thanks DAnte,<br><br>Michel<br><br><div class="gmail_quote">---------- Forwarded message ----------<br>From: <b class="gmail_sendername">Dante-Gabryell Monson</b> <span dir="ltr"><<a href="mailto:dante.monson@gmail.com">dante.monson@gmail.com</a>></span><br>
Date: Thu, Feb 17, 2011 at 10:43 PM<br>Subject: Fwd: <nettime> Anonymous Surpasses Wikileaks<br>To: Michel Bauwens <<a href="mailto:michelsub2004@gmail.com">michelsub2004@gmail.com</a>><br><br><br><br><br><div class="gmail_quote">
---------- Forwarded message ----------<br>From: <b class="gmail_sendername">John Young</b> <span dir="ltr"><<a href="mailto:jya@pipeline.com" target="_blank">jya@pipeline.com</a>></span><br>Date: Thu, Feb 17, 2011 at 3:13 AM<br>
Subject: <nettime> Anonymous Surpasses Wikileaks<br>To: <a href="mailto:nettime-l@kein.org" target="_blank">nettime-l@kein.org</a><br><br><br>The exploits of Anonymous to hack the systems of firms<br>
providing spying services to governments and corporations<br>
suggest that the WikiLeaks mini-era has been surpassed.<br>
<br>
Much of WikiLeaks promise to protect sources is useless<br>
if the sources are not whistleblowers needing a forum for<br>
publication. Instead publishers of secret information grab it<br>
directly for posting to Torrent for anybody to access<br>
without mediation and mark-up by self-esteemed peddlers<br>
of protection, interpretationa and authentication, including<br>
media cum scholars.<br>
<br>
Arstechnica descriptions of the how the Anonymous hack<br>
are the best reading of Internet derring-do yet and far exceeds<br>
the much simpler version of WikiLeaks carefully bruited<br>
as if precious but is not according to Daniel Domscheit-Berg's<br>
revelations.<br>
<br>
AnonLeaks.ru is a remarkable advance of WikiLeaks. And<br>
promises much more by the same means and methods most<br>
associated with official spies -- NSA and CIA run the Special<br>
Collections Service to do exactly that kind of criminal<br>
aggression, along with black bag burglaries, surveillance<br>
and bugging. Contractors hiring ex-spies do much of this<br>
highly classified work as well and invent and supply the<br>
gadgets and front organizations required.<br>
<br>
Not least of importance of the Anonymous hack and the many<br>
preceding it is the revelation of how commercial firms have<br>
been exploiting public ignorance of their spying capacity.<br>
That they are themselves vulnerable is a surprise to them,<br>
as it must �be to those who hire them and, in the case of<br>
governments, provide legal cover for criminal actions.<br>
<br>
This is not news, to be sure, for it has been alleged and<br>
reported on for decades but mostly in technical journals<br>
and conferences where offerers strut their malwares to<br>
buyers of perfidium.<br>
<br>
Imagine that instead of the many iterations of Wikileaks<br>
now appearing to receive and publish documents, that<br>
more of the Anonymous-type hacks simply steal the family<br>
jewels of the spies, officials, lobbyists and corporations<br>
believing they own the territory in order to show the<br>
extent of their secret predations on the public.<br>
<br>
The digitization of vast archives of government, commercial<br>
and non-governmental organizations to facilitate their<br>
hegemony provides a bounty to be hacked repeatedly<br>
despite attempts to prevent it by vainly inept cybersecurity<br>
agencies and firms.<br>
<br>
The cyber officials yell, hit the Internet Switch. Too late, too<br>
late. Anonymous controls the switch. �Sure, Anonymous<br>
can be compromised with sufficient hostile and friendly<br>
inducements, but so can the predators, perhaps moreso<br>
the latter.<br>
<br>
I like that venerable Anonymous and the promise it offers<br>
as the Nymous authoritatives of secrecy frantically attempt<br>
to ban its privilege.<br>
<br>
For the WL era dutifully enshrine Julian Assange and Bradley<br>
Manning, give them Medals of Freedom as icons of what led<br>
to the rise of Unnamables worldwide.<br>
<br>
I commend Ketih for that unbreakable domain name.<br>
<br>
<br>
# �distributed via <nettime>: no commercial use without permission<br>
# �<nettime> �is a moderated mailing list for net criticism,<br>
# �collaborative text filtering and cultural politics of the nets<br>
# �more info: <a href="http://mail.kein.org/mailman/listinfo/nettime-l" target="_blank">http://mail.kein.org/mailman/listinfo/nettime-l</a><br>
# �archive: <a href="http://www.nettime.org" target="_blank">http://www.nettime.org</a> contact: <a href="mailto:nettime@kein.org" target="_blank">nettime@kein.org</a><br>
</div><br>
</div><br><br clear="all"><br>-- <br>P2P Foundation: <a href="http://p2pfoundation.net" target="_blank">http://p2pfoundation.net</a>� - <a href="http://blog.p2pfoundation.net" target="_blank">http://blog.p2pfoundation.net</a> <br>
<br>Connect: <a href="http://p2pfoundation.ning.com" target="_blank">http://p2pfoundation.ning.com</a>; Discuss: <a href="http://lists.ourproject.org/cgi-bin/mailman/listinfo/p2p-foundation" target="_blank">http://lists.ourproject.org/cgi-bin/mailman/listinfo/p2p-foundation</a><br>
<br>Updates: <a href="http://del.icio.us/mbauwens" target="_blank">http://del.icio.us/mbauwens</a>; <a href="http://friendfeed.com/mbauwens" target="_blank">http://friendfeed.com/mbauwens</a>; <a href="http://twitter.com/mbauwens" target="_blank">http://twitter.com/mbauwens</a>; <a href="http://www.facebook.com/mbauwens" target="_blank">http://www.facebook.com/mbauwens</a><br>
<br>Commons Strategies Group, <a href="http://www.commonsstrategies.org/" target="_blank">http://www.commonsstrategies.org/</a><br><br><br><br><br><br><br>