Filed under manual | Tags: · google, hacking, internet, research, search, security, technology, web
“The manual just released by the NSA following a FOIA request filed in April by MuckRock, a site that charges fees to process public records for activists and others. The book is filled with advice for using search engines, the Internet Archive and other online tools.” (source)
Publisher Center for Digital Content of the National Security Agency, February 2007
Unclassified in May 2013
via Marcell Mars, via Wired
Filed under book | Tags: · affect, mass media, media, mediality, memory, preemption, remediation, security
The terrorist attacks of 11 September 2001 have been called the world’s first live global media event. Responding to the immediacy and collective shock produced by live coverage of the collapse of the Twin Towers, print, televisual, and networked media have become obsessed with the pre-mediation of potential futures.
In an era of heightened securitization, US and global media have attempted to prevent a recurrence of such media trauma by ensuring that no future will be able to emerge into the present that has not already been premeditated in the past. Socially networked US and global media work to premediate collective affects of anticipation and connectivity, while also perpetuating low levels of apprehension or fear.
Following up on the groundbreaking work of media theory Remediation: Understanding New Media, Grusin develops the logic of premediation in terms of such concepts as mediality, the affective life of media, and the anticipation of security.
Publisher Palgrave Macmillan, 2010
ISBN 0230242529, 9780230242524
review (Jussi Parikka, Leonardo)Comment (0)
Filed under book | Tags: · city, iraq, israel, military, neoliberalism, security, surveillance, technology, terrorism, urbanism, war
A powerful exposé of how political violence operates through the spaces of urban life.
Cities are the new battleground of our increasingly urban world. From the slums of the global South to the wealthy financial centers of the West, Cities Under Siege traces the spread of political violence through the sites, spaces, infrastructure and symbols of the world’s rapidly expanding metropolitan areas.
Drawing on a wealth of original research, Stephen Graham shows how Western militaries and security forces now perceive all urban terrain as a conflict zone inhabited by lurking shadow enemies. Urban inhabitants have become targets that need to be continually tracked, scanned and controlled. Graham examines the transformation of Western armies into high-tech urban counter-insurgency forces. He looks at the militarization and surveillance of international borders, the use of ‘security’ concerns to suppress democratic dissent, and the enacting of legislation to suspend civilian law. In doing so, he reveals how the New Military Urbanism permeates the entire fabric of urban life, from subway and transport networks hardwired with high-tech ‘command and control’ systems to the insidious militarization of a popular culture corrupted by the all-pervasive discourse of ‘terrorism.’
Publisher Verso Books, London, 2010
ISBN 1844678369, 9781844678365
Filed under handbook, sprint book | Tags: · anonymity, cryptography, email, encryption, floss, hacking, internet, open source, privacy, security, software, surveillance, technology, web
This handbook is designed to help those with no prior experience to protect their basic human right to Privacy in networked, digital domains. By covering a broad array of topics and use contexts it is written to help anyone wishing to understand and then quickly mitigate many kinds of vulnerability using free, open-source tools. Most importantly however this handbook is intended as a reference for use during Crypto Parties.
Facilitated by Adam Hyde
Core Team: Marta Peirano, Asher Wolf, Julian Oliver, Danja Vasiliev, Malte Dik, Brendan Howell, Jan Gerber, Brian Newbold,
Assisted by Teresa Dillon, AT, Carola Hesse, Chris Pinchen, ‘LiamO’, ‘l3lackEyedAngels’, ‘Story89′, Travis Tueffel
Creative Commons BY-SA 4.0 Unported license
via Julian Oliver
discussion and criticism (Liberationtech list)Comment (0)
Filed under records | Tags: · electricity, history, history of science, invention, marxism, politics, science, security, yugoslavia
Released through the Freedom of Information Act.
Publisher Federal Bureau of Information, undated
FBI Records: The Vault series
Myth: The FBI has Nikola Tesla’s plans for a “death ray” (FBI: Top 10 Myths)
Parmy Olson: We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency (2012)
Filed under book | Tags: · anonymous, hacking, hacktivism, internet, internet culture, lulzsec, security, web
A thrilling, exclusive expose of the hacker collectives Anonymous and LulzSec.
WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec.
In late 2010, thousands of hacktivists joined a mass digital assault on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Other targets were wide ranging-the websites of corporations from Sony Entertainment and Fox to the Vatican and the Church of Scientology were hacked, defaced, and embarrassed-and the message was that no one was safe. Thousands of user accounts from pornography websites were released, exposing government employees and military personnel.
Although some attacks were perpetrated by masses of users who were rallied on the message boards of 4Chan, many others were masterminded by a small, tight-knit group of hackers who formed a splinter group of Anonymous called LulzSec. The legend of Anonymous and LulzSec grew in the wake of each ambitious hack. But how were they penetrating intricate corporate security systems? Were they anarchists or activists? Teams or lone wolves? A cabal of skilled hackers or a disorganized bunch of kids?
WE ARE ANONYMOUS delves deep into the internet’s underbelly to tell the incredible full story of the global cyber insurgency movement, and its implications for the future of computer security.
Publisher Little, Brown and Company, June 2012
ISBN 0316213535, 9780316213530
Filed under book | Tags: · computing, hacker culture, hacker ethic, hacking, machine, networks, programming, security, technology
Wie wurde der NASA-Rechner geknackt? Wie funktionieren Computerviren und logische Bomben? Sind Hacker Schwarze Schafe im Wolfspelz? Jenseits des Medienrummels legt dieses Buch einen Blick hinter die Kulissen des Spektakulären frei. Alles über die Hackerszene, über Hackerpraxis, Technik, Auswirkungen und Anwendungen. Alles über den bereits legendären NASA-Hack. Über Lebensgefühl und Erlebnisse im Globalem Datennetz. Alles über Viren, Trojanische Pferde und logische Bomben.
Verlag Wunderlich, 1988
ISBN 3805204744, 9783805204743