Is It Possible to a Rm T

Total Page:16

File Type:pdf, Size:1020Kb

Is It Possible to a Rm T VOL NO What is the relationship between contemporary digital media and contemporary society? Is it possible to arm that digital media are without sin and exist purely in a complex socio-political and economic context within which the users bring with them their ethical and cultural complexities? This issue, through a range of scholarly writings, analyzes the problems of ethics and sin within contemporary digital media frameworks. LEA is a publication of Leonardo/ISAST. Editorial Address Leonardo Electronic Almanac Copyright 2013 ISAST Sabanci University, Orhanli – Tuzla, 34956 Leonardo Electronic Almanac Istanbul, Turkey Volume 19 Issue 4 September 15, 2013 Email ISSN 1071-4391 [email protected] ISBN 978-1-906897-26-0 The ISBN is provided by Goldsmiths, University of London. Web LeoNardo eLectroNIc aLmaNac, VoLume 19 Issue 4 » www.leoalmanac.org lea publishing & subscription information » www.twitter.com/LEA_twitts » www.flickr.com/photos/lea_gallery Without Sin: Freedom and Editor in Chief » www.facebook.com/pages/Leonardo-Electronic- Lanfranco Aceti [email protected] Almanac/209156896252 Taboo in Digital Media Co-Editor Özden Şahin [email protected] Copyright © 2013 Leonardo, the International Society for the Arts, VoLume edItorS Managing Editor Sciences and Technology lanfranco aceti & Donna leishman John Francescutti [email protected] Leonardo Electronic Almanac is published by: edItorıaL maNagerS Art Director Leonardo/ISAST Deniz Cem Önduygu [email protected] 211 Sutter Street, suite 501 sheena calvert & ÖzDen Şahin San Francisco, CA 94108 Editorial Board USA Peter J. Bentley, Ezequiel Di Paolo, Ernest Edmonds, Felice Leonardo Electronic Almanac (LEA) is a project of Leonardo/ Frankel, Gabriella Giannachi, Gary Hall, Craig Harris, Sibel Irzık, The International Society for the Arts, Sciences and Technol- Marina Jirotka, Beau Lotto, Roger Malina, Terrence Masson, ogy. For more information about Leonardo/ISAST’s publica- Jon McCormack, Mark Nash, Sally Jane Norman, Christiane tions and programs, see http://www.leonardo.info or contact Paul, Simon Penny, Jane Prophet, Jeffrey Shaw, William [email protected]. Uricchio Leonardo Electronic Almanac is produced by Cover Passero Productions. Deniz Cem Önduygu Reposting of this journal is prohibited without permission of Leonardo/ISAST, except for the posting of news and events listings which have been independently received. The individual articles included in the issue are © 2013 ISAST. ISSN 1071-4391 ISBN 978-1-906897-26-0 VOL 19 NO 4 LEONARDOELECTRONICALMANAC The Leonardo Electronic Almanac acknowledges the kind support for this issue of music and performing arts professions Ron Sadoff, Director Music Technology Music Composition B.m., m.m., ph.D. B.m., m.m., ph.D. Including a new 3-Summer M.M. concert music, Jazz, film scoring, immersive audio, computer music, informatics, electro-acoustic, songwriting cognition, recording and production N. • who are active in the local and international music field, Study with a premier faculty tio U including Juan pablo Bello, morwaread farbood, phil e. Galdston, paul Geluso, stit N i tae Hong park, kenneth peacock, agnieszka roginska, robert rowe, s. alex ruthmann, Y ronald sadoff, David schroeder, mark suozzo, and Julia wolfe • w ork within a large and enriching university environment in the heart of New York city al opportUNit U • Have access to state-of-the-art facilities including the James l. Dolan music /eq recording studio, one of the most technologically advanced audio teaching facilities N in the United states • Collaborate with an outstanding variety of department performance groups, along with choreographers, visual artists, writers, filmmakers, and scholars in other fields affirmative actio N • t ake advantage of special courses offered abroad and during the summer is a Y visit www.steinhardt.nyu.edu/music or call 212 998 5424 to learn more. iversit N ork U Y New LEONARDOELECTRONICALMANAC VOL 19 NO 4 ISSN 1071-4391 ISBN 978-1-906897-26-0 Job: A1310_06_MusicTech Publication: LEA Journal Size: 6.5” x 9.5” (no bleed) [177.8 mm x 254 mm trim] Color(s): b/w Material Type: jpg (300 dpi) Line Screen: Delivery: email: Issue Date: Closing Date: 10.15.13 Proof: F Date: 10.14.13 C ONTENTS CONTENTS Leonardo Electronic Almanac Volume 19 Issue 4 10 POST-SOCIETY: DATA CAPTURE AND ERASURE ONE CLICK AT A TIME Lanfranco Aceti 16 WITHOUT SIN: FREEDOM AND TABOO IN DIGITAL MEDIA Donna Leishman 26 LIKE REALITY 162 SEDUCTIVE TECHNOLOGIES AND INADVERTENT VOYEURS Birgit Bachler EFFECT Simone O’Callaghan 36 MEDIA, MEMORY, AND REPRESENTATION IN THE DIGITAL AGE David R. Burns 178 ANONYMOUS SOCIAL AS POLITICAL Kriss Ravetto-Biagioli 52 DIFFERENTIAL SURVEILLANCE OF STUDENTS Deborah Burns 198 CONTENT OSMOSIS AND THE POLITICAL ECONOMY OF SOCIAL MEDIA 66 ANA-MATERIALISM & THE PINEAL EYE: Don Ritter BECOMING MOUTH-BREAST Johnny Golding 220 RE-PROGRAM MY MIND Debra Swack 84 DANCING ON THE HEAD OF A SIN: TOUCH, DANCE AND TABOO 236 THE PREMEDIATION OF IDENTITY MANAGEMENT IN Sue Hawksley ART & DESIGN Sandra Wilson & Lilia Gomez Flores 100 “THERE MUST BE SOMETHING WRONG WITH THIS, SALLY…” Ken Hollings 256 PORNOGRAPHY, ALTERITY, DIVINITY Charlie Gere 114 COPYRIGHT AND DIGITAL ART PRACTICE Smita Kheria 268 DO WE NEED MORALITY ANYMORE? Mikhail Pushkin 128 CURATING, PIRACY AND THE INTERNET EFFECT Alana Kushnir 280 THE ECONOMIES OF LANGUAGE IN DIGITAL SPACE/S Sheena Calvert 148 PRECARIOUS DESIGN Donna Leishman 6 LEONARDOELECTRONICALMANAC VOL 19 NO 4 ISSN 1071-4391 ISBN 978-1-906897-26-0 ISSN 1071-4391 ISBN 978-1-906897-26-0 VOL 19 NO 4 LEONARDOELECTRONICALMANAC 7 NSA: No Speaking Aloud, Anonymous, 2013. 8 LEONARDOELECTRONICALMANAC VOL 19 NO 4 ISSN 1071-4391 ISBN 978-1-906897-26-0 ISSN 1071-4391 ISBN 978-1-906897-26-0 VOL 19 NO 4 LEONARDOELECTRONICALMANAC 9 E DITORIAL EDITORIAL Post-Society: Data Capture and Erasure Stultifera Navis towards its destiny inexorably, bringing In order to discuss the present post-societal condition, One Click at a Time all others with them. one would need first to analyze the cultural disregard that people have, or perhaps have acquired, for their Having segregated themselves in a prison of their own personal data and the increasing lack of participation doing, the politicians look at all others as being part of in the alteration of the frameworks set for post-data. a large mad house. It is from the upper deck of a gilded prison that politicians stir the masses in the lower This disregard for personal data is part of cultural decks into a frenzy of fear and obedience. forms of concession and contracting that are deter- “Oh, in the name of God! Now I know what it feels belief or faith that their lives are in good hands, that of mined and shaped not by rights but through the mass like to be God!” the state. Why should it be in this discourse, whose forms we loss of a few rights in exchange for a) participation Frankenstein (1931) have seen to be so faithful to the rules of reason, in a product as early adopters (Google), b) for design Nevertheless it speaks of a ‘madness’ of the politician that we find all those signs which will most mani- status and appearance (Apple), c) social conventions They must have felt like gods at the NSA when as a category. A madness characterized by an alien- festly declare the very absence of reason? 3 and entertainment (Facebook) and (Twitter). they discovered that they were able to spy on any- ation from the rest of society that takes the form of one. What feels ridiculous to someone that works isolation. This isolation is, in Foucauldian terms, none Discourses, and in particular political discourses, no Big data offers an insight into the problem of big loss- with digital media is the level of ignorance that other than the enforcement of a voluntary seclusion in longer mask the reality of madness and with it the es if a catastrophe, accidental or intentional, should people continue to have about how much every- the prison and the mad house. feeling of having become omnipotent talks of human ever strike big databases. The right of ownership one else knows or can know about ‘you.’ If only madness in its attempt to acquire the impossible: that of the ‘real object’ that existed in the data-cloudwill people were willing to pay someone, or to spend a The prisons within which the military, corporate, finan- of being not just godlike, but God. become the new arena of post-data conflict. In this bit of time searching through digital data services cial and political worlds have shut themselves in speak context of loss, if the crisis of the big banks has dem- themselves,they would discover a range of services increasingly of paranoia and fear. As such the voluntary As omnipotent and omniscient gods the NSA should onstrated anything, citizens will bear the brunt of the that have started to commercialize collective data: prison within which they have sought refuge speaks allow the state to ‘see.’The reality is that the ‘hands’ of losses that will be spread iniquitously through ‘every- bought and sold through a range of semi-public busi- more and more the confused language that one may the state are no longer functional and have been sub- one else.’ nesses and almost privatized governmental agencies. have imagined to hear from the Stultifera Navis. stituted with prostheses wirelessly controlled by the Public records of infractions and crimes are available sociopaths of globalized corporations. Theamputation The problem is therefore characterized by
Recommended publications
  • Deciphering L33tspeak
    Ghent University Faculty of Arts and Philosophy Thesis Deciphering L33t5p34k Internet Slang on Message Boards Supervisor: Master Paper submitted in partial fulfilment of Prof. Anne-Marie Simon-Vandenbergen the requirements for the degree of ―Master in de Taal- en Letterkunde – Afstudeerrichting: Engels‖ By Eveline Flamand 2007-2008 i Acknowledgements I would like to thank my promoter, professor Anne-Marie Vandenbergen, for agreeing on supervising this perhaps unconventional thesis. Secondly I would like to mention my brother, who recently graduated as a computer engineer and who has helped me out when my knowledge on electronic technology did not suffice. Niels Cuelenaere also helped me out by providing me with some material and helping me with a Swedish translation. The people who came up to me and told me they would like to read my thesis, have encouraged me massively. In moments of doubt, they made me realize that there is an audience for this kind of research, which made me even more determined to finish this thesis successfully. Finally, I would also like to mention the members of the Filologica forum, who have been an inspiration for me. ii Index 1. Introduction .......................................................................................................................... 1 2. Methodology ......................................................................................................................... 1 2.1 4chan ...............................................................................................................................
    [Show full text]
  • Speaking in Lolcats
    Transcribed text of an address to the Educational Computing Organization of Ontario, Richmond Hill, Ontario, November 12, 2009. Audio and slides available at http://www.downes.ca/presentation/232 Thanks everyone, and people online you should be hearing me OK, if not just say something in the chat area. Your chat area is being viewed by an audience here in Richmond Hill, which I had never really heard of before I came here, so I’m kind of… that’s good Christina, excellent. Now some of the people in the room may be joining you and anything you say in the chat area can be viewed by people in the room. We’re recording the Elluminate session – I’m not going to press my luck and try for video. Elluminate does support video and it supports it rather well, but I have to be standing right here the entire time because it would use the iSight monitor (I don’t have a video camera hooked up) and I don’t want to do the entire presentation like this, so I won’t. This is the second of two presentations today, and as I said in the first presentation, when you do two presentations in a day, there’s a good one and a bad one – this is the good one. It’s a fairly sweeping and ambitious presentation. It’s probably not the sort of presentation you’ll see in any of the other sessions. I’m trying to go someplace a bit different. 2 Stephen Downes It’s the first time I’ve tried this material, though I’ve tried bits and pieces of it, and it’s something I’ve been thinking about for a long time.
    [Show full text]
  • Coleman-Coding-Freedom.Pdf
    Coding Freedom !" Coding Freedom THE ETHICS AND AESTHETICS OF HACKING !" E. GABRIELLA COLEMAN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright © 2013 by Princeton University Press Creative Commons Attribution- NonCommercial- NoDerivs CC BY- NC- ND Requests for permission to modify material from this work should be sent to Permissions, Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TW press.princeton.edu All Rights Reserved At the time of writing of this book, the references to Internet Web sites (URLs) were accurate. Neither the author nor Princeton University Press is responsible for URLs that may have expired or changed since the manuscript was prepared. Library of Congress Cataloging-in-Publication Data Coleman, E. Gabriella, 1973– Coding freedom : the ethics and aesthetics of hacking / E. Gabriella Coleman. p. cm. Includes bibliographical references and index. ISBN 978-0-691-14460-3 (hbk. : alk. paper)—ISBN 978-0-691-14461-0 (pbk. : alk. paper) 1. Computer hackers. 2. Computer programmers. 3. Computer programming—Moral and ethical aspects. 4. Computer programming—Social aspects. 5. Intellectual freedom. I. Title. HD8039.D37C65 2012 174’.90051--dc23 2012031422 British Library Cataloging- in- Publication Data is available This book has been composed in Sabon Printed on acid- free paper. ∞ Printed in the United States of America 1 3 5 7 9 10 8 6 4 2 This book is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE !" We must be free not because we claim freedom, but because we practice it.
    [Show full text]
  • An Instance of Hybrid Cryptography
    EsoCipher: An Instance of Hybrid Cryptography Neel Adwani University of Petroleum and Energy Studies Dehradun, Uttarakhand [email protected] ABSTRACT esoteric language is Brainfuck [5], which became notable for its This paper proposes a whole new concept in the field of Cryptog- minimalistic expressions. The whole language constitutes 8 simple raphy, i.e., EsoCiphers. Short for Esoteric Cipher, EsoCipher is an commands and an instruction pointer. LOLCODE [8] is yet another algorithm, which can be understood by a few, who have the knowl- esoteric language, which is based on the lolcat meme. So, its files edge about its backend architecture. The idea behind this concept are generated of the extensions .lol and .lols. Since its inspiration is derived from esoteric programming languages, but EsoCiphers comes from memes over the internet, the syntax contains keywords will be having a practical use in the future, as more research is done like HAI, BTW, GTFO, KTHXBYE. on the topic. Although the algorithm is quite simple to understand, While there’s no intended practical use of esoteric languages, Es- the complexity of the output will indeed prove to be difficult to oCipher may be considered obfuscated but it can be proven useful in bruteforce if a secret is embedded to it. It uses a hybrid cryptog- some fields. Since a lot of exploration hasn’t been done around this raphy based technique, which combines ASCII, Binary, Octal and topic, it is hard to determine the usability of the given algorithms in ROT 13 ciphers. The implementation and similarity index has been this paper, but intentionally EsoCiphers can be useful in preventing provided to show that it can be implemented practically.
    [Show full text]
  • Gamespeak for N00bs a Linguistic and Pragmatic Analysis of Gamers‟ Language
    Gamespeak for n00bs A linguistic and pragmatic analysis of gamers‟ language Diplomarbeit zur Erlangung des akademischen Grades einer Magistra der Philosophie an der Karl-Franzens-Universität Graz vorgelegt von Jasmin FUCHS am Institut für Anglistik und Amerikanistik Begutachterin: Ao.Univ.-Prof. Mag. Dr. Phil. Hermine Penz Graz, 2013 Table of Contents 1. Introduction ........................................................................................................................ 5 2. The multiplayer game Counter-Strike: Source .................................................................. 7 2.1. Gameplay ................................................................................................................... 7 3. Language and the Internet .................................................................................................. 8 3.1. Computer-mediated communication .......................................................................... 9 3.2. Types of computer-mediated communication .......................................................... 10 3.3. Synchronous communication ................................................................................... 11 3.4. Asynchronous communication ................................................................................. 12 3.5. Computer-mediated communication tools used in games ........................................ 12 3.5.1. TeamSpeak ......................................................................................................... 13 3.5.2.
    [Show full text]
  • From Symbolic Values to Symbolic Innovations
    Paper to be presented at DRUID15, Rome, June 15-17, 2015 (Coorganized with LUISS) FROM SYMBOLIC VALUES TO SYMBOLIC INNOVATIONS EVIDENCE BASED ON INTERNET-MEMES Mickael Benaim University of Manchester/MBS Manchester Institute of Innovation Research [email protected] Abstract Technological assets capture the attention of many scholars in innovation studies, while leaving other sources and forms of innovation less tackled. Among this neglected corpus, this article stresses the important role played by symbolic value in the production and consumption processes of innovative goods and services. We focus more especially on Internet-memes - such as lolcats - that represent iconic productions of the Internet ?lead culture? i.e. embed significant symbolic values. Therefore, this article refers to the economic sociology and strategic management literature to emphasis the force of the symbolic values? creation by new culture-lead communities, through their not so trivial productions: the Internet-memes. We especially aim to contribute to innovation studies and to refine the concept of symbolic innovation, by applying it to both physical and digital goods and services. We argue that Internet-memes are symbolic innovations per-se, but we also emphasise that they represent an almost boundless source of innovative goods and services in various sectors from cultural industries to less expected ones like finance. Jelcodes:O31,O33 ** Please do not cite without permission ** FROM SYMBOLIC VALUES TO SYMBOLIC INNOVATIONS EVIDENCE BASED ON INTERNET-MEMES Abstract: Many innovation scholars focused on technological assets, while leaving other sources and forms of innovation less tackled. Among this neglected corpus, this article stresses the important role plays by symbolic value in the production and consumption processes of innovative goods and services.
    [Show full text]
  • From Symbolic Values to Symbolic Innovation: Internet-Memes and Innovation
    Research Policy xxx (xxxx) xxx–xxx Contents lists available at ScienceDirect Research Policy journal homepage: www.elsevier.com/locate/respol From symbolic values to symbolic innovation: Internet-memes and innovation Mickael Benaim Manchester Institute of Innovation Research (MIOIR) AMBS, University of Manchester, Denmark Road, Manchester M13 9NG, United Kingdom ARTICLE INFO ABSTRACT JEL classifications: Innovation studies has largely focused on technological assets, while leaving other sources and forms of in- O33 novation less tackled. Among this neglected corpus, this article stresses the important role played by symbolic Z13 value in the consumption and production processes of innovative goods and services. I explore especially O39 Internet-memes that represent iconic productions of the Internet ‘lead culture’, which embed significant sym- M3 bolic values. This article therefore, refers to the economic sociology and innovation management literature to Keywords: emphasise the force of these creations of symbolic value by culture-lead communities, through their production Internet-meme of Internet-memes. I argue that Internet-memes represent a widespread source of innovation in various sectors Symbolic value (from cultural industries to less expect ones like finance). While exploratory, the present study extends the Symbolic innovation debate on the nature of innovation, its symbolic and cultural aspects and its diffusion processes. It ultimately suggests potential new paths for innovation policies to tackle these new forms of innovations. 1. Introduction creativity” (Solon, 2013). The diffusion’s power of memes is facilitated by specific platforms: such as dedicated blogs (e.g. 4chan, Reddit or In 1966 the Beatles were said to be more popular than Jesus. Half a Ihascheezburger); video platforms (e.g.
    [Show full text]
  • 3.5 Years of Augmented 4Chan Posts from the Politically Incorrect Board
    Proceedings of the Fourteenth International AAAI Conference on Web and Social Media (ICWSM 2020) Raiders of the Lost Kek: 3.5 Years of Augmented 4chan Posts from the Politically Incorrect Board Antonis Papasavva,*,§ Savvas Zannettou,†,§ Emiliano De Cristofaro,*,§ Gianluca Stringhini,‡,§ Jeremy Blackburn#,§ *University College London, †Max-Planck-Institut fur¨ Informatik, ‡Boston University, #Binghamton University, §iDRAMA Lab {antonis.papasavva.19, e.decristofaro}@ucl.ac.uk, [email protected], [email protected], [email protected] Abstract tion of users who committed mass shootings (Austin 2019; Ali Breland 2019; Evans 2018). This paper presents a dataset with over 3.3M threads and 4chan is an imageboard where users (aka Original Posters, 134.5M posts from the Politically Incorrect board (/pol/) of or OPs) can create a thread by posting an image and a mes- the imageboard forum 4chan, posted over a period of al- most 3.5 years (June 2016-November 2019). To the best of sage to a board; others can post in the OP’s thread, with a our knowledge, this represents the largest publicly available message and/or an image. Among 4chan’s key features are 4chan dataset, providing the community with an archive of anonymity and ephemerality; users do not need to register to posts that have been permanently deleted from 4chan and are post content, and in fact the overwhelming majority of posts otherwise inaccessible. We augment the data with a set of ad- are anonymous. At most, threads are archived after they be- ditional labels, including toxicity scores and the named enti- come inactive and deleted within 7 days.
    [Show full text]
  • Verge 7 Iz in Ur Meme / Aminalizin Teh Langwich: a Linguistic Study Of
    Verge 7 Iz in ur meme / aminalizin teh langwich: A linguistic study of LOLcats Aliza Rosen Verge 7 Rosen 2 As far as Internet culture goes, the pairing of cat pictures with grammatically erroneous captions has become one of the most pervasive trends of the past few years. LOLcats, as they are termed – a combination of LOL, Internet slang for “Laugh Out Loud,” and cat, the domesticated feline found in perhaps too many American households – have evolved from an Internet fad to a culture all their own. That is not to say, though, that just any pair of a caption and a picture of a cat is a LOLcat; while websites like icanhascheezburger.com and lolcats.com accept submissions from all users, there is inarguably an art to creating a quality LOLcat. The trend inevitably evolves and new styles emerge, but the classic LOLcat embodies a certain few traits, specifically with regard to the captions created. This paper aims to examine LOLcat captions in terms of the language employed, which is notably distinct from correct English and yet is still intelligible to most English speakers. While it is understood that the language, called LOLspeak, inevitably encounters some variance among its users, the spelling changes and altered grammatical structure suggest a number of overlying patterns. Many have referred to LOLcat language as “kitty pidgin,” a kind of mangled English adopted by cats in order to communicate with their owners. However, the alterations that occur from English to LOLspeak do not completely match the usual characteristics of a pidgin language. In fact, they more accurately represent a mix of “baby talk,” the variation many adults use when talking to infants and toddlers, and Leetspeak, the Internet lingo developed mainly by those playing online video games like Counterstrike.
    [Show full text]
  • ARE YOU with ME? HOW ONLINE CONVERSANTS MAKE L33T CONNECTIONS C. Anne Engert
    ARE YOU WITH ME? HOW ONLINE CONVERSANTS MAKE L33T CONNECTIONS C. Anne Engert R yuo a l33t h4x0r? Can j00 pwn n00bs? sites, l33t has been used to help identify its “1|=\| 0u |{4N r34|) t|-|15t|-|3N\| 0u i5 t3|-| user communities in an environment with |_337” (Blashki 81). If the preceding puzzles unique linguistic needs. Remarkable the reader, I can understand. My first especially for its streamlined nature, online encounter with l33t—a shortened form of conversation strips communication of all its elite, alternately written 1337, leet, or leet physical properties—gesture, inflection, and speak—left me feeling much the same way facial expression—so that text must stand about this online linguistic phenomenon. I alone. Of course, communication by the old- wanted to know more. As a student of fashioned written letter also uses only text, English literature and a lover of language, but that form of exchange does not operate what I found sent shivers up my spine: an with the immediacy of online communication alternate alphabet with as many as a dozen where real time, turn-based conversations options for each standard letter; a wildly between two or more persons, some half a shifting substitution-cipher approach to world apart, take place regularly. spelling that mixes letters, numbers, and other Furthermore, where letter writing allows for keyboard characters; a new morphology more expansive expression, online (patterns of word formation) with its own conversation favors quick, concise response. unique word endings; a dizzying array of Internet communication channels such as acronyms for conversational use. I had the Twitter actually limit users to messages of impression that a whole new language was one hundred forty characters or fewer.
    [Show full text]
  • Why “Hacktivism” Can and Should Influence Cybersecurity Reform
    INVESTING IN A CENTRALIZED CYBERSECURITY INFRASTRUCTURE: WHY “HACKTIVISM” CAN AND SHOULD INFLUENCE CYBERSECURITY REFORM Brian B. Kelly INTRODUCTION ........................................................................................ 1664 I. CYBERCRIME, HACKTIVISM, AND THE LAW ......................... 1671 A. The Current State of Cybercrime ............................................... 1671 B. Defining Hacktivism and Anonymous’s Place Within the Movement .................................................................................. 1676 1. Hacking and Hacktivism ..................................................... 1676 2. Anonymous ......................................................................... 1678 C. Current Cybersecurity Law ....................................................... 1683 1. Federal Statutes ................................................................... 1683 2. National Defense Systems ................................................... 1684 3. State Monitoring Systems .................................................... 1685 4. International Coalitions ....................................................... 1686 II. CURRENT REFORM PROPOSALS ............................................... 1687 A. Obama Proposal ........................................................................ 1687 B. Republican Task Force Proposal .............................................. 1689 III. THE CYBERSECURITY REFORM SOLUTION ........................... 1692 A. Similarities in the Reform Models ............................................
    [Show full text]
  • Hacker, Hoaxer, Whistleblower, Spy the Many Faces of Anonymous
    hacker, hoaxer, whistleblower, spy the many faces of anonymous Gabriella Coleman London • New York Hacker Hoaxer Whistleblower 2015 PB 13-08-15.indd 3 8/13/2015 3:44:42 PM Epilogue: The State of Anonymous “I have grown to love secrecy. It seems to be the one thing that can make modern life mysterious or marvelous to us. The commonest thing is delightful if only one hides it.” Oscar Wilde “The political education of apolitical technical people is extra ordinary.” Julian Assange he period described in this book may seem to many to represent the pinnacle of Anonymous activity: their Tsupport role in the various movements that constituted the Arab Spring; the high-profile media attention garnered by the gutsy LulzSec and AntiSec hacks; the ever growing com- mitment to domestic social justice issues seen in engagements against rape culture and police brutality. Unsurprisingly, this impressive flurry of protest activity was met with similarly impressive law enforcement crackdowns. Throughout Europe, Asia, Australia, and the Americas, law enforcement officials detained over one hundred Anonymous activists—including many of the figures profiled in this book: Jeremy Hammond and John Borell in the United States, and Ryan Ackroyd and Mustafa Al-Bassam in the United Hacker Hoaxer Whistleblower 2015 PB 13-08-15.indd 401 8/13/2015 3:44:54 PM 402 hacker, hoaxer, whistleblower, spy Kingdom. Others arrested were geeky activists whose “crime” had been to simply channel a small portion of their computer resources toward DDoS campaigns organized by Anonymous in an effort to collectively shame financial organizations, such as PayPal when they caved to government pressure and terminated all services to the embattled whistleblowing organ- ization WikiLeaks.
    [Show full text]