Disruptive Power: the Crisis of the State in the Digital

Total Page:16

File Type:pdf, Size:1020Kb

Disruptive Power: the Crisis of the State in the Digital disruptive power OXFORD STUDIES IN DIGITAL POLITICS Series Editor: Andrew Chadwick, Royal Holloway, University of London Expect Us: Online Communities and Political Mobilization Jessica L. Beyer The Hybrid Media System: Politics and Power Andrew Chadwick Tweeting to Power: The Social Media Revolution in American Politics Jason Gainous and Kevin M. Wagner The Digital Origins of Dictatorship and Democracy: Information Technology and Political Islam Philip N. Howard Democracy’s Fourth Wave? Digital Media and the Arab Spring Philip N. Howard and Muzammil M. Hussain The MoveOn Effect: The Unexpected Transformation of American Political Advocacy David Karpf Taking Our Country Back: The Crafting of Networked Politics from Howard Dean to Barack Obama Daniel Kreiss Bits and Atoms: Information and Communication Technology in Areas of Limited Statehood Steven Livingston and Gregor Walter-Drop Digital Cities: The Internet and the Geography of Opportunity Karen Mossberger, Caroline J. Tolbert, and William W. Franko Revolution Stalled: The Political Limits of the Internet in the Post-Soviet Sphere Sarah Oates Affective Publics: Sentiment, Technology, and Politics Zizi Papacharissi Presidential Campaigning in the Internet Age Jennifer Stromer-Galley News on the Internet: Information and Citizenship in the 21st Century David Tewksbury and Jason Rittenberg disruptive power The Crisis of the State in the Digital Age taylor owen 1 1 Oxford University Press is a department of the University of Oxford. It furthers the University’s objective of excellence in research, scholarship, and education by publishing worldwide. Oxford New York Auckland Cape Town Dar es Salaam Hong Kong Karachi Kuala Lumpur Madrid Melbourne Mexico City Nairobi New Delhi Shanghai Taipei Toronto With offices in Argentina Austria Brazil Chile Czech Republic France Greece Guatemala Hungary Italy Japan Poland Portugal Singapore South Korea Switzerland Thailand Turkey Ukraine Vietnam Oxford is a registered trade mark of Oxford University Press in the UK and certain other countries. Published in the United States of America by Oxford University Press 198 Madison Avenue, New York, NY 10016 © Taylor Owen 2015 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior permission in writing of Oxford University Press, or as expressly permitted by law, by license, or under terms agreed with the appropriate reproduction rights organization. Inquiries concerning reproduction outside the scope of the above should be sent to the Rights Department, Oxford University Press, at the address above. You must not circulate this work in any other form and you must impose this same condition on any acquirer. Cataloging-in-Publication data is on file at the Library of Congress 9780199363865 1 3 5 7 9 8 6 4 2 Printed in the United States of America on acid-free paper “To: R & W” contents Acknowledgments ix 1. Losing Control 1 2. Disruptive Power 22 3. Spaces of Dissent 48 4. New Money 67 5. Being There 98 6. Saving the Saviors 122 7. Diplomacy Unbound 148 8. The Violence of Algorithms 168 9. The Crisis of the State 189 Notes 211 Index 245 acknowledgments This book represents the culmination of three meandering years exploring the intersection of digital technology and international affairs and is ultimately the product of many people’s work. It began as a lecture and working paper for the Trudeau Foundation in the spring of 2012, and I am appreciative of PG Forest giving me the chance to come back to the Foundation and try out some new ideas on the smartest (and most critical) crowd in Canada. At the time, the ideas presented were nascent, and represented my ini- tial explorations of what I increasingly saw as the profound ways technology was reshaping the international system. This essay became a larger research project funded by a Social Sciences and Humanities Research Council grant called International Relations in the Digital Age, a part- nership between the Canadian International Council and UBC. My friend and colleague Anouk Dey was critical as an RA on both of these initial stages. And my co-PI on the SSHRC research project, partner at the CIC and Open- Canada and close friend Jennifer Jeffs built the project and team with me. We had a great group of UBC journalism students helping out with a wide range of research, includ- ing Sadiya Ansari, Lindsay Sample, Kate Adach, Alexis Beckett, and Alexandra Gibb. acknowledgments For the year I spent focusing on researching and writing the book, I had the amazing good fortune of having two wonderful RA’s, Tanzeel Hakak and Cherise Seucharan. Both are wise beyond their years, and handled my ridicu- lous schedule and wandering (they would say vague) ideas with grace and persistence. Many of the ideas in this book are theirs as much as mine. While writing this book I was also working at the Tow Center for Digital Journalism at Columbia with the ex- traordinary and tolerant Emily Bell. The incredible op- portunities that working with Emily on building the Tow Center afforded me, as well as the time she allowed me to binge write among the cramming undergrads in the Bodle- ian, made this book possible. As I have now learned, bringing a book into the world is a process. Three people made this one happen. First, Ethan Bassoff at Lippincott Massie McQuilkin took a chance on me, and got this book into the hands of New York publish- ers. Second, Angela Chnapko at Oxford University Press was supportive, encouraging, and incredibly helpful at every stage of the editing and publishing process. Finally, Blake Eskin agreed to dive in to the project as an utterly ruthless editor, and gave me the most educational writing experience I have ever had. Finally, and by far most importantly, I owe everything to my amazing parents and to my best friend, confidant, fiercest critic, partner and wife Ariel, and to our little man Walter. x disruptive power chapter one losing control Information is power. But like all power, there are those who want to keep it for themselves. —Aaron Swartz In January 2012, the Federal Bureau of Investigation (FBI), Scotland Yard, and intelligence agencies in Italy, France, the Netherlands, Denmark, and Sweden created a task force to counter Anonymous. These countries saw the col- lective of activist hackers and its numerous offshoots as a national security threat. Anonymous—which is best defined as an Internet gath- ering with a loose and decentralized command structure that operates on ideas rather than directives1—came to prominence in 2008 when it mounted an attack on the Church of Scientology’s website after the church asked YouTube to take down a video interview with Tom Cruise. Anonymous saw the takedown as an act of censorship and said it wanted to completely remove the Church of Scien- tology’s presence on the Internet and to “save people from Scientology by reversing the brainwashing.” Since then, hundreds of digital actions have been undertaken in the 1 disruptive power name of Anonymous, ebbing and flowing in both scale and frequency. The group has inserted itself into political con- flicts in the United States and around the globe. In November 2011, at an Occupy rally against budget cuts and increased tuition at the University of California, San Diego, a riot police officer was filmed pepper-spraying a peaceful protestor. When video of the incident went viral on YouTube, Anonymous responded by leaking the police officer’s name, address, phone number, and email address. He received over 17,000 threatening emails, 10,000 text messages, and hundreds of letters. The group did the same to Arizona Department of Public Safety officials in response to the passage of Arizona Bill 1070, an anti-immigration bill widely seen as racist. This attack was part of the bigger operation called Anti-Sec in which Anonymous attacked many Western governments for reasons ranging from Inter- net censorship to racial profiling. During the Arab Spring, Anonymous worked in support of anti-government protestors in Tunisia, Egypt, and Libya, hacking into government websites, shutting them down with distributed denial-of service (DDoS) attacks, and releasing names, email addresses, and passwords of government offi- cials. In December of 2011, in the name of revealing corpo- rate and government corruption, Anonymous hacked into the US intelligence consultancy Stratfor, obtaining, among other data, 2.7 million corporate emails detailing often sen- sitive conversations involving current and former govern- ment officials and thousands of off-the-record sources. While these operations have many common objectives and use similar hacking tactics, Anonymous is hard to pin 2 losing control down. It has no fixed leadership and no national affiliation. Individuals loosely coordinate, then attribute their actions to Anonymous. As one hacker who participates in Anonymous told a Baltimore journalist, “We have this agenda that we all agree on and we all coordinate and act, but all act inde- pendently toward it, without any want for recognition. We just want to get something that we feel is important done.”2 Describing Anonymous is a challenge when writing a book. For an intelligence agency—and particularly one like the FBI, which has a history of combating perceived US threats ranging from the Communist Party to al- Qaeda—its amorphous structure, mandate, and tactics can cause much greater concern. The United States, which created the Inter- net as a defense research project, now considers cyberspace a “domain” or potential battlefield equal in importance to land, sea, air, and outer space. As a result, Anonymous and other groups involved in cyberattacks are seen as actors who need to be controlled. But Anonymous does not work like other political or military actors. It does not use accepted international conventions of protest— political marches, pe- titions, physical violence—to pursue its goals.
Recommended publications
  • UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations
    UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations Title A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Permalink https://escholarship.org/uc/item/6w76f8x7 Author Swift, Kathy Publication Date 2017 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Santa Barbara A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Education by Kathleen Anne Swift Committee in charge: Professor Richard Duran, Chair Professor Diana Arya Professor William Robinson September 2017 The dissertation of Kathleen Anne Swift is approved. ................................................................................................................................ Diana Arya ................................................................................................................................ William Robinson ................................................................................................................................ Richard Duran, Committee Chair June 2017 A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Copyright © 2017 by Kathleen Anne Swift iii ACKNOWLEDGEMENTS I would like to thank the members of my committee for their advice and patience as I worked on gathering and analyzing the copious amounts of research necessary to
    [Show full text]
  • Country of Origin Information Report Syria June 2021
    Country of origin information report Syria June 2021 Page 1 of 102 Country of origin information report Syria | June 2021 Publication details City The Hague Assembled by Country of Origin Information Reports Section (DAF/AB) Disclaimer: The Dutch version of this report is leading. The Ministry of Foreign Affairs of the Netherlands cannot be held accountable for misinterpretations based on the English version of the report. Page 2 of 102 Country of origin information report Syria | June 2021 Table of contents Publication details ............................................................................................2 Table of contents ..........................................................................................3 Introduction ....................................................................................................5 1 Political and security situation .................................................................... 6 1.1 Political and administrative developments ...........................................................6 1.1.1 Government-held areas ....................................................................................6 1.1.2 Areas not under government control. ............................................................... 11 1.1.3 COVID-19 ..................................................................................................... 13 1.2 Armed groups ............................................................................................... 13 1.2.1 Government forces .......................................................................................
    [Show full text]
  • Februarie Martie Aprilie Ianuarie Mai Iunie Iulie August
    IANUARIE FEBRUARIE MARTIE APRILIE MAI 1 V △ Makoto Tomioka (1897), scriitorul socialist 1 L Apare revista Dacia Viitoare a Grupului Revoluționar 1 L Apare la New York primul număr din revista Mother 1 J △ Francisco Ascaso (1901); se încheie Războiul Civil 1 S Ziua internaȚională a muncii, muncitorilor și Constantin Mille (1862); începe rebeliunea zapatistă din Român (1883) Earth (1906), scoasă de Emma Goldman din Spania (1939) muncitoarelor; se deschide în București MACAZ - Bar regiunea Chiapas, Mexic (1994) 2 M Adolf Brand (1945); apare la București Dysnomia, 2 M scriitorul Philip K. Dick (1982) 2 V Zamfir C. Arbure (1933); Jandarmeria reprimă violent Teatru Coop., continuare a Centrului CLACA (2016) 2 S „Big Frank” Leech (1953) cerc de lectură feministă și queer (2015) 3 M △filosoful William Godwin (1756), feminista Milly pregătirea protestelor anti-NATO din București (2008) 2 D Gustav Landauer (1919); încep protestele 3 D △ Federico „Taino” Borrell Garcia (1912) 3 M △ coreean Pak Yol (1902), Simone Weil (1909) Witkop (1877); Lansare SexWorkCall la București (2019) 3 S △educator Paul Robin (1837); apare primul număr al studențești în Franța, cunoscute mai târziu ca „Mai ‘68” 4 L Albert Camus (1960); Revolta Spartachistă din 4 J △militantul Big Bill Heywood (1869) 4 J △ Suceso Portales Casamar (1904) revistei Strada din Timișoara (2017) 3 L △scriitorul Gérard de Lacaze-Duthiers (1958) Germania (1919) 5 V △ criticul Nikolai Dobroliubov (1836), Johann Most (1846); 5 V △socialista Rosa Luxemburg (1871) 4 D △militantul kurd Abdullah Öcalan (1949); 4 M Demonstrația din Piața Haymarket din Chicago (1886) 5 M △ Nelly Roussel (1878); Giuseppe Fanelli (1877), Auguste Vaillant (1894) 6 S Apare la Londra primul număr al revistei Anarchy (1968) 5 L Apare nr.
    [Show full text]
  • Officials Say Flynn Discussed Sanctions
    Officials say Flynn discussed sanctions The Washington Post February 10, 2017 Friday, Met 2 Edition Copyright 2017 The Washington Post All Rights Reserved Distribution: Every Zone Section: A-SECTION; Pg. A08 Length: 1971 words Byline: Greg Miller;Adam Entous;Ellen Nakashima Body Talks with Russia envoy said to have occurred before Trump took office National security adviser Michael Flynn privately discussed U.S. sanctions against Russia with that country's ambassador to the United States during the month before President Trump took office, contrary to public assertions by Trump officials, current and former U.S. officials said. Flynn's communications with Russian Ambassador Sergey Kislyak were interpreted by some senior U.S. officials as an inappropriate and potentially illegal signal to the Kremlin that it could expect a reprieve from sanctions that were being imposed by the Obama administration in late December to punish Russia for its alleged interference in the 2016 election. Flynn on Wednesday denied that he had discussed sanctions with Kislyak. Asked in an interview whether he had ever done so, he twice said, "No." On Thursday, Flynn, through his spokesman, backed away from the denial. The spokesman said Flynn "indicated that while he had no recollection of discussing sanctions, he couldn't be certain that the topic never came up." Officials said this week that the FBI is continuing to examine Flynn's communications with Kislyak. Several officials emphasized that while sanctions were discussed, they did not see evidence that Flynn had an intent to convey an explicit promise to take action after the inauguration. Flynn's contacts with the ambassador attracted attention within the Obama administration because of the timing.
    [Show full text]
  • Moneylab Reader: an Intervention in Digital Economy
    READER A N INTERVENTION IN DIGITAL ECONOMY FOREWORD BY SASKIA SASSEN EDITED BY GEERT LOVINK NATHANIEL TKACZ PATRICIA DE VRIES INC READER #10 MoneyLab Reader: An Intervention in Digital Economy Editors: Geert Lovink, Nathaniel Tkacz and Patricia de Vries Copy editing: Annie Goodner, Jess van Zyl, Matt Beros, Miriam Rasch and Morgan Currie Cover design: Content Context Design: Katja van Stiphout EPUB development: André Castro Printer: Drukkerij Tuijtel, Hardinxveld-Giessendam Publisher: Institute of Network Cultures, Amsterdam, 2015 ISBN: 978-90-822345-5-8 Contact Institute of Network Cultures phone: +31205951865 email: [email protected] web: www.networkcultures.org Order a copy or download this publication freely at: www.networkcultures.org/publications Join the MoneyLab mailing list at: http://listcultures.org/mailman/listinfo/moneylab_listcultures.org Supported by: Amsterdam University of Applied Sciences (Hogeschool van Amster- dam), Amsterdam Creative Industries Publishing and the University of Warwick Thanks to everyone at INC, to all of the authors for their contributions, Annie Goodner and Morgan Currie for their copy editing, and to Amsterdam Creative Industries Publishing for their financial support. This publication is licensed under Creative Commons Attribution NonCommercial ShareAlike 4.0 Unported (CC BY-NC-SA 4.0). To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/4.0/. EDITED BY GEERT LOVINK, NATHANIEL TKACZ AND PATRICIA DE VRIES INC READER #10 Previously published INC Readers The INC Reader series is derived from conference contributions and produced by the Institute of Network Cultures. They are available in print, EPUB, and PDF form. The MoneyLab Reader is the tenth publication in the series.
    [Show full text]
  • The Rise of Cyber-Espionage
    Case Study: THE RISE OF CYBER-ESPIONAGE 5HFUXLWPHQW3ODQ CounterTh e 20 7KH&RXQWHU7HUURULVW ~ June/July 2012 ©istockphoto/loops7 By Chris Mark At a Hopkinton, Massachusetts, offi ce, an executive received an email that appeared to be from a coworker on March 1, 2011. Attached to the email was an Excel spreadsheet titled “2011 Recruitment Plan.” The man opened the spreadsheet. The email was not from a coworker, it was a carefully crafted attack known as ”spearfi shing” in which a fraudulent email is sent to a specifi c person. he spearfi shing email contained an system, SecurID. SecurID is used by an Excel spreadsheet with a zero- estimated 250 million people worldwide. Tday exploit and a version of the Poison Th e attack was believed to have been ini- Ivy RAT (remote administration tool) tiated using a zero-day exploit created by payload embedded. Th e RAT enabled a Chinese hacker. Evidence suggests the a hacker to gain privileged access to the possibility of Chinese-sponsored cyber- network of RSA Security (an American espionage.1 RSA’s CEO, Art Coviello, computer and network security com- stated the stolen SecurID information pany). Th e company had been founded “could potentially be used to reduce by Ron Rivest, Adi Shamir, and Leonard the eff ectiveness of a current two-factor Adleman, the inventors of the RSA public authentication implementation as part key cryptographic algorithm. Th is single of a broader attack (italics added).”2 Th is The US government event initiated an attack that would result proved to be an ominous prediction.
    [Show full text]
  • Sourcing the Arab Spring: a Case Study of Andy Carvin's Sources During the Tunisian and Egyptian Revolutions
    Sourcing the Arab Spring: A Case Study of Andy Carvin’s Sources During the Tunisian and Egyptian Revolutions Paper presented at the International Symposium on Online Journalism in Austin, TX, April 2012 Alfred Hermida Associate professor, Graduate School of Journalism, University of British Columbia Seth C. Lewis Assistant professor, School of Journalism & Mass Communication, University of Minnesota Rodrigo Zamith Doctoral student, School of Journalism & Mass Communication, University of Minnesota Contact: Alfred Hermida UBC Graduate School of Journalism 6388 Crescent Road Vancouver, BC, V6T 1Z2 Canada Tel: 1 604 827 3540 E-mail: [email protected] Abstract This paper presents a case study on the use of sources by National Public Radio's Andy Carvin on Twitter during key periods of the 2011 Tunisian and Egyptian uprisings. It examines the different actor types on the social media platform to reveal patterns of sourcing used by the NPR social media strategist, who emerged as a key broker of information on Twitter during the Arab Spring. News sourcing is a critical element in the practice of journalism as it shapes from whom journalists get their information and what type of information they obtain. Numerous studies have shown that journalists privilege elite sources who hold positions of power in society. This study evaluates whether networked and distributed social media platforms such as Twitter expand the range of actors involved in the construction of the news through a quantitative content analysis of the sources cited by Carvin. The results show that non-elite sources had a greater influence over the content flowing through his Twitter stream than journalists or other elite sources.
    [Show full text]
  • Introduction Points
    Introduction Points Ahmia.fi - Clearnet search engine for Tor Hidden Services (allows you to add new sites to its database) TORLINKS Directory for .onion sites, moderated. Core.onion - Simple onion bootstrapping Deepsearch - Another search engine. DuckDuckGo - A Hidden Service that searches the clearnet. TORCH - Tor Search Engine. Claims to index around 1.1 Million pages. Welcome, We've been expecting you! - Links to basic encryption guides. Onion Mail - SMTP/IMAP/POP3. ***@onionmail.in address. URSSMail - Anonymous and, most important, SECURE! Located in 3 different servers from across the globe. Hidden Wiki Mirror - Good mirror of the Hidden Wiki, in the case of downtime. Where's pedophilia? I WANT IT! Keep calm and see this. Enter at your own risk. Site with gore content is well below. Discover it! Financial Services Currencies, banks, money markets, clearing houses, exchangers. The Green Machine Forum type marketplace for CCs, Paypals, etc.... Some very good vendors here!!!! Paypal-Coins - Buy a paypal account and receive the balance in your bitcoin wallet. Acrimonious2 - Oldest escrowprovider in onionland. BitBond - 5% return per week on Bitcoin Bonds. OnionBC Anonymous Bitcoin eWallet, mixing service and Escrow system. Nice site with many features. The PaypalDome Live Paypal accounts with good balances - buy some, and fix your financial situation for awhile. EasyCoin - Bitcoin Wallet with free Bitcoin Mixer. WeBuyBitcoins - Sell your Bitcoins for Cash (USD), ACH, WU/MG, LR, PayPal and more. Cheap Euros - 20€ Counterfeit bills. Unbeatable prices!! OnionWallet - Anonymous Bitcoin Wallet and Bitcoin Laundry. BestPal BestPal is your Best Pal, if you need money fast. Sells stolen PP accounts.
    [Show full text]
  • Reporting, and General Mentions Seem to Be in Decline
    CYBER THREAT ANALYSIS Return to Normalcy: False Flags and the Decline of International Hacktivism By Insikt Group® CTA-2019-0821 CYBER THREAT ANALYSIS Groups with the trappings of hacktivism have recently dumped Russian and Iranian state security organization records online, although neither have proclaimed themselves to be hacktivists. In addition, hacktivism has taken a back seat in news reporting, and general mentions seem to be in decline. Insikt Group utilized the Recorded FutureⓇ Platform and reports of historical hacktivism events to analyze the shifting targets and players in the hacktivism space. The target audience of this research includes security practitioners whose enterprises may be targets for hacktivism. Executive Summary Hacktivism often brings to mind a loose collective of individuals globally that band together to achieve a common goal. However, Insikt Group research demonstrates that this is a misleading assumption; the hacktivist landscape has consistently included actors reacting to regional events, and has also involved states operating under the guise of hacktivism to achieve geopolitical goals. In the last 10 years, the number of large-scale, international hacking operations most commonly associated with hacktivism has risen astronomically, only to fall off just as dramatically after 2015 and 2016. This constitutes a return to normalcy, in which hacktivist groups are usually small sets of regional actors targeting specific organizations to protest regional events, or nation-state groups operating under the guise of hacktivism. Attack vectors used by hacktivist groups have remained largely consistent from 2010 to 2019, and tooling has assisted actors to conduct larger-scale attacks. However, company defenses have also become significantly better in the last decade, which has likely contributed to the decline in successful hacktivist operations.
    [Show full text]
  • Hertford College News
    Hertford College News Issue 24, 2013 Bridge Centenary Special David Stuart: Improved vaccine The importance of being an intern 50723 Aug 13Issue24 v3.indd 1 07/08/2013 12:28 Contents 3 Principal’s Column: Sustaining openness 4 Development News: Bridge Centenary Celebrations 5 Development News: From the Members’ and Development Office 5 Economics Fellowship Fundraising: Update 6 Alumni Events 8 College News: Hertford at a glance 10 Hertford Matters: The long path towards an improved vaccine 12 Bridge Centenary: Sermons in stones 13 Bridge Centenary: Notes from the architect 14 Bridge Centenary: Bridge memories 16 Hertford Matters: The importance of being an intern 14 18 Student Showcase 6 20 Dates For Your Diary Hertford College News is published by the Members’ and Development Office for members and friends of the College. The opinions expressed are those of the writers and not necessarily the official views of Hertford College. 10 Editors: Anna Baskerville and Emma Pritchard Layout & design: Anna Baskerville 8 Cover photo: Phil Kelly Produced by: Members’ and Development Office Hertford College Oxford OX1 3BW T: +44 (0) 1865 279428 E: [email protected] W: www.hertford.ox.ac.uk Hertford College is a registered charity: number 1137527 12 SATURDAY 28TH SEPTEMBER 2013 Bridge Centenary Party Food, Drink and Live Music! For more information please visit www.hertford.ox.ac.uk/bridge100 Contents 2 50723 Aug 13Issue24 v3.indd 2 07/08/2013 12:28 The essence of innovation is serendipity. It is the chance encounter, remark or challenge that triggers the innovative connection between Sustaining openness previously unconnected ideas to produce a new thought.
    [Show full text]
  • Jeremy Hammond from Wikipedia, the Free Encyclopedia
    Jeremy Hammond From Wikipedia, the free encyclopedia Jeremy Hammond (born January 8, 1985) is a political hacktivist and Jeremy Hammond computer hacker from Chicago. He was convicted and sentenced[1] in November 2013 to 10 years in US Federal Prison for hacking the private intelligence firm Stratfor and releasing the leaks through the whistle-blowing website WikiLeaks.[2][3] He founded the computer security training website HackThisSite[4] in 2003.[5] Contents 1 Background 1.1 Childhood 1.2 Education 1.3 Music 1.4 Career 2 Activism 2.1 Computer security 3 Arrests and activist history 3.1 Marijuana arrests 3.2 RNC 2004 Born Jeremy Hammond 3.3 Occupy Wicker Park January 8, 1985 3.4 Anti-Nazi protesting Chicago, Illinois 3.5 Chicago Pride Parade 3.6 Protest Warrior Relatives Jason Hammond (twin 3.7 Protesting Holocaust denier David Irving brother) 3.8 Olympic protest Website freejeremy.net 3.9 Stratfor case 4 Support hackthissite.org 5 See also 6 References 7 External links Background Childhood Hammond was raised in the Chicago suburb of Glendale Heights, Illinois, with his twin brother Jason.[4][6] Hammond became interested in computers at an early age, programming video games in QBasic by age eight, and building databases by age thirteen.[4][7] As a student at Glenbard East High School in the nearby suburb of Lombard, Hammond won first place in a district-wide science competition for a computer program he designed.[4] Also in high school, he became a peace activist, organizing a student walkout on the day of the Iraq invasion and starting a student newspaper to oppose the Iraq War.
    [Show full text]
  • Credit Where It's Due How to Revive Bank Lending to British Small And
    November 2011 Credit WWWhereWhere IIIt’sIt’s DDDueDueueue How to revive bank lending to British Small and Medium Sized Enterprises Will Hutton and Kenneth Peasnell The Big Innovation Centre is an initiative of The Work Foundation and Lancaster University. Launched in September 2011, it brings together a range of companies, trusts, universities and public bodies to research and propose practical reforms with the ambition of making the UK a global open innovation hub as part of the urgent task of rebalancing and growing the UK economy, and with the vision of building a world-class innovation and investment ecosystem by 2025. For further details please visit www.biginnovationcentre.com Introduction and Summary The short-run objective: to increase the probability that funds released into the banking system by quantitative easing more directly influence both the risk appetite of banks for lending to small and medium sized enterprises (SMEs), along with their capability to lend rather than being hoarded, used to refinance investment banking activities, or simply disappearing out of the country into overseas lending. The longer-run opportunity: to create an enduring mechanism that will encourage banks to increase lending to the kinds of innovative SMEs that are under-nourished by the current banking system but essential if the UK is to grow and rebalance its economy (Hutton and Nightingale, 2011). The proposal: for the Treasury to create Special Purpose Vehicles (SPVs) that will purchase high-quality SME debt originated by individual banks, and for the SPV to issue tranches of debt in turn, in the form of asset-backed securities (ABSs) with decreasing orders of claim on its portfolio of assets.
    [Show full text]