{"id":3021,"date":"2018-03-27T10:09:08","date_gmt":"2018-03-27T14:09:08","guid":{"rendered":"http:\/\/blogs.law.columbia.edu\/uprising1313\/?p=3021"},"modified":"2018-03-27T18:14:25","modified_gmt":"2018-03-27T22:14:25","slug":"oxblood-ruffin-epilogue-hacktivism-and-speech-rights-then-and-now","status":"publish","type":"post","link":"https:\/\/blogs.law.columbia.edu\/uprising1313\/oxblood-ruffin-epilogue-hacktivism-and-speech-rights-then-and-now\/","title":{"rendered":"Oxblood Ruffin | Hacktivism And Speech Rights, Then And Now"},"content":{"rendered":"<p><strong>By\u00a0<a href=\"https:\/\/twitter.com\/OxbloodRuffin\" target=\"_blank\" rel=\"noopener\">Oxblood Ruffin<\/a><\/strong><\/p>\n<div>I come to hacktivism as an engaged participant. I am neither an academic nor an ethnographer. My opinions are subjective based on my own practice and understanding of what hacktivism is and should hope to achieve. Although I have a particular point of view I also realize that hacktivism has evolved in a number of directions since the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cult_of_the_Dead_Cow\">Cult of the Dead Cow<\/a> (cDc) kickstarted the movement in the late 90s. Possibly not the best analogy but hacktivism seems a bit like feminism. There are any number of feminisms, and there are any number of hacktivisms. Core principles exist but objectives and tactics can vary. So with that in mind I\u2019ll give you my version.<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>I have always been &#8211; for lack of a better term &#8211; an internationalist. I was born and raised in Canada, I\u2019ve always been fascinated with the wider world, different cultures and language, and global politics. Working as a consultant at United Nations headquarters in New York, I got a ringside view of how the organization works. I was also exposed to some of the smartest people from all over the world who challenged my assumptions. All of this occurred as the internet was moving from the military, through the academy, and into the public sphere. Many of us thought the internet had the potential to connect the world in new and beneficial ways. We had hope. And we were wrong. The free flow of information was not a priority for dictators and some corporations. National firewalls became the new borders &#8211; mostly provided by Silicon Valley &#8211; and the internet became disastrously fragmented.<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>That\u2019s when I became a hacktivist.<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>At the same time I was trying to develop some guiding principles for hacktivism I reviewed the <a href=\"https:\/\/www.un.org\/en\/universal-declaration-human-rights\/\">Universal Declaration of Human Rights<\/a> (UDHR) and the <a href=\"https:\/\/www.ohchr.org\/en\/professionalinterest\/pages\/ccpr.aspx\">International Covenant on Civil and Political Rights<\/a> (ICCPR). Article 19 of both documents details the right of free speech and sharing information. Even if all members states in the United Nations didn\u2019t ratify these documents, at least the ideals had been established. Everyone should have the right to free speech; everyone should be able to access and share information. And I didn\u2019t particularly care if some governments had a problem with that. I formed <a href=\"https:\/\/en.wikipedia.org\/wiki\/Hacktivismo\">Hacktivismo<\/a> to develop circumvention tools. National firewalls are not conducive to the free flow of information.<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>With some <a href=\"https:\/\/www.hacktivismo.com\/public\/declarations\/en.php\">objectives in place<\/a>, it was time to think about tactics. How would we do this? Was anything off limits? We would be waging a kind of information war and we needed a blueprint &#8211; or at least some basic guidelines &#8211; for the rules of engagement. So tactics like <a href=\"https:\/\/en.wikipedia.org\/wiki\/Denial-of-service_attack\">Distributed Denial of Service<\/a> (DDoS) attacks were off limits. If freedom of speech and access to information are basic human rights, then curtailing them are human rights violations. Over the years I\u2019ve debated a range of people who take an opposing view, from activists, to artists, to academics. Counter-arguments range from: denial of service is like a sit in; it\u2019s only a temporary lack of speech and access; targets almost always have other speech platforms.<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>I don\u2019t buy these arguments but I also don\u2019t doubt the sincerity of the people who make them. I also have to admit a certain amount of conflict. Almost always I agreed with the object of protests where DDoS was used. But I didn\u2019t believe the ends justified the means, and quite frankly, it always seemed like an inelegant solution to the problems. But leaving the issues of speech and access aside for the moment, at least two things bother me with much of the pushback I\u2019ve received to my position. The first is what appears to be the implicit bias of DDoS supporters. It\u2019s alright for <i>us<\/i> to attack <i>them<\/i> but it\u2019s not alright for <i>them<\/i> to attack <i>us<\/i>. A little more concretely, it\u2019s alright for <i>us<\/i> to DDoS Fox News but it\u2019s not alright for <i>them<\/i> to DDoS the ACLU, or vice versa. In an odd way I think DDoSing is like free speech. You either support it or you don\u2019t. The late John Perry Barlow said, \u201cI support freedom of expression, no matter whose, so I oppose DDoS attacks regardless of their target&#8230; they&#8217;re the poison gas of cyberspace.\u201d I\u2019m with Barlow on both points.<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>My second and more fundamental problem with DDoS attacks reflects my own bias. I have never been that interested in first world problems. At the same time I became a hacktivist many others were consumed with issues like DRM and copyright law in the United States. I didn\u2019t have the bandwidth to think about these issues so whenever I was queried I\u2019d just say ask <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cory_Doctorow#Opinions_on_intellectual_property\">Cory Doctorow<\/a>\u00a0 or <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cindy_Cohn\">Cindy Cohn<\/a>; I\u2019m probably good with their opinions. My focus was on speech and access and where there was not that much of it, namely in the emerging networks, or Global South. As much as I\u2019m opposed to DDoS attacks in the liberal democracies I\u2019m wildly opposed to them in places where speech rights and access to information are tenuous at best. To my best knowledge, the primary drivers of the pro-DDoS discourse are Euro-American, a cohort of advocates who already have the rights towards which the rest of the world is struggling.<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>At the same time that my thinking has evolved from a human rights approach, I also realize that it\u2019s somewhat problematic. These ideas originated from an international organization after the Second World War. And to be fair they were often used by the West to point fingers at countries like Cuba, China, and Iran. Additionally the concept of violation was intended to be levelled against governments denying citizens their rights. So is it possible for non-state actors such as hacktivists or corporations to be guilty of human rights violations? Probably not. The results of a DDoS attack aren\u2019t any different whether they\u2019re committed by a state or non-state actor. It\u2019s also worth noting that in the field of social media, hashtags can equally be weaponized to suppress speech. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Gamergate_controversy\">Gamergate<\/a> is a good example. Women\u2019s coversations were overwhelmed with hashtag spam. Similar hashtag attacks have been made in <a href=\"https:\/\/blogs.economictimes.indiatimes.com\/et-commentary\/is-it-tricks-or-tweets\/\">political contexts<\/a>. In the digital age roles have become muddied. And as Marshall McLuhan observed in 1970, \u201cWorld War III is a guerrilla information war with no division between military and civilian participation.\u201d<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>Hacktivism is a bit like the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Anonymous_(group)\">Anonymous collective<\/a>. They have been recognized as a hacktivist group, and they\u2019re an organization that anyone can be a part of as long as they remain anonymous. Please note the word \u201canyone\u201d. Hacktivism does not require deep technical expertise. You don\u2019t need to be a vulnerability researcher, or a networking or hardware expert. In my experience the majority of hacktivists are not these kinds of people. It takes very few hackers to achieve large outcomes. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Chelsea_Manning\">Chelsea Manning<\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Edward_Snowden\">Edward Snowden<\/a>. Two lone actors who exacted enormous change in political culture and public awareness. But the overwhelming number of hacktivists are not people like these. Not even close. Part of the problem is the conflation of the words hacker and hacktivist. While the former could be the latter, the latter is not necessarily the former. But what is true of most hacktivists is that they tend to be adept at raising public awareness, especially across social media. That, in my opinion, is hacktivism\u2019s greatest achievement.<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>As someone who has thought about these issues for a long time I\u2019m aware of how the terrain has changed. The internet was a very different place when I got started from what it is now. That\u2019s why I have a lot of sympathy for anyone wrestling with ethics and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Artificial_intelligence\">artificial intelligence<\/a> (AI). How is that going to be sorted out, especially if AI is used as a hacktivist tactic? At least I had an internationally agreed upon framework upon which to attach hacktivism. Ethics and a sense of decency always mattered to me. We even came up with <a href=\"https:\/\/en.wikipedia.org\/wiki\/Hacktivismo_Enhanced-Source_Software_License_Agreement\">a software license<\/a> that sought to protect end user rights. But perhaps it\u2019s time to abandon arguing for human rights and appeal to ethical consensus. Winston Churchill observed of democracy that it\u2019s \u201c\u2026 the worst form of Government except for all the other forms that have been tried from time to time \u2026\u201d. I am not so hidebound as Mr. Churchill. I\u2019d be willing to swap another ideal for human rights if one came along.<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>Looking back over the past twenty years &#8211; if a comparison to feminism still works &#8211; I\u2019d probably qualify as a second wave hacktivist. IMHO the first wave began with <a href=\"https:\/\/cheshirecatalyst.com\/tap_legend_dead.txt\">the Yippies\/TAP<\/a>. There isn\u2019t a lot of information available about this group but I did hear a lot about them from my earliest mentor on hacktivism, <a href=\"https:\/\/w3.cultdeadcow.com\/cms\/nightstalker.html\">The Nightstalker<\/a> who had been active with them. I suspect we\u2019re moving into something that might be characterized as third wave hacktivism; a far wider involvement with the emerging networks that represents a billion plus new users on the internet. If my projection holds then diversity, gender, and majority world issues will be the focus of the newer strains of hacktivism. It\u2019s something I look forward to.<\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div>\u2014<\/div>\n<div><\/div>\n<div><a href=\"https:\/\/twitter.com\/OxbloodRuffin\">Oxblood Ruffin<\/a> is a hacktivist based in Berlin.<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>By\u00a0Oxblood Ruffin I come to hacktivism as an engaged participant. I am neither an academic nor an ethnographer. My opinions are subjective based on my own practice and understanding of what hacktivism is and should hope to achieve. Although I&hellip; <a href=\"https:\/\/blogs.law.columbia.edu\/uprising1313\/oxblood-ruffin-epilogue-hacktivism-and-speech-rights-then-and-now\/\" class=\"more-link\">Continue Reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1641,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[38976],"tags":[],"class_list":["post-3021","post","type-post","status-publish","format-standard","hentry","category-posts-11-13"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/blogs.law.columbia.edu\/uprising1313\/wp-json\/wp\/v2\/posts\/3021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.law.columbia.edu\/uprising1313\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.law.columbia.edu\/uprising1313\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.law.columbia.edu\/uprising1313\/wp-json\/wp\/v2\/users\/1641"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.law.columbia.edu\/uprising1313\/wp-json\/wp\/v2\/comments?post=3021"}],"version-history":[{"count":0,"href":"https:\/\/blogs.law.columbia.edu\/uprising1313\/wp-json\/wp\/v2\/posts\/3021\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.law.columbia.edu\/uprising1313\/wp-json\/wp\/v2\/media?parent=3021"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.law.columbia.edu\/uprising1313\/wp-json\/wp\/v2\/categories?post=3021"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.law.columbia.edu\/uprising1313\/wp-json\/wp\/v2\/tags?post=3021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}