Magnus Lawrie TRASH VERSIONALITY for POST

Total Page:16

File Type:pdf, Size:1020Kb

Magnus Lawrie TRASH VERSIONALITY for POST Magnus Lawrie TRASH VERSIONALITY FOR POST-DIGITAL CULTURE APRJA Volume 3, Issue 1, 2014 ISSN 2245-7755 CC license: ‘Attribution-NonCommercial-ShareAlike’. Magnus Lawrie: TRASH VERSIONALITY... Media Trash continual re-writing of the standards affect- ing social and network-based encounter. The processes renew shared conceptions RHETORIC and pictures, prompt self-refection and pose Following a 14-day visit to parts of the UK, the questions, “whose truth?” and, “whose the United Nations’ special rapporteur on value(s)?”. adequate housing Raquel Rolnik, issued an end-of mission press statement.[1] She INDISPENSABILITY recommended immediate suspension of As quickly as attention has switched away controversial reforms affecting social hous- from the aforementioned episodes, they offer ing tenants.[2] Researched according to us a snapshot of a media landscape in which UN protocol (Gentleman), the advice was trash, as dispensable news and information, however vehemently rejected by the UK is merging with public opinion and political government; the rapporteur’s personal and rhetoric. The combination of booming mass professional credibility were then attacked in culture and creativity produces a variety of the media and elsewhere.[3] images — including data images — which are These changing dynamics, between not easily locatable within the apparatus’ of public and political spheres are especially political, social and economic assemblages. visible online, where social media is infu- Consequently, these images (whether per- encing many areas. In one instance a court sonal or institutional) are open to conjecture. trial was abandoned after new evidence, Their position on the continuum between obtained from a disused Twitter account, media, platform and network transport ren- came to light. Details of the accused were ders them equivocal — ambiguous entities, nevertheless reported in print and on the where identity, trust and authenticity come Web.[4] Elsewhere, legal proceedings have under review. been derailed because of jurors’ activity on- These are issues which are problema- line (Davis). Incautious tweets have resulted tized in an artwork by Kripe, Schraffenberger in prosecutions for libel (BBC News). and Terpstra; The Formamat (2010) inves- This article attempts an overview of tigates the value individuals place on data phenomena, which exemplify informational they have stored on their mobile devices. The and conceptual instances (or ‘versions’) work is a vending machine, “which returns characteristic of current ‘post-digital’ condi- candy in exchange for the deletion of [an tions. By counter-posing a variety of mate- individual’s] digital data”. The authors, “invite rial, I aim to explore the role and position of people to experience the joy of deletion in a different kinds of images (foremost social public space and encourage them to think and visual) as they constitute post-digital about the value and (in-)dispensability of relations. These are relations in which the their fles while also researching the subject primacy of computerized digital objects is in a broader sense by storing and analysing moot. The versions presented in this text are their deletion-behavior.” (Formamat) the social, cultural and organizational confu- ences which fnd expression in differing data REVISION formats — originals and copies subject to With the hindsight of just a few years, The fuctuating, moment-to-moment alteration. Formamat can also be seen to capture Together with the growth in communica- uncertainties — of ownership and iden- tion and exchange, these versions imply a tifcation — in our relationship with data. 43 APRJA Volume 3, Issue 1, 2014 Our understanding of the work encounters was created to manage all the code for the an unexpected revision, reformulating the Linux kernel. It solves problems of ownership question, not of which, but of whose fles are and responsibility with its own purpose built going to be deleted. Taken together with the command: git-blame.[8] The command fnds Internet’s long memory — from the Internet the author of an edit or addition and reports Archive’s Way Back Machine[5] to play- when changes were made. This is one way fully macabre, assisted Facebook-identity in which Git addresses the techno-social suicides[6] — this observation underlines problems of making and releasing new ver- the attention now being given to choice and sions of the kernel image (the core of the control of data. Here, Nissenbaum’s ‘con- GNU/Linux operating system; a large-scale textual integrity’ is relevant. It advocates the project with more than nine million lines of individual’s right to manage the fow of their code). personal information, rather than exert ab- The Git software was created with solute control (Nissenbaum). The emphasis security, authentication and traceability as seems to be on the subjective way we value paramount concerns. Contributors to any information, where one person’s waste can Git-maintained project are encouraged to become another’s livelihood. advance development by regularly com- Such perspectives might be welcomed mitting smaller changes into a main line of by the Sunlight Foundation, known for co- development. Additions and revisions can ordinating crowd sourced analysis of US be written and tested in isolation before be- government records. Transparency initia- ing introduced to the main line or ‘branch’. tives like this commonly use Wikis to man- Copies of this branch become distributed age document revisions made by multiple as changes are written back to the comput- authors (Sifry). In the case of Wikipedia, ers of other developers as they also submit software for ‘version control’ becomes the their work. Files ‘checked out’ from the main image of a community and its knowledge, a development tree can be added to newly cre- refection of that community in code: ated branches. Typically, these development threads are later merged into the project’s People can and do trust works main branch or abandoned. In some in- produced by people they don’t know. stances, new branches diverge substantially The real world is still trying to fgure out from the main development effort. This is how Wikipedia works…Open source basically the concept of project forking. It is produced by people that you can’t might be apparent from this summary that track down, but you can trust it in very talk about governance in Git is necessarily deep ways. People can trust works also a discussion about technical operation. by people they don’t know in this low Issues of governance are also dealt cost communication environment. with in creative projects which utilize and (Cunningham qtd in many2many) discuss version control. Simon Yuill’s Social Versioning System [9] and Matthew Fuller VERSION CONTROL and Usman Haque’s Urban Versioning Other types of version control system System 1.0 [10] concern the relevance of (VCS) are useful, especially in co-ordinating Free Software principles to consensus and software development groups. The Linux co-operation in design practice: kernel project is one example. For this, a very specifc VCS was conceived: Git [7] 44 Magnus Lawrie: TRASH VERSIONALITY... Figure 1: “Benevolent dictator workfow”. Illustration. Figure 2: Marcosleal. “Matryoshka dolls in street fair n.d. Distributed-workfows, git-scm.com. Web. 29 Sep. – Budapest”. Photograph. 2008. Matryoshka dolls in 2013. Budapest.jpg. Wikimedia Commons. Web. 29 Sep. 2013. one of the most interesting aspects Social overload of open source software is the continuous interleaving of production, implementation, usage and repurpos- ETHICS AND ETIQUETTE ing processes, all of which can and Besides the sense of community that data sometimes must be open — not just an sharing in this way inspires, proliferating “open design” that then gets imple- codes also produce tensions. Where levels mented in a closed manner. (Fuller of interest from the public increase, the scale and Haque 17) and relative value of contributions can in turn challenge a project’s direction. WikiLeaks’ Soon after Git was released, GitHub [11] release in 2010 of hundreds of thousands appeared. Using the apparatus (the ‘plumb- of classifed US Army feld reports (the so- ing and porcelain’) which comprises the Git called Iraq War Logs) is an example where software, GitHub establishes a web-based the relevance and reliability of material have repository for software projects whose been key considerations (Domscheit-Berg). source code is released in the public domain. In other guises, this problem of managing GitHub has been adopted by a huge and contributions has been encountered in pro- rapidly expanding user community, as a plat- jects from Community Memory (an electronic form for developing and publishing software bulletin board), through to contemporary and a range of other creative works. GitHub hacker spaces and Open Source tech com- provides a large-scale, distributed means munities. In all these instances, it seems that to recognize and pin point different stages mutual agreement — whether or not this has in the production of these works. It has also been explicitly defned — is a central issue. become home to a mass of never changing, Arguments often focus on leadership, per- user-generated software confguration fles. sonal style and the possibility of ‘benevolent In GitHub these can be Git confguration dictatorship’ (Lovink). Though positive feed- fles, stored in a Git repository, on a platform back generated by self-enhancing ‘recursive built using Git. geek publics’ is not without drawbacks (Kelty), neither is it clear how this energy can work best — in the case of the Debian 45 APRJA Volume 3, Issue 1, 2014 Software Project there is the Debian Social apparatus’ (as well as the methods by which Contract,[12] enshrining free speech and they constitute one another) have gained enough hierarchy to manage the fow of con- visibility. Journalistic reporting of this data at tributions. Free speech has been central to frst underlined governments’ ability to track the development of Free-Libre Open Source and target individuals at will (for example, Software (Turner), as it has to the protocols by following calls and data from mobile and conduct written into projects such as phones).
Recommended publications
  • UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations
    UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations Title A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Permalink https://escholarship.org/uc/item/6w76f8x7 Author Swift, Kathy Publication Date 2017 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Santa Barbara A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Education by Kathleen Anne Swift Committee in charge: Professor Richard Duran, Chair Professor Diana Arya Professor William Robinson September 2017 The dissertation of Kathleen Anne Swift is approved. ................................................................................................................................ Diana Arya ................................................................................................................................ William Robinson ................................................................................................................................ Richard Duran, Committee Chair June 2017 A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Copyright © 2017 by Kathleen Anne Swift iii ACKNOWLEDGEMENTS I would like to thank the members of my committee for their advice and patience as I worked on gathering and analyzing the copious amounts of research necessary to
    [Show full text]
  • Sample Iis Publication Page
    https://doi.org/10.48009/1_iis_2012_133-143 Issues in Information Systems Volume 13, Issue 1, pp. 133-143, 2012 HACKERS GONE WILD: THE 2011 SPRING BREAK OF LULZSEC Stan Pendergrass, Robert Morris University, [email protected] ABSTRACT Computer hackers, like the group known as Anonymous, have made themselves more and more relevant to our modern life. As we create and expand more and more data within our interconnected electronic universe, the threat that they bring to its fragile structure grows as well. However Anonymous is not the only group of hackers/activists or hacktivists that have made their presence known. LulzSec was a group that wreaked havoc with information systems in 2011. This will be a case study examination of their activities so that a better understanding of five aspects can be obtained: the Timeline of activities, the Targets of attack, the Tactics the group used, the makeup of the Team and a category which will be referred to as The Twist for reasons which will be made clear at the end of the paper. Keywords: LulzSec, Hackers, Security, AntiSec, Anonymous, Sabu INTRODUCTION Information systems lie at the heart of our modern existence. We deal with them when we work, when we play and when we relax; texting, checking email, posting on Facebook, Tweeting, gaming, conducting e-commerce and e- banking have become so commonplace as to be nearly invisible in modern life. Yet, within each of these electronic interactions lies the danger that the perceived line of security and privacy might be breached and our most important information and secrets might be revealed and exploited.
    [Show full text]
  • Warfare in a Fragile World: Military Impact on the Human Environment
    Recent Slprt•• books World Armaments and Disarmament: SIPRI Yearbook 1979 World Armaments and Disarmament: SIPRI Yearbooks 1968-1979, Cumulative Index Nuclear Energy and Nuclear Weapon Proliferation Other related •• 8lprt books Ecological Consequences of the Second Ihdochina War Weapons of Mass Destruction and the Environment Publish~d on behalf of SIPRI by Taylor & Francis Ltd 10-14 Macklin Street London WC2B 5NF Distributed in the USA by Crane, Russak & Company Inc 3 East 44th Street New York NY 10017 USA and in Scandinavia by Almqvist & WikseH International PO Box 62 S-101 20 Stockholm Sweden For a complete list of SIPRI publications write to SIPRI Sveavagen 166 , S-113 46 Stockholm Sweden Stoekholol International Peace Research Institute Warfare in a Fragile World Military Impact onthe Human Environment Stockholm International Peace Research Institute SIPRI is an independent institute for research into problems of peace and conflict, especially those of disarmament and arms regulation. It was established in 1966 to commemorate Sweden's 150 years of unbroken peace. The Institute is financed by the Swedish Parliament. The staff, the Governing Board and the Scientific Council are international. As a consultative body, the Scientific Council is not responsible for the views expressed in the publications of the Institute. Governing Board Dr Rolf Bjornerstedt, Chairman (Sweden) Professor Robert Neild, Vice-Chairman (United Kingdom) Mr Tim Greve (Norway) Academician Ivan M£ilek (Czechoslovakia) Professor Leo Mates (Yugoslavia) Professor
    [Show full text]
  • New Peers Created Have Fallen from 244 Under David Cameron’S Six Years As Prime Minister to Only 37 to Date Under Theresa May
    \ For more information on DeHavilland and how we can help with political monitoring, custom research and consultancy, contact: +44 (0)20 3033 3870 [email protected] Information Services Ltd 2018 0 www.dehavilland.co.uk INTRODUCTION & ANALYSIS ............................................................................................................. 2 CONSERVATIVES ........................................................................................................................................ 4 Diana Barran MBE .......................................................................................................................................................... 4 The Rt. Hon. Sir Edward Garnier QC ........................................................................................................................... 5 The Rt. Hon. Sir Alan Haselhurst.................................................................................................................................. 7 The Rt. Hon. Peter Lilley ................................................................................................................................................ 8 Catherine Meyer CBE ................................................................................................................................................... 10 The Rt. Hon. Sir Eric Pickles ........................................................................................................................................ 11 The Rt. Hon. Sir John
    [Show full text]
  • Torin Douglas Media Masters - November 13, 2014 Listen to the Podcast Online, Visit
    Torin Douglas Media Masters - November 13, 2014 Listen to the podcast online, visit www.mediafocus.org.uk Welcome to Media Masters, a series of one-to-one interviews with people at the top of the media game. Today I’m joined by Torin Douglas. Torin started his career as a trainee journalist at DC Thomson before joining Campaign magazine as a media writer. After a brief stint at the IBA – the then commercial broadcast regulator – he returned to journalism, editing Marketing Week and then Creative Review. Over the next decade he reported on the media industry for The Times, The Economist and The Independent and presented his own media show on LBC. He then joined the BBC. Their media correspondent for 24 years until his retirement last year, he covered the work of six director generals, the birth of BskyB and the growth of the Murdoch empire, the ongoing debate over press and privacy, the ITV licence auction – and subsequent mergers – and the matter of Jimmy Savile. Having spent a whopping 40 years covering the press, he is now a visiting professor at the University of Bedfordshire, a regular media columnist and director of the Chiswick Book Festival. And, I’m pleased to say, was recently awarded an MBE. Torin, congratulations! Thank you very much! And thank you for joining us. Thank you. Well, where on earth do we start with that? Did you always want to be a journalist? I genuinely did. From the age of about eight I wanted to be a journalist, and I think it was probably that board game, Scoop, which some people might remember, where you had a great big telephone and you turned it, and you got stories to put on the page, and little ads.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • The Masked Avengers: How Anonymous Incited Online
    A REPORTER AT LARGE | SEPTEMBER 8, 2014 ISSUE The Masked Avengers How Anonymous incited online vigilantism from Tunisia to Ferguson. BY DAVID KUSHNER Anyone can join Anonymous simply by claiming affiliation. An anthropologist says that participants “remain subordinate to a focus on the epic win—and, especially, the lulz.” n the mid-nineteen-seventies, when Christopher Doyon was a child in rural Maine, he spent Ihours chatting with strangers on CB radio. His handle was Big Red, for his hair. Transmitters lined the walls of his bedroom, and he persuaded his father to attach two directional antennas to the roof of their house. CB radio was associated primarily with truck drivers, but Doyon and others used it to form the sort of virtual community that later appeared on the Internet, with self- selected nicknames, inside jokes, and an earnest desire to effect change. Doyon’s mother died when he was a child, and he and his younger sister were reared by their father, who they both say was physically abusive. Doyon found solace, and a sense of purpose, in the CB-radio community. He and his friends took turns monitoring the local emergency channel. One friend’s father bought a bubble light and affixed it to the roof of his car; when the boys heard a distress call from a stranded motorist, he’d drive them to the side of the highway. There wasn’t much they could do beyond offering to call 911, but the adventure made them feel heroic. Small and wiry, with a thick New England accent, Doyon was fascinated by “Star Trek” and Isaac Asimov novels.
    [Show full text]
  • United Kingdom
    FREEDOM ON THE NET 2014 United Kingdom 2013 2014 Population: 64.1 million Internet Freedom Status Free Free Internet Penetration 2013: 90 percent Social Media/ICT Apps Blocked: No Obstacles to Access (0-25) 2 2 Political/Social Content Blocked: No Limits on Content (0-35) 6 6 Bloggers/ICT Users Arrested: No Violations of User Rights (0-40) 15 16 TOTAL* (0-100) 23 24 Press Freedom 2014 Status: Free * 0=most free, 100=least free Key Developments: May 2013 – May 2014 • Filtering mechanisms, particularly child-protection filters enabled on all household and mobile connections by default, inadvertently blocked legitimate online content (see Limits on Content). • The Defamation Act, which came into effect on 1 January 2014, introduced greater legal protections for intermediaries and reduced the scope for “libel tourism,” while proposed amendments to the Contempt of Court Act may introduce similar protections for intermediaries in relation to contempt of court (see Limits on Content and Violations of User Rights). • New guidelines published by the Director of Public Prosecutions in June 2013 sought to limit offenses for which social media users may face criminal charges. Users faced civil penalties for libel cases, while at least two individuals were imprisoned for violent threats made on Facebook and Twitter (see Violations of User Rights). • In April 2014, the European Court of Justice determined that EU rules on the mass retention of user data by ISPs violated fundamental privacy and data protection rights. UK privacy groups criticized parliament for rushing through “emergency” legislation to maintain the practice in July, while failing to hold a public debate on the wider issue of surveillance (see Violations of User Rights).
    [Show full text]
  • Superseding Indictment
    _.1{:~~")li~~lti:f~{ FilED ~'Y.:{fs;v, ~,;;rin>---- f-:V' . .. mOPEN COURT .. .1 ''· ··\wi IN THE UNITED STATES DISTRICT COURT F ~~ ffHE f 'f.i 2 EASTERN DISTRICT OF VIRGINIA I?_! ~ 'iJII~ J .·· CLEHI\ U.S. DISTRICT COURT Alexandria Division illgi\NDRIA, VIRGIN!~--~~-' UNITED STATES OF AMERICA Criminal No. 1:18-cr-111 (CMH) v. Count 1: 18 U.S.C. § 793(g) Conspiracy To Obtain and Disclose National JULIAN PAUL ASSANGE, Defense Information Defendant. Count 2: 18 U.S.C. § 371 Conspiracy to Commit Computer Intrusions Counts 3, 4: 18: 18 U.S.C §§ 793(b) and2 Obtaining National Defense Infmmation Counts 5-8: 18 U.S.C. §§ 793(c) and 2 Obtaining National Defense Information Counts 9-11: 18 U.S.C. §§ 793(d) and2 Disclosure ofNational Defense Infmmation Counts 12-14: 18 U.S.C. §§ 793(e) and 2 Disclosure ofNational Defense Information Counts 15-17: 18 U.S.C. § 793(e) Disclosure ofNational Defense Information SECOND SUPERSEDING INDICTMENT June 2020 Term- at Alexandria, Virginia . THE GRAND JURY CHARGES THAT: GENERAL ALLEGATIONS A. ASSANGE and WikiLeaks 1. From at least 2007,1 JULIAN PAUL ASSANGE ("ASSANGE"} was the public 1 When the Grand Jury alleges in this Superseding Indictment that an event occurred on a particular date, the Grand Jury means to convey that the event occmTed "on or about" that date. face of"WikiLeaks," a website he founded with others as an "intelligence agency ofthe people." To obtain information to release on the WikiLeaks website, ASSANGE recruited sources and predicated the success of WikiLeaks in pmi upon the recruitment of sources to (i) illegally circumvent legal safeguards on infonnation, including classification restrictions and computer and network access restrictions; (ii) provide that illegally obtained information to WikiLeaks for public dissemination; and (iii) continue the pattern of illegally procuring and providing classified and hacked information to WikiLeaks for distribution to the public.
    [Show full text]
  • Lord Garnier QC
    Lord Garnier QC Lord Garnier QC Call 1976 Silk 1995 Edward Garnier QC is a highly experienced silk in England & Wales and Northern Ireland. His practice includes corporate advisory and financial services work, corporate crime and international human rights as well as defamation, privacy, confidence, malicious falsehood, contempt and related media law cases. His extensive experience in practice is underpinned by a parallel career in politics and as one of the Government’s two Law Officers: he served as an MP from 1992 until 2017 and was HM Solicitor General from 2010 to 2012. He is now in the House of Lords. Edward advises and acts for companies and individuals whose rights have been adversely affected by foreign governments and agencies, including, for example, by asset seizures, imprisonment, extradition applications and Interpol Red Notices, as well as for overseas governments and agencies who are seeking to comply with international standards and the rule of law. He is regularly consulted by NGOs and charitable organisations. When in Government as Solicitor General, he developed and introduced into this jurisdiction from the United States the Deferred Prosecution Agreement, a means of dealing with companies who admit their offending to supplement prosecutions against individuals suspected of economic crime. He appeared for the Serious Fraud Office in two of the DPAs so far approved by the Court, the first one, Standard Bank, in 2014, and the then-largest, Rolls-Royce, in 2017. In 2020-21 he led the legal team acting for two respondent companies in the 11th and 12th DPAs to be approved by the Court.
    [Show full text]
  • Timeline of ANTISEC As Created and Operated Under FBI Supervision
    TIMELINE 4 June 2011 - First passing mention of ANTISEC in relation to Anonymous is made on LulzSec twitter (http://goo.gl/cwO2G) 7 June 2011 - SABU visited by FBI and arrested quietly 8 June 2011 - By 10AM this day, SABU was fully cooperating with feds 19 June 2011 - AFTER arrest, SABU resumes tweeting after a prolonged break (last recorded tweets being random in March and May of 2011 -- http://goo.gl/frJpR). His first tweet is to announce the formation of ANTISEC (http:// goo.gl/725mr). He announces ANTISEC as "The biggest, unified operation amongst hackers in history." <-- Does "unified" = conspiracy? Original ANTISEC Release Statement - http://pastebin.com/ 9KyA0E5v 20 June 2011 - LulzSec announces Tango Down of site for UK's Serious Organised Crime Agency (SOCA.gov.uk) "in the name of #ANTISEC" (http://goo.gl/RdbnM) <-- Note, Topiary would later be arrested and charged with DDOS attack on SOCA website 22 June 2011 - LulzSec tweets "ofcial ANTISEC theme song" (http:// goo.gl/dfTiw). 23 June 2011 - LulzSec releases Chinga La Migra on AZ law enforcement in protest of AZ SB1070 (http://goo.gl/9s2dG). Both release and tweeted announcement referenced #ANTISEC (http:// goo.gl/f558l) 23 June 2011 - SABU tweets "Friday will be beginning of #ANTISEC dumps. Big ups to all hackers involved in this massive project!" http://goo.gl/6IJAI 24 June 2011 - Logs from IRC channel #pe are leaked publicly. SABU appears as an authority figure. Are they leaked with a purpose of establishing him even more in the Anonymous community as a leader? http://gu.com/p/3v5c5 24 June 2011 - ANTISEC releases a call to arms video (http:// www.youtube.com/watch?v=dNaAaPvyYqI).
    [Show full text]
  • Words Social Media, Governance, Responsible Research and Innovation
    Original citation: Webb, Helena, Jirotka, Marina, Stahl, Bernd Carsten, Housley, William, Edwards, Adam, Williams, Matthew, Procter, Robert N., Rana, Omer and Burnap, Pete. (2015) Digital wildfires : hyper-connectivity, havoc and a global ethos to govern social media. ACM SIGCAS Computers and Society, 45 (3). pp. 193-201. Permanent WRAP url: http://wrap.warwick.ac.uk/75724 Copyright and reuse: The Warwick Research Archive Portal (WRAP) makes this work of researchers of the University of Warwick available open access under the following conditions. Copyright © and all moral rights to the version of the paper presented here belong to the individual author(s) and/or other copyright owners. To the extent reasonable and practicable the material made available in WRAP has been checked for eligibility before being made available. Copies of full items can be used for personal research or study, educational, or not-for- profit purposes without prior permission or charge. Provided that the authors, title and full bibliographic details are credited, a hyperlink and/or URL is given for the original metadata page and the content is not changed in any way. Publisher statement: © 2015 This is the author’s version of the work. It is posted here for your personal use. Not for redistribution. The definitive version was published in ACM SIGCAS Computers and Society http://dx.doi.org/10.1145/2874239.2874267 A note on versions: The version presented here may differ from the published version or, version of record, if you wish to cite this item you are advised to consult the publisher’s version. Please see the ‘permanent WRAP url’ above for details on accessing the published version and note that access may require a subscription.
    [Show full text]