https://twentysix.fibreculturejournal.org/wp-content/themes/fcjissue19/images/headers/default.jpg
During the 2009 post-election protests in Iran, YouTube proved useful for raising awareness and mobilising people; but later, the Iranian government used these videos to crowd-source the identification of protesters. Activists used Skype to communicate during the Egyptian uprising thinking it was safer than the terrestrial telephone system; however, when they examined files from the intelligence agency in the chaos after Mubarak’s fall they learnt their Skype calls were being closely monitored by Egypt’s security service . One of the most circulated images appealing for public sympathy and money following the 2015 catastrophic Nepal earthquake turned out to be a ruse—an old image from North Vietnam—its circulation initiated by unknown people with unknown motivations. These examples serve to remind us that while digital technologies are now deeply entangled with activist practices that are focused on contributing to social change, the philosophies and capacities embedded within these technologies often contradict, counteract, […]
Adam Fish Lancaster University Introduction In August 2012, Wikileaks was hit with a massive Distributed Denial of Service (DDoS) attack from a mysterious group appropriately titled Antileaks. DDoS assaults occur when multiple computers simultaneously ‘refresh’ a website causing it to overload and shutdown. A shaken-up Wikileaks tweeted: ‘The range of IPs used is huge. Whoever is running it controls thousands of machines or is able to simulate them’ (Kerr, 2012). This is a constant problem for Wikileaks. Their website reads: ‘WikiLeaks is currently under heavy attack. In order to fully protect the CableGate archives, we ask you to mirror it again’ (Wikileaks.org). Eventually repelling the Antileaks attack, Wikileaks again took to Twitter to boast: ‘DDoS proof, financially & geographically diverse. We’re ready to rumble’ (Kerr, 2012). For Wikileaks, mirroring means copying and pasting the CableGate archives in resilient servers so that the content remains visible. Infamous for Guy Fawkes masks, […]