LulzSec? Anonymous? Know Your Hackers
More recently, the group made headlines for going after security firm HBGary Federal, companies that cut ties with Wikileaks, and Sony. Anonymous attacked HBGary’s site on February 6, days after CEO Aaron Barr told the Financial Times that he knew and
Hackers claim CIA website disruption
LulzSec’s attack on the CIA was highlighted by WikiLeaks, the whistleblowing site to whom Anonymous supporters have previously rallied. ?WikiLeaks supporters, LulzSec, take down CIA who has task force into WikiLeaks,? the site said through its official
Inside the Anonymous Army of ‘Hacktivist’ Attackers
Wall Street Journal
In December, the group hit on a cause that propelled it into the spotlight: WikiLeaks. Anonymous began attacking organizations and people who tangled with WikiLeaks and founder Julian Assange, who had been arrested in London over sexual-misconduc
by Cory Doctorow
My latest Guardian column, “Networks are not always revolutionary,” argues that networks are necessary, but not sufficient, for many disruptive commercial, cultural and social phenomena, and that this character has led many people to either overstate or dismiss the role and potential of networked technology in current events:
by Rob Beschizza
LulzSec announced Thursday evening the publication at Pirate Bay of a trove of leaked material from Arizona law enforcement agencies. Arizona’s Department of Public Safety confirmed shortly thereafter that it was hacked. In the press release included with the dump, a LulzSec affiliate outlines a more activist agenda than is usually associated with the group.
by Jolie O’Dell
by Todd Wasserman
by David Cohen
from All Facebook by Nick O’Neill
from All Facebook by Ruth Manuel-Logan
from open Democracy News Analysis – by Michel Nienhuis
In the tussle between privacy and security concerns, there is only one agreed bottom line ? that children must be protected. Could young people help resolve the debate?
Online privacy, security and freedom controversies have become a staple in traditional and new media alike. ?Cyber? has taken centre stage: cyber security, cyber bullying, cyber conflict, cyber crime, cyber espionage, cyber terrorism and even cyber warfare are continuing to make headlines. With the recent Arab uprising as a landmark moment in the power of the internet, slowly but steadily cyberspace has become essential to our daily lives ? but as a troubled medium: security and privacy are under attack, not in the least from each other. Where do young people find themselves in this dual frame?
from iRevolution by Patrick Meier
I get this question all the time: ?How do you verify social media data?? This question drives many of the conversations on crowdsourcing and crisis mapping these days. It?s high time that we start compiling our tips and tricks into an online how-to-guide so that we don?t have to start from square one every time the question comes up. We need to build and accumulate our shared knowledge in information forensics. So here is the Google Doc version of this blog post, please feel free to add your best practices and ask others to contribute. Feel free to also add links to other studies on verifying social media content.
from The Meta-Activism Project by Mary C Joyce
[UPDATED] Are America?s information interventions around the world just imperialism in a digital mask or is a different type of foreign policy at work? In an interesting post today on the Savage Minds blog Adam Fish, a PhD candidate at UCLA, writes:
from Savage Minds: Notes and Queries in Anthropology ? A Group Blog by Adam Fish
By the end of the year the US State department will spend $70 million on stealth communications technologies to enable activists to communicate beyond the reach of dictators according to a recent NYT article. Prototypes include a suitcase capable of quickly blanketing a region with a free wifi network, bluetooth devices that can silently share data, software that protects the anonymity of Chinese users, independent cellphone networks in Afghanistan, and underground buried cell phones on the border of North Korea for desperate phone calls to ?freedom.? These are political tools deployed to promote the agenda of one nation over that of another. How should we address information imperialism? The use of networked communications tools to subvert so-called regimes exposes a proclivity for digital intervention that likely also includes digital literacy projects to provoke revolutionary actions, propaganda campaigns to make celebrities out of bloggers, and covert code warfare. Let?s review the spectrum of information interventions to ascertain the ways and hows of information imperialism.
from FP Passport by Joshua Keating
This Sunday’s New York Times contained an interesting item on U.S. State Department-funded efforts to circumvent Internet censorship abroad. Particularly noteworthy was the description of a brave band of cyberpunk revolutionaries waging a battle for Internet freedom from Farragut North:
by Stan Schroeder
from TorrentFreak by Ernesto
Let it be clear. We?re not advocating that legitimate copyright holders should be completely disallowed from taking copyright infringers to court.
from EFF.org Updates by jillian
Canadian Filtering Tool Used in Middle East
Canadian company Netsweeper produces filtering software that is utilized by several countries to block web sites across various categories. In Yemen, popular blogging site Tumblr is blocked, due to Netsweeper?s categorization of the site as ?pornographic.?
from Editors Weblog – all postings by Teemu Henriksson
Mashable reported that the blogging platform now hosts over twenty million blogs. Moreover, a huge increase has taken place in the last six months, as the amount of blogs on Tumblr has tripled since January, NPR reported. As a result, Tumblr now hosts more blogs than WordPress, another popular blogging site.
from All Facebook by Ruth Manuel-Logan
by Geoff Livingston
from apophenia by zephoria
by Christina Warren
by Ben Crawford