{"id":3717,"date":"2011-07-23T16:25:51","date_gmt":"2011-07-23T20:25:51","guid":{"rendered":"http:\/\/thesocietypages.org\/cyborgology\/?p=3717"},"modified":"2011-07-24T14:38:16","modified_gmt":"2011-07-24T18:38:16","slug":"a-new-paradigm-of-leaking-anonymous-delicious-data","status":"publish","type":"post","link":"https:\/\/thesocietypages.org\/cyborgology\/2011\/07\/23\/a-new-paradigm-of-leaking-anonymous-delicious-data\/","title":{"rendered":"A New Paradigm of Leaking: Anonymous&#8217; &#8220;Delicious Data&#8221;"},"content":{"rendered":"<figure id=\"attachment_3720\" aria-describedby=\"caption-attachment-3720\" style=\"width: 539px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/twitter.com\/#!\/anonymousirc\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3720 \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2011\/07\/Anonymous-NATO.png\" alt=\"\" width=\"539\" height=\"336\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2011\/07\/Anonymous-NATO.png 539w, https:\/\/thesocietypages.org\/cyborgology\/files\/2011\/07\/Anonymous-NATO-300x187.png 300w\" sizes=\"auto, (max-width: 539px) 100vw, 539px\" \/><\/a><figcaption id=\"caption-attachment-3720\" class=\"wp-caption-text\">The Anonymous Twitter Feed Announcing the NATO Breach<\/figcaption><\/figure>\n<p style=\"text-align: left\">&nbsp;<\/p>\n<p>On July 21st, 2011, <a href=\"http:\/\/en.wikipedia.org\/wiki\/4chan\" target=\"_blank\">Anonymous<\/a>\u2014the <a href=\"http:\/\/en.wikipedia.org\/wiki\/4chan\" target=\"_blank\">4chan<\/a>-associated hacker collective with a cyber-libertarian bent\u2014announced that they had breached NATO&#8217;s secure database and retrieved roughly a gigabyte of restricted data.\u00a0 To verify their claim, Anonymous posted a &#8220;NATO restricted&#8221; <a title=\"Hello Nato\" href=\"http:\/\/www.scribd.com\/doc\/60714021\/Hello-Nato\" target=\"_blank\">document<\/a> to Twitter.\u00a0 Interestingly, Anonymous has been very cautious in leaking the documents it has obtained, publicly declaring that it would be &#8220;irresponsible&#8221; to publish most of it.\u00a0 Much of what has be published is &#8220;Redacted, for sanity.&#8221;<!--more--><\/p>\n<figure id=\"attachment_3740\" aria-describedby=\"caption-attachment-3740\" style=\"width: 250px\" class=\"wp-caption alignright\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2011\/07\/Anon_Letter1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3740\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2011\/07\/Anon_Letter1.png\" alt=\"\" width=\"250\" height=\"197\" \/><\/a><figcaption id=\"caption-attachment-3740\" class=\"wp-caption-text\">Letter from Anonymous<\/figcaption><\/figure>\n<p>Anonymous was recently in the news for shutting down several payment processing websites like Visa and Mastercard after these companies decided to stop processing donations to it&#8217;s ideological ally, <a href=\"http:\/\/en.wikipedia.org\/wiki\/WikiLeaks\" target=\"_blank\">Wikileaks<\/a>.\u00a0 The interesting thing here, however, is not the similarities between Anonymous&#8217; NATO breach and the culture of Wikileaks but what makes them distinct: Wikileaks is a largely <em>passive <\/em>organization that reviews and posts whatever leaks are submitted, while Anonymous is <em>actively<\/em> breaching organizations, seizing their data, and, ostensibly, disseminating it for the public good.\u00a0 Because of its socially conscious nature, this latter behavior has been labeled &#8220;hacktivism.&#8221;\u00a0 Anonymous displayed the ideological motivation behind their activities in a recent letter responding to the coverage of the NATO incident.\u00a0 The letter expressed a range of conventional libertarian concerns: for example, &#8220;[g]overnments lying to their citizens and inducing fear and terror to keep them in control by dismantling their freedom piece by piece.&#8221;<\/p>\n<p><iframe src=\"http:\/\/pastebin.com\/embed_iframe.php?i=RA15ix7S\" style=\"border:none;width:100%\"><\/iframe><\/p>\n<p>Historically, leaks are the product of activism within an institution (e.g., <a href=\"http:\/\/en.wikipedia.org\/wiki\/Daniel_Ellsberg\" target=\"_blank\">Daniel Ellsberg<\/a>&#8216;s famous leak of the <a href=\"http:\/\/en.wikipedia.org\/wiki\/Pentagon_Papers\" target=\"_blank\">Pentagon Papers<\/a>).\u00a0 Anonymous is demonstrating, however, that<strong> in <a href=\"https:\/\/thesocietypages.org\/cyborgology\/2010\/12\/06\/wikileaks-and-our-liquid-modernity\/\" target=\"_blank\">the highly liquid world of digital information<\/a>, leaks no longer need to be pushed from within, but can be pulled from without<\/strong>.\u00a0 That is to say, institutional outsiders can target the secret documents of an organization and reveal them to the public.\u00a0 We might aptly describe this as a form of <a href=\"http:\/\/en.wikipedia.org\/wiki\/Sousveillance\" target=\"_blank\">sousveillance<\/a> (i.e., surveillance from below).<\/p>\n<p>The question raised by Anonymous&#8217; activities is whether\u2014in light of the knowledge that it is more difficult than ever to control the flows of information\u2014institutions will be compelled to change\/reform their behavior.\u00a0 Is enforced transparency an effective remedy to the ills created by institutionally-consolidated power structures?<\/p>\n<p><a href=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2011\/07\/NATO-Restricted.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3722 aligncenter\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2011\/07\/NATO-Restricted.png\" alt=\"\" width=\"273\" height=\"76\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; On July 21st, 2011, Anonymous\u2014the 4chan-associated hacker collective with a cyber-libertarian bent\u2014announced that they had breached NATO&#8217;s secure database and retrieved roughly a gigabyte of restricted data.\u00a0 To verify their claim, Anonymous posted a &#8220;NATO restricted&#8221; document to Twitter.\u00a0 Interestingly, Anonymous has been very cautious in leaking the documents it has obtained, publicly declaring [&hellip;]<\/p>\n","protected":false},"author":563,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[9967],"tags":[10489,12107,12106,12110,10177,880,12108,12109,3003,3004,12105,868,12112,3519,2143,12111,800,8511],"class_list":["post-3717","post","type-post","status-publish","format-standard","hentry","category-commentary","tag-anonymous","tag-breach","tag-cyber-liberaterianism","tag-daniel-ellsberg","tag-hacker","tag-hacking","tag-hacktivism","tag-leaks","tag-liquid","tag-liquidity","tag-nato","tag-power","tag-restricted-documents","tag-sousveillance","tag-surveillance","tag-the-pentagon-papers","tag-transparency","tag-wikileaks"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/3717","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/users\/563"}],"replies":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/comments?post=3717"}],"version-history":[{"count":44,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/3717\/revisions"}],"predecessor-version":[{"id":3762,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/3717\/revisions\/3762"}],"wp:attachment":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/media?parent=3717"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/categories?post=3717"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/tags?post=3717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}