Tung-Hui Hu
- Published in print:
- 2015
- Published Online:
- May 2016
- ISBN:
- 9780262029513
- eISBN:
- 9780262330091
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262029513.003.0004
- Subject:
- Computer Science, Programming Languages
This chapter examines the ways that companies, users, and states alike navigate the overload of data in the cloud by targeting information, and argues that targeted-marketing campaigns online come ...
More
This chapter examines the ways that companies, users, and states alike navigate the overload of data in the cloud by targeting information, and argues that targeted-marketing campaigns online come out of the same ideological apparatus as military targeting. Two oppositional groups serve as case studies for this argument: first, a group of radio-frequency hackers that data mined the 2011 NATO intervention in Libya, and second, the artist/geographer Trevor Paglen, who photographs U.S. reconnaissance satellites and other covert military infrastructures. As this chapter argues, these oppositional tactics may be effective, but sometimes re-animate the very structures of power that they purport to expose or overturn. The reason is due to something this chapter terms the sovereignty of data, which both co-opts user participation and also gives practices such as torture and extraordinary rendition new life within the cloud.Less
This chapter examines the ways that companies, users, and states alike navigate the overload of data in the cloud by targeting information, and argues that targeted-marketing campaigns online come out of the same ideological apparatus as military targeting. Two oppositional groups serve as case studies for this argument: first, a group of radio-frequency hackers that data mined the 2011 NATO intervention in Libya, and second, the artist/geographer Trevor Paglen, who photographs U.S. reconnaissance satellites and other covert military infrastructures. As this chapter argues, these oppositional tactics may be effective, but sometimes re-animate the very structures of power that they purport to expose or overturn. The reason is due to something this chapter terms the sovereignty of data, which both co-opts user participation and also gives practices such as torture and extraordinary rendition new life within the cloud.
Ricardo Domínguez
- Published in print:
- 2020
- Published Online:
- September 2020
- ISBN:
- 9781683401476
- eISBN:
- 9781683402145
- Item type:
- chapter
- Publisher:
- University Press of Florida
- DOI:
- 10.5744/florida/9781683401476.003.0013
- Subject:
- Society and Culture, Latin American Studies
This chapter discusses the Electronic Disturbance Theater (EDT), a group that developed virtual sit-in technologies in solidarity with the Zapatistas communities in Chiapas, Mexico, in 1998. EDT, ...
More
This chapter discusses the Electronic Disturbance Theater (EDT), a group that developed virtual sit-in technologies in solidarity with the Zapatistas communities in Chiapas, Mexico, in 1998. EDT, like many artivist groups, understood that the “politics of fear” set-off by 9/11 would be used by governments to establish almost everything under the signs of cyberwar, cyberterrorism, and cybercrime in order stop the development of Digital Zapatismo, electronic civil disobedience, hacktivism, and tactical media work across the arcs of Latin America and beyond. This essay establishes the conditions that were navigated by EDT and artivists working across digital platforms to establish new network gestures that would connect and amplify new visions of social formations emerging across Latin America, especially from the indigenous communities that were not deterred by the establishment of post-9/11 planetary war.Less
This chapter discusses the Electronic Disturbance Theater (EDT), a group that developed virtual sit-in technologies in solidarity with the Zapatistas communities in Chiapas, Mexico, in 1998. EDT, like many artivist groups, understood that the “politics of fear” set-off by 9/11 would be used by governments to establish almost everything under the signs of cyberwar, cyberterrorism, and cybercrime in order stop the development of Digital Zapatismo, electronic civil disobedience, hacktivism, and tactical media work across the arcs of Latin America and beyond. This essay establishes the conditions that were navigated by EDT and artivists working across digital platforms to establish new network gestures that would connect and amplify new visions of social formations emerging across Latin America, especially from the indigenous communities that were not deterred by the establishment of post-9/11 planetary war.
George Lucas
- Published in print:
- 2017
- Published Online:
- December 2016
- ISBN:
- 9780190276522
- eISBN:
- 9780190276553
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780190276522.001.0001
- Subject:
- Philosophy, Moral Philosophy, General
Analyses of cyber warfare during the past decade have ranged from outright denial that “there even could be such a thing” as cyber warfare, all the way to apocalyptic predictions of an inevitable ...
More
Analyses of cyber warfare during the past decade have ranged from outright denial that “there even could be such a thing” as cyber warfare, all the way to apocalyptic predictions of an inevitable looming “cyber Armageddon.” Such wildly divergent interpretations of essentially the same data reveal what this author terms an “epistemological crisis,” which can only be rectified by constructing a comprehensive narrative of cyber conflict which incorporates all these rival interpretations of the threats posed in cyberspace into a single coherent conceptual framework. In contrast to software weapons (such as Stuxnet) that produce physical effects equivalent to conventional armed force, this book traces the evolution of interstate conflict among governments lacking the infrastructure and resources to develop such complex weapons instead toward a range of tactics in the cyber domain designed to produce political effects fully equivalent to those achieved through conventional war, by deliberately blurring longstanding distinctions between conventional crime, industrial and military espionage, and conventional warfare. The author identifies this evolution in contemporary warfare as “state-sponsored hacktivism.” Lucas draws on the moral philosophy of John Rawls, Jurgen Habermas, and Alasdair MacIntyre to develop the revolutionary new accounts of just war theory, international law, and “emergent norms” of responsible state behavior required to address the problem of governance within this new domain of unrestricted warfare, in which states are increasingly emulating the behavior of individual anarchists or criminals. This first book-length analysis of ethics and cyber warfare blends technological mastery and philosophical sophistication within a summary that promises to revolutionize our understanding of the challenges and prospects for both conflict and cooperation in the cyber domain.Less
Analyses of cyber warfare during the past decade have ranged from outright denial that “there even could be such a thing” as cyber warfare, all the way to apocalyptic predictions of an inevitable looming “cyber Armageddon.” Such wildly divergent interpretations of essentially the same data reveal what this author terms an “epistemological crisis,” which can only be rectified by constructing a comprehensive narrative of cyber conflict which incorporates all these rival interpretations of the threats posed in cyberspace into a single coherent conceptual framework. In contrast to software weapons (such as Stuxnet) that produce physical effects equivalent to conventional armed force, this book traces the evolution of interstate conflict among governments lacking the infrastructure and resources to develop such complex weapons instead toward a range of tactics in the cyber domain designed to produce political effects fully equivalent to those achieved through conventional war, by deliberately blurring longstanding distinctions between conventional crime, industrial and military espionage, and conventional warfare. The author identifies this evolution in contemporary warfare as “state-sponsored hacktivism.” Lucas draws on the moral philosophy of John Rawls, Jurgen Habermas, and Alasdair MacIntyre to develop the revolutionary new accounts of just war theory, international law, and “emergent norms” of responsible state behavior required to address the problem of governance within this new domain of unrestricted warfare, in which states are increasingly emulating the behavior of individual anarchists or criminals. This first book-length analysis of ethics and cyber warfare blends technological mastery and philosophical sophistication within a summary that promises to revolutionize our understanding of the challenges and prospects for both conflict and cooperation in the cyber domain.
Arne Hintz
- Published in print:
- 2016
- Published Online:
- January 2017
- ISBN:
- 9780823271641
- eISBN:
- 9780823271696
- Item type:
- chapter
- Publisher:
- Fordham University Press
- DOI:
- 10.5422/fordham/9780823271641.003.0018
- Subject:
- Information Science, Communications
Policy hacking is a media reform strategy that focuses on citizen-based do-it-yourself policy alternatives and the development of new law and regulation. Typically it encompasses a) collecting and ...
More
Policy hacking is a media reform strategy that focuses on citizen-based do-it-yourself policy alternatives and the development of new law and regulation. Typically it encompasses a) collecting and analysing existing policies (often from other countries) and b) re-assembling these components towards a new policy package. Often it involves digital tools to crowd-source contributions from a wider range of civil society. It thereby moves beyond classic forms of advocacy, lobbying and public pressure aimed at authorities and assigns a central role in the policy process (including both policy development and policy transfer) to civil society actors. Involving loose networks and informal coalitions, policy hacking relates to the recent rise of “connective action” and “organised networks” in the civil society realm, and it is based on a tendency toward prefigurative action that is wide-spread in media activism (e.g., the development of alternative infrastructure). Policy hacking is often embedded in traditional advocacy and/or protest strategies. It is context-specific and typically requires beneficial policy windows (such as a political or economic crisis) to be successful. Yet as part of a broader strategic and tactical mix it can play a significant role in future efforts to affect and achieve media reform.Less
Policy hacking is a media reform strategy that focuses on citizen-based do-it-yourself policy alternatives and the development of new law and regulation. Typically it encompasses a) collecting and analysing existing policies (often from other countries) and b) re-assembling these components towards a new policy package. Often it involves digital tools to crowd-source contributions from a wider range of civil society. It thereby moves beyond classic forms of advocacy, lobbying and public pressure aimed at authorities and assigns a central role in the policy process (including both policy development and policy transfer) to civil society actors. Involving loose networks and informal coalitions, policy hacking relates to the recent rise of “connective action” and “organised networks” in the civil society realm, and it is based on a tendency toward prefigurative action that is wide-spread in media activism (e.g., the development of alternative infrastructure). Policy hacking is often embedded in traditional advocacy and/or protest strategies. It is context-specific and typically requires beneficial policy windows (such as a political or economic crisis) to be successful. Yet as part of a broader strategic and tactical mix it can play a significant role in future efforts to affect and achieve media reform.
Elizabeth Losh
- Published in print:
- 2012
- Published Online:
- August 2015
- ISBN:
- 9780816677948
- eISBN:
- 9781452948379
- Item type:
- chapter
- Publisher:
- University of Minnesota Press
- DOI:
- 10.5749/minnesota/9780816677948.003.0018
- Subject:
- Education, Philosophy and Theory of Education
This chapter looks into the relationship between hacktivism and the humanities. It describes a range of related protest movements during a time when a significant cohort of professors called for ...
More
This chapter looks into the relationship between hacktivism and the humanities. It describes a range of related protest movements during a time when a significant cohort of professors called for hacking the academy, including department chairs, heads of national centers, and leaders of professional associations who demanded fundamental changes in fair use, peer review, and tenure guidelines. To understand these phenomena that bring either politics into academia or academia into politics, current theories both of hacking and of hacktivism, or the nonviolent use of digital tools in pursuit of political ends, are examined. The chapter also considers how dissent by students and faculty, and protest by an old guard of political organizers and a new cadre of programmers in the general public, may be related. In the context of the digital humanities, hacktivism theory offers a way to broaden and deepen our understanding of the use of digital tools and of the politics of that tool use, and to question the uncritical instrumentalism that so many digital humanities projects propound.Less
This chapter looks into the relationship between hacktivism and the humanities. It describes a range of related protest movements during a time when a significant cohort of professors called for hacking the academy, including department chairs, heads of national centers, and leaders of professional associations who demanded fundamental changes in fair use, peer review, and tenure guidelines. To understand these phenomena that bring either politics into academia or academia into politics, current theories both of hacking and of hacktivism, or the nonviolent use of digital tools in pursuit of political ends, are examined. The chapter also considers how dissent by students and faculty, and protest by an old guard of political organizers and a new cadre of programmers in the general public, may be related. In the context of the digital humanities, hacktivism theory offers a way to broaden and deepen our understanding of the use of digital tools and of the politics of that tool use, and to question the uncritical instrumentalism that so many digital humanities projects propound.
Jessica L. Beyer
- Published in print:
- 2014
- Published Online:
- August 2014
- ISBN:
- 9780199330751
- eISBN:
- 9780199395026
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199330751.003.0002
- Subject:
- Political Science, American Politics
Chapter 2 focuses on the emergence of Anonymous as a political actor. It addresses the question of why Anonymous members first mobilized in 2008 and includes information about how this community ...
More
Chapter 2 focuses on the emergence of Anonymous as a political actor. It addresses the question of why Anonymous members first mobilized in 2008 and includes information about how this community became politically active. This chapter argues that Anonymous became involved in political activism because the technological spaces of 4chan.org and other Anonymous posting board systems—particularly extreme anonymity, lack of regulation, and shocking content—created a highly cohesive online community with a history of collective online activities of questionable legality and morality. The history of organized community activities granted Anonymous members a sense of capability that empowered them to take on the Church of Scientology in 2008.Less
Chapter 2 focuses on the emergence of Anonymous as a political actor. It addresses the question of why Anonymous members first mobilized in 2008 and includes information about how this community became politically active. This chapter argues that Anonymous became involved in political activism because the technological spaces of 4chan.org and other Anonymous posting board systems—particularly extreme anonymity, lack of regulation, and shocking content—created a highly cohesive online community with a history of collective online activities of questionable legality and morality. The history of organized community activities granted Anonymous members a sense of capability that empowered them to take on the Church of Scientology in 2008.
Jessica L. Beyer
- Published in print:
- 2014
- Published Online:
- August 2014
- ISBN:
- 9780199330751
- eISBN:
- 9780199395026
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199330751.003.0003
- Subject:
- Political Science, American Politics
Chapter 3 examines political mobilization on The Pirate Bay, a popular file-sharing site. It argues that in the case of The Pirate Bay, the technological space appears to be anonymous, unregulated, ...
More
Chapter 3 examines political mobilization on The Pirate Bay, a popular file-sharing site. It argues that in the case of The Pirate Bay, the technological space appears to be anonymous, unregulated, and based on commercial exchange, but it allows users to behave in ways that put them in direct conflict with legal norms and various authorities, including the United States and influential corporations. Additionally, the leadership of The Pirate Bay stands as the jetty in the legal sea of copyright issues, taking the legal attacks of the recording industry on behalf of its users and articulating file-sharing as a political act, which furthers the site’s function as a political platform.Less
Chapter 3 examines political mobilization on The Pirate Bay, a popular file-sharing site. It argues that in the case of The Pirate Bay, the technological space appears to be anonymous, unregulated, and based on commercial exchange, but it allows users to behave in ways that put them in direct conflict with legal norms and various authorities, including the United States and influential corporations. Additionally, the leadership of The Pirate Bay stands as the jetty in the legal sea of copyright issues, taking the legal attacks of the recording industry on behalf of its users and articulating file-sharing as a political act, which furthers the site’s function as a political platform.
Peter Krapp
- Published in print:
- 2011
- Published Online:
- August 2015
- ISBN:
- 9780816676248
- eISBN:
- 9781452947792
- Item type:
- chapter
- Publisher:
- University of Minnesota Press
- DOI:
- 10.5749/minnesota/9780816676248.003.0002
- Subject:
- Society and Culture, Media Studies
This chapter explores the way questions of access and control are negotiated in computer-mediated communication in general and the expressive politics of hacktivism and tactical media in particular. ...
More
This chapter explores the way questions of access and control are negotiated in computer-mediated communication in general and the expressive politics of hacktivism and tactical media in particular. More specifically, it addresses three of the most unfortunate misunderstandings in the standoff between old and new media. First, hackers tend to be portrayed as immature crooks, and the remedy typically sought against hacking is greater disciplining power for the authorities, with the inevitable backlash. Second, once the protection of privacy and free speech is hollowed out by surreptitious data mining and invasions of data privacy, activism becomes all too easily equated with cyberterrorism. Third, the assertion that greater secrecy ultimately yields greater security is wrong, and the cult of secrecy gives rise to a global resurgence of irrational rumorology online. The chapter also considers how conspiracy theory affects public debate over code and law when it takes the place of critical Net culture.Less
This chapter explores the way questions of access and control are negotiated in computer-mediated communication in general and the expressive politics of hacktivism and tactical media in particular. More specifically, it addresses three of the most unfortunate misunderstandings in the standoff between old and new media. First, hackers tend to be portrayed as immature crooks, and the remedy typically sought against hacking is greater disciplining power for the authorities, with the inevitable backlash. Second, once the protection of privacy and free speech is hollowed out by surreptitious data mining and invasions of data privacy, activism becomes all too easily equated with cyberterrorism. Third, the assertion that greater secrecy ultimately yields greater security is wrong, and the cult of secrecy gives rise to a global resurgence of irrational rumorology online. The chapter also considers how conspiracy theory affects public debate over code and law when it takes the place of critical Net culture.
George Lucas
- Published in print:
- 2017
- Published Online:
- December 2016
- ISBN:
- 9780190276522
- eISBN:
- 9780190276553
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780190276522.003.0002
- Subject:
- Philosophy, Moral Philosophy, General
Chapter 1 outlines the ontology of cyberspace, and how objects, events, and operations transpiring in that domain differ from those in the familiar domains of land, sea, air, and space. It summarizes ...
More
Chapter 1 outlines the ontology of cyberspace, and how objects, events, and operations transpiring in that domain differ from those in the familiar domains of land, sea, air, and space. It summarizes the background history of malevolent activities in cyberspace, including crime, vandalism, political activism (hacktivism), espionage, and putative acts of war. This form of state conflict is compared to “irregular” warfare in conventional domains, and is also identified as a component of China’s People’s Liberation Army doctrine from the 1990s of “unrestricted” or “soft” warfare. Soft war is a form of unarmed conflict designed to coerce adversaries into yielding to the attacker’s political will, thereby achieving the same objectives as conventional armed conflict. State-sponsored hacktivism, as distinct from the conventional use of effects-based cyber weapons, is the principle form of soft war practiced by states at present.Less
Chapter 1 outlines the ontology of cyberspace, and how objects, events, and operations transpiring in that domain differ from those in the familiar domains of land, sea, air, and space. It summarizes the background history of malevolent activities in cyberspace, including crime, vandalism, political activism (hacktivism), espionage, and putative acts of war. This form of state conflict is compared to “irregular” warfare in conventional domains, and is also identified as a component of China’s People’s Liberation Army doctrine from the 1990s of “unrestricted” or “soft” warfare. Soft war is a form of unarmed conflict designed to coerce adversaries into yielding to the attacker’s political will, thereby achieving the same objectives as conventional armed conflict. State-sponsored hacktivism, as distinct from the conventional use of effects-based cyber weapons, is the principle form of soft war practiced by states at present.
Jai Galliott
- Published in print:
- 2017
- Published Online:
- October 2017
- ISBN:
- 9780190652951
- eISBN:
- 9780190652982
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780190652951.003.0024
- Subject:
- Philosophy, Philosophy of Science
This chapter offers a limited defense of a controversial argument put forward by Ted Kaczynski, the “Unabomber,” namely that technological society threatens humanity’s survival. It draws on direct ...
More
This chapter offers a limited defense of a controversial argument put forward by Ted Kaczynski, the “Unabomber,” namely that technological society threatens humanity’s survival. It draws on direct correspondence and prison interviews with Kaczynski and applies his broader views to the robotization of humanity; and it argues that the technological system is so complex that users are forced into choosing between jailed technology controlled by those within existing oppressive power structures, dedicating their lives to building knowledge and understanding of the software and robotics that facilitate participation in the technological system, or otherwise revolting against said system. That is, contra Peter Ludlow, it is not simply a matter of putting technology back in the hands of the people through “hacktivisim” or open-source design and programming. We must either accept revolt as permissible or recover a philosophy of technology truly geared toward human ends—parts set against the dehumanizing whole.Less
This chapter offers a limited defense of a controversial argument put forward by Ted Kaczynski, the “Unabomber,” namely that technological society threatens humanity’s survival. It draws on direct correspondence and prison interviews with Kaczynski and applies his broader views to the robotization of humanity; and it argues that the technological system is so complex that users are forced into choosing between jailed technology controlled by those within existing oppressive power structures, dedicating their lives to building knowledge and understanding of the software and robotics that facilitate participation in the technological system, or otherwise revolting against said system. That is, contra Peter Ludlow, it is not simply a matter of putting technology back in the hands of the people through “hacktivisim” or open-source design and programming. We must either accept revolt as permissible or recover a philosophy of technology truly geared toward human ends—parts set against the dehumanizing whole.