《The Coming Swarm》翻书笔记

作者:Molly Sauter
出版社:Bloomsbury Academic
副标题:DDOS Actions, Hacktivism, and Civil Disobedience on the Internet
发行时间:2014年10月23日
来源:下载的 pdf 版本
Goodreads:3.8(56 Ratings)
豆瓣:无

作者介绍

作者的 Twitter:https://twitter.com/oddletters
作者的个人网站:https://oddletters.com/

Molly Sauter is a Vanier Scholar and PhD candidate in Communication Studies at McGill University in Montreal, QC, researching the politics of disruption in networked communication technology. They are the author of The Coming Swarm: DDoS Actions, Hacktivism, and Civil Disobedience on the Internet. They hold a masters degree in Comparative Media Studies from MIT, and have held research fellowships at the Berkman-Klein Center for Internet and Society, and New America.

作者还是博士在读生,是 DDOS 研究方面的专家

读后感

本来是想读一本 DDOS 技术科普的,结果不小心拿到了这本相对比较高大上的书,其中大部分的内容都和公民不服从运动的思潮有直接的关联,从公民不服从的角度阐述 DDOS 的起源、价值以及意义

第一章的 Quote 里面有这么一句话,我比较喜欢:

I am a fan of the idea that in a democracy we should all be equally uncomfortable. I’ve come to amend that idea for my work. In ethnography we should probably all be equally reflective.
https://tressiemc.com/uncategorized/presenting-selves-race-social-class-gender-and-intersectionality-in-ethnography/

摘录

In physical space, activists demand an audience by occupying public, or quasi-public space. The Civil Rights Movement boycotted buses and occupied lunch counters to demand equality of access to these places. One of Molly’s key contributions in this book is the exploration of the idea that there is no public space on our contemporary internet, only complex, nested chains of private spaces. We might protest corporate malfeasance in the physical world by demonstrating on the public sidewalk outside the respective corporation’s headquarters. But there are no sidewalks in online spaces, and the online alternative of creating a protest website that no one will see is an insufficient remedy. Problematic as it is, occupying a corporation’s website is a way to ensure that dissent finds a relevant audience.

The aim of this work is to place DDoS actions, including Operation Payback, in a historical and theoretical context, covering the use of the tactic, its development over time, and its potential for ethical political practice. Guiding this work is the overarching question of how civil disobedience and disruptive activism can be practiced in the current online space. The internet acts as a vital arena of communication, self-expression, and interpersonal organizing. When there is a message to convey, words to get out, people to organize, many will turn to the internet as the zone of that activity. Online, people sign petitions, investigate stories and rumors, amplify links and videos, donate money, and show their support for causes in a variety of ways. But as familiar and widely accepted activist tools—petitions, fundraisers, mass letter writing, call-in campaigns and others—find equivalent practices in the online space, is there also room for the tactics of disruption and civil disobedience that are equally familiar from the realm of street marches, occupations, and sit-ins?

These negative associations and assumptions are further entrenched by the terminology commonly used to refer to DDoS actions of all stripes: DDoS attacks. By referring to all DDoS actions, regardless of motivation as “attacks,” the public, law enforcement, and even practitioners are primed to think of DDoS actions in terms of violence, malice, and damage. In order to conduct and present this analysis without this bias toward an interpretation of violence and harm, I do not use the term “DDoS attacks” throughout this book, but rather refer to all uses of DDoS as “DDoS actions.”

At its most basic level, a denial-of-service action seeks to render a server unusable to anyone looking to communicate with it for legitimate purposes. When this action comes from one source, it is called a DoS, action. When it comes from multiple sources, it is called a DDoS action. Complex or sophisticated tools are not necessary to launch a DDoS action. A group of people reloading the same website again and again at the same time could constitute a manual DDoS action, if they intend to bring that site down. However, automated tools and methods are much more effective against websites that rely on today’s web infrastructure.
One such automated method is to flood the target machine with “pings” from active machines. A ping is a request for availability, one computer asking another, “Are you there?”
However, when employed as part of a DDoS action, the humble ping is transformed into a “ping flood,” wherein thousands of ping requests a second can be transmitted to the target server. These requests quickly overwhelm the server’s limited resources, and the server is unable to effectively respond to legitimate traffic requests. This is one of the goals of the action: “downtime” on the targeted server.

DDoS actions are considered illegal in most jurisdictions. In the United States of America, DDoS actions are prosecuted under Title 18, Section 1030 (a)(5) of the US Code. The crime described by the statute is the “intentional . . . damage” of “protected computers,” which are broadly defined as computers used, in whole or in part, by financial institutions or the US government. However, as will be discussed later, confusion persists about the legal status of activist DDoS actions, something that presents serious challenges to the organizers of these actions.

Henry David Thoreau indirectly coined the term “civil disobedience” in a series of essays first published in 1849. These essays originally titled “Resistance to Civil Government” were eventually retitled “On Civil Disobedience.” Thoreau’s description of the duty of citizens to refuse to allow their government to override their conscience, interwoven with his own personal narrative of refusing to pay taxes and subsequently spending the night in jail, is one of the most influential texts in the modern understanding of the role and practice of civil disobedience in a Western democracy. Thoreau’s abolitionistmotivated tax dodge is hardly the earliest example of civil disobedience, however. Hannah Arendt, in her essay “Civil Disobedience,” cites Socrates and the events described in the Crito as a foundational episode.

Anonymous, a loose collection of internet denizens that sprang from the unmoderated image board 4chan, has, over the past few years, rapidly increased their capacity to attract and manipulate mainstream media attention.

©著作权归作者所有,转载或内容合作请联系作者
  • 序言:七十年代末,一起剥皮案震惊了整个滨河市,随后出现的几起案子,更是在滨河造成了极大的恐慌,老刑警刘岩,带你破解...
    沈念sama阅读 159,015评论 4 362
  • 序言:滨河连续发生了三起死亡事件,死亡现场离奇诡异,居然都是意外死亡,警方通过查阅死者的电脑和手机,发现死者居然都...
    沈念sama阅读 67,262评论 1 292
  • 文/潘晓璐 我一进店门,熙熙楼的掌柜王于贵愁眉苦脸地迎上来,“玉大人,你说我怎么就摊上这事。” “怎么了?”我有些...
    开封第一讲书人阅读 108,727评论 0 243
  • 文/不坏的土叔 我叫张陵,是天一观的道长。 经常有香客问我,道长,这世上最难降的妖魔是什么? 我笑而不...
    开封第一讲书人阅读 43,986评论 0 205
  • 正文 为了忘掉前任,我火速办了婚礼,结果婚礼上,老公的妹妹穿的比我还像新娘。我一直安慰自己,他们只是感情好,可当我...
    茶点故事阅读 52,363评论 3 287
  • 文/花漫 我一把揭开白布。 她就那样静静地躺着,像睡着了一般。 火红的嫁衣衬着肌肤如雪。 梳的纹丝不乱的头发上,一...
    开封第一讲书人阅读 40,610评论 1 219
  • 那天,我揣着相机与录音,去河边找鬼。 笑死,一个胖子当着我的面吹牛,可吹牛的内容都是我干的。 我是一名探鬼主播,决...
    沈念sama阅读 31,871评论 2 312
  • 文/苍兰香墨 我猛地睁开眼,长吁一口气:“原来是场噩梦啊……” “哼!你这毒妇竟也来了?” 一声冷哼从身侧响起,我...
    开封第一讲书人阅读 30,582评论 0 198
  • 序言:老挝万荣一对情侣失踪,失踪者是张志新(化名)和其女友刘颖,没想到半个月后,有当地人在树林里发现了一具尸体,经...
    沈念sama阅读 34,297评论 1 242
  • 正文 独居荒郊野岭守林人离奇死亡,尸身上长有42处带血的脓包…… 初始之章·张勋 以下内容为张勋视角 年9月15日...
    茶点故事阅读 30,551评论 2 246
  • 正文 我和宋清朗相恋三年,在试婚纱的时候发现自己被绿了。 大学时的朋友给我发了我未婚夫和他白月光在一起吃饭的照片。...
    茶点故事阅读 32,053评论 1 260
  • 序言:一个原本活蹦乱跳的男人离奇死亡,死状恐怖,灵堂内的尸体忽然破棺而出,到底是诈尸还是另有隐情,我是刑警宁泽,带...
    沈念sama阅读 28,385评论 2 253
  • 正文 年R本政府宣布,位于F岛的核电站,受9级特大地震影响,放射性物质发生泄漏。R本人自食恶果不足惜,却给世界环境...
    茶点故事阅读 33,035评论 3 236
  • 文/蒙蒙 一、第九天 我趴在偏房一处隐蔽的房顶上张望。 院中可真热闹,春花似锦、人声如沸。这庄子的主人今日做“春日...
    开封第一讲书人阅读 26,079评论 0 8
  • 文/苍兰香墨 我抬头看了看天上的太阳。三九已至,却和暖如春,着一层夹袄步出监牢的瞬间,已是汗流浃背。 一阵脚步声响...
    开封第一讲书人阅读 26,841评论 0 195
  • 我被黑心中介骗来泰国打工, 没想到刚下飞机就差点儿被人妖公主榨干…… 1. 我叫王不留,地道东北人。 一个月前我还...
    沈念sama阅读 35,648评论 2 274
  • 正文 我出身青楼,却偏偏与公主长得像,于是被迫代替她去往敌国和亲。 传闻我的和亲对象是个残疾皇子,可洞房花烛夜当晚...
    茶点故事阅读 35,550评论 2 270

推荐阅读更多精彩内容