« America's Dirty Secret: AfPak War Not WinnableJEWS, JUDAISM & JEWISHNESS »

Hacktivism for Cyber Democracy

December 17th, 2010

Joel S. Hirschhorn

Because of the attacks on WikiLeaks and its founder there has been considerable media attention to the hacktivism practiced by supporters of WikiLeaks. That has been manifested as cyber attacks on mainstream commercial websites that acted against WikiLeaks. Hacktivism as retribution and strategy to gain political objectives is bound to become much more common. And considering how voting, especially from the perspective of younger people, has been enormously disappointing as a means of reforming government and political systems worldwide, that seems appropriate.

Naturally, there is a fine discussion of hacktivism at Wikipedia. There we learn that it has been around far longer than the current attention to the WikiLeaks situation.

Hacking has come to mostly mean illegal breaking into computer systems, while activism has always been either violent or nonviolent. Hacktivism is clearly now seen as an alternative to convention activism, civil disobedience and, increasingly, participation in democratic, electoral processes.

The combination of computer programming skills, critical thinking, anger and disgust with prevailing corporate and government institutions can and probably should drive better focused hacktivism. It could become an effective strategy for achieving major political reforms.

Cyberterrorism along with cyber crime, Internet fraud and everyday spamming are to be feared and fought, while hacktivism merits considerable respect and public support as a philosophic and political tactic responding to contemporary political and social issues and needs. At least, as long as it does not do harm to individuals.

Those with the expertise to implement hacktivism are a new breed of radicals, revolutionaries, and power brokers that is unsurprisingly an inevitable consequence of the whole computer, networking and Internet world that has been overly embraced. As with all technologies, there are always generally unseen and unintended negative impacts that catch people, governments, companies and just about everyone else by surprise. If there is any real surprise it is that the world has not seen far more widespread hacktivism.

In a fine 2004 article Hacktivism and How It Got Here, Michelle Delio pointed out: Hacktivism, as defined by the Cult of the Dead Cow, the group of hackers and artists who coined the phrase, was intended to refer to the development and use of technology to foster human rights and the open exchange of information.

We should see hacktivism as a dimension to cyber or digital democracy. It may first appear as more deadly than violent street protests against government actions that are seen frequently, particularly in Europe, but should it not be seen as just a more technological form of protest appropriate for our time? Indeed, just as WikiLeaks is seen as a more potent, technological form of whistle blowing, is not hacktivism its logical complement?

There is a wonderful, detailed history of hacktivism on the Wikipedia site, including a citation to a 2006 published paper by the now infamous Julian Assange titled The Curious Origins of Political Hacktivism.

Listen to the thinking of a 22-year-old London software engineer known only as Coldblood, who controls the servers the group Anonymous uses to implement its hacktivist actions. “I decided to speak as I'm passionate about how government shouldn't censor the internet. We suggest sites to attack, and if enough people think it's good, it will generally happen. It's a community thing. By making it harder for these companies to operate online we show them a message that it's not just governments they need to keep happy, it's the users as well. If their website is offline, then people can't use their services and it affects them. It's like an idealistic democracy. But everyone is aware that the attacks are illegal. Nobody is pressured into taking part. A lot just watch. But if they arrest one person, the attacks won't stop.”

To see hacktivism positively today may require having a positive attitude towards WikiLeaks as the defender and protector of the public’s right to know what governments, corporations and international organizations are really doing, even when secrecy is used to thwart transparency. In so many respects, WikiLeaks is more trustworthy than the groups it exposes. It is performing a duty that newspapers could once be counted on to do, but with corporate ownership and censorship of media WikiLeaks offers more independence. However, the relationship between WikiLeaks and several mainstream newspapers in its release of US State Department documents has been seriously questioned by Michel Chossudovsky: “how can this battle against media disinformation be waged with the participation and collaboration of the corporate architects of media disinformation? Wikileaks has enlisted the architects of media disinformation to fight media disinformation: An incongruous and self-defeating procedure.” Still, working with corporate media may have been a tactic to protect WikiLeaks.

This much seems certain about the future: The more that electoral politics in western democracies appears increasingly ineffective in fighting political and corporate corruption, economic inequality, restraints on the Internet, environmental problems, suffering in developing countries, and unnecessary wars, the more we can expect to witness hacktivism. The most interesting question is whether the American and global plutocracy that has so successfully advanced the greedy interests of the rich and powerful will learn to live with hacktivism or whether it mounts a far more aggressive attack on it, including severe criminal penalties. Hacktivism is not so much the problem as a symptom of a far more serious, deeper set of problems.

-###-

[Contact Joel S. Hirschhorn through delusionaldemocracy.com.]

No feedback yet

Voices

Voices

  • Ned Lud Parade, Protest & Projectile We are urgently called—by custom, media, or the relentless churn of the day—to witness. Witness the parade. Witness the war. Witness the ticker inching past news of missiles, of cities ravaged, of another speech…
  • Ned Lud Israel has an unusual pastime. He likes to provoke fights in bars—specifically with bouncers. Not with patrons in general, not with pool sharks or irate drunks, but full-time bouncers, men carved out of concrete and protein powder, schooled in…
  • Paul Craig Roberts "The most significant fact of our time is that the entire Western World is a dead man walking..." Democrats for many long years have imposed race and gender privileges, which violate the 14th Amendment’s requirement of equal…
  • Fred Gransville The climb of fascism in the United States was not born from a single event, nor was it the result of some sudden, dramatic cultural shift. Rather, it emerged through a slow, relentless erosion of democratic institutions, camouflaged…
  • By David Swanson I recommend reading Charlottesville: An American Story by Deborah Baker. Itʼs an account, of course, not of all aspects of the city of Charlottesville, but principally of the Nazi-KKK-White Supremacist riot of 2017 that has taken on the…
  • By Ned Lud They don’t need jackboots when they have behavioral analytics. The war on speech has gone stealth. Once, repression was crude—clubs, tear gas, blacklists. Now, a fusion of military-grade surveillance and corporate-state platforms executes the…
  • by Tracy Turner In the besieged killing field territories of Gaza, survival has become a nightmare. The siege blockade, far from being mere policy, has morphed into an insidious engine of deliberate starvation-its mechanism fine-tuned to crush the will…
  • Paul Craig Roberts Belaya air base Russia The attack on Russian strategic forces by Ukraine, with or without President Trump’s knowledge and with or without help from Washington and the British, could have been the most dangerous event in East-West…
  • By Chris Spencer The architecture of censorship in the 21st century is not built of iron bars or smoldering books. It is invisible by design—engineered into the digital substrate of everyday life, encoded in autocomplete predictions, invisible filters,…
  • META/Facebook Shadow Protocols: Web Weaponized Against Palestinian Genocide Discourse Ned Lud Spoiler alert: Not Muslim. Not affiliated with Hamas. And definitely not an Islamophobe. Like Zuckerberg.  This information is backed by reports from…
June 2025
Sun Mon Tue Wed Thu Fri Sat
 << <   > >>
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30          

  XML Feeds

powered by b2evolution
FAIR USE NOTICE: This site contains copyrighted articles and information about environmental, political, human rights, economic, democratic, scientific, and social justice issues, etc. This news and information is displayed without profit for educational purposes, in accordance with, Title 17 U.S.C. Section 107 of the US Copyright Law. Thepeoplesvoice.org is a non-advocacy internet web site, edited by non-affiliated U.S. citizens. editor
ozlu Sozler GereksizGercek Hava Durumu Firma Rehberi Hava Durumu Firma Rehberi E-okul Veli Firma Rehberi