2016 Tese Sspinho.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

2016 Tese Sspinho.Pdf 0 UNIVERSIDADE FEDERAL DO CEARÁ CENTRO DE HUMANIDADES DEPARTAMENTO DE CIÊNCIAS SOCIAIS PROGRAMA DE PÓS-GRADUAÇÃO EM SOCIOLOGIA SILVANA DE SOUSA PINHO MOVIMENTOS DE PROTESTOS VIRTUAIS DA ANONYMOUS NO BRASIL: UNIDOS COMO UM E DIVIDIDOS POR FAKES FORTALEZA 2016 1 SILVANA DE SOUSA PINHO MOVIMENTOS DE PROTESTOS VIRTUAIS DA ANONYMOUS NO BRASIL: UNIDOS COMO UM E DIVIDIDOS POR FAKES Tese apresentada ao Programa de Pós- graduação em Sociologia da Universidade Federal do Ceará, como parte dos requisitos para a obtenção do título de Doutora em Sociologia. Área de concentração: Cultura, Política e Conflitos Sociais. Orientador: Prof. Dr. Jawdat Abu-El-Haj FORTALEZA 2016 2 Dados Internacionais de Catalogação na Publicação Universidade Federal do Ceará Biblioteca de Ciências Humanas P724mPinho, Silvana de Sousa. Movimentos de protestos virtuais da Anonymous no Brasil: unidos como um e divididos por fakes / Silvana de Sousa Pinho. – 2016. 243 f. : il. color., enc. ; 30 cm. Tese (doutorado) – Universidade Federal do Ceará, Centro de Humanidades, Departamento de Ciências Sociais, Programa de Pós-Graduação em Sociologia, Fortaleza, 2016. Área de Concentração: Cultura, política e conflitos sociais. Orientação: Prof. Dr. Jawdat Abu-El-Haj. 1.Movimentos de protesto – Brasil. 2.Manifestações públicas – Brasil. 3.Redes sociais on-line – Aspectos sociais – Brasil. 4.Hackerativismo – Brasil. 5.Internet – Aspectos políticos – Brasil. 6.Anonymous(Grupo). I. Título. CDD 303.4840981 3 SILVANA DE SOUSA PINHO MOVIMENTOS DE PROTESTOS VIRTUAIS DA ANONYMOUS NO BRASIL: UNIDOS COMO UM E DIVIDIDOS POR FAKES Tese apresentada ao Programa de Pós- graduação em Sociologia da Universidade Federal do Ceará, como parte dos requisitos para a obtenção do título de Doutora em Sociologia. Área de concentração: Cultura, Política e Conflitos Sociais. Área de concentração: Cultura, Política e Conflitos Sociais. Aprovada em: ___/___/___ BANCA EXAMINADORA ______________________________________ Prof. Dr. Jawdat Abu-El-Haj (Orientador) Universidade Federal do Ceará - UFC _______________________________________ Prof.ª Dra. Linda Maria de Pontes Gondim Universidade Federal do Ceará – UFC _______________________________________ Prof.ª Dra. Maria Juraci Maia Cavalcante Universidade Federal do Ceará – UFC _______________________________________ Prof.ª Dr. José Ernandi Mendes Universidade Estadual do Ceará – UECE _______________________________________ Prof.ª Dr. Marcelo Natividade Tavares Universidade de São Paulo - USP 4 À minha filha, Yagna Pinho Galvão, que durante esta pesquisa me ensinou que “estarmos próximas” é diferente de “estarmos juntas”. 5 AGRADECIMENTOS O meu agradecimento especial para esta Tese vai para o meu orientador, prof. Dr. Jawdat Abu-El-Haj, pelo incentivo, confiança e suas preciosas orientações. Agradeço a todos os professores do Programa de Pós-Graduação que, de modo direto ou indireto, contribuíram para o desenvolvimento desta pesquisa. Agradeço à Universidade Estadual do Ceará, em especial pela implantação da política de estimulo à qualificação profissional, que concedeu licença para a realização deste curso. Agradeço à CAPES, que contribuiu com uma bolsa de estudos. Agradeço ao meu companheiro, Jair Galvão, pelos inúmeros debates que travamos sobre o tema da minha pesquisa. Agradeço à minha filha Yagna, por ter compreendido as minhas ausências para o desenvolvimento desta pesquisa. 6 “A utopia está no horizonte. Aproximo-me dois passos, ela se afasta dois passos. Caminho dez passos e o horizonte se distancia dez passos mais além. Para que serve a utopia? Serve para isso: para caminhar.” Eduardo Galeano 7 RESUMO A presente Tese, intitulada “Movimentos de protestos virtuais da Anonymous no Brasil: unidos como um e divididos por fakes”, apresenta um estudo analítico da Rede de Protestos Anonymous, desde seus primórdios, no site 4chan, até os protestos contra a Copa do Mundo no Brasil - 2014, tendo como ápice as Manifestações de Junho de 2013, nas quais a Anonymous teve influente participação, tanto por meio de práticas de ativismo online quanto em ações diretas, offline. O ideário Anonymous é caracterizado por uma forma de luta política que objetiva alcançar a emancipação humana por meio da hiperdemocracia, tecnocracia, total liberdade de expressão, informação e comunicação. O processo de conquista deste ideário se daria pela prática de novos modelos de mobilizações sociais, ou seja, por um processo educativo autônomo, autovigilante, anônimo, que se desenvolveria num movimento horizontal, sem lideranças, sem interferências de partidos políticos e sem ideologias. Este modelo se diferencia da forma de luta política do século XX, caracterizada pela tradicional dicotomia entre esquerda e direita, movimentos com lideranças verticalizadas, personalistas e guiadas por tendências ideológicas explícitas. No intuito de compreender o desenvolvimento das ações de protestos Anonymous no Brasil, utilizou-se como base empírica de pesquisa diversas fontes virtuais, tais como páginas do Facebook e canais do Youtube das células de Anonymous no Brasil e exterior, além de observação dos protestos de rua, “Operação 7 de setembro” e a “Operação Não vai ter Copa”, e entrevistas com ativistas Anonymous. O processo de análise das fontes foi ponderado pelo estudo dos conteúdos e das diversas formas de linguagens utilizadas nas ações ciberativistas. Verificou-se que o desenvolvimento da luta política com base no ideário Anonymous, na medida em que se propôs a romper com o modelo tradicional de movimento político, apesar de agregar significativo número de ativistas, o ideário Anonymous não foi compreendido pela maioria de seus seguidores e ativistas. A própria forma de criação das células Anonymous no Brasil teve um início desvirtuado, tendo sido conduzido de modo verticalizado, em cujo anonimato permitiu que os ativistas seguissem planos estabelecidos por pequenos grupos ou organizações desconhecidas, bem como a apropriação das células Anonymous por fakes, que conduziram determinadas mobilizações orientadas por interesses políticos, partidários e ideológicos. Tal fato resultou em divisões, rupturas e denúncias por partes de algumas células. Por exemplo, a Anonymous FUEL, que continuou ativa, mas com uma postura vigilante em relação ao ideário Anonymous, bem como as células Anonymous Paraná e Anonymous Curitiba, que se declararam inativas, dadas a deturpação de ativistas Anonymous que passaram a assumir 8 causas militaristas e golpistas. Para fins deste estudo, a metodologia utilizada teve como referência a análise de discurso de Bakhtin (2002) e Ducrot (1987). Para temas que permeiam o estudo, como o ciberespaço, hackerativismo, pós-modernidade e movimentos sociais, utilizou-se como base teórica as contribuições de Castells (2003), Lévy (1999), Melucci (1989), Tilly (1978), Vegh (2003), Harvey (2008), Santos (2000), (2002), Giddens (1991) e Beck (2000). Palavras-chave: Movimentos de protestos virtuais. Anonymous Brasil. Ciberativismo. Hackerativismo. Ativismo digital. 9 ABSTRACT This thesis, entitled "Movement of virtual protests by the Anonymous in Brazil: united as one and divided by fakes," presents an analytical evaluation of the Anonymous Protests Network, since its inception, in the site 4chan, to show dissent against the World Cup Brazil - 2014, having reached its peak in the June 2013 Demonstrations, in which Anonymous had influential participation, either through online activism practices as in direct actions offline. The ideology supporting Anonymous is characterized by a form of political struggle which aims at achieving human emancipation through hiper-democracy, technocracy and complete freedom of expression, information and communication. The process of a successful establishment of these ideas would take place through the practice of new models of social mobilization, that is, by an autonomous educational process - self-vigilant, anonymous - which would develop a horizontal movement without leaders, without interference from political parties and without ideologies. This model differs from the political form of struggle of the twentieth century, characterized by the traditional split between left and right movements with leaders in a personality vertical hierarchal power line, guided by explicit ideological tendencies. In order to understand the development of the Anonymous protest actions in Brazil, it was used as a empirical research base several virtual sources such as Facebook pages and YouTube channels of Anonymous cells in Brazil and abroad, as well as observation of street protests, such as "Operation September 7" and "Operation No World Cup", besides interviews with Anonymous activists. The process of analysis of the sources was weighted by the study of the contents and the various forms of languages used in the actions of cyberactivists. It was found that the development of political struggles based on ideas spawned by Anonymous, as far as it proposes to break the traditional model of political action, in spite of counting with significant number of activists, the Anonymous ideology was not understood by most of his followers and activists. The very form of creating Anonymous cells in Brazil had a distorted start and was conducted in vertical fashion, anonymity allowing activists to follow plans established by small groups or unknown organizations, as well as appropriation of Anonymous cells by fakes, which led to certain mobilizations guided by political interests of a partisan and ideological nature. This fact resulted in divisions, ruptures and complaints
Recommended publications
  • How China Will Use Cyber Warfare to Leapfrog in Military Competitiveness Jason Fritz
    Culture Mandala: The Bulletin of the Centre for East-West Cultural and Economic Studies The Bulletin of the Centre for East-West Cultural and Economic Studies Volume 8 | Issue 1 Article 2 10-1-2008 How China will use cyber warfare to leapfrog in military competitiveness Jason Fritz Follow this and additional works at: http://epublications.bond.edu.au/cm Recommended Citation Fritz, Jason (2008) "How China will use cyber warfare to leapfrog in military competitiveness," Culture Mandala: The Bulletin of the Centre for East-West Cultural and Economic Studies: Vol. 8: Iss. 1, Article 2. Available at: http://epublications.bond.edu.au/cm/vol8/iss1/2 This Article is brought to you by the Centre for East-West Cultural and Economic Studies at ePublications@bond. It has been accepted for inclusion in Culture Mandala: The ulB letin of the Centre for East-West Cultural and Economic Studies by an authorized administrator of ePublications@bond. For more information, please contact Bond University's Repository Coordinator. How China will use cyber warfare to leapfrog in military competitiveness Abstract Extract: The eP ople’s Republic of China (PRC) may be a global power economically but its military lacks force projection beyond the Asia Pacific er gion. Its traditional military hardware is one to three generations behind the US and Russia. In light of these deficiencies it is probable that cyber warfare will provide China with an asymmetric advantage to deter aggression from stronger military powers as they catch up in traditional military capabilities. Cyber warfare would also allow China to leapfrog by means of technology transfer and exploiting adversary weaknesses.
    [Show full text]
  • Scientology: CRIMINAL TIME TRACK ISSUE I by Mike Mcclaughry 1999
    Scientology: CRIMINAL TIME TRACK ISSUE I by Mike McClaughry 1999 The following is a Time Track that I put together for myself and some friends at the time, in 1999. I originally used the pseudonym “Theta” at the request of Greg Barnes until he was ready to “go public” with his defection from Scientology. I also used the pseudonym “Theta 8-8008” around this same time period. Bernd Luebeck, Ex-Guardian’s Office Intelligence and then Ron’s Org staff ran the website www.freezone.org. In 1999, just after my time track was released privately, Bernd used it on his website as-is. He later expanded on my original time track with items of interest to himself. Prior to my doing this time track, Bernd, (nor anyone else involved with Scientology on the internet), had ever thought of the idea to do things this way in relation to Scientology. Mike McClaughry BEGIN An open letter to all Scientologists: Greetings and by way of introduction, I am a Class 8, OT 8, who has been in the Church for many decades and I am in good standing with the Church. I am a lover of LRH’s technology and that is my motivation in writing you and in doing what I am now doing. It came to my attention, sometime in the not too distant past, that the current top management of the Church, particularly David Miscavige, is off source. One of the ways he is off-source is that he has made the same mistake as the old Guardian’s Office staff made, engaging in criminal activities to solve problems.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Linking Cases Worldwide – a Comprehensive Overview By
    Linking Cases Worldwide – A Comprehensive Overview By Stephan Ott Version 1.1. (August 2003) 2 Inhaltsverzeichnis Links to Illegal Material / Liability ........................................................................................ 5 DeCSS – Cases: Universal City Studios, Inc. v. Reimerdes and DVD Copy Control Association, Inc. v. Andrew Bunner................................................................................... 5 Intellectual Reserve Inc. v. Tanners ................................................................................. 23 Bernstein v. J.C Penney ................................................................................................... 25 IFPI Schweden v. Tommy Olssen .................................................................................... 27 Direct links into Peer-2-Peer networks............................................................................. 28 Austropersonal.com / Jobmonitor.com............................................................................. 29 Sir Elton John v. Countess Joulebine................................................................................ 29 Warez.at .......................................................................................................................... 29 Google v. Scientology...................................................................................................... 30 Deutsche Bahn v. AltaVista, Google, Yahoo.................................................................... 31 Deutsche Bahn v. XS4ALL.............................................................................................
    [Show full text]
  • Exhibit N.DOC
    Page 1 1 of 1 DOCUMENT Copyright 2010 The Washington Post All Rights Reserved The Washington Post April 21, 2010 Wednesday Suburban Edition SECTION: A-SECTION; Pg. A15 DISTRIBUTION: Maryland LENGTH: 692 words HEADLINE: Google hackers duped company personnel to penetrate networks; Cyberattacks growing more sophisticated, experts say BYLINE: Ellen Nakashima BODY: The hackers who penetrated the computer networks of Google and more than 30 other large companies used an in- creasingly common means of attack: duping system administrators and other executives who have access to passwords, intellectual property and other information, according to cybersecurity experts familiar with the cases. "Once you gain access to the directory of user names and passwords, in minutes you can take over a network," said George Kurtz, worldwide chief technology officer for McAfee, a Silicon Valley computer security firm that has been working with more than half a dozen of the targeted companies. Kurtz and others said hackers are mounting ever more sophisticated and effective attacks that often begin with a ruse familiar to many computer users -- a seemingly innocuous link or attachment that admits malicious software. The attacks were publicized in January when Google, one of the world's most advanced tech firms, announced that intruders had penetrated its network and compromised valuable intellectual property. Google asserted that the attacks originated in China; Chinese officials say they are investigating. The New York Times reported on its Web site Monday that the Google theft included source code for a password system that controls access to almost all of the company's Web services. But the cyber-espionage campaign went far beyond Google, targeting companies with apparently strong intrusion- detection systems, including Adobe, Northrop Grumman and Yahoo, industry sources said.
    [Show full text]
  • Church of Scientology Judicial Review
    HO.ME OFFICE - Feu 03 0001/0029/003/ -.." RELATED PAPERS FILE BEGINS: __ __ ENDS: FILE TITLE: - : POLICY (REVIEW AFTER 25 YEARS) CULTS I NEW RELIGIOUS MOVEMENTS s: . '- CHURCH OF SCIENTOLOGY JUDICIAL REVIEW - SEND TO I DATE - SEND TO DATE SEND TO -- DATE . ZO,3 -. , - -- 0 0 - -- 0 . 0 - " -0 . 0 0 -- 0 HOF000647241 ese 8111 .. .. --- _ .. - - - -- - -- - _. , - AnnexA Press Office to take Subject: Judicial Review Case: Recognition of Scientology as a religion in prison Tuesday 21 October - permissions hearing for a judicial review on HRA grounds of Prison Service policy not to recognise Scientology as a religion for the purpose of facilitating religious ministry in prisons. Background Prisoner Roger Charles Heaton and the Church of Scientology have made an application for jUdicial review of this policy. Unes to take The applicants, having seen our witness statement and outline argument, have offered to withdraw their case, with no order as to costs. This means that the non-recognition policy being followed by prison service is reasonable .and secure. It has been our long-standing policy to withhold recognition of scientology as a religion. However, in order to meet the needs of individual prisoners, the Prison Service allows any prisoner registered as a Scientologist to have access to a representative of the Church of Scientology if he wishes to receive its ministry. This is the approach which was followed in the case of Mr Heaton. The Home Office considers that its policy respects the rights of Mr Heaton under the ECHR and is reasonable in view of concerns of which the department is aware about some of the practices of the Church.
    [Show full text]
  • The Church of Scientology
    The Church of Scientology | Profile | Beliefs | Current Issues | Links | References | I. Group Profile | Biography | History | Sacred or Revered Texts | Size | Organization | 1. Name: Church of Scientology Scientology means "knowing about knowing," from the Latin word scio and the Greek word logos. 1 2. Founder: Lafayette Ronald (L. Ron) Hubbard 3. Date of Birth/Death: March 13, 1911/January 24, 1986 4. Birth Place: Tilden, Nebraska 5. Year Founded: 1954 6. Biography of Founder: According to texts published by the Church of Scientology and its web page pertaining primarily to its founder, L. Ron Hubbard, always referred to as L. Ron by Scientologists, experienced early in his life the many facets of the human mind. At the age of 12, he learned from Commander Joseph C. Thompson, who was the first military official to study under Sigmund Freud in Vienna, Austria, the theory of psychoanalysis. Hubbard was also influenced by his many world journeys to exotic locales, thus gaining an appreciation for Eastern philosophies rooted in Hinduism, Buddhism, and Taoism. His studies in mathematics, engineering, and nuclear physics at George Washington University generated a scientific background to his beliefs in the human mind, although his studies did not earn him a degree. As a naval officer during World War II, he suffered injuries that left him blind and crippled. During his recovery, he once again examined Freudian psychoanalytical theory and Eastern philosophies. He credits the eventual cure of his disabilities to his findings about the human mind during this time, findings that became the central elements of a religious doctrine he later called Dianetics.
    [Show full text]
  • De Opkomst En Transformatie Van De Online Sociale Beweging Anonymous
    Revolutie ‘for the lulz’. De opkomst en transformatie van de online sociale beweging Anonymous Justus Uitermark Anonymous is een doorlopend transformerende virtuele zwerm die zich tijdelijk for‐ meert rond uiteenlopende collectieve acties op het internet. De beweging maakte het leven van tieners kapot met online treiterei maar schoot ook Tunesiërs te hulp toen Ben Ali’s regime de Jasmijnrevolutie probeerde neer te slaan. Hoe kan het dat Anonymous zonder formele leiders, organisatiestructuur, toelatingseisen of regels toch in staat is tot grootschalige, risicovolle en strategische collectieve actie? En kunnen we verklaren dat Anonymous bij de ene actie zich uitput in hoogdravende idealen terwijl de beweging het volgende moment een sadistische wreedheid aan de dag legt? Social and political change has always been enacted, everywhere and at all times, from a myriad of gratuitous actions, sometimes uselessly heroic (Castells, 2009, p. 2) Op 12 juni 2006, de verjaardag van Bill Cosby, werd Habbo Hotel – een virtuele ontmoetingsplek voor tieners – overspoeld door duizenden ‘nigra’s,’ zwarte man‐ nen met Afrokapsels en discokleding. De nigra’s maakten een menselijke muur rond zwembaden en vormden swastika’s 1. Toen de moderators van Habbo Hotel de nigra’s verwijderden, klonken beschuldigingen van willekeur en racisme. De nigra’s verspreidden zich, doken onder in bibliotheken en privékamers, om later hun stormloop op de zwembaden te hervatten. Een jaar later waren de nigra’s terug, met nog meer opzwepende en bizarre retoriek. In een absurdistische paro‐ die op “the million men march” van Martin Luther King, blokkeerden de nigra’s Habbo’s zwembaden “to stop the AIDS!” en tegen het racisme van de Habbo- moderators.
    [Show full text]
  • Scientology : Vrijheden in Conflict
    Pieter Blondeel 2e licentie moraalwetenschappen: optie morele begeleiding Stamnummer: 20002337 Academiejaar 2004-2005 Datum: Maandag 1 Augustus 2005 Licentiaatverhandeling SCIENTOLOGY : VRIJHEDEN IN CONFLICT Universiteit Gent Faculteit Letteren en Wijsbegeerte Promotor: Johan Braeckman Commissarissen: Luc De Droogh & Freddy Mortier Woord vooraf: Een van de redenen waarom ik Scientology als thesisonderwerp kies, is dat ik er als vijftienjarige - in 1997 - voor het eerst in contact mee ben gekomen. Al surfend op het internet kwam ik terecht op een website waar je een gratis persoonlijkheidstest kon afnemen, die nadien door een team van experts grondig onder de loep zou worden genomen. Die kon je enkel aanvragen door je naam, adres en telefoonnummer op te geven. In plaats van een persoonlijkheidstest kreeg ik een brief toegestuurd vanwege de Kerk van Scientology, die me uitnodigde naar hun dichtstbijzijnde afdeling – in Brussel – te gaan, om daar de test af te nemen. Ik besloot hier niet op te reageren. Voor mij persoonlijk was het woord Kerk hierin doorslaggevend, gezien mijn atheïstische overtuiging. Enkele weken later kreeg ik een telefoontje van iemand van diezelfde Kerk: een vriendelijke dame die me vroeg waarom ik niet had gereageerd op de brief en me daarop nog eens uitnodigde een gratis persoonlijkheidstest af te nemen in Brussel. Ook hier ging ik niet op in. Later kreeg ik af en toe nog een brief toegestuurd vanwege de Kerk van Scientology die me uitnodigde om eens een kijkje te gaan nemen in hun afdeling in Brussel. Nieuwsgierig ging ik op zoek naar informatie over die organisatie, vooral met behulp van het internet. De informatie die ik daar vond, was heel uiteenlopend: van heel sterke 'anti- sites' tot 'pro-sites' die reclame maakten voor Scientology.
    [Show full text]
  • Sauter DDOS Activism Thesis May 2013
    DISTRIBUTED DENIAL OF SERVICE ACTIONS AND THE CHALLENGE OF CIVIL DISOBEDIENCE ON THE INTERNET By Molly Sauter Submitted to the Program in Comparative Media Studies/Writing on May 17, 2013 in Partial Fulfillment of the Requirements for the Degree of Master of Science in Comparative Media Studies ABSTRACT This thesis examines the history, development, theory, and practice of distributed denial of service actions as a tactic of political activism. DDOS actions have been used in online political activism since the early 1990s, though the tactic has recently attracted significant public attention with the actions of Anonymous and Operation Payback in December 2010. Guiding this work is the overarching question of how civil disobedience and disruptive activism can be practiced in the current online space. The internet acts as a vital arena of communication, self expression, and interpersonal organizing. When there is a message to convey, words to get out, people to organize, many will turn to the internet as the zone of that activity. Online, people sign petitions, investigate stories and rumors, amplify links and videos, donate money, and show their support for causes in a variety of ways. But as familiar and widely accepted activist tools—petitions, fundraisers, mass letter-writing, call-in campaigns and others—find equivalent practices in the online space, is there also room for the tactics of disruption and civil disobedience that are equally familiar from the realm of street marches, occupations, and sit-ins? This thesis grounds activist DDOS historically, focusing on early deployments of the tactic as well as modern instances to trace its development over time, both in theory and in practice.
    [Show full text]
  • The Coming Swarm: Ddos, Hacktivism, and Civil Disobedience
    The Coming Swarm ii ADDITIONAL PRAISE FOR THE COMING SWARM The Internet is changing the nature of civil disobedience. Molly Sauter’s book is an interesting and important discussion of political denial-of-service attacks: what has come before, and what’s likely to come in the future.” “ BRUCE SCHNEIER, author of Liars and Outliers: Enabling the Trust that Society Needs to Thrive and Schneier on Security In The Coming Swarm, Molly Sauter provides deep historical and philosophical context to online ‘denial of service’ attacks, examining the participants’ motivations and their portrayals in the media, whether as terrorist, hacker, “artist, or nuisance.” CLAY SHIRKY, Associate Professor, NYU, US, and author of Here Comes Everybody The Coming Swarm DDoS Actions, Hacktivism, and Civil Disobedience on the Internet MOLLY SAUTER Bloomsbury Academic An imprint of Bloomsbury Publishing Inc NEW YORK • LONDON • NEW DELHI • SYDNEY Bloomsbury Academic An imprint of Bloomsbury Publishing Inc 1385 Broadway 50 Bedford Square New York London NY 10018 WC1B 3DP USA UK www.bloomsbury.com Bloomsbury is a registered trade mark of Bloomsbury Publishing Plc First published 2014 © Molly Sauter, 2014 This work is published subject to a Creative Commons Attribution Noncommercial Share Alike Licence. You may share this work for non-commercial purposes only, provided you give attribution to the copyright holder and the publisher. For permission to publish commercial versions please contact Bloomsbury Academic. No responsibility for loss caused to any individual or organization acting on or refraining from action as a result of the material in this publication can be accepted by Bloomsbury or the author.
    [Show full text]
  • English; Between 5 to 10 Per Cent of Content Comes from Non-Western Countries – Although the Developing World Makes up 80 Per Cent of the World Population
    From Quill The Representative on to Cursor Freedom of the Media Freedom of the Media in the Digital Era Papers from the Workshop on Freedom of the Media and the Internet Vienna, 30 November 2002 VIENNA 2003 REPRESENTATIVE ON FREEDOM OF THE MEDIA From Quill to Cursor Freedom of the Media in the Digital Era Papers from the Workshop on Freedom of the Media and the Internet Vienna, 30 November 2002 Vienna 2003 The cover is a drawing entitled Des Schreibers Hand (The Writer’s Hand) by the German author and Nobel prize laureate (1999) Günter Grass. He has kindly let our Office use this as a label for publications of the OSCE Representative on Freedom of the Media. The drawing was created in the context of Grass’s novel Das Treffen in Telgte, dealing with literary authors at the time of the Thirty Years War. The publisher thanks the Netherlands for its financial support to this publication © 2003 Organization for Security and Co-operation in Europe (OSCE) Office of the Representative on Freedom of the Media Kärntner Ring 5-7, Top 14, 2. DG, A-1010 Vienna Telephone: +43-1 512 21 450 Telefax: +43-1 512 21 459 E-mail: [email protected] The authors retain rights on the essay texts. Photograph on the cover: AP, Ng Han Guan Design: WerkstattKrystianBieniek, Vienna Printed by Eugen Ketterl, Vienna Contents Freimut Duve Preface 7 Karin Spaink Introduction - From Quill to Cursor: Freedom of the Media in the Digital Era 9 Verena Metze-Mangold Universal Access to Cyberspace: Strategies of the Intergovernmental Council of the Information for All Programme (IFAP/UNESCO) 31 Páll Thórhallsson Freedom of the Media and the Internet 49 Sandy Starr The Diminishing Importance of Constitutional Rights in the Internet Age 57 Jennifer Jenkins The Importance of Public Domain for Creativity, Innovation, and Culture in the Digital Age 73 Felipe Rodriquez Burning the Village to Roast the Pig: Censorship of Online Media 85 Glossary 110 The Authors 116 Freimut Duve Preface The Internet offers an unprecedented means for people all over the world to distribute, exchange and access information.
    [Show full text]