Category Archives: technology

Accountability: Anonymous hacking Steubenville

Adrian Chen has a provocative essay on a hacker/Anonymous member who was instrumental in articulating the digital actions to challenge rape culture in Steubenville Ohio.

Chen not only describes the mistakes made by Lostutter and Anonymous hackers, but also outlines the cultural impact of this kind of hacktivism.  Here Chen describes the impact of the video released of the football player enthusiastically cheering on the rapes.

The video wasn’t forensic evidence of a crime, but of the attitude that could allow something like the rape to happen over and over again. When people talk about how Anonymous “exposed” Steubenville, they can’t mean the facts of this case, which were utterly botched by KnightSec and its allies. What they mean is that Anonymous exposed how sexual assault is a bigger issue than bad people doing bad things. That it is enabled and even celebrated by a culture that tells young men it’s OK to laugh off a horrific rape as harmless late-night debauchery, to be instagrammed and tweeted about, then expects the rest of us to feel bad for the perpetrators when they’re punished. That’s the valuable lesson of this video, and KYAnonymous alone had uncovered it.

via “Weaponize the Media”: An Anonymous Rapper’s War on Steubenville.

Leave a comment

Filed under communication, hacking, media, protest, resistance, sexual assault, technology

Not everyone has access to the same technology

Jen Schradie on the digital divide.  Thanks to Cyborgology via the Society Pages.

6. But aren’t people from marginalized communities “leapfrogging” over desktops, laptops and even tablets by using their mobile phones?

As Sociologist Sheila Cotton put it, “Could you type a 10 page paper on your phone?” However smart it might be, newer, smaller, sleeker gadgets, such as the iPad mini, are designed more for consumption, rather than producing and engaging with online content. Certainly, many people are tweeting and posting status updates with their smart phones, but class divisions are stark both domestically and worldwide for smart phone, rather than mobile phone access. And mobile devices are not always “smart.” As I have argued, having online access at a variety of locations (i.e. home and work) and owning a lot of gadgets allows people to control the means of digital production and have the autonomy for high levels of Internet use. One cell phone doesn’t cut it.

Leave a comment

Filed under academics, capitalism, communication, learning, media, propaganda, representation, technology

Hacking and the paranoia of the nation

The assumed brightline between information warfare and warfare has become blurry.

Here is the LA Times reporting that the British have used government spy hackers to attack an Al Qaeda newspaper, replacing the bomb making instructions with the winning cupcake recipe from an Ellen episode.   Huh?

In its summer edition last year, Inspire featured an article titled “Make a Bomb in the Kitchen of Your Mom.” But British spy agents belonging to GCHQ infiltrated the pages and “corrupted” them, erasing the instructions and leaving the cupcake recipe in its place.

The Daily Telegraph in London also ran a story that said “the code, which had been inserted into the original magazine by the British intelligence hackers, was actually a web page of recipes for ‘The Best Cupcakes in America’ published by the Ellen DeGeneres chat show.”

via British spy agents reportedly hack Al Qaeda magazine, replacing its bomb-making instructions with recipes for cupcakes – latimes.com.

The Guardian reports on the well-established Chinese military hacking unit “known as the cyber blue team.”  China announced that it had established the group to influence culture.

Rather than hacking attacks aimed at obtaining private or secret information, Ye and Zhao said China was threatened by psychological operations that used the internet to shift public opinion against governments. They cited the “domino effect” seen in the Middle East and north Africa created by Facebook, Twitter and other social media that are banned by China’s great firewall of censorship.

via China brands Google ‘snotty-nosed’ as cyber feud intensifies | World news | The Guardian.

A couple of days ago, the United States announced it’s new International strategy for cyberspace.  The big change?  The United States wanted to make clear that we can respond with military force when hacked.  That’s right, the next North African kid who messes with the US firewall might face some Cruise missiles.

Leave a comment

Filed under communication, hacking, propaganda, protest, representation, Surveillance, technology