Cyber Disobedience: Re://Presenting Online Anarchy

Home > Other > Cyber Disobedience: Re://Presenting Online Anarchy > Page 15
Cyber Disobedience: Re://Presenting Online Anarchy Page 15

by Jeff Shantz


  The possibilities for a better alternative emerging—in place of the authoritarian forms of what might coalesce as neo-fascism or prison-industrial capitalism—are dependent upon rooted material forms of organization and the preparatory building of the infrastructures of resistance. Tools and practices of cyber disobedience will be important parts in the day-to-day work of these infrastructures of resistance and in their construction, but they are not a substitute for the organizations, resources, and relationships that make up infrastructures of resistance themselves. This is what the early TAO organizers understood clearly, but which many later generations of cyber activists have lost track of.

  Cyber anarchists, and activists more broadly, need to devote more attention to affirming what they want—what they are for rather than what they are against—and preparing conditions, providing means, by which it might be realized. Direct action in tech workplaces, and organized efforts toward workers’ control can secure these means—indeed, they will not be secured without syndicalist organizing in tech industries.

  Endnotes

  Chapter 3

  1. Mansfield-Devine S. DDoS: threats and mitigation. Network Security [serial - online]. -December 1, 2011; 2011(12): 5-12. Available from: E-Journals, Ipswich, MA. Accessed March 25, 2012.

  2. Hacktivism: coined by Omega, a hacker, and member of the Cult of the Dead Cow in 1998. The term refers to the combination of computer hacking and political activism. (http://www.wired.com/techbiz/it/news/2004/07/64193.” Wired News, July 14, 2004. Retrieved March 10, 2012.)

  3. “http://www.nytimes.com/2009/06/16/books/16situation.html?_r=1.” New York Times, June 15, 2009. Retrieved March 10, 2012.

  4. Ibid, P. 16

  5. The Communist Manifesto, Karl Marx and Friedrich Engels, P. 70

  6. http://news.cnet.com/8301-31921_3-20062398-281.html CNET. May 12, 2011. Retrieved March 11, 2012.

  7. Free sharing of technological information.

  8. Note: The proposed SOPA & PIPA bills are similar reflection to the English Enclosure Acts proposed by the Feudal lords when wealth was needed. In the same way that they expropriated land, passed laws that legalized the theft of land and created enclosures of the “commons.” The Internet is now becoming privatized. In the feudal period, the laws and enclosure acts were enforced by the military; today, we are seeing the same occurrence with Homeland Security, FBI, RCMP, and CSIS. The theft of the “commons,” or in today’s terms the Internet as a commune; the acts are being upheld through law and force. The intellectual theft of property and software piracy is being done under the conditions of capitalist competition; individual capitalists are acting on their self-interests of “profit” or exploitation. The work being done by criminal justice agencies may be for the best interests of their company, and the state police appear to be there to referee that competition. As a result, accessibility to information is taken back.

  9. English Wikipedia anti-SOPA Blackout, January 18, 2012. Retrieved March 11, 2012.

  10. International Business, Times. “Anonymous Unleashes DDoS Attacks on DOJ, U.S Copyright Office, RIAA, MPAA and Universal Music Sites.” International Business Times 1: Regional Business News. Web. 27 March. 2012.

  11. http://www.wired.com/gamelife/2011/05/sony-online-entertainment-hack/ WIRED. May 2, 2011. Retrieved March 12, 2012.

  12. This quote is a reference to the 1982 book “V for Vendetta”; Anonymous members also often quote the 2005 film adaptation and wear Guy Fawkes masks as made popular through Occupy movements protesting against tyranny, politicians and corporations.

  13. Geers, Kenneth. “The Cyber Threat To National Critical Infrastructures: Beyond Theory.” Journal Of Digital Forensic Practice 3.2-4 (2010): 124-130. E Journals. Web. 28 March. 2012.

  14. www.stratfor.com

  15. Where an estimated 86-145 Afghani’s were killed, mostly children, by an American aircraft on May 4th, 2009.

  16. A satirical term coined by Stephen Colbert referring to telling truths from “the gut” without regard to evidence or logic.

  17. The Communist Manifesto, Karl Marx and Friedrich Engels, P. 40

  Chapter 4

  1. Zero-day vulnerability: a vulnerability whose details are unknown. Its exploitation can potentially yield any privilege on the destination host. (Wang et al., 2010)

  2. Phishing: a form of social engineering in which an attacker attempts to fraudulently acquire sensitive information from a victim by impersonating a trustworthy third party. (Jagatic et al., 2005, p. 1)

  References

  Adefurin, A. 2011. “Ciprofloxacin Safety in Pediatrics: A Systematic Review.” Archives of Disease in Childhood.

  Agnew, R. 1992. “Foundation for a General Strain Theory.” Criminology 30(1): 47–87.

  “Anarchist Violence as Acts of War.” Huffington Post. April 26. http://www.huffingtonpost.com/steven-kurlander/a-lesson-of-the-boston-bombings_b_3156494.html

  Anonymous. 2012. http://www.anonpaste.me/anonpaste/index.php?23a693bafc9b3cbd#EKwY3Tvnge77IokYzy4GmSKj8a2mrP3Jp0VanhMaeuI = Accessed Nov 19, 2012.

  Babbie, E. 2003. The Practice of Social Research, 10th edition. Wadsworth: Thomson Learning Inc.

  Badiou, Alain. 2011. Polemics. London: Verso.

  Beck, J. 1999. “The False Claims Act and the English Eradication of Qui Tam Legislation.” North Carolina Law Review 78(3): 539–642.

  Beck, U. 2000. “The Cosmopolitan Perspective: Sociology of the Second Age of Modernity.” British Journal of Sociology 51: 79–105.

  Bey, Hakim. 1996. Millenium. New York: Autonomedia.

  ———. 1991. Immediatism. San Francisco: AK Press.

  Biderman, A. and A. Reiss. 1967. “On Exploring the ‘Dark Figure’ of Crime.” The Annals of the American Academy of Political and Social Science 374: 1–15.

  Brito, J. 2011. “‘We Do It for the Lulz’: What Makes LuzSec Tick?” June 17. Time Magazine, Computers, http://techland.time.com/2011/06/17/we-do-it-for-the-lulz-what-makes-lulzsec-tick/ Accessed July 26, 2012.

  Bucket, D. 2004. “Scientist Gets Congratulatory Letter from Health Canada After Being Fired.” Canadian Press, News August 4. http://www.healthcoalition.ca/archive/yourfired.pdf Accessed November 18, 2012.

  Burleigh, Michael. 2010. Blood and Rage: A Cultural History of Terrorism. New York: Harper.

  Callender, C. 2010. “Stephen Hawking Says There’s no Theory of Everything.” CultureLab http://www.newscientist.com/blogs/culturelab/2010/09/stephen-hawking-says-theres-no-theory-of-everything.html

  Chesterton, G.K. 2008 [1907]. The Man who was Thursday: A Nightmare. London: Penguin.

  Cleaver, Harry. 1992. “Kropotkin, Self-valorization and the Crisis of Marxism.” Paper presented at the Conference on Pyotr Alexeevich Kropotkin, Russian Academy of Science, Moscow, St. Petersburg, and Dimitrov, December 8–14.

  Clippinger, John and David Bollier. 2005. “A Renaissance of the Commons: How the New Sciences and Internet Are Framing a New Global Identity and Order.” In CODE: Collaborative Ownership and the Digital Economy, ed. Rishab Aiyer Ghosh. Boston: MIT Press.

  CNET. 2011. http://news.cnet.com/8301-31921_3-20062398-281.html CNET May 12. Accessed March 11, 2012.

  Cohen, N. 2010. “Iraq Video Brings Notice to a Web Site.” New York Times, World, April 6. http://www.nytimes.com/2010/04/07/world/07wikileaks.html Accessed November 7, 2012.

  Coleman, Gabriella. 2012a. Coding Freedom: The Ethics and Aesthetics of Hacking. Princeton University Press.

  Conrad, Joseph. 1963 [1907]. The Secret Agent. London: Penguin.

  ———. 2012b. “Everything You Know about Anonymous is Wrong.” http://www.aljazeera.com/indepth/opinion/2012/05/201255152158991826.html

  Deibert, Ronald. 2013. “Metadata.” The Globe and Mail. Tuesday, June 11, A11.

  Dodd, G. 2008. “‘Anonymous’ Hackers Vow to ‘Dismantle’ Scientology.” Xinhuanet, January 25. http://news.xinhuanet.com/english/200801/25/content_7495986.htm Accessed July 24, 2012.

  Doherty, Brian. 2012. “What 3-D Prin
ting Means for Gun Rights.” Reason. http://reason.com/archives/2012/12/12/what-3-d-printing-means-for-gun-rights

  Duncombe, Stephen. 1997. Notes from Underground: Zines and the Politics of Alternative Culture. London: Verso.

  Felson, M. 2006. Crime and Nature. Thousand Oaks, CA: Sage.

  Foreign Intelligence Surveillance Court. 2013. “United States Foreign Intelligence Surveillance Court.” Washington, D.C. Docket Number: BR 13–80.

  Foster, John Bellamy and Robert McChesney. 2011. “The Internet’s Unholy Marriage to Capitalism.” Monthly Review. 62(10). http://monthlyreview.org/2011/03/01/the-internets-unholymarriage-to-capitalism

  Foucault, M. 1976. The History of Sexuality. London: Penguin.

  ———. 1977. Discipline & Punishment: The Birth of the Prison. New York: Vintage Books.

  ———. 1978. “Spaces of Security: The Example of the Town.” Political Geography 26: 48–56.

  ———. 1982. “The Subject and Power.” Critical Inquiry 8(4): 777–795.

  ———. 1998. Ethics: Subjectivity and Truth (Essential Works of Foucault, 1954-1984). Ed. P. Rabinow. New York: New Press.

  Freeze, Colin and Josh Wingrove. 2013. “Opposition, Privacy Watchdog Question Surveillance Program.” The Globe and Mail. Tuesday, June 11, A1.

  Frum, David. 2013. “The Internet’s Do-It-Yourself Culture, Gone Deadly.” National Post. Saturday, May 11. http://fullcomment.nationalpost.com/2013/05/11/david-frum-2/

  Gallagher, S. 2012. “‘Patriotic Hacktivist’ The Jester Unmasked—Or Maybe It’s a Big Troll.” ARS Technica, Cyberwar. May 15. http://arstechnica.com/security/2012/05/patriotic-hacktivist-the-jester-unmasked-or-maybe-its-a-big-troll/ Accessed July 25, 2012.

  Geers, Kenneth. 2010. “The Cyber Threat To National Critical Infrastructures: Beyond Theory.” Journal Of Digital Forensic Practice 3(2–4): 124–130. E Journals. Web. March 28, 2012.

  Gill, N. 2012. “Assange Says U.S. Wikileaks Inquiry Reveals His Life’s at Risk.” Bloomberg Businessweek, News, September 27. http://www.businessweek.com/news/2012-09-27/assange-says-u-dot-s-dot-wikileaks-inquiry-reveals-his-life-s-at-risk (accessed on November 14, 2012).

  Globe and Mail, The. 2013. “For Parliament, not a Minister Alone.” The Globe and Mail. Tuesday, June 11, A16.

  Goldberg, L. (Producer), and J. Badham (Director). 1983. WarGames. United States: MGM/UA Entertainment Company.

  Gonzalez, J. 2012. “$104M Payday from to IRS for UBS Whistleblower.” NY Daily News September 12. http://articles.nydailynews.com/2012-09-12/news/33768861_1_bradley-birkenfeld-money-in-swiss-banks-tax-fraud Accessed November 19, 2012.

  Gramsci, A. 1971. Selections from the Prison Notebooks. Ed. Q. Hoare and G. Smith. New York: International Publishers.

  Gunkel D. 2005. “Editorial: Introduction to Hacking and Hacktivism.” New Media Society 7(5): 595–597.

  Hacker. 2011. In Merriam-Webster.com. Retrieved July 20, 2012, from http://www.merriam-webster.com/dictionary/hacker

  Hesse-Biber, S. N. and P. Leavy. 2011. The Practice of Qualitative Research, 2nd edition. London: Sage Publications.

  Hay, D. 1975. “Property, Authority and the Criminal Law,” In Albion’s Fatal Tree: Crime and Society in Eighteenth-Century England, ed. D. Hay, P. Linebaugh, J. G. Rule, E. P. Thompson, and C. Winslow. New York: Pantheon.

  Hirschi, T. 1969. Causes of Delinquency. Berkeley: University of California Press.

  Hong, Nathaniel. 1992. “Constructing the Anarchist Beast in American Periodical Literature, 1880-1903.” Critical Studies in Mass Communication 9: 110–130.

  H.R.3261. “Stop Online Piracy Act” (Introduced in House – IH).

  Hui, Sylvia. 2013. “LOL No More: Four Hackers Sent to Prison.” National Post. Friday, May 17, A14.

  International Business, Times. “Anonymous Unleashes DDoS Attacks on DOJ, U.S Copyright Office, RIAA, MPAA and Universal Music Sites.” International Business Times 1: Regional Business News. Web. March 27, 2012.

  Invisible Committee, The. 2007. The Coming Insurrection. France: La Fabrique.

  Invisible Committee, The. 2008. The Coming Insurrection. New York: Semiotext(e).

  ITU World Telecommunication. 2011. “ICT Facts and Figures.” http://www.itu.int/ITUD/ict/facts/2011/material/ICTFactsFigures2011.pdf Accessed November 18, 2012.

  Jagatic, T., N. Johnson, M. Jakobsson, and F. Menczer. 2005. Social Phishing. Indian University, Bloomington, 1–10.

  James, Henry. 1977 [1886]. The Princess Casamassima. London: Penguin.

  Jordan, T. and P. Taylor. 1998. “A Sociology of Hackers.” The Sociological Review 46(4): 757–780.

  Kernaghan, K. and J. Langford. 1990. The Responsible Public Servant. Halifax: Institute for Research on Public Policy.

  Kernaghan, K. 2003. “The Future Role of a Professional, Non-Partisan Public Service in Ontario.” Panel on the Role of Government, Research Paper Series No. 13.

  Kline, Jesse. 2013. “Three Cheers for the Printed Gun.” National Post. Friday, May 17, A12.

  Kocieniewski, D. 2012. “Whistle-Blower Awarded $104 Million by I.R.S.” New York Times, Business September 11. http://www.nytimes.com/2012/09/12/business/whistle-blower-awarded-104-million-by-irs.html?_r=0 Accessed November 18, 2012.

  Kohn, S., M. Kohn, and D. Colapinto. 2004. Whistleblower Law: A Guide to Legal Protections for Corporate Employees. Westport: Praeger Publishers.

  Kovac, E. 2012. “Anonymous to Launch TYLER, Wikileaks on Steroids.” Softpedia, News, March 3. http://news.softpedia.com/news/Anonymous-to-Launch-TYLERWikiLeaks-on-Steroids-267533.shtml Accessed November 14, 2012.

  Kravets, D. 2012. “Wikileaks Goes Behind Paywall, Anonymous Cries Foul.” Wired October 11. http://www.wired.com/threatlevel/2012/10/wikileaks-paywallanonymous/ Accessed November 17, 2012.

  Kurlander, Steven. 2013. “A Lesson of the Boston Bombings: Stop Classifying Criminal.

  Lahman, L. 2005 “Bad Mules: A Primer on the Federal False Claims Act.”

  Lakhani, K. and R. Wolf. 2003. “Why Hackers Do What They Do: Understanding Motivation Effort in Free/Open Source Software Projects.” The Boston Consulting Group 1–28.

  Lee, M. and B. Campbell. 2006. “Putting Canadians at Risk: How the Federal Government’s Deregulation Agenda Threatens Health and Environment Standards.” Canadian Center for Policy Initiatives.

  Ludlow, Peter (ed.). 2001. Crypto Anarchy, Cyberstates, and Pirate Utopias. Boston: Bradford.

  Mansfield-Devine S. 2011. “DDoS: Threats and Mitigation.” Network Security 12: 5-12. Accessed March 25, 2012.

  Mathiason, N. 2001. “Blowing the Final Whistle.” The Observer, News November 24. http://www.guardian.co.uk/business/2001/nov/25/businessofresearch.research Accessed November 18, 2012.

  McLuhan, M. 1962. The Gutenberg Galaxy: The Making of Typographic Man. Toronto: University of Toronto Press.

  Mehta, D. and E. Darier. 1997. “Virtual Control and Disciplining on the Internet: Electronic Governmentality in the New Wired World.” The Information Society 14: 107–116.

  Méndez, J. 2012. “Report of the Special Rapporteur on Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment.” United Nations General Assembly.

  Merriman, John. 2009. The Dynamite Club: How a Bombing in Finde-Siècle Paris Ignited the Age of Modern Terror. New York: Houghton Mifflin Harcourt.

  Milevski, L. 2011. “Stuxnet and Strategy: A Special Operation in Cyberspace?” Joint Force Quarterly 63: 64–69.

  Miller, J. 2000. The Passion of Michel Foucault. Massachusetts: Harvard University Press.

  Miller, Scott. 2011. The President and the Assassin: McKinley, Terror and Empire at the Dawn of the American Century. New York: Random House

  Mlot, S. 2012. “Anonymous Targets Pedophiles Via #OpPedoChat Campaign.” PC May, July 11. http://www.pcmag.com/article2/0,2817,2406981,00.asp Accessed July 26, 2012.

  Moffitt, T. 1993. “Adolescent-Limited and Life-Course Persistent Antisocial Behavior: A Developmental Taxonomy.” Psychological Review 100: 674–701.
<
br />   Montjoye, Y., C. Hidalgo, M. Verleysen, and V. Blondel. 2013. “Unique in the Crowd: The Privacy Bounds of Human Mobility.” Scientific Reports 3: 1376.

  Moore, R. 2005. Cybercrime: Investigating High Technology Computer Crime, 2nd edition. Cincinnati, OH: Anderson Publishing Company.

  National Crime Records Bureau. 2009. “Cybercrimes.” http://ncrb.nic.in/CII%202009/cii-2009/Chapter%2018.pdf

  Near, J. and M. Miceli. 1985. “Organizational Dissidence: The Case of Whistle-Blowing.” Journal of Business Ethics 4: 1–16.

  Negri, Antonio. 2008. Reflections on Empire. London: Polity.

  Neumann, P. 2004. “Principled Assuredly Trustworthy Composable Systems and Networks.” Compute Science Lab 1–174.

  Newman, O. 1972. Defensible Space. New York: Macmillan. New York Times. 2009. “http://www.nytimes.com/2009/06/16/books/16situation.html?_r=1.” New York Times June 15. Accessed March 10, 2012.

  Nikitina, S. 2012. “Hackers as Tricksters of the Digital Age.” Journal of Popular Culture 45(1): 133–152.

  Olsen, P. 2012. We are Anonymous. New York: NY: Little, Brown and Company.

  Oxblood Ruffin. 2004. “Hacktivism, from Here to There.” http://www.cultdeadcow.com/cDc_files/cDc-0384.php

  Pavlich, G. 2011. Law & Society. London: Oxford University Press.

  Peyser, M. (Producer) and I. Softley. (Director). 1995. Hackers. United States: United Artists.

  Plato. 2012. The Republic. London: Penguin.

  Rauchway, Eric. 2004. Murdering McKinley: The Making of Theodore Roosevelt’s America. New York: Hill and Wang.

  Reinharz, S. 1992. Feminist Methods in Social Research. New York: Oxford University Press.

  Rongine, N.M. 1985. “Toward a Coherent Legal Response to the Public Policy Dilemma Posed by Whistleblowing.” American Business Law Journal 23(2): 23–28.

  RT. 2012. “Anonymous Warns Israel: ‘No One Cuts Internet on our Watch.’” November 15. http://rt.com/news/gaza-israel-strike-anonymous-787/ Accessed Nov 19, 2012.

 

‹ Prev