• Complain

Enid Gabriella Coleman - Hacker, Hoaxer, Whistleblower, Spy: The Many Faces Of Anonymous

Here you can read online Enid Gabriella Coleman - Hacker, Hoaxer, Whistleblower, Spy: The Many Faces Of Anonymous full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2015, publisher: Verso books, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Enid Gabriella Coleman Hacker, Hoaxer, Whistleblower, Spy: The Many Faces Of Anonymous
  • Book:
    Hacker, Hoaxer, Whistleblower, Spy: The Many Faces Of Anonymous
  • Author:
  • Publisher:
    Verso books
  • Genre:
  • Year:
    2015
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Hacker, Hoaxer, Whistleblower, Spy: The Many Faces Of Anonymous: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Hacker, Hoaxer, Whistleblower, Spy: The Many Faces Of Anonymous" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Du site de ld.: Gabriella Colemans Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous (Verso, 2014) is a powerful ethnography of the making and remaking of networked computational infrastructures and their animating publics and politics. Taking a multi-method anthropological approach to understanding the unruly online collective known as Anonymous, Coleman creatively continues Diana Forsythes legacy of getting underneath the cultural logics motivating projects of computational representation and culture. In her unique ethnographic exploration, she tracks affiliated participants across virtual and physical spaces, providing a rich and highly intricate understanding of the labyrinthine worlds that her hacker-activist subjects occupy. Writing on a much-criticized and often misunderstood technosocial movement lacking a fixed or overarching structure, Colemans original book deftly navigates the complexities, ambiguities, and controversies of digital forms of activism. At once intellectually rigorous, impressively thorough, and captivatingly readable, Hacker, Hoaxer, Whistleblower, Spy speaks to a wide audience with sophistication and nuance, offering highly generative analysis and eliciting multiple readings that bring us closer to (if never overcoming) the contradictions and uncertainties of her subject matter. Where Anonymous have often been demonized or dismissed in popular media, Coleman refuses the gross fetish of stereotypes so often mobilized in its characterization, instead astutely reading Anonymous as a new and important kind of political collective exposing and acting against the security state and its attacks on fundamental freedoms. Throughout the book, Coleman shifts reflexively between numerous roles: an anthropologist studying sometimes-illegal activity; a participant-observer in an online world; a go-between and translator of sorts between the collective and the public. In the process, she offers a timely and immensely relevant contribution to critical contemporary scholarship and public debates on technology, digital worlds, social movements, and incipient forms of politics. Expertly probing the social, ethical, and political spheres of democracy and voice in our contemporary world, Colemans generous approach opens space to consider the new possibilities for politics, direct action, solidarity, and organizing that are too easily erased or distorted. Enchantment, in her account-that of Anonymous, and her own-presents as an ethical and political possibility, a means of sustaining or cultivating hope, a form that works to propel disruption and change. For opening new channels of thought into our technological present and characterizing new forms of politics in-the-making, this brave scholar and her vivid book deserve our highest prize. Read more...
Abstract: Du site de ld.: Gabriella Colemans Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous (Verso, 2014) is a powerful ethnography of the making and remaking of networked computational infrastructures and their animating publics and politics. Taking a multi-method anthropological approach to understanding the unruly online collective known as Anonymous, Coleman creatively continues Diana Forsythes legacy of getting underneath the cultural logics motivating projects of computational representation and culture. In her unique ethnographic exploration, she tracks affiliated participants across virtual and physical spaces, providing a rich and highly intricate understanding of the labyrinthine worlds that her hacker-activist subjects occupy. Writing on a much-criticized and often misunderstood technosocial movement lacking a fixed or overarching structure, Colemans original book deftly navigates the complexities, ambiguities, and controversies of digital forms of activism. At once intellectually rigorous, impressively thorough, and captivatingly readable, Hacker, Hoaxer, Whistleblower, Spy speaks to a wide audience with sophistication and nuance, offering highly generative analysis and eliciting multiple readings that bring us closer to (if never overcoming) the contradictions and uncertainties of her subject matter. Where Anonymous have often been demonized or dismissed in popular media, Coleman refuses the gross fetish of stereotypes so often mobilized in its characterization, instead astutely reading Anonymous as a new and important kind of political collective exposing and acting against the security state and its attacks on fundamental freedoms. Throughout the book, Coleman shifts reflexively between numerous roles: an anthropologist studying sometimes-illegal activity; a participant-observer in an online world; a go-between and translator of sorts between the collective and the public. In the process, she offers a timely and immensely relevant contribution to critical contemporary scholarship and public debates on technology, digital worlds, social movements, and incipient forms of politics. Expertly probing the social, ethical, and political spheres of democracy and voice in our contemporary world, Colemans generous approach opens space to consider the new possibilities for politics, direct action, solidarity, and organizing that are too easily erased or distorted. Enchantment, in her account-that of Anonymous, and her own-presents as an ethical and political possibility, a means of sustaining or cultivating hope, a form that works to propel disruption and change. For opening new channels of thought into our technological present and characterizing new forms of politics in-the-making, this brave scholar and her vivid book deserve our highest prize

Enid Gabriella Coleman: author's other books


Who wrote Hacker, Hoaxer, Whistleblower, Spy: The Many Faces Of Anonymous? Find out the surname, the name of the author of the book and a list of all author's works by series.

Hacker, Hoaxer, Whistleblower, Spy: The Many Faces Of Anonymous — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Hacker, Hoaxer, Whistleblower, Spy: The Many Faces Of Anonymous" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Hacker, Hoaxer, Whistleblower, Spy
The Many Faces Of Anonymous
by
Enid Gabriella Coleman
2014
All Your Books Are Belong To Us httpc3jemx2ube5v5zpgonion Hacker - photo 1
All Your Books Are Belong To Us !
http://c3jemx2ube5v5zpg.onion
Hacker, Hoaxer, Whistleblower, Spy
The Many Faces Of Anonymous
Copyright 2014 Enid Gabriella Coleman
The partial or total reproduction of this publication, in electronic form or otherwise, is consented to for noncommercial purposes, provided that the original copyright notice and this notice are included and the publisher and the source are clearly acknowledged. Any reproduction or use of all or a portion of this publication in exchange for financial consideration of any kind is prohibited without permission in writing from the publisher.
First published by Verso 2014
ISBN-13: 978-1-78168-583-9
eISBN-13: 978-1-78168-584-6 (US)
eISBN-13: 978-1-78168-689-8 (UK)

Here is the ultimate book on the worldwide movement of hackers, pranksters, and activists that operates under the non-name Anonymous, by the writer the Huffington Post says knows all of Anonymous deepest, darkest secrets.
Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption (before Anonymous shot to fame as a key player in the battles over WikiLeaks, the Arab Spring, and Occupy Wall Street). She ended up becoming so closely connected to Anonymous that the tricky story of her inside-outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book.
The narrative brims with details unearthed from within a notoriously mysterious subculture, whose semi-legendary tricksters such as Topiary, tflow, Anachaos, and Sabu emerge as complex, diverse, politically and culturally sophisticated people. Propelled by years of chats and encounters with a multitude of hackers, including imprisoned activist Jeremy Hammond and the double agent who helped put him away, Hector Monsegur, Hacker, Hoaxer, Whistleblower, Spy is filled with insights into the meaning of digital activism and little understood facets of culture in the Internet age, including the history of trolling, the ethics and metaphysics of hacking, and the origins and manifold meanings of the lulz.
Contents
[]
Dear Fox New, YouTube video, posted by dearfoxnews, July 29, 2007, last accessed July 8, 2014, available at http://www.youtube.com/watch?v=RFjU8bZR19A.
[]
This quote comes from a class lecture.
[]
Message to Scientology, YouTube video, posted by Church0f Scientology, Jan. 21, 2008, last accessed July 4, 2014, available at http://www.youtube.com/watch?v=JCbKv9yiLiQ.
[]
Siobhan Gorman, Power Outage Seen as a Potential Aim of Hacking Group, online.wsj.com, Feb. 21, 2012.
[]
Sam Biddle, No, Idiots, Anonymous Isnt Going to Destroy the Power Grid, gizmodo.com, Feb. 21, 2012.
[]
Danielle Keats Citron, Hate 3.0: The Rise of Discriminatory Online Harassment and How to Stop It (Cambridge, MA: Harvard University Press, forthcoming); Danielle Keats Citron, Cyber Civil Rights, Boston University Law Review, vol. 91 (2009).
[]
For a detailed critique of the CFAA and recommendations for reform see http://www.eff.org/issues/cfaa.
[]
Tom McCarthy, Andrew Auernheimers Conviction over Computer Fraud Thrown Out, theguardian.com, April 1, 2014.
[]
Joseph Carey, Twitter post, July 22, 2013, 10:22 am, http://twitter.com/JDCareyMusic/status/359362756568285184.
[]
weev, I am weev. I may be going to prison under the Computer Fraud and Abuse Act tomorrow at my sentencing. AMA., reddit, March 17, 2013, last accessed May 21, 2014, available at http://www.reddit.com/r/IAmA/comments/1ahkgc/i_am_weev_i_may_be_going_to_prison_under_the/c8xgqq9.
[]
Daniel Bates, Standing by Her Man: Strauss-Kahns Wife Puts Her Mansion Up as Collateral to Get Him out of Jail and Shes Paying the Rent at His Golden Cage, dailymail.co.uk, May 21, 2011.
[]
Lulz, Encyclopedia Dramatica, last accessed May 23, 2012, available at http://encyclopediadramatica.es/Lulz
[]
For early references to lulz on Jameths LiveJournal site, see http://web.archive.org/web/20021102004836/http://www.livejournal.com/users/jameth (last accessed May 22, 2014).
[]
Whitney Phillips, LOLing at Tragedy: Facebook Trolls, Memorial Pages and Resistance to Grief Online, First Monday vol. 16, no. 12 (2011).
[]
Many of these insights are delectably explored in Lewis Hydes majestic account Trickster Makes This World: Mischief, Myth, and Art (New York: Farrar, Straus and Giroux, 1998).
[]
Ibid., p. 9
[]
Alex Galloway and Eugene Thacker, The Exploit: A Theory of Networks (Minneapolis, MN: University of Minnesota Press, 2007).
[]
Phil Lapsley, Exploding the Phone: The Untold Story of the Teenagers and Outlaws Who Hacked Ma Bell (New York: Grove Press, 2013), 226.
[]
Steven Levy, Hackers: Heroes of the Computer Revolution 25th Anniversary Edition (Sebastapol, CA: OReilly Media, 2010).
[]
Adam L. Penenberg, A Private Little Cyberwar, forbes.com, Feb. 21, 2000.
[]
Biography of u4ea, soldierx.com, last accessed May 21, 2014, available at https://www.soldierx.com/hdb/u4ea.
[]
Marco Deseriis, Lots of Money Because I Am Many: The Luther Blissett Project and the Multiple-Use Name Strategy, in Cultural Activism: Practices, Dilemmas and Possibilities (Amsterdam: Rodopi, 2011), 6593.
[]
Trond Lossius, /55\[Fwd: [max-msp] its over], /55\ mailing list, Jan. 15, 2001, last accessed May 21, 2014, available at http://www.bek.no/pipermail/55/2001-January/000102.html. A good example of Nezvanovas art can be found at http://www.nettime.org/Lists-Archives/nettime-bold-0009/msg00073.html (last accessed May 21, 2014).
[]
Lee Knuttila, Users Unknown: 4chan, Anonymity and Contingency, First Monday, vol. 16, no. 10 (Oct. 2011).
[]
Internet Hate Machine was a phrase used by a local Fox News program in Los Angeles in 2007 to describe Anonymous. The group promptly turned the phrase into a popular meme.
[]
Phillips, LOLing at Tragedy.
[]
David Graeber, Manners, Deference, and Private Property in Early Modern Europe, Comparative Studies in Society and History, vol. 39 (October 1997): 694728.
[]
Christopher Kelty, Two Bits: The Cultural Significance of Free Software (Durham, NC: Duke University Press, 2008).
[]
Anonymous, The Story Behind the Tom Cruise Video Link, Why We Protest, July 27, 2013, last accessed May 23, 2014, available at http://whyweprotest.net/community/threads/the-story-behind-the-tom-cruise-video-leak.93170/page-4.
[]
The Cruise Indoctrination Video Scientology Tried to Suppress, gawker.com, January 15, 2008, last accessed July 11, 2014.
[]
L. Ron Hubbard, Scientology Technology, The Auditor, no. 41 (1968).
[]
XENU TV, The Story Behind the Tom Cruise Video Link, Why We Protest, Sept. 7, 2011, last accessed May 23, 2014, available at http://whyweprotest.net/community/threads/the-story-behind-the-tom-cruise-video-leak.93170/page-3#post-1875660.
[]
Code of Conduct, YouTube video, posted by ChurchOfScientology, Feb. 1, 2008, last accessed May 23, 2014, available at http://www.youtube.com/watch?v=-063clxiB8I.
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Hacker, Hoaxer, Whistleblower, Spy: The Many Faces Of Anonymous»

Look at similar books to Hacker, Hoaxer, Whistleblower, Spy: The Many Faces Of Anonymous. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Hacker, Hoaxer, Whistleblower, Spy: The Many Faces Of Anonymous»

Discussion, reviews of the book Hacker, Hoaxer, Whistleblower, Spy: The Many Faces Of Anonymous and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.