nettime Ippolita Collective, In the Facebook Aquarium Part Two, section #5 (concluded)

2014-07-04 Thread Patrice Riemens

Ippolita Collective, In the Facebook Aquarium Part Two

The Hacker Spirit and the disease of Anarcho-Capitalism: long time
buddies? (concluded)

(from previous installment:

In the 17th and up to the beginning of the 18th century, pirates
in the New World had a more adventurous, and also more free and
egalitarian life than the sailors embarked on Spanish, English, French
or Dutch ships [44].) --- Later they often sold their liberty under
duress, coerced by institutional imperialism, and enlisted under the
flag of various European powers, whose ships they previously used to
pillage. 'Letters of Marque' transformed pirates into privateers, or
with other words, into mercenaries. In the same fashion, hackers at
the beginning of the 21st century were confronted with joint attacks
by institutional colonizers and often opted to co-operate with them.
From being free explorers they became proficient mercenaries in the
employ of companies and governments who are out to establish a new
order of things in the digital worlds [45].

The 'global war' frame of mind lampooned in /War Games/ (the film)
has unfortunately materialised in the realm of digital sociality.
News reach us everyday about malevolent hackers engaged on this or
that front, against - or on the side of - white, black, yellow, or
red terrorists, all with vague, unintelligible or downright absurd
demands, and who are battling or collaborating with intelligence
services, and shady, conspiring, manipulative, and occult powers
or outfits. The one time impish and spiritual scenarios out of the
hacker lore (gnosis), which started with friendly /Illuminati/ and
Voodoo goddesses of cyberspace have become concrete and turned
extremely ugly. Cyber-war is by now an everyday concept: Internet
has turned into a (massive) resource, but also into a threat to the
established order [46]. The enormous quantities and the computing
power of PCs and on-line servers can be used to manage flows of
malignant data in order to extract private informations, or to carry
out attacks, as with the armies of /zombie/computers remote-controlled
by other computers (/botnet/), e.g. by those owned by government
agencies, or to disconnect network(s). Viruses are created to carry
out attacks on enemy targets, to slow down or disable military
research programs. Today's wars like the one in Afghanistan (in
defense of democracy), are fought at a distance with drones, remote
controlled from bases thousands of kilometers away, which fire
missiles on targets identified by yet other drones. The modus operandi
is exactly the same as that of video-games, only with all to real
deadly effects.

Are hackers a menace in such an apocalyptic scenario? Are they
buccaneers or privateers? Are they dangerous subversives combatting
the established order, or are they the hired hands of strong powers
with libertarian tendencies? Let us now take a trip to the far North
(of Europe), to the land of Sweden, the locale where we find a number
of elements in the patchwork of hacking, piracy, and libertarianism:
the Pirate Bay site, the /Pirat Partiet/ and ... Wikileaks.

(to be continued)
Next time: section 6: Pirate parties, or technology in politics




--
(note belonging to previous installment)

[44] Still seen today as heroes in popular imagination, pirates
have embodied a very specific world-view, whose values were based
on liberty and equality. They were libertarians in the sense of an
socialist international /avant la lettre/ This thesis is supported
by Marcus Rediker's research, with a lot of historic examples and
pictures. Marcus Rediker, /Villains of All Nations, Atlantic Pirates
in the Golden Age/ London, Verso 2004

Synopsis:
http://www.marcusrediker.com/books/villains/Synopsis_of_Villains.htm
Excerpts on Googlebooks: http://bit.ly/1rjEyVP

---
[45] Exemplary in this respect is the 'Tiger Team' case. This was the name
of a group of /security hackers/ working for Telecom Italia - and for the
Italian secret services. The TT team was involved in tampering with the
(electronic) electoral process and also in selling confidential
informations to French, Israeli, and American secret services. For details
see the article (in Italian) by investigative journalists Beppe Cremignani
and Enrico Deaglio: 'gli Imbroglioni' /Diario/, special issue with film
(2007):
http://forum.tntvillage.scambioetico.org/?showtopic=218923
Short excerpt of the film on Youtube - with a long description:
http://www.youtube.com/watch?v=U25aWYjR8U8
One of the darkest character in this murky story is Fabio Ghioni, a
security - and paranoia - expert, and also essayist and novelist in the
/fantasy/ genre. As instructor of dark hat hackers for various grizzly
governmental 'agencies' he also promotes the E.N.O.C. program (for
Evolution and New Order Civilization) [I couldn't find anything in
English, but here's a short, very 'new edge' clip on YT:
http://www.youtube.com/watch?v=HHki7N0St6M - transl.]
Maybe this is simply a crude 

nettime Kyle Rankin: NSA: Linux Journal is an extremist forum and its

2014-07-04 Thread Patrice Riemens
More hardened nettimers will probably have the I am shocked, shocked 
reaction to all this, yet it is interesting to see ever new constituencies
confronted to (and shocked by) the fact that in the eyes of the power
everybody who's not part of it (and actually, whomever is, too) is a
suspect and a - unfortunately yet unproven - criminal/ extremist/
terrorist etc.
Cheers, p+5D!

.


Original to:
http://www.linuxjournal.com/content/nsa-linux-journal-extremist-forum-and-its-readers-get-flagged-extra-surveillance
(with links)
(bwo Maja vdV - don't worry she's 'targetted' since 1980 ...)


NSA: Linux Journal is an extremist forum and its readers get flagged for
extra surveillance
Jul 03, 2014  By Kyle Rankin


A new story published on the German site Tagesschau and followed up by
BoingBoing and DasErste.de has uncovered some shocking details about who
the NSA targets for surveillance including visitors to Linux Journal
itself.

While it has been revealed before that the NSA captures just about all
Internet traffic for a short time, the Tagesschau story provides new
details about how the NSA's XKEYSCORE program decides which traffic to
keep indefinitely. XKEYSCORE uses specific selectors to flag traffic, and
the article reveals that Web searches for Tor and Tails--software I've
covered here in Linux Journal that helps to protect a user's anonymity and
privacy on the Internet--are among the selectors that will flag you as
extremist and targeted for further surveillance. If you just consider
how many Linux Journal readers have read our Tor and Tails coverage in the
magazine, that alone would flag quite a few innocent people as extremist.

While that is troubling in itself, even more troubling to readers on this
site is that linuxjournal.com has been flagged as a selector! DasErste.de
has published the relevant XKEYSCORE source code, and if you look closely
at the rule definitions, you will see linuxjournal.com/content/linux*
listed alongside Tails and Tor. According to an article on DasErste.de,
the NSA considers Linux Journal an extremist forum. This means that
merely looking for any Linux content on Linux Journal, not just content
about anonymizing software or encryption, is considered suspicious and
means your Internet traffic may be stored indefinitely.

One of the biggest questions these new revelations raise is why. Up until
this point, I would imagine most Linux Journal readers had considered the
NSA revelations as troubling but figured the NSA would never be interested
in them personally. Now we know that just visiting this site makes you a
target. While we may never know for sure what it is about Linux Journal in
particular, the Boing Boing article speculates that it might be to
separate out people on the Internet who know how to be private from those
who don't so it can capture communications from everyone with privacy
know-how. If that's true, it seems to go much further to target anyone
with Linux know-how.

It's bad news to all of us who use and read about Linux on a daily basis,
but fortunately we aren't completely helpless. Earlier in the year I
started a series on security, privacy and anonymity in my Hack and /
column that included articles on how to use the Tor browser bundle and
Tails. With either piece of software in place, you can browse Linux
Journal (and the rest of the Internet) in private.

__

Kyle Rankin is a systems architect; and the author of DevOps
Troubleshooting, The Official Ubuntu Server Book, Knoppix Hacks, Knoppix
Pocket Reference, Linux Multimedia Hacks, and Ubuntu Hacks.


#  distributed via nettime: no commercial use without permission
#  nettime  is a moderated mailing list for net criticism,
#  collaborative text filtering and cultural politics of the nets
#  more info: http://mx.kein.org/mailman/listinfo/nettime-l
#  archive: http://www.nettime.org contact: nett...@kein.org