Sad by Design Digital Barricades: Interventions in Digital Culture and Politics

Total Page:16

File Type:pdf, Size:1020Kb

Sad by Design Digital Barricades: Interventions in Digital Culture and Politics Sad by Design Digital Barricades: Interventions in Digital Culture and Politics Series editors: Professor Jodi Dean, Hobart and William Smith Colleges Dr Joss Hands, Newcastle University Professor Tim Jordan, University of Sussex Also available: Shooting a Revolution: Visual Media and Warfare in Syria Donatella Della Ratta Cyber-Proletariat: Global Labour in the Digital Vortex Nick Dyer-Witheford The Digital Party: Political Organisation and Online Democracy Paolo Gerbaudo Gadget Consciousness: Collective Thought, Will and Action in the Age of Social Media Joss Hands Information Politics: Liberation and Exploitation in the Digital Society Tim Jordan Unreal Objects: Digital Materialities, Technoscientific Projects and Political Realities Kate O’Riordan Sad by Design On Platform Nihilism Geert Lovink First published 2019 by Pluto Press 345 Archway Road, London N6 5AA www.plutobooks.com Copyright © Geert Lovink 2019 The right of Geert Lovink to be identified as the author of this work has been asserted by him in accordance with the Copyright, Designs and Patents Act 1988. British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library ISBN 978 0 7453 3935 1 Hardback ISBN 978 0 7453 3934 4 Paperback ISBN 978 1 7868 0451 8 PDF eBook ISBN 978 1 7868 0453 2 Kindle eBook ISBN 978 1 7868 0452 5 EPUB eBook This book is printed on paper suitable for recycling and made from fully managed and sustained forest sources. Logging, pulping and manufacturing processes are expected to conform to the environmental standards of the country of origin. Typeset by Stanford DTP Services, Northampton, England Simultaneously printed in the United Kingdom and United States of America Contents Series Preface vi Acknowledgements vii Introduction: Society of the Social 1 1. Overcoming the Disillusioned Internet 13 2. Social Media as Ideology 23 3. Distraction and its Discontents 33 4. Sad by Design 45 5. Media Network Platform: Three Architectures 61 6. From Registration to Extermination: On Technological Violence 77 7. Narcissus Confirmed: Technologies of the Minimal Selfie 98 8. Mask Design: Aesthetics of the Faceless 108 9. Memes as Strategy: European Origins and Debates 119 10. Before Building the Avant-Garde of the Commons 138 Notes 151 Bibliography 171 Series Preface Crisis and conflict open up opportunities for liberation. In the early twenty-first century, these moments are marked by struggles enacted over and across the boundaries of the virtual, the digital, the actual, and the real. Digital cultures and politics connect people even as they simultaneously place them under surveillance and allow their lives to be mined for advertising. This series aims to intervene in such cultural and political conjunctures. It features critical explorations of the new terrains and practices of resistance, producing critical and informed explorations of the possibilities for revolt and liberation. Emerging research on digital cultures and politics investigates the effects of the widespread digitization of increasing numbers of cultural objects, the new channels of communication swirling around us and the changing means of producing, remixing and distributing digital objects. This research tends to oscillate between agendas of hope, that make remarkable claims for increased participation, and agendas of fear, that assume expanded repression and commodification. To avoid the opposites of hope and fear, the books in this series aggregate around the idea of the barricade. As sources of enclosure as well as defenses for liberated space, barricades are erected where struggles are fierce and the stakes are high. They are necessarily partisan divides, different politici- zations and deployments of a common surface. In this sense, new media objects, their networked circuits and settings, as well as their material, informational, and biological carriers all act as digital barricades. Jodi Dean, Joss Hands and Tim Jordan Acknowledgements Three years have passed since I handed in the manuscript of Social Media Abyss. Looking back, this period has been defined by Brexit, Trump, Cambridge Analytica and related Facebook scandals. Absent were the equivalents of Wikileaks, Anonymous and Snowden (perhaps with the exception of Cambridge Analytica whistle-blower Chris Wylie). There was a lot of ideological regression and “multi-polar” stagnation, acceler- ated by a booming stock market, real estate excesses, an ongoing war in Syria and real existing climate change. While the “social media debate” hit the mainstream, resistance and alternatives were all but absent—with the exception of the alt-right. As the public discourse around “behavior modification” and “per- vasive surveillance” intensified, I shifted away from the preferred panorama format used in my previous books. Dutch cultural funding for new projects at our Institute of Network Cultures had dried up (mainly due to new Dutch apartheid walls erected between education/research and the cultural sector). This forced us to go into survival mode and work for third parties, which is the main reason I’m not reporting about the activities of our networks here (even though MoneyLab stills runs and various digital publishing experiments continue, despite the closure of the PublishingLab in 2018). Thanks to David Castle at Pluto Press and the editors of the Digital Barricades series for taking this book project on board and for their valuable comments. Working together with copy editor Luke Munn (Auckland) was an amazingly smooth and most pleasurable experience. My Berlin dialogues over the years with Pit Schultz, Michael Seemann, Volker Grassmuck, Andreas Kallfelz, Stefan Heidenreich and Alexander Karschnia have proven vital for my intellectual wellbeing. Gratitude goes to Steven Shapiro, Ana Peraica, Marc Tuters, Mieke Gerritzen, Franco Berardi, Letizia Chiappini, Daniel de Zeeuw, Ellen Rutten, Alex Foti, Isabel de Maurissens, Morris Kolman, Marie Lechner, Florian Cramer, Katharina Teichgräber, Michael Dieter, Tripta Chandola, Tatjana Seitz viii . sad by design and Donatella della Ratta for their inspiring comments on different chapters. At the Institute of Network Cultures I would like to thank in particular Miriam Rasch, Inte Gloerich and Patricia de Vries for their detailed responses and support. Thanks also to Silvio Lorusso, Leonieke van Dipten, Margreet Riphagen, and to Barbara Dubbeldam and Kelly Mostert, who recently joined us. The entire team has been pivotal in running such an inspiring, critical research center. Special thanks go to Ned Rossiter for his friendship and dedicated feedback over the years—and to Linda and Riddim DJ “System of Chaos” Kazimir for their amazing support, to whom I dedicate this book. Amsterdam, October 2018 Geert Lovink Introduction: Society of the Social “There are 87,146 thought leaders on LinkedIn.”—“Real painters do not paint things as they are…They paint them as they themselves feel them to be.” Vincent van Gogh on fake art—Unload that Truck of Dislikes! (alt-left slogan)—“Web: We noticed you’re using an Ad blocker. Me: I noticed you’re using 32 tracking services.” Matt Weagle—“New Security Comes With New Vulnerability.” Lulzsec—“Truth is for suckers, Johnny Boy.” Being John Malkovich—Our focus is the cosmo-technics challenge that brings us in direct contact with our slaves (tribute to Yuk Hui)—“I always knew I was a good writer but I thought I’d do poetry or fiction, not the emails I ended up doing.” OH—“Das Handy und die Zuhanden- heit des Virtuellen” (German essay)—“One of my favorite self-harm techniques is googling airfares to Bali.” Addie Wagenknecht—“It’s not size, it’s scale that counts.” Barnett Newman—“Warning: People might not like you after this.”—“Smart is the new smoking.” Johanna Sjerp- stra—“Please like our DNS poisoning attack here”—“I HAVE THE HOUSE TO MYSELF TONIGHT! *stares at phone*”—“The Internet is like the Wild West. We thought we were the cowboys, but it turns out we’re the buffalos.” AnthroPunk. Welcome to the New Normal. Social media is reformatting our interior lives. As platform and individual become inseparable, social networking becomes identical with the “social” itself. No longer curious about what “the next web” will bring, we chat about the information we’re allowed to graze on during meager days. Forward-looking confidence has been shattered—the seasonality of hype reduced to a flatline future. Instead, a new realism has set in, as Evgeny Morozov tweeted: “1990s tech utopianism posited that networks weaken or replace hierarchies. In reality, networks amplify hierarchies and make them less visible.”1 How can one write a proper phenomenology of asynchronous connections and their cultural effects, formulate a ruthless critique of everything hardwired into the social body of the network, while not looking at what’s going on inside? Rather than a stance of superiority, a judgment from on high, could we take an amoral approach toward today’s intense 2 . sad by design social media usage, delving into the shallow time of lost souls like us? Let’s embark on a journey into this third space called the techno-social. Our beloved internet may be portrayed as an “inverse hydra with a hundred assholes”2 but we love it anyway: it’s our brain-junk. While social media controversies have hit mainstream media, the fallout has been zero. We barely register the online frenzy that surrounds us; we can’t even pretend to care about the cynical advertisement logic.3 Social media scandals appear to us, as Franz Kafka once wrote, “like a path in autumn: no sooner is it cleared than it is once again littered with leaves.” From behavioral manipulation to fake news, all we read about is the bankrupt credibility of Silicon Valley. However, very few have suffered any serious consequences. Evidence is apparently not enough. Muck gets raked, data gets leaked, and whistles get blown—yet nothing changes. None of the outstanding issues get resolved. There’s no “internexit” referendum ahead. No matter how many hacks and privacy violations occur, no matter how many awareness campaigns and public debates are organized, overwhelming indiffer- ence prevails.
Recommended publications
  • How We Became Legion: Burke's Identification and Anonymous By
    How We Became Legion: Burke's Identification and Anonymous by Débora Cristina Ramos Antunes da Silva A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Master of Arts in English - Rhetoric and Communication Design Waterloo, Ontario, Canada, 2013 © Débora Cristina Ramos Antunes da Silva 2013 I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. I understand that my thesis may be made electronically available to the public. ii Abstract This thesis presents a study of how identification, according to Kenneth Burke's theory, can be observed in the media-related practices promoted by the cyber-activist collective Anonymous. Identification is the capacity of community-building through the use of shared interests. Burke affirms that, as human beings are essentially social, identification is the very aim of any human interaction. Cyber-activism deeply relies on this capacity to promote and legitimise its campaigns. In the case of Anonymous, the collective became extremely popular and is now a frequent presence even in street protests, usually organised online, around the world. Here, I argue that this power was possible through the use of identification, which helped attract a large number of individuals to the collective. Anonymous was particularly skilled in its capacity to create an ideology for each campaign, which worked well to set up a perfect enemy who should be fought against by any people, despite their demographic or social status. Other forms of identification were also present and important.
    [Show full text]
  • Google Scholar, Sci-Hub and Libgen: Could They Be Our New Partners?
    Purdue University Purdue e-Pubs Proceedings of the IATUL Conferences 2017 IATUL Proceedings Google Scholar, Sci-Hub and LibGen: Could they be our New Partners? Louis Houle McGill University, [email protected] Louis Houle, "Google Scholar, Sci-Hub and LibGen: Could they be our New Partners?." Proceedings of the IATUL Conferences. Paper 3. https://docs.lib.purdue.edu/iatul/2017/partnership/3 This document has been made available through Purdue e-Pubs, a service of the Purdue University Libraries. Please contact [email protected] for additional information. GOOGLE SCHOLAR, SCI-HUB AND LIBGEN: COULD THEY BE OUR NEW PARTNERS? Louis Houle McGill University Canada [email protected] Abstract Since its debut I November 2004, librarians have raised several criticisms at Google Scholar (GS) such as its inconsistency of coverage and its currency and scope of coverage. It may have been true in the early years of Google Scholar but is this still through twelve years after? Is this sufficient to ignore it totally either in our information literacy programs or evaluate its value against the values of subscription-based abstracts and indexes? In this era of severe budget constraints that libraries are facing, can we imagine of substituting most or all of our subject databases with the free access of Google Scholar for discoverability? How much overlap between our databases and Google Scholar? How reliable is Google Scholar? How stable is its content over time? Open Access is getting to be the predominant form of getting access to peer reviewed articles. Many new non-traditional tools (institutional repositories, social media and peer to peer sites) are available out there to retrieve the full-text of peer reviewed articles.
    [Show full text]
  • American Survivor Book 2 Torrent Download Download Survivor Episodes
    american survivor book 2 torrent download Download Survivor Episodes. If you are looking for a website where you can free download Survivor episodes , other TV Shows, movies, games, and mp3s, then this fantastic website is for you and it is very easy to use website. Here, you can download its each and every episode of Survivor, even the current ones. This site is for guys who have missed the episodes of Survivor or who want to know what will happen in the next episode. To watch the things before they telecast, download Survivor here . The rules of this game are simple: sixteen average Americans (eighteen in seasons 8, 9, 11 and 17, nineteen in season 14 and twenty in seasons 10, 13 and 16) are abandoned in the middle of some of the most unforgiving places on earth. Divided into teams, they participate in challenges and every three days, the losing tribe must trek to Tribal Council to vote out one of their own…. Downloading your favorite episode or show is a very simple, user friendly task. Just type the name of the show ‘ Survivor ’ or type the name of the episode that you want to download. Within a minute, you will be with all the available downloads with that term. Find the file that you want, follow the instructions and download what you want if you have free space on your computer and have a speedy internet connection. Want to impress your friends! Tell your Friends that you know what will happen in next episodes. Every one wants to have latest episodes and no one can wait for it to come on DVD as it takes time.
    [Show full text]
  • Guy Fawkes, from Villain to Icon
    FACULTAD de FILOSOFÍA Y LETRAS DEPARTAMENTO de FILOLOGÍA INGLESA Grado en Estudios Ingleses TRABAJO DE FIN DE GRADO Guy Fawkes, from villain to icon Rafael Calle Cardona Tutor: Berta Cano Echevarría 2016-2017 1 2 ABSTRACT In this dissertation, I will be explaining and analyzing the changes that the historical figure of Guy Fawkes underwent from being one of the most hated figures in England, with an annual celebration to commemorate his death, to a fictional character representing the fight against totalitarianism in the late 20th century. And finally, how, in the early years of the 21st century he became the face of the international hacktivist group known as Anonymous. Furthermore, I will be analyzing the historical context in which the character of Guy Fawkes was conceived as well as explaining why he was the main figure who was accounted responsible for the Gunpowder Plot despite the fact that he was not its leader. Moreover, I will analyze why the group Anonymous chose the “Fawkesque” mask from the character from the graphic novel as well as the movie V for Vendetta which was at the same time inspired in the historical character, to become the face of the 21st century hacktivist movement. Keyword: Guy Fawkes, England, Anonymous, Hacktivism, V for Vendetta, Gunpowder Plot. En este trabajo, explicaré y analizaré los cambios que sufrió la figura histórica de Guy Fawkes, de ser una de las más odiadas en Inglaterra, con una celebración anual que para conmemorar su muerte, a un personaje de ficción que representa la lucha contra el totalitarismo en la segunda mitad del siglo XX.
    [Show full text]
  • Tactical Frivolity Jemima Wyman
    These collages developed out of witnessing various protest move- ments online. In early 2011, as part of an effort to be active, embodied, and empathetic in the interface with the computer screen, I started pulling, archiving, printing and hand-cutting images of pro- testers wearing Guy Fawkes masks. The archive has developed in Tactical Frivolity tandem with the growing protest culture over the last few years. There was something compelling about this shared collective face that ignored geographical borders and divergent ideological per- spectives. A mask is magic, especially when it multiplies to become Jemima Wyman a communal architecture and a social camouflage in a world of net- worked surveillance. This iteration in X-TRA documents a selection from six different sub- categories of protesters who customize and accessorize the Guy Fawkes mask. These interventions range from appropriated Ukuku masks (a traditional Peruvian mask that appears to merge the color- ful knitted balaclava of the Free Pussy Riot movement with the face of Guy Fawkes) to spray-painted masks by Black bloc and a decaled First Nations variation. On the mask: Guy Fawkes (1570–1606) was a British revolutionary whose failed plot to blow up the Houses of Parliament in 1605 is still commemorated each year in the United Kingdom with bonfires and backyard fireworks. In the days leading up to November 5, chil- dren traditionally solicited donations to buy fireworks by displaying a “guy” on the sidewalk (a figure made of discarded clothing stuffed with rags or paper, often wearing a home-made mask).1 Their cry— “Penny for the Guy!”—rang out in the cold November evenings, as passers-by hurried home from work or school.
    [Show full text]
  • Shadow Libraries and You: Sci-Hub Usage and the Future of ILL
    Shadow Libraries and You: Sci-Hub Usage and the Future of ILL Gabriel J. Gardner, Stephen R. McLaughlin, and Andrew D. Asher* Scholars have shared copyrighted material outside official channels for decades, but recent market forces, profes- sional pressure, and novel technical exploits have allowed the large-scale automation of these practices. As a re- sult, millions of scholarly articles, chapters, books, and papers have been aggregated in illicit collections known as “shadow libraries,”1 available for free download by anyone with an Internet connection. The best-known shadow libraries are Library Genesis (LibGen) and the associated website Sci-Hub, which uses pooled university credentials to access articles and add them to LibGen’s repository. AvaxHome and the defunct website Library. nu are two others, with numerous smaller collections scattered across the web. Since Elsevier, in June 2015, filed a civil suit against Sci-Hub, its creator Alexandra Elbakyan, LibGen, and several John Does associated with LibGen,2 many articles and opinion pieces have been published on the role and possible effects of shadow libraries in the scholarly communication ecosystem. Though they clearly violate U.S. copyright law, many scholars are quick to offer praise rather than condemnation for the site. Sci-Hub is easy to use, offering simple and fast access to full-text articles in PDF format in a manner more straightforward than many library or publisher websites. To date, however, only a few scholars have examined the phenomenon em- pirically. There is a dearth of information on questions such as whether shadow libraries will reduce publishers’ revenues and disrupt the scholarly publishing industry, and whether they are affecting academic library usage or decreasing the use of interlibrary loan.
    [Show full text]
  • The Masked Avengers: How Anonymous Incited Online
    A REPORTER AT LARGE | SEPTEMBER 8, 2014 ISSUE The Masked Avengers How Anonymous incited online vigilantism from Tunisia to Ferguson. BY DAVID KUSHNER Anyone can join Anonymous simply by claiming affiliation. An anthropologist says that participants “remain subordinate to a focus on the epic win—and, especially, the lulz.” n the mid-nineteen-seventies, when Christopher Doyon was a child in rural Maine, he spent Ihours chatting with strangers on CB radio. His handle was Big Red, for his hair. Transmitters lined the walls of his bedroom, and he persuaded his father to attach two directional antennas to the roof of their house. CB radio was associated primarily with truck drivers, but Doyon and others used it to form the sort of virtual community that later appeared on the Internet, with self- selected nicknames, inside jokes, and an earnest desire to effect change. Doyon’s mother died when he was a child, and he and his younger sister were reared by their father, who they both say was physically abusive. Doyon found solace, and a sense of purpose, in the CB-radio community. He and his friends took turns monitoring the local emergency channel. One friend’s father bought a bubble light and affixed it to the roof of his car; when the boys heard a distress call from a stranded motorist, he’d drive them to the side of the highway. There wasn’t much they could do beyond offering to call 911, but the adventure made them feel heroic. Small and wiry, with a thick New England accent, Doyon was fascinated by “Star Trek” and Isaac Asimov novels.
    [Show full text]
  • Walking the Plank: How Scholarly Piracy Affects Publishers, Libraries and Their Users
    Walking the Plank: How Scholarly Piracy Affects Publishers, Libraries and Their Users Laurie Morrison, Carol Stephenson, and Elizabeth Yates* Introduction The arrival of technology supporting peer-to-peer (P2P) file sharing in scholarly communication has, until -re cently, had minimal impact on libraries. However, threats posed by pirate sites including Library Genesis Project (LibGen) and Sci-Hub are now impacting both library users and library licensing agreements with publishers. Publishers are nervous as they witness their proprietary content leaking out of paywalled systems—not just hundreds of thousands of articles, but millions. Accordingly, publishers are monitoring activities in licensed products very closely for any behavior that they deem suspicious. When a user’s activities cause a publisher to question whether materials are being pirated, the outcomes can vary. Consequences can range from relatively minor inconvenience for blocked users, who must find workarounds to access scholarly content—to the poten- tial for major disruption of a centuries-old proprietary publishing system. This article uses a case study involving a student at Brock University to highlight significant challenges facing libraries and the rights of their users in the current environment of piracy-wary academic publishers. Case Study: Access Denied “I feel like I’m being penalized for my honesty.” That’s how a graduate student at Brock University felt in January 2016, after her legitimate quest to download several hundred articles for a meta-analysis project turned into a protracted—and ultimately unsuccessful—negotiation with the American Psychological Association. Sarah† had downloaded about 20 articles from the PsycINFO database when she received the following screen prompt: The APA PsycNET Terms and Conditions prohibit “Systematic downloading of content, whether done manually or by technological means.” Please contact [email protected] if you are inter- ested in data mining or wish to conduct a systematic review or meta analysis with PsycINFO data.
    [Show full text]
  • ABSTRACT the Rhetorical Construction of Hacktivism
    ABSTRACT The Rhetorical Construction of Hacktivism: Analyzing the Anonymous Care Package Heather Suzanne Woods, M.A. Thesis Chairperson: Leslie A. Hahner, Ph.D. This thesis uncovers the ways in which Anonymous, a non-hierarchical, decentralized online collective, maintains and alters the notion of hacktivism to recruit new participants and alter public perception. I employ a critical rhetorical lens to an Anonymous-produced and –disseminated artifact, the Anonymous Care Package, a collection of digital how-to files. After situating Anonymous within the broader narrative of hacking and activism, this thesis demonstrates how the Care Package can be used to constitute a hacktivist identity. Further, by extending hacktivism from its purely technological roots to a larger audience, the Anonymous Care Package lowers the barrier for participation and invites action on behalf of would-be members. Together, the contents of the Care Package help constitute an identity for Anonymous hacktivists who are then encouraged to take action as cyberactivists. The Rhetorical Construction of Hacktivism: Analyzing the Anonymous Care Package by Heather Suzanne Woods, B.A. A Thesis Approved by the Department of Communication David W. Schlueter, Ph.D., Chairperson Submitted to the Graduate Faculty of Baylor University in Partial Fulfillment of the Requirements for the Degree of Master of Arts Approved by the Thesis Committee Leslie A. Hahner, Ph.D., Chairperson Martin J. Medhurst, Ph.D. James M. SoRelle, Ph.D. Accepted by the Graduate School May 2013 J. Larry Lyon, Ph.D., Dean Page bearing signatures is kept on file in the Graduate School Copyright © 2013 by Heather Suzanne Woods All rights reserved TABLE OF CONTENTS LIST OF FIGURES ........................................................................................................................
    [Show full text]
  • The Weird History of Usamerican Fascism: a Guide (1979-2019) Phd in Critical and Cultural Theory 2019 M.C
    The Weird History of USAmerican Fascism: A Guide (1979-2019) PhD in Critical and Cultural Theory 2019 M.C. McGrady Summary The future, as ever, can be read in comic books. Foretold by the Dark Age of Comics, the doom that now comes to Earth arrives in the form of self-realizing eschatologies, horrors born out of the rutting between unfettered capitalism and its favorite child, technological hubris. When the Big Two comic book publishers began hiring British and Irish authors en masse over the course of the 1980s, these writers brought with them a critical eye sharpened by the political and economic cruelty of the decade. The victims of the Iron Lady came to the New World and set their sights on the empire of the Teflon President, using superhero stories to explore the ideological weapons deployed in the service of global capitalism. The Weird History of USAmerican Fascism tracks the interrelated networks of popular culture and fascism in the United States to demonstrate the degree to which contemporary USAmerican politics embodies the future that the fictional dystopias of the past warned us about. Although the trans-Atlantic political developments of 2016 and their aftermath have sparked a widespread interest in a resurgent Anglophone fascism and its street-level movements – seen most obviously in the loose collection of white supremacists known as the ‘alt- right’ – this interest has been hamstrung by the historical aversion to a serious study of popular and ‘nerd’ culture during the twentieth century. By paying attention to the conceptual and interpersonal networks that emerged from the comic books and videogames of the 1980s, The Weird History of USAmerican Fascism fills a critical lacuna in cultural theory while correcting recent oversights in the academic analysis of contemporary fascism, providing an essential guide to the past, present, and future of the bizarre world of USAmerican politics.
    [Show full text]
  • History of Hacking Part 4: Internet Attacks by Bruce Nikkel
    History of Hacking Part 4: Internet Attacks By Bruce Nikkel Published in HISTEC Journal, a publication by the Swiss computer museum Enter (https://enter.ch). This is part four of a four part series on the history of computer hacking. In the first three articles we covered the early hacking of global telephone switching systems, hacking with dial-up modems, and the evolution of the computer virus. This article describes the history of Internet based attacks, including intrusions, man-in-the-middle attacks, and denial of service. In the early years of the Internet there were no firewalls. Organizations connected their TCP/IP networks directly to the nearest Internet Point-of- Presence (PoP) with dedicated lines leased from the phone company, or using modems for dialup on demand. Servers were not built with security in mind (“hardened”), and Internet services were configured to provide maximal functionality (insecure default settings). The Internet of the 1970s began with individual systems connected to each other. The 1980s was a decade of “internetworking”, where the Internet became a network of networks. The 1990s was the decade of the World Wide Web and the commercialization of the Internet. The first free implementation of the TCP/IP protocol was provided with BSD UNIX, which was popular among univerisities. This open networking environment and fast growth led to more security breaches, and a security community started to form (http://securitydigest.org/unix/). “Beastie” BSD UNIX Mascot As the Internet grew, one of the hacking challenges was to identify new machines on the Internet and find out what services they provided.
    [Show full text]
  • Sci-Hub, a Challenge for Academic and Research Libraries Llarina González-Solar; Viviana Fernández-Marcial
    Sci-Hub, a challenge for academic and research libraries Llarina González-Solar; Viviana Fernández-Marcial How to cite this article: González-Solar, Llarina; Fernández-Marcial, Viviana (2019). “Sci-Hub, a challenge for academic and research libraries”. El profesional de la información, v. 28, n. 1, e280112. https://doi.org/10.3145/epi.2019.ene.12 Article received on 26-09-2018 Approved on 24-11-2018 Llarina González-Solar * Viviana Fernández-Marcial https://orcid.org/0000-0003-4443-4102 https://orcid.org/0000-0002-9277-266X Universidade da Coruña (Spain) Universidade da Coruña (Spain) Facultad de Humanidades y Documentación Grupo de Investigación Historia, Arqueología, [email protected] Documentación y Cultura (Hadoc) [email protected] Abstract Sci-Hub emerged into the field of scientific communication in 2011 as a platform for free access to scientific papers. Itis the most popular of the so-called shadow libraries, systems that overcome the limits of legal access to scientific publi- cations, standing apart from the open access movement. Besides from the media coverage that has served to boost its popularity, several studies reveal the impact of Sci-Hub among researchers, who have embraced this initiative. Sci-Hub has revealed new forms of access to scientific information, affecting academic and research libraries that cannot remain on the sidelines. This study addresses the Sci-Hub phenomenon and its implications for academic and research libraries from different points of view, through a bibliographic review and an analysis of examples of action. Keywords Academic libraries; University libraries; Shadow libraries; Information behaviour; Sci-Hub; Scientific communication; Ethics; Legality; Legal issues; Information access; Open access; Free information; Information usage habits.
    [Show full text]