Open Final Document Worley Diss 2016

Total Page:16

File Type:pdf, Size:1020Kb

Open Final Document Worley Diss 2016 The Pennsylvania State University The Graduate School The College of Communications COMPARING THE COVERAGE OF VIRTUAL MARCHES AND HACKTIVISM OVER SIXTEEN YEARS: A QUALITATIVE FRAME ANALYSIS OF NEWS DISCOURSE A Dissertation in Mass Communications by Sarah Clare Worley © 2016 Sarah Clare Worley Submitted in Partial Fulfilment of the Requirements for the Degree of Doctor of Philosophy May 2016 The dissertation of Sarah Clare Worley was reviewed and approved* by the following: Patrick R. Parsons Don Davis Professor of Ethics and Telecommunications Dissertation Adviser Chair of Committee C. Michael Elavsky Associate Professor of Media Studies John D. McCarthy Distinguished Professor of Sociology Michelle Rodino-Colocino Associate Professor of Film-Video and Media Studies Associate Professor of Women’s Studies Ford Risley Associate Dean for Undergraduate and Graduate Education in the College of Communications * Signatures are on file in the Graduate School. ii ABSTRACT Using a combination of qualitative frame and discourse analysis methods, this research analyzes sixteen total years of news coverage related to the online direct action tactics of virtual march and hacktivism. The discourse of mainstream news media analyzed in this study favored the normative ideal of Habermas’s public sphere by framing emerging online direct action tactics like virtual marches and hacktivism as ineffectual or illegitimate forms of political participation. The findings of this research suggest that despite being different in their contentious nature, the external attention these two protest tactics have received in the form of media discourse serves to delegitimize, marginalize and stigmatize participants and movements, as well as the online direct action tactics they employ. When viewed through proposed revisions to the public sphere, such as the public screen or the networked public sphere, however, the potential effectiveness and legitimacy of online direct action tactics like virtual marches and hacktivism may be framed differently, suggesting that a revision to the public sphere ideal is necessary if online direct action tactics are ever to be viewed as legitimate forms of political participation. The use of the internet to facilitate online direct action tactics raises normative questions for democratic societies on a number of different levels. Having a better understanding of how and if these normative concerns are being used as framing devices by the media helps to reveal those issues, and could influence the shape and tone of political and public discourse regarding their use. This research has the potential to offer a starting point from which to make sense of this period of experimentation, a critical juncture in media communication that will influence the shape that discourse, public opinion and policy regarding how, when and if social movements use online direct action tactics like virtual marches and hacktivism in the future. iii TABLE OF CONTENTS List of Tables………………………………………………………………………..…v List of Figures…………………………………………………………………….…...vi Acknowledgements……………………………………………………………….…..vii INTRODUCTION……………………………………………………..…………..….1 LITERATURE REVIEW…………………………………………………..……..….9 Revising the Public Sphere…………………………………………………..…9 A Critical/Cultural Perspective on Resistance………………………………...15 Relationship between Social Movements and Mainstream Mass Media……...19 Technology and Society……………………………………………………….25 Social Movements and the Internet……………………………………………28 Online Direct Action Tactics: Virtual March and Hacktivism………………...35 METHODOLOGY….……………………………………………………..……….…49 Combing Frame and Discourse Analysis……………………………………....49 Selection and Treatment of Media Texts………………………………………55 ANALYSIS OF VIRTUAL MARCH COVERAGE……………………………......63 Summary of Virtual March Coverage……………………………………….…63 Analyzing the Dimensions of News Discourse for Virtual Marches…………..69 Influence of Placement and Headlines…………………………………………76 Findings for Virtual Marches…………………………………………………..79 ANALYSIS OF HACKTIVISM COVERAGE…………………………………..…82 Summary of Hacktivism Coverage…………………………………………….82 Analyzing the Dimensions of News Discourse for Hacktivism………………..90 Influence of Placement and Headlines………………………………………...108 Findings for Hacktivism……………………………………………………….110 DISCUSSION AND CONCLUSION…………………………………………...……112 Comparing News Discourse……………………………………………………112 Discussion of Online Direct Action Tactics……………………………………118 Discussion of the Public Sphere………………………………………………..122 Concluding Remarks………………………………………………….………....125 Appendix: List of Virtual Marches Found in Coverage……………………………......129 Works Cited.…………………………………………………………………………....132 iv LIST OF TABLES TABLE 1. Examples of virtual marches found through a Google search in August, 2014……...39 2. Breakdown of the number of articles analyzed by media outlet and search term…....58 3. Headlines from virtual march articles in sample coded as thematic………………....67 4. List of virtual march events found in sample listed in chronological order.................68 5. Sample of quotes from virtual march coverage suggesting potential implications of the internet organized by theme…………………………………………………………….71 6. Headlines from hacktivism articles in sample coded as thematic……………………87 7. All hacktivism related headlines in sample from 2000………………………………89 8. Definitions and explanations of the word “hacktivist” found in sample…………......92 9. Examples of references made to the age and gender of hacktivism actors …………..95 10. Quotes from hacktivism coverage suggesting potential implications the internet organized by theme…………………………………………………………..................101 11. Examples of David and Goliath comparisons found in hacktivism coverage…..….107 v LIST OF FIGURES FIGURES 1. Number of virtual march stories from sample listed by source…………………….65 2. Number of virtual march stories from sample by year……………………….……..66 3. Types of sources quoted across all virtual march stories in sample.………………..73 4. Placement of virtual march stories from sample found in print news by section.......77 5. Word cloud created using the text of newspaper headlines from virtual march sample…………………………………………………………………...79 6. Number of hacktivism stories in sample listed by source …………………………..83 7. Number of hacktivism stories in sample by year…………………………….………88 8. Types of sources quoted across all hacktivism stories in sample…………………...103 9. Number of hacktivism stories in sample by section or type of story……………......109 10. Word cloud created using the text of from newspaper headlines from hacktivism sample………………………………………………………………………………..…110 11. Comparison by gender of the sources used in virtual march coverage versus hacktivism coverage…………………………………………………………………….115 vi ACKNOWLEDGMENTS It has been said that it takes a village to raise a child. I would argue that the same is true of completing a dissertation. I am grateful to the many family members, friends, colleagues and students who have offered their support and encouragement to me towards this goal. Your words and acts of support gave me the confidence and energy needed to see it through. There are a few people whom I would like to thank specifically. Thank you to the Chair of my committee, Dr. Patrick Parsons, as well as the other members of my committee, Dr. Rodino-Colocinio, Dr. Elavsky and Dr. McCarthy for your insightful guidance, and patience. Thank you to my former Provost, Jim Lakso, for taking a risk on me and giving me the opportunity to discover my passion for teaching. Thank you to my Juniata colleagues, Grace Fala and Lynn Cockett for creating a supportive and energizing atmosphere in which to work, and for your help and many words of encouragement. Thank you to my friend and mentor, Donna Weimer. You have been there for the best and worst of it all. I am grateful for the time and energy you committed to helping me finish what I started. Thank you to my parents, Clarejean Haury and Mark Worley for instilling in me a love of learning and the courage to ask big questions. Many aspects of this project were influenced by the democratic values you modeled for and taught me. Thank you to my sister, Vanessa Worley for being my best friend. Your unconditional love is my source of energy. Thank you to my husband, Ryan Wetzel, my partner, my confidant, and my champion. I am grateful for your loving and gentle support. I could never have done this without you. vii I dedicate this work to my sons, Owen and Elliott. You inspire me to be and do my best. viii INTRODUCTION History offers many examples of individuals and groups who have sought to effect change within the society and communities of which they are a part by organizing acts of contentious collective action and resistance. These efforts include, but are not limited to the use of various forms of protest and civil disobedience. The ultimate goal of these actions is to bring attention to and expose the injustices perpetuated by the unjust laws and policies of governments and corporations, and are utilized in an effort to change the system. In a broad sense, this type of resistance has been said to be “as old as the Hebrew midwives’ defiance of Pharaoh,” and can be seen in other Biblical examples as well: “Moses was a wanted man, and David an outlaw; Isaiah and Jeremiah were both accused of conspiracy and treason…[and] Shadrach, Meshach and Abednego are known only for their divine disobedience,” not to mention Jesus himself (Suber 110, Coffin 1). From at least the time of Jesus to more recent leaders like Thoreau, Gandhi and Martin Luther King, and
Recommended publications
  • UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations
    UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations Title A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Permalink https://escholarship.org/uc/item/6w76f8x7 Author Swift, Kathy Publication Date 2017 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Santa Barbara A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Education by Kathleen Anne Swift Committee in charge: Professor Richard Duran, Chair Professor Diana Arya Professor William Robinson September 2017 The dissertation of Kathleen Anne Swift is approved. ................................................................................................................................ Diana Arya ................................................................................................................................ William Robinson ................................................................................................................................ Richard Duran, Committee Chair June 2017 A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Copyright © 2017 by Kathleen Anne Swift iii ACKNOWLEDGEMENTS I would like to thank the members of my committee for their advice and patience as I worked on gathering and analyzing the copious amounts of research necessary to
    [Show full text]
  • Februarie Martie Aprilie Ianuarie Mai Iunie Iulie August
    IANUARIE FEBRUARIE MARTIE APRILIE MAI 1 V △ Makoto Tomioka (1897), scriitorul socialist 1 L Apare revista Dacia Viitoare a Grupului Revoluționar 1 L Apare la New York primul număr din revista Mother 1 J △ Francisco Ascaso (1901); se încheie Războiul Civil 1 S Ziua internaȚională a muncii, muncitorilor și Constantin Mille (1862); începe rebeliunea zapatistă din Român (1883) Earth (1906), scoasă de Emma Goldman din Spania (1939) muncitoarelor; se deschide în București MACAZ - Bar regiunea Chiapas, Mexic (1994) 2 M Adolf Brand (1945); apare la București Dysnomia, 2 M scriitorul Philip K. Dick (1982) 2 V Zamfir C. Arbure (1933); Jandarmeria reprimă violent Teatru Coop., continuare a Centrului CLACA (2016) 2 S „Big Frank” Leech (1953) cerc de lectură feministă și queer (2015) 3 M △filosoful William Godwin (1756), feminista Milly pregătirea protestelor anti-NATO din București (2008) 2 D Gustav Landauer (1919); încep protestele 3 D △ Federico „Taino” Borrell Garcia (1912) 3 M △ coreean Pak Yol (1902), Simone Weil (1909) Witkop (1877); Lansare SexWorkCall la București (2019) 3 S △educator Paul Robin (1837); apare primul număr al studențești în Franța, cunoscute mai târziu ca „Mai ‘68” 4 L Albert Camus (1960); Revolta Spartachistă din 4 J △militantul Big Bill Heywood (1869) 4 J △ Suceso Portales Casamar (1904) revistei Strada din Timișoara (2017) 3 L △scriitorul Gérard de Lacaze-Duthiers (1958) Germania (1919) 5 V △ criticul Nikolai Dobroliubov (1836), Johann Most (1846); 5 V △socialista Rosa Luxemburg (1871) 4 D △militantul kurd Abdullah Öcalan (1949); 4 M Demonstrația din Piața Haymarket din Chicago (1886) 5 M △ Nelly Roussel (1878); Giuseppe Fanelli (1877), Auguste Vaillant (1894) 6 S Apare la Londra primul număr al revistei Anarchy (1968) 5 L Apare nr.
    [Show full text]
  • How to Make Use of Data in a Car: Connected Cars, Payment Tech, Analytics, and Other Opportunities
    HOW TO MAKE USE OF DATA IN A CAR: CONNECTED CARS, PAYMENT TECH, ANALYTICS, AND OTHER OPPORTUNITIES Andrew Ray David Monteiro May 13, 2020 Tess Blair @MLGlobalTech © 2018 Morgan, Lewis & Bockius LLP Morgan Lewis Automotive Hour Webinar Series Series of automotive industry focused webinars led by members of the Morgan Lewis global automotive team. The 10-part 2020 program is designed to provide a comprehensive overview on a variety of topics related to clients in the automotive industry. Upcoming sessions: JUNE 10 | Employee Benefits in the Automotive and Mobility Context JULY 15 | Working with, or Operating, a Tech Startup in the Automotive and Mobility Sectors AUGUST 5 | Electric Vehicles and Their Energy Impact SEPTEMBER 23 | Autonomous Vehicles Regulation and State Developments NOVEMBER 11 | Environmental Developments and Challenges in the Automotive Space DECEMBER 9 | Capitalizing on Emerging Technology in the Automotive and Mobility Space 2 Table of Contents Section 01 – Introductions Section 02 – Market Overview Section 03 – Data Acquisition and Use Section 04 – Regulatory and Enforcement Risks 3 SECTION 01 INTRODUCTIONS Today’s Presenters Andrew Ray David Monteiro Tess Blair Washington, DC Dallas Philadelphia Tel +1.202.373.6585 Tel +1.214.466.4133 Tel +1.215.963.5161 [email protected] [email protected] [email protected] 5 SECTION 02 MARKET OVERVIEW 7 Market Overview • 135 million Americans spend 51 minutes on average commuting to work five days a week. • Connected commerce experience represents a $230 billion market. • Since 2010, investors have poured $20.8 billion into connectivity and infotainment technologies. Source: “2019 Digital Drive Report,” P97 / PYMNTS.com; “Start me up: Where mobility investments are going,” McKinsey & Company.
    [Show full text]
  • Library Research Guides
    Columbia Bible College Library Library Research Guides Environmental Issues This guide is accessible at http://www.columbiabc.edu/pdfs/library/environmentissues.pdf CONTENTS 1. Books Ecology and Theology ………………………………………………………………… 2 Ecological Environments …………………………………………………………….. 3 Field Guides ……………………………………………………………………………. 4 2. Internet Resources Christian Environment Groups ………………………………………………………. 5 Associations/Advocacy Groups ……………………………………………………… 5 British Columbia …………………………………………………………………… 5 Canadian …………………………………………………………………………… 5 U.S. & International ……………………………………………………………….. 6 Government sites …………………………………………………………………….. 6 British Columbia …………………………………………………………………… 6 Canada ……………………………………………………………………………… 7 U.S. …………………………………………………………………………………. 8 International ………………………………………………………………………… 8 Meta websites …………………………………………………………………………. 8 Ecological Environments ……………………………………………………………... 8 3. Online Journal databases …………………………………………………………… 10 4. Magazines (Environment/Outdoor) held in the library …………………………. 11 5. Other libraries …………………………………………………………………………. 12 1 The Library On-line Catalogue Use the on-line Catalogue to find a listing of books and videos held in CBC Library. Sample keywords to search are: Environmental protection ecology and Christianity Stewardship,Christian ecology and Bible Ecology creation and Bible Natural resources Wildlife conservation Environmental policy Selected Bibliography: Ecology and theology Berry, R. J., ed. The Care of Creation: Focusing Concern and Action. Leicester, Eng.: InterVarsity,
    [Show full text]
  • The True Cost of American Food – Conference Proceedings
    i The True Cost of American Food – Conference proceedings Foreword Patrick Holden Founder and Chief Executive of the Sustainable Food Trust I am delighted to be writing this foreword for the proceedings of our conference. I hope it will be a useful resource for everyone with an interest in food systems externalities and True Cost Accounting; and that should include everyone who eats! The True Cost of American Food Conference brought together more than 600 participants to listen to high quality presentations from a wide range of leading experts, representing farming, food businesses, research and academic organizations, policy makers, NGOs, public health institutions, organizations representing civil society and food justice, the investment community, funding foundations and philanthropists. As an organization which has contributed in a significant way to the development of the conceptual framework for True Cost Accounting in food and farming, we were delighted that the conference attracted such an impressive attendance of leaders from a range of sectors, all actively committed to taking this initiative forward. Looking forward, clearly one of the key challenges is how we can best convey an easy-to- grasp understanding of True Cost Accounting to individual citizens, who have reasonably assumed until now that the price tag on individual food products reflects of the true costs involved in its production. As we have now come to realize, this is often far from the case; in fact it would be no exaggeration to state that the current food pricing system is dishonest, in that it fails to include the hidden impacts of the production system, both negative and positive, on the environment and public health.
    [Show full text]
  • Ethical Hacking
    International Journal of Scientific and Research Publications, Volume 5, Issue 6, June 2015 1 ISSN 2250-3153 Ethical Hacking Susidharthaka Satapathy , Dr.Rasmi Ranjan Patra CSA, CPGS, OUAT, Bhubaneswar, Odisha, India Abstract- In today's world where the information damaged the target system nor steal the information, they communication technique has brought the world together there is evaluate target system security and report back to the owner one of the increase growing areas is security of network ,which about the threats found. certainly generate discussion of ETHICAL HACKING . The main reason behind the discussion of ethical hacking is insecurity of the network i.e. hacking. The need of ethical hacking is to IV. FATHER OF HACKING protect the system from the damage caused by the hackers. The In 1971, John Draper , aka captain crunch, was one of the main reason behind the study of ethical hacking is to evaluate best known early phone hacker & one of the few who can be target system security & report back to owner. This paper helps called one of the father's of hacking. to generate a brief idea of ethical hacking & all its aspects. Index Terms- Hacker, security, firewall, automated, hacked, V. IS HACKING NECESSARY crackers Hacking is not what we think , It is an art of exploring the threats in a system . Today it sounds something with negative I. INTRODUCTION shade , but it is not exactly that many professionals hack system so as to learn the deficiencies in them and to overcome from it he increasingly growth of internet has given an entrance and try to improve the system security.
    [Show full text]
  • The Rise of Cyber-Espionage
    Case Study: THE RISE OF CYBER-ESPIONAGE 5HFUXLWPHQW3ODQ CounterTh e 20 7KH&RXQWHU7HUURULVW ~ June/July 2012 ©istockphoto/loops7 By Chris Mark At a Hopkinton, Massachusetts, offi ce, an executive received an email that appeared to be from a coworker on March 1, 2011. Attached to the email was an Excel spreadsheet titled “2011 Recruitment Plan.” The man opened the spreadsheet. The email was not from a coworker, it was a carefully crafted attack known as ”spearfi shing” in which a fraudulent email is sent to a specifi c person. he spearfi shing email contained an system, SecurID. SecurID is used by an Excel spreadsheet with a zero- estimated 250 million people worldwide. Tday exploit and a version of the Poison Th e attack was believed to have been ini- Ivy RAT (remote administration tool) tiated using a zero-day exploit created by payload embedded. Th e RAT enabled a Chinese hacker. Evidence suggests the a hacker to gain privileged access to the possibility of Chinese-sponsored cyber- network of RSA Security (an American espionage.1 RSA’s CEO, Art Coviello, computer and network security com- stated the stolen SecurID information pany). Th e company had been founded “could potentially be used to reduce by Ron Rivest, Adi Shamir, and Leonard the eff ectiveness of a current two-factor Adleman, the inventors of the RSA public authentication implementation as part key cryptographic algorithm. Th is single of a broader attack (italics added).”2 Th is The US government event initiated an attack that would result proved to be an ominous prediction.
    [Show full text]
  • Recruiting Al Gore
    RECRUITING AL GORE For years, he was introduced as the “next President of the United States” -- but in the wake of a personally devastating and controversial defeat in the 2000 election, Al Gore did something entirely unexpected. He hit the road, not in search of exile, but as a traveling showman. His “show” is a non-partisan, multimedia presentation that reveals, via an original mix of humor, cartoons and convincing scientific evidence, the resonant effects that global warming is wreaking upon our planet. It is also an arresting, inspirational “call to arms,” pointing out the opportunity that stands before the nation to put American ingenuity and spirit to work in attacking this crisis. With little fanfare, Gore has presented his show more than 1,000 times in cramped school auditoriums and hotel conference rooms in cities large and small, hoping to propel audiences to make a difference in what might otherwise turn out to be the biggest catastrophe of human history. Two people who became entranced by Gore’s show are leading environmental activist Laurie David and movie producer Lawrence Bender. David hosted two of Gore’s sold-out presentations in New York and Los Angeles, where it had a transforming effect on her. “I felt like Al Gore had become the Paul Revere of our times,” says David, “traveling around the country calling out this vital warning that we really can’t ignore.” She also realized that Gore faced a daunting uphill battle in getting his message out into the zeitgeist. “Having researched this subject for some 40 years, nobody understands the issue better than Al Gore and nobody can explain it more clearly and compellingly to the lay person,” notes David.
    [Show full text]
  • Research Paper
    Section 3 – Information Systems Security & Web Technologies and Security Social Engineering: A growing threat, with diverging directions J.V.Chelleth1, S.M.Furnell1, M.Papadaki2, G.Pinkney2 and P.S.Dowland1 1 Network Research Group, University of Plymouth, Plymouth, United Kingdom 2 Symantec, Hines Meadow, St Cloud Way, Maidenhead, Berkshire, United Kingdom e-mail: [email protected] Abstract The age old problem of social engineering is still a threat that does not receive due attention. Due to the advancements in information technology and the explosion of the Internet, attackers have many more avenues to pursue social engineering attacks. Inadequate efforts to educate employees and staff about social engineering and password management, inappropriate usage of messaging systems, poor implementation and awareness of security policies, all lead to people being exposed to potential incidents. This paper talks about social engineering and the new avenues that it has diverged into; and how social engineering plays a part in assisting other attack schemes. The paper first introduces the concept of social engineering. It then looks at different attack methods that have proliferated due to the help obtained by social engineering schemes. The paper establishes that, in addition to being a technique in its own right, social engineering can also be used to assist other types of attack, including viruses and worms, phishing, and identity theft. Keywords Social Engineering, Viruses, Worms, Identity theft, Phishing 1. Introduction Typically when security is spoken of in terms of information security, it is all about having secure systems and networks; anti-virus, firewalls, Intrusion Detection Systems (IDS), etc.
    [Show full text]
  • Paradise Lost , Book III, Line 18
    _Paradise Lost_, book III, line 18 %%%%%%%%%%%%%%%%%%%%%%%% ++++++++++Hacker's Encyclopedia++++++++ ===========by Logik Bomb (FOA)======== <http://www.xmission.com/~ryder/hack.html> ---------------(1997- Revised Second Edition)-------- ##################V2.5################## %%%%%%%%%%%%%%%%%%%%%%%% "[W]atch where you go once you have entered here, and to whom you turn! Do not be misled by that wide and easy passage!" And my Guide [said] to him: "That is not your concern; it is his fate to enter every door. This has been willed where what is willed must be, and is not yours to question. Say no more." -Dante Alighieri _The Inferno_, 1321 Translated by John Ciardi Acknowledgments ---------------------------- Dedicated to all those who disseminate information, forbidden or otherwise. Also, I should note that a few of these entries are taken from "A Complete List of Hacker Slang and Other Things," Version 1C, by Casual, Bloodwing and Crusader; this doc started out as an unofficial update. However, I've updated, altered, expanded, re-written and otherwise torn apart the original document, so I'd be surprised if you could find any vestiges of the original file left. I think the list is very informative; it came out in 1990, though, which makes it somewhat outdated. I also got a lot of information from the works listed in my bibliography, (it's at the end, after all the quotes) as well as many miscellaneous back issues of such e-zines as _Cheap Truth _, _40Hex_, the _LOD/H Technical Journals_ and _Phrack Magazine_; and print magazines such as _Internet Underground_, _Macworld_, _Mondo 2000_, _Newsweek_, _2600: The Hacker Quarterly_, _U.S. News & World Report_, _Time_, and _Wired_; in addition to various people I've consulted.
    [Show full text]
  • A Sundance Audience Award Winner FUEL AWARDS “Robert Redford Said That ‘FUEL’ Has an Important Message and That Sundance Was the Place to Launch It
    Presents A Sundance Audience Award Winner FUEL AWARDS “Robert Redford said that ‘FUEL’ has an important message and that Sundance was the place to launch it. We love this film.” Geoff Gilmore - Sundance Film Festival TELLURIDE MOUNTAIN BEVERLY HILLS PACIFIC PALISADES SEATTLE INT’L MAUI JACKSON HOLE BERGEN ZURICH STOCKHOLM- FILM FESTIVAL FILM FESTIVAL FILM FESTIVAL FILM FESTIVAL FILM FESTIVAL FILM FESTIVAL FILM FESTIVAL FILM FESTIVAL FILM FESTIVAL OFFICIAL SELECTION OFFICIAL SELECTION OFFICIAL SELECTION OFFICIAL SELECTION OFFICIAL SELECTION OFFICIAL SELECTION OFFICIAL SELECTION OFFICIAL SELECTION OFFICIAL SELECTION SANTA FE DOWNTOWN JERUSALEM WOODS HOLE GREEN SCREENS SUSTAINABLE PLANET IDFA ECO FOCUS ST LOUIS FILM FESTIVAL FILM FESTIVAL FILM FESTIVAL FILM FESTIVAL FILM FESTIVAL FILM FESTIVAL FILM FESTIVAL FILM FESTIVAL OFFICIAL SELECTION FILM FESTIVAL OFFICIAL SELECTION OFFICIAL SELECTION OFFICIAL SELECTION OFFICIAL SELECTION OFFICIAL SELECTION OFFICIAL SELECTION OFFICIAL SELECTION OFFICIAL SELECTION The film won awards at the following: • Sundance Film Festival: Audience Award for Best Documentary • Sedona Film Festival: Best Screenwriting • Sedona Film Festival: Most Compelling Documentary • AFI Dallas Film Festival: Current Energy Environmental Award • GAIA Film Festival: Audience Award for Best Documentary • Santa Cruz Film Festival: Producer’s Award • IVCA Clarion Award: for Corporate Social Responsibility A partial festival list of which FUEL is an Official Selection: • Cancun Film Festival • Jerusalem Film Festival • Green Screens
    [Show full text]
  • Tangled Web : Tales of Digital Crime from the Shadows of Cyberspace
    TANGLED WEB Tales of Digital Crime from the Shadows of Cyberspace RICHARD POWER A Division of Macmillan USA 201 West 103rd Street, Indianapolis, Indiana 46290 Tangled Web: Tales of Digital Crime Associate Publisher from the Shadows of Cyberspace Tracy Dunkelberger Copyright 2000 by Que Corporation Acquisitions Editor All rights reserved. No part of this book shall be reproduced, stored in a Kathryn Purdum retrieval system, or transmitted by any means, electronic, mechanical, pho- Development Editor tocopying, recording, or otherwise, without written permission from the Hugh Vandivier publisher. No patent liability is assumed with respect to the use of the infor- mation contained herein. Although every precaution has been taken in the Managing Editor preparation of this book, the publisher and author assume no responsibility Thomas Hayes for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein. Project Editor International Standard Book Number: 0-7897-2443-x Tonya Simpson Library of Congress Catalog Card Number: 00-106209 Copy Editor Printed in the United States of America Michael Dietsch First Printing: September 2000 Indexer 02 01 00 4 3 2 Erika Millen Trademarks Proofreader Benjamin Berg All terms mentioned in this book that are known to be trademarks or ser- vice marks have been appropriately capitalized. Que Corporation cannot Team Coordinator attest to the accuracy of this information. Use of a term in this book should Vicki Harding not be regarded as affecting the validity of any trademark or service mark. Design Manager Warning and Disclaimer Sandra Schroeder Every effort has been made to make this book as complete and as accurate Cover Designer as possible, but no warranty or fitness is implied.
    [Show full text]