What Is Hacktivism?
Total Page:16
File Type:pdf, Size:1020Kb

Load more
Recommended publications
-
SHOULD WE TAX UNHEALTHY FOODS and DRINKS? Donald Marron, Maeve Gearing, and John Iselin December 2015
SHOULD WE TAX UNHEALTHY FOODS AND DRINKS? Donald Marron, Maeve Gearing, and John Iselin December 2015 Donald Marron is director of economic policy initiatives and Institute fellow at the Urban Institute, Maeve Gearing is a research associate at the Urban Institute, and John Iselin is a research assistant at the Urban-Brookings Tax Policy Center. The authors thank Laudan Aron, Kyle Caswell, Philip Cook, Stan Dorn, Lisa Dubay, William Gale, Genevieve Kenney, Adele Morris, Eric Toder, and Elaine Waxman for helpful comments and conversations; Joseph Rosenberg for running the Tax Policy Center model; Cindy Zheng for research assistance; Elizabeth Forney for editing; and Joanna Teitelbaum for formatting. This report was funded by the Laura and John Arnold Foundation. We thank our funders, who make it possible for Urban to advance its mission. The views expressed are those of the authors and should not be attributed to our funders, the Urban-Brookings Tax Policy Center, the Urban Institute, or its trustees. Funders do not determine our research findings or the insights and recommendations of our experts. For more information on our funding principles, go to urban.org/support. TAX POLICY CENTER | URBAN INSTITUTE & BROOKINGS INSTITUTION EXECUTIVE SUMMARY A healthy diet is essential to a long and vibrant life. But there is increasing evidence that our diets are not as healthy as we would like. Obesity, diabetes, hypertension, and other conditions linked to what we eat and drink are major challenges globally. By some estimates, obesity alone may be responsible for almost 3 million deaths each year and some $2 trillion in medical costs and lost productivity (Dobbs et al. -
From Clicktivism to Hacktivism: Understanding Digital Activism
Information & Organization, forthcoming 2019 1 From Clicktivism to Hacktivism: Understanding Digital Activism Jordana J. George Dorothy E. Leidner Mays Business School, Texas A&M University Baylor University ABSTRACT Digital activism provides new opportunities for social movement participants and social movement organizations (SMOs). Recent IS research has begun to touch on digital activism, defining it, exploring it, and building new theory to help understand it. This paper seeks to unpack digital activism through an exploratory literature review that provides descriptions, definitions, and categorizations. We provide a framework for digital activism by extending Milbrath’s (1965) hierarchy of political participation that divides activism into spectator, transitional, and gladiatorial activities. Using this framework, we identify ten activities of digital activism that are represented in the literature. These include digital spectator activities: clicktivism, metavoicing, assertion; digital transitional activities: e-funding, political consumerism, digital petitions, and botivism; and digital gladiatorial activities: data activism, exposure, and hacktivism. Last, we analyze the activities in terms of participants, SMOs, individuals who are targeted by the activity, and organizations that are targeted by the activity. We highlight four major implications and offer four meta-conjectures on the mechanisms of digital activism and their resulting impacts, and reveal a new construct where participants digitally organize yet lack an identifying cause, which we label connective emotion. Key Words Digital activism, social activism, political participation, social movements, connective emotion, literature review 1.0 Introduction Not long ago, activism to promote social movements was relegated to demonstrations and marches, chaining oneself to a fence, or writing to a government representative. Recruiting, organizing, and retaining participants was difficult enough to ensure that often only largest, best supported movements thrived and creating an impact often took years. -
IDENTITY and PERSUASION How Nations Remember Their Pasts and Make Their Futures
IDENTITY AND PERSUASION How Nations Remember Their Pasts and Make Their Futures By CONSUELO CRUZ* DENTITY politics now occupies center stage. It is on explosive dis- Iplay in a wide range of settings, from Africa to the Balkans. And it is more subtly at work in the democracies of the West: NATO leaders must reexamine their own guiding principles in the face of multiple human- itarian disasters brought about by tribal, ethnic, and religious hatreds, while simultaneously dealing with increasingly heterogenous popula- tions at home and ceaseless migrant flows from east and south. It is no surprise, then, that identity should figure prominently in scholarly debates about conflict resolution, migration, citizenship, transnational alliances, democratization, nation and state building, and even globalization. Nor is it a puzzle that long-standing debates about identity should have produced the two clearly defined camps that we know as primordialists and constructivists.1 What is perplexing is the current failure to investigate systematically the complex linkages be- tween identity formation and the expressive practices of political actors. After all, we approach reality rhetorically—that is, with an intent to convince.2 This is why persuasion is the hallmark of effective leader- ship. Short of pure coercion, it is the most direct way to mobilize or paralyze a group. And this is why rhetorical power—recognized as cen- * I would like to thank Peter Hall, Jeffrey Legro, Sheri Berman, and Mehmet Tabak for their in- sightful suggestions on a previous version of this article. I am also grateful to Deborah Yashar, Anna Seleny, Paola Cesarini, and the anonymous reviewers for their helpful comments on the present ver- sion. -
Sustainably Sourced Junk Food? Big Food and the Challenge of Sustainable Diets • Caitlin Scott*
Sustainably Sourced Junk Food? Big Food and the Challenge of Sustainable Diets • Caitlin Scott* Abstract Sustainable diets are an increasingly debated policy concept to address many of the environmental, social, and economic issues in the food system. The role of ultraprocessed foods in sustainable diets has received less attention than meat, dairy, and eggs but is deserving of examination given the high environmental impacts and negative health outcomes resulting from consumption of these foods. Big Food companies that make ultraprocessed foods have focused their attention on sustainable sourcing as a significant sustainability strategy. This article argues that sustainable sourcing as a central strategy for Big Food firms has implications for the achievement of sustainable diets. First, sustainable sourcing lends legitimacy to specific discourses of sustainability that align with a growth imperative. Second, it perpetuates weak and fragmented governance, which can enhance the legitimacy of Big Food when participating in coordination efforts. These dynamics of sustainable sourcing are important for consideration given the legitimacy claims of these companies, which situate them as a key part of the solution in working toward food security and sustainability. Increasing environmental pressures on the food system have made sustain- ability the focus in a variety of policy venues on the future of food. However, there is much debate on the best way forward, with diverse visions of sustain- ability that do not always align. Furthermore, exactly how to get to a sustainable food system is debated, with some advocating certifications to ensure compli- ance by companies and large agricultural operations and others advocating for a complete overhaul to small-scale, locally supported agriculture. -
Hacks, Leaks and Disruptions | Russian Cyber Strategies
CHAILLOT PAPER Nº 148 — October 2018 Hacks, leaks and disruptions Russian cyber strategies EDITED BY Nicu Popescu and Stanislav Secrieru WITH CONTRIBUTIONS FROM Siim Alatalu, Irina Borogan, Elena Chernenko, Sven Herpig, Oscar Jonsson, Xymena Kurowska, Jarno Limnell, Patryk Pawlak, Piret Pernik, Thomas Reinhold, Anatoly Reshetnikov, Andrei Soldatov and Jean-Baptiste Jeangène Vilmer Chaillot Papers HACKS, LEAKS AND DISRUPTIONS RUSSIAN CYBER STRATEGIES Edited by Nicu Popescu and Stanislav Secrieru CHAILLOT PAPERS October 2018 148 Disclaimer The views expressed in this Chaillot Paper are solely those of the authors and do not necessarily reflect the views of the Institute or of the European Union. European Union Institute for Security Studies Paris Director: Gustav Lindstrom © EU Institute for Security Studies, 2018. Reproduction is authorised, provided prior permission is sought from the Institute and the source is acknowledged, save where otherwise stated. Contents Executive summary 5 Introduction: Russia’s cyber prowess – where, how and what for? 9 Nicu Popescu and Stanislav Secrieru Russia’s cyber posture Russia’s approach to cyber: the best defence is a good offence 15 1 Andrei Soldatov and Irina Borogan Russia’s trolling complex at home and abroad 25 2 Xymena Kurowska and Anatoly Reshetnikov Spotting the bear: credible attribution and Russian 3 operations in cyberspace 33 Sven Herpig and Thomas Reinhold Russia’s cyber diplomacy 43 4 Elena Chernenko Case studies of Russian cyberattacks The early days of cyberattacks: 5 the cases of Estonia, -
Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide -
Ethics of Hacktivism by Tennille W
Ethics of Hacktivism by Tennille W. Scott and O. Shawn Cupp Introduction Do hacktivists have ethics? Some would say yes and others suggest that no, they do not. Are there rules that those who engage in hacking follow or abide by during the conduct of their activities? Does the hacktivist maintain any semblance of actions described under the just war theory? If so, it would seem to be only in jus in bello1 or the just conduct in war, due to the perpetual nature of hacker activities and hacktivist operations. First, what is a hacktivist?2 They are defined as those who through the nonviolent use for political ends of “illegal or legally ambiguous digital tools” like website defacements, information theft, website parodies, denial-of-service attacks, virtual sit-ins, and virtual sabotage.3 This provides the basis for understanding more about where hacktivists’ motivations come from and what kinds of ideologies they may exhibit. Nevertheless, hacktivists must conform to some sort of norm. Based upon the nature of hacktivist activities, there must be a way to categorize or identify their overarching ethic. Understanding the motivation of this group is a huge undertaking because of the great variance and diversity of the people who make up the hacktivist collective. Unlike cyberterrorists, who typically belong to a hierarchical group structure and have a common cause, hacktivists are not bound in the same way, which makes them more dynamic and difficult to analyze. A prime example is the hacktivist group known as Anonymous and its spinoff group, Lulz Security (LulzSec), who eventually participated in different activities with different motives. -
Principles for True Pricing
PRINCIPLES FOR TRUE PRICING Consultation draft 0 Principles for True Pricing 1 PRINCIPLES FOR TRUE PRICING Consultation Draft – February 2020 Authored by True Price Foundation and Impact Economy Foundation. About True Price True Price is a social enterprise with the mission to realize sustainable products that are affordable to all by enabling consumers to see and voluntarily pay the true price of products they buy. We envision a world where all products are sold for a true price. If a product is sold for a true price, then no damage is done to people or to nature: it is fully sustainable. If all products are sold for a true price, then the global economy is sustainable. In 2012, True Price was founded and it in the subsequent years developed into world leading expert in methods and tools to measure and monetize societal impact. It calculated the true price of dozens of products around the world and saw a growing appetite for the idea among companies, governments and consumers. In 2020, we feel that the time is right to focus on realizing true pricing, a system where consumers and businesses can see, improve and voluntarily pay the true price of their products. For more information visit: www.trueprice.org. True Price Harlemmerplein 2 1013 HS Amsterdam The Netherlands Tel.: +31 202 403 440 [email protected] 2020 True Price Foundation The text in this document is licensed under a Creative Commons Attribution-NoDerivs 4.0 International. For more information consult Attribution-NoDerivs CC BY-ND. Available at: https://creativecommons.org/share-your-work/licensing-examples/#nd Cover photo by Harry Cunningham on Unsplash. -
Political Support and Attitudes Toward Protest in Venezuela Damarys
Preserving Democracy: Political Support and Attitudes Toward Protest in Venezuela Damarys Canache University of Pittsburgh Michael R. Kulisheck University of Pittsburgh Paper to be presented at the Annual Meeting of the Latin American Studies Association. Chicago, IL, September 24-26, 1998. Introduction Not long ago, Venezuela seemed to have skillfully avoided many of the problems experienced by other Latin American countries. Up until the mid-1980s, Venezuela possessed a solid petroleum- based economy and a vibrant democracy built upon inter-elite cooperation within a viable two-party system. The convergence of these factors brought political stability for almost three decades, a period quite exceptional by Latin American standards (Rey 1991). During this period, however, many issues went unresolved and many new problems were created. By the mid-1980s, the Venezuelan economy no longer enjoyed the benefits of high oil prices and the nation was deeply in debt. The government could not continue with the practice of redistributing oil rent among different sectors of the population. The economic crisis of the 1980s resulted in a dramatic turn for the worse for the people of Venezuela. Poverty increased by 32 percent between 1982 and 1989. In 1989, 22 percent of the population did not have enough resources to meet basic neeeds (Naim 1993). Questions were raised regarding whether traditional political institutions and social organizations were capable of meeting the social and political demands of Venezuelans. At the political level, debates surfaced throughout society about the effectiveness of political institutions and the failure of democratic governments to promote economic equality and growth. Multiple signs of citizens’ discontent with the political system emerged. -
ABSTRACT the Rhetorical Construction of Hacktivism
ABSTRACT The Rhetorical Construction of Hacktivism: Analyzing the Anonymous Care Package Heather Suzanne Woods, M.A. Thesis Chairperson: Leslie A. Hahner, Ph.D. This thesis uncovers the ways in which Anonymous, a non-hierarchical, decentralized online collective, maintains and alters the notion of hacktivism to recruit new participants and alter public perception. I employ a critical rhetorical lens to an Anonymous-produced and –disseminated artifact, the Anonymous Care Package, a collection of digital how-to files. After situating Anonymous within the broader narrative of hacking and activism, this thesis demonstrates how the Care Package can be used to constitute a hacktivist identity. Further, by extending hacktivism from its purely technological roots to a larger audience, the Anonymous Care Package lowers the barrier for participation and invites action on behalf of would-be members. Together, the contents of the Care Package help constitute an identity for Anonymous hacktivists who are then encouraged to take action as cyberactivists. The Rhetorical Construction of Hacktivism: Analyzing the Anonymous Care Package by Heather Suzanne Woods, B.A. A Thesis Approved by the Department of Communication David W. Schlueter, Ph.D., Chairperson Submitted to the Graduate Faculty of Baylor University in Partial Fulfillment of the Requirements for the Degree of Master of Arts Approved by the Thesis Committee Leslie A. Hahner, Ph.D., Chairperson Martin J. Medhurst, Ph.D. James M. SoRelle, Ph.D. Accepted by the Graduate School May 2013 J. Larry Lyon, Ph.D., Dean Page bearing signatures is kept on file in the Graduate School Copyright © 2013 by Heather Suzanne Woods All rights reserved TABLE OF CONTENTS LIST OF FIGURES ........................................................................................................................ -
Network Culture and the Aesthetics of Dissension1
MONOGRÁFICO Escritura e Imagen ISSN: 1885-5687 http://dx.doi.org/10.5209/esim.73038 Network culture and the aesthetics of dissension1 Juan Martín Prada2 Recibido: 25 de marzo de 2020 / Aceptado: 25 de octubre de 2020 Abstract: This article addresses the complex relationship between digital activism and Internet art, from the initial proposals in the 1990s up to the present day. The analysis focuses on those projects that have most impacted the convergence of net art and “net-activism” during this period, with a particular emphasis on the relationship between artistic practice and hacktivism. Likewise, phenomena such as virtual sit-ins, DDOS-based strategies and several others that have emerged in the new context of social networks and participatory online platforms (memes, flash mobs, etc.) are analysed, in order to reflect on the new practices of social media art and their potential for specific critical action. Keywords: Internet art; net art; hacktivism; online activism; social media art; virtual sit-in. [es] Cultura red y estéticas de la disensión Resumen: En este artículo se aborda la compleja relación entre el activismo digital y el Internet art desde los inicios de este en la década de los noventa del pasado siglo hasta la actualidad. El centro del análisis lo constituyen las propuestas que de forma más intensa han reclamado a lo largo de este periodo la confluencia entrenet art y “net-activismo”, poniendo especial énfasis en las relaciones entre práctica artística y hacktivismo. Asimismo, se analizan fenómenos como las virtual sit-ins, las estrategias basadas en DDOS, los surgidos en el nuevo contexto de las redes sociales y de las plataformas participativas en línea (memes, flash mobs, etc.) para, finalmente, abordar la capacidad de actuación crítica específica de las nuevas prácticas de social media art. -
Chapter 4 Hacktivism and State Autonomy
Chapter 4 Hacktivism and State Autonomy: The Transnational Politics of Policy Circumvention Introduction In the bull market of 1999, eToys stood out in the field of favored technology stocks. eToys was one of the hottest properties in online retail at that time, with a market capitalization of $8 billion in September of that year ("Toy retailing -- Trouble in toy town?" 2000). And like any big company, it wanted to protect its brand. Online, nothing is as essential to your brand as your domain name – the web address that lets people find your site (Waxer 2000; Whitman 2000). So etoys.com was concerned that 20,000 customers a day were mistakenly visiting www.etoy.com (Ziegler). etoy – singular – was the digital home of a group of Zurich-based Internet artists. These artists had been online at etoy.com since 1995 – two years before the advent of eToys the retailer (Dugan 2000). But that didn’t stop eToys from using the usual means of protecting its corporate interests: the courts. On November 29, 1999, an LA court judge issued a judgement against the etoy artists, enjoining them from using the etoy domain or name (Smithers). For the moment, it appeared that eToys had won. But the victory proved to be short-lived, as is apparent from eToys’ share price (see Figure 13: eToys share price). No sooner had eToys won its day in court, then it confronted a new kind of challenge: the challenge of anti-corporate hacktivism. Alexandra Samuel Hacktivism and the Future of Political Participation 149 Figure 13: eToys share price Source: (Grether 2000) The challenge was mounted by a coalition of performative hackers and political coders, working together to create a variety of tools aimed at hobbling the eToys web site.