“Good, Evil, Digital” is one of the largest link-suite “stories” we have ever featured on the aggregator, with more than four dozen links to articles, books, videos, websites and software tools. It has also been one of the most fascinating to research and challenging to assemble.
Internet freedom and internet security are two sides to the same coin:
- Social networks are powerful tools for organizing “Revolutions 2.0,” as well as convenient intelligence-gathering sites
- To promote openness, Wikileaks and its clones operate in secrecy
- Human rights NGO’s use the web to expose abuse, but must protect themselves from cyber-retribution
- Crisis mapping, a key tool for humanitarian response, requires secure protocols to keep potentially sensitive information safe
Likewise, determining who’s a hero and who’s a villain isn’t always so clear cut. When ad hoc vigilante “hackivists” under the theatrically ominous moniker “Anonymous” go after the inarguably awful Iranian government, it’s Robin Hood in bits and bytes. It is a tougher call for “Operation: Titstorm,” which targeted the Australian government over censorship issues, using porn as the standard bearer for free speech.
The curious case of Aaron Barr, a software security expert singled out for attack, crosses the line straight to creepy. Barr, who had boasted of being able to strip the hacktivists of their most precious asset—anonymity—found himself on the wrong end of some sharply aimed code. The Anonymous crew tunneled through tens of thousands of Barr’s emails, making them public, along with his cell number, address and social security number. Found among the email booty, a possible smoking gun, implicating not one, not two, but three security firms proposing a variety of dirty tricks—including cyber attacks—on behalf of the U.S. Chamber of Commerce and Bank of America.
In the midst of all this cyber-sniping, some are calling for a “Geneva Convention” to outline the rules of cyberwarfare, spare “civilian targets” and inject some ethics into battle. Others say the “war” analogy doesn’t really work when dealing with an enemy can’t be seen or even tracked all that easily. The “Stuxnet” worm that attacked Iranian nuclear facilities, for example, was designed to cover the evidence of its own existence. It went about wrecking gyroscopes with commands to speed up and slow down while simultaneously generating data reporting that everything was operating as it should.
Meanwhile, the award for innovation in mobile data distribution goes to the Jihadists, for whom Bluetooth has become a “…a distribution mechanism of choice. ” From crunching video files to developing special encryption-friendly operating systems, they’ve got it down.
Taking the opposite tack, Egyptian-Googler-turned-freedom-fighter Wael Ghonim and a network-savvy generation placed their bets on openness, struggling to keep a nascent revolution alive through posts on Facebook and Twitter. Throughout the 18 days of unprecedented protest, the government tried everything it could to throttle communication, including shutting down the country’s internet and cell phone services.
Despite the limits, the “Facebook revolution” prevailed, not only sweeping a despot from office, but also shredding in the process Malcolm Gladwell’s thesis on activism and the “strong ties” of personal friendships versus the “weak ties” of internet networks. Clearly, is not an either/or choice, but a powerful cross-reinforcing combination.
Indeed, at this point, the only force that could possibly bring down the internet and put an end to this furious, sometimes frightening, often marvelous flowering of digital communication is an extra-terrestrial event: a solar storm. And it could happen. After years of quietly shining in the distance 93 million miles away, the sun is starting what scientists dryly describe as a “more active phase.” Tongues of particle-charged plasma are reaching across the heavens to short circuits here on Earth. In 1859, a solar storm fried telegraph lines. Today, that same storm would cause an estimated $2 trillion worth of “initial damage,” which could take a decade or more to fix. What Mubarek couldn’t manage, Apollo can do in a blink.
Additional links include:
- “Twitter’s Biz Stone on Starting a Revolution” (print/audio) / NPR/Fresh Air
- “WikiLeaks and the Age of Transparency” by Micah Sifry (book excerpt) / Huffington Post
- “2010 Report on Distributed Denial of Service (DDoS) Attacks” / Berkman Center, Harvard
- “Malcolm Gladwell is #Wrong” by Maria Popova / ChangeObserver
- and more!
All links become part of the TrackerNews’ searchable archive.
Filed under: free speech, maps, mobile devices, revolution, social networks | Tagged: Anonymous, Biz Stone, Chris Anderson, crisis mapping, cyberwar, Egypt, Evgeny Morozov, Facebook, hacktivists, Hillary Clinton, Hosni Mubarek, internet freedom, internet security, Julian Assange, Malcolm Gladwel, Maria Popova, Micah Sifry, social networks, stuxnet, tactical technology collective, TED, TOR, Twitter, Wael Ghonim, Wikileaks | Leave a Comment »