Tumblelog by Soup.io
Newer posts are loading.
You are at the newest post.
Click here to check if anything new just came in.

August 09 2012

14:00

Reuters, Gizmodo Hacks Are Cautionary Tales for News Orgs

The Syrian civil war is also a propaganda war. With the Assad regime and the rebels both attempting to assure their supporters and the world that they are on the brink of victory, how the facts are reported has become central to the struggle. Hackers working in support of Assad loyalists this week decided to take a shortcut, attacking the Reuters news agency's blogging platform and one of its Twitter accounts, and planting false stories about the vanquishing of rebel leaders and wavering support for them from abroad.

The stories and tweets were unconvincing, and none spread much further than their home sites. The majority of readers disseminating the repurposed Twitter stream appeared to be Assad partisans, either keen to spread the misconceptions or to believe them themselves.

The attacks demonstrate, however, how media institutions are at risk of targeted attacks by state-supported electronic activists -- and that hackers will attempt to leverage the outlying parts of a large organization to take wider control, or at least the appearance of wider control.

Neither Reuters' blogging site nor its minor Twitter accounts feed the company's authoritative wire service, but as a consequence they may not have the same levels of heavy protection against misuse. A weak password used by a single person could have granted an outsider the power to post publicly to either service.

Even individual journalists are at risk

Even when a hacker's target is an individual journalist and not his or her media organization, things can escalate to affect the institutions journalists work for. When the tech reporting site Gizmodo's Twitter account was taken over on Friday, it was through an attack on one of its former reporters, Mat Honan. Gizmodo's reporting has made it unpopular in some quarters, but Honan says that he was the target, and that Gizmodo was "collateral damage." His Twitter account was linked to Gizmodo's corporate account, and the attackers used one to post to the other.

Thumbnail image for mathonan.png

Honan's story should give anyone pause about their own digital safety, especially if they rely on external companies. His Twitter account was taken over by a hacker who persuaded a tech support line operator to reset the password to his Apple account. The attacker used this account to change his linked Gmail and Twitter account information, and then proceeded to use the "remote wipe" feature on the latest Apple iPhone and laptops to disable and delete the content of his phone, iPad and Macbook. As a
freelancer, Honan did not have offline backup of his work. (Honan says he is waiting for a response from Apple the company; meanwhile, Apple tech support is helping with damage control.)

Honan has corresponded with an individual who claims to be his hacker, and says that the real intent of the compromise was his three-letter Twitter account. Whether it's by common cybercriminals or state-supported propagandists, journalists are being targeted as individuals. The organizations that employ them need to invest resources and training to improve their cyber-security; not least because when one person's security is compromised, everyone who relies on that person is also under threat.

Danny O'Brien is the Internet advocacy coordinator for the Committee to Protect Journalists. O'Brien has been at the forefront of the fight for digital rights worldwide, serving as an activist for the Electronic Frontier Foundation. He was an original staff member for Wired UK magazine and co-founded the Open Rights Group, a British digital rights organization. He's also worked as a journalist covering technology and culture for the New Scientist, The Sunday Times of London, and The Irish Times. Follow on Twitter: @danny_at_cpj

cpj-logo-name.jpgA version of this post originally appeared on CPJ's Internet Channel. The Committee to Protect Journalists is a New York-based, independent, non-profit organization that works to safeguard press freedom worldwide. You can learn more at CPJ.org or follow the CPJ on Twitter @pressfreedom or on Facebook here.

This is a summary. Visit our site for the full post ».

December 18 2010

01:07

Asking for help~~ please~~~~~ about email hack

I want to know the password of an email~ it is @126.com , but I cannot find anyone around who can help me , and those things download from the internet are all useless, so I am here , hoping if anyone can give me a little help, I will be really grateful, just spend a little time ,please~ thanks a lot, truethfully.

December 09 2010

15:30

From Indymedia to Wikileaks: What a decade of hacking journalistic culture says about the future of news

The first time I ever heard the words “mirror website,” I was sitting at a debris-strewn desk, hunched over a desktop computer, on the second floor of a nondescript office building on East 29th in Manhattan. I’d recently started volunteering with the New York City Independent Media Center, an organization that would turn out to be one of the first “citizen journalism” organizations in the United States — though certainly no one would have called it that at the time. The IMC was in its third day of participant-powered coverage of protest actions taken against World Economic Forum (WEF) meetings in New York. It was less than five months after September 11; the city was cold and bleak, and people were tense. Really tense. And our website, NYC Indymedia, had slowed to a crawl.

“It’s going to crash,” I muttered.

“Don’t worry,” I was told. “We’ve got it mirrored on a bunch of backup servers. The updates from people using the Open Newswire won’t show up right away, but they will show up, and people will still be able to read the site.”

I wish I could say that the Indymedia site was crashing because we were — like Julian Assange — the targets of powerful governmental forces, but I suspect the website slowness had more to do with unexpected server load and a tenuous back-end infrastructure than with any sort of global conspiracy. Nevertheless, I breathed a sigh of relief. It was all going to be okay. Somewhere, a person who knew all about such complicated things like “mirrors” and “servers” was taking care of it.

I raise this old story from the prehistoric days of online citizen journalism because, when I read tweets like “the first serious infowar is now engaged, and the field of battle is WikiLeaks,” I think it’s worth taking a step back and trying to put recent developments in perspective. The battle over Wikileaks, and the journalistic questions that it raises, are genuinely new developments — but they’re new developments grounded in a few long term trends and a history stretching back nearly two decades. The impact of WikiLeaks on journalism is more an impact of degree than of kind; what’s happening isn’t entirely new, but it is happening on a greater scale than ever before.

I want to talk about two general trends I see shaping journalism, trends that are highlighted in developments at the leading edge of “journalistic hacktivism” over the past decade.

The Internet-powered introduction of new “objects” into the journalistic bloodstream

Collapsing business models aside, the primary change shaping journalism over the past ten years has been the introduction of strange new “digital news objects” into the traditional journalistic work flow. In the days of the coverage of the World Economic Forum by Indymedia, these new objects were first-hand citizen accounts, on-the-scene photos, and other forms of primitive “citizen journalism,” uploaded in real time to websites. Since 2002, we’ve seen these forms of first-hand eyewitness slowly be embraced by mainstream news organizations, from CNN’s iReport to The New York Times’ Moment in Time crowdsourced photo series.

Now we see news organizations struggle to integrate massive amounts of semi-structured data into their traditional workflow — some (though certainly not all) of it coming from non-traditional informational actors like WikiLeaks. Drawing on the pioneering work of media theorist Lev Manovich, Columbia professor Todd Gitlin has recently argued that

…the definitive informational metaphor of our epoch is the database. The database is not just a metaphor, in fact — it’s a certification of what knowledge looks like and how it is to be gained. A metaphor is a carrier, a condensation of meaning. A database is a heap.

While I don’t entirely agree with Gitlin about the political meaning of WikiLeaks (disclosure: Gitlin was my dissertation advisor), I do agree that the challenge traditional journalists now face is how to “come to terms” with the presence of these strange new objects. What journalistic status should we accord databases, and how should we manage them inside conventional news routines? Much like the first citizen photos from the scene of protests and natural disasters required journalists to rethink what counted as journalistic evidence, WikiLeaks’ slow-but-steady release of 250,000 diplomatic cables is prompting journalists to ask similar questions about what they do. The difference between citizen photos and databases is a difference in scale, and extreme differences in scale eventually become differences in kind.

So the presence of these strange new extra-journalistic news objects isn’t all that new. New “quasi-sources” have been hacking journalistic workflow for years. What’s new is the scale of the evidence that’s now bombarding journalism. The question of how to manage reader-submitted photos is a qualitatively different question than the dilemma of how to manage hundreds of thousands of leaked cables being provided by an information-transparency organization whose ultimate motives and values are unclear. Think of the State Department cables as a massive pile of crowdsourced evidence — only in this case the “crowd” is the U.S. diplomatic corps, and the first work of document collection and analysis has been done by an outside organization.

The long rise of the news geeks

In the case of both Indymedia and WikiLeaks, developments which have had a serious impact on the newsroom have been powered by what I like to call the “leading politicized edge” of the online geek community. It’s not surprising that, as leading hacker anthropologist Gabriella Coleman has noted:

Politically minded geeks bred during the era of cheaper PC’s, home-schooled programming, and virtual interactions chose to use Free Software for the implementation of the early proliferation of Indymedia centers. Mailing lists and Internet Relay Chat (IRC) — both widely available in free software versions at the time — were the main communication tools that facilitated conversation between dispersed tech-activists first establishing centers in different locations like Washington DC, Boston, London, and Seattle.

Ten years later, the story is largely the same. Today, working journalists are confronted by ideologies of “information liberation” and terms like “distributed denial of service attacks” (DDOS) and “website mirrors.” While these ideas and innovations have not been created within journalism, they impact the flow of information, and thus impact journalism itself. A few days ago I wrote that Wikileaks was “organized informational anarchism with journalistic consequences.” This new world of geek-powered information innovation requires an appropriate level of response from our centers of journalistic education and from our newsrooms

The occasional news-oriented hacker aside, it’s important for journalists to keep in mind that, despite some surface similarities, all denizens of hacker culture are not the same. Anonymous is not Wikileaks. Indeed, both Anonymous and hacker organizations are quick to point out that Anonymous and distributed denial of service attacks are not “hacking” at all. My tech-savvy friends who first taught me about website mirrors in 2002 were rather unique in the open source world; not everyone in that world cared much about either journalism or the World Economic Forum.

While it might be heartening to swell the ranks of journalism by drawing all advocates of digital transparency into our ranks, journalists need to ponder what aspects of these powerful online communities they want to embrace and what aspects they might want to leave behind. But they can only do that if they think historically about the path online journalism has taken over the past decade, and if they understand the way that today’s hackers and technologists are shaping our information flows.

(Many thanks to Gabriella Coleman for her comments on an earlier draft of this post.)

October 16 2010

13:39

ScraperWiki: Hacks and Hackers day, Manchester.

If you’re not familiar with scraperwiki it’s ”all the tools you need for Screen Scraping, Data Mining & visualisation”.

These guys are working really hard at convincing Journos that data is their friend by staging a steady stream of events bringing together journos and programmers together to see what happens.

So I landed at NWVM’s offices to what seems like a mountain of laptops, fried food, coke and biscuits to be one of the judges of their latest hacks and hackers day in Manchester (#hhhmcr). I was expecting some interesting stuff. I wasn’t dissapointed.

The winners

We had to pick three prizes from the six of so projects started that day and here’s what we (Tom Dobson, Julian Tait and me)  ended up with.

The three winners, in reverse order:

Quarternote: A website that would ‘scrape’ myspace for band information. The idea was that you could put a location and style of music in to the system and it would compile a line-up of bands.

A great idea (although more hacker than hack) and if I was a dragon I would consider investing. These guys also won the Scraperwiki ‘cup’ award for actually being brave enough to have a go at scraping data from Myspace. Apparently myspace content has less structure than custard! The collective gasps from the geeks in the room when they said that was what they wanted to do underlined that.

Second was Preston’s summer of spend.  Local councils are supposed to make details of any invoice over 500 pounds available, and many have. But many don’t make the data very useable.  Preston City council is no exception. PDF’s!

With a little help from Scraperwiki the data was scraped, tidied and put in a spreadsheet and then organised. It through up some fun stuff – 1000 pounds to The Bikini Beach Band! And some really interesting areas for exploration – like a single payment of over 80,000 to one person (why?) – and I’m sure we’ll see more from this as the data gets a good running through.  A really good example of how a journo and a hacker can work together.

The winner was one of number of projects that took the tweets from the GMP 24hr tweet experiment; what one group titled ‘Genetically modified police’ tweeting :). Enrico Zini and Yuwei Lin built a searchable GMP24 tweet database (and a great write up of the process) of the tweets which allowed searching by location, keyword, all kinds of things. It was a great use of the data and the working prototype was impressive given the time they had.

Credit should go to Michael Brunton-Spall of the Guardian into a useable dataset which saved a lot of work for those groups using the tweets as the raw data for their projects.

Other projects included mapping deprivation in manchester and a legal website that if it comes off will really be one to watch. All brilliant stuff.

Hacks and hackers we need you

Give the increasing amount of raw data that organisations are pumping out journalists will find themselves vital in making sure that they stay accountable. But I said in an earlier post that good journalists don’t need to know how to do everything, they just need to know who to ask.

The day proved to me and, I think to lots of people there,  that asking a hacker to help sort data out is really worth it.

I’m sure there will be more blogs etc about the day appearing over the next few days.

Thanks to everyone concerned for asking me along.

October 14 2010

16:05

Hacks and Hackers hack day Manchester

Any sufficiently complicated regular expression is indistinguishable from magic

A bit of a nod to Arthur C.Clarke there but something that hits home every time I do any hacking around under the bonnet of the interwebs.

When it comes to this data journalism malarky some might say (to steal another movie quote) a mans got to know his limitations. But I firmly believe a good journalist, when stuck, knows who to ask. I’m very excited that more and more journos are realising that there are no end of tools and motivated people who can be part of the storytelling process.

So I was delighted to be asked to be one of the judges for ScraperWiki’s hacks and hackers hack day in Manchester tomorrow and see that in action.

The event just one of a number of similar days around the UK.  The successes in Birmingham and Liverpool amongst others, mean that tomorrow should be fun.

If your going, see you there (later on). If not I’ll tweet etc. as I can.

September 21 2010

14:00

Adopt a Hacker wants to find couches for coders

The startup scene in NYC is blossoming. While the city has always had a tech culture — “Silicon Alley,” etc. — increasingly, in addition to fashion and finance and media, technology is becoming one of its big industries. The challenge now, say Jonathan Wegener and Ben Fisher, is to attract new tech talent to the city — coders and other hackers who will help to build New York’s startups into even more of a force than they already are.

Enter Adopt a Hacker, a new project that wants to connect coders to the NYC tech scene — with the hope of making them part of it.

Though the name is cheeky, the purpose is not. “It’s tough to get a job in New York City if you’re not physically here,” notes Fisher. “A program like this offers the opportunity to make the leap a little less scary. And for some people, it enables them to take a chance on something that they generally wouldn’t.” Using platforms like Facebook Connect and LinkedIn, the project puts coders from outside of New York in touch with those already living and working inside it — to share connections, couches, cups of coffee, whatever. The platform, as the founders put it, is “a recommendation engine for human contact.”

It’s also a recommendation engine for NYC itself. Adopt a Hacker’s website features a “Why NYC Rocks” page; the project is of and about the city and its tech scene. The goal, Wegener and Fisher told me, is to foster connections that make New York a more inviting place for coders and other hackers who might have something to contribute to the city’s burgeoning, blossoming tech scene. Hackers, in particular, who aren’t already in the city — coders in far-flung places or “hiding under rocks,” Jon says. (“I personally define a hacker,” he notes, “as someone who builds products — they could be a developer, they could be a designer, they could be a project manager — but someone who just builds things, and has a passion for building things and creating things.”) There are lots of projects that aim to incubate young tech talent, but up until now, he says, “nobody has really had a program to look for talent outside of New York.”

Already, the effort has received over 100 responses from New Yorkers offering their couches, with several dozen people requesting visits. As Fisher puts it: “The end goal is to bring more tech talent to New York, and to show firsthand how awesome the tech scene is.”

Though the project is focused on tech, the basic idea — a kind of uber-simplified Match.com — is one that journalists (“hacks,” to use the Hacks/Hackers lingo) could also, well, adopt. In a rough-and-tumble media environment like ours, collaboration isn’t just a nice thing to facilitate; it could also make the difference between a news startup’s success or failure. The ability to look beyond a geographical area — to tap the ideas and expertise and talent of journalists and programmers and anyone who might be a good advisor, wherever they may live — could give news organizations the creative ideas, and external perspective, that will help them to thrive. Adopt a Hack, anyone?

Before Adopt a Hacker launched, Wegener notes, “I’d been getting emails from people curious about the NY tech scene who didn’t know how to get started.” Many of them noted their intimidation about New York — much of coming from the simple fact of not knowing people in the city. “Unless you go in there and immerse yourself in the culture,” Fisher points out, “there’s a lot you don’t know.” Inspired by the logic of Big Apple Greeter, a program that pairs visitors to the city with local experts, Wegener envisioned a similar Big Brother/Big Sister-type platform tailored to the tech community. “We think the best way to get people to move here is to have someone guiding you around the city — having someone give you their couch for a few days,” he notes. One couch at a time, the hope is “to show people that New York is an awesome place to be.”

July 26 2010

17:00

Data, diffusion, impact: Five big questions the Wikileaks story raises about the future of journalism

Whenever big news breaks that’s both (a) exciting and (b) relevant to the stuff I research, I put myself through a little mental exercise. I pretend I have an army of invisible Ph.D. students at my beck-and-call and ask them to research the three most important “future of news” items that I think emerge out of the breaking news. That way, I figure out for myself what’s really important amidst all the chaos.

The Wikileaks-Afghanistan story is big. It’s big for the country, it’s big for NATO soldiers and Afghan civilians, and (probably least importantly) it’s big for journalism. And a ton of really smart commentary has been written about it already. So all I want to do here is chime in on what I’d be focusing on if I wanted to understand the Wikileaks story in a way that will still be relevant one year, five years, even twenty years from now. I want to briefly mention three quick assignments I’d give my hypothetical Ph.D. students, and two assignments I’d keep for myself.

Watch the news diffuse: The release of the Wikileaks stories yesterday was a classic case study of the new ecosystem of news diffusion. More complex than the usual stereotype of “journalists report, bloggers opine,” in the case the Wikileaks story we got to see a far more nuanced (and, I would say, far more real) series of news decisions unfold: from new fact-gatherers, to news organizations in a different position in the informational chain, all the way to the Twittersphere in which conversation about the story was occurring in real-time, back to the bloggers, the opinion makers, the partisans, the politicians, and the hacks. This is how news works in 2010; let’s try to map it.

What’s the frame?: This one’s simple, but interesting because of that simplicity. With the simultaneous release of the same news story by three different media organization, all in different countries (The New York Times, The Guardian, and Der Spiegel), all coming out the the same set of 92,000 documents, we’ve got almost a lab-quality case study here of how different national news organizations talk about the news differently. Why did The Guardian headline civilian casualties while the Times chose to talk about the U.S. relationship with Pakistan? And what do these differences in framing say about how the rest of the world sees the U.S. military adventure in Afghanistan?

What’s the impact?: Will the “War Logs” release have the same impact that the Pentagon Papers did, either in the short of long term? And why will the stories have the impact they do? Like Jay Rosen, I’m sadly skeptical that this huge story will change the course of the war in the way the Ellsberg leaks did. And like Rosen, I think a lot of the reasons lie beyond journalism — they lie in the nature of politics and the way society and the political elite process huge challenges to our assumed, stable world views.

I might make one addition to Jay’s list about the impact of this story though — one that has to do with the speed of the news cycle. Like I noted already, there’s nothing more exciting than watching these sorts of stories unfold in real time. But I wonder if the “meme-like” nature of their distribution — and the fact that there will always be another meme, another bombshell — blunts there impact. You don’t have to be Nicholas Carr to get the feeling that we’re living in a short-attention span, media-saturated society; I wonder what it would take for a story like the “War Logs” bombshell to stick around in the public mind long enough for it to mean something.

So those are stories I’d give my grad students. Here are the topics I’d be keeping for myself:

Why Wikileaks?: I talked about this a bit over in my column today at NPR, so I’ll just summarize my main points from there. Looking rationally at the architecture of the news ecosystem, it doesn’t make a lot of sense that Wikileaks would have been tapped to serve as the intermediary for this story. After all, they just turned around and fed it to three big, traditional, national newspapers. There is, of course, Wikileaks’ technical expertise; what Josh Young called their “focus lower in the journalism stack…on the logistics of anonymity.” But I think there’s more to it than that. I think to understand “why Wikileaks,” you have to think in terms of organizational culture as well as network architecture and technical skills. In short, I think Wikileaks has an organizational affinity with folks who are most likely to be on the leaking end of the news in today’s increasingly wired societies. To understand the world of Wikileaks, and what it means for journalism, you have to understand the world of geeks, of hackers, and of techno-dissidents. Understanding reporting and reporters isn’t enough.

Journalism in the era of big data: Finally, it’s here where I’d start to draw the links between the “War Logs,” the Washington Post “Top Secret America” series, and even the New York Times front page story on the increasing conservatism of the Roberts Supreme Court. What do they all have in common? Databases, big data, an attempt to get at “the whole picture” — and maybe even a slight sense of letdown. The Washington Post story took years to write and came with a giant database. The Afghanistan story was based on 92,000 documents, many of which might have been largely inaccurate. And the Roberts story unapologetically quoted “an analysis of four sets of political science data.”

We’re seeing here the full-throated emergence of what a lot of smart people have been talking about for years now: data-driven journalism, but data in the service of somehow getting to the “big picture” about what’s really going on in the world. And this attempt to get at the big picture carries with it the risk of a slight letdown, not because of journalism, but because of us. As Ryan Sholin noted on Twitter, “Much like the massive WaPo story on secrecy, I don’t see much new [in the Wikileaks story], other than the sheer weight of failure.”

Part of what we’ve been trained, as a society, to expect out of the Big Deal Journalistic Story is something “new,” something we didn’t know before. Nixon was a crook! Osama Bin Laden was found by the CIA and then allowed to escape! But in these recent stories, its not the presence of something new, but the ability to tease a pattern out of a lot of little things we already know that’s the big deal. It’s not the newsness of failure; as Sholin might put it, it’s the weight of failure. It remains to be seen how this new focus on “the pattern” will change our political culture, our news culture, and the expectations we have of journalism. And it will be interesting to see what the focus on data leaves out. This week, however, big-data journalism proved its mettle.

July 14 2010

14:34

need help with this

how can i hack a business server ? i have the user name but need the password. can you help? i have someone that logs from my home computer to this server to do thier work. but can i store that password they use ??

Tags: hackers x2

January 13 2010

12:43

GOOGLE UNDER ATTACK BY CHINESE HACKERS

2010-01-13_1238

An unusual long and serious official declaration of Google.

A crucial issue once the founder of Facebook says that our Internet privacy will be at risk, not only in China, but everywhere.

Older posts are this way If this message doesn't go away, click anywhere on the page to continue loading posts.
Could not load more posts
Maybe Soup is currently being updated? I'll try again automatically in a few seconds...
Just a second, loading more posts...
You've reached the end.

Don't be the product, buy the product!

Schweinderl