2.Barton Gellman and Julie Tate, “In NSA-Intercepted Data, Those Not Targeted Far Outnumber the Foreigners Who Are,” washingtonpost.com, July 5, 2014.
3.James Risen and Laura Poitras, “N.S.A. Report Outlined Goals for More Power,” nytimes.com, Nov. 22, 2013.
4.Samuel Warren and Louis Brandeis, “The Right to Privacy,” Harvard Law Review, vol. IV, no. 5 (Dec. 15, 1890). Last accessed July 2, 2014, available at http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html.
5.https://help.riseup.net/en/about-us/newsletter/2013/08.
6.Jennifer Granick, “My Dinner with NSA Director Keith Alexander,” forbes.com, Aug. 22, 2013.
7.See especially Will Potter, Green Is the New Red: An Insider’s Account of a Social Movement Under Siege (San Francisco: City Lights Publishers, 2011), and Arun Kundnani, The Muslims Are Coming!: Islamophobia, Extremism, and the Domestic War on Terror (New York: Verso, 2014).
8.Muslim American Civil Liberties Coalition, Creating Law Enforcement Accountability & Responsibility (CLEAR), and Asian American Legal Defense and Education Fund (AALDEF), Mapping Muslims: NYPD Spying and Its Impact on American Muslims (2013). Last accessed July 2, 2014, available at http://aaldef.org/press-releases/press-release/new-report-launched-nypd-spyings-impact-on-american-muslims.html.
9.Tim Cushing, “Former FBI Agent: NYPD’s Muslim-Spying Demographics Unit Was Almost Completely Useless,” techdirt.com, April 28, 2014.
10.Mapping Muslims, 55.
11.Glenn Greenwald and Murtaza Hussain, “Under Surveillance,” theintercept.com, July 9, 2014.
12.“Factsheet: The NYPD Muslim Surveillance Program,” ACLU, last accessed July 2, 2014, available at https://www.aclu.org/national-security/factsheet-nypd-muslim-surveillance-program.
13.Laurie Penny, “If You Live in a Surveillance State for Long Enough, You Create a Censor in Your Head,” newstatesman.com, June 17, 2013.
14.Steve Lohr, “Unblinking Eyes Track Employees,” nytimes.com, June 21, 2014.
15.Recently, two professors from Northwestern and Princeton examined nearly two thousand policy changes in light of extensive data on lobbyists, the American elite, and the preferences of ordinary Americans. They concluded what many already suspected to be the case: “Economic elites and organized groups representing business interests have substantial independent impacts on US government policy, while mass-based interest groups and average citizens have little or no independent influence.” Martin Gilens and Benjamin Page, “Testing Theories of American Politics: Elites, Interest Groups, and Average Citizens,” Perspective on Politics, forthcoming.
16.Eben Moglen, “Freedom in the Cloud: Software Freedom, Privacy, and Security for Web 2.0 and Cloud Computing,” speech given at meeting of the New York branch of the Internet Society, Feb. 5, 2010. Available at http://www.softwarefreedom.org/events/2010/isoc-ny/FreedomInTheCloud-transcript.html (last accessed July 2, 2014). Bruce Schneier, “The US Government Has Betrayed the Internet. We Need to Take it Back,” theguardian.com, Sept. 5, 2013.
17.Christopher Soghoian, “Protecting Privacy Can Conflict with Free Business Models,” Section 7.1 in The Spies We Trust: Third Party Service Providers and Law Enforcement Surveillance, PhD Dissertation, August 2012.
18.For two recent books on geek politics see Jessica L. Bayer, Expect Us: Online Communities and Political Mobilization (Oxford: Oxford University Press, 2014), and Patrick Burkhart, Pirate Politics: The New Information Policy Contests (Cambridge, MA: MIT Press, 2014).
19.Trevor Timm, “Congress Wants NSA Reform After All. Obama and the Senate Need to Pass It,” theguardian.com, June 20, 2014.
20.Glenn Greenwald, No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State (New York: Metropolitan Books, 2014).
21.“Cyber Security in the Post-Snowden Era,” panel at 2014 Ottawa Conference on Defence and Security. Video available at http://www.cpac.ca/en/programs/public-record/episodes/31366144 (last accessed July 2, 2014).
22.See the website of Reset the Net at resetthenet.org.
23.Quoted in Derek Mead, “‘The Bottom Line Is That Encryption Does Work’: Edward Snowden at SXSW,” motherboard.vice.com, March 10, 2014.
24.“On the FBI Raid,” March 7, 2012, last accessed July 8, 2014, http://pastebin.com/vZEteA3C.
25.“Why I’m Going to Destroy FBI Agent Robert Smith Part Three Revenge of the Lithe,” YouTube video, posted by Grenalio Kristian Perdana Siahaan, Nov. 25, 2012, last accessed July 3, 2014, available at http://www.youtube.com/watch?v=VcMHdfvnEk4.
26.Adrian Chen, “Former Anonymous Spokesman Barrett Brown Indicted for Sharing a Link to Stolen Credit Card Data,” gawker.com, Dec. 7, 2012.
27.Kevin M. Gallagher, “Barrett Brown, Political Prisoner of the Information Revolution,” theguardian.com, July 13, 2013.
28.Douglas Thomas, Hacker Culture (Minneapolis, MN: University of Minnesota Press, 2003), 241.
29.Your Anonymous News, Twitter post, May 27, 2014, 10:53 am, https://twitter.com/YourAnonNews/status/471318266255011840
30.Jeremy Hammond, “Jeremy Hammond Reacts to Hector Monsegur’s ‘Sentencing’: Rejects the NSA White Hat Sabu Ideology,” posted June 2, 2014, last accessed July 9, 2014.
31.Danilyn Rutherford, “Kinky Empiricism,” Cultural Anthropology, vol. 27, issue 3 (Aug. 2012): 465–79.
32.Anonymous, Twitter post, May 12, 2014, 11:52 am, http://twitter.com/blackplans/status/465897377468260352.
33.I would like to thank Scott Kushner for pointing out the subtle but important difference between unwillingness to acknowledge action as political versus delegitimization conducted precisely because the action is seen as politically potent.
34.Jane Bennett, The Enchantment of Modern Life: Attachments, Crossings, and Ethics (Princeton, NJ: Princeton University Press, 2001), 4.
35.Ernst Bloch, The Principle of Hope, Vol. 1, (Cambridge MA: MIT Press, 1995), 3.
36.Ibid., 5.
37.Whitney Phillips, This Is Why We Can’t Have Nice Things: Mapping the Relationship between Online Trolling and Mainstream Culture (Cambridge, MA: MIT Press, forthcoming 2015).
38.David Foster Wallace, “E Unibus Pluram: Television and U.S. Fiction,” Review of Contemporary Fiction, vol. 13, no. 2: 151–94.
39.“Waiting for the Tsunami - Bifo,” YouTube video, posted by alterazionivideo alterazionivideo, August. 29, 2007, last accessed July 8, 2014, available at http://www.youtube.com/watch?v=5eojG4Hom3A#t=10.
40.Of course, due to the enormous plurality exhibited in contemporary industrial societies, it is naive and dangerous to boil something as complex as political sentiments to single “structures of feeling,” to borrow Raymond Williams’s useful phrase. It would be equally naive to entirely discard an analysis of dominant trends—whether economic or affective—such as the turn to cyncism. Raymond Williams, Marxism and Literature (Oxford: Oxford University Paperback, 1978).
41.Plan C/The Institute for Precarious Consciousness, “We Are All Very Anxious,” last accessed July 9, 2014, available at http://www.weareplanc.org/we-are-all-very-anxious.
42.Bloch, The Principle of Hope, Vol. 1, 5.
43.Richard Sennet, Together: The Rituals, Pleasures and Politics of Cooperation (New Haven, CT: Yale University Press, 2012), 242.
Index
A
A-Team, 283
Abelson, Hal, 172
Abene, Mark (Phiber Optik), 86, 87
Ackroyd, Ryan (Kayla), 173, 174, 215, 265, 291, 353, 385, 392
ACS:Law, 99, 100–5
ACTA (Anti-Counterfeiting Trade Agreement), 89–92, 95, 96, 97, 98, 112, 348
Adbusters, 288
Adams, Henry, 118
Admin/Operator (AOP) list, 117
Adnon, 144, 145–8, 154, 165, 166, 170, 171, 173
Adobe, 261
afk (away from the keyboard), 146
Aiplex, 97, 98, 99, 101, 111
aircrack-ng, 277
Al-Bassam, Mustafa (tflow), 114, 171, 172, 173, 390
Al Jazeera, 153
Alexander, Keith, 6
“All About Barrett Brown. Add your comments guise,” 229
Amamou, Slim, 144, 145, 166
Amazon, 119, 120, 127, 139
AmericanCensorship.org, 346
Americans for Prosperity, 277
The Amnesic Incognito Live System (Tails), 383
Anansi (trickster), 33
Anarchaos (Jeremy Hammond), 289, 298, 299, 362 see also Hammond, Jeremy
Anarchist Book, 279
Anderson, Chris, 270, 271
Anderson, Nate, 101, 211, 234
AnonLeaks, 228
#anonleaks channel, 231
#anonnews channel, 147
AnonOps, 3, 88, 89, 99, 101, 105–9, 111, 112, 116, 118, 120–3, 125, 126, 128, 133, 134, 139, 143, 147, 162, 166, 170, 181, 182, 201, 240, 243–7, 253, 283, 296
#AnonOps channel, 331
AnonOpsIndia, 367
AnonSnapple, 184–8, 190, 191, 192, 201, 232
anontunisia (anont), 167, 168–9
anonymity, 3, 38, 41, 44, 45, 65, 144, 151, 203, 206, 230, 331, 383, 388, 399
Anonymous:
as becoming harder to study, 302
best-known piece of art, 61
commitment of to difference, plurality, and dissension, 311
commitment of to politically engaged style of hacking, 72
complexity of, 49
as conduit for confrontational activism, 130
confusion about, 3
described, 1
as difficult to describe and resistant to being slotted, 115
as difficult to study/comprehend, 393
diversity within, 174, 175
dynamism and multitudinous quality of, 393
as encompassing abundance of relationships, structures, and moral positions, 114
as ensuring mystery, 398
flexibility of, 17
on-the-fly decision making as staple of, 126
as having no established methodology through which to encode itself as institution, 373
as having no universal mandate as collective, 131
heterogeneity of participants in, 173, 174
as hydra, 48, 75
iconography of, 399
as jujitsu-like force of trickery, 50
as leaving a lot to the imagination, 394
as living out maxim for life of enchantment, 274
meaning of official in, 92
membership in as self-defined, 174
as multitudinous, 16
as no boss pointing to a fixed destination, 156
as not your personal army, 145, 349
as not unanimous, 106, 311
as often reactive rather than proactive, 127
ontological question of just what makes one Anonymous, 309
as open to chance, chaos, mutation, 118
opinions of hackers on, 256
organizational structure of, 8–9
origins of, 4–9
as platform for citizens to express dissent, 315
as prolific, 16
relationship of with court of public opinion, 7
as serious political movement, 392
as specter, 366
as symbol of dissent, 399
as unpredictable, 16, 17
Anonymous9, 177–8, 193–4, 337, 361, 363
AnonyOps, 127–8, 365–6
anthropology, methods of, 392
#antiactaplanning, 90
anti-brand brand, 16
anti-celebrity ethic, 17, 47, 49
Anti-Counterfeiting Trade Agreement (ACTA), 89–92, 95, 96, 97, 98, 112, 348
AntiSec (Anti-Security), 48, 236, 275, 283, 286, 291, 292, 312–15, 326, 337, 339, 362
#antisec channel, 292, 313, 340, 341, 342, 349
anti-security movement, 285, 286
AOL, 237, 291
Appelbaum, Jacob, 84, 85, 333
Arab and African Spring, 17, 149, 192, 269, 272, 292
argot, 31, 45
Arizona Department of Public Safety, 237, 283
Armstrong, Gerry, 77
ARPANET, 38
arrests, 9, 16, 38, 50, 71, 88, 91, 111, 134, 135, 140, 141, 145, 156, 169, 170, 173, 183, 190, 191, 193, 194, 197, 215, 237, 255, 278–9, 282, 287, 288, 289, 293, 301, 302, 303, 305, 320, 327, 334, 353, 355, 361, 366, 369–70, 384, 386, 388, 390, 391
Ars Technica, 210, 216, 234
Arthur, Charles, 156
ASCII art, 248
Assange, Julian, 82, 84, 85, 88, 106, 120, 126, 127, 194, 198, 199, 208, 326, 345–6, 382, 414n7
Associated Press (AP), 152
AT&T, 23–4, 26, 32, 36, 237, 248, 280, 291, 326
The Atlantic, 350
Auernheimer, Andrew (weev), 19–20 see also weev
Avunit, 215, 243, 265
B
Backtrace Security, 240, 241, 242, 243
Bahrain, 143, 367
Bakhtin, Mikhail, 131
Bank of America, 193, 208
banning/banishment, 40, 188, 190, 192, 253
Bantown, 19
Barbiturate Formula, 279
Barlow, John Perry, 121
Barnett, Matthew, 371
Barr, Aaron, 212–17, 219–21, 224–6, 233, 235, 237, 240
Barr, Roseanne, 369
bartlulz website, 7, 306
BatCat (Noah McHugh), 369
Bazelon, Emily, 370, 372, 373
BBC, 96, 228, 244
Bethesda Softworks, 237
Ben Ali, 145, 147, 149–53, 166
Benjamin, Walter, 275
Bennett, Henry, 209
Bennett, Jane, 394
Berardi, Franco (Bifo), 397
Berico Technologies, 208, 234
best practices, 374
Bharatiya Janata Party, 367
black bloc organizing, 298
black hat attitude/hackers/scene, 237, 238, 239, 258, 285, 289, 308, 314, 315, 344
black ops, 324
Blackout Day, 346
Blake, Andrew, 359
Bloch, Ernst, 395–6, 398
bodybuilding.com, 44
Boing Boing, 135
Bologna, Anthony, 327–8
Boogie Nights (film), 21
Booz Allen Hamilton, 301
Borell, Emily, 362
Borell III, John Anthony (Kahuna), 305, 362, 386
Boston Police Patrolmen’s Association, 337
botnets, 60, 92–5, 98, 102, 121, 125, 127, 133, 134, 135, 137, 139, 253, 254, 289
Bouazizi, Mohamed, 148, 151
BR1CKSQU4D, 314, 315
Brandeis, Louis, 379
Brazil, 143, 324, 359, 360
Brian Oblivion, 261
Briefcase Locks, 280
The Brief Wondrous Life of Oscar Wao (Diaz), 331
BrigadaElektronica, 281
Bright, Peter, 215
British Metropolitan Police, 169
BRoTHeRHooD oF WaReZ (BoW) (hacker group), 37
Brown, Barrett, 182–4, 189, 218, 219–20, 221, 223, 225, 228, 229–32, 234, 235, 313–14, 338, 339, 345, 377, 386–8
/b/tard, 41, 45, 66
Buccaneers, 283
bulletin board system, 37, 194
#bump chat room, 96
Bunker, Mark, 54, 63
Brunton, Fred, 352
C
C&C (command-and-control) channel, 93, 94
CabinCr3w, 283, 305, 306, 328, 338, 354, 363, 386
Cablegate, 119, 265
California Statewide Law Enforcement Association, 300, 343
Cameron, Dell, 358
Canadian Security Intelligence Service (CSIS), 10–16
Carnegie Mellon, 36
CBS News, 346
CDNs (Content Delivery Networks), 139
Center for Corporate Policy, 209
CFAA (Computer Fraud and Abuse Act), 24, 25, 140, 244, 261, 369
Chanology/Project Chanology, 2, 56, 57, 60, 66–74, 76, 81, 89, 90, 95, 106, 116, 154, 178, 181, 182, 241, 389
&
nbsp; The Chaos Communication Camp, 304
Chaos Computer Club, 304
Chapman, Stephen, 288
Chen, Adrian, 155, 230, 387
Chilton Hacking, 279
“Chinga La Migra,” 283, 284, 289, 290
choreographers, 75, 306
Christensen, Christian, 82
Christman, Tory, 78
Church of Scientology, 2, 5–6, 11, 53–66, 70, 73, 76, 77–9, 81, 241, 414n7
CIA, 169, 171, 295, 380
The Citizens’ Commission to Investigate the FBI, 203, 206, 211
civil disobedience, 107, 112, 129, 190
Cleary, Ryan, 253, 254, 255, 289
Clinton, Hillary, 119, 191
cloaking, 43, 134, 173, 206, 253
cslea.com (California Statewide Law Enforcement Association), 343
CMS (content management system), 215
CNET, 138
CNN, 121, 182, 304, 305, 306, 340
Code of Conduct (video), 64
Coding Freedom: The Ethics and Aesthetics of Hacking (Coleman), 257
CogAnon (Aaron Barr), 212, 217, 223, 225–7
COINTELPRO, 203, 205–9, 211, 236, 303, 380
Colbert, Stephen, 214
Coleman, Daisy, 371
“Collateral Murder” (video), 82–3, 84
collective identity, individual identity subsumption of into, 46
collectivism, divide between individualism and collectivism, 49–50
Communist Party USA, 203
The Coming Insurrection (Invisible Committee), 343
#command channel, 102, 108, 109, 110, 116, 118, 121, 122, 123, 124, 126, 133, 134, 154, 165, 348
command-and-control (C&C) channel, 93, 94
Commander X (Christopher Doyon), 182, 307
Committee for Congressional Affairs, 260
Computer Fraud and Abuse Act (CFAA), 24, 25, 140, 244, 261, 369
Content Delivery Networks (CDNs), 139
Cook, John, 230
co-optation, 271, 272, 351, 393
copyright industry/lobby/trade associations, 98, 99, 101, 116, 347
Corley, Eric (Emmanuel Goldstein), 85, 86, 87, 195, 297, 298–9
corporate espionage/sabotage, 209, 210, 211
correct technology, 59
Coyote (trickster), 33
CPU, 68–9
crediblethreat (Jeremy Hammond), 364
Crossley, Andrew, 100, 101, 105
Cruise, Tom, 2, 53–4, 56, 61
CryptoParty, 390
cryto (server), 292
CSIS (Canadian Security Intelligence Service), 10–16
Hacker, Hoaxer, Whistleblower, Spy Page 43