jaginsburg.com
  • home
  • journalism | science | tech
    • sci | tech
  • exhibitions
    • introduction
    • mickey pallas
    • News art
  • children's media
  • photography
    • photography
    • book covers
  • blogs
    • Medium
    • better
    • PechaKucha
    • TrackerNews (archive)
    • archived faves

Good, Evil, Digital: The Promise and Peril of Life in the Cyber Lane 

2/22/2011

0 Comments

 
masthead
on internet freedom versus internet security

“Good, Evil, Digital” is one of the largest link-suite “stories” we have ever featured on the aggregator, with more than four dozen links to articles, books, videos, websites and software tools. It has also been one of the most fascinating to research and challenging to assemble.

Internet freedom and internet security are two sides to the same coin:
  • Social networks are powerful tools for organizing “Revolutions 2.0,” as well as convenient intelligence-gathering sites
  • To promote openness, Wikileaks and its clones operate in secrecy
  • Human rights NGO’s use the web to expose abuse, but must protect themselves from cyber-retribution
  • Crisis mapping, a key tool for humanitarian response, requires secure protocols to keep potentially sensitive information safe
Likewise, determining who’s a hero and who’s a villain isn’t always so clear cut. When ad hoc vigilante “hackivists” under the theatrically ominous moniker “Anonymous” go after the inarguably awful Iranian government, it’s Robin Hood in bits and bytes. It is a tougher call for “Operation: Titstorm,” which targeted the Australian government over censorship issues, using porn as the standard bearer for free speech.
The curious case of Aaron Barr, a software security expert singled out for attack, crosses the line straight to creepy. Barr, who had boasted of being able to strip the hacktivists of their most precious asset—anonymity—found himself on the wrong end of some sharply aimed code. The Anonymous crew tunneled through tens of thousands of Barr’s emails, making them public, along with his cell number, address and social security number. Found among the email booty, a possible smoking gun,implicating not one, not two, but three security firms proposing a variety of dirty tricks—including cyber attacks—on behalf of the U.S. Chamber of Commerce and Bank of America.

In the midst of all this cyber-sniping, some are calling for a “Geneva Convention” to outline the rules of cyberwarfare, spare “civilian targets” and inject some ethics into battle.  Others say the “war” analogy doesn’t really work when dealing with an enemy can’t be seen or even tracked all that easily. The “Stuxnet” worm that attacked Iranian nuclear facilities, for example, was designed to cover the evidence of its own existence. It went about wrecking gyroscopes with commands to speed up and slow down while simultaneously generating data reporting that everything was operating as it should.

Meanwhile, the award for innovation in mobile data distribution goes to the Jihadists,for whom Bluetooth has become a “…a distribution mechanism of choice. ” From crunching video files to developing special encryption-friendly operating systems, they’ve got it down.

Taking the opposite tack, Egyptian-Googler-turned-freedom-fighter Wael Ghonim and a network-savvy generation placed their bets on openness, struggling to keep a nascent revolution alive through posts on Facebook and Twitter. Throughout the 18 days of unprecedented protest, the government tried everything it could to throttle communication, including shutting down the country’s internet and cell phone services.

Despite the limits, the “Facebook revolution” prevailed, not only sweeping a despot from office, but also shredding in the process Malcolm Gladwell’s thesis on activismand the “strong ties” of personal friendships versus the “weak ties” of internet networks. Clearly, is not an either/or choice, but a powerful cross-reinforcing combination.

Indeed, at this point, the only force that could possibly bring down the internet and put an end to this furious, sometimes frightening, often marvelous flowering of digital communication is an extra-terrestrial event: a solar storm. And it could happen. After years of quietly shining in the distance 93 million miles away, the sun is starting what scientists dryly describe as a “more active phase.” Tongues of particle-charged plasma are reaching across the heavens to short circuits here on Earth. In 1859, a solar storm fried telegraph lines. Today, that same storm would cause an estimated $2 trillion worth of “initial damage,” which could take a decade or more to fix. What Mubarek couldn’t manage, Apollo can do in a blink.

Additional links include:
  • Secretary of State Hillary Clinton’s speech on internet freedoms (video) /PBS/Newshour
  • “Twitter’s Biz Stone on Starting a Revolution” (print/audio) / NPR/Fresh Air
  • “The Net Delusion” by Evgeny Morozov (book website)
  • “Julian Assange: Why the world needs WikiLeaks” / TED
  • “WikiLeaks and the Age of Transparency” by Micah Sifry (book excerpt) /Huffington Post
  • “2010 Report on Distributed Denial of Service (DDoS) Attacks” / Berkman Center, Harvard
  • Tactical Technology Collective (website)
  • The Tor Project (website)
  • “Malcolm Gladwell is #Wrong” by Maria Popova / ChangeObserver
  • and more!
0 Comments

Your comment will be posted after it is approved.


Leave a Reply.

    background

    The TrackerNews Project was a demo aggregator I developed for InSTEDD, an independent spin-off of Google.org's humanitarian practice. It covered health issues, humanitarian work and technology.

    archives

    November 2013
    November 2011
    October 2011
    August 2011
    July 2011
    June 2011
    May 2011
    March 2011
    February 2011
    January 2011
    December 2010
    November 2010
    October 2010
    September 2010
    August 2010
    July 2010
    June 2010
    April 2010
    February 2010
    January 2010
    December 2009
    November 2009
    October 2009
    September 2009
    August 2009
    July 2009
    May 2009
    April 2009
    February 2009
    December 2008
    November 2008
    October 2008

    Categories

    All
    Agriculture
    Architecture
    Big Data
    China
    Climate Change
    Communications
    Conferences
    Cyber Security
    Deforestation
    Demographics
    Disease Surveillance
    Earthquake
    Energy
    Environment
    Food
    Food Aid
    Free Press
    Haiti
    Health
    Hunger
    Innovation
    Instedd
    Land Mines
    Lighting
    Microfinance
    Mining
    Nuclear
    Oceans
    Philanthropy
    Pollution
    Probiotics
    Recycling
    Sanitation
    Social Enterprise
    Solar
    Tech
    Terrorism
    Transportation
    Travel
    Trees
    Vaccines
    Water
    Water Borne Disease
    Water-borne Disease
    Weather

    •
introduction
Picture
sci / tech
blogs
children's media
Picture
exhibitions
photography
Website designed by 
J.A. Ginsburg