Anonymous in Context: the Politics and Power Behind the Mask Gabriella Coleman INTERNET GOVERNANCE PAPERS PAPER NO

Anonymous in Context: the Politics and Power Behind the Mask Gabriella Coleman INTERNET GOVERNANCE PAPERS PAPER NO

INTERNET GOVERNANCE PAPERS PAPER NO. 3 — SEPTEMBER 2013 Anonymous in Context: The Politics and Power behind the Mask Gabriella Coleman INTERNET GOVERNANCE PAPERS PAPER NO. 3 — SEPTEMBER 2013 Anonymous in Context: The Politics and Power behind the Mask Gabriella Coleman Copyright © 2013 by The Centre for International Governance Innovation The opinions expressed in this publication are those of the author and do not necessarily reflect the views of The Centre for International Governance Innovation or its Operating Board of Directors or International Board of Governors. This work was carried out with the support of The Centre for International Governance Innovation (CIGI), Waterloo, Ontario, Canada (www.cigionline.org). This work is licensed under a Creative Commons Attribution — Non-commercial — No Derivatives License. To view this license, visit (www.creativecommons.org/licenses/by-nc-nd/3.0/). For re-use or distribution, please include this copyright notice. ACKNOWLEDGEMENTS CIGI gratefully acknowledges the support of the Copyright Collective of Canada. The author would like to thank Mark Raymond, Christopher Prince, Darin Barney and Maya Richman for their generous and valuable comments. 57 Erb Street West Waterloo, Ontario N2L 6C2 Canada tel +1 519 885 2444 fax +1 519 885 5450 www.cigionline.org CONTENTS About Organized Chaos: Reimagining the Internet Project 1 About the Author 1 Executive Summary 2 Introduction 2 The Formation and Mutations of Anonymous 4 2005–2010: From Trolling to Irreverent Activism 4 2010–2012: The Explosion of Digital Direct Action 5 The Logics of Anonymous 12 Weapons of the Geek 14 Conclusion 18 Works Cited 21 About CIGI 22 ANONYMOUS IN CONTEXT: THE POLITICS AND POWER BEHIND THE MASK ABOUT ORGANIZED CHAOS: ABOUT THE AUTHOR REIMAGINING THE INTERNET Gabriella Coleman is the Wolfe Chair in Scientific PROJECT and Technological Literacy at McGill University. Historically, Internet governance has been Trained as an anthropologist, she teaches, writes accomplished en passant. It has emerged largely from and researches on the ethics of computer hacking, the actions of computer scientists and engineers, with a focus on open source software and the digital in interaction with domestic legal and regulatory protest ensemble Anonymous. She is the author of systems. Beginning at least with the 2003–2005 Coding Freedom: The Ethics and Aesthetics of Hacking World Summit on the Information Society process, (published in 2012 by Princeton University Press) and however, there has been an explicit rule-making is currently working on a second book on Anonymous. agenda at the international level. This strategic agenda is increasingly driven by a coalition of states — including Russia, China and the Arab states — that is organized and has a clear, more state-controlled and monetary vision for the Internet. Advanced ACRONYMS industrial democracies and other states committed ACTA Anti-Counterfeiting Trade Agreement to existing multi-stakeholder mechanisms have a BART Bay Area Rapid Transit different view — they regard Internet governance as important, but generally lack coherent strategies for DDoS distributed denial of service Internet governance — especially at the international EDT Electronic Disturbance Theatre level. Given the Internet’s constant evolution and its EFF Electronic Frontier Foundation economic, political and social importance as a public IRC Internet Relay Chat good, this situation is clearly untenable. LOIC Low Orbit Ion Cannon A coherent strategy is needed to ensure that difficult NSA National Security Agency trade-offs between competing interests, as well as PR public relations between distinct public values, are managed in a SOPA Stop Online Piracy Act consistent, transparent and accountable manner that accurately reflects public priorities. Guided by these considerations, CIGI researchers believe they can play a constructive role in creating a strategy for states committed to multi-stakeholder models of Internet governance. In aiming to develop this strategy, the project members will consider what kind of Internet the world wants in 2020, and will lay the analytical groundwork for future Internet governance discussions, most notably the upcoming decennial review of the World Summit on the Information Society. This project was launched in 2012. The Internet Governance Paper series will result in the publication of a book in early 2014. GABRIELLA COLEMAN 1 CIGIONLINE.ORG INTERNET GOVERNANCE PAPERS: PAPER NO. 3 EXECUTIVE SUMMARY software that would help the incumbent president secure a second term. Used for fundraising and voter Since 2010, digital direct action, including leaks, targeting, the system also crunched and analyzed hacking and mass protest, has become a regular data to fine-tune voter targeting with the hope of feature of political life on the Internet. This paper giving the campaign a critical edge over Republican considers the source, strengths and weakness presidential candidate Mitt Romney. Amid much of this activity through an in-depth analysis of fanfare after Obama’s victory, journalists praised his Anonymous, the protest ensemble that has been star-studded technology team, detailing members’ adept at magnifying issues, boosting existing — hard work, success and travails — heralding the usually oppositional — movements and converting system a stellar success. amorphous discontent into a tangible form. It has been remarkably effective, despite lacking the One of the team’s major concerns, however, was human and financial resources to engage in long- not reported in the media. At all costs, the Obama term strategic thinking or planning. Anonymous has team wanted to avoid attracting the attention of neither the steady income nor the fiscal sponsorship Anonymous, a banner used by individuals and to support a dedicated team tasked with recruiting groups to organize diverse forms of collective action, individuals, coordinating activities and developing ranging from street protests to distributed denial of sophisticated software. Wherein, therefore, lies the service (DDoS) campaigns to hacking. The Obama power of Anonymous? How has it managed to campaign team treated Anonymous as (potentially) strike such fear into corporations, governments and being even more of a nuisance than the foreign state other groups? This paper answers these questions by hackers who had infiltrated the McCain and Obama examining the intersecting elements that contribute campaigns in 2008.1 If Anonymous had successfully to Anonymous’ contemporary geopolitical power: accessed servers or DDoS-ed the campaign website, its ability to land media attention, its bold and it would have ignited media attention and potentially recognizable aesthetics, its participatory openness, battered the campaign’s reputation. Although this the misinformation that surrounds it and, in alone would not likely have jeopardized Obama’s particular, its unpredictability. Anonymous signals chances for re-election (since his team was confident the growing importance of what I call “weapons of that there was no controversial information to leak), the geek,” a modality of politics exercised by a class a visit from Anonymous was considered a real of privileged and visible actors who are often at the possibility and liability. centre of economic life. Among geeks and hackers, Unlike Anonymous, many hackers work political activities are rooted in concrete experiences surreptitiously. Organizations that have been hacked of their craft — administering a server or editing usually get to decide whether or not to disclose videos — skills channelled toward bolstering civil their situations to the public. This was the case, for liberties, such as privacy. example, with The New York Times, which made the INTRODUCTION In 2012, Obama’s re-election campaign team 1 See Brian Todd (2008), “Computers at the Headquarters of assembled a talented and dedicated group the Obama and McCain Campaigns Were Hacked CNN Confirms,” of programmers, system administrators, CNN, November 6, available at: http://politicalticker.blogs.cnn.com/ mathematicians and data scientists to develop 2008/11/06/computers-of-obama-mccain-campaigns-hacked. GABRIELLA COLEMAN 2 CIGIONLINE.ORG ANONYMOUS IN CONTEXT: THE POLITICS AND POWER BEHIND THE MASK decision to go public after allegedly being targeted This paper showcases various intersecting elements by Chinese state hackers for months. Anonymous, that contribute to Anonymous’ contemporary on the other hand, seeks publicity before and after geopolitical power: its ability to land media attention, every successful action. its bold and recognizable aesthetics, its participatory openness and the misinformation that surrounds it. There is a paradox at work here: state-supported One feature stands out: Anonymous’ unpredictability. hacking is generally much better organized and funded and, in some respects, far more powerful Take, for example, its birth as an activist endeavour. than actions undertaken by Anonymous. Stuxnet Before 2008, the name Anonymous was deployed is a perfect example. Developed by the Israeli almost exclusively for “trolling,” which in Internet and American governments, this state-of-the- parlance means pulling pranks targeting people and art malware was used to disable Iran’s capacity to organizations, desecrating reputations and revealing produce enriched uranium. While Anonymous once humiliating or personal information. Trolling was claimed to have created Stuxnet, its statement was coordinated on the Internet, often

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    27 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us