51 online
 
Most Popular Choices
Share on Facebook 58 Printer Friendly Page More Sharing
General News    H4'ed 12/1/13

Peter Ludlow on Systemic Evil, Whistleblowers, and hacktivism-- Intvw Transcript

By       (Page 9 of 11 pages) Become a premium member to see this article and all articles as one long page.   1 comment, 3 series
Follow Me on Twitter     Message Rob Kall
Become a Fan
  (295 fans)

R.K.: So you've written about hacktivism.  

P.L.: Yes.

R.K.: Can you talk a bit about that?

P.L.: Well, hacktivism is in effect hacking for a political or social cause that is to say it's motivated by some sort of political concern.  By hacking, I take that very generally to mean re-purposing technology for purposes for which it was not originally intended.  So you take a piece of technology, a computer or whatever, you say I'm going to actually deploy this for some sort of political end. And I have been concerned with following some hacktivists in the last few years, what they've been up to and the kinds of trouble they get into.  

R.K.: Can you give a little background on that?  I know you mentioned Aaron Swartz, can you give a big picture about what's going on with hacktivism and how the-- hacktivism, to me seems to be a very Bottom Up activity.  Is it?

P.L.: For the most part, it is.  You get some nominal leaders but they're clustered, but for the most part it's just -, I think one way of thinking about it is that hacktivism is not really a doctrine, it's more of a tactic, and it's a tactic that could be deployed by, basically any sort of political agenda or social concern, and it does, for the most part, remain rather diffuse and a lot of it takes place underground or anonymously.

R.K.: Now there's always Cass Sunstein who wrote about the idea of disrupting protestors and what have you, by using sock puppets and fake personas online and what have you.  Is that a kind of hacktivism?

P.L.: No, that's not.  I mean, so let me give you a couple of examples.  One example would be a distributed denial of service attack where thousands of users would go to somebody's website and keep clicking on it over and over again which basically grinds that website to a halt.  

That's analogous to what would traditionally be called a sit-in.  Where you sit in front of a bank or something like that and make it difficult for people to get in and out.  Then there are others kinds of hacktivists actions that are more aggressive and which target an organization like H. B. Garry or Stratfor and unlock their secrets. So you mentioned sock puppets and one of the things that in fact they did come across in the H. B. Garry hack was that the U.S. Air Force had put out proposals for companies to create basically a sock puppet management system, meaning, what they wanted was a tool, what the U.S. Air Force wanted was a tool that would allow someone to control multiple individuals on social media sites.  

So for example you might have twenty, a hundred accounts, the idea would be that one individual could sit at a desk and flood a website or flood the New York Time comments under an article with separate accounts but they were all under the control of one individual.  

R.K.: So that sort of thing is a way for the state to make it appear that they have support when in fact they don't.  Is that hacktivism or is that just an internet strategy?

P.L.: That is a, I consider that to be a traditional military psyops strategy.  

R.K. Okay.

P.L.: It's like saying, if it goes back to Sun Tzu in The Art of War.  You make it look like you have more supporters and troops than you actually do, so I consider that just a traditional sort of military irregular warfare strategy and it's being done on the internet but it's just because the internet is the new battleground.

R.K.: So what are the different weapons in hacktivism?

P.L.: Well, one of them that I mentioned it the distributed denial of service attack where you get a number of people to descend on a site simultaneously. Another thing you can do, as I said before, is do a penetration of the system and one pivotal way is just to do what they call social engineering where you get someone, you cajole someone in to giving up a password; you do that then the game is over.  

Next Page  1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11

(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).

Funny 1   Supported 1   Interesting 1  
Rate It | View Ratings

Rob Kall Social Media Pages: Facebook Page       Twitter page url on login Profile not filled in       Linkedin page url on login Profile not filled in       Instagram page url on login Profile not filled in

Rob Kall is an award winning journalist, inventor, software architect, connector and visionary. His work and his writing have been featured in the New York Times, the Wall Street Journal, CNN, ABC, the HuffingtonPost, Success, Discover and other media.

Check out his platform at RobKall.com

He is the author of The Bottom-up Revolution; Mastering the Emerging World of Connectivity

He's given talks and workshops to Fortune 500 execs and national medical and psychological organizations, and pioneered first-of-their-kind conferences in Positive Psychology, Brain Science and Story. He hosts some of the world's smartest, most interesting and powerful people on his Bottom Up Radio Show, and founded and publishes one of the top Google- ranked progressive news and opinion sites, OpEdNews.com

more detailed bio:

Rob Kall has spent his adult life as an awakener and empowerer-- first in the field of biofeedback, inventing products, developing software and a music recording label, MuPsych, within the company he founded in 1978-- Futurehealth, and founding, organizing and running 3 conferences: Winter Brain, on Neurofeedback and consciousness, Optimal Functioning and Positive Psychology (a pioneer in the field of Positive Psychology, first presenting workshops on it in 1985) and Storycon Summit Meeting on the Art Science and Application of Story-- each the first of their kind. Then, when he found the process of raising people's consciousness and empowering them to take more control of their lives one person at a time was too slow, he founded Opednews.com-- which has been the top search result on Google for the terms liberal news and progressive opinion for several years. Rob began his Bottom-up Radio show, broadcast on WNJC 1360 AM to Metro Philly, also available on iTunes, covering the transition of our culture, business and world from predominantly Top-down (hierarchical, centralized, authoritarian, patriarchal, big) to bottom-up (egalitarian, local, interdependent, grassroots, archetypal feminine and small.) Recent long-term projects include a book, Bottom-up-- The Connection Revolution, (more...)
 

Go To Commenting
The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
Follow Me on Twitter     Writers Guidelines

 
Contact AuthorContact Author Contact EditorContact Editor Author PageView Authors' Articles
Support OpEdNews

OpEdNews depends upon can't survive without your help.

If you value this article and the work of OpEdNews, please either Donate or Purchase a premium membership.

STAY IN THE KNOW
If you've enjoyed this, sign up for our daily or weekly newsletter to get lots of great progressive content.
Daily Weekly     OpEd News Newsletter
Name
Email
   (Opens new browser window)
 

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

A Conspiracy Conspiracy Theory

Debunking Hillary's Specious Winning the Popular Vote Claim

Terrifying Video: "I Don't Need a Warrant, Ma'am, Under Federal Law"

Ray McGovern Discusses Brutal Arrest at Secretary Clinton's Internet Freedom Speech

Hillary's Disingenuous Claim That She's Won 2.5 Million More Votes is Bogus. Here's why

Cindy Sheehan Bugged in Denver

To View Comments or Join the Conversation:

Tell A Friend