{"id":44,"date":"2016-05-20T19:53:48","date_gmt":"2016-05-20T23:53:48","guid":{"rendered":"http:\/\/blogs.law.columbia.edu\/uprising1313\/?page_id=44"},"modified":"2018-08-21T10:37:26","modified_gmt":"2018-08-21T14:37:26","slug":"11-13","status":"publish","type":"page","link":"https:\/\/blogs.law.columbia.edu\/uprising1313\/11-13\/","title":{"rendered":"11\/13 | Hacktivism"},"content":{"rendered":"<p style=\"text-align: center;\"><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/Xj2uFzxo9nU\" frameborder=\"0\" allow=\"autoplay; encrypted-media\" allowfullscreen><\/iframe><\/p>\n<h1 style=\"text-align: center;\">Gabriella Coleman (<a href=\"https:\/\/www.mcgill.ca\/ahcs\/people-contacts\/faculty\/gabriella-coleman\">McGill University<\/a>)<\/h1>\n<h1 style=\"text-align: center;\">Emmanuel Goldstein, publisher of <a href=\"https:\/\/www.2600.com\/\"><em>2600: The Hacker Quarterly<\/em><\/a><\/h1>\n<h1 style=\"text-align: center;\">Simona Levi (<a href=\"https:\/\/xnet-x.net\/en\/quienes-somos\/\">XNET<\/a>)<\/h1>\n<h2 style=\"text-align: center;\">Moderated by <a href=\"https:\/\/cgt.columbia.edu\/about\/people\/committee-faculty\/bernard-e-harcourt\/\">Bernard E. Harcourt<\/a> and <a href=\"https:\/\/history.columbia.edu\/faculty\/manan-ahmed\/\">Manan Ahmed<\/a><\/h2>\n<h2 style=\"text-align: center;\">March 22, 2018<\/h2>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.law.columbia.edu\/uprising1313\/11-13\/hacktivism-image\/#main\" rel=\"attachment wp-att-1707\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1707\" src=\"https:\/\/blogs.law.columbia.edu\/uprising1313\/files\/2016\/05\/Hacktivism-image-300x225.jpeg\" alt=\"\" width=\"300\" height=\"225\" srcset=\"https:\/\/blogs.law.columbia.edu\/uprising1313\/files\/2016\/05\/Hacktivism-image-300x225.jpeg 300w, https:\/\/blogs.law.columbia.edu\/uprising1313\/files\/2016\/05\/Hacktivism-image-768x576.jpeg 768w, https:\/\/blogs.law.columbia.edu\/uprising1313\/files\/2016\/05\/Hacktivism-image-1024x768.jpeg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<h2 style=\"text-align: center;\">March 22, 2018 from 6:15 p.m. to 8:45 p.m.<\/h2>\n<h2 style=\"text-align: center;\"><a href=\"https:\/\/heymancenter.org\/visit\/the-heyman-center\/\">Heyman Center Common Room<\/a><\/h2>\n<h2 style=\"text-align: center;\">Columbia University<\/h2>\n<p>In this seminar, we will critically explore and theorize \u201chacktivism\u201d as a form of revolt. Traditionally, hacking and hacktivism have been associated with anarchist-leaning attacks on the establishment. They have often been linked to radical Leftist forms of truth-telling and whistleblowing\u2014to the hacker collaborative Anonymous, to WikiLeaks and Julian Assange, to Chelsea Manning and Edward Snowden.<\/p>\n<p>To be sure, as Gabriella Coleman emphasizes in her article \u201c<a href=\"https:\/\/blogs.law.columbia.edu\/uprising1313\/gabriella-coleman-from-internet-farming-to-weapons-of-the-geek-current-anthropology-volume-58-supplement-15-february-2017\/\">Weapons of the Geek<\/a>,\u201d we need to be more nuanced about the politics of hackers\u2014as she correctly argues, \u201cthe ideological sensibilities that animate hacker politics are diverse: just as we can locate liberal hackers and projects, so too can we identify radical hackers and projects and see how both engender social change\u201d (p. S98).\u00a0But it is fair to say that the hacker sensibilities have tended to be predominantly on the Left. Emmanuel Goldstein provides a brilliant history in his essay on \u201c<a href=\"https:\/\/blogs.law.columbia.edu\/uprising1313\/emmanuel-goldstein-hacktivism-and-the-hacker-promise\/\">Hacktivism and the Hacker Promise<\/a>,\u201d as does Coleman in her article. The political valence was linked, theoretically and historically, to what Coleman refers to as \u201cthe cultural cultivation of antiauthoritarianism\u201d within hacker circles (p. S95).<\/p>\n<p>This remains true today and one can hear a powerful expression of it in Simona Levi\u2019s marvelous essay \u201c<a href=\"https:\/\/blogs.law.columbia.edu\/uprising1313\/simona-levi-working-notes-for-a-r-evolution\/\">Working Notes for a R-evolution<\/a>.\u201d It rings loudly in her call to \u201cstudy the law, understand it, explain it in other words, make fun of it, hack it to render it useless, destroy its authority by replacing it with a positive one that will ultimately be coopted with the bad taste and time-lag that characterises the system, clearing away whatever had been there previously and leaving a blank slate.\u201d<\/p>\n<p>One looming question is whether\u00a0things may be changing, at least in the public imagination. Hacking may be undergoing a type of ideological drift\u2014no longer so tightly associated with resistance to power, and often, now, connected to more authoritarian political tendencies. If one had to identify a moment, a tipping point, it might be when Julian Assange threw his support, effectively, behind Donald Trump.<\/p>\n<p>The question this raises, then, is pressing: Have hacking and hacktivism drifted from a mode of resistance to merely a technology, a weapon? Has the ideological drift substantively transformed hacking from a modality of uprising to simply a technological tool?<\/p>\n<p>Another way to ask this is, does hacking still have a political or ethical valence, or is it now just like a machine gun or armored vehicle that can be used and deployed by any faction?<\/p>\n<p><a href=\"https:\/\/blogs.law.columbia.edu\/uprising1313\/emmanuel-goldstein-hacktivism-and-the-hacker-promise\/\">In his fascinating post<\/a>, Emmanuel Goldstein defines hacktivism as \u201cthe subversive use of computers and\/or computer networks to further societal\/political change.\u201d The question is, do we need to qualify the term \u201cchange\u201d?<\/p>\n<p>Welcome to Uprising 11\/13!<\/p>\n<p>[Read full post <a href=\"https:\/\/blogs.law.columbia.edu\/uprising1313\/bernard-e-harcourt-hacktivism-and-the-problem-of-ideological-drift\/\">here<\/a>.\u00a0\u00a9 Bernard E. Harcourt]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gabriella Coleman (McGill University) Emmanuel Goldstein, publisher of 2600: The Hacker Quarterly Simona Levi (XNET) Moderated by Bernard E. Harcourt and Manan Ahmed March 22, 2018 March 22, 2018 from 6:15 p.m. to 8:45 p.m. Heyman Center Common Room Columbia&hellip; <a href=\"https:\/\/blogs.law.columbia.edu\/uprising1313\/11-13\/\" class=\"more-link\">Continue Reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1603,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-44","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/blogs.law.columbia.edu\/uprising1313\/wp-json\/wp\/v2\/pages\/44","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.law.columbia.edu\/uprising1313\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.law.columbia.edu\/uprising1313\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.law.columbia.edu\/uprising1313\/wp-json\/wp\/v2\/users\/1603"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.law.columbia.edu\/uprising1313\/wp-json\/wp\/v2\/comments?post=44"}],"version-history":[{"count":0,"href":"https:\/\/blogs.law.columbia.edu\/uprising1313\/wp-json\/wp\/v2\/pages\/44\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.law.columbia.edu\/uprising1313\/wp-json\/wp\/v2\/media?parent=44"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}