LEADER 04063nam 2200385 450 001 9910597893003321 005 20230627203312.0 010 $a1-62892-152-8 024 7 $a10.5040/9781628926705 035 $a(CKB)4100000010860393 035 $a(NjHacI)994100000010860393 035 $a(EXLCZ)994100000010860393 100 $a20230627d2014 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComing Swarm $eDDOS Actions, Hacktivism, and Civil Disobedience on the Internet /$fMolly Sauter 210 1$aNew York :$cBloomsbury Academic & Professional,$d2014. 215 $a1 online resource (xv, 168 pages) 320 $aIncludes bibliographical references and index. 327 $aTitle Page; Additional Praise for the Coming Swarm; Copyright Page; Contents; Acknowledgments; Foreword by ETHAN ZUCKERMAN ; Introduction: Searching for the digital street; The structure of this work; Technical note; Legal note; Notes; Chapter 1 DDoS and Civil Disobedience in historical context; Silence and disruption in the time of constant comment; "Full and free discussion even of ideas we hate"; Notes; Chapter 2 Blockades and blockages: DDoS as direct action; Functional metaphors of geography and physicality; Shouting down your opponent: The censorship critique. The Euskal Herria Journal and the IGCThe "Deportation class" action; Notes; Chapter 3 Which way to the #press channel? DDoS as media manipulation; Terrorist, hacker, artist, nuisance: The many media reflections of the EDT; Allies in the toywar; Anonymous and the media: Manipulation, entertainment, and readymades; Shadows in the monitor:The CAE's symbolic dissent critique; What does winning look like?; Notes; Chapter 4 Show me what an activist looks like: DDoS as a method of biographical impact; The culture of the Hive; Anonymous' hacker identity; Notes. Chapter 5 Identity, anonymity, and responsibility: DDoS and the personalDDoS and impure dissent; Identity, anonymity, and responsibility within protest; Accessibility in technologically defined tactical spaces; Notes; Chapter 6 LOIC will tear us apart: DDoS tool development and design; The Electronic Disturbance Theater and FloodNet; Anonymous, Operation Payback and LOIC; A forked comparison: abatishchev and NewEraCracker; Changes in the technology; Notes; Chapter 7 Against the man: State and corporate responses to DDoS actions; Terrorism accusations and the CFAA. GCHQ's rolling thunder and the (re)militarization of the internetThe internet as melded commercial/military space; The avatar nature of online brand presence; Notes; Conclusion: The future of DDoS; Note; Index; Biographies; Foreword by. 330 $a"This book examines the history, development, theory, and practice of distributed denial of service actions as a tactic of political activism. The internet is a vital arena of communication, self expression, and interpersonal organizing. When there is a message to convey, words to get out, people to organize, many will turn to the internet as a theater for that activity. As familiar and widely accepted activist tools--petitions, fundraisers, mass letter-writing, call-in campaigns and others--find equivalent practices in the online space, is there also room for the tactics of disruption and civil disobedience that are equally familiar from the realm of street marches, occupations, and sit-ins? Grounding the analysis historically, focusing on early deployments of activist DDOS as well as modern instances to trace its development over time, this book uses activist DDOS actions as the foundation of a larger analysis of the practice of disruptive civil disobedience on the internet"--$cProvided by publisher. 517 $aComing Swarm 606 $aHacktivism 615 0$aHacktivism. 676 $a364.168 700 $aSauter$b Molly$0803464 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910597893003321 996 $aComing Swarm$91804707 997 $aUNINA