Reload Disobedience. Ziviler Ungehorsam Im Zeitalter Digitaler

Total Page:16

File Type:pdf, Size:1020Kb

Reload Disobedience. Ziviler Ungehorsam Im Zeitalter Digitaler RELOAD DISOBEDIENCE Ziviler Ungehorsam im Zeitalter digitaler Medien Dissertation zur Erlangung des akademischen Grades doctor philosophiae (Dr. phil.) im Fach Medienwissenschaft eingereicht am 4.11.2016 Datum der Vereidigung: 11.5.2017 an der Kultur-, Sozial- und Bildungswissenschaftlichen Fakultät der Humboldt-Universität zu Berlin von M.A. Theresa Züger Prof. Dr.-Ing. Dr. Sabine Kunst, Präsidentin der Humboldt-Universität zu Berlin Prof. Dr. Julia von Blumenthal, Dekanin der Kultur-, Sozial- und Bildungswissenschaftlichen Fakultät Gutachter: 1. PD Dr. habil. Stefan Münker 2. Associate Prof. Dr.RobinCelikates Für Elmar Πόλλ᾽ οἶδ᾽ ἀλώπηξ, ἀλλ' ἐχῖνος ἕν μέγα 92 ! Danksagung Ich möchte mich herzlich bei allen Menschen bedanken, die diese Arbeit er- möglicht haben und mich auf dem Weg ihrer Entstehung mit Rat und Tat be- gleitet haben.! Mein Dank gilt meinen beiden großartigen Betreuern, Stefan Münker und Robin Celikates, für Euer Vertrauen, Euer Engagement, Eure Geduld und Euer Wis- sen.! Herzlichen Dank dem Alexander von Humboldt Institut für Internet und Gesell- schaft, dem Direktorium und seinem großartigen Team: Karina Preiss, Jana Schudrowitz, Larissa Wunderlich und Jennifer Wollniok. Danke für Euren Mut wissenschaftlich neue Wege zu gehen. Vielen Dank allen Kollegen für die be- reichernden Gespräche und gegenseitige Motivation. Danke für Eure Leiden- schaft, Wissbegierde und Euren Innovationsgeist. Es war eine großartige Zeit, ich werde es vermissen!! Danke all den Menschen, die mir im Laufe der Arbeit begegnet sind in Projek- ten, auf Konferenzen, Festivals und Veranstaltungen für inspirierenden Aus- tausch und ehrliches Interesse, wie Bernardo Caycedo, Natasha Basu, Annette Zimmermann, Geo:roy de Lagasnerie, Thorsten Thiel, Ben Kamis, Andreas An- ti;, Janina Sombetzki und Teresa Dillon und vielen mehr. ! Danke Hannah Arendt für die guten Gespräche und für ihr Lebenswerk. Herzlichen Dank meinen Freunden, meinen Eltern und meiner Familie für Rü- ckendeckung, Korrekturen, Formatierungen und o:ene Ohren. Danke meiner musikalischen Familie für Ablenkung, Freundschaft und vor allem für großarti- gen Jazz.! Dank von Herzen meinem Team und meinen Lieblingsmenschen Nora, Azra, Jessica, Rike, Sebastian, Katharina, Susi, Tatiana & Jonas, Magnus & Tanya, Laird & Maya, I wouldn’t have made it without your friendship and support. ! 93 ! Inhaltsverzeichnis EINLEITUNG ...................................................................................................................6! AUFBAU DER ARGUMENTATION ........................................................................................9! FORSCHUNGSANSATZ UND VORGEHEN ...........................................................................13! ZUR ENTSTEHUNG UND ENTWICKLUNG DES BEGRIFFS DES ZIVILEN UNGEHORSAMS ..........25! ZIVILER UNGEHORSAM IN WISSENSCHAFT UND RECHT ...................................................29! WIE DER UNGEHORSAM DAS NETZ ERREICHTE. DIGITALER UNGEHORSAM ALS SOZIALE PRA- XIS .....................................................................................................................34! ÜBERSICHT: FALLBEISPIELE DIGITALEN UNGEHORSAMS ...................................................48! 1. SYMBOLISCHER DIGITALER UNGEHORSAM. POLITIK IN EINER WELT DER ZEICHEN................................................................................51 1.1. INTERNATIONAL ARMS TRAFFICKER .....................................................................53! 1.2. BEISPIELE DIGITALEN UNGEHORSAMS IN SOZIALEN MEDIEN ..................................55! 1.3. HYPERREALE NARRATIVE ...................................................................................61! 1.4. POLITISCHER VIDEOREMIX ..................................................................................65! 2. INVASIVER UND DISRUPTIVER DIGITALER UNGEHORSAM. POLITI- SCHES HACKEN UND DIE ERFINDUNG DES HACKTIVISMUS........... 68 2.1. DER BTX-HACK ................................................................................................72! 2.2. DER WANK WORM .............................................................................................74! 2.3. WEB DEFACEMENTS UND DNS REDIRECTS ..........................................................76! 2.4. DIE ERFINDUNG DES HACKTIVISMUS ....................................................................80! 2.5. ELECTRONIC CIVIL DISOBEDIENCE .......................................................................84! 2.6. DIE EVOLUTION DER VIRTUELLEN SITZBLOCKADE .................................................89! 2.7. ANONYMOUS UND DIE ZWEITE GENERATION DER DDOS-AKTIONEN ........................94! 2.8. DAS PROJEKT CHANOLOGY ................................................................................96! 2.9. OPERATION PAYBACK ......................................................................................103! 2.10. POLITIK HINTER DEM VORHANG. STÖRUNG DER IT-INFRASTRUKTUR ALS ZIVILER UN- GEHORSAM? ..........................................................................................108! 3. DISOBEDIENT DIGITAL DIRECT ACTION. EIGENMÄCHTIGER DIGITA- LER UNGEHORSAM ..............................................................................114 3.1. EPISTEMISCHER UNGEHORSAM .........................................................................117! 3.1.1. Jeremy Hammond .................................................................................... 120 3.1.2. Barret Brown ............................................................................................121 3.1.3. Digitales Whistleblowing ...........................................................................125 3.1.4. WikiLeaks 129 3.1.5. Snowden 137 3.2. UNGEHORSAME INFRASTRUKTUR ......................................................................139! 3.2.1. Kryptographie als Entwicklung ungehorsamen Codes ............................140 3.2.2. Cypherpunks .............................................................................................141 3.2.3. Vom Public-Key zu Phil Zimmermann und PGP .......................................143 3.2.4. The Pirate Bay........................................................................................... 148 3.2.5. Depub.org 154 3.2.6. Proxies und Umgehungstechnologien ......................................................155 3.2.7. Telecomix 158 3.3. COPYRIOTS. UNGEHORSAMES TEILEN UND DIGITALE PROTESTE GEGEN GELTENDES URHEBERRECHT ......................................................................................166! 3.3.1. The Grey Tuesday .....................................................................................169 3.3.2. Aaron Swartz............................................................................................. 171 ZWISCHENFAZIT. ERSTENS: WAS DIGITALE FORMEN DES UNGEHORSAMS VON BISHERIGEN UNTERSCHEIDET ....................................................................175 ZWEITENS: WARUM WIR TROTZDEM VON ZIVILEM UNGEHORSAM IM DIGITA- LEN REDEN SOLLTEN ..............................................................................................184 94 ! 4. DIGITALER ZIVILER UNGEHORSAM IM LIBERALEN VERSTÄNDNIS .... 191 4.1. DER ZIVILE UNGEHORSAM IN EINER FAST GERECHTEN GESELLSCHAFT .................193! 4.2. ZUR PROBLEMATIK EINER IDEALTHEORETISCHEN GRUNDLAGE FÜR DAS VERSTÄNDNIS VON ZIVILEM UNGEHORSAM .....................................................................197! 4.3. ZUR PROBLEMATIK DER LIBERALEN DEFINITION ZIVILEN UNGEHORSAMS AUF IDEAL- THEORETISCHER GRUNDLAGE ..................................................................200! 4.4. PROBLEME DER RECHTFERTIGUNG ....................................................................206! 4.5. DIE ROLLE ZIVILEN UNGEHORSAMS IM LIBERALEN DEMOKRATIEVERSTÄNDNIS ......210! 4.6. DIE LIBERALE PERSPEKTIVE AUF DIGITALEN UNGEHORSAM .................................212! 5. ENTWURF EINES ALTERNATIVEN VERSTÄNDNISSES ZIVILEN UN- GEHORSAMS ........................................................................................223 5.1. DEMOKRATIETHEORETISCHE ÜBERLEGUNGEN ZU EINEM RADIKAL-DEMOKRATISCHEN VERSTÄNDNIS ZIVILEN UNGEHORSAMS .....................................................226! 5.2. ZUR LEGITIMITÄT ZIVILEN UNGEHORSAMS UND DEM RECHT, RECHTE ZU HABEN ...233! 5.2.1. Die Freiheit als Bedingung menschlichen Daseins ...................................235 5.2.2. Das Versprechen als die vorpolitische Voraussetzung von Politik............. 236 5.2.3. Immanente Prinzipien und das Recht, Rechte zu haben als Legitimation zi- vilen Ungehorsams jenseits der Staatsbürgerschaft ......................240 5.2.4. Ziviler Ungehorsam als Erinnerung an den Kern der Demokratie ............244 5.3. RADIKAL-DEMOKRATISCHE ÜBERLEGUNGEN ZU ZIVILEM UNGEHORSAM IM ZEITALTER DIGITALER MEDIEN ...................................................................................248! 5.3.1. Eine absichtliche Tat in Konflikt mit geltendem Recht ..............................248 5.3.2. Ziviler Ungehorsam als prinzipienbasierter Akt .........................................254 5.3.3. Ziviler Ungehorsam als intersubjektiver Akt ..............................................256 5.3.4. Ziviler Ungehorsam und die kommunikative Absicht ...............................261 5.3.5. Politische Anliegen zivilen Ungehorsams im Zeitalter der Globalisierung und digitaler Medien .............................................................................263 6. DIE FRAGE DER RECHTFERTIGUNG ZIVILEN UNGEHORSAMS ...................................................................................275
Recommended publications
  • UC Riverside UC Riverside Electronic Theses and Dissertations
    UC Riverside UC Riverside Electronic Theses and Dissertations Title Sonic Retro-Futures: Musical Nostalgia as Revolution in Post-1960s American Literature, Film and Technoculture Permalink https://escholarship.org/uc/item/65f2825x Author Young, Mark Thomas Publication Date 2015 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA RIVERSIDE Sonic Retro-Futures: Musical Nostalgia as Revolution in Post-1960s American Literature, Film and Technoculture A Dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in English by Mark Thomas Young June 2015 Dissertation Committee: Dr. Sherryl Vint, Chairperson Dr. Steven Gould Axelrod Dr. Tom Lutz Copyright by Mark Thomas Young 2015 The Dissertation of Mark Thomas Young is approved: Committee Chairperson University of California, Riverside ACKNOWLEDGEMENTS As there are many midwives to an “individual” success, I’d like to thank the various mentors, colleagues, organizations, friends, and family members who have supported me through the stages of conception, drafting, revision, and completion of this project. Perhaps the most important influences on my early thinking about this topic came from Paweł Frelik and Larry McCaffery, with whom I shared a rousing desert hike in the foothills of Borrego Springs. After an evening of food, drink, and lively exchange, I had the long-overdue epiphany to channel my training in musical performance more directly into my academic pursuits. The early support, friendship, and collegiality of these two had a tremendously positive effect on the arc of my scholarship; knowing they believed in the project helped me pencil its first sketchy contours—and ultimately see it through to the end.
    [Show full text]
  • A History of End-To-End Encryption and the Death of PGP
    25/05/2020 A history of end-to-end encryption and the death of PGP Hey! I'm David, a security engineer at the Blockchain team of Facebook (https://facebook.com/), previously a security consultant for the Cryptography Services of NCC Group (https://www.nccgroup.com). I'm also the author of the Real World Cryptography book (https://www.manning.com/books/real-world- cryptography?a_aid=Realworldcrypto&a_bid=ad500e09). This is my blog about cryptography and security and other related topics that I Ûnd interesting. A history of end-to-end encryption and If you don't know where to start, you might want to check these popular the death of PGP articles: posted January 2020 - How did length extension attacks made it 1981 - RFC 788 - Simple Mail Transfer Protocol into SHA-2? (/article/417/how-did-length- extension-attacks-made-it-into-sha-2/) (https://tools.ietf.org/html/rfc788) (SMTP) is published, - Speed and Cryptography the standard for email is born. (/article/468/speed-and-cryptography/) - What is the BLS signature scheme? (/article/472/what-is-the-bls-signature- This is were everything starts, we now have an open peer-to-peer scheme/) protocol that everyone on the internet can use to communicate. - Zero'ing memory, compiler optimizations and memset_s (/article/419/zeroing-memory- compiler-optimizations-and-memset_s/) 1991 - The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations The US government introduces the 1991 Senate Bill 266, (/article/461/the-9-lives-of-bleichenbachers- which attempts to allow "the Government to obtain the cat-new-cache-attacks-on-tls- plain text contents of voice, data, and other implementations/) - How to Backdoor Di¸e-Hellman: quick communications when appropriately authorized by law" explanation (/article/360/how-to-backdoor- from "providers of electronic communications services di¸e-hellman-quick-explanation/) and manufacturers of electronic communications - Tamarin Prover Introduction (/article/404/tamarin-prover-introduction/) service equipment".
    [Show full text]
  • Swedish Film New Docs #3 2012
    Swedish Film NEW DOCS FALL 2012 / WINTER 2013 After You The Clip Colombianos Dare Remember Days of Maremma Everyone Is Older Than I Am Fanny, Alexander & I For You Naked Give Us the Money Le manque The Man Behind the Throne Martha & Niki No Burqas Behind Bars Palme The Sarnos She Male Snails She’s Staging It Sing, Sing Louder Storm In the Andes The Stripper TPB AFK Tzvetanka The Weather War The Wild Ones Welcome to the world of Swedish docs! This year has been a real success, starting at the Sundance Film Festival where Big Boys Gone Bananas!* by Fredrik Gertten and Searching for Sugar Man by Malik Bendjelloul competed and Sugar Man got both the Audience Award and the Jury Special Prize. These two titles are now up for the Oscar nomination run. Domestically we’ve had the best year in the cinemas for Swedish docs since 1979. Titles like Palme by Kristina Lindström and Maud Nycander with an audience over 150.000, and still growing, Searching for Sugar Man, For You Naked by Sara Broos and She Male Snails by Ester Martin Bergsmark have all attracted large audiences. The film critics are also overwhelmed; of all Swedish films that premiered during 2012 so far, five docs are at the top! And more is to come, you now hold in your hands the new issue of Swedish Film with 24 new feature documentaries, ready to hit international festivals and markets such as DOK Leipzig, CPH:DOX and IDFA. Please visit our website www.sfi.se for updated information on Swedish features, documentaries and shorts.
    [Show full text]
  • Battle of the Clipper Chip - the New York Times
    Battle of the Clipper Chip - The New York Times https://www.nytimes.com/1994/06/12/magazine/battle-of-the-clipp... https://nyti.ms/298zenN Battle of the Clipper Chip By Steven Levy June 12, 1994 See the article in its original context from June 12, 1994, Section 6, Page 46 Buy Reprints VIEW ON TIMESMACHINE TimesMachine is an exclusive benefit for home delivery and digital subscribers. About the Archive This is a digitized version of an article from The Times’s print archive, before the start of online publication in 1996. To preserve these articles as they originally appeared, The Times does not alter, edit or update them. Occasionally the digitization process introduces transcription errors or other problems; we are continuing to work to improve these archived versions. On a sunny spring day in Mountain View, Calif., 50 angry activists are plotting against the United States Government. They may not look subversive sitting around a conference table dressed in T-shirts and jeans and eating burritos, but they are self-proclaimed saboteurs. They are the Cypherpunks, a loose confederation of computer hackers, hardware engineers and high-tech rabble-rousers. The precise object of their rage is the Clipper chip, offically known as the MYK-78 and not much bigger than a tooth. Just another tiny square of plastic covering a silicon thicket. A computer chip, from the outside indistinguishable from thousands of others. It seems 1 of 19 11/29/20, 6:16 PM Battle of the Clipper Chip - The New York Times https://www.nytimes.com/1994/06/12/magazine/battle-of-the-clipp..
    [Show full text]
  • Zfone: a New Approach for Securing Voip Communication
    Zfone: A New Approach for Securing VoIP Communication Samuel Sotillo [email protected] ICTN 4040 Spring 2006 Abstract This paper reviews some security challenges currently faced by VoIP systems as well as their potential solutions. Particularly, it focuses on Zfone, a vendor-neutral security solution developed by PGP’s creator, Phil Zimmermann. Zfone is based on the Z Real-time Transport Protocol (ZRTP), which is an extension of the Real-time Transport Protocol (RTP). ZRTP offers a very simple and robust approach to providing protection against the most common type of VoIP threats. Basically, the protocol offers a mechanism to guarantee high entropy in a Diffie- Hellman key exchange by using a session key that is computed through the hashing several secrets, including a short authentication string that is read aloud by callers. The common shared secret is calculated and used only for one session at a time. However, the protocol allows for a part of the shared secret to be cached for future sessions. The mechanism provides for protection for man-in-the-middle, call hijack, spoofing, and other common types of attacks. Also, this paper explores the fact that VoIP security is a very complicated issue and that the technology is far from being inherently insecure as many people usually claim. Introduction Voice over IP (VoIP) is transforming the telecommunication industry. It offers multiple opportunities such as lower call fees, convergence of voice and data networks, simplification of deployment, and greater integration with multiple applications that offer enhanced multimedia functionality [1]. However, notwithstanding all these technological and economic opportunities, VoIP also brings up new challenges.
    [Show full text]
  • Whistleblower & Vigilanten
    WWW.HMKV.DE 419eater.com, !Mediengruppe Bitnik, Anonymous, Critical Art Ensemble, Cypherpunks, Lutz Dammbeck, DIS, Electronic Disturbance Theatre, Etoy, Omer Fast, Dominic Gagnon, Ted Kaczynski (a.k.a. Unabomber), LulzSec, Metahaven, Neo-Luddism, Netzpolitik / #Landesverrat, Trevor Paglen, Peng! Collective, Milo Rau / IIPM – International Institute of Political Murder, Clark Stoeckley, Tiqqun, UBERMORGEN, WikiLeaks, u. a. WHISTLEBLOWER & VIGILANTEN Figuren des digitalen Widerstands Unabomber Jesselyn Radack Anonymous Vigilant Menschenrechtsaktivistin Vigilanten Julian Assange Chelsea Manning Edward Snowden Hacker Whistleblowerin Whistleblower Ausstellungsführer Exhibition Guide WHISTLEBLOWER & EINLEITUNG Um 1996 begannen die ersten KünstlerInnen und Netzaktivist- VIGILANTEN Innen (wie Electronic Disturbance Theater und etoy), mittels „elek- tronischem zivilen Ungehorsam“ z. B. auf die zunehmende Kom- Figuren des digitalen Widerstands merzialisierung des Netzes hinzuweisen. Seitdem hat sich mit dem sogenannten „Internet Vigilantism“ (oder „Digilantism“) ein radikaler Online-Aktivismus entwickelt. Die Ausstellung fragt, was Hacktivis- ten, Whistleblower und (Internet-)Vigilanten verbindet. Wie sehen die Rechtsvorstellungen der unterschiedlichen Akteure aus? Gibt es Gemeinsamkeiten? Wer spricht und handelt für wen und im Sinne welches (höheren) Rechts? Ein Schwerpunkt der Ausstellung wird insbesondere auf den unterschiedlichen Rechtsvorstellungen und Selbstlegitimierungsstrategien liegen, mit denen die Akteure – seien es Aktivisten, Whistleblower,
    [Show full text]
  • JULIAN ASSANGE: When Google Met Wikileaks
    JULIAN ASSANGE JULIAN +OR Books Email Images Behind Google’s image as the over-friendly giant of global tech when.google.met.wikileaks.org Nobody wants to acknowledge that Google has grown big and bad. But it has. Schmidt’s tenure as CEO saw Google integrate with the shadiest of US power structures as it expanded into a geographically invasive megacorporation... Google is watching you when.google.met.wikileaks.org As Google enlarges its industrial surveillance cone to cover the majority of the world’s / WikiLeaks population... Google was accepting NSA money to the tune of... WHEN GOOGLE MET WIKILEAKS GOOGLE WHEN When Google Met WikiLeaks Google spends more on Washington lobbying than leading military contractors when.google.met.wikileaks.org WikiLeaks Search I’m Feeling Evil Google entered the lobbying rankings above military aerospace giant Lockheed Martin, with a total of $18.2 million spent in 2012. Boeing and Northrop Grumman also came below the tech… Transcript of secret meeting between Julian Assange and Google’s Eric Schmidt... wikileaks.org/Transcript-Meeting-Assange-Schmidt.html Assange: We wouldn’t mind a leak from Google, which would be, I think, probably all the Patriot Act requests... Schmidt: Which would be [whispers] illegal... Assange: Tell your general counsel to argue... Eric Schmidt and the State Department-Google nexus when.google.met.wikileaks.org It was at this point that I realized that Eric Schmidt might not have been an emissary of Google alone... the delegation was one part Google, three parts US foreign-policy establishment... We called the State Department front desk and told them that Julian Assange wanted to have a conversation with Hillary Clinton...
    [Show full text]
  • Introduction Points
    Introduction Points Ahmia.fi - Clearnet search engine for Tor Hidden Services (allows you to add new sites to its database) TORLINKS Directory for .onion sites, moderated. Core.onion - Simple onion bootstrapping Deepsearch - Another search engine. DuckDuckGo - A Hidden Service that searches the clearnet. TORCH - Tor Search Engine. Claims to index around 1.1 Million pages. Welcome, We've been expecting you! - Links to basic encryption guides. Onion Mail - SMTP/IMAP/POP3. ***@onionmail.in address. URSSMail - Anonymous and, most important, SECURE! Located in 3 different servers from across the globe. Hidden Wiki Mirror - Good mirror of the Hidden Wiki, in the case of downtime. Where's pedophilia? I WANT IT! Keep calm and see this. Enter at your own risk. Site with gore content is well below. Discover it! Financial Services Currencies, banks, money markets, clearing houses, exchangers. The Green Machine Forum type marketplace for CCs, Paypals, etc.... Some very good vendors here!!!! Paypal-Coins - Buy a paypal account and receive the balance in your bitcoin wallet. Acrimonious2 - Oldest escrowprovider in onionland. BitBond - 5% return per week on Bitcoin Bonds. OnionBC Anonymous Bitcoin eWallet, mixing service and Escrow system. Nice site with many features. The PaypalDome Live Paypal accounts with good balances - buy some, and fix your financial situation for awhile. EasyCoin - Bitcoin Wallet with free Bitcoin Mixer. WeBuyBitcoins - Sell your Bitcoins for Cash (USD), ACH, WU/MG, LR, PayPal and more. Cheap Euros - 20€ Counterfeit bills. Unbeatable prices!! OnionWallet - Anonymous Bitcoin Wallet and Bitcoin Laundry. BestPal BestPal is your Best Pal, if you need money fast. Sells stolen PP accounts.
    [Show full text]
  • Uva-DARE (Digital Academic Repository)
    UvA-DARE (Digital Academic Repository) Surveillance as public matter Revisiting sousveillance through devices and leaks van der Velden, L.C. Publication date 2018 Document Version Final published version License Other Link to publication Citation for published version (APA): van der Velden, L. C. (2018). Surveillance as public matter: Revisiting sousveillance through devices and leaks. General rights It is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other than for strictly personal, individual use, unless the work is under an open content license (like Creative Commons). Disclaimer/Complaints regulations If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library: https://uba.uva.nl/en/contact, or a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible. UvA-DARE is a service provided by the library of the University of Amsterdam (https://dare.uva.nl) Download date:27 Sep 2021 Surveillance as Public Matter Revisiting surveillance through devices and leaks metadata trackers network interferences network interferences trackers, files Lonneke van der Velden social media profiles files files files Surveillance as public matter Revisiting sousveillance through devices and leaks ACADEMISCH PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Universiteit van Amsterdam op gezag van de Rector Magnificus prof.
    [Show full text]
  • Mitigating the Risks of Whistleblowing an Approach Using Distributed System Technologies
    Mitigating the Risks of Whistleblowing An Approach Using Distributed System Technologies Ali Habbabeh1, Petra Maria Asprion1, and Bettina Schneider1 1 University of Applied Sciences Northwestern Switzerland, Basel, Switzerland [email protected] [email protected] [email protected] Abstract. Whistleblowing is an effective tool to fight corruption and expose wrongdoing in governments and corporations. Insiders who are willing to report misconduct, called whistleblowers, often seek to reach a recipient who can dis- seminate the relevant information to the public. However, whistleblowers often face many challenges to protect themselves from retaliation when using the ex- isting (centralized) whistleblowing platforms. This study discusses several asso- ciated risks of whistleblowing when communicating with third parties using web- forms of newspapers, trusted organizations like WikiLeaks, or whistleblowing software like GlobaLeaks or SecureDrop. Then, this study proposes an outlook to a solution using decentralized systems to mitigate these risks using Block- chain, Smart Contracts, Distributed File Synchronization and Sharing (DFSS), and Distributed Domain Name Systems (DDNS). Keywords: Whistleblowing, Blockchain, Smart Contracts 1 Introduction By all indications, the topic of whistleblowing has been gaining extensive media atten- tion since the financial crisis in 2008, which ignited a crackdown on the corruption of institutions [1]. However, some whistleblowers have also become discouraged by the negative association with the term [2], although numerous studies show that whistle- blowers have often revealed misconduct of public interest [3]. Therefore, researchers like [3] argue that we - the community of citizens - must protect whistleblowers. Addi- tionally, some researchers, such as [1], claim that, although not perfect, we should re- ward whistleblowers financially to incentivize them to speak out to fight corruption [1].
    [Show full text]
  • Help I Am an Investigative Journalist in 2017
    Help! I am an Investigative Journalist in 2017 Whistleblowers Australia Annual Conference 2016-11-20 About me • Information security professional Gabor Szathmari • Privacy, free speech and open gov’t advocate @gszathmari • CryptoParty organiser • CryptoAUSTRALIA founder (coming soon) Agenda Investigative journalism: • Why should we care? • Threats and abuses • Surveillance techniques • What can the reporters do? Why should we care about investigative journalism? Investigative journalism • Cornerstone of democracy • Social control over gov’t and private sector • When the formal channels fail to address the problem • Relies on information sources Manning Snowden Tyler Shultz Paul Stevenson Benjamin Koh Threats and abuses against investigative journalism Threats • Lack of data (opaque gov’t) • Journalists are imprisoned for doing their jobs • Sources are afraid to speak out Journalists’ Privilege • Evidence Amendment (Journalists’ Privilege) Act 2011 • Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015 Recent Abuses • The Guardian: Federal police admit seeking access to reporter's metadata without warrant ! • The Intercept: Secret Rules Makes it Pretty Easy for the FBI to Spy on Journalists " • CBC News: La Presse columnist says he was put under police surveillance as part of 'attempt to intimidate’ # Surveillance techniques Brief History of Interception First cases: • Postal Service - Black Chambers 1700s • Telegraph - American Civil War 1860s • Telephone - 1890s • Short wave radio -1940s / 50s • Satellite (international calls) - ECHELON 1970s Recent Programs (2000s - ) • Text messages, mobile phone - DISHFIRE, DCSNET, Stingray • Internet - Carnivore, NarusInsight, Tempora • Services (e.g. Google, Yahoo) - PRISM, MUSCULAR • Metadata: MYSTIC, ADVISE, FAIRVIEW, STORMBREW • Data visualisation: XKEYSCORE, BOUNDLESSINFORMANT • End user device exploitation: HAVOK, FOXACID So how I can defend myself? Data Protection 101 •Encrypt sensitive data* in transit •Encrypt sensitive data* at rest * Documents, text messages, voice calls etc.
    [Show full text]
  • The Code and Politics of Drupal and the Pirate Bay
    THE CODE AND POLITICS OF DRUPAL AND THE PIRATE BAY: ALTERNATIVE HORIZONS OF WEB2.0 by Fenwick McKelvey Bachelor of Arts, Halifax, Nova Scotia, 2004 A thesis presented to Ryerson University in partial fulfillment of the requirements for the degree of Masters of Arts in the Joint Programme of Communication and Culture, a Partnership of Ryerson University and York University. Toronto, Ontario, Canada, 2008 © Fenwick McKelvey 2008 Author's Declaration I hereby declare that I am the sole author of this thesis or dissertation. I authorize Ryerson University to lend this thesis or dissertation to other institutions or individuals for the purpose of scholarly research. I further authorize Ryerson University to reproduce this thesis or dissertation by photocopying or by other means, in total or in part, at the request of other institutions or individuals for the purpose of scholarly research. ii Abstract The Code and Politics of Drupal and the Pirate Bay: Alternative Horizons of Web2.0 By Fenwick McKelvey Master of Arts, 2008 Joint Programme of Communication and Culture, a Partnership of Ryerson University and York University. Code politics investigates the implications of digital code to contemporary politics. Recent developments on the web, known as web2.0, have attracted the attention of the field. The thesis contributes to the literature by developing a theoretical approach to web2.0 platforms as social structures and by contributing two cases of web2.0 structurations: Drupal, a content management platform, and The Pirate Bay, a file sharing website and political movement. Adapting the work of Ernesto Laclau and Chantal Mouffe on articulation theory, the thesis studies the code and politics of the two cases.
    [Show full text]