Tags Archives: Cyber

Jacques Ellul: A Prophet for Our Tech-Saturated Times

     by Andrew Nikiforuk / Local Futures By now you have probably read about the so-called “tech backlash.” Facebook and other social media have undermined what’s left of the illusion of democracy, while smartphones damage young brains and erode the nature of discourse in the family. Meanwhile computers and other gadgets have diminished our attention … Continue reading Jacques Ellul: A Prophet for Our Tech-Saturated Times

Activist Guide to Security: Defeating Geolocation and Tracking

     by Max Wilbert / Deep Green Resistance We live in a surveillance state. As the Edward Snowden leaks and subsequent reporting has shown, government and private military corporations regularly target political dissidents for intelligence gathering. This information is used to undermine social movements, foment internecine conflict, discover weaknesses, and to get individuals thrown in jail … Continue reading Activist Guide to Security: Defeating Geolocation and Tracking

Guide to Private and Secure Operating Systems

     by Max Wilbert / Deep Green Resistance We live inside an unprecedented surveillance state. Government and corporations monitor all non-encrypted digital communications for the purposes of political control and profit. Political dissidents who wish to challenge capitalism need to learn to use more secure methods for communication, research, and other digital tasks. This … Continue reading Guide to Private and Secure Operating Systems

Technology and Its Discontents

Featured image: JD Lasica, Flickr, c.c. 2.0      by Steven Gorelick / Local Futures Tucked within the pages of the January issue of the Agriview, a monthly farm publication published by the State of Vermont, was a short survey from the Department of Public Service (DPS). Described as an aid to the Department in drafting … Continue reading Technology and Its Discontents

Bitcoin = Death Processors

     by Darin Stevenson / Medium bitcoin Is Makeworky Unmoney bitcoin is not exactly money. It’s a potentially valuable abstraction of computational ‘work’ that ‘earns’ bitcoin value. But what is bitcoin value and what is the nature of the work? The answers are bizarre because they are nonsensical. bitcoin value is an abstraction of participation in … Continue reading Bitcoin = Death Processors

Underground Action Calendar refreshed

Our Underground Action Calendar lists attacks from as far back as the 1970s, to inspire and serve as a research tool. We include a variety of actions from around the world, some carried out by individuals, some by organized militant groups. Targets range from local earth-destroying construction equipment to networks of oil wells and pipelines. … Continue reading Underground Action Calendar refreshed

Vulnerability of infrastructure to cyber attacks

In November, Admiral Michael Rogers spoke to the House Select Intelligence Committee on Cybersecurity. Rogers, the National Security Agency (NSA) Director & U.S. Cyber Command Commander, spoke on the vulnerability of U.S. infrastructure to cyberattacks due to the proliferation of network technologies which are relied upon for that infrastructure’s functioning. Sectors of the economy vulnerable … Continue reading Vulnerability of infrastructure to cyber attacks

Immigrant X Data Entry

A group called ‘Immigrant X’ infiltrated and sabotaged an immigration database, falsifying information about hundreds of undocumented immigrants:   IMMIGRANT X DATA ENTRY Original post by ImmigrantX on Friday, August 9, 2013, Immigrant In the last month we managed to get a way into the hotlines of the immigration department where the public can inform on an … Continue reading Immigrant X Data Entry

Time is Short: Cyber-sabotage in Saudi Arabia

Civilization is not a static force. It has metastasized across the world by accelerating its own development, by transforming the blood and corpses of its victims into new weapons with which to wage its relentless war against all life Grasslands become grain monocultures feeding armies, conquering forests and mountains that become ships and swords that … Continue reading Time is Short: Cyber-sabotage in Saudi Arabia

US and UK exporting surveillance technologies to nations with “poor human rights records”

By Jamie Doward / The Observer Britain is exporting surveillance technology to countries run by repressive regimes, sparking fears it is being used to track political dissidents and activists. The UK’s enthusiastic role in the burgeoning but unregulated surveillance market is becoming an urgent concern for human rights groups, who want the government to ensure … Continue reading US and UK exporting surveillance technologies to nations with “poor human rights records”