 5.
    [Show full text]
  • The Informative Speech of Newsgames
    GÓMEZ, S. y CABEZA, J. The informative speech of newsgames CUADERNOS.INFO Nº 38 ISSN 0719-3661 Versión electrónica: ISSN 0719-367x http://www.cuadernos.info doi: 10.7764/cdi.38.593 Recibido: 06-02-2014 / Aceptado: 03-22-2015 The informative speech of newsgames: the “Bárcenas case” on games developed for mobile devices1 El discurso informativo de los newsgames: el caso Bárcenas en los juegos para dispositivos móviles O discurso informativo dos Newsgames: O caso Barcenas nos jogos para dispositivos móveis SALVADOR GÓMEZ GARCÍA, Universidad de Valladolid, Valladolid, España ([email protected]) JOSÉ CABEZA SAN DEOGRACIAS, Universidad Rey Juan Carlos, Madrid, España ([email protected]) ABSTRACT RESUMEN RESUMO The purpose of this research is to analyze El propósito de esta investigación es O objetivo desta pesquisa é analisar o the impact of a political corruption analizar el impacto de un escándalo de impacto de um escândalo de corrupção scandal in Spain (the Bárcenas case) corrupción política en España (el caso política em Espanha (no caso Bárcenas) in the production of games developed Bárcenas) en la producción de juegos na produção de jogos para dispositivos for mobile devices across all major desarrollados para dispositivos móviles móveis durante esse ano através das platforms for content distribution. The a través de las principales plataformas prin cipais plataformas de distribuição data were obtained with questionnaires de distribución de contenidos. Los datos de conteúdo. A coleta de dados foi to developers, content coding sheets and se obtuvieron mediante cuestionarios a realizada a partir de questio nários para the feedback given by the users of the los desarrolladores, fichas de codificación os desenvolvedores, fichas de codificação games.
    [Show full text]
  • POLITICAL REPORTING in the AGE of INFOTAINMENT Melissa
    POLITICAL REPORTING IN THE AGE OF INFOTAINMENT Melissa Oribhabor Jennifer Rowe, Committee Chair August 2014 Introduction The effects of infotainment have been felt by the news industry since politicians started appearing on talK shows and comedy shows, hoping to humanize themselves to the voting public. One of the earliest examples was in 1968 when presidential candidate Richard Nixon appeared on “Rowan and Martin’s Laugh-In” (Xenos 198). Even earlier than that, John F. Kennedy appeared on the “The Tonight Show” with Jack Paar in 1960. But with the 24-hour news cycle and the Internet drawing the public away from traditional forms of news, infotainment has become even more prevalent during the past 30 years. Infotainment can be seen easily on television, with programs such as “The Daily Show” and CNN’s “RidicuList” with Anderson Cooper; however, infotainment in terms of print journalism has not been studied as in- depth. This research not only looks at infotainment in print journalism but more specifically how it affects political journalists. Literature Review Moy, Xenos and Hess in their 2005 article “Communication and Citizenship: Mapping the Political Effects of Infotainment” define infotainment as the convergence of news and entertainment. The paper states that in recent years news programs started developing more elements of entertainment, and entertainment programs started to disseminate the news. The term “infotainment” is largely used in reference to entertainment programs that have elements of news (Moy et. al. 2005, 113). “Soft news” and “infotainment” are often used interchangeably in research on this topic. Soft news includes sensationalized stories, human-interest stories, and stories that focus more on entertainment over serious hard news content (Jebril et.
    [Show full text]
  • Cybersecurity for Connected Cars Exploring Risks in 5G, Cloud, and Other Connected Technologies
    Cybersecurity for Connected Cars Exploring Risks in 5G, Cloud, and Other Connected Technologies Numaan Huq, Craig Gibson, Vladimir Kropotov, Rainer Vosseler TREND MICRO LEGAL DISCLAIMER The information provided herein is for general information Contents and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect the most current situation. 4 Nothing contained herein should be relied on or acted upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing The Concept of Connected Cars herein should be construed otherwise. Trend Micro reserves the right to modify the contents of this document at any time without prior notice. 7 Translations of any material into other languages are intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise Research on Remote Vehicle related to the accuracy of a translation, please refer to Attacks the original language official version of the document. Any discrepancies or differences created in the translation are not binding and have no legal effect for compliance or enforcement purposes. 13 Although Trend Micro uses reasonable efforts to include Cybersecurity Risks of Connected accurate and up-to-date information herein, Trend Micro makes no warranties or representations of any kind as Cars to its accuracy, currency, or completeness. You agree that access to and use of and reliance on this document and the content thereof is at your own risk. Trend Micro disclaims all warranties of any kind, express or implied.
    [Show full text]
  • Real News, Fake News: Literacy for the Information Age COM 337 Sec
    1 Real News, Fake News: Literacy for the Information Age COM 337 Sec. 1 Mondays/Wednesdays 2:15 p.m. – 3:35 p.m. Newhouse 2, Rm. 350 Fall 2013 Professor Charlotte Grimes Newhouse II – Rm. 496 / 496A Office phone: 443-2366 Email: [email protected] Web sites: http://knightpoliticalreporting.syr.edu Http://tonerprogram.syr.edu http://democracywise.syr.edu www.dia-cny.com/electionday Office Hours: Tuesdays: 1 – 3 p.m. Wednesdays: 10 a.m. - noon. Other times by appointment. ABOUT YOUR PROFESSOR: Professor Charlotte Grimes is the Knight Chair in Political Reporting. She was a journalist for 25 years, 20 of them with the St. Louis Post-Dispatch and two of them in radio news. She was in the Post-Dispatch’s Washington bureau for 12 years, covering the Missouri and southern Illinois congressional delegations, the politics and policies of health care and of international trade, presidential and congressional elections and assorted other news of government and politics. She has spent Christmases in war zones; covered the Panama invasion; reported from Nicaragua, Mexico, London, Ireland, Cyprus, China, Japan and Liberia. During Liberia’s civil war in the early 1990s, she spent five months reconstructing the lives and deaths of five Catholic missionaries killed by rebels. Her work has won national, regional and local awards. She has been a Ferris Professor of Journalism at Princeton University; a Fellow at Harvard University’s Shorenstein Center on the Press, Politics and Public Policy; a visiting professor at the Newhouse School; director of the Semester in Washington program and Scripps Howard Foundation Wire for college students; and head of the journalism program at Hampton University, an historically black university in Virginia, where she laid the groundwork for the Scripps Howard School of Journalism and Communications.
    [Show full text]
  • Chris Egelston's Personal Persuasion Power
    CHRIS EGELSTON’S PERSONAL PERSUASION POWER “Secrets For Connecting With People More Effectively And Conveying Your Messages More Impactfully!” THE POWER OF M.O.I. SIX SUPER SECRETS OF ENGAGEMENT 1. 2. 3. 4. 5. 6. POWER PITCH FORMULA ABOUT CHRIS EGELSTON Chris Egelston is a multi-faceted speaker, trainer, consultant, and entertainer. More simply, he is an Infotainer. He has the ability to deliver powerful content in an entertaining and memorable way. He earned both a Bachelor’s Degree in Marketing and an M.B.A. from Southern Illinois University at Carbondale. His programs include: SUCCESS MAGIC! - Chris teaches a practical and proven 5-Step System for setting and achieving your personal, pro- fessional and business goals. It can be presented as a highly entertaining keynote or a seminar. “Chris Egelston is a consummate pro whose experience allows him to know what YOU want before you know what you want! In this day and age, it’s incredible and comforting to know a savvy success expert and professional who is willing to do what-ever it takes to produce profound results ... Count on Chris for real solutions that WORK!” Dean Hankey, President & CEO, Powerful Success Solutions L.E.A.D.S. TO SALES! - Chris reveals how business owners, entrepreneurs and sales professionals can get more leads from networking, trade shows and other live marketing events. “Chris’ presentations are always helpful and encouraging to small business owners. There are always helpful tools available when Chris speaks to a group of business owners. If you have the opportunity to hear Chris speak or have him help motivate your sales force I strongly recommend you do so.” Kelli Ballard, President, Business Resource Group TRADE SHOW INFOTAINMENT - Chris will create a crowd in your trade show booth, convey your key marketing messages in a fun and memorable way and help you collect more leads at your next trade show.
    [Show full text]
  • Worlds Apart: How the Distance Between Science and Journalism Threatens America's Future
    Worlds Apart Worlds Apart HOW THE DISTANCE BETWEEN SCIENCE AND JOURNALISM THREATENS AMERICA’S FUTURE JIM HARTZ AND RICK CHAPPELL, PH.D. iv Worlds Apart: How the Distance Between Science and Journalism Threatens America’s Future By Jim Hartz and Rick Chappell, Ph.D. ©1997 First Amendment Center 1207 18th Avenue South Nashville, TN 37212 (615) 321-9588 www.freedomforum.org Editor: Natilee Duning Designer: David Smith Publication: #98-F02 To order: 1-800-830-3733 Contents Foreword vii Scientists Needn’t Take Themselves Seriously To Do Serious Science 39 Introduction ix Concise writing 40 Talk to the customers 41 Overview xi An end to infighting 42 The incremental nature of science 43 The Unscientific Americans 1 Scientific Publishing 44 Serious omissions 2 Science and the Fourth Estate 47 The U.S. science establishment 4 Public disillusionment 48 Looking ahead at falling behind 5 Spreading tabloidization 48 Out of sight, out of money 7 v Is anybody there? 8 Unprepared but interested 50 The regional press 50 The 7 Percent Solution 10 The good science reporter 51 Common Denominators 13 Hooked on science 52 Gauging the Importance of Science 53 Unfriendly assessments 13 When tortoise meets hare 14 Media Gatekeepers 55 Language barriers 15 Margin of error 16 The current agenda 55 Objective vs. subjective 17 Not enough interest 57 Gatekeepers as obstacles 58 Changing times, concurrent threats 17 What does the public want? 19 Nothing Succeeds Like Substance 60 A new interest in interaction 20 Running Scared 61 Dams, Diversions & Bottlenecks 21 Meanwhile,
    [Show full text]
  • Network Culture and the Aesthetics of Dissension1
    MONOGRÁFICO Escritura e Imagen ISSN: 1885-5687 http://dx.doi.org/10.5209/esim.73038 Network culture and the aesthetics of dissension1 Juan Martín Prada2 Recibido: 25 de marzo de 2020 / Aceptado: 25 de octubre de 2020 Abstract: This article addresses the complex relationship between digital activism and Internet art, from the initial proposals in the 1990s up to the present day. The analysis focuses on those projects that have most impacted the convergence of net art and “net-activism” during this period, with a particular emphasis on the relationship between artistic practice and hacktivism. Likewise, phenomena such as virtual sit-ins, DDOS-based strategies and several others that have emerged in the new context of social networks and participatory online platforms (memes, flash mobs, etc.) are analysed, in order to reflect on the new practices of social media art and their potential for specific critical action. Keywords: Internet art; net art; hacktivism; online activism; social media art; virtual sit-in. [es] Cultura red y estéticas de la disensión Resumen: En este artículo se aborda la compleja relación entre el activismo digital y el Internet art desde los inicios de este en la década de los noventa del pasado siglo hasta la actualidad. El centro del análisis lo constituyen las propuestas que de forma más intensa han reclamado a lo largo de este periodo la confluencia entrenet art y “net-activismo”, poniendo especial énfasis en las relaciones entre práctica artística y hacktivismo. Asimismo, se analizan fenómenos como las virtual sit-ins, las estrategias basadas en DDOS, los surgidos en el nuevo contexto de las redes sociales y de las plataformas participativas en línea (memes, flash mobs, etc.) para, finalmente, abordar la capacidad de actuación crítica específica de las nuevas prácticas de social media art.
    [Show full text]
  • Celebrity Power: Spotlighting and Persuasion in the Media
    Celebrity Power: Spotlighting and Persuasion in the Media BY ©2014 Mark Harvey Submitted to the graduate degree program in Political Science and the Graduate Faculty of the University of Kansas in partial fulfillment of the requirements for the degree of Doctor of Philosophy. Committee: ____________________________________ Chairperson Mark R. Joslyn ____________________________________ Donald P. Haider-Markel ____________________________________ Burdett A. Loomis ____________________________________ John J. Kennedy ____________________________________ James F. Daugherty Defended April 1, 2014 The Dissertation Committee for Mark Harvey certifies that this is the approved version of the following dissertation: Celebrity Power: Spotlighting and Persuasion in the Media ____________________________________ Chairperson Mark R. Joslyn Date Approved: April 1, 2014 ii Abstract As technological and business demands have transformed the operation and demands on news and entertainment media, celebrity activists have proliferated. Only a few years ago, the notion that these celebrities were anything other than opportunistic was laughable. Less likely was the prospect that celebrities might have real power to change minds or affect outcomes. It is difficult enough for politicians to set public agendas. Can celebrities compete? This dissertation compares celebrities to politicians and focuses upon one key area of potential power: media agenda setting. If celebrities hope to change the public agenda to focus on the issues they think are important, can they gain attention for those issues and are they persuasive? The results of a time series analysis and an experimental study conclude that they are capable of not only competing with politicians in “spotlighting” and persuasion on political issues, but may at times, exceed their abilities. These findings potentially upend what many political scientists assume about power, particularly scholars who study policymaking, policy entrepreneurship, and social movements.
    [Show full text]
  • Visual Infotainment in the Political News Irene Photiou, Lambrini
    MedieKultur | Journal of media and communication research | ISSN 1901-9726 Article – Open issue Visual Infotainment in the political news A cultural approach in the post-truth era Irene Photiou, Lambrini Papadopoulou, Artemis Eleftheriadou and Th eodora A. Maniou MedieKultur 2019, 66, 75-100 Published by SMID | Society of Media researchers In Denmark | www.smid.dk Th e online version of this text can be found open access at https://tidsskrift.dk/mediekultur Abstract Th is article introduces the concept of visual infotainment, the aspects of infotain- ment found in visual artefacts employed in the news. Using a case study, we examine the photographs published in the digital media to report on the negotia- tions between the Greek- and Turkish-Cypriot communities, which took place in 2016 and 2017. A four-level visual framing analysis is used to identify a consistent set of frames. It aims to identify the political ideologies that appear to be behind the visual infotainment in these pictorial reports, and the specifi c ways in which hard news can be transformed into soft news. Our research confi rms the presence of visual infotainment elements of personalisation, emotion, morbidity and sensation- alism. Overall, the study shows that visual infotainment serves to establish visual frames produced by and for contradictory propagandas, one of which favours ethnic nationalism while the other promotes confl ict resolution. Key words visual infotainment, visual framing, post-truth era, political news, Cyprus 75 Photiou, Papadopoulou, Eleftheriadou and Maniou MedieKultur 66 Article: Visual Infotainment in the political news 1. Introduction Th e style used by news reports in the media is important in capturing the interest of, and informing, mass audiences.
    [Show full text]
  • How Mass Media Construct and Constrict Public Interest Litigation
    Framing the Food Fights: How Mass Media Construct and Constrict Public Interest Litigation Michael McCann University of Washington and William Haltom University of Puget Sound Framing the Food Fights: How Mass Media Matter for Public Interest Litigation 1 Introduction 1 A distinctive consumer-oriented reform politics, sometimes labeled “public interest liberalism,” emerged in the United States during the 1960s (McCann 1986; Vogel 1978; Rabin 1976). The hallmarks of this political campaign included: first, a traditional progressive commitment to enhancing ordinary citizen capacity to render accountable powerful corporate producers for their often harmful practices; second, new substantive goals of increasing the safety and health of manufactured products, workplaces, and the social and natural environments that affect, however differently, most citizens in our nation, and; third, a distinctive investment in litigation or, more broadly, “legal mobilization” politics as a key element of the reform strategy This vision of legal mobilization politics has drawn on traditional progressive reform movements but taken its specific strategic cues from the civil rights movement in the post-WWII era. The early success of Ralph Nader during the 1960s in appropriating such tactics for middle class consumer and environmental issues and the proliferation of idealistic young public interest lawyers in the 1970s further nurtured faith in this type of reform politics. Especially appealing for many activists in this legacy has been the capacity of litigation to focus political efforts on discrete corporate culprits and policy issues without being coopted by either centrist political parties or hierarchical, unresponsive, bureaucratic institutions of the state. In short, this legalistic public interest politics has expressed a distinctive new form of American middle class liberal progressivism committed to mobilizing “judicialized’ government for the advancement of public safety, health, and welfare (see McCann 1986; Vogel 1981).
    [Show full text]