Hacker, Hoaxer, Whistleblower, Spy

Home > Other > Hacker, Hoaxer, Whistleblower, Spy > Page 43
Hacker, Hoaxer, Whistleblower, Spy Page 43

by Gabriella Coleman


  2.Barton Gellman and Julie Tate, “In NSA-Intercepted Data, Those Not Targeted Far Outnumber the Foreigners Who Are,” washingtonpost.com, July 5, 2014.

  3.James Risen and Laura Poitras, “N.S.A. Report Outlined Goals for More Power,” nytimes.com, Nov. 22, 2013.

  4.Samuel Warren and Louis Brandeis, “The Right to Privacy,” Harvard Law Review, vol. IV, no. 5 (Dec. 15, 1890). Last accessed July 2, 2014, available at http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html.

  5.https://help.riseup.net/en/about-us/newsletter/2013/08.

  6.Jennifer Granick, “My Dinner with NSA Director Keith Alexander,” forbes.com, Aug. 22, 2013.

  7.See especially Will Potter, Green Is the New Red: An Insider’s Account of a Social Movement Under Siege (San Francisco: City Lights Publishers, 2011), and Arun Kundnani, The Muslims Are Coming!: Islamophobia, Extremism, and the Domestic War on Terror (New York: Verso, 2014).

  8.Muslim American Civil Liberties Coalition, Creating Law Enforcement Accountability & Responsibility (CLEAR), and Asian American Legal Defense and Education Fund (AALDEF), Mapping Muslims: NYPD Spying and Its Impact on American Muslims (2013). Last accessed July 2, 2014, available at http://aaldef.org/press-releases/press-release/new-report-launched-nypd-spyings-impact-on-american-muslims.html.

  9.Tim Cushing, “Former FBI Agent: NYPD’s Muslim-Spying Demographics Unit Was Almost Completely Useless,” techdirt.com, April 28, 2014.

  10.Mapping Muslims, 55.

  11.Glenn Greenwald and Murtaza Hussain, “Under Surveillance,” theintercept.com, July 9, 2014.

  12.“Factsheet: The NYPD Muslim Surveillance Program,” ACLU, last accessed July 2, 2014, available at https://www.aclu.org/national-security/factsheet-nypd-muslim-surveillance-program.

  13.Laurie Penny, “If You Live in a Surveillance State for Long Enough, You Create a Censor in Your Head,” newstatesman.com, June 17, 2013.

  14.Steve Lohr, “Unblinking Eyes Track Employees,” nytimes.com, June 21, 2014.

  15.Recently, two professors from Northwestern and Princeton examined nearly two thousand policy changes in light of extensive data on lobbyists, the American elite, and the preferences of ordinary Americans. They concluded what many already suspected to be the case: “Economic elites and organized groups representing business interests have substantial independent impacts on US government policy, while mass-based interest groups and average citizens have little or no independent influence.” Martin Gilens and Benjamin Page, “Testing Theories of American Politics: Elites, Interest Groups, and Average Citizens,” Perspective on Politics, forthcoming.

  16.Eben Moglen, “Freedom in the Cloud: Software Freedom, Privacy, and Security for Web 2.0 and Cloud Computing,” speech given at meeting of the New York branch of the Internet Society, Feb. 5, 2010. Available at http://www.softwarefreedom.org/events/2010/isoc-ny/FreedomInTheCloud-transcript.html (last accessed July 2, 2014). Bruce Schneier, “The US Government Has Betrayed the Internet. We Need to Take it Back,” theguardian.com, Sept. 5, 2013.

  17.Christopher Soghoian, “Protecting Privacy Can Conflict with Free Business Models,” Section 7.1 in The Spies We Trust: Third Party Service Providers and Law Enforcement Surveillance, PhD Dissertation, August 2012.

  18.For two recent books on geek politics see Jessica L. Bayer, Expect Us: Online Communities and Political Mobilization (Oxford: Oxford University Press, 2014), and Patrick Burkhart, Pirate Politics: The New Information Policy Contests (Cambridge, MA: MIT Press, 2014).

  19.Trevor Timm, “Congress Wants NSA Reform After All. Obama and the Senate Need to Pass It,” theguardian.com, June 20, 2014.

  20.Glenn Greenwald, No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State (New York: Metropolitan Books, 2014).

  21.“Cyber Security in the Post-Snowden Era,” panel at 2014 Ottawa Conference on Defence and Security. Video available at http://www.cpac.ca/en/programs/public-record/episodes/31366144 (last accessed July 2, 2014).

  22.See the website of Reset the Net at resetthenet.org.

  23.Quoted in Derek Mead, “‘The Bottom Line Is That Encryption Does Work’: Edward Snowden at SXSW,” motherboard.vice.com, March 10, 2014.

  24.“On the FBI Raid,” March 7, 2012, last accessed July 8, 2014, http://pastebin.com/vZEteA3C.

  25.“Why I’m Going to Destroy FBI Agent Robert Smith Part Three Revenge of the Lithe,” YouTube video, posted by Grenalio Kristian Perdana Siahaan, Nov. 25, 2012, last accessed July 3, 2014, available at http://www.youtube.com/watch?v=VcMHdfvnEk4.

  26.Adrian Chen, “Former Anonymous Spokesman Barrett Brown Indicted for Sharing a Link to Stolen Credit Card Data,” gawker.com, Dec. 7, 2012.

  27.Kevin M. Gallagher, “Barrett Brown, Political Prisoner of the Information Revolution,” theguardian.com, July 13, 2013.

  28.Douglas Thomas, Hacker Culture (Minneapolis, MN: University of Minnesota Press, 2003), 241.

  29.Your Anonymous News, Twitter post, May 27, 2014, 10:53 am, https://twitter.com/YourAnonNews/status/471318266255011840

  30.Jeremy Hammond, “Jeremy Hammond Reacts to Hector Monsegur’s ‘Sentencing’: Rejects the NSA White Hat Sabu Ideology,” posted June 2, 2014, last accessed July 9, 2014.

  31.Danilyn Rutherford, “Kinky Empiricism,” Cultural Anthropology, vol. 27, issue 3 (Aug. 2012): 465–79.

  32.Anonymous, Twitter post, May 12, 2014, 11:52 am, http://twitter.com/blackplans/status/465897377468260352.

  33.I would like to thank Scott Kushner for pointing out the subtle but important difference between unwillingness to acknowledge action as political versus delegitimization conducted precisely because the action is seen as politically potent.

  34.Jane Bennett, The Enchantment of Modern Life: Attachments, Crossings, and Ethics (Princeton, NJ: Princeton University Press, 2001), 4.

  35.Ernst Bloch, The Principle of Hope, Vol. 1, (Cambridge MA: MIT Press, 1995), 3.

  36.Ibid., 5.

  37.Whitney Phillips, This Is Why We Can’t Have Nice Things: Mapping the Relationship between Online Trolling and Mainstream Culture (Cambridge, MA: MIT Press, forthcoming 2015).

  38.David Foster Wallace, “E Unibus Pluram: Television and U.S. Fiction,” Review of Contemporary Fiction, vol. 13, no. 2: 151–94.

  39.“Waiting for the Tsunami - Bifo,” YouTube video, posted by alterazionivideo alterazionivideo, August. 29, 2007, last accessed July 8, 2014, available at http://www.youtube.com/watch?v=5eojG4Hom3A#t=10.

  40.Of course, due to the enormous plurality exhibited in contemporary industrial societies, it is naive and dangerous to boil something as complex as political sentiments to single “structures of feeling,” to borrow Raymond Williams’s useful phrase. It would be equally naive to entirely discard an analysis of dominant trends—whether economic or affective—such as the turn to cyncism. Raymond Williams, Marxism and Literature (Oxford: Oxford University Paperback, 1978).

  41.Plan C/The Institute for Precarious Consciousness, “We Are All Very Anxious,” last accessed July 9, 2014, available at http://www.weareplanc.org/we-are-all-very-anxious.

  42.Bloch, The Principle of Hope, Vol. 1, 5.

  43.Richard Sennet, Together: The Rituals, Pleasures and Politics of Cooperation (New Haven, CT: Yale University Press, 2012), 242.

  Index

  A

  A-Team, 283

  Abelson, Hal, 172

  Abene, Mark (Phiber Optik), 86, 87

  Ackroyd, Ryan (Kayla), 173, 174, 215, 265, 291, 353, 385, 392

  ACS:Law, 99, 100–5

  ACTA (Anti-Counterfeiting Trade Agreement), 89–92, 95, 96, 97, 98, 112, 348

  Adbusters, 288

  Adams, Henry, 118

  Admin/Operator (AOP) list, 117

  Adnon, 144, 145–8, 154, 165, 166, 170, 171, 173

  Adobe, 261

  afk (away from the keyboard), 146

  Aiplex, 97, 98, 99, 101, 111

  aircrack-ng, 277

  Al-Bassam, Mustafa (tflow), 114, 171, 172, 173, 390


  Al Jazeera, 153

  Alexander, Keith, 6

  “All About Barrett Brown. Add your comments guise,” 229

  Amamou, Slim, 144, 145, 166

  Amazon, 119, 120, 127, 139

  AmericanCensorship.org, 346

  Americans for Prosperity, 277

  The Amnesic Incognito Live System (Tails), 383

  Anansi (trickster), 33

  Anarchaos (Jeremy Hammond), 289, 298, 299, 362 see also Hammond, Jeremy

  Anarchist Book, 279

  Anderson, Chris, 270, 271

  Anderson, Nate, 101, 211, 234

  AnonLeaks, 228

  #anonleaks channel, 231

  #anonnews channel, 147

  AnonOps, 3, 88, 89, 99, 101, 105–9, 111, 112, 116, 118, 120–3, 125, 126, 128, 133, 134, 139, 143, 147, 162, 166, 170, 181, 182, 201, 240, 243–7, 253, 283, 296

  #AnonOps channel, 331

  AnonOpsIndia, 367

  AnonSnapple, 184–8, 190, 191, 192, 201, 232

  anontunisia (anont), 167, 168–9

  anonymity, 3, 38, 41, 44, 45, 65, 144, 151, 203, 206, 230, 331, 383, 388, 399

  Anonymous:

  as becoming harder to study, 302

  best-known piece of art, 61

  commitment of to difference, plurality, and dissension, 311

  commitment of to politically engaged style of hacking, 72

  complexity of, 49

  as conduit for confrontational activism, 130

  confusion about, 3

  described, 1

  as difficult to describe and resistant to being slotted, 115

  as difficult to study/comprehend, 393

  diversity within, 174, 175

  dynamism and multitudinous quality of, 393

  as encompassing abundance of relationships, structures, and moral positions, 114

  as ensuring mystery, 398

  flexibility of, 17

  on-the-fly decision making as staple of, 126

  as having no established methodology through which to encode itself as institution, 373

  as having no universal mandate as collective, 131

  heterogeneity of participants in, 173, 174

  as hydra, 48, 75

  iconography of, 399

  as jujitsu-like force of trickery, 50

  as leaving a lot to the imagination, 394

  as living out maxim for life of enchantment, 274

  meaning of official in, 92

  membership in as self-defined, 174

  as multitudinous, 16

  as no boss pointing to a fixed destination, 156

  as not your personal army, 145, 349

  as not unanimous, 106, 311

  as often reactive rather than proactive, 127

  ontological question of just what makes one Anonymous, 309

  as open to chance, chaos, mutation, 118

  opinions of hackers on, 256

  organizational structure of, 8–9

  origins of, 4–9

  as platform for citizens to express dissent, 315

  as prolific, 16

  relationship of with court of public opinion, 7

  as serious political movement, 392

  as specter, 366

  as symbol of dissent, 399

  as unpredictable, 16, 17

  Anonymous9, 177–8, 193–4, 337, 361, 363

  AnonyOps, 127–8, 365–6

  anthropology, methods of, 392

  #antiactaplanning, 90

  anti-brand brand, 16

  anti-celebrity ethic, 17, 47, 49

  Anti-Counterfeiting Trade Agreement (ACTA), 89–92, 95, 96, 97, 98, 112, 348

  AntiSec (Anti-Security), 48, 236, 275, 283, 286, 291, 292, 312–15, 326, 337, 339, 362

  #antisec channel, 292, 313, 340, 341, 342, 349

  anti-security movement, 285, 286

  AOL, 237, 291

  Appelbaum, Jacob, 84, 85, 333

  Arab and African Spring, 17, 149, 192, 269, 272, 292

  argot, 31, 45

  Arizona Department of Public Safety, 237, 283

  Armstrong, Gerry, 77

  ARPANET, 38

  arrests, 9, 16, 38, 50, 71, 88, 91, 111, 134, 135, 140, 141, 145, 156, 169, 170, 173, 183, 190, 191, 193, 194, 197, 215, 237, 255, 278–9, 282, 287, 288, 289, 293, 301, 302, 303, 305, 320, 327, 334, 353, 355, 361, 366, 369–70, 384, 386, 388, 390, 391

  Ars Technica, 210, 216, 234

  Arthur, Charles, 156

  ASCII art, 248

  Assange, Julian, 82, 84, 85, 88, 106, 120, 126, 127, 194, 198, 199, 208, 326, 345–6, 382, 414n7

  Associated Press (AP), 152

  AT&T, 23–4, 26, 32, 36, 237, 248, 280, 291, 326

  The Atlantic, 350

  Auernheimer, Andrew (weev), 19–20 see also weev

  Avunit, 215, 243, 265

  B

  Backtrace Security, 240, 241, 242, 243

  Bahrain, 143, 367

  Bakhtin, Mikhail, 131

  Bank of America, 193, 208

  banning/banishment, 40, 188, 190, 192, 253

  Bantown, 19

  Barbiturate Formula, 279

  Barlow, John Perry, 121

  Barnett, Matthew, 371

  Barr, Aaron, 212–17, 219–21, 224–6, 233, 235, 237, 240

  Barr, Roseanne, 369

  bartlulz website, 7, 306

  BatCat (Noah McHugh), 369

  Bazelon, Emily, 370, 372, 373

  BBC, 96, 228, 244

  Bethesda Softworks, 237

  Ben Ali, 145, 147, 149–53, 166

  Benjamin, Walter, 275

  Bennett, Henry, 209

  Bennett, Jane, 394

  Berardi, Franco (Bifo), 397

  Berico Technologies, 208, 234

  best practices, 374

  Bharatiya Janata Party, 367

  black bloc organizing, 298

  black hat attitude/hackers/scene, 237, 238, 239, 258, 285, 289, 308, 314, 315, 344

  black ops, 324

  Blackout Day, 346

  Blake, Andrew, 359

  Bloch, Ernst, 395–6, 398

  bodybuilding.com, 44

  Boing Boing, 135

  Bologna, Anthony, 327–8

  Boogie Nights (film), 21

  Booz Allen Hamilton, 301

  Borell, Emily, 362

  Borell III, John Anthony (Kahuna), 305, 362, 386

  Boston Police Patrolmen’s Association, 337

  botnets, 60, 92–5, 98, 102, 121, 125, 127, 133, 134, 135, 137, 139, 253, 254, 289

  Bouazizi, Mohamed, 148, 151

  BR1CKSQU4D, 314, 315

  Brandeis, Louis, 379

  Brazil, 143, 324, 359, 360

  Brian Oblivion, 261

  Briefcase Locks, 280

  The Brief Wondrous Life of Oscar Wao (Diaz), 331

  BrigadaElektronica, 281

  Bright, Peter, 215

  British Metropolitan Police, 169

  BRoTHeRHooD oF WaReZ (BoW) (hacker group), 37

  Brown, Barrett, 182–4, 189, 218, 219–20, 221, 223, 225, 228, 229–32, 234, 235, 313–14, 338, 339, 345, 377, 386–8

  /b/tard, 41, 45, 66

  Buccaneers, 283

  bulletin board system, 37, 194

  #bump chat room, 96

  Bunker, Mark, 54, 63

  Brunton, Fred, 352

  C

  C&C (command-and-control) channel, 93, 94

  CabinCr3w, 283, 305, 306, 328, 338, 354, 363, 386

  Cablegate, 119, 265

  California Statewide Law Enforcement Association, 300, 343

  Cameron, Dell, 358

  Canadian Security Intelligence Service (CSIS), 10–16

  Carnegie Mellon, 36

  CBS News, 346

  CDNs (Content Delivery Networks), 139

  Center for Corporate Policy, 209

  CFAA (Computer Fraud and Abuse Act), 24, 25, 140, 244, 261, 369

  Chanology/Project Chanology, 2, 56, 57, 60, 66–74, 76, 81, 89, 90, 95, 106, 116, 154, 178, 181, 182, 241, 389

&
nbsp; The Chaos Communication Camp, 304

  Chaos Computer Club, 304

  Chapman, Stephen, 288

  Chen, Adrian, 155, 230, 387

  Chilton Hacking, 279

  “Chinga La Migra,” 283, 284, 289, 290

  choreographers, 75, 306

  Christensen, Christian, 82

  Christman, Tory, 78

  Church of Scientology, 2, 5–6, 11, 53–66, 70, 73, 76, 77–9, 81, 241, 414n7

  CIA, 169, 171, 295, 380

  The Citizens’ Commission to Investigate the FBI, 203, 206, 211

  civil disobedience, 107, 112, 129, 190

  Cleary, Ryan, 253, 254, 255, 289

  Clinton, Hillary, 119, 191

  cloaking, 43, 134, 173, 206, 253

  cslea.com (California Statewide Law Enforcement Association), 343

  CMS (content management system), 215

  CNET, 138

  CNN, 121, 182, 304, 305, 306, 340

  Code of Conduct (video), 64

  Coding Freedom: The Ethics and Aesthetics of Hacking (Coleman), 257

  CogAnon (Aaron Barr), 212, 217, 223, 225–7

  COINTELPRO, 203, 205–9, 211, 236, 303, 380

  Colbert, Stephen, 214

  Coleman, Daisy, 371

  “Collateral Murder” (video), 82–3, 84

  collective identity, individual identity subsumption of into, 46

  collectivism, divide between individualism and collectivism, 49–50

  Communist Party USA, 203

  The Coming Insurrection (Invisible Committee), 343

  #command channel, 102, 108, 109, 110, 116, 118, 121, 122, 123, 124, 126, 133, 134, 154, 165, 348

  command-and-control (C&C) channel, 93, 94

  Commander X (Christopher Doyon), 182, 307

  Committee for Congressional Affairs, 260

  Computer Fraud and Abuse Act (CFAA), 24, 25, 140, 244, 261, 369

  Content Delivery Networks (CDNs), 139

  Cook, John, 230

  co-optation, 271, 272, 351, 393

  copyright industry/lobby/trade associations, 98, 99, 101, 116, 347

  Corley, Eric (Emmanuel Goldstein), 85, 86, 87, 195, 297, 298–9

  corporate espionage/sabotage, 209, 210, 211

  correct technology, 59

  Coyote (trickster), 33

  CPU, 68–9

  crediblethreat (Jeremy Hammond), 364

  Crossley, Andrew, 100, 101, 105

  Cruise, Tom, 2, 53–4, 56, 61

  CryptoParty, 390

  cryto (server), 292

  CSIS (Canadian Security Intelligence Service), 10–16

 

‹ Prev