The Coming Swarm DDOS Actions, Hacktivism, and Civil Disobedience on the Internet

What is Hacktivism? In The Coming Swarm, rising star Molly Sauter examines the history, development, theory, and practice of distributed denial of service actions as a tactic of political activism. The internet is a vital arena of communication, self expression, and interpersonal organizing. When th...

Descripción completa

Detalles Bibliográficos
Autor principal: Sauter, Molly (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: New York : Bloomsbury Publishing 2014.
Colección:Bloomsbury OA ebooks.
Acceso en línea:Conectar con la versión electrónica
Ver en Universidad de Navarra:https://innopac.unav.es/record=b44526349*spi
Tabla de Contenidos:
  • Title Page; Additional Praise for the Coming Swarm; Copyright Page; Contents; Acknowledgments; Foreword by ETHAN ZUCKERMAN ; Introduction: Searching for the digital street; The structure of this work; Technical note; Legal note; Notes; Chapter 1 DDoS and Civil Disobedience in historical context; Silence and disruption in the time of constant comment; "Full and free discussion even of ideas we hate"; Notes; Chapter 2 Blockades and blockages: DDoS as direct action; Functional metaphors of geography and physicality; Shouting down your opponent: The censorship critique.
  • The Euskal Herria Journal and the IGCThe "Deportation class" action; Notes; Chapter 3 Which way to the #press channel? DDoS as media manipulation; Terrorist, hacker, artist, nuisance: The many media reflections of the EDT; Allies in the toywar; Anonymous and the media: Manipulation, entertainment, and readymades; Shadows in the monitor:The CAE's symbolic dissent critique; What does winning look like?; Notes; Chapter 4 Show me what an activist looks like: DDoS as a method of biographical impact; The culture of the Hive; Anonymous' hacker identity; Notes.
  • Chapter 5 Identity, anonymity, and responsibility: DDoS and the personalDDoS and impure dissent; Identity, anonymity, and responsibility within protest; Accessibility in technologically defined tactical spaces; Notes; Chapter 6 LOIC will tear us apart: DDoS tool development and design; The Electronic Disturbance Theater and FloodNet; Anonymous, Operation Payback and LOIC; A forked comparison: abatishchev and NewEraCracker; Changes in the technology; Notes; Chapter 7 Against the man: State and corporate responses to DDoS actions; Terrorism accusations and the CFAA.
  • GCHQ's rolling thunder and the (re)militarization of the internetThe internet as melded commercial/military space; The avatar nature of online brand presence; Notes; Conclusion: The future of DDoS; Note; Index; Biographies; Foreword by.