background preloader

Anonymous: From the Lulz to Collective Action

Anonymous: From the Lulz to Collective Action
Taken as a whole, Anonymous resists straightforward definition as it is a name currently called into being to coordinate a range of disconnected actions, from trolling to political protests. Originally a name used to coordinate Internet pranks, in the winter of 2008 some wings of Anonymous also became political, focusing on protesting the abuses of the Church of Scientology. By September 2010 another distinct political arm emerged as Operation Payback and did so to protest the Motion Picture Association of America (MPAA), and a few months later this arm shifted its energies to Wikileaks, as did much of the world's attention. It was this manifestation of Anonymous that garnered substantial media coverage due the spectacular waves of distributed denial of service (DDoS) attacks they launched (against PayPal and Mastercard in support of Wikileaks). This difficulty follows from the fact that Anonymous is, like its name suggests, shrouded in some degree of deliberate mystery.

http://mediacommons.futureofthebook.org/tne/pieces/anonymous-lulz-collective-action

Related:  New Mediafishbones

Social Media and the UK Riots: “Twitter Mobs”, “Facebook Mobs”, “Blackberry Mobs” and the Structural Violence of Neoliberalism Social Media and the UK Riots: “Twitter Mobs”, “Blackberry Mobs” and the Structural Violence of Neoliberalism “One formula [...] can be that of the mob: gullible, fickle, herdlike, low in taste and habit. [...] If [...] our purpsoe is manipulation – the persuasion of a large number of people to act, feel, think, known in certain ways – the convenient formula will be that of the masses”. — Raymond Williams “What is true of London, is true of Manchester, Birmingham, Leeds, is true of all great towns. Everywhere barbarous indifference, hard egotism on one hand, and nameless misery on the other, everywhere social warfare, every man’s house in a state of siege, everywhere reciprocal plundering under the protection of the law, and all so shameless, so openly avowed that one shrinks before the consequences of our social state as they manifest themselves here undisguised, and can only wonder that the whole crazy fabric still hangs together”.

The OpNewblood Super Secret Security Handbook « welcome to serpent's embrace The #OpNewblood Super Secret Security Handbook If you have not gone through the IRC chat client setup for your operating system, we recommend you go back and get started there. Master Table of Contents 1) Preface 2) Setting up Tor 3) Firefox Recommended Add-Ons 4) Setting up i2p 4.1) Installation 4.2) Firefox Configuration 4.3) IRC Client Configuration 4.4) I2p IRC on Android via irssi connectbot 5) Advanced IRC 5.1) Commands 5.2) Browsing 6) Advanced Defense Techniques 7) Portable Solutions 8 ) ADVANCED GUIDE TO HACKING AND SECURITY VULNERABILITY Section 1: Preface NOTE: If at any time you need help with any topic found in this guide, feel free to join us at and you’ll be able to find someone to help you figure it out. It should be noted that this guide contains information that may be difficult to understand without an extensive technical and functional knowledge of information systems.

Anonymous Response to Sony : We didn't do it as we will never hurt the innocents ! ~ THN : The Hackers News Anonymous Response to Sony : We didn't do it as we will never hurt the innocents ! Press Release as shown : Last month, an unknown party managed to break into Sony's servers and acquired millions of customer records including credit card numbers. Insomuch as that this incident occurred in the midst of Anonymous' OpSony, by which participants engaged in several of our standard information war procedures against the corporation and its executives, Sony and other parties have come to blame Anonymous for the heist. Today, in a letter directed to members of Congress involved in an inquiry into the situation, Sony claimed to have discovered a file on its servers, presumably left by the thieves in question, entitled "Anonymous" and containing a fragment of our slogan, "We are Legion." In response, we would like to raise the following points:

Anonymous 101: Introduction to the Lulz (Editor’s Note: Any decent coverage of Anonymous is going to verge on some NSFW material at points. There will be questionable language and strange imagery.) Last week the net and the media were ablaze with the news that Anonymous might be taking on the Zeta drug cartel in Mexico, a story that has morphed into a wider drug corruption story, and led to one American law enforcement official in North Carolina being named as a gang conspirator. Also this year, Anons released documents on, or d0xed, several police organizations and one prominent police vendor in retaliation for heavy-handed law enforcement reaction to occupations associated with the Occupy Wall Street movement.

The Hacker Manifesto by +++The Mentor+++ Written January 8, 1986 Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... AnonOps Communications One account. All of Google. Sign in to continue to Blogger Find my account Forgot password? Anonymous : We have Revolution in mind, we can change the World ! ~ The Hackers News We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us. — Anonymous crystal cox, $25 million libel A few days ago, I posted a piece about the Pepper Spray incident at UC Davis. When people saw the original video clip, they overwhelmingly supported students and felt the police had acted harshly and without justification. When I posted a longer video clip, those who commented on my blog, on Twitter and Facebook were about evenly divided on whether police actions were justified or not.

ARP spoofing A successful ARP spoofing (poisoning) attack allows an attacker to alter routing on a network, effectively allowing for a man-in-the-middle attack. ARP spoofing may allow an attacker to intercept data frames on a network, modify the traffic, or stop all traffic. Often the attack is used as an opening for other attacks, such as denial of service, man in the middle, or session hijacking attacks.[1] The attack can only be used on networks that use the Address Resolution Protocol, and is limited to local network segments.[2]

Anonymous and the global correction The tendency to relate past events to what is possible in the present becomes more difficult as the scope of the geopolitical environment changes. It is a useful thing, then, to ask every once in a while if the environment has recently undergone any particular severe changes, thereby expanding our options for the future. Terminology, let alone our means of exchanging information, has changed to such a degree that many essential discussions in today's "communications age" would be entirely incomprehensible to many two decades ago. As the social, political and technological environment has developed, some have already begun to explore new options, seizing new chances for digital activism - and more will soon join in. It is time for the rest of the world to understand why. Service denied

Mr. Washington Goes to Anonymous - Alexis Madrigal - Technology Welcome to one of the inner rings of The Establishment. We're near Dupont Circle, a short distance to the various centers of power in Washington, DC. The Capitol Building is not so far. The White House, too. Out-of-date browser plug-ins are attractive targets for cybercriminals For example, Adobe Reader is installed in 83% of enterprise browsers, and 56% of those installations are out of date, according to the report, which is based on a review of enterprise web traffic flowing through Zscaler’s cloud-based web and email security product. “That is a huge attack surface….This is really what the attackers are going after”, commented Michael Sutton, vice president of research at Zscaler ThreatLabZ. The Blackhole exploit kit has picked up on this and includes a variety of payloads designed to target recent Adobe Reader vulnerabilities, the report noted.

Anonymous (group) Anonymous (used as a mass noun) is a loosely associated international network of activist and hacktivist entities. A website nominally associated with the group describes it as "an internet gathering" with "a very loose and decentralized command structure that operates on ideas rather than directives". The group became known for a series of well-publicized publicity stunts and distributed denial-of-service (DDoS) attacks on government, religious, and corporate websites. Anonymous originated in 2003 on the imageboard 4chan, representing the concept of many online and offline community users simultaneously existing as an anarchic, digitized global brain.[3][4] Anonymous members (known as "Anons") can be distinguished in public by the wearing of stylised Guy Fawkes masks.[5] In its early form, the concept was adopted by a decentralized online community acting anonymously in a coordinated manner, usually toward a loosely self-agreed goal, and primarily focused on entertainment, or "lulz".

Related:  online