brief portrayals of LulzSec and Anonymous by PC magazine and a cyberculture roundup..

LulzSec? Anonymous? Know Your Hackers
PC Magazine
More recently, the group made headlines for going after security firm HBGary Federal, companies that cut ties with Wikileaks, and Sony. Anonymous attacked HBGary’s site on February 6, days after CEO Aaron Barr told the Financial Times that he knew and

Hackers claim CIA website disruption
Financial Times
LulzSec’s attack on the CIA was highlighted by WikiLeaks, the whistleblowing site to whom Anonymous supporters have previously rallied. ?WikiLeaks supporters, LulzSec, take down CIA who has task force into WikiLeaks,? the site said through its official

Inside the Anonymous Army of ‘Hacktivist’ Attackers
Wall Street Journal
In December, the group hit on a cause that propelled it into the spotlight: WikiLeaks. Anonymous began attacking organizations and people who tangled with WikiLeaks and founder Julian Assange, who had been arrested in London over sexual-misconduc

Networks are necessary, but not sufficient, for social upheaval

by Cory Doctorow
My latest Guardian column, “Networks are not always revolutionary,” argues that networks are necessary, but not sufficient, for many disruptive commercial, cultural and social phenomena, and that this character has led many people to either overstate or dismiss the role and potential of networked technology in current events:

LulzSec leaks Arizona law enforcement papers (Updated with excerpts)

by Rob Beschizza
LulzSec announced Thursday evening the publication at Pirate Bay of a trove of leaked material from Arizona law enforcement agencies. Arizona’s Department of Public Safety confirmed shortly thereafter that it was hacked. In the press release included with the dump, a LulzSec affiliate outlines a more activist agenda than is usually associated with the group.

Internet Archive Now Supports HTML5 for a Half Million Videos

by Jolie O’Dell

Are Men Better Networkers Than Women? [STUDY]

by Todd Wasserman

REPORT: Facebook Motivates 1 In 5 Purchase Decisions

by David Cohen

Facebook Continues To Dominate The World

from All Facebook by Nick O’Neill

Iceland Drafts New Constitution Using Facebook

from All Facebook by Ruth Manuel-Logan

Digital young citizens: unlocking the privacy versus security debate , Michel Nienhuis

from open Democracy News Analysis – by Michel Nienhuis
In the tussle between privacy and security concerns, there is only one agreed bottom line ? that children must be protected. Could young people help resolve the debate?
Online privacy, security and freedom controversies have become a staple in traditional and new media alike. ?Cyber? has taken centre stage: cyber security, cyber bullying, cyber conflict, cyber crime, cyber espionage, cyber terrorism and even cyber warfare are continuing to make headlines. With the recent Arab uprising as a landmark moment in the power of the internet, slowly but steadily cyberspace has become essential to our daily lives ? but as a troubled medium: security and privacy are under attack, not in the least from each other. Where do young people find themselves in this dual frame?

How to Verify Social Media Content: Some Tips and Tricks on Information Forensics

from iRevolution by Patrick Meier

I get this question all the time: ?How do you verify social media data?? This question drives many of the conversations on crowdsourcing and crisis mapping these days. It?s high time that we start compiling our tips and tricks into an online how-to-guide so that we don?t have to start from square one every time the question comes up. We need to build and accumulate our shared knowledge in information forensics. So here is the Google Doc version of this blog post, please feel free to add your best practices and ask others to contribute. Feel free to also add links to other studies on verifying social media content.

America?s Information Interventions

from The Meta-Activism Project by Mary C Joyce
[UPDATED] Are America?s information interventions around the world just imperialism in a digital mask or is a different type of foreign policy at work?  In an interesting post today on the Savage Minds blog Adam Fish, a PhD candidate at UCLA, writes:

Information Imperialism?

from Savage Minds: Notes and Queries in Anthropology ? A Group Blog by Adam Fish
By the end of the year the US State department will spend $70 million on stealth communications technologies to enable activists to communicate beyond the reach of dictators according to a recent NYT article. Prototypes include a suitcase capable of quickly blanketing a region with a free wifi network, bluetooth devices that can silently share data, software that protects the anonymity of Chinese users, independent cellphone networks in Afghanistan, and underground buried cell phones on the border of North Korea for desperate phone calls to ?freedom.? These are political tools deployed to promote the agenda of one nation over that of another. How should we address information imperialism? The use of networked communications tools to subvert so-called regimes exposes a proclivity for digital intervention that likely also includes digital literacy projects to provoke revolutionary actions, propaganda campaigns to make celebrities out of bloggers, and covert code warfare. Let?s review the spectrum of information interventions to ascertain the ways and hows of information imperialism.

Shadow Internet command center revealed (Photo)

from FP Passport by Joshua Keating
This Sunday’s New York Times contained an interesting item on U.S. State Department-funded efforts to circumvent Internet censorship abroad. Particularly noteworthy was the description of a brave band of cyberpunk revolutionaries waging a battle for Internet freedom from Farragut North:

Hacker Group Wreaks Havoc on Gaming Websites, Starts Taking Hack Requests

by Stan Schroeder

File-Sharers An Easy Prey To Anti-Piracy Lawyers

from TorrentFreak by Ernesto
Let it be clear. We?re not advocating that legitimate copyright holders should be completely disallowed from taking copyright infringers to court.

This Week in Internet Censorship

from EFF.org Updates by jillian
Canadian Filtering Tool Used in Middle East
Canadian company Netsweeper produces filtering software that is utilized by several countries to block web sites across various categories. In Yemen, popular blogging site Tumblr is blocked, due to Netsweeper?s categorization of the site as ?pornographic.?

Tumbler now more popular blogging platform than WordPress

from Editors Weblog – all postings by Teemu Henriksson

Mashable reported that the blogging platform now hosts over twenty million blogs. Moreover, a huge increase has taken place in the last six months, as the amount of blogs on Tumblr has tripled since January, NPR reported. As a result, Tumblr now hosts more blogs than WordPress, another popular blogging site.

STUDY: Facebookers Are Politically Engaged And Social

from All Facebook by Ruth Manuel-Logan

How Non-Profit Organizations Are Bolstering Citizen Media Around the World

by Geoff Livingston

?Teen Sexting and Its Impact on the Tech Industry? (my RWW talk)

from apophenia by zephoria

9 Things You Need to Know About ICANN?s New Top Level Domains

by Christina Warren

How ICANN?s Approval of New Domains Will Change the Web

by Ben Crawford


Discover more from Erkan's Field Diary

Subscribe to get the latest posts sent to your email.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.