re:publica 2015 - Gabriella Coleman

re:publica 2015 - Gabriella Coleman

Sunday 10 May 2015

The re:publica is one of the largest and most exciting conferences about digital culture in the world.

Since its foundation in 2007, it has grown from a cozy blogger meeting with 700 participants into a wide-ranging “society conference”, with 7000 visitors in 2015.

Gabriella Coleman: “How Anonymous (Narrowly) Evaded the Cyberterrorism Rhetorical Machine.”

Anonymous - a enigmatic protest ensemble that first emerged as an activist force in 2008 - has been thrust repeatedly into the media limelight due to a series of high stakes digital protest attacks, stretching from Distributed of Denial Service attacks to high profile hacks.

By 2011, Anonymous targeted Fortune 500 corporations and military defense contractors. Mercenary hackers doxed Anons, revealing their identities to law enforcement by publishing their legal names, personal photos, and addresses. Anons started to leak sensitive, classified, or humiliating information.

Given the prevalence of cyberware and terrorism rhetoric, it would seem effortless and straightforward for government officials to paint Anonymous as a new breed of dangerous cyberterrorists. Despite a few notable attempts to forge this precise connection, the government has thus far failed in slotting Anonymous into this well worn scaremongering trope; the great majority of news media accounts treat Anonymous not as violent cyberterrorists, but foremost as insurgent digital activists.

Drawing on years of ethnographic research, this talk offers an account as to why Anonymous was able to successfully (although narrowly) dodge the cyberterrorism rhetorical machine and looks instead to the prosecutorial tactics deployed to silence and even punish Anonymous activists.


Anonymous Shop

One-of-a-Kind Products. Unique designs on trendy gear you simply can’t get anywhere else. Powered by Pros. Spreadshirt prints and ships your order fast and on-demand.

NordVPN, shield your browsing from hackers and surveillance.

Protect all your devices.

2-Year Plan | Discount -72%
Anonymous Shop

One-of-a-Kind Products. Unique designs on trendy gear you simply can’t get anywhere else. Powered by Pros. Spreadshirt prints and ships your order fast and on-demand.

NordVPN, shield your browsing from hackers and surveillance.

Protect all your devices.

2-Year Plan | Discount -72%

Translation

Tutanota - Encrypted mailbox for free

Tutanota - Encrypted mailbox for free

Tutanota, Freedom Fighters. Secure email for everybody! Every day Tutanota fights for freedom and privacy. Tutanota strives to bring the most (...)


Three challenges for the web, according to its inventor

Three challenges for the web, according to its inventor

Today is the world wide web’s 28th birthday. Here’s a message from our founder and web inventor Sir Tim Berners-Lee on how the web has evolved, (...)


Why the NordVPN network is safe

Why the NordVPN network is safe

Why the NordVPN network is safe after a third-party provider breach. Information has recently surfaced about a NordVPN breach caused by (...)


Tor - A Message from George Orwell

Tor - A Message from George Orwell

The Onion Router - Your digital rights - Fuck up Big Brother. Good day to you, fellow members of the intergalactic resistance against dystopian (...)


Statement concerning the arrest of Dmitry Bogatov

Statement concerning the arrest of Dmitry Bogatov

Debian Press Release: The Debian Project is concerned to hear that one of our members, Dmitry Bogatov, has been arrested by Russian authorities. (...)


OnionMail prevents clandestine espionage

OnionMail prevents clandestine espionage

OnionMail is an open source SMTP/POP3 compatible mail server with some functions designed for Tor hidden services. OnionMail is an anonymous and (...)


WikiLeaks

Submit documents to WikiLeaks

WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed.


/e/ Foundation
eFoundation is a non-profit organization leading the development of Open Source mobile operating systems that respect users’ data privacy.

Tor Browser
Tor Browser
Tor protects your privacy

NordVPN
Protect all your devices.
2-Year Plan | Discount -72%