273 4Chan, 210–11 9/11 Attacks, 38, 134 9/11 Commission, 134 Abbas

Total Page:16

File Type:pdf, Size:1020Kb

273 4Chan, 210–11 9/11 Attacks, 38, 134 9/11 Commission, 134 Abbas Index 4chan, 210–11 anticelebrity ethic, 209–10, 9/11 attacks, 38, 134 219–20, 226 9/11 Commission, 134 anti-counterfeiting trade agreement (ACTA), 156, 160, 175 Abbas, Wael, 232 anti-globalization protests, 196–7 accountability, 27, 66 Antisec, 218, 223–7 advertising Apache videos, see Collateral Murder classified, 39 video revenue, 89 Apple, 46, 52, 153, 166, 171 affinity groups, 194, 197–8, Applebaum, Jacob, 166–7, 170–3, 175 206n11 app stores, 153 Afghanistan War, 38 Arab Spring, 4, 9, 28, 92, 146–7, 156, Afghan War Logs, 2–3, 31n5, 79, 209, 229–32, 236–42, 266–9 106–7, 109, 135, 245, 248, 252 Argentina, 159–60 Agee, Philip, 102, 104 Assange, Julian, 3, 5, 9, 40, 79, 81, 97, agency, 91, 99 123, 155, 175, 178, 191, 247, 249 agenda setting, 89–90, 97–8 alleged sexual misconduct by, The Age of WikiLeaks (Mitchell), 3 95, 108 aggregation sites, 14 attempts to discredit, 108 Al Akhbar, 230, 240, 266, 267 celebrity cult of, 251–2 Al Jazeera, 13, 27, 229, 267 conversation with, 254–71 All the President’s Men (film), 35, demonization of, 258–9 101, 258 descriptions of, 22–4, 26 Amazon, 42, 52, 152, 156, 166, extradition case against, 269–71 170, 171 Amazon Web Services (AWS), 42, 43 Bachman, Michelle, 18 American Independent News Bagdikian, Ben, 127 Network, 14 Bahamas, 68 analogue leaking, 125–8 Bank of America, 46, 166, 171, 268 anarchy, 21 Barr, Aaron, 217 Anderson, Chris, 36 Bartnicki v. Vopper, 95–6 AnonOps, 214–15, 217, 219–22 Ben Ali, Zine al-Abidine, 237, 240 anonymity, 92, 131–2, 157, 195, 211, Benkler, Yochai, 40, 166 213, 219 Berglez, Peter, 58 Anonymous, 8, 49–50, 156, 175, Berlin Wall, 268 191–6, 201, 203–4, 206n12, Biden, Joe, 259 209–28, 230–2 Blair, Tony, 179, 181 anticelebrity ethic and, 209–10 bloggers, imprisonment of, 155 birth of, 210–13 blogs, 18–19, 86, 90, 158, 200 ethical principles, 218–21 botnets, 213–18 informants infiltrating, 225 Bouazizi, Mohammed, 237, 267 media coverage of, 226–7 Brand, Stewart, 233 use of botnets by, 213–18 Brin, Sergey, 161 273 274 Index Britannica, 28 collective identity, 201–3 British National Party (BNP), 106 collective meaning making, 87, 94 BrusselsLeaks, 27 communicate, right to, 262–5 Bugged Planet, 154 communication infrastructure, 41–3 Bureau of Investigative Journalism, 50 community broadcasting, 152, Burton, Finn, 210 159–60 Bush, George W., 16, 181 confidentiality, 28 Bush Administration, 169 Contempt of Court Act, 183 business environment, 37 content control, 149–56 business models, 170–4 content production, 48–9 Buxton, Peter, 102 Coombs, David, 117, 137, 139, 142n8 Cooper, Anderson, 17, 18, 19 Cablegate, 3, 5–6, 28, 40, 42, 56–77, Copyright Alert System, 151 123, 129–33, 135–6, 237–9, 245, copyright laws, 167 248, 266–7 Courage to Resist, 45 cable reporting, blocking of, 67–9 Cowen, Tyler, 16 Campaign Against Arms Trade (CAAT) credibility, 98 v. Information Commissioner and Critical Art Ensemble, 193 Ministry of Defence, 186 crowdsourcing, 88–9 Castells, Manuel, 89, 124, 125 Cryptome, 233 censorship, 7, 59, 67–9, 147, 149–50, Cult of the Dead Cow, 193, 205n4 156, 167, 184, 232–3, 256, 258–60 cyberactivism, 4, 8, 191–206 Center for Independent Media, 14 Cyber Intelligence Sharing and charitable foundations, 50–1 Protection Act (CISPA), 153–4, child pornography, 149, 192–3 168 China, 21, 38, 67, 167, 175, 233, 246, cyberlibertarianism, 195, 205n6 259, 264–5 cybersecurity, 153–4, 168 Chomsky, Noam, 265 Church of Scientology, 106, 192, 209, Dahlgren, P., 87, 94 211–13 Daily Kos, 15 citizen journalism, 105, 146, 147, 158, Daily Mail, 18 232, 247–8 Damiens, Robert-François, 138 citizen media, 90 data analysis, 47–9, 50 citizenship, 91–2 data dumps, 134–41 civic culture, 87, 94 data journalism, 57 civil liberties, 38, 238–9 Data Retention Directive, 160 civil society, 58–60, 94, 159–60, 192 Davies, Nick, 79 classified advertising, 39 Davis, Daniel, 38 classified information, release of, 6–7, decentralization, 21, 30, 90, 240 79, 123 de Certeau, Michel, 214 cloud protesting, 8, 191–206 Deep Throat, 35, 102 cloud services, 42, 152, 256 Defence, Press and Broadcasting CNN, 59 Advisory Committee (DPBAC), collaboration, 36 80, 184 Collateral Murder video, 2, 22, 40, 44, Defence Advisory Notice (DA-Notice), 95, 106, 123, 166, 191, 229, 245, 184 255 De George, Richard T., 104 collective action, 191–2, 195–203, Dele, Ojolede, 69 205n7, 205n10, 209, 215, 232 DeLong, Brad, 16 Index 275 democracy, 94 Facebook, 37, 90, 146, 154, 172, 173, democratization, 146, 148–9 240, 241 denial of service (DoS) attacks, 43 Factcheck.org, 14, 18, 19 Dershowitz, Alan, 261–2 Federal Trade Commission, 17 Der Spiegel, 2, 23, 25, 26, 44, 110, 112, file-sharing sites, 149 114–19 filtering content, 149–50, 167 Deseriis, Marco, 213 Financial Times, 39 detainee assessment briefs, 82 First Amendment, 80, 96 digital broadcasting, 152 First Gulf War, 13 digital information, 124–38 Flanagan, Tom, 259 digital leaking, 124–41 Foreign Intelligence Services Act diplomatic cables, leaking of, 40, 42, (FISA), 174 56–77, 92–4, 123, 129–33, 135–6, Forward Operating Base (FOB), 130–1 230, 237–9, 266–7 Foucault, Michael, 138 disclosure fourth estate, 11–12 future of, 49–52 see also networked fourth estate political economy of, 35–55 Fox News, 18, 19, 222, 258 distributed denial of service (DDoS), freedom of expression, 7, 8, 96, 8, 156, 170, 193, 212, 215, 224 146 –65 Doctorow, Cory, 233–4 obstacles to, 148–56 Domscheit-Berg, Daniel, 3, 48, policy initiatives to ensure, 156–60 50, 251 Freedom of Information Act (FOIA), donations, 43–7, 50–1 184–7 Dorling, Phillip, 62 Freedom Ops, 217 Drudge Report, 18 Free Press, 159 Dyer-Whiteford, Nick, 47 free space, 215 frequency allocation, 152 eavesdropping hardware, 153–4 Friedman, Thomas, 17, 20–1 eBay, 52, 166, 171 Egypt, 28, 67, 151, 155, 230, 231, Garbaya, Samir, 240 232–3, 238, 240, 266 gatekeeping role, 87, 89–90, 97–8 Electronic Frontier Foundation (EFF), Geithner, Timothy, 268 171, 173 general intellect, 47 electronic surveillance, 38 geopolitics, 36–9 Ellsberg, Daniel, 7, 42–3, 102, 104, Gharbia, Sami Ben, 229 123, 125–8, 133, 134, 139–40 Ghonim, Wael, 147 embassy cables, see diplomatic cables Gingrich, Newt, 258–9 Encarta, 12 Gitlin, Todd, 135 Espionage Act, 104, 133, 136 Gleaner Newspaper group, 92–4 ethics, 4, 66, 96–7, 205n4, 218–21 GlobaLeaks, 233 European Court of Human Rights global financial crisis, 37 (ECHR), 181 globalization, 58–60, 87, 124 European Data Retention Directive, global journalism, 58, 62–7, 71 153 global online news organizations, European Digital Rights (EDRI), 160 13–14 everyDNS, 43, 170, 171 global public sphere, 58–60, 71, 92–4 experience movements, 197, 204 Gongrijp, Rop, 167, 170–1, 172 experts, 16 Gono, Gideon, 68 extra-legal spaces, 260–2 Goodman, Amy, 254–71 276 Index Google, 37, 38, 41, 42, 90, 154, 161, democratization of, 85 172, 175 digital, 124–38 Google News, 13 dissemination of, 89–90, 95–6 government corruption, 237–8 filtering, 149–50, 167 Graham, Andrew, 48 secrecy, in UK, 178–82 Gravel, Mike, 43 information society, 47, 89, 245 Green, Damien, 182 Inside WikiLeaks (Domscheit-Berg), 3 Greenwald, Glenn, 217 intellectual property protection, 156, Guantánamo Bay Files, 3, 82, 106 159–60 Guardian, 2, 3, 6, 22–3, 30, 44, 78–82, International Association for Media 95, 109, 110, 112–15, 117–19, 175 and Communication Research Guy Fawkes masks, 195, 212 (IAMCR), 9–10 International Federation of the Habermas, J., 58 Phonographic Industry, 192 hacker culture, 249–50 Internet hacker ethic, 205n4, 218–21 access to, 151, 241 hacktivism, 4, 193–6, 209, 221–7, blocking of, 167 231–2 business models, 170–4 see also Anonymous censorship, 7, 59, 67–9, 147, 149–50, Hactivismo, 193 156, 167, 184, 232–3, 256, 258–60 Hajji, Lotfi, 13 concentration of ownership, Hamlily, Adil Hadi al Jazairi Bin, 82 173–4 Hardey, M., 91, 99 control of, 41–3, 59, 166–77 HBGary Federal, 217–18, 221 forces for closure, 36–9 Heald, Emma, 98 impact on traditional media, Heller, Jean, 102 12–13 Hill, Amelia, 182 infrastructure, 41–3, 150–2, 155, Hoglund, Greg, 221 159–60 Holder, Eric, 108 privacy rights, 170–4 Honduras, 68 regulation, 38 horizontal networks, 124 services, 7 Hrafnsson, Kristinn, 47 traditional media and, 89–90 Huckabee, Mike, 109, 260 transparency, 229–35 Huffington Post, 90 Internet Corporation for the human microphone, 198–9 Assignment of Names and Numbers (ICANN), 175 Icelandic Modern Media Initiative Internet Feds, 221–2 (IMMI), 148, 157–60, 161 Internet Freedom Agenda, 149 Imus, Don, 19 Internet-relay chat, 199 Indignados, 198 Internet service providers (ISPs), 149, individuality, 191 153–4, 167, 168, 173 individuals, 15–16, 21, 194–5, 196–9 investigative journalism, 35, 39, 50–1, Indonesia, 68 85–6, 96, 247–8 Indymedia, 4, 146, 173, 251 Iran, 154, 238 informal networks, 197–8 Iran-Contra Affair, 229 information Iranian reform movement, 28 access to, 87, 135, 149–50, 241 Iraq War, 38 control, 149–56 Iraq War Logs, 2–3, 107, 135, 254–7 decentralized, 12 Israel, 238, 260, 265 Index 277 Jamaica Gleaner, 92–4 of diplomatic cables, 40, 42, 56–77, Jenkins, Henry, 91 92–4, 123, 129–33, 135–6, 230, Jenkins, Simon, 81 237–9, 266–7 Jónsdóttir, Birgitta, 166, 170–2, in network society, 123–45 175 Pentagon Papers, 7, 16, 42–3, 50, Jordan, 232 87, 102, 123, 125–8, 135, 136, journalism 141n2 citizen, 105, 146, 147, 158, 232, politics of, 209–28 247–8 war logs, 2–3, 31n5, 79, 106–9, 135, data, 57 245, 248, 252, 254–7 ethics, 96–7 Lebanon, 67 future of, 17 Leigh, David, 96 global, 58, 62–7, 71 Leveson Inquiry, 78, 83n1 investigative, 17, 35, 39, 50–1, 85–6, libel
Recommended publications
  • Annual Report and Accounts 2018-19
    National Crime Agency Annual Report and Accounts 2018-19 HC 2397 National Crime Agency Annual Report and Accounts 2018-19 Annual Report presented to Parliament pursuant to paragraph 8(2) of Schedule 2 to the Crime and Courts Act 2013. Accounts presented to the House of Commons pursuant to Section 6(4) of the Government Resources and Accounts Act 2000. Accounts presented to the House of Lords by Command of Her Majesty. Ordered by the House of Commons to be printed on 22 July 2019. HC 2397 © Crown copyright 2019 This publication is licensed under the terms of the Open Government Licence v3.0 except where otherwise stated. To view this licence, visit nationalarchives.gov.uk/doc/open-government-licence/version/3. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. This publication is available at www.gov.uk/official-documents. Any enquiries regarding this publication should be sent to National Crime Agency, Command Suite, Unit 1, Spring Gardens, Tinworth Street, London, SE11 5EN. ISBN 978-1-5286-1296-8 CCS0519221654 07/19 Printed on paper containing 75% recycled fibre content minimum. Printed in the UK by the APS Group on behalf of the Controller of Her Majesty’s Stationery Office. Contents Foreword by the Home Secretary 7 Part Two – Accountability Report Part One – Performance Report Corporate Governance Report 43 Directors’ Report 43 Statement by the Director General 9 Statement of Accounting Officer’s Who we are and what we do 10 responsibilities 44 How
    [Show full text]
  • Serious and Organised Crime Strategy
    Serious and Organised Crime Strategy Cm 8715 Serious and Organised Crime Strategy Presented to Parliament by the Secretary of State for the Home Department by Command of Her Majesty October 2013 Cm 8715 £21.25 © Crown copyright 2013 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government Licence. To view this licence, visit http://www. nationalarchives.gov.uk/doc/open-government-licence/ or e-mail: [email protected]. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. Any enquiries regarding this publication should be sent to us [email protected] You can download this publication from our website at https://www.gov.uk/government/ publications ISBN: 9780101871525 Printed in the UK by The Stationery Office Limited on behalf of the Controller of Her Majesty’s Stationery Office ID 2593608 10/13 33233 19585 Printed on paper containing 75% recycled fibre content minimum. Contents Home Secretary Foreword 5 Executive Summary 7 Introduction 13 Our Strategic Response 25 PURSUE: Prosecuting and disrupting serious and 27 organised crime PREVENT: Preventing people from engaging 45 in serious and organised crime PROTECT: Increasing protection against 53 serious and organised crime PREPARE: Reducing the impact of serious and 65 organised crime Annex A: Accountability, governance and funding 71 Annex B: Departmental roles and responsibilities for 73 tackling serious and organised crime 4 Serious and Organised Crime Strategy Home Secretary Foreword 5 Home Secretary Foreword The Relentless Disruption of Organised Criminals Serious and organised crime is a threat to our national security and costs the UK more than £24 billion a year.
    [Show full text]
  • Post-Truth Protest: How 4Chan Cooked Up...Zagate Bullshit | Tuters
    5/5/2019 Post-Truth Protest: How 4chan Cooked Up the Pizzagate Bullshit | Tuters | M/C Journal M/C JOURNAL Home > Vol 21, No 3 (2018) > Tuters ARTICLE TOOLS HOME Post-Truth Protest: How 4chan Cooked Up the Pizzagate Bullshit PRINT THIS ARTICLE Marc Tuters, Emilija Jokubauskaitė, Daniel Bach CURRENT ISSUE INDEXING METADATA HOW TO CITE ITEM UPCOMING ISSUES Introduction FINDING REFERENCES ARCHIVES On 4 December 2016, a man entered a Washington, D.C., pizza parlor armed with an AR­15 assault rifle in an attempt to save the victims of an alleged satanic pedophilia ring run by EMAIL THIS ARTICLE CONTRIBUTORS prominent members of the Democratic Party. While the story had already been discredited (LOGIN REQUIRED) (LaCapria), at the time of the incident, nearly half of Trump voters were found to give a ABOUT M/C JOURNAL measure of credence to the same rumors that had apparently inspired the gunman (Frankovic). EMAIL THE AUTHOR Was we will discuss here, the bizarre conspiracy theory known as "Pizzagate" had in fact (LOGIN REQUIRED) USER HOME originated a month earlier on 4chan/pol/, a message forum whose very raison d’être is to protest against “political correctness” of the liberal establishment, and which had recently ABOUT THE AUTHORS JOURNAL CONTENT become a hub for “loose coordination” amongst members the insurgent US ‘alt­right’ movement Marc Tuters SEARCH (Hawley 48). Over a period of 25 hours beginning on 3 November 2016, contributors to the /pol/ forum combed through a cache of private e­mails belonging to Hillary Clinton’s campaign https://oilab.eu manager John Podesta, obtained by Russian hackers (Franceschi­Bicchierai) and leaked by University of Amsterdam SEARCH SCOPE Julian Assange (Wikileaks).
    [Show full text]
  • Download Download
    Proceedings of the Fifteenth International AAAI Conference on Web and Social Media (ICWSM 2021) A Large Open Dataset from the Parler Social Network Max Aliapoulios1, Emmi Bevensee2, Jeremy Blackburn3, Barry Bradlyn4, Emiliano De Cristofaro5, Gianluca Stringhini6, Savvas Zannettou7 1New York University, 2SMAT, 3Binghamton University, 4University of Illinois at Urbana-Champaign, 5University College London, 6Boston University, 7Max Planck Institute for Informatics [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] Abstract feasible in technical terms to create a new social media plat- Parler is as an “alternative” social network promoting itself form, but marketing the platform towards specific polarized as a service that allows to “speak freely and express yourself communities is an extremely successful strategy to bootstrap openly, without fear of being deplatformed for your views.” a user base. In other words, there is a subset of users on Twit- Because of this promise, the platform become popular among ter, Facebook, Reddit, etc., that will happily migrate to a new users who were suspended on mainstream social networks platform, especially if it advertises moderation policies that for violating their terms of service, as well as those fearing do not restrict the growth and spread of political polariza- censorship. In particular, the service was endorsed by several tion, conspiracy theories, extremist ideology, hateful and vi- conservative public figures, encouraging people to migrate olent speech, and mis- and dis-information. from traditional social networks. After the storming of the US Capitol on January 6, 2021, Parler has been progressively de- Parler.
    [Show full text]
  • Requesting a Defence from the NCA Under POCA and TACT
    Requesting a defence from the NCA under POCA and TACT UK Financial Intelligence Unit May 2019 Version 5 1 OFFICIAL OFFICIAL Requesting a defence from the NCA under POCA and TACT This document is intended to inform you of the approach when reporters, through submitting a suspicious activity report (SAR), seek a defence (or ‘consent’) from the National Crime Agency (NCA): to a principal money laundering offence (sections 327-329 Proceeds of Crime Act 2002 [‘POCA’]) under sections 335 and 336 of POCA; and/or a terrorist financing offence (sections 15-18 Terrorism Act 2000 [‘TACT’]) under section 21ZA of TACT. Please ensure you are familiar with: Part 7 of POCA Part 3 of TACT 1 If you are a business in the regulated sector , any guidance issued by your anti-money laundering supervisor, professional body or trade association. If you are unsure, always seek your own independent legal advice and/or consult your supervisor or trade body. If there is a threat of harm or crime in action please ring the police on 999. The UKFIU can be contacted by email: [email protected] 1 If you are unsure if your firm is in the regulated sector consult your regulator, professional body or trade association, or seek independent legal advice 2 OFFICIAL OFFICIAL A note on the term ‘consent’ The term ‘consent’ is frequently misinterpreted. Often it is seen as seeking permission or that where requests are granted that this is a statement that the funds are clean or that there is no criminality involved. This is not the case.
    [Show full text]
  • Understanding the Qanon Conspiracy from the Perspective of Canonical Information
    The Gospel According to Q: Understanding the QAnon Conspiracy from the Perspective of Canonical Information Max Aliapoulios*;y, Antonis Papasavva∗;z, Cameron Ballardy, Emiliano De Cristofaroz, Gianluca Stringhini, Savvas Zannettou◦, and Jeremy Blackburn∓ yNew York University, zUniversity College London, Boston University, ◦Max Planck Institute for Informatics, ∓Binghamton University [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] — iDRAMA, https://idrama.science — Abstract administration of a vaccine [54]. Some of these theories can threaten democracy itself [46, 50]; e.g., Pizzagate emerged The QAnon conspiracy theory claims that a cabal of (literally) during the 2016 US Presidential elections and claimed that blood-thirsty politicians and media personalities are engaged Hillary Clinton was involved in a pedophile ring [51]. in a war to destroy society. By interpreting cryptic “drops” of A specific example of the negative consequences social me- information from an anonymous insider calling themself Q, dia can have is the QAnon conspiracy theory. It originated on adherents of the conspiracy theory believe that Donald Trump the Politically Incorrect Board (/pol/) of the anonymous im- is leading them in an active fight against this cabal. QAnon ageboard 4chan via a series of posts from a user going by the has been covered extensively by the media, as its adherents nickname Q. Claiming to be a US government official, Q de- have been involved in multiple violent acts, including the Jan- scribed a vast conspiracy of actors who have infiltrated the US uary 6th, 2021 seditious storming of the US Capitol building.
    [Show full text]
  • National Crime Agency a Plan for the Creation of a National Crime-Fighting Capability
    THE NATIONAL CRIME AGENCY A PLAN FOR THE CREATION OF A NATIONAL CRIME-FIGHTING CAPABILITY The National Crime Agency A plan for the creation of a national crime-fighting capability Presented to Parliament by the Secretary of State for the Home Department by Command of Her Majesty June 2011 Cm 8097 £8.50 © Crown copyright 2011 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government Licence. To view this licence, visit www.nationalarchives.gov.uk/doc/ open-government-licence/ or e-mail: [email protected]. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. Any enquiries regarding this publication should be sent to us at: National Crime Agency Programme Home Office 6th Floor Peel Building 2 Marsham Street London SW1P 4DF Email: [email protected] This publication is also available for download at www.official-documents.gov.uk ISBN: 9780101809726 Printed in the UK by The Stationery Office Limited on behalf of the Controller of Her Majesty’s Stationery Office ID P002435167 06/11 Printed on paper containing 75% recycled fibre content minimum. Contents FOREWORD 4 EXECUTIVE SUMMARY 5 1 INTRODUCTION 7 2 THE NEED FOR THE NCA 9 • Cutting crime • National threats • Existing response 3 THE VISION FOR THE NCA 12 4 THE SCOPE AND FUNCTIONALITY OF THE NCA 13 • Scope • Resources • Core capabilities - Intelligence, prioritisation and tasking - Investigation
    [Show full text]
  • The Effectiveness of Surveillance Technology: What Intelligence Officials Are Saying
    Delft University of Technology The effectiveness of surveillance technology What intelligence officials are saying Cayford, Michelle; Pieters, Wolter DOI 10.1080/01972243.2017.1414721 Publication date 2018 Document Version Final published version Published in Information Society Citation (APA) Cayford, M., & Pieters, W. (2018). The effectiveness of surveillance technology: What intelligence officials are saying. Information Society, 34(2), 88-103. https://doi.org/10.1080/01972243.2017.1414721 Important note To cite this publication, please use the final published version (if applicable). Please check the document version above. Copyright Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons. Takedown policy Please contact us and provide details if you believe this document breaches copyrights. We will remove access to the work immediately and investigate your claim. This work is downloaded from Delft University of Technology. For technical reasons the number of authors shown on this cover page is limited to a maximum of 10. THE INFORMATION SOCIETY 2018, VOL. 34, NO. 2, 88–103 https://doi.org/10.1080/01972243.2017.1414721 The effectiveness of surveillance technology: What intelligence officials are saying Michelle Cayford and Wolter Pieters Faculty of Technology, Policy and Management, Delft University of Technology, Delft, The Netherlands ABSTRACT ARTICLE HISTORY In recent years, Western governments have come under sharp criticism for their use of surveillance Received 5 October 2016 technology. They have been accused of sweeping up massive amounts of information without Accepted 27 November 2017 evidence of the technologies being effective in improving security.
    [Show full text]
  • Uva-DARE (Digital Academic Repository)
    UvA-DARE (Digital Academic Repository) Surveillance as public matter Revisiting sousveillance through devices and leaks van der Velden, L.C. Publication date 2018 Document Version Final published version License Other Link to publication Citation for published version (APA): van der Velden, L. C. (2018). Surveillance as public matter: Revisiting sousveillance through devices and leaks. General rights It is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other than for strictly personal, individual use, unless the work is under an open content license (like Creative Commons). Disclaimer/Complaints regulations If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library: https://uba.uva.nl/en/contact, or a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible. UvA-DARE is a service provided by the library of the University of Amsterdam (https://dare.uva.nl) Download date:27 Sep 2021 Surveillance as Public Matter Revisiting surveillance through devices and leaks metadata trackers network interferences network interferences trackers, files Lonneke van der Velden social media profiles files files files Surveillance as public matter Revisiting sousveillance through devices and leaks ACADEMISCH PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Universiteit van Amsterdam op gezag van de Rector Magnificus prof.
    [Show full text]
  • Mitigating the Risks of Whistleblowing an Approach Using Distributed System Technologies
    Mitigating the Risks of Whistleblowing An Approach Using Distributed System Technologies Ali Habbabeh1, Petra Maria Asprion1, and Bettina Schneider1 1 University of Applied Sciences Northwestern Switzerland, Basel, Switzerland [email protected] [email protected] [email protected] Abstract. Whistleblowing is an effective tool to fight corruption and expose wrongdoing in governments and corporations. Insiders who are willing to report misconduct, called whistleblowers, often seek to reach a recipient who can dis- seminate the relevant information to the public. However, whistleblowers often face many challenges to protect themselves from retaliation when using the ex- isting (centralized) whistleblowing platforms. This study discusses several asso- ciated risks of whistleblowing when communicating with third parties using web- forms of newspapers, trusted organizations like WikiLeaks, or whistleblowing software like GlobaLeaks or SecureDrop. Then, this study proposes an outlook to a solution using decentralized systems to mitigate these risks using Block- chain, Smart Contracts, Distributed File Synchronization and Sharing (DFSS), and Distributed Domain Name Systems (DDNS). Keywords: Whistleblowing, Blockchain, Smart Contracts 1 Introduction By all indications, the topic of whistleblowing has been gaining extensive media atten- tion since the financial crisis in 2008, which ignited a crackdown on the corruption of institutions [1]. However, some whistleblowers have also become discouraged by the negative association with the term [2], although numerous studies show that whistle- blowers have often revealed misconduct of public interest [3]. Therefore, researchers like [3] argue that we - the community of citizens - must protect whistleblowers. Addi- tionally, some researchers, such as [1], claim that, although not perfect, we should re- ward whistleblowers financially to incentivize them to speak out to fight corruption [1].
    [Show full text]
  • Analysis of Evolution of Meme Trends on 4Chan.Org's /Pol/ Board Via
    Analysis of evolution of meme trends on 4chan.org's /pol/ board via image clustering J. Jin, E. Williams, S. Lam, O. Savas, E. Hohman, M. Bosch-Ruiz, P. Rodrigues Accenture Applied Intelligence Arlington, VA 22203 November 5, 2020 1 Introduction Internet memes rapidly accelerate the spread of ideas on social media platforms. Although memes are primarily consumed as entertainment, they often communicate messages that influence viewers' political opinions [4]. With the advent of new multimodal classification techniques, we can garner new insights about the content and culture of a platform. [2] analyzes memes using image, text, and face encoding and applies this to a large online conversation around a political event, and [5] finds that 30% of the image-with-text memes in their sample have identifiable themes that are politically relevant and shared more often by Democrats than Republicans. Often new memes are created from \templates" based on key elements and features of already popular memes. These templates can be exploited by \meme factories," which are coordinated networks of creators, for social or monetary gain. Employing meme tem- plates help users achieve widespread dissemination, urge call-to-actions, affect discourse, and spread misinformation [1]. The emergence of the novel coronavirus, COVID-19, intro- duced an influx of Internet memes reflecting on the infection rate, origin, and location of cases. Given 4chan.org's /pol/ imageboard's reputation as a vector for misinformation [7], we conducted a study of meme templates and their use in knowledge spread throughout the COVID-19 pandemic to answer: 1. What computer vision methods can we use to identify and cluster meme templates? 2.
    [Show full text]
  • Cyber Crime Assessment 2016
    NCA Strategic Cyber Industry Group Cyber Crime Assessment 2016 Need for a stronger law enforcement and business partnership to fight cyber crime 7 July 2016 Version 1.2 Overview This assessment has been jointly produced by the National Crime Agency (NCA) and the Strategic Cyber Industry Group (SCIG).1 It outlines the real and immediate threat to UK businesses from cyber crime. It argues that the speed of criminal capability development is currently outpacing our response as a community and that only by working together across law enforcement and the private sector can we successfully reduce the threat to the UK from cyber crime. 1 The Strategic Cyber Industry Group provides an overarching forum within which the National Cyber Crime Unit (NCCU) of the NCA and private sector organisations work in partnership to: coordinate joint activity against cyber crime, identify intelligence gaps and improve intelligence sharing, understand the capabilities available in law enforcement and industry, and steer the activities of Virtual Task Forces and ad hoc working groups. We would like to thank Bill Trent of Stroz Friedberg who led the SCIG contributions to this assessment. 2 Executive Summary A cyber attack that poses an existential threat to one or more major UK businesses is a realistic possibility. The long-term impact of such a cyber attack could include substantial loss of revenue and margin, of valuable data, and of other company assets. The impact of litigation costs (and, with the arrival of new regulations, potential fines), the loss of confidence from reputational damage and possible executive-level dismissals could also result in immediate and material loss of shareholder value.
    [Show full text]