tag:theconversation.com,2011:/global/topics/cyber-culture-1355/articlesCyber culture – The Conversation2016-08-29T06:59:35Ztag:theconversation.com,2011:article/643092016-08-29T06:59:35Z2016-08-29T06:59:35ZFactCheck Q&A: what has the Children’s eSafety Commissioner done in its first year to tackle cyberbullying?<figure><img src="https://images.theconversation.com/files/135450/original/image-20160825-30231-oh4g1a.JPG?ixlib=rb-1.1.0&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">Minister for Communications and Arts, Mitch Fifield, speaking on Q&A on August 23, 2016. </span> <span class="attribution"><span class="source">Q&A</span></span></figcaption></figure><p><strong>The Conversation is fact-checking claims made on Q&A, broadcast Mondays on the ABC at 9.35pm. Thank you to everyone who sent us quotes for checking via <a href="http://www.twitter.com/conversationEDU">Twitter</a> using hashtags #FactCheck and #QandA, on <a href="http://www.facebook.com/conversationEDU">Facebook</a> or by <a href="mailto:checkit@theconversation.edu.au">email</a>.</strong></p>
<hr>
<figure>
<iframe width="440" height="260" src="https://www.youtube.com/embed/5OTdRBgIa-0?wmode=transparent&start=0" frameborder="0" allowfullscreen=""></iframe>
<figcaption><span class="caption">Excerpt from Q&A, August 23, 2016.</span></figcaption>
</figure>
<blockquote>
<p>[The Children’s eSafety Commissioner] also is a cop on the beat when it comes to cyberbullying and they’ve investigated about 11,000 cases of cyberbullying. The eSafety Commissioner has the power to direct a social media organisation to take down offensive material and if they don’t, there are penalties of up to $17,000 per day for the social media organisation. <strong>– Minister for Communications and Arts, Mitch Fifield, <a href="http://www.abc.net.au/tv/qanda/txt/s4499755.htm">speaking on Q&A</a>, August 23, 2016.</strong> </p>
</blockquote>
<p>Revelations that boys have been <a href="http://www.smh.com.au/nsw/police-investigate-pornographic-website-targeting-nsw-schoolgirls-20160817-gquo0f.html">sharing pornographic pictures of underage girls online</a> have refocused attention on how best to tackle online harassment, bullying and abuse.</p>
<p>When asked about the issue on Q&A, Communications Minister Mitch Fifield said that the <a href="https://www.esafety.gov.au/about-the-office/role-of-the-office">Office of the Children’s eSafety Commissioner</a> had investigated about 11,000 cases of cyberbullying and can order social media organisations to take down offensive material – or face fines of up to $17,000 per day. </p>
<p>Is that correct?</p>
<h2>Checking the source</h2>
<p>When asked for a source to support his statement, a spokeswoman for the minister pointed to the commissioner’s <a href="https://www.esafety.gov.au/12-month-report/12-month-report-alternative">12-month report</a> and gave more detail on the agency’s capacity to issue penalties.</p>
<p>The spokesperson’s full response can be read <a href="http://theconversation.com/full-response-from-a-spokesperson-for-mitch-fifield-64439">here</a>. </p>
<p>When The Conversation asked the Office of the Children’s eSafety Commissioner how many fines had been issued since the passage of its enabling legislation, a spokesperson for the commissioner said:</p>
<blockquote>
<p>The Office of the children’s eSafety Commissioner handled over 11,000 complaints across its investigation functions, which include prohibited online content and cyberbullying. For more information on this please see our <a href="https://www.esafety.gov.au/about-the-office/newsroom/media-releases/child-sex-abuse-images-mainly-primary-schoolers">media release</a> issued at our 12-month mark. To date we have issued no penalty notices as we have worked collaboratively with our social media partners in getting material removed, without the need for formal powers.</p>
</blockquote>
<p>The commissioner’s website notes that in the 12 months to July 2016, there were 186 complaints of “serious cyberbullying” affecting under 18s, with 71% of these cases targeting girls. 15-year-olds are the primary targets of reported cyberbullying material.</p>
<p>The agency <a href="https://www.esafety.gov.au/12-month-report/12-month-report-alternative">said</a> that reports involved factors such as:</p>
<ul>
<li>73% Nasty comments and/or serious name calling</li>
<li>26% Offensive or upsetting pictures or videos</li>
<li>21% Threats of violence</li>
<li>21% Fake and/or impersonator accounts</li>
<li>7% Hacking of social media accounts</li>
<li>7% Unwanted contact</li>
<li>3% Hate pages</li>
</ul>
<p>In its 12-month report card, the agency <a href="https://www.esafety.gov.au/12-month-report/12-month-report-alternative">said</a>:</p>
<blockquote>
<p>We conducted 11,121 online content investigations and worked with our global partners to remove 7,465 URLs of child sexual abuse material. All items actioned in one to two days.</p>
</blockquote>
<p>Of the child sexual abuse material, 95% of the victims were girls and 5% boys.</p>
<p>So Mitch Fifield’s figures are correct, but he mistakenly conflated the term “cyberbullying” with the Children’s eSafety Commissioner’s full range of investigative responsibilities. </p>
<p>The Office of the Children’s eSafety Commissioner looked at about 11,000 <a href="https://en.wikipedia.org/wiki/Uniform_Resource_Locator">URLs</a> (more commonly known as web addresses) in the last year and removed 7,465 URLs of child sexual abuse material.</p>
<p>It’s inaccurate to describe such cases as “cyberbullying”. In fact, there were 186 complaints of “serious cyberbullying” affecting under 18s in the 12-month period to July 2016.</p>
<h2>Penalties</h2>
<p>The <a href="https://www.legislation.gov.au/Details/C2015A00024/Controls/">legislation</a> that led to the creation of the Office of the Children’s eSafety Commissioner notes that:</p>
<blockquote>
<p>A person must comply with a requirement under a social media service notice to the extent that the person is capable of doing so. Civil penalty: 100 penalty units.</p>
</blockquote>
<p>It is true that the agency has the power to direct social media organisations to take offensive material down and <a href="https://www.legislation.gov.au/Details/C2015A00024/Controls/">issue daily penalties</a> until they do. </p>
<p>That said, Fifield’s figure of up to $17,000 per day is out of date. This figure was accurate when the bill was proposed, but <a href="http://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/Bills_Search_Results/Result?bId=r5464">a change to the Crimes Act 1914</a> has since increased Commonwealth penalty units from $170 to $180. </p>
<p>The maximum daily penalty is now $18,000. The agency has said it is yet to actually issue any penalties. </p>
<p>Lastly, it is worth noting that Mitch Fifield’s comments on Q&A were in response to a question from the audience about what could be done to afford Australian women more protection from online harassment.</p>
<p>Whilst the questioner asked about adult women, the minister’s response relates to the Children’s eSafety Commissioner, whose powers of investigation are constrained to cases involving young people under the age of 18. </p>
<h2>The scale of cyberbullying and online harassment</h2>
<p>It can be challenging to get a sense of how pervasive cyberbullying or online harassment are, because these terms are quite broad. It encapsulates everything from name-calling to stalking and threats of sexual assault.</p>
<p>A <a href="https://www.communications.gov.au/publications/publications/research-youth-exposure-and-management-cyber-bullying-incidents-australia-synthesis-report-june-2014">2014 study</a> prepared for the Department of Communications estimated that: </p>
<blockquote>
<p>the prevalence for being cyberbullied ‘over a 12-month period’ would be in the vicinity of 20% of young Australians aged 8–17.</p>
</blockquote>
<p>A <a href="http://www.pewinternet.org/2014/10/22/online-harassment/">Pew Internet survey</a> of 2,489 internet users in the United States revealed that 40% of respondents had experienced a form of online harassment. This ranged from offensive name-calling to threats of harm, stalking, sustained and/or sexual harassment. This survey found that young women, in particular, experience severe forms of harassment at disproportionately high levels.</p>
<h2>The Children’s eSafety Commissioner’s supporting roles</h2>
<p>The Office of the eSafety Commissioner provides useful tools, support, and education for people who have been targeted by cyberbullies and online harassers. These resources are helpful and approachable, although they lack the level of
technical detail provided by resources like <a href="https://onlinesafety.feministfrequency.com/en/">Speak Up & Stay Safe(r)</a>, and <a href="http://www.crashoverridenetwork.com/resources.html">Crash Override Network</a>.</p>
<p>The Office has also delivered a range of teaching programs to young people and school teachers, as well as establishing advice and support portals with their <a href="https://www.esafety.gov.au/iparent">iParent</a> and <a href="https://www.esafety.gov.au/women">eSafetyWomen</a> initiatives. </p>
<p>While the Office of the Children’s eSafety Commissioner provides some resources for adults, <a href="https://www.esafety.gov.au/complaints-and-reporting/offensive-and-illegal-content-complaints/what-we-cant-investigate">they do not investigate reports relating to adults</a>. Adults are advised to report to another government initiative, the <a href="https://www.acorn.gov.au">Australian Cybercrime Online Reporting Network (ACORN)</a>.</p>
<p>Finally, the commissioner is also charged with the <a href="https://www.esafety.gov.au/complaints-and-reporting/offensive-and-illegal-content-complaints/what-we-can-investigate">removal of offensive and illegal content</a>, including child sexual abuse material, or gratuitous, exploitative and offensive depictions of violence or sexual violence.</p>
<h2>Verdict</h2>
<p>Mitch Fifield’s statement that the Children’s eSafety Commissioner “investigated about 11,000 cases of cyberbullying” is not accurate. The minister has mistakenly conflated the term “cyberbullying” with the Children’s eSafety Commissioner’s full range of investigative responsibilities. </p>
<p>In fact, the agency conducted 11,121 <em>online content investigations</em> and removed 7,465 URLs of child sexual abuse material. There were 186 complaints of “serious cyberbullying” affecting under 18s in the 12-month period to July 2016.</p>
<p>The minister’s statement that “The eSafety Commissioner has the power to direct a social media organisation to take down offensive material”, and impose fines of up to $17,000 per day for non-cooperation is essentially true, but the figure is outdated. As of <a href="http://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/Bills_Search_Results/Result?bId=r5464">July 2015</a>, the commissioner can impose fines of up to $18,000 per day. </p>
<p>In practice, the agency is yet to impose any penalties. Organisations have opted to collaborate with the commissioner’s office to take down prohibited content. <strong>– Andrew Quodling</strong> </p>
<hr>
<h2>Review</h2>
<p>The minister is wrong to say there were investigations into 11,000 examples of cyberbullying. In fact, according to the commissioner’s own <a href="https://www.esafety.gov.au/12-month-report/12-month-report-alternative">website</a>, they helped to resolve 186 complaints of serious cyberbullying for under 18s.</p>
<p>And although the commissioner’s office now <a href="https://www.esafety.gov.au/women">provides advice for women</a> as well as children, it only investigates complaints concerning children. </p>
<p>The commissioner’s report <a href="https://www.esafety.gov.au/12-month-report/12-month-report-alternative">says</a> it conducted 11,121 online content investigations and removed 7,465 URLs of child sexual abuse material. This sounds like a lot of investigations, but remember that a single site can house many URLs. </p>
<p>And while the office of the eSafety Commissioner and the minister’s spokesperson both say the agency handled over 11,000 <em>complaints</em>, in fact that does not line up with the language used in the Commissioner’s 12-month report card. </p>
<p>It says it conducted 11,121 content <em>investigations</em>. It is possible that all of these investigations originated as complaints from the public, but it’s also possible some or many were initiated by the office of the commissioner itself or its overseas partners. </p>
<p>The fact that the commissioner’s office received only 186 complaints of cyberbullying means either people don’t realise they can report the bullying to the office, or it’s not as widespread as might be suggested.</p>
<p>I helped conduct a <a href="http://www.criminologyresearchcouncil.gov.au/reports/1516/53-1112-FinalReport.pdf">large research project</a> on sexting and young people in Australia. There were two key findings that might be of interest here - and I do caution that sexting is very different to cyberbullying, but that an image that has been “sexted” can become a tool of a cyberbully. </p>
<p>The first is that sexting is widespread among young people; around 40-50% of 13 to 15 year olds have sent a nude or semi-nude selfie. But most happens consensually and only a small proportion of children who ever receive an image send it to a third party for whom it was not intended. </p>
<p>Also, few participants report being pressured to send an image, although there is a serious gendered double standard in the way girls who send images are treated (and shamed) compared with boys. This is not the way sexting is generally reported but dealing with these facts is important for minimising harm. </p>
<p>Without trying to understate the level of damage that sexting gone wrong (or cyberbullying) can have on young lives, we must stick to the facts and not overcook the danger, nature or prevalence of either. <strong>– Murray Lee</strong></p>
<hr>
<p><div class="callout"> Have you ever seen a “fact” worth checking? The Conversation’s FactCheck asks academic experts to test claims and see how true they are. We then ask a second academic to review an anonymous copy of the article. You can request a check at checkit@theconversation.edu.au. Please include the statement you would like us to check, the date it was made, and a link if possible.</div></p><img src="https://counter.theconversation.com/content/64309/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Murray Lee receives funding from the Australian Institute of Criminology and local government funding.
</span></em></p><p class="fine-print"><em><span>Andrew Quodling does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>Communications Minister Mitch Fifield told Q&A that the Children’s eSafety Commissioner has investigated 11,000 cases of cyberbullying and can fine social media firms $17,000 a day. Is that true?Andrew Quodling, PhD candidate researching governance of social media platforms, Queensland University of TechnologyLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/239422014-03-05T06:09:37Z2014-03-05T06:09:37ZJoyriders make a black market of prestige Twitter handles<figure><img src="https://images.theconversation.com/files/43094/original/vng8ghs2-1393944083.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">@N has spent months trying to get his username back from thieves.</span> <span class="attribution"><a class="source" href="https://twitter.com/n">Twitter</a></span></figcaption></figure><p>Joyriding – stealing a car just for the fun of it – is a signature act of troublemaking teenagers seeking excitement and a chance to show off their bravado. But while car theft is <a href="http://articles.sun-sentinel.com/1989-03-01/news/8901120000_1_auto-theft-car-last-week-teen-age-boys">among the most common adolescent crimes</a>, joyriding has a very 20th century feel to it. It is a physical crime involving keys, gears, metal and rubber on asphalt.</p>
<p>Now that young people are more often to be found hanging out in virtual spaces such as social networks and online games, they are testing out new ways to show off. Online, they don’t steal objects but information – including other people’s names.</p>
<p>A particularly <a href="http://www.independent.co.uk/life-style/gadgets-and-tech/twitter-restores-rare-username-n-to-hijacking-victim-9153700.html">high-profile case</a> has recently drawn to a satisfactory conclusion with the stolen Twitter handle @N being returned to its rightful owner, <a href="http://arstechnica.com/security/2014/02/twitter-restores-50000-n-username-to-its-owner/">Naoki Hiroshima</a>. But the case reveals a glimpse of the strange underworld of virtual larceny, carried out for <a href="http://knowyourmeme.com/memes/i-did-it-for-the-lulz">lulz</a>, not money. </p>
<p>Some months ago, Hiroshima found that his a thief had gained access to his email and other website accounts. He says the thief then used this access as leverage to extort his @N username. Hiroshima was aware that the username had value and even claims that he was offered $50,000 for it in the past. However, he and many others were surprised at the extraordinary lengths the hacker had gone to to wrest control of it.</p>
<h2>What’s in a name?</h2>
<p>We usually think of name and reputation being tightly coupled. To steal your good name is to steal your reputation. But on Twitter, name and reputation are separable – and both, for different reason, are targets for thieves.</p>
<p>An account is valuable for its following – the people its reputation has gathered. By hijacking an account, you can get a message out to a particular audience. The Syrian Electronic Army, for example, has been known to take control of high-profile accounts like those run by <a href="http://www.buzzfeed.com/michaelrusch/syrian-electronic-army-hacks-cnns-twitter-account">CNN</a>, <a href="http://arstechnica.com/security/2013/05/no-joke-the-onion-tells-how-syrian-electronic-army-hacked-its-twitter/">The Onion</a>, and <a href="http://metro.co.uk/2014/02/19/fc-barcelona-twitter-account-hacked-by-syrian-electronic-army-who-say-hi-to-real-madrid-4309626/">FC Barcelona</a> among others. Once in charge, the group sends out messages relating to its agenda, such as: “DON’T FORGET: Al Qaeda is Al CIA da. Funded, armed and controlled.” That way, it can reach audiences of millions, many of whom will not have heard of the SEA before and certainly don’t follow its Twitter account.</p>
<p>Hackers who steal Twitter usernames have very different motivations. They don’t want the account – they have their own account, with their own friends following them. Their interest is in having a cool new username to show off.</p>
<p>Single words are cool, especially something such as <a href="http://www.forumkorner.com/thread-135938.html?highlight=slurp">@slurp</a> . Indeed, since there <a href="http://www.statisticbrain.com/twitter-statistics/">are hundreds of millions of active Twitter accounts</a>, most single word names have already been taken, so even random words such as <a href="http://www.forumkorner.com/thread-161238.html?highlight=compacting">@compacting</a> have cachet.</p>
<p>The trouble is, usernames are not tightly coupled with a user’s profile. A hacker doesn’t always have to go to extreme lengths to detach a user from their username. Once a thief has gained access to someone else’s account, it is relatively easy to change the username. That means that a coveted username is freed for someone else to use.</p>
<p>Early adopters who got in before Twitter was popular were able to take their pick of user names, with many opting for short handles, such as @A, @B or @N. But now they have to work hard to hold onto them. Those who control accounts like these say they get frequent alerts telling them that someone has tried to change their password – a sign that someone is attempting to break into their account.</p>
<h2>In it for the #lulz</h2>
<p>In September 2012, the Twitter account of Daniel Dennis Jones, with the username @blanket, <a href="http://storify.com/blanket/how-my-awesome-twitter-username-was-sto">was hacked</a>. When he logged in, he found that the account hadn’t been touched except that the username had been changed to something obscene.</p>
<p>By following tweets referring to @blanket, he found a black market of stolen Twitter names and was able to follow the conversation, on Twitter, between the new possessor of @blanket and his hacker friends. They were kids, trading and selling stolen names – and giving them to girls they hoped to impress. Their feeds were filled with bragging and put-downs, complaints about school and plans to play Xbox.</p>
<p>Short usernames suchas @blanket, @zone or @violent mark the thieves as people with the knowhow to obtain the illicit ID –- whether they hacked the account themselves or had the connections to barter or buy it. Theirs is not a revolutionary stand; they have little interest in the user whose name they have stolen or the mess they’ve made of that person’s online identity.</p>
<p>Like the joyriding teens on the street, hackers who steal Twitter names may make some money by selling their stolen goods, but their primary goal seems to be status display. They are showing off their daring and know-how to their friends.</p>
<p>But they are rarely caught and when they are, they face limited consequences, such as being frozen out of an account. Jones noted that when his @blanket name was stolen, he was unable to find any mention in Twitter’s documentation that such a thing had happened or what his recourse might be, though clearly it was fairly common occurrence.</p>
<p><a href="http://www.popcenter.org/problems/parking_garage_theft/PDFs/Light_etal_1993.pdf">From what is known about adolescent car thieves</a>, it seems that risk of punishment is often little deterrence anyway and the same is probably true for Twitter theft. Given that the thrill of doing something illicit and risky is a big part of the appeal, the threat of punishment can even be counterproductive.</p>
<p>It is important, too, to keep in mind the tremendous differences between physical and online consequences. Automotive joyrides too often end in serious accidents and even death for the people involved. The dangers of joyriding on a Twitter username are, for the most part, virtual and impermanent (though it is an upsetting experience for the victim). These are issues we need to think about as we grapple with <a href="http://www.amazon.com/Alone-Together-Expect-Technology-Other/dp/0465031463">questions</a> about the <a href="http://www.danah.org/itscomplicated/">desirability</a> of an adolescence spent online.</p><img src="https://counter.theconversation.com/content/23942/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Judith Donath is affiliated with Harvard University's Berkman Center for Internet and Society.</span></em></p>Joyriding – stealing a car just for the fun of it – is a signature act of troublemaking teenagers seeking excitement and a chance to show off their bravado. But while car theft is among the most common…Judith Donath, Harvard Berkman Faculty Fellow, Harvard UniversityLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/230922014-02-13T06:01:52Z2014-02-13T06:01:52ZIf you really want to help a troubled teen, don’t like their YouTube video<figure><img src="https://images.theconversation.com/files/41270/original/kzgmdg4w-1392131078.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">Are you doing more harm than good when you comment online?</span> <span class="attribution"><span class="source">darthdowney</span></span></figcaption></figure><p>Amanda Todd was a 15-year-old Canadian girl who took her own life in <a href="http://www.cbc.ca/news/canada/british-columbia/b-c-girl-s-suicide-foreshadowed-by-video-1.1217831">October 2012</a>. Prior to her death, she had been the victim of extensive and prolonged cyber-bullying on Facebook, YouTube and other social media platforms and allegedly subject to cyber-extortion.</p>
<p>Her last name has now occasioned the coining of a new, and quite morbid, expression on the web – “<a href="http://knowyourmeme.com/photos/419324-amanda-todds-death">todding</a>”. The story is an example of how the lack of consequences for some behaviour online can lead to serious and distressing consequences for others. </p>
<p>“Todding” apparently refers to campaigns of abuse against selected individuals on the web. After being exposed to such campaigns victims (who are often teenagers) may experience stress, depression and anxiety attacks to substance abuse problems. Todd, said she experienced all of these.</p>
<h2>Likes won’t save a life</h2>
<p>Around a month before she died at her home in British Columbia, Todd posted a video on YouTube entitled <a href="https://www.youtube.com/watch?v=vOHXGNx-E7E">My Story: struggling, bullying, suicide, self harm</a> in which she uses cue cards to describe the cyber-bullying she has experienced and her descent into self harm. It ends with an appeal for help.</p>
<p>The video went viral almost immediately and has been viewed more than 8m times. What is important here is that a large number of views – reportedly as many as <a href="http://www.ctvnews.ca/canada/tormenters-target-amanda-todd-s-online-memorials-amid-police-probe-1.994594">1.6m</a> – took place before Todd’s death. By Saturday, October 13, 2012, the day after Todd’s death, the video had more than <a href="http://metro.co.uk/2012/10/13/bullied-teen-amanda-todd-made-youtube-video-before-suicide-599773/">9,000 comments</a>. Today there are more than 170,000 comments.</p>
<p>Before Todd’s death, the media had picked up the video, reposted it and attracted a vast number of “likes” as a result. But despite all this coverage, all the “likes”, comments and words of support online, if there was any intervention to help Todd in real life, it appears to have been insufficient to prevent her from taking her own life.</p>
<p>The sheer number of views and comments show our depth of feeling when something as tragic as a teenager’s suicide comes to our attention. Amanda Todd’s attempt to reach the public succeeded in the sense that a great many people apparently witnessed her cry for help. So why did none of our concern translate into offline action?</p>
<h2>A neutral act</h2>
<p>Views, comments and <a href="https://theconversation.com/how-facebook-changed-what-it-means-to-like-22365">“likes”</a> often feel like a powerful online currency to the recipient but they are cost neutral in the sense that virtual disapproval doesn’t commit the individual to real intervention.</p>
<p>Since the individual, private user, as well as public media, observe that everybody else is disapproving without committing to intervention, then it becomes legitimate, indeed the norm, to disapprove and sympathise with Amanda Todd in this very way without feeling any pressure to do anything more about it. This is the case even if every individual privately thinks that more should be done.</p>
<p>As a result, we come to subscribe publicly to a norm we might privately find questionable because, as psychologists <a href="http://books.google.co.uk/books/about/Theory_and_problems_of_social_psychology.html?id=dLshAAAAMAAJ&redir_esc=y">Krech and Crutchfield</a> suggest, “no one believes, but everyone believes that everyone else believes”.</p>
<p>This is a state of collective belief referred to as <a href="http://onlinelibrary.wiley.com/doi/10.1111/meta.12028/abstract">pluralistic ignorance</a> in social psychology and it doesn’t get any better while everybody stands on the sidelines watching while the ignorance goes uncontrollably viral. In doing so we aggravate the problem. We personally contribute to the bystander apathy with every supporting “like”.</p>
<p>The same group behaviour could be seen among Todd’s bullies, both before and after her death. Within a day, “R.I.P. Amanda Todd” became a worldwide trend on Twitter and thousands of Facebook users liked a memorial page that was quickly set up. But comments such as “I’m so happy she is dead” and pictures making light of her suffering continued to appear. </p>
<p>The cyber-bullying continued even after Amanda Todd’s death because it is as cost neutral to bully online as it is to sympathise. The cascade mechanisms are the same when based on <a href="https://theconversation.com/all-those-likes-and-upvotes-are-bad-news-for-democracy-21547">social proof</a>. New social media can’t block human propensities to do either good or bad deeds but they have an unfortunate ability to reinforce already existing tendencies.</p>
<p>We have long been prone to making irrational choices when acting in a crowd but now that crowd is a faceless, nameless group of millions and we are more removed from the consequences of our behaviour than ever before.</p>
<p>Next time you feel moved to share a video or show your online approval, it’s worth considering if there is something more you could or should do. Otherwise you may just be making things worse.</p><img src="https://counter.theconversation.com/content/23092/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Vincent F Hendricks does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>Amanda Todd was a 15-year-old Canadian girl who took her own life in October 2012. Prior to her death, she had been the victim of extensive and prolonged cyber-bullying on Facebook, YouTube and other social…Vincent F Hendricks, Professor of Formal Philosophy, University of CopenhagenLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/224352014-01-25T20:21:27Z2014-01-25T20:21:27ZThe spectacle of play<figure><img src="https://images.theconversation.com/files/39875/original/s79wx6fy-1390680936.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">image</span> </figcaption></figure><figure class="align-center ">
<img alt="" src="https://images.theconversation.com/files/39872/original/3dmvpzgb-1390680829.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/39872/original/3dmvpzgb-1390680829.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=450&fit=crop&dpr=1 600w, https://images.theconversation.com/files/39872/original/3dmvpzgb-1390680829.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=450&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/39872/original/3dmvpzgb-1390680829.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=450&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/39872/original/3dmvpzgb-1390680829.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=566&fit=crop&dpr=1 754w, https://images.theconversation.com/files/39872/original/3dmvpzgb-1390680829.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=566&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/39872/original/3dmvpzgb-1390680829.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=566&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption">Kozilek plays a DJ set at the most recent Wild Rumpus party in London in front of a projection of Vlambeer’s Luftrausers.</span>
</figcaption>
</figure>
<p>This month I am trekking around Europe with my partner, and I had the good fortune to be in London on the night of the fifth <a href="http://thewildrumpus.co.uk/">Wild Rumpus</a> event. In a gallery space in central London on a Saturday night, a crowd that wouldn’t look out of place at a trendy indie nightclub came together to play a range of both obscure and well-known (ish) independent games projected onto the walls (and, in one case, the floor). </p>
<p>All the games are multiplayer, requiring at least two players. Some are competitive; others are cooperative. Many use traditional controllers, but others have bizarre custom inputs that create spectacles out of their players’ bodies for the other attendees. Here, playing Lucky Frame’s Roflpillar, two players are rolling around on the floor in sleeping bags, looking up at monitors on the insides of a model house. There, playing a modified version of Keita Takahashi’s Alphabet running on a series of dancemats, players are juggling drinks as they stretch their legs to press down this letter and that letter at the same time. </p>
<p>Around every game is a mass of people—increasingly tightly packed as the night goes on—cheering and heckling and laughing and swearing. Later in the night, once everyone has had a few drinks, the DJs play something louder and an ad-hoc dancefloor opens up in the gaps between the crowds. The composer for many of Vlambeer’s games, Kozilek, pumps out an ear-melting playlist in front of a projection of Luftrausers, a game he composed the music for being played on a computer somewhere else in the room. There’s something magical about a person’s game being splashed over his body as he entertains a live crowd.</p>
<p>Wild Rumpus is a lively, vibrant, and very much public side of videogames that is a far shot from the loner nerd hunched over a computer in a dark room that many people still think of when they think of videogames. It’s part of a much broader renaissance of local multiplayer games converging with new forms of public play that has been taking off over the past five years or so. Encompassing other events and places, such as <a href="http://www.babycastles.com/">Babycastles</a> in New York and, more recently, <a href="http://hovergarden.org/">Hovergarden</a> in Melbourne, this renaissance is driven primarily by independent developers and collectives.</p>
<figure class="align-left ">
<img alt="" src="https://images.theconversation.com/files/39873/original/pqb267gk-1390680894.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/39873/original/pqb267gk-1390680894.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=800&fit=crop&dpr=1 600w, https://images.theconversation.com/files/39873/original/pqb267gk-1390680894.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=800&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/39873/original/pqb267gk-1390680894.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=800&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/39873/original/pqb267gk-1390680894.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=1005&fit=crop&dpr=1 754w, https://images.theconversation.com/files/39873/original/pqb267gk-1390680894.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=1005&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/39873/original/pqb267gk-1390680894.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=1005&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption">Mega Alphabet being played with dancemats by attendees at Wild Rumpus.</span>
</figcaption>
</figure>
<p>It signals a move away from the dominant trajectories of multiplayer videogames these past decades that move away from the actual space of play and into the online space. As fast internet connections became more reliable and ubiquitous, videogames stepped away from the ‘split screen’ multiplayer modes of the 90s with its many restrictions (not least of all one computer having to process two players’ viewpoints at once) to online multiplayer, where each player has their own machine and their own screen. </p>
<p>This opened up all kinds of new potential in games, with titles like Counter Strike, Second Life, and World of Warcraft coming into their own with large, online communities. But, at the same time, something was lost. While online play was great, it became increasingly difficult to find a game to play with your friends when they came around. So, in more recent years, developers have started to wonder what unique pleasures of local multiplayer were lost in this move to online. Perhaps local was not just a restraint but a pleasure in its own right. </p>
<p>Indeed, there is something special about playing games with people present in the same actual space as you, both held in tandem to the same screen. The spectacles of close shaves and magnificent manoeuvres are all the more spectacular when you have someone to banter with, to have a reason to shout “Did you see that?!”. It allows games to not just be something you play but something you watch: a spectator sport. Others are often present, waiting their turn to play but also providing a keen audience with no real stake in either side winning but simply in, for lack of a better term, wanting to see something cool happen.</p>
<p>The newer wave of indie multiplayer games are fully aware of this, and they are often superbly designed to allow a vast range of cool things to occur with great frequency. They are tactical and exciting to play, of course, but also fascinating to watch. Bennett Foddy’s Pole Riders, for instance, is an easy-to-play but difficult-to-master game where two players use poles to push a ball on a string towards a goal. Controls are simple but unwieldy, and players often find their characters doing all sorts of things they never intended. Like many of Foddy’s games, there is a slapstick element as the game never quite seems fully under the players’ control. Messhof’s acclaimed and recently released Nidhogg, meanwhile, has two fencers face off in a hallucinogenic and distorted world of yellows and oranges. Its finite moveset of high, mid, and low attacks can be exploited and combined in a nearly inexhaustible number of combinations. </p>
<p>Other recent local multiplayer games forego the centrality of the screen, focusing on the spectacle of players doing amusing things with their bodies for the entertainment of onlookers. Douglas Wilson is at the head of these kinds of games, with creations like MegaGIRP—a modification of Foddy’s rock-climbing GIRP that has players contorted over a series of dance mats in some bizarre version of Twister. His more popular game Johann Sebastian Joust, meanwhile, removes the screen entirely to have players face each other, trying to force them to move their Move controller too fast in a kind of slow-motion kung fu battle. </p>
<figure class="align-center ">
<img alt="" src="https://images.theconversation.com/files/39875/original/s79wx6fy-1390680936.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/39875/original/s79wx6fy-1390680936.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=450&fit=crop&dpr=1 600w, https://images.theconversation.com/files/39875/original/s79wx6fy-1390680936.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=450&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/39875/original/s79wx6fy-1390680936.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=450&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/39875/original/s79wx6fy-1390680936.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=566&fit=crop&dpr=1 754w, https://images.theconversation.com/files/39875/original/s79wx6fy-1390680936.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=566&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/39875/original/s79wx6fy-1390680936.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=566&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption">Roflpillar at Wild Rumpus.</span>
</figcaption>
</figure>
<p>All of these games, and the many others from the past years that I haven’t mentioned, understand that local multiplayer games are as much about the competition between their players as the spectacle of their performance—both for the players themselves and any onlookers. Events like Wild Rumpus, then, latch onto this and play up the latter, moving these games from the lounge room into a very public space purposely built for viewing spectacles. These games come into their own projected onto a wall in front of a crowd cheering and hollering not because they have stakes in a winner, but because they are simply enjoying the pleasure of watching people play.</p>
<p>To reiterate, events like Wild Rumpus are not a new trend, but one that has been coming into its own over recent time. Still, even after several years of attending such events, I still leave them with a renewed excitement and enthusiasm for videogames, play, and the spectacles they each provide. </p><img src="https://counter.theconversation.com/content/22435/count.gif" alt="The Conversation" width="1" height="1" />
This month I am trekking around Europe with my partner, and I had the good fortune to be in London on the night of the fifth Wild Rumpus event. In a gallery space in central London on a Saturday night…Brendan Keogh, PhD Candidate, Game Studies, RMIT UniversityLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/207892014-01-13T05:28:58Z2014-01-13T05:28:58ZExplainer: what are memes?<figure><img src="https://images.theconversation.com/files/38926/original/5cwx89t4-1389586191.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">'Success Kid' – with its various slogans – has been an enduring meme of recent years. </span> <span class="attribution"><span class="source">Know Your Meme</span></span></figcaption></figure><p>Nothing defines our use of the internet as clearly as the concept of the meme (<a href="http://www.youtube.com/watch?v=3dErjFPTarc">pronounced “meem”</a>).</p>
<p>Every day, millions of people laugh at <a href="http://knowyourmeme.com/memes/lolcats">LOLcats</a>, <a href="http://knowyourmeme.com/memes/dogshaming">dog shaming</a>, and <a href="http://www.youtube.com/watch?v=f6ZSZbNfSpk">music videos without music</a>, while others <a href="http://knowyourmeme.com/memes/casually-pepper-spray-everything-cop">mock injustice</a>, <a href="http://www.hrc.org/viral">support marriage equality</a>, poke fun at <a href="http://blogs.wsj.com/washwire/2013/08/26/the-nsa-spying-and-your-love-poems/">NSA surveillance</a>, or call out <a href="http://gawker.com/the-saga-of-justine-sacco-twitters-accidental-racist-1487762376">racism</a>.</p>
<p>Virally shared “<a href="http://about.me/colestryker">nuggets of cultural currency</a>” such as these are examples of “memetics”, an important mechanism of meaning that pre-dates the internet but is now central to the the internet’s rising creative comment culture.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/38721/original/5gzyb9qs-1389237469.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/38721/original/5gzyb9qs-1389237469.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/38721/original/5gzyb9qs-1389237469.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=444&fit=crop&dpr=1 600w, https://images.theconversation.com/files/38721/original/5gzyb9qs-1389237469.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=444&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/38721/original/5gzyb9qs-1389237469.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=444&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/38721/original/5gzyb9qs-1389237469.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=558&fit=crop&dpr=1 754w, https://images.theconversation.com/files/38721/original/5gzyb9qs-1389237469.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=558&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/38721/original/5gzyb9qs-1389237469.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=558&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">LOLcats pre-dated the Internet. The left image was taken by Harry Whittier Frees in 1905. The right is ‘Happy Cat’, the first LOLcat, from 2007.</span>
<span class="attribution"><span class="source">Wikipedia / Something Awful / Author</span></span>
</figcaption>
</figure>
<h2>Wow history</h2>
<p>Early in the 1920s, the biologist <a href="http://www.whonamedit.com/doctor.cfm/2650.html">Richard Semon</a> used the term “mnemes” in theorising biologically inheritable memory.</p>
<p><a href="http://www.richarddawkins.net/">Richard Dawkins</a>, in his 1974 book <a href="http://en.wikipedia.org/wiki/The_Selfish_Gene">The Selfish Gene</a>, took a different tack, shortening the Greek term “mimētḗs” (imitator) to coin “meme” as a cultural analogue to the biological gene: a “<a href="http://knowyourmeme.com/memes/copypasta">self-replicating unit of information</a>”.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/38728/original/6m8ffj2x-1389243387.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/38728/original/6m8ffj2x-1389243387.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/38728/original/6m8ffj2x-1389243387.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=187&fit=crop&dpr=1 600w, https://images.theconversation.com/files/38728/original/6m8ffj2x-1389243387.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=187&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/38728/original/6m8ffj2x-1389243387.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=187&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/38728/original/6m8ffj2x-1389243387.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=236&fit=crop&dpr=1 754w, https://images.theconversation.com/files/38728/original/6m8ffj2x-1389243387.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=236&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/38728/original/6m8ffj2x-1389243387.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=236&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Yo Dawg; Yo Dawg Dawkins.</span>
<span class="attribution"><span class="source">Know Your Meme / Author</span></span>
</figcaption>
</figure>
<p>Genes, Dawkins argued, are subject to the forces of <a href="http://www.youtube.com/watch?v=dMH0bHeiRNg">evolution</a>: variation, mutation, competition and inheritance.</p>
<p>On similar principles, certain ideas seem to rise and fall in cultures; the base concepts of <a href="http://knowyourmeme.com/memes/art-student-owl">art</a>, <a href="http://knowyourmeme.com/memes/the-flying-spaghetti-monster">religion</a> and <a href="http://knowyourmeme.com/memes/obama-hope-posters">politics</a> are memes, as are more fleeting trends, fads and fashions.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/38727/original/zmscmv8y-1389242831.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/38727/original/zmscmv8y-1389242831.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/38727/original/zmscmv8y-1389242831.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=181&fit=crop&dpr=1 600w, https://images.theconversation.com/files/38727/original/zmscmv8y-1389242831.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=181&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/38727/original/zmscmv8y-1389242831.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=181&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/38727/original/zmscmv8y-1389242831.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=228&fit=crop&dpr=1 754w, https://images.theconversation.com/files/38727/original/zmscmv8y-1389242831.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=228&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/38727/original/zmscmv8y-1389242831.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=228&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">First day on the Internet Kid; Doge; First day on the Internet Doge.</span>
<span class="attribution"><span class="source">KnowYour Meme / Author</span></span>
</figcaption>
</figure>
<h2>Such replication</h2>
<p>Not all memes are successful, and even “new” memes often bear traces of those that have passed.</p>
<p>Nor are memes static – rather they have three properties by which they evolve existing variations:</p>
<ul>
<li><a href="http://en.wikipedia.org/wiki/Intertextuality">Intertextuality</a>. Memes reference other memes or other concepts, e.g. the <a href="http://knowyourmeme.com/memes/joseph-ducreux-archaic-rap">Joseph Decreaux</a> meme mashes up 18th century art and imagined vernacular with gangsta rap vernacular.</li>
</ul>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/38723/original/gr6c5pdb-1389239407.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/38723/original/gr6c5pdb-1389239407.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/38723/original/gr6c5pdb-1389239407.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=262&fit=crop&dpr=1 600w, https://images.theconversation.com/files/38723/original/gr6c5pdb-1389239407.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=262&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/38723/original/gr6c5pdb-1389239407.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=262&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/38723/original/gr6c5pdb-1389239407.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=329&fit=crop&dpr=1 754w, https://images.theconversation.com/files/38723/original/gr6c5pdb-1389239407.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=329&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/38723/original/gr6c5pdb-1389239407.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=329&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Joseph Decreux 18th Century-Rap mashup meme:</span>
<span class="attribution"><span class="source">Know Your Meme</span></span>
</figcaption>
</figure>
<ul>
<li><a href="http://en.wikipedia.org/wiki/Indexicality">Indexicality</a>. An element in one meme can be used to comment on many situations. “Exploitable” memes such as <a href="http://knowyourmeme.com/memes/disaster-girl">Disaster Girl</a> can be overlaid on to any picture of a disaster.</li>
</ul>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/38730/original/dkdy2g59-1389244121.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/38730/original/dkdy2g59-1389244121.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/38730/original/dkdy2g59-1389244121.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=171&fit=crop&dpr=1 600w, https://images.theconversation.com/files/38730/original/dkdy2g59-1389244121.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=171&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/38730/original/dkdy2g59-1389244121.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=171&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/38730/original/dkdy2g59-1389244121.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=215&fit=crop&dpr=1 754w, https://images.theconversation.com/files/38730/original/dkdy2g59-1389244121.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=215&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/38730/original/dkdy2g59-1389244121.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=215&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Disaster Girl exploitable; Original exploit; Disaster Girl at the London riots.</span>
<span class="attribution"><span class="source">Know Your Meme / Author</span></span>
</figcaption>
</figure>
<ul>
<li><a href="http://seanrintel.com/2013/01/29/crisis-memes-templatability-internet-culture-freedom-of-expression/">Templatability</a>. Memes have recognisable structures with spaces for new content, e.g. “I am in your base, killing your doodz” becomes “I am in your [Noun 1], [Verb-ing] your [Noun 2],” to be reused in multiple contexts.</li>
</ul>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/38733/original/xkpvhh3y-1389246632.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/38733/original/xkpvhh3y-1389246632.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/38733/original/xkpvhh3y-1389246632.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=161&fit=crop&dpr=1 600w, https://images.theconversation.com/files/38733/original/xkpvhh3y-1389246632.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=161&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/38733/original/xkpvhh3y-1389246632.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=161&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/38733/original/xkpvhh3y-1389246632.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=203&fit=crop&dpr=1 754w, https://images.theconversation.com/files/38733/original/xkpvhh3y-1389246632.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=203&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/38733/original/xkpvhh3y-1389246632.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=203&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Original</span>
<span class="attribution"><span class="source">Know Your Meme / Author</span></span>
</figcaption>
</figure>
<p>A meme may be created by an individual or an institution deliberately (many marketing companies now strive to create viral content) or, as often as not, an accidental image, turn-of-phrase or concept will be exploited by a savvy netizen (as was the case for Mitt Romney’s “<a href="http://knowyourmeme.com/memes/events/binders-full-of-women">binders full of women</a>” gaffe).</p>
<h2>So internet</h2>
<p>Genes rely on their hosts for transmission, and memes are no exception: in creating the internet it turns out that we have developed the ultimate meme hothouse.</p>
<p>In <a href="http://www.danah.org/">danah boyd</a>’s terms, the internet is a “<a href="http://www.danah.org/papers/TakenOutOfContext.html">networked public</a>” that has four features highly conducive to making and spreading memes: </p>
<ul>
<li><p><strong>Replicability</strong>. Digital objects are infinitely reproducible and exploitable across a range of platforms.</p></li>
<li><p><strong>Searchability</strong>. Finished versions of memes as well as raw materials and templates are easily found.</p></li>
<li><p><strong>Scalability</strong>. Digital objects are created for a particular audience but with the knowledge that they can spread to an unknowably large audience wherever the internet is available.</p></li>
<li><p><strong>Persistence</strong>. Although individual digital objects may not last as long as analogue objects, they are infinitely transferable and storable in many locations.</p></li>
</ul>
<figure class="align-center ">
<img alt="" src="https://images.theconversation.com/files/38657/original/8spmc4hj-1389159256.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/38657/original/8spmc4hj-1389159256.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=480&fit=crop&dpr=1 600w, https://images.theconversation.com/files/38657/original/8spmc4hj-1389159256.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=480&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/38657/original/8spmc4hj-1389159256.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=480&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/38657/original/8spmc4hj-1389159256.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=603&fit=crop&dpr=1 754w, https://images.theconversation.com/files/38657/original/8spmc4hj-1389159256.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=603&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/38657/original/8spmc4hj-1389159256.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=603&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption">You’re doing it wrong.</span>
<span class="attribution"><span class="source">funnyjunk</span></span>
</figcaption>
</figure>
<p>Variations on a theme is the name of <a href="http://knowyourmeme.com/memes/the-game">the game</a> with memes, as attested to by the huge number of memes posted every day at user-generated content sites such as <a href="http://en.wikipedia.org/wiki/4chan">4chan</a> and <a href="http://en.wikipedia.org/wiki/Reddit">Reddit</a>, and categorised at sites such as the <a href="http://www.cheezburger.com/">Cheezburger Network</a>.</p>
<p>Engines providing both the raw materials and editing capabilities to rapidly produce new instances of common memes have even been developed at sites such as <a href="http://memegenerator.net/">memegenerator.net</a> and <a href="http://imgur.com/memegen">imgur</a> and Cheezburger’s Rage Comic <a href="http://builder.cheezburger.com/builder/rage">LOLBuilder</a>, so that even the technically-challenged can use a meme to express something – as long as they understand the template.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/38731/original/z38kzfy2-1389245674.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/38731/original/z38kzfy2-1389245674.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/38731/original/z38kzfy2-1389245674.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=245&fit=crop&dpr=1 600w, https://images.theconversation.com/files/38731/original/z38kzfy2-1389245674.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=245&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/38731/original/z38kzfy2-1389245674.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=245&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/38731/original/z38kzfy2-1389245674.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=308&fit=crop&dpr=1 754w, https://images.theconversation.com/files/38731/original/z38kzfy2-1389245674.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=308&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/38731/original/z38kzfy2-1389245674.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=308&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Keep X and Carry Y original; Keep X and Carry Y used correctly; Keep X and Carry Y used incorrectly.</span>
<span class="attribution"><span class="source">Know Your Meme / Author</span></span>
</figcaption>
</figure>
<p>You can even find sites such as <a href="http://knowyourmeme.com/">Know Your Meme</a> that actively track, research, and report on the genealogy, forms, and popularity of memes.</p>
<h2>Much important</h2>
<p>One might be forgiven, at this point, for wondering why memes matter beyond entertainment. </p>
<p>Understanding memes is an important way to keep a finger on <a href="https://theconversation.com/the-year-of-the-doge-2013s-top-meme-owes-it-all-to-lolcats-21628">current trends</a> or the <a href="http://dl.dropboxusercontent.com/u/37681185/MILTNER%20DISSERTATION.pdf">appeal of long term trends</a>, but more importantly memes tell us about <a href="http://everydayliteracies.net/files/NewLiteraciesSampler_2007.pdf">new literacies</a>, how people understand <a href="https://theconversation.com/obama-norway-killings-london-riots-you-can-has-a-meme-for-that-2328">crises</a> and how they attempt to effect <a href="http://knowyourmeme.com/blog/interviews/qa-with-cole-stryker-author-of-the-4chan-book-epic-win-for-anonymous">social change</a> through movements such as <a href="http://en.wikipedia.org/wiki/Occupy_movement">Occupy</a> and [Anonymous](http://en.wikipedia.org/wiki/Anonymous_(group), so-called <a href="https://theconversation.com/slacktivism-vs-snarktivism-how-do-you-take-your-online-activism-13180">slacktivism</a>, or <a href="https://theconversation.com/fail-why-memes-were-not-the-key-to-election-2013-17996">electoral engagement</a>.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/38735/original/3w9g3473-1389248944.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/38735/original/3w9g3473-1389248944.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/38735/original/3w9g3473-1389248944.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=262&fit=crop&dpr=1 600w, https://images.theconversation.com/files/38735/original/3w9g3473-1389248944.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=262&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/38735/original/3w9g3473-1389248944.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=262&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/38735/original/3w9g3473-1389248944.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=329&fit=crop&dpr=1 754w, https://images.theconversation.com/files/38735/original/3w9g3473-1389248944.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=329&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/38735/original/3w9g3473-1389248944.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=329&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">2013 Australian Commonwealth election anti-Coalition memes: Australia needs Tony Abbot / Tony Stark fake newspaper front page; Lampooning the Coalition’s NBN policy.</span>
<span class="attribution"><span class="source">Google Images</span></span>
</figcaption>
</figure>
<p>User-generated content is the key concept here because memes are indicative of a change from last century’s passive read-only culture to an active <a href="http://www.time.com/time/business/article/0,8599,1851241,00.html">read-write</a> or <a href="http://produsage.org/produsage">produsage</a>-oriented culture, in which very few resources are needed to broadcast a message to the entire world–<a href="http://www.buzzfeed.com/jennaguillaume/what-happens-when-a-politician-pisses-off-the-internet">as Cory Bernardi has discovered</a>.</p>
<p>Petty as they may seem, then, memes have value and we must protect them as a form of expression when governments and corporations attempt to chill <a href="https://newmatilda.com/2013/11/15/our-future-risk-disclose-tpp-now">fair use</a> of “copyright” materials via treaties such as the <a href="http://works.bepress.com/kimweatherall/27/">Trans-Pacific Partnership Agreement</a>.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/38734/original/6qsy9c9x-1389247213.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/38734/original/6qsy9c9x-1389247213.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/38734/original/6qsy9c9x-1389247213.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=741&fit=crop&dpr=1 600w, https://images.theconversation.com/files/38734/original/6qsy9c9x-1389247213.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=741&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/38734/original/6qsy9c9x-1389247213.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=741&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/38734/original/6qsy9c9x-1389247213.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=931&fit=crop&dpr=1 754w, https://images.theconversation.com/files/38734/original/6qsy9c9x-1389247213.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=931&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/38734/original/6qsy9c9x-1389247213.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=931&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Anti-TPP image that Wikileaks used to publicise its leak of the secretly-negotiated IP chapter of the Trans-Pacific Partnership Agreement.</span>
<span class="attribution"><span class="source">Google Images</span></span>
</figcaption>
</figure><img src="https://counter.theconversation.com/content/20789/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Sean Rintel is the current Chair of Electronic Frontiers Australia.</span></em></p>Nothing defines our use of the internet as clearly as the concept of the meme (pronounced “meem”). Every day, millions of people laugh at LOLcats, dog shaming, and music videos without music, while others…Sean Rintel, Postdoctoral researcher at Microsoft Research Cambridge, previously at, The University of QueenslandLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/216682013-12-20T15:25:59Z2013-12-20T15:25:59ZAnonymity will be the next victim of internet censorship<figure><img src="https://images.theconversation.com/files/38375/original/y9fg7k8h-1387551032.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">The dark web is under threat.</span> <span class="attribution"><span class="source">Fir0002</span></span></figcaption></figure><p>The worrying developments in UK internet freedom over the last year make predictions for 2014 gloomy to say the least. Censorship now affects us all, so we should be thinking about it. And it’s not politically driven censorship we should be most afraid of.</p>
<p>This year has been characterised by tension between the UK government’s use of terrorism laws and free speech and, more recently, by <a href="http://www.bbc.co.uk/news/uk-25430582">concern</a> over the <a href="http://mccullagh.org/misc/articles/cwd.keys.to.the.kingdcom.1996.txt">unavoidable over-blocking</a> of content in the name of protection. Yet there are greater threats to our internet freedom than the heavy hand of the government.</p>
<h2>Oversight versus interference</h2>
<p>Both the government and internet service providers have abdicated responsibility for the quality control of the security filters being put in place in a bid to prevent children from accessing pornographic content at home.</p>
<p>ISPs such as <a href="https://www.openrightsgroup.org/blog/2013/bt-filters-reply">BT</a> and <a href="https://www.openrightsgroup.org/blog/2013/skys-reply-to-org-on-default-internet-filters">Sky</a> have delegated the task of deciding what to block to third party companies. For <a href="http://politics.co.uk/comment-analysis/2013/12/19/comment-three-embarrassing-truths-about-david-cameron-s-porn">accountability</a> and <a href="https://www.openrightsgroup.org/blog/2013/ukccis-overblocking">oversight</a> that is bad news but in terms of possible political interference it is actually good.</p>
<h2>Why censorship?</h2>
<p>There have been three main drivers for internet censorship. One is child abuse imagery, the banning of which is in line with the general population’s views. Websites containing child porn can be taken down, for example through the Internet Watch Foundation, and, since November, <a href="https://theconversation.com/blocks-just-move-child-porn-under-the-counter-20531">search engines have returned warnings and reduced results</a> when certain terms have been searched for. Although porn in general is not illegal, the ISPs’ filters will have an impact on the blocking of child abuse by negatively affecting the distribution of borderline illegal material. </p>
<p>The second driver is combating extremism. It is still unclear how censorship will be applied here, but <a href="https://theconversation.com/blocking-extremist-sites-is-not-the-same-as-fighting-child-porn-20930">classification is highly problematic</a>. No clear public mandate exists for this censorship, nor are links with legislation on issues such as hate speech or proscription of organisations, made explicit. In <a href="http://bt.custhelp.com/app/answers/detail/a_id/46768/kw/parental%20filter/c/346,6679,6680#settingup">its filters</a>, BT does not have an “extremism” category, although some content may fall within its “weapons and violence” or “hate” labels.</p>
<p>The final category is media organisations aiming to protect their copyright. The <a href="http://www.legislation.gov.uk/ukpga/2010/24/contents">2010 Digital Economy Act</a> allows for ISPs to apply sanctions (such as bandwidth restriction and disconnection) to users who have downloaded copyrighted material. ISPs have also been forced to block file sharing websites, such as <a href="http://www.bbc.co.uk/news/technology-17894176">The Pirate Bay</a> and BT includes the practice in its filtering. But file sharing isn’t always illegal and even when it is, public opinion is divided about whether or not it is acceptable. The heavy-handed measures that can be taken show the impact of the commercial interests in this domain.</p>
<h2>Mission creep</h2>
<p>It’s important to note that <a href="http://bt.custhelp.com/app/answers/detail/a_id/46768/kw/parental%20filter/c/346,6679,6680#settingup">BT is filtering in 14 categories</a>, even though David Cameron promised nothing broader than “porn” filters. The generous explanation for this is that the third party providers being used by ISPs already had a range of filtering options in place for parental controls or use in schools, for example filtering against high bandwidth activities like file sharing and media streaming.</p>
<p>More worryingly though, it <a href="http://www.theregister.co.uk/2013/12/17/bt_parental_controls_will_block_proxies_and_anonymiser_sites/">has been reported</a>
that the BT filters also restrict access to sites promoting the use of proxies. This is where the next battle over internet censorship will be fought. Restricting the technological means through which internet users can obscure their IP addresses, obtain some anonymity, and hide the content they are accessing from others is the next big target.</p>
<p>Again, the excuse may be that the third party providers already have this built into their products for good reasons. In the context of school web filters, for example, circumvention of filters needs to be prevented. </p>
<p>But it looks like these measures could well be broadened. The IWF and the Child Exploitation and Online Protection Centre have been<br>
<a href="http://www.theguardian.com/technology/2013/nov/18/online-child-abuse-peer-to-peer">asked to investigate child abuse imagery in the “Dark Web”</a>. The only predictable, and sensible, recommendation for reducing child porn to come out of this will be to restrict access to the Dark Web. And that has to be done by restricting a user’s ability to disguise their activities. </p>
<h2>Media companies and the TTIP</h2>
<p>This by itself will not cause the UK government to restrict access to Tor, VPNs, or proxies in general. However, the media copyright lobby will want to make this happen because peer-to-peer networks, content indexed through torrent sites, possibly using some form of anonymous routing along the way, carry the majority of the “illegal” file sharing load.</p>
<p>Media companies stand to gain significant powers, possibly trumping national legislation, through trade agreements such as <a href="http://www.techdirt.com/articles/20131219/05544825628/actas-back-european-commission-reveals-plans-to-put-corporate-christmas-list-ip-demands-into-taftattip.shtml">TTIP</a>. Using these, they will want to close off all avenues of illegal file sharing, and they are unlikely to care about collateral damage to internet privacy. Thus, we have to worry about restrictions on the use of Tor anonymous routing, VPNs, proxies, and any other ways that allow us to be more anonymous and protected on the internet.</p>
<p>This prediction then brings together the two big internet freedom storylines of the last six months. The government’s desire for quick internet censorship solutions will end up impeding our capacity to defend ourselves against overzealous surveillance from intelligence services and tech companies.</p>
<h2>The Tor fightback</h2>
<p>The good news is that Tor traffic has <a href="http://www.youtube.com/watch?v=GwMr8Xl7JMQ">proved hard to detect and shut down</a>. Many countries have tried and failed. Security companies claiming to have the required technology typically are only able to block older versions.</p>
<p>These days, Tor connections look like normal secure web traffic. Currently only China systematically and openly blocks Tor (with its Great Firewall) for long periods of time. They do this by blocking the eight “directory authorities” that form the entry point to Tor, in combination with Deep Packet Inspection. In response, the Tor project continually develops new camouflage methods, and also <a href="https://ooni.torproject.org/">very promising tools for detecting internet censorship</a>. It is very sad that we may be using this tool sometime soon in the UK, and that Russia and Japan have been reported to be considering blocking Tor. All is not lost, but we should be on our guard.</p><img src="https://counter.theconversation.com/content/21668/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Eerke Boiten is a senior lecturer in the School of Computing at the University of Kent, and Director of the University's interdisciplinary Centre for Cyber Security Research. He receives funding from EPSRC for the CryptoForma Network of Excellence on Cryptography and Formal Methods. </span></em></p><p class="fine-print"><em><span>Julio Hernandez-Castro does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>The worrying developments in UK internet freedom over the last year make predictions for 2014 gloomy to say the least. Censorship now affects us all, so we should be thinking about it. And it’s not politically…Eerke Boiten, Senior Lecturer, School of Computing and Director of Interdisciplinary Cyber Security Centre, University of KentLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/208292013-12-12T02:29:50Z2013-12-12T02:29:50ZCelebrity fakes – where porn meets a sense of possession<figure><img src="https://images.theconversation.com/files/37457/original/f44s4rbg-1386740717.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">Stars such as Paris Hilton are appropriated by those creating celebrity fake porn.</span> <span class="attribution"><span class="source">Paul Buck/EPA</span></span></figcaption></figure><p>You may or may not have heard about the online practice of celebrity fakes. Website after website, one can find images of the most famous in some of the most hardcore pornographic poses. One of those sites, Celebrity Fake, constructs a complete archive of thousands of celebrities organised by name and country of fame. So what’s going on here, and why aren’t we seeing any law suits?</p>
<p>Miley Cyrus, along with other Disney alumni such as <a href="http://www.imdb.com/name/nm1411125/bio">Selena Gomez</a> are remarkably prominent and are linked to the most popular on the site’s home page; but the sheer number is unbelievable. Cyrus is found in 432 of these fake pornographic poses. </p>
<p>No-one is spared and very few are sacred: there are 182 images of Princess Diana, 36 of 50-something film actress Annette Benning, 195 of the tennis star Maria Sharapova. </p>
<p>In listings for Australia, Cate Blanchett is reformed in 124 poses; Julia Gillard, six; Kylie Minogue, 524; Libby Trickett, three, and so on for more than 150 famous Australian women. </p>
<p>Googling the phrase “celebrity fake porn” returns 37.3 million sites; “celebrity porn” generates 170 million; and “celebrity porn sites”, 60.5 million.</p>
<p>The phenomenon is hard to fathom and intriguing to analyse. First of all, one would expect that the circulation of false images of very famous people would generate a torrent of lawsuits. </p>
<p>Famed individuals have spent years constructing their public personas and built fortunes related to their public identities so one might think those same individuals would be outraged sufficiently to generate suits and litigation. For decades, scandal and celebrity magazines have been pursued by celebrities with some success. </p>
<p>Impersonation is generally prosecuted by stars and these images are putting their face on someone else’s body and thereby producing a form of impersonation. Recent examples where stars have prosecuted impersonators include</p>
<ul>
<li><p>Tom Waits successfully <a href="http://www.billboard.com/biz/articles/news/1406275/tom-waits-sues-for-voice-imitation">suing</a> Opel – a GM-owned car manufacturer, for using a sound-alike gravelly voice to accompany their television commercials</p></li>
<li><p>Lindsay Lohan unsuccessfully suing E-Trade, a financial services company, for a baby called “Lindsay” in their 2010 <a href="https://www.youtube.com/watch?v=5QS9rIZcjaw">Superbowl-released commercial</a> who was called a “milkaholic”</p></li>
<li><p>Robin Williams pursuing the prosecution of man impersonating him for <a href="http://news.bbc.co.uk/2/hi/entertainment/4553999.stm">financial gain at events in Texas</a>.</p></li>
</ul>
<p>In Australia, Greens Senator Sarah Hanson-Young is advancing with some success in <a href="http://www.pedestrian.tv/news/arts-and-culture/greens-senator-sarah-hanson-young-to-sue-zoo-weekl/1b563c4e-c124-43f7-8d89-3740765909ee.htm">suing Zoo magazine</a> for publishing a photoshopped lingerie-clad image of her in a rather bizarre, tasteless and obviously humorous campaign to find the hottest asylum seeker.</p>
<h2>Litigation</h2>
<p>But it’s difficult to find any lawsuits against fake celebrity porn sites. One of the key reasons might be the awkward position celebrities inhabit in the public world. In most legal jurisdictions (though not all), it is permissible to parody or satirise a public individual and this allows the use of an identity in this way. </p>
<p>The famous impersonators such as <a href="http://www.imdb.com/name/nm0514648/bio">Rich Little</a> – “The Man of a Thousand Voices” – were seen as entertainers. The brilliant 2009 brilliant parody of George W Bush interviewing himself by <a href="https://www.youtube.com/watch?v=ikMKJwbMQ_M">Will Ferrell</a> (below) is certainly worth protecting from litigation. Celebrities operate with slightly different rules in terms of the privacy of their identity – to a degree their personas are in the public domain. </p>
<figure>
<iframe width="440" height="260" src="https://www.youtube.com/embed/ikMKJwbMQ_M?wmode=transparent&start=0" frameborder="0" allowfullscreen=""></iframe>
</figure>
<p>Two other factors make litigation difficult:</p>
<p>1) images are generally owned by the photographer or the agency and it is at least partially up to those people to be initiating legal action and thus celebrities may not be the starting point for any lawsuit. </p>
<p>2) perhaps it is just embarrassing for celebrities to draw attention to celebrity fake porn – after all it is their face that has been used and to draw further scrutiny might be seen as further sullying reputations and images. </p>
<p>From a legal standpoint, the websites make it very clear that the images are fake and this makes advancing a defamation case more difficult and even makes <a href="http://www.law.cornell.edu/constitution/first_amendment">American first amendment</a> defences possible to fail. </p>
<p>In this way, it is different to an emerging online issue generating legislation and legal action – <a href="http://edition.cnn.com/2013/12/10/justice/california-revenge-porn-arrest/index.html?hpt=hp_t2">revenge porn</a>, which is much easier to establish its defaming qualities because of its claim to truth in the images distributed.</p>
<p>The end-result for the celebrity would be an inordinate refocus on what they would not – presumably – want people to associate with them.</p>
<h2>A growth industry</h2>
<p>As this legal inertia continues, there is no question the universe of celebrity fake porn is expanding, partially driven by user-generated content. </p>
<p>There are many YouTube videos guiding individuals to use Photoshop to make celebrity fakes. Other YouTube videos provide point-by-point instructions in how Photoshop can be used to remove clothing from an electronic image. </p>
<figure class="align-left zoomable">
<a href="https://images.theconversation.com/files/37460/original/85sw688j-1386740886.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/37460/original/85sw688j-1386740886.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/37460/original/85sw688j-1386740886.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=782&fit=crop&dpr=1 600w, https://images.theconversation.com/files/37460/original/85sw688j-1386740886.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=782&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/37460/original/85sw688j-1386740886.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=782&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/37460/original/85sw688j-1386740886.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=983&fit=crop&dpr=1 754w, https://images.theconversation.com/files/37460/original/85sw688j-1386740886.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=983&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/37460/original/85sw688j-1386740886.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=983&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Kylie Minogue.</span>
<span class="attribution"><span class="source">Jens Kalaene/EPA</span></span>
</figcaption>
</figure>
<p>This uploading of Photoshop production techniques of celebrity fakes by “amateurs” is encouraged by the key sites; moreover, these sites also encourage users to “request” new celebrity subjects to be made into celebrity fakes. </p>
<p>It’s important to note that celebrity fake porn is potentially major entry point into online pornography and serves to link many pornography sites as users move through images. In other words, celebrity fakes do what celebrities do at red-carpet events: they attract attention and that attention is valuable for both the website and those linked to that website. </p>
<p>In that sense, they merely replicate the way the online advertising and promotional economy operates.</p>
<h2>Why now?</h2>
<p>That brings us to the last two key questions: what is the particular fascination with celebrity fake porn and why now? </p>
<p>Although there have been precursors to celebrity pornography with magazines such as Celebrity Skins or nude profiles of very famous celebrities appearing as far back as Marilyn Monroe in Playboy, Vanessa Williams in Penthouse or Paris Hilton more recently in FHM, the nature and dimensions of celebrity fakes are quite different. </p>
<p>As with most pornography, the fabricated graphic images presented are generally of women, with less than 5% of all the images being of male public personalities. The target audience – given the images of famous men predominantly resemble gay male pornography – appears to be male. </p>
<p>It is also different to the regular and tired phenomenon of what used to be called the “sex tapes”, immortalised by Rob Lowe in 1988 when a videotape was leaked of him having sex with two women, and expanded through the activities of drawing attention to what would be described as scandalous and sometimes illegal activity. </p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/37448/original/nqwscym2-1386739632.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/37448/original/nqwscym2-1386739632.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/37448/original/nqwscym2-1386739632.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=429&fit=crop&dpr=1 600w, https://images.theconversation.com/files/37448/original/nqwscym2-1386739632.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=429&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/37448/original/nqwscym2-1386739632.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=429&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/37448/original/nqwscym2-1386739632.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=539&fit=crop&dpr=1 754w, https://images.theconversation.com/files/37448/original/nqwscym2-1386739632.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=539&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/37448/original/nqwscym2-1386739632.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=539&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Miley Cyrus.</span>
<span class="attribution"><span class="source">Jason Szenes/EPA</span></span>
</figcaption>
</figure>
<p>This practice has been expanded and utilised to maintain the attention of the celebrity press by icons such as Paris Hilton or Kim Kardashian. To a degree, Miley Cyrus’ efforts at defining herself as an adult and not a child through her videos, her <a href="http://www.youtube.com/watch?v=CORXJci6H7E">twerking</a>, and her provocative comments are at least part of this same construction of scandal and attention-seeking that is ever-present in contemporary entertainment culture.</p>
<p>Celebrity fake porn is in some ways much more mundane and ordinary. It is clearly a play in the world of private and public. What it allows its audience to do is to move what is part of the public world and migrate it into a private world. This migration is more than the tawdry use of pornography for sexual pleasure. </p>
<p>It represents a form of possession of a public figure, a fantasy belief in the capacity of complete revelation and exposure of the public personality. This is its tonic for the user. </p>
<p>The images themselves are very often obscene and degrading in their graphic bodily detail and this identifies a further form of possession and ownership that is heightened because of the fame and value of the personality. </p>
<p>Because porn still represents something hidden and perhaps undiscussed publicly, celebrity fakes remain an underworld. But online culture in its capacity to distribute and its encouragement of user generation, produces a different form of public culture, a culture that presents new challenges to protecting one’s image. </p>
<p><em>Note: The author would like to thank Professor Andrew Kenyon for his insights into the legal implications for public figures.</em></p><img src="https://counter.theconversation.com/content/20829/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>P. David Marshall does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>You may or may not have heard about the online practice of celebrity fakes. Website after website, one can find images of the most famous in some of the most hardcore pornographic poses. One of those sites…P. David Marshall, Professor and Personal Chair in New Media, Communication and Cultural Studies, Deakin UniversityLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/181782013-09-13T06:06:20Z2013-09-13T06:06:20ZNBN petition and the backlash: when does democracy speak?<figure><img src="https://images.theconversation.com/files/31290/original/cc8gyhh6-1379050218.jpg?ixlib=rb-1.1.0&rect=7%2C256%2C1016%2C510&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">The vision of a fibre-to-the-home National Broadband Network continues for some.</span> <span class="attribution"><span class="source">J e n s</span></span></figcaption></figure><p>Australian social media users and civil society groups are mobilising against Coalition communications spokesperson Malcolm Turnbull’s implication today that <a href="http://www.malcolmturnbull.com.au/media/our-nbn-policy#.UjKf6WStzvY">democracy has spoken</a> through the election process on the issue of the National Broadband Network (<a href="https://theconversation.com/can-australia-afford-the-coalitions-nbn-17494">NBN</a>).</p>
<figure class="align-right zoomable">
<a href="https://images.theconversation.com/files/31287/original/6rjb6myt-1379048294.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/31287/original/6rjb6myt-1379048294.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/31287/original/6rjb6myt-1379048294.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=565&fit=crop&dpr=1 600w, https://images.theconversation.com/files/31287/original/6rjb6myt-1379048294.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=565&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/31287/original/6rjb6myt-1379048294.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=565&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/31287/original/6rjb6myt-1379048294.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=710&fit=crop&dpr=1 754w, https://images.theconversation.com/files/31287/original/6rjb6myt-1379048294.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=710&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/31287/original/6rjb6myt-1379048294.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=710&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">The I want the right NBN! site shows a real-time count of the NBN petition signatures.</span>
<span class="attribution"><span class="source">iwantthenbn.com</span></span>
</figcaption>
</figure>
<p>On election day last Saturday, Nick Paine, a self-identifying Liberal-voting Queensland business student, started a <a href="http://www.change.org/en-AU/petitions/the-liberal-party-of-australia-reconsider-your-plan-for-a-fttn-nbn-in-favour-of-a-superior-ftth-nbn">Change.org petition</a> to save the Australian Labor Party’s fibre-to-the-premises (<a href="http://en.wikipedia.org/wiki/Fiber_to_the_x#FTTP">FTTP</a>) NBN. FTTP, also known as fibre-to-the-home (FTTH), delivers optic fibre directly to premises.</p>
<p>Social media users have since shared the petition rapidly and widely. The petition had garnered 1000 signatures by the end of September 7, but in the five days since, that number has surged to more than 216,000 signatures, climbing as fast as <a href="http://www.news.com.au/breaking-news/national/one-name-every-35-sec-on-nbn-petition/story-e6frfku9-1226716828065">one name per 3.5 seconds</a>.</p>
<p>In rejecting the petition in a blog post on his website, Turnbull not only brought on rancour about the <a href="http://savethenbn.com/">perceived superiority of a FTTP NBN</a> over the Liberal National Party’s slower fibre to the node (<a href="http://en.wikipedia.org/wiki/Fiber_to_the_x#Fiber_to_the_node">FTTN</a>) NBN - which uses optic fibre to cabinets placed around neighbourhoods, and existing copper wire from cabinets to buildings – but also appeared to dismiss democratic debate outside of elections. </p>
<p>Furore has erupted over Turnbull’s snarky response to Twitter user <a href="https://twitter.com/PhillipTyson">Phillip Tyson</a>: </p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/31289/original/dstkp3gs-1379050071.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/31289/original/dstkp3gs-1379050071.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/31289/original/dstkp3gs-1379050071.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=371&fit=crop&dpr=1 600w, https://images.theconversation.com/files/31289/original/dstkp3gs-1379050071.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=371&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/31289/original/dstkp3gs-1379050071.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=371&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/31289/original/dstkp3gs-1379050071.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=466&fit=crop&dpr=1 754w, https://images.theconversation.com/files/31289/original/dstkp3gs-1379050071.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=466&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/31289/original/dstkp3gs-1379050071.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=466&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption"></span>
<span class="attribution"><span class="source">Twitter</span></span>
</figcaption>
</figure>
<p>While some commentators claim that such mobilisation is of <a href="http://www.zdnet.com/au/petitions-and-twibbons-wont-save-the-nbn-7000020528/">limited value</a>, perhaps even just <a href="https://theconversation.com/slacktivism-vs-snarktivism-how-do-you-take-your-online-activism-13180">slacktivism</a> (internet users who support or protest a cause in a way that often requires little to no effort), civil society groups such as Electronic Frontiers Australia (EFA), of which I am a board member, strongly reject this position.</p>
<p>Journalist Josh Taylor at ZDNet <a href="http://www.zdnet.com/au/petitions-and-twibbons-wont-save-the-nbn-7000020528/">points out</a> that the largest Change.org petition prior to the current one was that asking advertisers to <a href="http://www.change.org/alanjones">cease associating</a> with 2GB radio station’s shock-jock Alan Jones. Taylor notes that:</p>
<blockquote>
<p>Although 2GB temporarily suspended advertising on the station, and some advertisers left, Jones’ show continues, and his audience share remains relatively stable.</p>
</blockquote>
<p>Taylor also points out that “joke petitions” to politicians are on the rise, such as calling on the <a href="http://theweek.com/article/index/238746/the-white-houses-nerd-delighting-death-star-petition-response">White House to build a Death Star</a> earlier this year (which elicited a <a href="https://petitions.whitehouse.gov/response/isnt-petition-response-youre-looking">response</a>).</p>
<p>The implication of both points is that the value of such petitions is diluted, at best, and may be self-diluting given the combination of knee-jerk reactions and irony at which users excel.</p>
<p>But when it comes to internet issues in particular, such petitions and social media action can have profound effects. The best example is the 2012 backdown of both House and Senate backers of the draconian <a href="https://theconversation.com/topics/sopa">Stop Online Piracy Act (SOPA) and PROTECT IP Act (PIPA)</a> in the face of a <a href="http://latimesblogs.latimes.com/technology/2012/01/google-anti-sopa-petition.html">4.5 million signature petition from Google</a> and the concurrent day of the <a href="http://en.wikipedia.org/wiki/Protests_against_SOPA_and_PIPA">Internet Blackout</a>. </p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/31294/original/p7cnvjvz-1379051575.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/31294/original/p7cnvjvz-1379051575.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/31294/original/p7cnvjvz-1379051575.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=414&fit=crop&dpr=1 600w, https://images.theconversation.com/files/31294/original/p7cnvjvz-1379051575.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=414&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/31294/original/p7cnvjvz-1379051575.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=414&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/31294/original/p7cnvjvz-1379051575.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=521&fit=crop&dpr=1 754w, https://images.theconversation.com/files/31294/original/p7cnvjvz-1379051575.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=521&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/31294/original/p7cnvjvz-1379051575.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=521&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption"></span>
<span class="attribution"><span class="source">Nomadic Lass</span></span>
</figcaption>
</figure>
<p>This was the largest and <a href="http://sopastrike.com/">most successful online protest</a> in history, effectively crushing the political will to push though the bills.</p>
<p>As a crude comparison, the 4.5 million signatures on the Google petition (from a global audience) represented about 1.4% of the population of the United States (313.9 million). </p>
<p>The 236,361 (as of September 14) signatures on the NBN petition represent 1.04% of Australia’s 22.69 million population. So in terms of proportional raw interest, the Australian NBN petition should be treated by Malcolm Turnbull as extremely significant. </p>
<p>Further, it should be treated as a spur to those engaged in social activism that their cause does, indeed, have momentum.</p>
<p>Of course, one difference between SOPA/PIPA and the NBN petition is that SOPA/PIPA had a direct and easily measurable aim: stopping the bills being signed. Australian NBN activists have a much tougher road ahead to push for a FTTP NBN, which has been vigorously opposed all along by the Coalition.</p>
<p>But social activists should not be deterred. The most practical and valuable action that FTTP NBN supporters should propose is for the Liberal National Party to expand the scope of its <a href="http://www.abc.net.au/news/2013-09-12/malcolm-turnbull-labels-anti-nbn-petition-reckless/4954858">proposed review</a> to determine the costs and timeframe of the current FTTP NBN. The review’s current process is rather opaque and thus potentially a rubber-stamp exercise for the new government’s FTTN plan:</p>
<blockquote>
<p>There will be a strategic review conducted within the next 60 days which will show how long it will take and how much it will cost to complete the NBN on the current specifications and what that means both to the taxpayer and to the consumers.</p>
</blockquote>
<p>The new government could begin to mend some of the damage to its brand – and Turnbull’s brand in particular – by increasing the transparency and scope of the review to include civil society groups and extensive community consultation. Clearly groups such as EFA would wish to be involved, but so might other groups and constituencies.</p>
<figure class="align-center ">
<img alt="" src="https://images.theconversation.com/files/31293/original/cs4y5yvz-1379051524.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/31293/original/cs4y5yvz-1379051524.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=430&fit=crop&dpr=1 600w, https://images.theconversation.com/files/31293/original/cs4y5yvz-1379051524.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=430&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/31293/original/cs4y5yvz-1379051524.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=430&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/31293/original/cs4y5yvz-1379051524.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=541&fit=crop&dpr=1 754w, https://images.theconversation.com/files/31293/original/cs4y5yvz-1379051524.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=541&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/31293/original/cs4y5yvz-1379051524.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=541&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption"></span>
</figcaption>
</figure>
<p>Malcolm Turnbull may believe that democracy has spoken; but now is the time for democracy to shout back.</p>
<p>The <a href="https://storify.com/">Storify</a> collection below shows a reasonable sample of the social media activity on this issue. As well as more of the introductory material, the collection shows some of the variation in anti-Turnbull sentiment:</p>
<p></p><div class="storify"><p></p>
<iframe src="https://storify.com/seanrintel/australian-social-media-users-fight-to-save-the-nb/embed" width="100%" height="750" frameborder="no" allowtransparency="true"></iframe>
<p></p></div><p></p>
<p><br>
<br></p>
<p><strong><em>Correction: This article was amended on September 16, 2013. In a previous version, Malcolm Turnbull was quoted as stating “democracy has spoken”. The Conversation acknowledges that this direct quote was inaccurate.</em></strong></p><img src="https://counter.theconversation.com/content/18178/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Sean Rintel is a Board Member and Life Member of Electronic Frontiers Australia.</span></em></p>Australian social media users and civil society groups are mobilising against Coalition communications spokesperson Malcolm Turnbull’s implication today that democracy has spoken through the election process…Sean Rintel, Lecturer in Strategic Communication, The University of QueenslandLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/179192013-09-06T01:46:01Z2013-09-06T01:46:01ZOpt-out, opt-in: the internet filter hokey pokey<figure><img src="https://images.theconversation.com/files/30840/original/7jvzmq7q-1378427657.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">A 'badly worded sentence or two' put shadow communications minister Malcolm Turnbull on the back foot yesterday.</span> <span class="attribution"><span class="source">AAP/Dan Himbrechts</span></span></figcaption></figure><p>As of last night both major Australian political parties can claim to have at one time backed and then rejected internet filters. Is this an epic win for netizens? Yes, for the battle against censorship; no for the larger war for comprehensive digital rights.</p>
<p>Liberal Party MP Paul Fletcher yesterday released <a href="http://www.scribd.com/doc/165687822/Coalition-2013-Election-Policy-%E2%80%93-Enhance-Online-Safety-final">The Coalition’s Policy to Enhance Online Safety for Children</a>, which included a proposal for a UK-style mandatory opt-out Australia-wide internet filter. </p>
<p>At 5:30pm Malcolm Turnbull, apparently caught on the hop, <a href="https://soundcloud.com/triple-j-hack/malcolm-turnbull-explains?utm_source=soundcloud&utm_campaign=share&utm_medium=twitter">defended the policy</a> on Triple J’s Hack program:</p>
<blockquote>
<p>What [our policy] does is essentially install that software either in the smartphone or in the modem as a default which you can switch off but then that’s at your call.</p>
</blockquote>
<p>Then the internet exploded. Australian Twitter users took to the tweets and Facebook users set their statuses to stun. The backlash angrily denounced the filter as unwarranted censorship, as a chilling effect on free speech, but most damningly, apparently, to further slowing down the already likely slower speed of the Coalition’s proposed <a href="https://theconversation.com/a-tale-of-two-nbns-the-coalitions-broadband-policy-explained-13304">fibre to the node (FTTN) national broadband network</a>.</p>
<p>While Mr Fletcher continued to argue for the value of a filter for reducing the confusion of filter choices, by 11pm the Coalition <a href="http://www.zdnet.com/au/coalition-backflips-on-internet-filtering-policy-7000020282/">backflipped</a>. Malcolm Turnbull lead the charge and took the fall in a number of tweets from his <a href="https://twitter.com/TurnbullMalcolm">@TurbullMalcolm</a> account, claiming it was a mistake and that the Coalition opposed filtering on principle.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/30837/original/v8rxcm49-1378426939.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/30837/original/v8rxcm49-1378426939.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/30837/original/v8rxcm49-1378426939.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=194&fit=crop&dpr=1 600w, https://images.theconversation.com/files/30837/original/v8rxcm49-1378426939.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=194&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/30837/original/v8rxcm49-1378426939.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=194&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/30837/original/v8rxcm49-1378426939.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=243&fit=crop&dpr=1 754w, https://images.theconversation.com/files/30837/original/v8rxcm49-1378426939.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=243&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/30837/original/v8rxcm49-1378426939.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=243&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption"></span>
<span class="attribution"><span class="source">Twitter</span></span>
</figcaption>
</figure>
<p>Mr Turnbull also argued later that such that filters are <a href="http://www.theage.com.au/federal-politics/federal-election-2013/coalition-announces-internet-filter--and-immediately-backs-down-20130905-2t7nb.html">unworkable</a>. Tony Abbott agreed that it was a “failure of quality control” and that the Rudd government was the only government to <a href="http://www.theage.com.au/federal-politics/federal-election-2013/coalition-announces-internet-filter--and-immediately-backs-down-20130905-2t7nb.html">support internet filtering</a>.</p>
<p>The Coalition is still dealing with its error in the media this morning, pushing the “mistakes were made” angle, although the “administrative error” defence did not work very well for the Wikileaks party preferencing <a href="http://www.crikey.com.au/2013/08/19/wikileaks-partys-administrative-errors-incense-greens/">blunder</a> earlier in the campaign.</p>
<h2>The ALP tango</h2>
<p>Mr Abbott’s claim that the Rudd government supported filtering was in reference to Steven Conroy’s long-standing attempt to bring internet filtering to Australia. Mr Conroy’s plan was vigorously opposed for several years by civil liberties groups such as <a href="https://www.efa.org.au/">Electronic Frontiers Australia</a> (of which I am a board member) in its <a href="https://www.facebook.com/openinternet">Open Internet campaign</a>.</p>
<p>Such groups point to numerous reasons why such filters are unworkable (see our <a href="https://www.efa.org.au/Issues/Censor/cens2.html">Internet Content Filtering and Blocking page</a> and <a href="https://www.efa.org.au/mandatory-internet-filtering-fact-sheets/">fact sheets</a>).</p>
<p>Mr Conroy eventually <a href="https://www.efa.org.au/2012/11/09/internet-filtering-backdown/">backed down</a> in November 2012.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/30834/original/bqgjjj8c-1378424497.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/30834/original/bqgjjj8c-1378424497.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/30834/original/bqgjjj8c-1378424497.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=449&fit=crop&dpr=1 600w, https://images.theconversation.com/files/30834/original/bqgjjj8c-1378424497.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=449&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/30834/original/bqgjjj8c-1378424497.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=449&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/30834/original/bqgjjj8c-1378424497.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=565&fit=crop&dpr=1 754w, https://images.theconversation.com/files/30834/original/bqgjjj8c-1378424497.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=565&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/30834/original/bqgjjj8c-1378424497.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=565&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption"></span>
<span class="attribution"><span class="source">Sally06</span></span>
</figcaption>
</figure>
<h2>The war is ongoing</h2>
<p>Australia’s politicians will sashay away from unpopular individual policies - sometimes slowly, sometimes rapidly - but, as <a href="https://theconversation.com/electoral-silence-on-digital-rights-from-both-politicians-and-journalists-17135">I have noted</a> previously in this election, politicians and journalists have largely been silent on comprehensive policies for positive digital rights.</p>
<p>Both the ALP and the LNP policy announcements concentrate almost on the cost and aspirational benefits of their NBN infrastructure plans. As part of their official policy platforms documents, both <a href="http://greens.org.au/sites/greens.org.au/files/election_platform_screen.pdf">The Greens</a> and the <a href="http://pirateparty.org.au/wiki/Platform">Pirate Party Australia</a> treat the NBN as necessarily also requiring a parallel commitment to a range of digital rights issues.</p>
<p>Electronic Frontiers Australia’s <a href="https://www.efa.org.au/election2013/">Election 2013 scorecard</a> shows that only these two parties have a consistent positive position on surveillance, copyright and censorship.</p>
<p>Whatever the outcome of tomorrow’s election, yesterday’s filtering backflip by the Coalition is in large part due to the power of social media’s amplification effect when used by an angry populace. Elections may be the showcase event, but when it comes to digital rights they are no longer the only game in town.</p>
<p>Australians have an opportunity in the election, and the period immediately following, to move beyond negative reactions to individual digital policies and push towards lobbying whoever is in government for a considered holistic approach to our digital rights.</p><img src="https://counter.theconversation.com/content/17919/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Sean Rintel is a life member and board member of Electronic Frontiers Australia.
</span></em></p>As of last night both major Australian political parties can claim to have at one time backed and then rejected internet filters. Is this an epic win for netizens? Yes, for the battle against censorship…Sean Rintel, Lecturer in Strategic Communication, The University of QueenslandLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/166102013-08-01T03:03:45Z2013-08-01T03:03:45ZXKeyscore and NSA surveillance leaks – expert reaction<figure><img src="https://images.theconversation.com/files/28469/original/t5wgmkfg-1375321802.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">What are the implications of the latest leaks by NSA whistleblower Edward Snowden?</span> <span class="attribution"><span class="source">Pigstick1</span></span></figcaption></figure><p>XKeyscore is an online surveillance tool run by America’s National Security Agency (NSA) that allows analysts to search contents of chats, emails and browsing histories without warrants, according to leaked slides from CIA whistleblower <a href="http://www.theguardian.com/world/edward-snowden">Edward Snowden</a>.</p>
<p>The slides, published in <a href="http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data">The Guardian</a> today, seem to support claims XKeyscore can search “nearly everything a typical user does on the internet” and in one 30-day period in 2012, collected and stored nearly 42 billion records.</p>
<p>The NSA slides declare some 300 terrorists were caught using XKeystroke technology by 2008.</p>
<p>Our experts respond below.
<br></p>
<p><strong>Philip Branch, Senior Lecturer in Telecommunications at Swinburne University of Technology</strong></p>
<p>The program appears to be a datamining tool especially designed for intelligence gathering. In the same way as businesses are getting into “big data” in order to understand their customers, consumer trends and the like, the US intelligence community appear to have been doing much the same thing. </p>
<p>We know that they see a big chunk of the world’s internet traffic. They have access points around the world to access other forms of electronic communication. </p>
<p>This program seems to be a system for scanning for markers that may identify potential terrorists. If, as they claim, it has identified 300 or more potential terrorists it would seem to have been a success.</p>
<p>The way it appears to work is similar to other datamining techniques. It looks at content, probably for keywords, and at metadata such as source and destination addresses, or phone numbers. </p>
<p>To identify potential threats it looks for anomalies. Examples given are language unusual for that region, looking for dubious material on the internet, and, very intriguingly, the use of encryption. </p>
<p>It appears that they have taken to heart the saying that “if you have nothing to hide, you have nothing to worry about” and reinterpreted it as “if you have something to hide, perhaps you do have something we should worry about”.</p>
<p>One of the very interesting things is that they can identify individual devices. This is perhaps not as dramatic as might appear at first. It’s well known that financial institutions have been tracking individuals for a long time. Even though IP addresses change, there is enough other information to identify most machines. </p>
<p>If you are using a browser, there’s a lot of information about how it is configured. Often the configuration is unusual enough to identify uniquely the individual. The browser you use, the plug-ins, the cookies that are set, are all able to identify a user, in the sense that it is the same user we saw before.</p>
<p>So, again, the latest revelations are interesting but not necessarily unexpected. We know businesses have been using these techniques for some time. It would be remarkable if the intelligence agencies weren’t.
<br></p>
<p><strong>Sean Rintel, Lecturer in Strategic Communication at University of Queensland and board member of Electronic Frontiers Australia</strong></p>
<p>It is clearer now than ever that, since we can’t retrospectively change these surveillance technologies, and indeed there may be valid uses of them, citizens of all countries need to stand together to demand three new kinds of digital rights.</p>
<ol>
<li><p>We must have rights to personal data control. Knowing what, when, and how much of our personal data has been collected, and which agencies have access it to it.</p></li>
<li><p>We must have rights to transparent security institution oversight. Parliamentary and legal procedures must be in place to ensure that all searches of such data require strictly evidenced belief that a search is necessary, that searches are narrowly targeted, and that citizens have methods to access the details of such proceedings.</p></li>
<li><p>We must have rights to meaningful checks and responses to abuses. If there is any kind of problem with the use or integrity of data in such systems (such as overreach of searches, searches for non-security/law-enforcement purposes, data breaches) then citizens must have the right to meaningful civil and legal recourse. News website Mashable is currently running a campaign to crowdsource a <a href="http://mashable.com/2013/07/01/digital-bill-of-rights/">digital bill of rights</a>.</p></li>
</ol>
<p>Australians should be involved in that because some of our traffic relies on US services and, as such, US laws. Australians should also engage with their political parties and civil society groups, such as <a href="https://www.efa.org.au/">Electronic Frontiers Australia</a> (of which I am a board member) and its <a href="https://www.citizensnotsuspects.org.au/">Citizens Not Suspects campaign</a>. </p>
<p>With an election looming, now is the time for meaningful action. Whether or not one trusts our government or others, trusts security services/law enforcement or not, or believes that it is or is not reasonable to trade privacy for security, new digital rights to choice, control, and transparency will ensure our civil security.
<br></p>
<p><strong>John Lenarcic, Lecturer in Business IT and Logistics at RMIT University</strong></p>
<p>The genie may already be out of the bottle with respect to privacy. Way back in 1999, the then-CEO of Sun Microsystems Scott McNealy infamously <a href="http://www.wired.com/politics/law/news/1999/01/17538">proclaimed</a>:</p>
<blockquote>
<p>You have zero privacy anyway. Get over it.</p>
</blockquote>
<p>The social media revolution, while diminishing privacy in some respect to users, made it the salient issue of our era. And the NSA deployment of systems such as XKeyscore has once again brought the security versus privacy debate to the fore. </p>
<p>But security and privacy are needs that co-exist at times in an inverse relationship to each other. If eavesdropping on telecommunications leads to terrorists being nabbed then what’s the hassle, according to the NSA? </p>
<p>This is a NSA-brand of utilitarianism whereby the ends justifies the means. The strict (or even not so rigid) Kantians among us, though, may gasp in horror at the antics of the NSA if we believe in protecting privacy. </p>
<p>Indeed, this is a moral dilemma that is rapidly unfurling before our very eyes. As they say in the classics, life wasn’t meant to be easy …
<br></p>
<p><strong>James Hamlyn-Harris, Lecturer in Information & Communication Technologies at Swinburne University of Technology</strong></p>
<p>We can infer from the name and the terminology used in the slides that XKeyscore is a search engine which uses search terms and filters to narrow the search field. </p>
<p>The more information you give it, the fewer (and more relevant) hits will be returned. </p>
<p>Rather than returning a specific result, it will return a ranked list of results (ranked by “keyscore”) depending on how many search terms and filters matched each searched entry. </p>
<p>This means that searching for an email address (mostly unique) will return a very relevant list of entries, but searching a set of vague search terms or filters (such as traffic on this domain, between these dates, containing these words send by this user agent, or browser, with these plug-ins) will return a big list of hits ranked by relevance.</p>
<p>A human will look at the results and make judgements about which results are useful or actionable.</p>
<p><br>
<strong>Further reading:</strong><br>
For The Conversation’s coverage on the NSA leaks and their aftermath, <a href="https://theconversation.com/topics/nsa-leaks">click here</a>. </p><img src="https://counter.theconversation.com/content/16610/count.gif" alt="The Conversation" width="1" height="1" />
XKeyscore is an online surveillance tool run by America’s National Security Agency (NSA) that allows analysts to search contents of chats, emails and browsing histories without warrants, according to leaked…Paul Dalgarno, EditorLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/130572013-04-17T04:31:58Z2013-04-17T04:31:58ZExplainer: what is geoblocking?<figure><img src="https://images.theconversation.com/files/22530/original/7m2738kb-1366163201.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">Location-restricted services are becoming ever easier to access, wherever you live.</span> <span class="attribution"><span class="source">Daniel Dionne</span></span></figcaption></figure><p>So you sit down in front of your computer to catch the latest episode of Doctor Who directly from BBC’s iPlayer, and you are greeted by an error message informing you that the program will play only in the UK.</p>
<p>So why are you blocked? How does the BBC website know you are not in the UK?</p>
<p>Geoblocking is the system used to limit your access to the internet, based on your geographic location.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/21964/original/22xhk8hb-1364902249.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/21964/original/22xhk8hb-1364902249.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/21964/original/22xhk8hb-1364902249.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=336&fit=crop&dpr=1 600w, https://images.theconversation.com/files/21964/original/22xhk8hb-1364902249.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=336&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/21964/original/22xhk8hb-1364902249.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=336&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/21964/original/22xhk8hb-1364902249.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=422&fit=crop&dpr=1 754w, https://images.theconversation.com/files/21964/original/22xhk8hb-1364902249.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=422&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/21964/original/22xhk8hb-1364902249.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=422&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Geoblocks are used to limit or change content depending on the end-user’s geographic location.</span>
<span class="attribution"><span class="source">BBC</span></span>
</figcaption>
</figure>
<h2>How does it work?</h2>
<p>Each computer on the internet has a unique numerical identifier (e.g. 172.30.0.254), known as an <a href="http://computer.howstuffworks.com/internet/basics/question549.htm">IP (internet protocol) address</a>. Each time your computer makes a request to a server for content, its IP address is sent with that request, so the server knows where to send the requested content.</p>
<p>IP addresses are allocated in blocks to internet service providers (ISPs) who in turn allocate them to customers. Typically the IP address of your computer has no special significance. But an IP address can be used to determine a computer’s geographical location with reasonable accuracy. </p>
<p><a href="https://www.google.com.au/search?q=ip+address+country+database">Many databases exist</a> that map IP addresses to countries. These databases then form the basis of block-lists, more commonly known as “geoblocks”.</p>
<h2>How is it used?</h2>
<p>Most people are familiar with <a href="http://www.smartcopying.edu.au/scw/go/pid/522">technological protection measures</a> (TPM) in the form of <a href="http://en.wikipedia.org/wiki/DVD_region_code">region coding on DVDs</a>. Those particular TPMs try to prevent the disc being copied and try to prevent playback in a place other than the market in which the disc was sold.</p>
<p>Region coding allows Hollywood to segment global markets, releasing movies to one market at a time, maximising the effect of promotional campaigns.</p>
<figure class="align-right ">
<img alt="" src="https://images.theconversation.com/files/22444/original/7tw5c64s-1366000451.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/22444/original/7tw5c64s-1366000451.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=600&fit=crop&dpr=1 600w, https://images.theconversation.com/files/22444/original/7tw5c64s-1366000451.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=600&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/22444/original/7tw5c64s-1366000451.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=600&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/22444/original/7tw5c64s-1366000451.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=754&fit=crop&dpr=1 754w, https://images.theconversation.com/files/22444/original/7tw5c64s-1366000451.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=754&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/22444/original/7tw5c64s-1366000451.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=754&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption"></span>
<span class="attribution"><span class="source">…storrao…</span></span>
</figcaption>
</figure>
<p>Geoblocks are the extension of this concept online - website administrators, such as those who manage video-streaming sites such as <a href="http://www.bbc.co.uk/iplayer">BBC’s iPlayer</a>, <a href="http://www.netflix.com/">Netflix</a> and <a href="http://www.abc.net.au/iview">ABC iView</a> use geoblocks to limit their audiences to the UK, USA, and Australia respectively. These providers all <a href="http://www.abc.net.au/tv/iview/faq.htm#overseas1">cite rights licensing limitations</a> as the reason for which they are geoblocking.</p>
<p>Online businesses such as gambling services may use these geoblocks to deny availability of their site to countries in which they cannot legally operate. </p>
<p>Controversially, many online retailers use geoblocks to <a href="https://theconversation.com/when-the-price-is-not-right-technology-price-gouging-in-australia-10582">charge people in one country one price</a>, and people in another country a higher price. This has been the subject of Parliament’s inquiry into <a href="http://www.aph.gov.au/Parliamentary_Business/Committees/House_of_Representatives_Committees?url=ic/itpricing/index.htm">IT Pricing in Australia</a>, although the practice is not limited only to IT-based goods.</p>
<h2>How to get around geoblocks</h2>
<p>Due to the legal grey area occupied by those who bypass geoblocks, consumer advocate Choice <a href="http://www.choice.com.au/media-and-news/consumer-news/news/choice-takes-aim-at-online-geoblocking.aspx">is campaigning for</a> greater legal clarity on behalf of Australian internet users who bypass geoblocking. </p>
<p>Because most geoblocking is based on the IP address of your computer, it can be defeated by any method that alters or hides your IP address in favour for an IP address recorded as belonging to another country.</p>
<p>The most common way to do this is to use a <a href="https://theconversation.com/explainer-what-is-a-virtual-private-network-vpn-12741">Virtual Private Network</a> (VPN). Using a VPN will in most cases route all of your internet traffic via a remote location, and the technology is proven, secure and reliable.</p>
<figure class="align-left ">
<img alt="" src="https://images.theconversation.com/files/22447/original/z3rwm97t-1366000807.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/22447/original/z3rwm97t-1366000807.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=800&fit=crop&dpr=1 600w, https://images.theconversation.com/files/22447/original/z3rwm97t-1366000807.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=800&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/22447/original/z3rwm97t-1366000807.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=800&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/22447/original/z3rwm97t-1366000807.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=1005&fit=crop&dpr=1 754w, https://images.theconversation.com/files/22447/original/z3rwm97t-1366000807.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=1005&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/22447/original/z3rwm97t-1366000807.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=1005&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption"></span>
<span class="attribution"><span class="source"> Oliver Hine</span></span>
</figcaption>
</figure>
<p><a href="http://www.techrepublic.com/blog/security/the-basics-of-using-a-proxy-server-for-privacy-and-security/8762">Proxy servers</a> are also useful to get around geoblocking. Rather than change the IP address of your computer, they act as an intermediary and obtain content on your behalf, and then pass it to you. The site providing the content only sees the requests originating from the proxy server, and they don’t see you.</p>
<p><a href="https://www.torproject.org/">The Onion Router project</a> (TOR) is a high-security encrypted VPN solution. Originally developed by the US Naval Research Laboratory, it is designed for use in situations where personal freedoms might be threatened by surveillance. If you are located in a liberal western democracy, TOR is probably overkill for accessing geoblocked movies.</p>
<p>Novel methods of bypassing geoblocks are now emerging. Canadian business <a href="http://www.unblock-us.com/">unblock-us.com</a> uses a carefully configured array of proxy servers which are accessed through alternative <a href="http://www.charvolant.org/%7Edoug/network/html/node10.html">DNS configurations</a>. This arrangement simplifies configuration of proxy servers for the home user, and allows most traffic to flow directly to and from the internet without using the proxy.</p>
<p>Other apps and services such as the <a href="https://theconversation.com/say-hola-to-the-newest-route-around-web-censorship-11845">browser plug-in Hola!</a> have also arrived. Available for free, Hola! is deliciously simple to install, configure and use. It utilises a more robust <a href="http://www.computerworld.com/s/article/69883/Peer_to_Peer_Network">peer-to-peer network</a> to allow the end user access to the BBC and other websites.</p>
<p>As mentioned already, bypassing geoblocks from Australia is a grey area legally. But technological advances have made it easy to smash through old location-based business models and access all that the world has to offer.</p><img src="https://counter.theconversation.com/content/13057/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Karl Schaffarczyk does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>So you sit down in front of your computer to catch the latest episode of Doctor Who directly from BBC’s iPlayer, and you are greeted by an error message informing you that the program will play only in…Karl Schaffarczyk, Law Honours Candidate, University of CanberraLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/130392013-04-02T03:51:18Z2013-04-02T03:51:18ZExplainer: what is hacking?<figure><img src="https://images.theconversation.com/files/21702/original/vpntmkj4-1364186694.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">The blanket term “hack” can encompass a whole range of attacks – but what are they?</span> <span class="attribution"><span class="source">Anant N S</span></span></figcaption></figure><p>Last week, we woke to news that the <a href="http://www.wired.co.uk/news/archive/2013-03/27/biggest-cyber-attack-spamhaus">largest cyber attack ever</a> was underway in Europe, with reports of global internet speeds falling as a result of an assault on the anti-spamming company <a href="http://www.spamhaus.org/">Spamhaus</a>.</p>
<p>In recent weeks, the <a href="http://www.afr.com/p/national/cyber_attackers_penetrate_reserve_FEdCLOI50owRMgI0urEYnK">Reserve Bank of Australia</a> has been the target of a cyber attack, as have <a href="http://www.bbc.co.uk/news/world-asia-21855051">South Korean banks and broadcasters</a> and <a href="http://www.brisbanetimes.com.au/it-pro/security-it/bbc-twitter-accounts-hacked-by-proassad-group-20130322-2gjie.html">BBC Twitter accounts</a>.</p>
<p>The above stories were all reported as “hacking” – a blanket term readily used to encompass a whole range of attacks, from crashing a server to more sophisticated infiltration, such as stealing passwords. But, generally, news stories don’t discriminate.</p>
<p>So what are hackers and their methods really like? What follows is something of a glossary, to cut out (or at least bookmark) and keep.</p>
<h2>Types of hackers</h2>
<p><strong>Phreakers</strong>: Perhaps the oldest type of computer hackers, Phreakers discover how telephone systems work and use their knowledge to make free phone calls. </p>
<p>In the past, phone phreakers used what we now think of as hacking techniques to <a href="http://www.historyofphonephreaking.org/faq.php">access mainframe computers and programmable telephone switches</a> to obtain information, alter records or evade capture. </p>
<figure class="align-right zoomable">
<a href="https://images.theconversation.com/files/21707/original/83qqpjjd-1364187398.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/21707/original/83qqpjjd-1364187398.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/21707/original/83qqpjjd-1364187398.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=620&fit=crop&dpr=1 600w, https://images.theconversation.com/files/21707/original/83qqpjjd-1364187398.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=620&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/21707/original/83qqpjjd-1364187398.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=620&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/21707/original/83qqpjjd-1364187398.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=780&fit=crop&dpr=1 754w, https://images.theconversation.com/files/21707/original/83qqpjjd-1364187398.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=780&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/21707/original/83qqpjjd-1364187398.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=780&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption"></span>
<span class="attribution"><span class="source">ortizmj12</span></span>
</figcaption>
</figure>
<p>Famous (and now retired) phreakers include <a href="http://en.wikipedia.org/wiki/Kevin_Mitnick">Kevin Mitnick</a>, <a href="http://en.wikipedia.org/wiki/Kevin_Poulsen">Kevin Poulsen</a> and Apple founders <a href="http://www.salon.com/2013/02/16/from_phreaks_to_apple_steve_jobs_and_steve_wozniaks_eureka_moment/">Steve Jobs and Steve Wozniak</a>.</p>
<p><strong>Crackers</strong>: These guys bypass (<a href="http://en.wikipedia.org/wiki/Software_cracking">crack</a>) security controls on proprietary software, DVDs, computer games and Digital Rights Management (<a href="http://en.wikipedia.org/wiki/Digital_rights_management">DRM</a>)-protected media. </p>
<p>Crackers trade, share and publish game “<a href="http://en.wikipedia.org/wiki/Software_cracking#Methods">cracks</a>”, <a href="http://pcsupport.about.com/od/termsp/g/patch-fix.htm">patches</a>, serial numbers and <a href="http://en.wikipedia.org/wiki/Keygen">keygens</a> (activation key generators). They also embed <a href="http://en.wikipedia.org/wiki/Malware">malware</a> in their cracks and patches forming <a href="http://searchsecurity.techtarget.com/definition/Trojan-horse">Trojans</a> to deter outsiders (mostly “script kiddies”; see below) from using their code. </p>
<p>Unsuspecting people who use their cracks more often than not find themselves infected with worms and viruses (explained below). Such infections often bypass anti-virus tools and <a href="http://searchsecurity.techtarget.com/definition/firewall">firewalls</a>, and are probably responsible for most of the malware on teenagers’ home computers.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/21703/original/6vj6qy9y-1364187034.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/21703/original/6vj6qy9y-1364187034.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/21703/original/6vj6qy9y-1364187034.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=450&fit=crop&dpr=1 600w, https://images.theconversation.com/files/21703/original/6vj6qy9y-1364187034.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=450&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/21703/original/6vj6qy9y-1364187034.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=450&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/21703/original/6vj6qy9y-1364187034.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=566&fit=crop&dpr=1 754w, https://images.theconversation.com/files/21703/original/6vj6qy9y-1364187034.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=566&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/21703/original/6vj6qy9y-1364187034.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=566&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption"></span>
<span class="attribution"><span class="source">Rilana Knits</span></span>
</figcaption>
</figure>
<p><strong>Black Hat Hackers</strong>: These are crackers who actively develop malware and intrusion techniques and tools for <a href="http://www.extremetech.com/computing/133448-black-hat-hacker-gains-access-to-4-million-hotel-rooms-with-arduino-microcontroller">evil purposes</a>, <a href="http://www.pctools.com/security-news/blackhat-hacker/">Black Hats</a> are motivated by profit. </p>
<p>Criminal organisations, foreign governments and spy agencies will pay handsomely for the latest <a href="http://linux.about.com/cs/linux101/a/0-day__zero-day.htm">zero-day</a> (not publicly known) exploit. </p>
<p>Journalist <a href="http://en.wikipedia.org/wiki/Brian_Krebs">Brian Krebs</a> recently <a href="https://twitter.com/briankrebs/status/292268061904482306">reported a bidding war</a> for a Java exploit valued at more than US$5,000.</p>
<p><strong>White Hat Hackers</strong>: These are the good guys. <a href="http://www.techopedia.com/definition/10349/white-hat-hacker">White Hats</a>, also known as “ethical hackers” and “pen-testers”, are security researchers. </p>
<p>They <a href="http://www.independent.co.uk/news/science/white-hat-hacker-discovers-names-of-anonymous-volunteers-of-genome-study-in-security-drill-8457739.html">test systems</a> (often using the same tools as Black Hats, but within the law) by conducting penetration testing and security audits as a service for businesses and organisations that don’t want to be hacked.</p>
<p>White Hats report on any vulnerabilities found and what needs to be done to fix them. Both the <a href="http://www.nationalccdc.org/">US</a> and <a href="http://cyberchallenge.com.au/index.html">Australian</a> governments have set up competitions to encourage school and university students to take up (White Hat) hacking as a career. </p>
<p>(My Swinburne team competed in the pilot version of Australia’s <a href="http://cyberchallenge.com.au/cysca-2012.html">Cyber Challenge in 2012</a> and scored higher than all other Victorian universities.)</p>
<p><strong>Grey Hat Hackers</strong>: Grey Hats <a href="http://searchsecurity.techtarget.com/definition/gray-hat">generally work within the law</a> but may publish vulnerabilities and exploits or sell exploits to unknown buyers without asking too many questions. </p>
<p>They may also report vulnerabilities to software vendors anonymously to avoid prosecution. Unfortunately <a href="http://www.esecurityplanet.com/headlines/article.php/3932381/Researcher-Faces-Lawsuit-for-Reporting-Security-Flaw.htm">some vendors object</a> to having their defective code discovered and <a href="http://www.smh.com.au/it-pro/security-it/super-bad-first-state-set-police-on-man-who-showed-them-how--770000-accounts-could-be-ripped-off-20111018-1lvx1.html">discourage security research</a> on their products.</p>
<figure class="align-left zoomable">
<a href="https://images.theconversation.com/files/21706/original/ykdg786v-1364187302.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/21706/original/ykdg786v-1364187302.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/21706/original/ykdg786v-1364187302.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=600&fit=crop&dpr=1 600w, https://images.theconversation.com/files/21706/original/ykdg786v-1364187302.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=600&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/21706/original/ykdg786v-1364187302.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=600&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/21706/original/ykdg786v-1364187302.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=754&fit=crop&dpr=1 754w, https://images.theconversation.com/files/21706/original/ykdg786v-1364187302.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=754&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/21706/original/ykdg786v-1364187302.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=754&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption"></span>
<span class="attribution"><span class="source">By the|G|™</span></span>
</figcaption>
</figure>
<p><strong>Script kiddies</strong>: Also known as “skiddies”, these are a growing number of <a href="http://en.wikipedia.org/wiki/Script_kiddie">amateur Black Hats</a> who cannot develop their own code but can adapt other people’s exploits and use <a href="http://en.wikipedia.org/wiki/Hacking_tool">hack tools</a> to attack organisations and each other.</p>
<p>Script kiddies find the term <a href="http://www.secpoint.com/what-is-a-script-kiddie.html">offensive</a> and have been known to <a href="http://www.theregister.co.uk/2001/02/21/virus_toolkits_are_skiddie_menace/">launch cyber-attacks</a> against people who have denigrated them or their skills. </p>
<p>It is likely that many of the “hackers” <a href="http://www.rawstory.com/rs/2011/08/04/dhs-calls-anonymous-hackers-untalented-script-kiddies-warns-of-future-attacks/">associated with online protest group Anonymous</a> are script kiddies.</p>
<p><strong>Cyber-troops, cyber-soldiers</strong>: These are state-sponsored <a href="http://intelreport.mandiant.com/">military personnel</a> trained in hacking techniques who use malware and hacking techniques to spy, gather intelligence, steal intellectual property and disrupt enemy systems.</p>
<p><strong>Spammers and Phishers</strong>: <a href="http://www.thefreedictionary.com/spammer">Spammers</a> use programs - <a href="http://en.wikipedia.org/wiki/Spambot">spambots</a> - to automatically send email, SMSs, instant messages and tweets to potential buyers of their products. </p>
<p><a href="http://www.thefreedictionary.com/Phisher">Phishers</a> use the same technologies (and fake “<a href="http://www.scamwatch.gov.au/content/index.phtml/itemId/829456">pharming</a>” sites) to entice victims to click on links (and type in user-names and passwords) and download and install malware. The book <a href="http://oreilly.com/spamkings/">Spam Kings</a> recounts the early history of many spammers.</p>
<h2>Types of hacks</h2>
<p>Now that we know who the bad guys are, let’s consider what they do and how their actions are likely to affect people.</p>
<p><strong>Script injection (SQL, JavaScript) attacks</strong>: Most websites are connected to databases. With Structured Query Language (<a href="http://www.techopedia.com/definition/1245/structured-query-language-sql">SQL</a>) <a href="http://searchsoftwarequality.techtarget.com/definition/SQL-injection">injection</a>, attackers run their own code on these databases, allowing them to change records, delete data and extract private information such as credit card numbers, passwords or password hashes.</p>
<figure class="align-right zoomable">
<a href="https://images.theconversation.com/files/21704/original/rh2r6gbc-1364187146.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/21704/original/rh2r6gbc-1364187146.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/21704/original/rh2r6gbc-1364187146.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=600&fit=crop&dpr=1 600w, https://images.theconversation.com/files/21704/original/rh2r6gbc-1364187146.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=600&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/21704/original/rh2r6gbc-1364187146.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=600&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/21704/original/rh2r6gbc-1364187146.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=754&fit=crop&dpr=1 754w, https://images.theconversation.com/files/21704/original/rh2r6gbc-1364187146.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=754&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/21704/original/rh2r6gbc-1364187146.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=754&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption"></span>
<span class="attribution"><span class="source">juanpoolio</span></span>
</figcaption>
</figure>
<p><a href="http://www.testingsecurity.com/how-to-test/injection-vulnerabilities/Javascript-Injection">JavaScript injection</a> happens through publicly-writable web sites such as Facebook, Twitter and sites with forums and discussion boards. If not properly filtered, an attacker can upload script that extracts private information from people visiting the site.</p>
<p>Scripts can bypass firewalls to extract user credentials, track user activities, install malware and even turn on the web camera and microphone. The simplest way to prevent such attacks is to <a href="http://browsers.about.com/od/internetexplorertutorials/ht/ieactivescript.htm">turn off scripting</a> (in your browser). </p>
<p>The <a href="https://addons.mozilla.org/en-US/firefox/addon/noscript/">Firefox NoScript plug-in</a> is an easy way to do this.</p>
<p><strong>Password cracking</strong>: Simply put, if an attacker can guess your password, he or she can take over your computer. Most computer users are overwhelmed by the number of account names and passwords they have to remember, so they tend to <a href="http://www.infoworld.com/d/security-central/password-reuse-opens-doors-cyber-criminals-457">re-use them</a>.</p>
<p>An attacker can use SQL injection to recover passwords or password hashes from a poorly-secured website, and then try the same user-names and passwords to log into high-value sites such as bank accounts. </p>
<p>Websites and email systems that restrict password length are the <a href="http://answers.uchicago.edu/page.php?id=16276">easiest to attack</a>.</p>
<p><strong>Brute force attacks</strong>: These <a href="http://en.wikipedia.org/wiki/Brute_force_attack">use automated tools</a> to guess the password or re-create the password hash. </p>
<p>The most effective ways of <a href="http://www.cs.virginia.edu/%7Ecsadmin/gen_support/brute_force.php">preventing this</a> is to (a) use long passwords, and (b) use different passwords.</p>
<p><strong>DoS/DDoS</strong>: <a href="http://www.webopedia.com/TERM/D/DDoS_attack.html">(Distributed) Denial of service</a> attacks are generally launched against organisations, whose servers are flooded with “broken” network communications that cause the servers to slow down or even crash. </p>
<p>Companies that rely on online trading will lose a lot of money (and reputation) if this happens, and will often <a href="http://negbox.com/how-price-your-ddos">pay the attackers</a> to call off the attack.</p>
<p><strong>Viruses, worms and trojans</strong>: These are infection carriers used to distribute malware. <a href="http://www.ust.hk/itsc/antivirus/general/whatis.html">Viruses</a> travel by <a href="http://www.wisegeek.org/what-is-a-thumb-drive.htm">thumb drives</a>, <a href="http://searchsecurity.techtarget.com/definition/worm">worms</a> travel through the internet, and <a href="http://searchsecurity.techtarget.com/definition/Trojan-horse">Trojans</a> are downloaded by unsuspecting users. </p>
<p>Anti-virus software will stop most of this, but not the latest (or <a href="http://linux.about.com/cs/linux101/a/0-day__zero-day.htm">zero-day</a>) malware attacks.</p>
<figure class="align-center ">
<img alt="" src="https://images.theconversation.com/files/21695/original/cyx477kb-1364183483.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/21695/original/cyx477kb-1364183483.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=400&fit=crop&dpr=1 600w, https://images.theconversation.com/files/21695/original/cyx477kb-1364183483.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=400&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/21695/original/cyx477kb-1364183483.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=400&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/21695/original/cyx477kb-1364183483.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=503&fit=crop&dpr=1 754w, https://images.theconversation.com/files/21695/original/cyx477kb-1364183483.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=503&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/21695/original/cyx477kb-1364183483.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=503&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption"></span>
<span class="attribution"><span class="source">Alexandre Dulaunoy</span></span>
</figcaption>
</figure>
<p><strong>Crimeware, hijackers and ransomware</strong>: Black Hat hacking has matured into an industry. Hackers can purchase <a href="http://www.tradingpost.com.au/Help/Trust-Safety/Protect-yourself-online/Crimeware">crimeware</a> packs for a few thousand dollars and start up a business distributing malware, accepting payments and laundering money. </p>
<p><a href="http://www.ehow.com/about_6465909_definition-computer-hijack.html">Hijackers</a> take over your web browser and redirect you to advertising sites. <a href="http://www.microsoft.com/security/portal/shared/ransomware.aspx">Ransomware</a> infects your computer and prompts you to call a toll-free number, where you can pay to have your computer remotely “disinfected”. </p>
<p>Man-in-the-browser malware, such as <a href="http://threatpost.com/en_us/blogs/man-browser-inside-zeus-trojan-021910">Zeus</a>, can intercept your online banking sessions in your browser and phone, draining your account by sending money to the attackers.</p>
<p><strong>Bots and bot-nets</strong>: <a href="http://en.wikipedia.org/wiki/Internet_bot">Bots</a> emulate human users. Once a bot has infected your computer, you are “owned”. Your computer (now a <a href="http://netsecurity.about.com/od/frequentlyaskedquestions/qt/pr_bot.htm">zombie</a>) is remotely controlled by a <a href="http://en.wikipedia.org/wiki/Bot_herder">bot herder</a> who can use it and hundreds of thousands of other zombies to launch DDoS attacks, crack passwords, send spam and host illegal content.</p>
<h2>Protect yourself</h2>
<p>We can only minimise the risks, but the risks are well understood. Turn off scripting, maintain your anti-virus, don’t read unsolicited emails, use long passwords, use different passwords, don’t download programs you didn’t go looking for, be sceptical … and finally: learn about computer security (to find out what else you can do).</p>
<p>There’s no need to be paranoid. Just be careful. White Hat hackers are there to help by exposing the risks and testing the systems. Trust them. They’re the good guys.</p><img src="https://counter.theconversation.com/content/13039/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>James H. Hamlyn-Harris does not work for, consult to, own shares in or receive funding from any company or organisation that would benefit from this article, and has no relevant affiliations.</span></em></p>Last week, we woke to news that the largest cyber attack ever was underway in Europe, with reports of global internet speeds falling as a result of an assault on the anti-spamming company Spamhaus. In…James H. Hamlyn-Harris, Senior Lecturer, Computer Science and Software Engineering, Swinburne University of TechnologyLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/118452013-02-12T03:17:11Z2013-02-12T03:17:11ZSay Hola! to the newest route around web censorship<figure><img src="https://images.theconversation.com/files/20071/original/5fk2qx99-1360295018.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">Hola! will increase Australia's access to content, but is it legal?</span> <span class="attribution"><span class="source">Movie reel image from from www.shutterstock.com</span></span></figcaption></figure><p>The ongoing copyright arms race between content owners and internet users has taken a new turn. Israeli firm <a href="http://www.hola.org/">Hola!</a> has recently launched a suite of products that are variously designed to bypass <a href="http://www.pcmag.com/encyclopedia_term/0,1237,t=geo-blocked&i=61864,00.asp">geoblocking</a> and accelerate internet-access speeds.</p>
<p>Hola! is the brainchild of entrepreneurs <a href="http://hola.org/about_hola.html">Derry Shribman and Ofer Vilenski</a>. They have set out to fundamentally change the way the world wide web operates by creating software which makes the web more efficient and harder to censor.</p>
<p>Hola! is comprised of several products:</p><ul>
<li>Browser extensions which work on Windows and Mac with <a href="http://www.google.com/intl/en/chrome/browser/">Google Chrome</a> and <a href="http://www.mozilla.org/en-US/firefox/new/">Mozilla Firefox</a>. These plugins only bypass geoblocking.
</li><li>Client software for Windows which functions as web accelerator, geoblock bypass, and censorship bypass service.
</li><li>An Android app which operates as a <a href="http://internet-access-guide.com/understanding-web-accelerators-and-how-they-work/">web accelerator</a> only.
</li></ul><p></p>
<figure class="align-center ">
<img alt="" src="https://images.theconversation.com/files/20025/original/qxx6s3y4-1360209975.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/20025/original/qxx6s3y4-1360209975.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=573&fit=crop&dpr=1 600w, https://images.theconversation.com/files/20025/original/qxx6s3y4-1360209975.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=573&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/20025/original/qxx6s3y4-1360209975.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=573&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/20025/original/qxx6s3y4-1360209975.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=720&fit=crop&dpr=1 754w, https://images.theconversation.com/files/20025/original/qxx6s3y4-1360209975.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=720&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/20025/original/qxx6s3y4-1360209975.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=720&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption">Hola! bypasses restrictions on sites which are usually geoblocked.</span>
<span class="attribution"><span class="source">http://www.Hola.org</span></span>
</figcaption>
</figure>
<h2>BBC iPlayer, Hulu, Netflix … and VPNs</h2>
<p>Catchup TV and online movie services such as <a href="http://www.bbc.co.uk/iplayer">BBC iPlayer</a>, <a href="http://www.hulu.com/">Hulu</a>, <a href="http://wwww.netflix.com/">Netflix</a> and <a href="http://hola.org/faq.html#unblock">many others</a> use geoblocking – and so are not available from within Australia.</p>
<p>But circumvention of these geoblocks is commonplace with the use of a <a href="http://www.howstuffworks.com/vpn.htm">Virtual Private Network (VPN)</a> or <a href="http://www.ehow.com/info_8367663_explain-proxy-server.html">proxy server</a>. During the London Olympics the media was <a href="https://theconversation.com/so-whats-wrong-with-watching-the-olympic-games-over-the-internet-8704">awash with stories</a> of people using these methods to access the BBC’s online coverage of the Games.</p>
<p>These VPNs and proxy systems are either subscription services, or they operate on a <a href="http://www.businessinsider.com/what-is-the-freemium-business-model-2011-4?op=1">freemium model</a> where a limited or ad-supported version of the product or service is given away in the hope of selling consumers a “full” version of the product.</p>
<p>VPNs were designed as a way of securely connecting a remote computer to a corporate network, and using a VPN is a rather clumsy method to access multimedia content. All traffic is routed through the VPN which may limit access to other services, and the VPN needs to be connected and disconnected to various servers to access content in different countries.</p>
<h2>Hola! is different</h2>
<p>Not only is Hola! free, but it’s different to other services because it utilises <a href="http://hola.org/faq.html#ub_vsvpn">peer-to-peer technology</a>, where traffic is not re-routed through central servers but via other computers which have the Hola! Windows client installed.</p>
<p>This peer-to-peer nature will make it difficult for Hola! to be blocked in the same way Hulu <a href="http://www.pcauthority.com.au/News/159360,picking-the-perfect-home-entertainment-box-hulu-blocks-international-access-via-witopia.aspx">has blocked</a> some VPN and proxy services.</p>
<p>The Hola! browser extension is also by far the simplest and most elegant method to bypass geoblocks. The inflexibility and complications which come with setting up a VPN or altering rarely-changed <a href="http://www.webopedia.com/TERM/D/DNS.html">DNS settings</a> can limit the function of a computer for everyday use. </p>
<p>Once Hola! is installed, its function can be toggled from an icon in the browser.</p>
<h2>Is Hola! legal?</h2>
<p>Most people are familiar with technological protection measures (TPM) in the form of <a href="http://support.apple.com/kb/ht2397?viewlocale=fr_fr&locale=fr_fr">region coding on DVDs</a>. Those TPMs try to prevent the disc being copied and try to prevent playback in a place other than the market in which the disc was sold.</p>
<p>Region coding allows Hollywood to segment global markets, releasing movies to one market at a time, maximising the effect of promotional campaigns, for instance.</p>
<p>Geoblocking is used by the entertainment industry to perpetuate this same market segmentation online - <a href="https://theconversation.com/when-the-price-is-not-right-technology-price-gouging-in-australia-10582">which includes Australians paying higher prices</a>. For example, the American service <a href="http://www.netflix.com/">Netflix</a> at $US7.99/month compares poorly with local <a href="http://www.quickflix.com.au/">Quickflix</a> at $A14.99/month.</p>
<p>Geoblocking is a technological protection measure but due to a <a href="http://www.austlii.edu.au/au/legis/cth/consol_act/ca1968133/s10.html#access_control_technological_protection_measure">special exemption</a> in the definition of TPMs in the Copyright Act, it is not illegal to break TPMs that prevent the playback in Australia of a film obtained from outside Australia - so long as it is a non-infringing copy.</p>
<p>While using a region-free DVD player clearly falls within this exemption, bypassing geoblocks remains an untested grey area.</p>
<p>In August 2012, consumer advocacy group Choice <a href="http://www.choice.com.au/media-and-news/consumer-news/news/choice-takes-aim-at-online-geoblocking.aspx">highlighted this grey area</a> in a submission to the Attorney General’s <a href="http://www.ag.gov.au/RightsAndProtections/IntellectualProperty/CurrentIssuesReformsandReviews/Pages/ReviewofTechnologicalProtectionMeasureexceptions.aspx">Review of Technical Protection Measure exceptions</a>.</p>
<p>The grey area centres on whether video streaming can be considered a “non-infringing copy”. When users sign up to a service - let’s take Netflix as our example – they agree to <a href="https://signup.netflix.com/TermsOfUse#service">Terms and Conditions</a> that include a clause on geographic limitations: </p>
<blockquote>
<p>Geographic Limitation: You may instantly watch a movie or TV show through the Netflix service only in geographic locations where we offer our service and have licensed such movie or TV show …</p>
</blockquote>
<p>The interpretation of this clause of the Terms and Conditions, and the weight given to respecting these must be weighed against the intent of the exemptions in the Copyright Act. </p>
<p>This is critical in deciding whether or not accessing movie content from Australia will be defined as a “non-infringing copy”.</p>
<h2>Facebook in China, Twitter in Tehran, YouTube in Pakistan … or Gmail at the office</h2>
<p>Social media services are censored or completely blocked in many countries, and most large workplaces limit access to various websites for security and productivity reasons.</p>
<p>The tools used to bypass these blocks to date include the US Navy-developed high security router software <a href="http://www.torproject.org/">TOR</a>, VPNs and other security software. </p>
<figure>
<iframe width="440" height="260" src="https://www.youtube.com/embed/fA8XuR67msw?wmode=transparent&start=0" frameborder="0" allowfullscreen=""></iframe>
<figcaption><span class="caption">Hola! explained.</span></figcaption>
</figure>
<p>While these might be appropriate for some uses, they are complicated to use and are overkill for an individual who just wants the freedom to talk to their friends on Facebook.</p>
<p>The Hola! client software makes bypassing these blocks trivial. When a user wants to visit a blocked site, the Hola! client takes that request, encrypts it and sends it to another computer with Hola! installed. </p>
<p>That second computer works as a proxy by then decrypting the request and then accessing the relevant service. The resulting content is again encrypted by the second computer and forwarded to the original user. </p>
<p>For speed and efficiency, the Hola! client will use several proxies - with each handling a small part of the traffic.</p>
<p>The lack of a central server in a peer-to-peer model such as this means that Hola! is difficult to block - a successful blocklist would need to be constantly updated and could run to thousands of internet addresses as it would need to block every user of the Hola! client. </p>
<p>Bypassing government censorship is <a href="http://apcmag.com/bypass-online-censorship.htm">widely accepted as a good thing</a> - at least in western democracies.</p>
<p>Hola! is yet another example supporting American innovator <a href="https://www.eff.org/about/history">John Gilmore’s</a> famous quote: “the Net interprets censorship as damage and routes around it”.</p><img src="https://counter.theconversation.com/content/11845/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Karl Schaffarczyk does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>The ongoing copyright arms race between content owners and internet users has taken a new turn. Israeli firm Hola! has recently launched a suite of products that are variously designed to bypass geoblocking…Karl Schaffarczyk, Law Honours Candidate, University of CanberraLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/96882012-11-21T19:37:14Z2012-11-21T19:37:14ZRead me, write me: the new media revolution is just beginning<figure><img src="https://images.theconversation.com/files/17870/original/cckg2y9z-1353474237.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">Traditional barriers between writers and their audiences are breaking down.</span> <span class="attribution"><span class="source">SimplyStef</span></span></figcaption></figure><p>Authors and readers, authority and audience – all are in a state of transition.</p>
<p>Back in the 1960s, when computer programmers were still bending paperclips to punch holes in cards, and phone apps and blogging would be ideas that Isaac Asimov or Arthur C. Clarke could have dreamed up, the Canadian communication theorist <a href="http://www.biography.com/people/marshall-mcluhan-9393821">Marshall McLuhan</a> observed that the initial form and content of a new medium simply matched the old medium it was replacing.</p>
<p>Very perceptive, given the explosion of online forms! We turn the pages of the “books” on our Kindles and iPads, and this article is a traditional, text-dense, literate construction from introduction to conclusion. As McLuhan went on to note, it takes time for a new medium to find out what it can do better than the old. </p>
<p>Movie-makers took a few decades to stop filming stage plays on a fixed set. When they realised cameras could move around, and learned about close-ups and pans, fades and hand-held, the medium came into its own.</p>
<p>In arenas of public and academic discourse (such as The Conversation) the potentials of online features such as hypertext, embedded film and audio clips, animations and pop-ups are gradually being explored, but generally the default form of our e-texts is still the reproduction of the traditional paper version of days past. </p>
<p>We are still waiting for the revolution.</p>
<p>But the aspect of the “new” media that could offer the most challenge to our traditions of learned discourse is already firmly in place, slipping into acceptance so quickly we take it for granted: blogging and commentary.</p>
<h2>Who’s who</h2>
<p>It would seem obvious in our democratic world that anyone should be able to offer a point of view in a discussion - open and learned debate has been integral to academia since Plato and Socrates led their chat groups in ancient Greece. </p>
<p>But having and expressing an opinion is very different to making it public and actually having it heard. The current e-text default of traditional paper text form is not just a physical constraint for those texts: it also fails to recognise that the traditional roles of author, reader and editor are firmly in flux because of the possibilities in online discourse.</p>
<p>As an example of how this could play out, consider Stephenie Meyer’s <a href="http://en.wikipedia.org/wiki/Twilight_(series)">Twilight</a> series. This publishing phenomenon has catalysed the fan-site as an active element in children’s and young adult reading. </p>
<p>Meyer <a href="http://www.stepheniemeyer.com/ts_fansites.html">lists nearly 500</a> such groups on her own website and encourages their use. The thousands of participants integrate all the major “social media” forms in their sharing of thoughts, news and squealing: blogging, Facebook, Twitter, YouTube and so on. </p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/17872/original/bkmyrtyg-1353474842.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/17872/original/bkmyrtyg-1353474842.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/17872/original/bkmyrtyg-1353474842.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=400&fit=crop&dpr=1 600w, https://images.theconversation.com/files/17872/original/bkmyrtyg-1353474842.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=400&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/17872/original/bkmyrtyg-1353474842.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=400&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/17872/original/bkmyrtyg-1353474842.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=503&fit=crop&dpr=1 754w, https://images.theconversation.com/files/17872/original/bkmyrtyg-1353474842.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=503&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/17872/original/bkmyrtyg-1353474842.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=503&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption"></span>
<span class="attribution"><span class="source">Summit Entertainment</span></span>
</figcaption>
</figure>
<p>But one particular element raises an intriguing challenge - fan fiction.</p>
<p>Many Twilight fans, initially excited by the exotic human/vampire romance, were disappointed when Meyer kept Bella and Edward steadfastly chaste as the sequels rolled. </p>
<p>So they started writing their own versions and publishing them on the fan-sites. Nothing uncommon in that, except that now these amateur creations have immediate audiences of thousands all around the world who can comment, or rewrite endings, or introduce new characters, or start totally new episodes. </p>
<p><a href="http://www.tor.com/blogs/2012/03/is-fan-fiction-ready-to-go-mainstream-thanks-to-fifty-shades-of-grey">Fifty Shades of Grey</a>, the phenomenally successful erotic novel by British author E. L. James, was developed from this fan fiction based on the Twilight series. </p>
<p>Very few of the rewritten or re-imagined works could be called “good” literature; it is mostly derivative, cliched and drips adolescent dreams. But what it does is blur the boundaries. Who is the author? Who is the reader? Who (most definitely!) is the editor?</p>
<h2>Changing the story</h2>
<p>Our concept of literary analysis for the past 50 years has been founded in the late American academic <a href="http://en.wikipedia.org/wiki/Louise_Rosenblatt">Louise Rosenblatt</a>’s idea that meaning is created as a transaction between author, text and reader. </p>
<p>Each brings something from their place to the interaction, and each transaction creates valid meaning in its own way. So, if the new medium not only brings new physical ways to present its content, as McLuhan foresaw, but also challenges the very foundation of how it works, then the revolution is tapping on our shoulders.</p>
<p>If the author and the reader are the same, and the text is in constant flux (you blog your version, then I blog my changes, then Britte in Munich adds her bit, then Li in Beijing hers), how can we “judge” a work of literature? </p>
<p>How can it be considered a discrete “work” if it has multiple authors, multiple readers, and multiple versions?</p>
<p><a href="http://www.monash.edu.au/research/profiles/profile.html?sid=689&pid=141">Ilana Snyder</a> of Monash University explained a key aspect of this quandary <a href="http://bit.ly/RSMZ6V">when she asked</a> whether a computer game could be considered a narrative. </p>
<p>The traditional textual story is linear, providing a sequential arrangement of the narrative as a series of consequential events. It is a basic way of organising human experience which the reader/audience follows. </p>
<p>But computers are based on a database which, while it also organises human experience, instead offers a store of categorised possibilities from which the reader/audience/player can choose, to create an individual story. </p>
<p>Every player, therefore, can create and be both author and reader of the transient story. Each time they go into the “text” of the game, the story can be different.</p>
<h2>Blurring the boundaries</h2>
<p>The consequences of this role-blurring flows directly into formal academic discourse in the long-established insistence on recognised, peer-reviewed sources in everything from student essays, through research literature, to personal status and recognition. </p>
<p>Can a blog or discussion list be considered valid “literature” on an academic topic? The contributor might be a major voice in the field, who says exactly the same thing in an approved peer-reviewed article. </p>
<p>If that writer is a recognised authority, then what of the person who replies to them in the same blog? What if the conversation is between that authority and the student writing the essay - can the student cite themselves?</p>
<p>The back and forth of conversation is rapidly becoming the dominant form of online communication, replacing the single authoritative statement of the e-text that still models the traditional printed text. </p>
<p>The revolution of this new medium is not, therefore, in its physical form, as McLuhan considered with books and movies and concerts and recordings: it is going to be in its users – what they do and who they think they are. </p>
<p>This is the democratisation of the internet, blurring the boundaries of author and reader, authority and audience, expert and hopeful.</p><img src="https://counter.theconversation.com/content/9688/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>David Beagley does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>Authors and readers, authority and audience – all are in a state of transition. Back in the 1960s, when computer programmers were still bending paperclips to punch holes in cards, and phone apps and blogging…David Beagley, Lecturer, Children's Literature and Literacy, La Trobe UniversityLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/105922012-11-09T03:22:52Z2012-11-09T03:22:52ZTelstra’s revised cyber-safety service could (and should) be better<figure><img src="https://images.theconversation.com/files/17434/original/pcy8r6br-1352419707.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">Telstra listened to customer complaints about data privacy, but they could have done more.</span> <span class="attribution"><span class="source">gailjadehamilton</span></span></figcaption></figure><p>Telstra’s first attempt to introduce a cyber-safety service for mobile customers in June was <a href="https://theconversation.com/why-is-telstra-next-g-serving-your-data-to-netsweeper-in-america-7939">a flop of significant proportions</a>.</p>
<p>Customers and concerned members of the public <a href="http://forums.whirlpool.net.au/archive/1935438">reacted strongly</a> to the collection and offshoring of user data that was part of the “Smart Controls” cyber-safety service and the service was eventually <a href="http://exchange.telstra.com.au/2012/06/27/update-on-telstras-mobile-cyber-safety-tool/">scrapped</a>.</p>
<p>But earlier this week, Telstra representatives <a href="http://exchange.telstra.com.au/2012/11/05/a-smart-way-to-keep-kids-safe-on-their-mobiles/">apologised</a> for the first version of Smart Controls and announced the service would be re-introduced in late November 2012 following a suite of revisions.</p>
<h2>Privacy concerns</h2>
<p>The Smart Controls service was originally introduced to help parents ensure their children were only visiting appropriate websites when surfing the net via a mobile phone.</p>
<p>The service allowed parents to block certain web pages, allow access to other pages, manage the amount of time spent online and a number of other options. </p>
<p>Despite these noble aims, there were many concerns about how the service would be implemented, including:</p>
<ul>
<li>data collection for Smart Controls would be compulsory for all Telstra mobile customers</li>
<li>Telstra offered no explanation about what data was collected</li>
<li>the <a href="https://theconversation.com/why-is-telstra-next-g-serving-your-data-to-netsweeper-in-america-7939">collected data was sent</a> to a Canadian-based web-content-filtering company <a href="http://www.netsweeper.com/">Netsweeper Inc.</a></li>
</ul>
<p>It was the last of these that caused the greatest concern, with a thread on the Whirpool broadband forum addressing these issues given the title <a href="http://forums.whirlpool.net.au/archive/1935438">“Are Telstra hackers?”</a></p>
<h2>Smart Controls 2.0</h2>
<p>The process of checking webpages accessed by Smart Controls users has changed little from the original version to the revised version.</p>
<p>That is, when a customer using the service accesses a webpage via their mobile, Telstra checks the requested website against its database of known websites to see if the site is appropriate for minors or not.</p>
<p>And while this process is the same in the revised version of Smart Controls, there are some subtle changes.</p>
<p>One change is the fact that Telstra is only sending data to <a href="http://www.netsweeper.com/">Netsweeper Inc.</a> if a website accessed by the customer is not listed in the Telstra database.</p>
<p>That is, if the requested page isn’t in Telstra’s database, it then sends the page request to Netsweeper’s more-extensive database to retrieve the page’s classification.</p>
<p>If the page isn’t in Netsweeper’s database then the target site is assessed using an automated process and, if necessary, by Netsweeper staff. Information about the page’s suitability for minors is then sent to Netsweeper’s and Telstra’s databases.</p>
<p>This is in contrast with the original version in which all mobile phone customer data was sent offshore to Netsweeper, albeit with <a href="http://exchange.telstra.com.au/2012/06/28/further-update-telstra-smart-controls-cyber-safety-tool/">variables and other extra information stripped from URLs first</a>.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/17349/original/9zwfh6hn-1352268172.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/17349/original/9zwfh6hn-1352268172.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/17349/original/9zwfh6hn-1352268172.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=103&fit=crop&dpr=1 600w, https://images.theconversation.com/files/17349/original/9zwfh6hn-1352268172.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=103&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/17349/original/9zwfh6hn-1352268172.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=103&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/17349/original/9zwfh6hn-1352268172.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=129&fit=crop&dpr=1 754w, https://images.theconversation.com/files/17349/original/9zwfh6hn-1352268172.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=129&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/17349/original/9zwfh6hn-1352268172.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=129&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Telstra Smart Controls Process.</span>
<span class="attribution"><span class="source">Source: Telstra</span></span>
</figcaption>
</figure>
<p>Furthermore, and importantly, the revised Smart Controls service is opt-in. As Peter Symons from Telstra Innovation told me via email:</p>
<blockquote>
<p>Telstra has re-engineered the product so that only customers subscribed to Smart Controls have URLs they visit compared with a database of classified sites held by Telstra on Telstra local servers.</p>
<p>If the Telstra database does not recognise the website visited by the Smart Controls subscriber, the URL will be stripped of any parameter information in Australia [e.g. from telstra.com.au/index.html?mydata to telstra.com.au/] and sent to a database managed by Telstra’s technology vendor Netsweeper.</p>
<p>Subscribers to the Smart Controls service will need to consent to these arrangements via the product terms.</p>
</blockquote>
<h2>That’s good, but …</h2>
<p>These changes are a step in the right direction but concerns still remain.</p>
<p>Despite requiring customer opt-in, data is still being sent offshore to Netsweeper. Offshoring is a concern because different countries have different privacy laws and US laws are lax compared to Australian privacy laws.</p>
<p>The second concern is the question of what Netsweeper is doing with customers’ information. Is Netsweeper on-selling Telstra customers’ data or information derived from that data?</p>
<p>There is also no explanation offered by Telstra of how Netsweeper is classifying websites.</p>
<p>How is Netsweeper relating websites, content and the legislation concerning what is and what isn’t legal or child-friendly in each country?</p>
<h2>Cyber-safety is important</h2>
<p>Netsweeper should set up an office in Australia and the three main Australian mobile phone companies (Optus, Telstra and Vodafone) should work together to offer a cyber-safety service that is developed here based on Australian censorship laws.</p>
<p>Companies that have had a website added to the Smart Controls banned list should have the right of appeal – an issue Telstra doesn’t appear to have addressed.</p>
<p>Telstra’s apology for the misstep with the first version of Smart Controls should be accepted and Australians should appreciate that Telstra has worked towards a revised version.</p>
<p>But there are still questions that need to be answered about this service.</p>
<p>Cyber-safety is important and it would be great if Telstra, Optus and Vodafone could work together to build a comprehensive suite of Australian-based cyber-safety services that protect all users.</p>
<p>These services should comply with Australian legislation, society standards and ensure privacy and security are at the forefront of this effort.</p><img src="https://counter.theconversation.com/content/10592/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Mark A Gregory does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>Telstra’s first attempt to introduce a cyber-safety service for mobile customers in June was a flop of significant proportions. Customers and concerned members of the public reacted strongly to the collection…Mark A Gregory, Senior Lecturer in Electrical and Computer Engineering, RMIT UniversityLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/98272012-09-27T04:23:37Z2012-09-27T04:23:37ZAcademics behaving badly? Universities and online reputations<figure><img src="https://images.theconversation.com/files/15912/original/dj2r4fxx-1348704301.jpg?ixlib=rb-1.1.0&rect=11%2C33%2C3677%2C2424&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">Academics freedom and university reputations are being tested online.</span> <span class="attribution"><span class="source">Academic image from www.shutterstock.com</span></span></figcaption></figure><p>Trying to control your reputation online is a bit like trying to clean up wee in a toddler pool. You are much more likely to get your hands dirty than achieve any kind of meaningful damage control. </p>
<p>Many universities in Australia are trying to define what is acceptable - and unacceptable - for their staff members to say online. Academics too, are exploring the boundaries between expression of academic freedom and the obligation to their institutions in an age when anything you say or write can be easily posted online. </p>
<p>A number of high-profile cases of academic trouble in cyberspace has prompted universities to try and protect their reputations. But often their reactions and policies are just making matters worse. </p>
<h2>Damage control</h2>
<p>The latest example is the case of an adjunct academic, Jim Nicholls, who was apparently sacked from the University of New England for <a href="http://www.theaustralian.com.au/higher-education/academic-axed-over-reprehensible-elegy/story-e6frgcjx-1226481376738">writing a satirical poem</a>. Nicholls wrote the poem to cheer up a fellow staff member, Jan-Piet Knijff, who had just been sacked. It is unclear whether the poem was ever intended by its author to become public, but trouble started when Knijff posted it online. </p>
<p>Another staff member took offence at the contents and demanded its removal. Despite Knijff taking the poem down, Mr Nicholls, who had been working as a largely unpaid adjunct for some years, was shown the door on the grounds that the poem bought UNE management into disrepute.</p>
<p>But this most recent case is one of many where an academic’s personal opinions or activity online has caused trouble for their institution. Last year, then head of RMIT University’s School of Art, Professor Elizabeth Grierson, <a href="http://www.theage.com.au/technology/technology-news/art-school-altercation-puts-new-spin-on-cyberstalking-20110413-1de72.html">brought a cyberstalking case against a former staff member, Steve Cox</a>. The case backfired, with Professor Grierson being ordered to stay away from Cox’s Facebook page for 20 years.</p>
<p>A couple of weeks ago Monash University stood down a staff member in a <a href="http://www.news.com.au/entertainment/television/australias-next-top-model-judge-charlotte-dawson-takes-aim-at-twitter-trolls/story-e6frfmyi-1226459899947">complicated “trolling” incident</a> involving the presenter from Australia’s Next Top Model. The Monash staff member was accused of making some unsavoury comments from an anonymous Twitter account. The staff member was not saved by the fact that the account was anonymous and did not mention any connection with the university. </p>
<h2>Unintended consequences</h2>
<p>These days universities need to think about how an incident like Jim Nicholls’ might be summarised in 140 characters or less. In this case, the tweet might go something like this: “Dude writes a poem, gets fired”. </p>
<p>As, John Gilmore, one of the founders of the Electronic Frontier foundation once <a href="http://www.chemie.fu-berlin.de/outerspace/internet-article.html">famously said</a>, “The Net interprets censorship as damage and routes around it”. The story about UNE management clamping down harshly on an employee is likely to travel much further than the poem could have travelled by itself, even if it stayed on the internet forever. </p>
<p>This kind of internet publicity problem has been called <a href="http://en.wikipedia.org/wiki/Streisand_effect">“The Streisand effect”</a>. The phrase was coined after legendary singer Babra Steisand tried to stop photographs of her cliff-top residence being published in a public archive of coastal erosion in California. </p>
<p>As the case progressed it was revealed that the offending photographs, which had been published in a set of 12,000 similar shots, had only been downloaded six times before the case began; two of these downloads were by Streisand’s own attorneys. However, the publicity surrounding the case resulted in nearly half a million downloads of photos in the first month the case was in court. </p>
<p>Instead of preserving her privacy, Streisand spent a reputed $50 million dollars to create entirely the opposite effect.</p>
<h2>Turn the other cheek?</h2>
<p>These cases raise some interesting questions. Should universities just ignore academics trolling, misbehaving or merely being cheeky online? Should academics always be able to freely criticise their institutions, or their colleagues, in public, on the grounds of academic freedom? I’m not sure. </p>
<p>I’m against using the academic freedom argument to justify behaviour that is rude, bullying or otherwise socially unacceptable. Likewise not using your real name should be no defence against such behaviour; hiding behind anonymity is the refuge of cowards.</p>
<p>That being said, there’s a difference between bullying and satire. While I have sympathy with what the universities are trying to achieve in their policies, I wonder if much of this effort is misplaced.</p>
<p>If you want to control your reputation on the internet, it’s far better to concentrate on learning how to react well to public criticism. If universities wish to attract the best minds, they should work on creating the appearance of being tolerant workplaces which encourage vigorous discussion and the exchange of ideas - even if they don’t always agree with them.</p>
<p>There’s a lesson here for academics too. Nothing - not even a funny poem between friends - is private when just about everyone carries a publishing platform in their pocket. Expect to be tweeted when you give a lecture; don’t put anything in an email that you wouldn’t be happy to appear on a webpage, or have read aloud to the Vice-Chancellor. And next time you feel like having a whinge about the university, or a colleague, pick up the phone and make a <a href="http://raws.adc.rmit.edu.au/%7Ee81843/blog2/?p=188">coffee date</a>. It’s safer.</p><img src="https://counter.theconversation.com/content/9827/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Inger Mewburn does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>Trying to control your reputation online is a bit like trying to clean up wee in a toddler pool. You are much more likely to get your hands dirty than achieve any kind of meaningful damage control. Many…Inger Mewburn, Director of research training, Australian National UniversityLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/96222012-09-18T04:37:59Z2012-09-18T04:37:59ZTrollwatch: the internet needs ethical standards<figure><img src="https://images.theconversation.com/files/15593/original/v7kknd7h-1347928384.jpg?ixlib=rb-1.1.0&rect=0%2C64%2C500%2C364&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">Saying "trolling is bad" does little to solve the problem.</span> <span class="attribution"><span class="source">femenart.nl</span></span></figcaption></figure><p><a href="http://edge.org/response-detail/1372/what-are-you-optimistic-about">Writing for Edge in 2007</a>, Professor Martin Rees – then President of the Royal Society and ongoing <a href="http://en.wikipedia.org/wiki/Astronomer_Royal">Astronomer Royal</a> – quipped: “The global village will have its village idiots.”</p>
<p>Rees, of course, was referring to how cyberspace can ill afford the exercise of extreme stupidity through actions by those with a lack of conscious control. </p>
<p>In the wake of <a href="https://theconversation.com/stop-the-trolls-how-to-prevent-cyber-stalking-happening-to-you-5460">a recent spate of high-profile trolling episodes</a> on Twitter, affecting the well-being of celebrities Charlotte Dawson and Robbie Farah, it would appear anti-social networking is on the rise and digital foolishness is on the march.</p>
<p>Much of <a href="http://www.perthnow.com.au/news/national/a-nasty-hateful-twist-on-age-old-problem/story-fndo4gtr-1226475190524">the media response</a> to the Dawson and Farah cases has been akin to “trolling is wrong.” <a href="https://theconversation.com/stop-the-trolls-how-to-prevent-cyber-stalking-happening-to-you-5460">Suggestions and guidelines are offered</a> to mitigate the risk of such bullying attacks and calls are made for <a href="http://www.straitstimes.com/breaking-news/world/story/aussie-government-crack-down-internet-trolls-20120916">government regulation</a> and/or policing of online forums.</p>
<p>But the magic word that is frequently overlooked in these debates is “ethics”.</p>
<p>Shouting out “trolling is wrong” is what British philosopher <a href="http://plato.stanford.edu/entries/ayer/">AJ Ayer</a> would have referred to as an example of the “hurrah/boo” theory (or emotivism).</p>
<h2>Trolls be trolling</h2>
<p>To say “trolling is bad” does not describe the moral content of the issue it denotes in terms that are amenable to reason. The statement is merely the transient equivalent of a growl in response to some deeper state of displeasure.</p>
<p>The word “troll” is <a href="http://www.drpr.com.au/public-relations-blog/wp-content/uploads/2012/09/troll-hole.jpg">clearly a pejorative</a>, one that signifies a high level of emotion in any discussion where such terms are used. In Norse mythology a troll was generally an unfavourable supernatural being, either manifesting itself as a dwarf or a giant.</p>
<p>In contemporary vernacular, the word “troll”, in its most generic sense, refers to anyone who appropriates a property they have no original claim to and then misuses it in their name, which more often than not is a <em>nom de plume</em>. </p>
<p>Such misuse of, say, a shared property could possibly run counter to the greater communal good.</p>
<p>In economic terms, Garrett Hardin’s notion of the “<a href="http://dieoff.org/page95.htm">Tragedy of the Commons</a>” defines a social scenario whereby there exists a dispute between the interests of the individual and that of the common public good. </p>
<p>This tension can impinge upon the sustainability of freely-available public resources, such as the environment or energy.</p>
<h2>Give and you shall receive</h2>
<p><a href="http://www.nature.com/nature/journal/v415/n6870/full/415424a.html">Research findings</a> have indicated reputation can alleviate this Tragedy of the Commons. Indirect reciprocity of the “give and you shall receive” variety rests upon social standing and can sustain a high degree of co-operation within communities.</p>
<p>It <a href="http://www.nature.com/nature/journal/v415/n6870/abs/415424a.html">has been shown</a> that the need to maintain a reputation for indirect reciprocity can also have the side-effect of keeping contributions to freely-available public goods at a high level.</p>
<p>Take <a href="http://www.theage.com.au/entertainment/books/one-for-the-books-as-shopping-centre-opens-a-new-chapter-20120906-25hd4.html">The Little Library at Melbourne Central shopping centre</a> as an example. This library could be seen as a physical commons for the exchange of public goods, whereby books are both freely borrowed and donated in a reciprocal arrangement.</p>
<p>The pleasure of entities such as the Little Library is that they are low-key, accidental discoveries to potential users who then herald the concept primarily through word-of-mouth, thus building its good reputation.</p>
<h2>Throw another blog on the fire?</h2>
<p>So how does this relate to the blogosphere?</p>
<p>The public goods that constitute the content of blogs (or Twitter) can only be sustained by the indirect reciprocity of contributors, be they the authors of postings or those who comment on such postings. </p>
<p>Where the notion of the Tragedy of the Commons in the physical sense is dependent on limited resources being desecrated to non-existence, in the blogosphere there is effectively no limitation on quantity or content.</p>
<p>The depletion of public assets such as the environment can be attributed to “overgrazing” by individuals. In the blogosphere, something similar could occur through “overposting”, leading to information overload, possibly through trolling behaviour, which can then result in an analogous “Tragedy of the Virtual Commons”. </p>
<p>The internet by its very nature is the Great Accumulator and the blogosphere is fast becoming the <a href="http://www.deepdyve.com/lp/association-for-computing-machinery/don-t-soil-the-commons-turning-the-blogosphere-into-the-clogosphere-I0OwEe8j00">“clogosphere”</a>.</p>
<p>In simple terms, less is more.</p>
<p>Computer scientist Jaron Lanier <a href="http://books.google.com.au/books/about/You_Are_Not_a_Gadget.html?id=9i1WgopfVToC">argues</a> that the mob rule of collectivism holds sway in our Web 2.0 world and this is at the expense of the individual. </p>
<p>Perhaps this digital Maoism that is lambasted by Lanier could also be a reason for the wrongful feeling of empowerment that emanates from the amorphous anonymity of some internet denizens?</p>
<p>If you are brave enough to openly name yourself as the author of a Twitter feed or a blog then such a display of individuality could raise a red rag to the vague rank-and-file.</p>
<h2>Feed the beast</h2>
<p>Ethics is a complex beast that is at the same time:</p>
<ul>
<li>a rational scrutiny of moral beliefs that people hold</li>
<li>an offshoot of philosophy and one approach to gauging which actions are “good” and which are “bad”</li>
<li>a field of study that has been around for more than two millennia</li>
</ul>
<p>I teach computer ethics which, in my style of delivery, attempts to walk the high-wire between the instrumental view of technology and its substantive perspective. The latter vantage assumes tech design can ultimately alter the ways in which a culture operates, for better or worse. </p>
<p>The instrumental view, by contrast, is essentially a “Guns don’t kill people, people kill people” philosophy in which technologies are value-free tools.</p>
<p>Perhaps it shouldn’t be considered as an either-or proposition but more as a continuum of possibilities. But, as mentioned earlier, ethics, per se, is not talked about much in media, especially with respect to social media.</p>
<h2>Round up the posse</h2>
<p>What society needs now, in what is still the frontier days of the internet, is a dedicated computer ethics “posse” – a group that can enact a “Trollwatch” of sorts.</p>
<p>Such vigilantism should be informed through centuries of inquiry by those wise enough to have bothered to investigate the mundane and sometimes complex reasons for the continuing struggle of right versus wrong. </p>
<p>“Internet vigilantism” would suggest taking the law into one’s own hands, and to a certain extent this does exist, as in the case of <a href="http://articles.chicagotribune.com/2007-05-31/news/0705310470_1_unique-visitors-web-drivers">cybersnitching</a>, for example.</p>
<p>The moral connotation of Trollwatch would have to be driven through school and community-based schemes as well as pro-active awareness campaigns, much like <a href="http://www.privacy.vic.gov.au/domino/privacyvic/web2.nsf/pages/home">Privacy Victoria’s activities</a> within its core domain.</p>
<p>Technology doesn’t stand still and an agile ethics is needed to co-evolve with it. Once upon a time there existed a vibrant, independent body known as the <a href="http://auscomputerethics.com/">Australian Institute of Computer Ethics (AICE)</a> but in recent times this body has been barely active, apart from the odd academic conference.</p>
<p>Groups such as AICE should administer schemes such as “Trollwatch” because they have a vested interest in computer ethics. But such organisations should transcend their immediate scholarly and/or philosophical objectives and actually engage in spreading the word on the deployment of practical ethics rather than merely sharing platitudes.</p>
<h2>A rep to protect</h2>
<p>Offering guidance on online reputation management for ordinary citizens could be one strategy. Companies already exist in this area but they would approach the issue from a public relations/marketing vantage rather than from a ethical perspective. </p>
<p>The question to be asked could be: “How much do we value our good reputation and what can be done to sustain it?”</p>
<p>Plato is <a href="http://thinkexist.com/quotation/wise_men_speak_because_they_have_something_to_say/218003.html">said to have remarked</a> that:</p>
<blockquote>
<p>Wise men speak because they have something to say; fools because they have to say something.</p>
</blockquote>
<p>Social media compel us to communicate through their very existence. Together, we all have to take responsibility and steer towards greater maturity through mindful consideration in how we use the technologies that can enrich our lives.</p>
<p>As Hillary Clinton once <a href="http://en.wikipedia.org/wiki/It_Takes_a_Village">wrote</a>: “It takes a village to raise a child.”</p><img src="https://counter.theconversation.com/content/9622/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>John Lenarcic does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>Writing for Edge in 2007, Professor Martin Rees – then President of the Royal Society and ongoing Astronomer Royal – quipped: “The global village will have its village idiots.” Rees, of course, was referring…John Lenarcic, Lecturer in Business IT & Logistics, RMIT UniversityLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/93292012-09-05T20:33:33Z2012-09-05T20:33:33ZHate mail and cyber trolls: the view from inside public health<figure><img src="https://images.theconversation.com/files/15063/original/83r7g546-1346810937.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">The blogosphere is a sewer of frothing, often anonymous, swill.</span> <span class="attribution"><span class="source">Flickr/joeshoe</span></span></figcaption></figure><p>The <a href="http://www.heraldsun.com.au/news/charlotte-dawson-how-the-cyber-trolls-beat-me/story-fnbk7kwa-1226463900647">Charlotte Dawson troll saga</a> shocked many Australians, with revelations of vile tweets, death threats and online intimidation. Nobody should have to endure this kind of abuse, but unfortunately it’s surprisingly common for those of us working in areas that challenge strong interest groups. </p>
<p>Over 35 years, my work as a public health researcher and advocate has upset many disease-promoting industries, their cheer squads and various nut-job cause leaders. </p>
<p>In the 1990s, after lobbying for gun law reform, I got lots of feverish hate mail from “decent, law abiding shooters” and a traced death threat. Each anniversary of the Port Arthur massacre I’m sent anonymous white feathers. Sixteen years on there has not been another <a href="http://tobacco.health.usyd.edu.au/assets/pdfs/Other-Research/2006InjuryPrevent.pdf">mass shooting</a>.</p>
<p>A leading anti-vaccinationist challenged me to bare my backside on TV while I was injected with all the evil vaccines I supported, calibrated up to match my weight. I didn’t do it but by coincidence, the next day I had five vaccines for an African trip. I write from the grave.</p>
<p>More recently, <a href="http://www.thesydneyinstitute.com.au/publications/contributors/gerard-henderson/">Gerard Henderson</a> told readers that because I have no medical degree, no one should believe a word I say about the problems with <a href="http://ses.library.usyd.edu.au/bitstream/2123/6835/3/Let-sleeping-dogs-lie.pdf">prostate cancer screening</a> – despite similar concerns having been raised by every expert group that investigated the issue. I’m sure Gerard wouldn’t listen to Oxford’s Sir Richard Peto, the world’s foremost epidemiologist, either. After all, he’s a mere mathematician.</p>
<p>Gerard’s sentiments are shared by UK blogger “Big” Dick Puddlecote, who sounds like he might be a Beatrix Potter villian. According to Dick, I’m a “swivel eyed loon … a sociologist who has posed as health expert for the past 30 years.”</p>
<p>The pro-tobacco people also have a way with words. And the growing momentum toward plain packaging has made their heads spin like Linda Blair in the green projectile <a href="http://www.youtube.com/watch?v=W-emQAsGMeQ">vomit scene</a> in The Exorcist.</p>
<p>According to the tobacco lobbyists, I am “the Worst Public Health Person In The World … the perfect storm of a card-carrying public health person who is harmful to both public health science and the public’s health.” I am also “responsible for the most pointless deaths of his countrymen since the guy who ordered the army to Gallipoli”.</p>
<p>All this is because in the 1980s, I advised the government to ban <a href="http://www.cdc.gov/tobacco/data_statistics/fact_sheets/smokeless/smokeless_facts/">smokeless tobacco</a> (chewing tobacco and snuff) in Australia, thwarting a circling US tobacco company hoping to start a whole new route of addiction here. </p>
<p>For years, the author of this nastiness, “<a href="http://www.thecommentator.com/article/1608/wind_turbines_unsightly_and_expensive_but_are_they_also_a_health_risk_">Professor</a>” Carl Phillips who “runs a university-like research shop”, took money from the smokeless tobacco industry. Unlike the fools who awarded me various medals for my work, Carl notes that “nothing Chapman ever did made any substantial difference in the inexorable flow” away from smoking. Apparently, it all happens by itself.</p>
<h2>Bathing in cyber sewage</h2>
<p>Within the blogosphere is a sewer of frothing, often anonymous, swill. The comments are today’s equivalent of the threatening call from a phone booth. A dozen or so blogs I check on occasionally – with the compulsion we have to look at car crashes – are echo chambers for the same small group of serial hate mongers. </p>
<p>Jay, who has the gift and never exaggerates, says of me: “Like a vicious herpes infection, or a stinking, floating turd that just won’t be flushed, Simon Chapman won’t go away. To say he is a petty, hateful bastard is being way too kind. This man is quite possibly the root of all evil in modern society. In the fullness of the time, the world will see him as one of the most hateful beings to have lived.” I don’t believe we’ve met, Jay.</p>
<p>Always on the spot with timely comparisons, Lou observed recently, “The similarities in reasoning between Simon Chapman and Anders Breivik are terrifying. Both are convinced of their own ‘right’ and thus their justification to take life. Simon Chapman only wants official sanction to do this and I have no doubt he would derive great pleasure in shooting smokers. Indeed I suspect he would spend many years doing little else.” Lock your doors.</p>
<p>One commenter suggested that April should be “make Simon Chapman regret saying silly things on Twitter month”. Terrified, I locked myself in my lead-walled bunker. </p>
<p>Patsy had a red hot go, insisting I earn $3 million a year (that’s around the total competitive grant funds I share with various colleagues, spread across five years, all of which pays for staff). But Pasty won’t hear a bar of it. She says I’m “a dangerous sociopath and he scares me.”</p>
<p>Another troll says I’m “the kind of vermin that now infest our society … I believe he’s been involved in producing several studies which I would dearly love to boil down in fish oil and force feed him every rotten scrap.”</p>
<p>But nothing prepared me for the UK’s Christopher Snowdon, an “independent” blogger who is now a cyber errand boy for Big Tobacco. I’ve copped “grandpa”, “scrotum-faced head-banger” and “wrinkled rocker”, all because I have attained the advanced age of 60 and sing in a <a href="http://www.xtranormal.com/watch/12614840/sydneys-hotest-cover-band-the-original-faux-pas">band</a>. With life expectancy of at least another 20 years, about half of young Master Christopher’s age, I plan to be around for a while.</p>
<p>Meanwhile, smoking rates are the lowest on record and still in free fall. Today’s male lung cancer rates per 100,000 were last seen in 1962 and female will never get to half the peak seen in males. </p><img src="https://counter.theconversation.com/content/9329/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Simon Chapman does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>The Charlotte Dawson troll saga shocked many Australians, with revelations of vile tweets, death threats and online intimidation. Nobody should have to endure this kind of abuse, but unfortunately it’s…Simon Chapman, Professor of Public Health, University of SydneyLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/87782012-08-10T04:52:30Z2012-08-10T04:52:30ZAnonymous’ Operation Australia – can the federal police stop them?<figure><img src="https://images.theconversation.com/files/14134/original/wjhyhy6x-1344572646.jpg?ixlib=rb-1.1.0&rect=22%2C169%2C4889%2C3073&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">What's being done about the latest spate of Anonymous attacks?</span> <span class="attribution"><span class="source">zigazou76</span></span></figcaption></figure><p>About 10am this morning, Anonymous used Twitter to announce an attack on the <a href="http://www.asio.gov.au/">Australian Security Intelligence Organisation</a> (ASIO) website. Anonymous claimed the ASIO website would be unavailable for the rest of the day.</p>
<p>The ASIO website was down for about 30 minutes after the attack and is now operating slowly or not at all. It appears the attack may be ongoing, but ASIO’s technical staff are recovering the situation.</p>
<p>Anonymous has been claiming attacks would occur on ASIO and on the <a href="http://www.dsd.gov.au/">Defence Signals Directorate</a> (DSD) website via the Anonymous Operation Australia <a href="https://twitter.com/Op_Australia/status/233718148367536128">Twitter account</a>.</p>
<p>The Anonymous attacks are part of an <a href="https://theconversation.com/why-is-anonymous-hacking-australia-8480">ongoing campaign</a> against the <a href="http://www.aph.gov.au/Parliamentary_Business/Committees/House_of_Representatives_Committees?url=pjcis/nsl2012/index.htm">government proposal</a> to introduce a data retention scheme that would require carriers and ISPs to store the web history of every Australian for one to two years.</p>
<p>Anonymous has been using <a href="http://en.wikipedia.org/wiki/Denial-of-service_attack">distributed denial of service</a> (DDoS) attacks for some time now as part of this campaign. Late last month Anonymous used DDoS or website defacing attacks on <a href="http://www.news.com.au/technology/anonymous-hackers-cripples-aussie-government-websites/story-e6frfro0-1226433788501">ten goverment websites</a>.</p>
<p>The question that every Australian should be asking the government and the <a href="http://www.afp.gov.au/">Australian Federal Police</a> (AFP) is what are they doing about the Anonymous attacks?</p>
<p>Anonymous has now launched attacks on a range of government websites, broken into an AAPT server and stolen customer data which was <a href="http://www.cio.com.au/article/432044/anonymous_releases_some_aapt_data_/">recently partially released on the web</a>.</p>
<p>When is the AFP going to declare the Anonymous attacks a major crime and dedicate resources to finding the perpetrators? Can the AFP stop the Anonymous attacks?</p>
<p>The answer is “no” if today’s events are any indicator. What makes the situation even worse is that Anonymous gave the AFP and ASIO plenty of warning – yet the attack succeeded.</p>
<p>Is Anonymous correct in its assertion the government proposal to implement a two-year data retention scheme will put all Australians at risk of far worse outcomes than the current Anonymous campaign?</p>
<p>It is time for the AFP to demonstrate to all Australian’s that their internet history can be protected by government authorities.</p>
<p>What hope have the companies that would be forced to implement the data retention scheme got of combating internet criminals if the government and AFP are powerless to stop Anonymous?</p>
<p>A good way for the AFP to demonstrate their capability to stop internet crime would be to identify and arrest the members of Anonymous who are participating in Operation Australia.</p>
<p>Another possible approach similar, to that <a href="http://americanfreepress.net/?p=4863">employed by US authorities</a>, would be for the AFP to offer the Anonymous members jobs? </p>
<p><a href="https://www.efa.org.au/">Electronic Frontiers Australia</a> (EFA) stated on July 13 that:</p>
<blockquote>
<p>EFA is deeply concerned about the proposed changes to National Security legislation foreshadowed in the discussion paper issued this week by the Attorney-General’s Department.</p>
<p>These proposed changes, if implemented in their entirety, would appear to amount to a massive expansion of surveillance activity across the entire community, accompanied by a corresponding reduction in accountability for that surveillance activity, and are therefore a potentially significant threat to the civil liberties and privacy of all Australians.</p>
</blockquote>
<p>In the USA earlier this month a bill that would establish security standards to prevent cyberattacks on the US critical infrastructure <a href="http://www.washingtonpost.com/world/national-security/cybersecurity-bill-fails-in-senate/2012/08/02/gJQADNOOSX_story.html">failed to pass the Senate</a>. Clearly, the US government is struggling to regulate the internet and to protect their vital infrastructure.</p>
<p>Key reasons for the failure of the US bill were the financial burden that would be placed on private companies, a view that government intervention was not necessary, and the provision for sharing cyberthreat data between government and industry. The data retention and sharing worried many people about potential privacy and security breaches.</p>
<p>A recommended first step for the Australian government is to invest in research that would enhanced privacy and security and provide real outcomes that can be implemented here.</p>
<p>For me a litmus test of the government’s intentions is whether or not it will mandate the use of <a href="http://en.wikipedia.org/wiki/Secure_Sockets_Layer">Secure Socket Layer</a> (SSL) certificates for email. In my view SSL should be mandatory from the customer’s device to the <a href="http://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocol">Simple Mail Transfer Protocol</a> (SMTP) server and between SMTP servers. This simple step would greatly improve privacy and security.</p>
<p>The internet is a critical piece of infrastructure that is being used in ways beyond its original design. Authorities should not try to use the internet in ways that will jeopardise the security and privacy of Australians. </p>
<p>They should be able to provide people with a guarantee their security and privacy will be protected.</p>
<h2>Further reading</h2>
<ul>
<li><a href="https://theconversation.com/why-is-anonymous-hacking-australia-8480">Why is Anonymous hacking Australia?</a></li>
<li><a href="https://theconversation.com/anonymous-child-porn-and-the-wild-wild-web-4005">Anonymous, child porn and the wild, wild web</a></li>
<li><a href="https://theconversation.com/the-internet-is-insecure-lets-build-a-better-one-fast-3977">The internet is insecure - let’s build a better one, fast</a></li>
</ul><img src="https://counter.theconversation.com/content/8778/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Mark A Gregory does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>About 10am this morning, Anonymous used Twitter to announce an attack on the Australian Security Intelligence Organisation (ASIO) website. Anonymous claimed the ASIO website would be unavailable for the…Mark A Gregory, Senior Lecturer in Electrical and Computer Engineering, RMIT UniversityLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/84802012-07-30T20:40:17Z2012-07-30T20:40:17ZWhy is Anonymous hacking Australia?<figure><img src="https://images.theconversation.com/files/13584/original/8g7fhsbb-1343608169.jpg?ixlib=rb-1.1.0&rect=0%2C51%2C848%2C548&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">Hacktivists are campaigning against the Australian government's proposed changes to privacy laws.</span> <span class="attribution"><span class="source">Tina Mailhot-Roberge</span></span></figcaption></figure><p>A few days ago, <a href="http://anonnews.org/">Anonymous</a> activists hacked into <a href="http://www.aapt.com.au/">AAPT</a>, <a href="http://www.news.com.au/technology/hacked-anonymous-steals-user-data-from-aussie-isp/story-e6frfro0-1226435629217">stole 40GB of data</a> including customer information and forced offline <a href="http://www.news.com.au/technology/anonymous-hackers-cripples-aussie-government-websites/story-e6frfro0-1226433788501">ten Australian government websites</a>.</p>
<p>Anonymous members stated in an online <a href="http://www.irc.org/">internet relay chat</a> (IRC) <a href="http://www.abc.net.au/technology/articles/2012/07/26/3554598.htm">interview</a> with the ABC that the hacking attacks were part of an ongoing campaign against the government’s proposed <a href="http://www.news.com.au/technology/govt-defends-need-to-keep-internet-data/story-e6frfro0-1226424390925">changes to privacy laws</a>.</p>
<h2>Privacy changes</h2>
<p>One of the proposed changes being discussed by the <a href="http://www.aph.gov.au/Parliamentary_Business/Committees/House_of_Representatives_Committees?url=pjcis/index.htm">Parliamentary Joint Committee on Intelligence and Security</a> (PJCIS) in an <a href="http://www.aph.gov.au/Parliamentary_Business/Committees/House_of_Representatives_Committees?url=pjcis/nsl2012/index.htm">inquiry into potential reforms of national security legislation</a> is a requirement for internet service providers (ISPs) to store user online activity for two years.</p>
<p>This means that everything you do, from social networking, emails, web browsing, chat sessions, <a href="http://www.skype.com/">Skype</a> sessions and so on would be monitored, stored and made available to government intelligence agencies as and when needed.</p>
<p>Last week, it was reported on the website <a href="http://www.slashdot.org/">Slashdot</a> that Microsoft had made Skype <a href="http://yro.slashdot.org/story/12/07/26/2243206/microsoft-makes-skype-easier-to-monitor">easier to monitor</a>. Lauren Weinstein, co-founder of <a href="http://www.pfir.org/">People for Internet Responsibility</a>, a privacy advocacy group, <a href="http://www.washingtonpost.com/business/economy/skype-makes-chats-and-user-data-more-available-to-police/2012/07/25/gJQAobI39W_story.html?hpid=z1">was quoted</a> in The Washington Post as saying:</p>
<blockquote>
<p>The issue is, to what extent are our communications being purpose-built to make surveillance easy?</p>
<p>When you make it easy to do, law enforcement is going to want to use it more and more. If you build it, they will come.</p>
</blockquote>
<p>During the ABC IRQ interview, Anonymous representatives made the following statement against increased government surveillance of the online world: </p>
<blockquote>
<p>Whilst our own rights to privacy dwindle, corporate rights to commercial confidentiality and intellectual property skyrocket. Whilst we no longer know about many of the activities of our governments, our governments have the means to accumulate unprecedented vast banks of data about us […]</p>
<p>The attacks are a way to draw attention to the msg we wish to deliver to the ppl of au.</p>
</blockquote>
<p>The hacking attacks by Anonymous on government websites and AAPT were designed to highlight to the Australian public the difficulty of keeping stored data private. By carrying out hacking attacks and then making public pronouncements Anonymous hopes to convince Australians not to support changes to the current privacy laws.</p>
<figure class="align-center ">
<img alt="" src="https://images.theconversation.com/files/13587/original/m2djvqhv-1343608993.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/13587/original/m2djvqhv-1343608993.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=401&fit=crop&dpr=1 600w, https://images.theconversation.com/files/13587/original/m2djvqhv-1343608993.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=401&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/13587/original/m2djvqhv-1343608993.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=401&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/13587/original/m2djvqhv-1343608993.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=503&fit=crop&dpr=1 754w, https://images.theconversation.com/files/13587/original/m2djvqhv-1343608993.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=503&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/13587/original/m2djvqhv-1343608993.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=503&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption"></span>
<span class="attribution"><span class="source">the[G]™</span></span>
</figcaption>
</figure>
<p><a href="http://en.wikipedia.org/wiki/Telecommunications_data_retention">Data retention</a> policies vary around the world. The European Union has had a <a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2006:105:0054:0063:EN:PDF">data retention directive</a> since 2006 that specifies types of data that are to be retained for periods of between six months and two years. </p>
<p>In recent weeks, the United Kingdom government has begun debating a draft <a href="http://www.official-documents.gov.uk/document/cm83/8359/8359.pdf">Communications Data Bill</a> that includes compulsory data retention for a wide range of information, such as websites visited, for a period of one year.</p>
<h2>Spy games</h2>
<p>So why are governments around the world increasing internet surveillance? Four reasons spring to mind:</p>
<p>1) Terrorism. The threat of terrorists using the internet to plan, support and carry out terrorist acts has prompted the <a href="http://www.ag.gov.au/">Attorney-General’s Department</a> to discuss the need to increase the powers of organisations such as the <a href="http://www.asio.gov.au/">Australian Security Intelligence Organisation</a> (ASIO), the <a href="http://www.asis.gov.au/">Australian Secret Intelligence Service</a> (ASIS) and the <a href="http://www.dsd.gov.au/">Defence Signals Directorate</a> (DSD).</p>
<p>2) <a href="https://theconversation.com/last-online-of-defence-why-is-anzus-prepping-for-a-cyber-war-3418">Cyber warfare</a>. On July 19, in the <a href="http://www.abc.net.au/news/2012-07-19/spy-service-reaches-pivotal-point/4141622">first public address</a> by a head of ASIS, Nick Warner, identified cyber warfare as a major threat: </p>
<blockquote>
<p>The field of cyber operations is one of the most rapidly evolving and potentially serious threats to our national security in the coming decade.</p>
<p>Government departments and agencies, together with corporate Australia, have been subject to concerted efforts by external actors seeking to infiltrate sensitive computer networks.</p>
<p>Developments in cyber are a two-edged sword for an agency like ASIS.</p>
<p>They offer new ways of collecting information, but the digital fingerprints and footprints which we all now leave behind complicate the task of operating covertly.</p>
</blockquote>
<p>3) <a>Cybercrime</a>. Criminals use the internet for their everyday activities much as any modern business does. In 2011 <a href="http://www.symantec.com.au/">Symantec</a>, a provider of internet security software, estimated the cost of cybercrime to Australians had reached about A$4.6 billion annually.</p>
<p>4) Hacking. Copyright and intellectual property theft over the internet has become endemic. Much of the hacking remains unreported and business has become decidedly worried about the effects of competitors <a href="http://www.businessweek.com/articles/2012-03-14/inside-the-chinese-boom-in-corporate-espionage">gaining access to intellectual property</a>.</p>
<h2>Control</h2>
<p>Governments around the world are slowly regulating the internet. Failure to do so will come at an unbearable cost to the nation, business and to individuals.</p>
<p>There is nothing Anonymous can do to stop this inevitable process – so why can’t they get on board? The group could highlight weaknesses in the internet, websites and business systems so that appropriate action can be taken.</p>
<p>To put it simply, there’s no need for Anonymous to steal data from a company and then post this data on a public website. This action is counterproductive and strengthens the government’s argument for greater regulation.</p>
<p>But the point Anonymous is trying to make, that Australian companies and the government cannot be trusted to securely implement a data retention scheme, is probably very true. </p>
<p>In the past two years, many large Australian companies have been hacked and customer information stolen including credit card details. The penalties to companies for a data breach are minor and therefore very little effort is expended by business to adequately protect customer information.</p>
<p>Governments around the world are stumbling forward with data retention policies without adequate plans for how the data is to be secured, how the data retention process is to be audited and by whom, and what the penalties will be for failure to ensure the data remains secure.</p>
<p>We are in a new phase online where the blind are leading the blind, trying to find a path towards a more secure and regulated internet that enshrines our right to privacy.</p>
<p><strong>Further Reading:</strong></p>
<ul>
<li><a href="https://theconversation.com/scamwatch-a-helping-hand-against-online-scammers-6842">SCAMwatch – a helping hand against online scammers</a></li>
<li><a href="https://theconversation.com/the-internet-is-insecure-lets-build-a-better-one-fast-3977">The internet is insecure – Let’s build a better one, fast</a></li>
<li><a href="https://theconversation.com/zombie-computers-cyber-security-phishing-what-you-need-to-know-1671">Zombie computers, cyber security, phishing … what you need to know</a></li>
</ul><img src="https://counter.theconversation.com/content/8480/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Mark A Gregory does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>A few days ago, Anonymous activists hacked into AAPT, stole 40GB of data including customer information and forced offline ten Australian government websites. Anonymous members stated in an online internet…Mark A Gregory, Senior Lecturer in Electrical and Computer Engineering, RMIT UniversityLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/79902012-07-16T20:36:32Z2012-07-16T20:36:32ZMeme team: Olympic fandom meets the internet<figure><img src="https://images.theconversation.com/files/12874/original/7tw6cstf-1342069683.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">Memes will play an important role – and provide some fun – during the London Olympics.</span> <span class="attribution"><span class="source">Facebook.com/TheOlympicMemes</span></span></figcaption></figure><p>London 2012 is already seeing fierce competition for meme supremacy.</p>
<p>Memes, especially in the form of captioned images - or <a href="http://en.wikipedia.org/wiki/Image_macro">image macros</a> - are an increasingly mainstream form by which people <a href="https://theconversation.com/obama-norway-killings-london-riots-you-can-has-a-meme-for-that-2328">comment on current issues</a>.</p>
<h2>US domination</h2>
<p>You will likely not find Olympic memes in the IOC’s strictly controlled <a>official social media forums</a>. But Facebook sports at least six Olympics meme pages. </p>
<p>With more than 40,000 “likes”, <a href="https://www.facebook.com/TheOlympicMemes">The Olympic Memes</a> is the clear favourite.</p>
<p>That being said the page is dominated by US interests, as are the images in most meme collections. Luckily, there is a meme designed to address such irony: <a href="http://knowyourmeme.com/memes/scumbag-steve">Scumbag Steve</a>.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/12875/original/32vd3byw-1342069810.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/12875/original/32vd3byw-1342069810.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/12875/original/32vd3byw-1342069810.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=588&fit=crop&dpr=1 600w, https://images.theconversation.com/files/12875/original/32vd3byw-1342069810.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=588&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/12875/original/32vd3byw-1342069810.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=588&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/12875/original/32vd3byw-1342069810.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=739&fit=crop&dpr=1 754w, https://images.theconversation.com/files/12875/original/32vd3byw-1342069810.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=739&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/12875/original/32vd3byw-1342069810.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=739&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Scumbag Steve.</span>
<span class="attribution"><span class="source">Facebook.com/TheOlympicMemes</span></span>
</figcaption>
</figure>
<h2>The meme team</h2>
<p>The most numerous pre-Olympic memes concern the composition of the <a href="http://www.guardian.co.uk/sport/2012/jul/08/us-olympic-basketball-team-named">US Men’s Basketball team</a>. </p>
<p>NBA player Brian Scalabrine has been the subject of some ridicule since his selection in the 2001 NBA draft. His statistics are [mediocre, but he has a fan-base built on consistent performance, likeablity, and everyman appeal](http://bleacherreport.com/articles/1061490-brian-scalabrine-and-the-2012-usa-olympic-basketball-team](http://bleacherreport.com/articles/1061490-brian-scalabrine-and-the-2012-usa-olympic-basketball-team).</p>
<p>However, much support for Scalabrine is janus-faced. According to [Know Your Meme](http://knowyourmeme.com/memes/people/brian-scalabrine](http://knowyourmeme.com/memes/people/brian-scalabrine): </p>
<blockquote>
<p>As a joke, NBA fans will typically proclaim how great and amazing his basketball talents are, call him the “White Mamba,” or propose ridiculous scenarios or trades that could involve Scalabrine.</p>
</blockquote>
<p>When it was suggested Scalabrine might be on the US Men’s Basketball team, this ironic support made its way to the internet by way of typical modes of memetic commentary.</p>
<p>As with many memes, some intertextual media knowledge is needed to understand the content. For example, the meme below uses an image and <a href="http://en.wikipedia.org/wiki/Snowclone">snowclone</a> phrase from the <a href="http://www.nickelodeon.com.au/spongebob/">SpongeBob Squarepants</a> cartoon. </p>
<p>Spongebob’s friend <a href="http://spongebob.wikia.com/wiki/Patrick_Star">Patrick</a> typically proposes simple but stupid solutions on the show. The meme exploits this to propose that choosing Scalabrine has the same connotations.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/12877/original/tt6gncqy-1342070065.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/12877/original/tt6gncqy-1342070065.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/12877/original/tt6gncqy-1342070065.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=1057&fit=crop&dpr=1 600w, https://images.theconversation.com/files/12877/original/tt6gncqy-1342070065.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=1057&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/12877/original/tt6gncqy-1342070065.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=1057&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/12877/original/tt6gncqy-1342070065.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=1328&fit=crop&dpr=1 754w, https://images.theconversation.com/files/12877/original/tt6gncqy-1342070065.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=1328&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/12877/original/tt6gncqy-1342070065.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=1328&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Scalabrine: Patrick meme.</span>
<span class="attribution"><span class="source">Facebook.com/TheOlympicMemes</span></span>
</figcaption>
</figure>
<p>Similarly, the [Jackie Chan](http://knowyourmeme.com/memes/my-brain-is-full-of-fk](http://knowyourmeme.com/memes/my-brain-is-full-of-fk) <a href="http://knowyourmeme.com/memes/rage-comics">rage comic</a> face is typically used to express strong and genuine exasperation over the incomprehsible and obviously foolishness of a situation. </p>
<p>As such, it makes the irony quite pointed to ask where Scalabrine is in relation to a table of the chosen team members’ statistics. </p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/12878/original/ss346yxk-1342070124.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/12878/original/ss346yxk-1342070124.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/12878/original/ss346yxk-1342070124.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=576&fit=crop&dpr=1 600w, https://images.theconversation.com/files/12878/original/ss346yxk-1342070124.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=576&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/12878/original/ss346yxk-1342070124.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=576&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/12878/original/ss346yxk-1342070124.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=724&fit=crop&dpr=1 754w, https://images.theconversation.com/files/12878/original/ss346yxk-1342070124.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=724&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/12878/original/ss346yxk-1342070124.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=724&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Scalabrine: Jackie Chan meme.</span>
<span class="attribution"><span class="source">Facebook.com/TheOlympicMemes</span></span>
</figcaption>
</figure>
<p>It is not just poor players who face the scathing memetic retribution of the internet. NBA superstar <a href="http://www.lebronjames.com/">LeBron James</a> has a meme dedicated to his [long-standing inability to obtain an NBA championship ring](http://www.buzzfeed.com/ktlincoln/the-death-of-the-lebron-no-ring-meme](http://www.buzzfeed.com/ktlincoln/the-death-of-the-lebron-no-ring-meme). James is on the Olympic team, but is being mocked about only participating to win a “ring”.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/12880/original/gtcv59dq-1342070299.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/12880/original/gtcv59dq-1342070299.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/12880/original/gtcv59dq-1342070299.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=463&fit=crop&dpr=1 600w, https://images.theconversation.com/files/12880/original/gtcv59dq-1342070299.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=463&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/12880/original/gtcv59dq-1342070299.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=463&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/12880/original/gtcv59dq-1342070299.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=582&fit=crop&dpr=1 754w, https://images.theconversation.com/files/12880/original/gtcv59dq-1342070299.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=582&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/12880/original/gtcv59dq-1342070299.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=582&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">LeBron James: players tease about the Olympics ring meme.</span>
<span class="attribution"><span class="source">superlame.com</span></span>
</figcaption>
</figure>
<p>Although James has now won an NBA Championship ring, memes continue to mock him by pointing out how few rings he has compared to other team members.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/12881/original/kvvphjzm-1342070715.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/12881/original/kvvphjzm-1342070715.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/12881/original/kvvphjzm-1342070715.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=211&fit=crop&dpr=1 600w, https://images.theconversation.com/files/12881/original/kvvphjzm-1342070715.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=211&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/12881/original/kvvphjzm-1342070715.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=211&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/12881/original/kvvphjzm-1342070715.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=265&fit=crop&dpr=1 754w, https://images.theconversation.com/files/12881/original/kvvphjzm-1342070715.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=265&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/12881/original/kvvphjzm-1342070715.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=265&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">LeBron James: number of rings meme.</span>
<span class="attribution"><span class="source">Facebook.com/TheOlympicMemes</span></span>
</figcaption>
</figure>
<p>Users on the Facebook Olympic Memes page are also interacting about the apples-to-oranges comparison of NBA Championship rings to Olympic medals. </p>
<p>In one meme, SpongeBob’s cynical neighbour <a href="http://spongebob.wikia.com/wiki/Squidward_Tentacles">Squidward</a> dryly notes the difference, and a President Obama meme has been created to respond to the Squidward meme, heightening the ridiculous nature of the issue.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/12882/original/bk4n49h4-1342070938.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/12882/original/bk4n49h4-1342070938.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/12882/original/bk4n49h4-1342070938.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=383&fit=crop&dpr=1 600w, https://images.theconversation.com/files/12882/original/bk4n49h4-1342070938.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=383&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/12882/original/bk4n49h4-1342070938.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=383&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/12882/original/bk4n49h4-1342070938.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=481&fit=crop&dpr=1 754w, https://images.theconversation.com/files/12882/original/bk4n49h4-1342070938.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=481&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/12882/original/bk4n49h4-1342070938.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=481&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">LeBron James: Squidward meme.</span>
<span class="attribution"><span class="source">Facebook.com/TheOlympicMemes</span></span>
</figcaption>
</figure>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/12884/original/qpsctx9h-1342071038.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/12884/original/qpsctx9h-1342071038.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/12884/original/qpsctx9h-1342071038.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=398&fit=crop&dpr=1 600w, https://images.theconversation.com/files/12884/original/qpsctx9h-1342071038.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=398&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/12884/original/qpsctx9h-1342071038.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=398&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/12884/original/qpsctx9h-1342071038.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=501&fit=crop&dpr=1 754w, https://images.theconversation.com/files/12884/original/qpsctx9h-1342071038.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=501&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/12884/original/qpsctx9h-1342071038.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=501&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">LeBron James: Omaba responds to Squidward meme.</span>
<span class="attribution"><span class="source">easymeme.com</span></span>
</figcaption>
</figure>
<p>Mocking about the level of greatness is taken even further with images of other Olympic athletes displaying their medals as if to top a boast from LeBron. The version below shows gymnast <a href="http://www.shawnjohnson.net/">Shawn Johnson</a> captioned with another meme-element, the phrase <a href="http://knowyourmeme.com/memes/u-mad">“You mad?”</a>. </p>
<figure class="align-center ">
<img alt="" src="https://images.theconversation.com/files/12885/original/9wmjrbm6-1342071089.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/12885/original/9wmjrbm6-1342071089.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=413&fit=crop&dpr=1 600w, https://images.theconversation.com/files/12885/original/9wmjrbm6-1342071089.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=413&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/12885/original/9wmjrbm6-1342071089.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=413&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/12885/original/9wmjrbm6-1342071089.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=518&fit=crop&dpr=1 754w, https://images.theconversation.com/files/12885/original/9wmjrbm6-1342071089.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=518&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/12885/original/9wmjrbm6-1342071089.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=518&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption">LeBron James: Shawn Johnson meme.</span>
<span class="attribution"><span class="source">Facebook.com/TheOlympicMemes</span></span>
</figcaption>
</figure>
<p>An image of <a href="http://www.michaelphelps.net/">Michael Phelps</a> has been used in a similar fashion to mock the Charlotte Bobcats.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/12886/original/4ygtmvbv-1342071150.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/12886/original/4ygtmvbv-1342071150.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/12886/original/4ygtmvbv-1342071150.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=751&fit=crop&dpr=1 600w, https://images.theconversation.com/files/12886/original/4ygtmvbv-1342071150.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=751&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/12886/original/4ygtmvbv-1342071150.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=751&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/12886/original/4ygtmvbv-1342071150.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=943&fit=crop&dpr=1 754w, https://images.theconversation.com/files/12886/original/4ygtmvbv-1342071150.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=943&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/12886/original/4ygtmvbv-1342071150.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=943&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Michael Phelps versus Bobcats medal count meme.</span>
<span class="attribution"><span class="source">Facebook.com/TheOlympicMemes</span></span>
</figcaption>
</figure>
<h2>Australia: Guns versus Speedos</h2>
<p>The Australian Olympic team currently appears in very few memes. One exception is a response to the [controversial photographs of Nick D'Arcy and Kenrick Monk holding guns](http://www.abc.net.au/news/2012-06-07/darcy-and-monk-in-hot-water/4058860](http://www.abc.net.au/news/2012-06-07/darcy-and-monk-in-hot-water/4058860).</p>
<p><a href="http://frugalbastard.blogspot.com.au/2012/06/guns-versus-speedos.html">Hammy’s</a> meme version uses contrasting categories of social expectations over who holds guns and who wears Speedos, comparing D’Arcy and Monk to shooter <a href="http://www.michaeldiamond.net.au/">Michael Diamond</a>. For a meme, this is a very gentle chiding that still shows support for Australian athletes.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/12876/original/fjw97vv2-1342069909.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/12876/original/fjw97vv2-1342069909.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/12876/original/fjw97vv2-1342069909.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=861&fit=crop&dpr=1 600w, https://images.theconversation.com/files/12876/original/fjw97vv2-1342069909.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=861&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/12876/original/fjw97vv2-1342069909.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=861&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/12876/original/fjw97vv2-1342069909.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=1081&fit=crop&dpr=1 754w, https://images.theconversation.com/files/12876/original/fjw97vv2-1342069909.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=1081&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/12876/original/fjw97vv2-1342069909.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=1081&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Guns vs Speedos meme.</span>
<span class="attribution"><span class="source">Hanny | frugalbastard.blogspot.com.au</span></span>
</figcaption>
</figure>
<p>The central concept of this version evolved from prior memes chiding inappropriate combinations, in this case [men in speedos with guns](http://knowyourmeme.com/memes/fat-hairy-man-in-a-speedo-with-guns-and-guitar-hero-controllers](http://knowyourmeme.com/memes/fat-hairy-man-in-a-speedo-with-guns-and-guitar-hero-controllers). </p>
<h2>Olympic versions of common memes</h2>
<p>While the Scalabrine and LeBron James memes involve collections of different image macros responding to the same situation, the majority of Olympic memes are single-instance issues or generally applicable uses of <a href="http://imgflip.com/memetemplates">common meme templates</a>. </p>
<p>Again, many involve revealing ironic comparisons, such as [Annoying Facebook Girl’s](http://knowyourmeme.com/memes/annoying-facebook-girl](http://knowyourmeme.com/memes/annoying-facebook-girl) inappropriate fandom.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/12887/original/28j7rhc6-1342071233.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/12887/original/28j7rhc6-1342071233.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/12887/original/28j7rhc6-1342071233.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=600&fit=crop&dpr=1 600w, https://images.theconversation.com/files/12887/original/28j7rhc6-1342071233.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=600&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/12887/original/28j7rhc6-1342071233.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=600&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/12887/original/28j7rhc6-1342071233.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=754&fit=crop&dpr=1 754w, https://images.theconversation.com/files/12887/original/28j7rhc6-1342071233.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=754&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/12887/original/28j7rhc6-1342071233.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=754&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Annoying Facebook Girl meme.</span>
<span class="attribution"><span class="source">Facebook.com/TheOlympicMemes</span></span>
</figcaption>
</figure>
<p>Hypocrisy is damned with cuteness in this version of the [Condescending Wonka](http://knowyourmeme.com/memes/condescending-wonka-creepy-wonka](http://knowyourmeme.com/memes/condescending-wonka-creepy-wonka) meme that points out the disproportionate physical efforts of athletes and animals.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/12888/original/6grvwhnk-1342071290.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/12888/original/6grvwhnk-1342071290.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/12888/original/6grvwhnk-1342071290.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=499&fit=crop&dpr=1 600w, https://images.theconversation.com/files/12888/original/6grvwhnk-1342071290.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=499&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/12888/original/6grvwhnk-1342071290.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=499&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/12888/original/6grvwhnk-1342071290.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=627&fit=crop&dpr=1 754w, https://images.theconversation.com/files/12888/original/6grvwhnk-1342071290.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=627&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/12888/original/6grvwhnk-1342071290.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=627&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Condescending Husky meme.</span>
<span class="attribution"><span class="source">Reddit.com</span></span>
</figcaption>
</figure>
<h2>The shape of memes to come</h2>
<p>As we head into the Olympics, expect to see a range of memes. Many will be simple images of athletes in strange physical positions, in which there is no particular meaning associated with the athlete or the action beyond the strangeness of bodies captured in mid-motion.</p>
<p>More complexly, individual images will be combined with existing meme template elements to provide new versions of common memes. In the image below, the athlete’s facial expression is associated with stupidity (<a href="http://knowyourmeme.com/memes/derp">“derping”</a>) and arm positions associated with the defensive surprise of the <a href="http://knowyourmeme.com/memes/neil-degrasse-tyson-reaction">Neil Degrass-Tyson reaction</a> rage comic. </p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/12902/original/7mm6jtdt-1342073168.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/12902/original/7mm6jtdt-1342073168.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/12902/original/7mm6jtdt-1342073168.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=1364&fit=crop&dpr=1 600w, https://images.theconversation.com/files/12902/original/7mm6jtdt-1342073168.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=1364&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/12902/original/7mm6jtdt-1342073168.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=1364&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/12902/original/7mm6jtdt-1342073168.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=1715&fit=crop&dpr=1 754w, https://images.theconversation.com/files/12902/original/7mm6jtdt-1342073168.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=1715&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/12902/original/7mm6jtdt-1342073168.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=1715&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Diver - Derp - Neil Degrassi-Tyson reaction meme.</span>
<span class="attribution"><span class="source">memecenter.com</span></span>
</figcaption>
</figure>
<p>The most telling memes, though, will be those that comment on an aspect of the Olympic athletes, sports or administration, such as the US Men’s basketball team memes above.</p>
<p>When controversy strikes, the memes will follow, just as they should – memes are appropriately a folk medium. </p>
<p>In the ensuing days and weeks, look for memes on everything from the important (such as the <a href="http://www.abc.net.au/news/2012-07-13/britain-embarrassed-by-olympic-security-shortfall/4127798">G4S security shortfall</a> and the <a href="http://www.bbc.co.uk/news/world-middle-east-18813543">inclusion of Saudi women</a>) to the trivial (such as the <a href="http://www.washingtonpost.com/sports/olympic-village-opens-but-athletes-wanting-to-stretch-on-king-size-beds-should-look-elsewhere/2012/07/12/gJQAljbYfW_story.html">size of the Olympic village beds</a>).</p>
<p>Memes are one of the places to express our opinions, and they will represent an important facet of the London 2012 <a href="http://mashable.com/2012/07/08/2012-olympics-social-growth/">Socialympics</a>.</p><img src="https://counter.theconversation.com/content/7990/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.</span></em></p>London 2012 is already seeing fierce competition for meme supremacy. Memes, especially in the form of captioned images - or image macros - are an increasingly mainstream form by which people comment on…Sean Rintel, Lecturer in Strategic Communication, The University of QueenslandLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/68422012-07-03T20:38:33Z2012-07-03T20:38:33ZSCAMwatch – a helping hand against online scammers<figure><img src="https://images.theconversation.com/files/12560/original/z9jrjdmj-1341296302.jpg?ixlib=rb-1.1.0&rect=19%2C59%2C1219%2C683&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">Thinking you know every trick in the book doesn't mean you really do.</span> <span class="attribution"><span class="source">Don Hawkins</span></span></figcaption></figure><p>Crimes of confidence, known as scams, are on the rise. You probably know the basics. The way the most common type of scam works involves you being presented with an offer, product or service for which you pay and then don’t receive anything.</p>
<p>Scams have always been big business and perpetrators have adapted quickly to new technology. Telephone, mail and now the internet have provided an ever-growing platform for large-scale, and coordinated, scam attacks.</p>
<p>Why should we be worried? What’s the real scale of the problem?</p>
<p>Well, the Director General of Britain’s MI5, Jonathan Evans last week <a href="http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/9354373/Cyber-crime-a-global-threat-MI5-head-warns.html">warned</a> that:</p>
<blockquote>
<p>Vulnerabilities in the internet are being exploited aggressively not just by criminals but also by states,“ and "the extent of what is going on is astonishing – with industrial-scale processes involving many thousands of people lying behind both State sponsored cyber espionage and organised cyber crime.</p>
</blockquote>
<figure class="align-right zoomable">
<a href="https://images.theconversation.com/files/12561/original/9fpkkprb-1341296314.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/12561/original/9fpkkprb-1341296314.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/12561/original/9fpkkprb-1341296314.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=754&fit=crop&dpr=1 600w, https://images.theconversation.com/files/12561/original/9fpkkprb-1341296314.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=754&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/12561/original/9fpkkprb-1341296314.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=754&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/12561/original/9fpkkprb-1341296314.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=948&fit=crop&dpr=1 754w, https://images.theconversation.com/files/12561/original/9fpkkprb-1341296314.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=948&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/12561/original/9fpkkprb-1341296314.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=948&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption"></span>
<span class="attribution"><span class="source">Search Influence</span></span>
</figcaption>
</figure>
<p>Multinationals offering services online, with customer’s banking details logged on their servers, continue to get hacked at an ever increasing pace, and some more than once. </p>
<p>Many people will know the <a href="http://www.smh.com.au/digital-life/consumer-security/hack-warning-on-itunes-accounts-20120619-20lps.html">Apple iTunes and app store accounts</a> were hacked recently. Such hacks go on all the time, but without the attendant publicity generated by a story involving a company of Apple’s stature.</p>
<p>A <a href="http://www.rsa.com/innovation/docs/CMU-GOVERNANCE-RPT-2012-FINAL.pdf">study</a> by the Carnegie Mellon University’s <a href="http://www.cylab.cmu.edu/">Cylab</a> found that only 13% of companies had a privacy officer – someone whose job it would be to police online security.</p>
<p>According to Jody Westby, CEO of security firm <a href="http://www.globalcyberrisk.com/">Global Cyber Risk</a> and adjunct distinguished follow at Carnegie Mellon: </p>
<blockquote>
<p>It’s no wonder there are so many breaches. Privacy, security and cybercrime are three legs of the same stool.</p>
</blockquote>
<p>The responsibility for the rise in organised crime does not solely lie with corporations and the government. Everyone needs to take the time necessary to become aware of how organised criminals are going to try to effect a scam.</p>
<p>One important first step towards learning how to deal with scams is to visit the <a href="http://www.scamwatch.gov.au/">SCAMwatch</a> website launched recently by the <a href="http://www.accc.gov.au/content/index.phtml/itemId/142">Australian Competition and Consumer Commission</a> (ACCC).</p>
<p>SCAMwatch provides information to consumers and small business about how to recognise, avoid and <a href="https://www.scamwatch.gov.au/content/index.phtml/itemId/694011">report scams</a>.</p>
<p>What becomes immediately apparent at SCAMwatch is the large number of active scams found today. Scams are designed to target every aspect of our daily lives and focus on finding some weakness, need or desire that can be taken advantage of.</p>
<figure class="align-left zoomable">
<a href="https://images.theconversation.com/files/12563/original/4cygm4cc-1341296344.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/12563/original/4cygm4cc-1341296344.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/12563/original/4cygm4cc-1341296344.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=450&fit=crop&dpr=1 600w, https://images.theconversation.com/files/12563/original/4cygm4cc-1341296344.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=450&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/12563/original/4cygm4cc-1341296344.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=450&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/12563/original/4cygm4cc-1341296344.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=566&fit=crop&dpr=1 754w, https://images.theconversation.com/files/12563/original/4cygm4cc-1341296344.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=566&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/12563/original/4cygm4cc-1341296344.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=566&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption"></span>
<span class="attribution"><span class="source">jepoirrier</span></span>
</figcaption>
</figure>
<p>By definition, scammers create scams to look genuine. By convincing you that the scam is real you become more likely to carry out the actions necessary for the scam to succeed.</p>
<p>SCAMwatch is an important education tool that provides examples of scams, descriptions of how the scammers will try to entice you and recent <a href="http://www.scamwatch.gov.au/content/index.phtml/itemId/693979">scam victim stories</a> that are provided to encourage Australians to learn from their experiences.</p>
<p>There have already been criticisms of the service. If you use the SCAMwatch <a href="https://www.scamwatch.gov.au/content/index.phtml/itemId/694011">scam report form</a> the information you provide is sent to the ACCC and not to the Australian federal or state police. A better solution – many argue, and I tend to agree – would be for the scam report to be sent to all of the appropriate Australian authorities.</p>
<p>A list of other organisations that you should contact to report a scam can be found <a href="http://www.scamwatch.gov.au/content/index.phtml/itemId/854913">here</a>.</p>
<p>But, for any of its faults, SCAMwatch is an impressive educational tool that includes simple and easy-to-understand descriptions of common scams with excellent advice on how we can better protect ourselves, including:</p>
<ul>
<li><p><a href="https://www.scamwatch.gov.au/content/index.phtml/tag/ScamWatchEmailAlerts/">SCAMwatch email alerts</a>. These provide warnings when a sharp increase in the execution of a particular scam is identified. Companies that do not have a person responsible for security and privacy should nominate someone to receive the SCAMwatch email alerts.</p></li>
<li><p>The <a href="http://www.accc.gov.au/content/index.phtml/tag/littleblackbookofscams">little black book of scams</a> is excellent reading. Ask for the printer version to be sent to you or download the PDF version to read on your computer, Kindle or iPad.</p></li>
<li><p><a href="http://www.scamwatch.gov.au/content/index.phtml/tag/SeeaScamSamples">See-a-scam</a> samples provide details on a range of real scams and examples of how the scammers will try to trick you.</p></li>
<li><p>The <a href="http://www.scamwatch.gov.au/content/index.phtml/tag/scamawarenessvideos">scam awareness videos </a> are a light-hearted series of videos that take you through various scams.</p></li>
</ul>
<figure class="align-right zoomable">
<a href="https://images.theconversation.com/files/12564/original/x2p8qnpj-1341296356.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/12564/original/x2p8qnpj-1341296356.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/12564/original/x2p8qnpj-1341296356.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=531&fit=crop&dpr=1 600w, https://images.theconversation.com/files/12564/original/x2p8qnpj-1341296356.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=531&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/12564/original/x2p8qnpj-1341296356.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=531&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/12564/original/x2p8qnpj-1341296356.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=668&fit=crop&dpr=1 754w, https://images.theconversation.com/files/12564/original/x2p8qnpj-1341296356.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=668&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/12564/original/x2p8qnpj-1341296356.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=668&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption"></span>
<span class="attribution"><span class="source">B Rosen</span></span>
</figcaption>
</figure>
<p>So that we get a reality check about the serious nature of the material presented on SCAMwatch, the site includes <a href="http://www.scamwatch.gov.au/content/index.phtml/tag/victimstories">recent scam victim stories</a>. </p>
<p>Personally, I don’t need to see the stories on SCAMwatch to know how heart-rendering the after-effects of being scammed can be. Members of my family, as with many other families, have been scammed and lost considerable sums of money.</p>
<p>The collective disgust of society towards scammers will not stop them because today scammers often hide, operate and disappear again exclusively in cyberspace. Trying to slam a door in their face just won’t work. </p>
<p>Take the time, visit SCAMwatch, learn and empower yourself and your organisation in the fight against scams.</p><img src="https://counter.theconversation.com/content/6842/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Mark A Gregory does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>Crimes of confidence, known as scams, are on the rise. You probably know the basics. The way the most common type of scam works involves you being presented with an offer, product or service for which…Mark A Gregory, Senior Lecturer in Electrical and Computer Engineering, RMIT UniversityLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/53432012-03-05T19:44:36Z2012-03-05T19:44:36ZAn invincible file-sharing platform? You can’t be serious<figure><img src="https://images.theconversation.com/files/8320/original/s4k8r3zd-1330909350.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">Treats are great to share, provided you have the owner's permission.</span> <span class="attribution"><span class="source">Kalexanderson</span></span></figcaption></figure><p>A new version of the peer-to-peer sharing application <a href="http://dl.tribler.org/download.html">Tribler</a> has <a href="http://torrentfreak.com/tribler-makes-bittorrent-impossible-to-shut-down-120208/">created a buzz</a> online following claims by the software’s lead developer that the app is impervious to attack.</p>
<p>In a recent interview with <a href="http://torrentfreak.com/tribler-makes-bittorrent-impossible-to-shut-down-120208/">TorrentFreak</a>, <a href="http://pds.twi.tudelft.nl/%7Epouwelse/">Dr Johan Pouwelse</a> from the <a href="http://home.tudelft.nl/en/">Delft University of Technology</a>, said “the only way to take [Tribler] down is to <a href="https://theconversation.com/could-anonymous-really-shut-down-the-internet-5573">take the internet down</a>”.</p>
<p>Tribler has been in development for five years and, as with many other file-sharing applications, is based on the <a href="http://en.wikipedia.org/wiki/BitTorrent_(protocol)">BitTorrent protocol</a>. But unlike other BitTorrent platforms, Tribler is a decentralised system that works without the need for torrent sites – lists of links to files available for download through the BitTorrent protocol – and <a href="http://en.wikipedia.org/wiki/BitTorrent_tracker">trackers</a>. Instead, Tribler has been designed to search the internet for hosts that contain the desired files.</p>
<p>Dr Pouwelse’s claims of Tribler’s invincibility are simply amazing. If he is to be believed, peer-to-peer file-sharers finally have a tool that can’t be turned off <a href="http://www.dailymail.co.uk/sciencetech/article-2098759/Tribler-New-file-sharing-technology-IMMUNE-government-attacks.html">nor attacked by government</a> and the music and movie industry.</p>
<p>Sadly, these are difficult claims to take seriously.</p>
<p>In the 1980s and 90s, music and movie companies flooded the internet with <a href="http://en.wikipedia.org/wiki/Host_(network)">hosts</a> containing music and movies that had been altered from their original form. The aim was to trick users into wasting time and bandwidth downloading a file that wasn’t the file they were looking for.</p>
<p>One way files could be modified was with the addition of a <a href="http://filesharingbook.uw.hu/filesharing0093.html">cuckoo egg</a> (as we all know, the cuckoo lays its eggs in another bird’s nest to trick the victim bird into tending the cuckoo egg). </p>
<p>A <a href="http://www.hand-2-mouth.com/cuckooegg/">cuckoo egg</a> is a file that looks the same as the file a user is searching for – in filename and filesize – but is actually <a href="http://www.hand-2-mouth.com/cuckooegg/cuckooeggsound.mp3">a totally different file</a>. </p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/8321/original/787nt8g5-1330909657.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/8321/original/787nt8g5-1330909657.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/8321/original/787nt8g5-1330909657.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=341&fit=crop&dpr=1 600w, https://images.theconversation.com/files/8321/original/787nt8g5-1330909657.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=341&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/8321/original/787nt8g5-1330909657.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=341&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/8321/original/787nt8g5-1330909657.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=429&fit=crop&dpr=1 754w, https://images.theconversation.com/files/8321/original/787nt8g5-1330909657.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=429&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/8321/original/787nt8g5-1330909657.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=429&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Tribler makes great claims … and is popular.</span>
<span class="attribution"><span class="source">tribler.org</span></span>
</figcaption>
</figure>
<p>Watermarks can also be added to music and movies, allowing the files to be <a href="http://videotechresearch.com/Jeffrey_Bloom/research/bloom04-asilomar.pdf">tracked across the network</a>. This allows organisations such as <a href="http://peermediatech.com/">PeerMedia Technologies</a> – who provide this service to the music and movie industries – to identify people who have breached copyright.</p>
<p>As countries move towards implementing traffic filters and systems <a href="http://www.dsd.gov.au/infosec/csoc.htm">to prevent cyberattack</a>, it has become easier to identify and then disrupt, stop or distort Tribler traffic streams.</p>
<p>The process of distorting, altering or substituting a different stream is not complex and in some ways may occur much as a <a href="http://en.wikipedia.org/wiki/Man-in-the-middle_attack">“man-in-the-middle attack”</a> is used to penetrate secure systems. (In such an attack, a third party intercepts traffic between two users, creating a fake stream of data, while making one – or both – users believe they are communicating with the other).</p>
<p>Another approach is to <a href="http://en.wikipedia.org/wiki/Deep_packet_inspection">filter</a> the Tribler stream and if a copyrighted music or video stream is found, the source and destination <a href="https://theconversation.com/the-end-of-the-internet-ipv4-versus-ipv6-145">IP addresses</a> could be added to a blacklist, blocked by filters or blocked from essential network services such as the <a href="http://en.wikipedia.org/wiki/Domain_Name_System">Domain Name System (DNS)</a>. (DNS is the service used to translate web address names – such as amazon.com – to IP addresses – such as 72.21.214.128.)</p>
<p>Late last year a group of Australian ISPs – including Telstra and Optus – proposed a copyright infringement policy that would allow ISPs to <a href="http://delimiter.com.au/2011/11/25/isps-propose-new-anti-piracy-warning-scheme/">send users a warning</a> after five illegal downloads. <a href="http://www.commsalliance.com.au/__data/assets/pdf_file/0019/32293/Copyright-Industry-Scheme-Proposal-Final.pdf">The policy</a> lists a range of consequences for customers that fail to comply with the warning notice, such as providing the copyright holder with access to the customer’s details upon request.</p>
<p>Over time, we’re likely to see music, movie and media companies developing closer links with network carriers and ISPs because the internet is becoming the medium of choice for distributing this content. For carriers and ISPs, revenue from access systems is decreasing due to <a href="http://www.itnews.com.au/News/224372,telstra-warns-isps-to-expect-aggressive-competition.aspx">competition</a>, leading to a <a href="http://www.abs.gov.au/ausstats/abs@.nsf/mf/8153.0">decrease in the number of ISPs</a>. At the same time, we’re seeing an increase in revenue from bundled products including music, movie and media distribution. </p>
<p>Carriers and ISPs will increasingly want to reduce the amount of pirated content on their networks as copyright infringement reduces income from customers subscribing to <a href="http://en.wikipedia.org/wiki/IPTV">IPTV</a> – television delivered over the internet – video on-demand and music-streaming services.</p>
<p>This symbiotic relationship between ISPs and media companies should be a cause for concern for peer-to-peer file-sharers. We shouldn’t be surprised if we even see music and movie companies buying ISPs in the near future.</p>
<p>Regardless, claims about Tribler’s invincibility are almost certainly overblown, and it’s clear the battle between file-sharers and copyright holders is far from over.</p><img src="https://counter.theconversation.com/content/5343/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Mark A Gregory does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>A new version of the peer-to-peer sharing application Tribler has created a buzz online following claims by the software’s lead developer that the app is impervious to attack. In a recent interview with…Mark A Gregory, Senior Lecturer in Electrical and Computer Engineering, RMIT UniversityLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/50832012-01-31T01:38:21Z2012-01-31T01:38:21ZMegaupload martyrdom sparks crisis in the faith of file-sharing<figure><img src="https://images.theconversation.com/files/7250/original/22mvvvzy-1327968885.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">What's mine is yours (until they break down the doors).</span> <span class="attribution"><span class="source">ryancr</span></span></figcaption></figure><p>Latest <a href="http://www.guardian.co.uk/technology/2012/jan/30/megaupload-file-sharing?newsfeed=true">reports</a> suggest all of the data on seized file storage website Megaupload – legal or illegal – could be erased as soon as Thursday.</p>
<p>Clearly it’s not great news for the site’s founder <a href="http://www.usatoday.com/tech/news/story/2012-01-29/kim-dotcom-megaupload/52875276/1">Kim Dotcom</a> (Kim Schmitz) and colleagues, who are accused of copyright infringement to the value of US$500 million. If they’re found guilty they could receive a prison sentence of 20 years.</p>
<p>But what about the 50 million people who have used Megaupload’s services, many of them perfectly legally? What will become of them?</p>
<h2>Copping it or Kopism?</h2>
<p>The world’s newest religion is “<a href="http://bit.ly/wK3Z2D">Kopimism</a>”, which won official government recognition in Sweden earlier this month.</p>
<p>Adherents worship no deity, nor do they have any concept of an afterlife. The defining feature of this faith is a belief system in copying, pure and simple, with the doctrine of file-sharing reigning supreme as a positive value. </p>
<p>This may seem like an offbeat approach to securing a future legal loophole of sorts, but it’s also an indicator of a seismic shift in the customs of contemporary pop culture. Rising tides of consumers have become the new hunter-gatherers of entertainment; they forage for sustenance through digital conduits such as <a href="http://en.wikipedia.org/wiki/BitTorrent_/(protocol/),%20%5BUsenet%5D(http://en.wikipedia.org/wiki/Usenet)%20or%20file-sharing%20web-sites%20(so-called" title="cyberlockers">BitTorrent</a>. </p>
<p>Such cyberlockers have been in great demand but the <a href="https://theconversation.com/megaupload-in-mega-trouble-so-back-up-your-online-content-4990">demise of Megaupload</a> has resulted in a <a href="http://www.theinquirer.net/inquirer/news/2140887/waves-cyberlocker-web-sites-stop-filesharing">cyberlocker implosion</a>. Megaupload was the most popular of these sites with its user base of <a href="http://mashable.com/2012/01/30/megaupload-data-erased/">roughly 50 million</a>.</p>
<p>In its wake, competitors such as <a href="http://gizmodo.com/5878287/filesonic-just-killed-itself-by-disabling-file-sharing">FileSonic</a> and <a href="http://musicfeeds.com.au/news/fileserve-terminates-accounts-suspends-make-money-feature/">Fileserve</a> have toned down their operations by suspending file-sharing activities across the board and only permitting uploading and downloading of content to registered individual users. </p>
<h2>Stuck on you</h2>
<p>Megaupload was the glue binding many music blogs that provided niche forums to aficionados of film music and show tunes, among other non-mainstream genres. Links to music content in cyberlockers (more often than not copyrighted material) were posted on blogs, at times provoking passionate critical discussion.</p>
<p>In the case of film music, much of the content trafficked was out-of-print CDs and LPs, the latter lovingly digitised for posterity by owners who wished others to experience their joy in this oft-ignored artform. </p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/7251/original/2q44x7zq-1327969015.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/7251/original/2q44x7zq-1327969015.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/7251/original/2q44x7zq-1327969015.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=477&fit=crop&dpr=1 600w, https://images.theconversation.com/files/7251/original/2q44x7zq-1327969015.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=477&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/7251/original/2q44x7zq-1327969015.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=477&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/7251/original/2q44x7zq-1327969015.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=599&fit=crop&dpr=1 754w, https://images.theconversation.com/files/7251/original/2q44x7zq-1327969015.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=599&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/7251/original/2q44x7zq-1327969015.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=599&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption"></span>
<span class="attribution"><span class="source">HikingArtist.com</span></span>
</figcaption>
</figure>
<p>Film music blogs were peppered with <a href="http://aisel.aisnet.org/amcis2009/341/">altruistic uploaders</a> who viewed themselves as latter-day Robin Hoods of the cultural set: robbing from the “rich” (music/film companies who refused to release their motion picture soundtrack back-catalogues for sale on dubious economic grounds) to give to the “poor” (in this case, film music fans and allied spirits who would otherwise be denied these aural gems). </p>
<p>Megaupload was a watering-hole that created a musical oasis in many pockets of the blogosphere. Now the well has dried up, those who drank from it may very well be experiencing something, at least in the metaphorical sense, that is akin to the five stages of grief observed by Swiss-American psychiatrist <a href="http://en.wikipedia.org/wiki/Elisabeth_K%C3%BCbler-Ross">Elisabeth Kübler-Ross</a> in her seminal work, <a href="http://en.wikipedia.org/wiki/On_Death_and_Dying">On Death and Dying</a>: </p>
<ol>
<li>Denial (“The closure of Megaupload is only a temporary setback and it will be back.”) </li>
<li>Anger (“%$&#! I’ve lost over 500 files!”) </li>
<li>Bargaining (“Perhaps I’ll try another file-sharing service? Oh, no! Filesonic doesn’t work for me. Something else?”) </li>
<li>Depression (“What’s the point? I think I’ll take a few weeks off from file-sharing and see what happens.”) </li>
<li><a href="http://www.springerlink.com/content/71t041j08u557707/">Acceptance</a> (“At least I still have my good old CD/LP collection to fall back on.”).</li>
</ol>
<p>Rumblings from the blogosphere would indicate the folding of Megaupload has generated a mini-wave of scepticism about the security of cloud storage more broadly. Is the new reality an induced feeling that you have to back-up your back-ups ad infinitum?</p>
<p><a href="http://www.peterlunenfeld.com/cv/">Professor Peter Lunenfeld</a> from the University of California, Los Angeles is less sympathetic to the downloading phenomenon in society. In <a href="http://bit.ly/jkSgUt">an article for New Scientist</a>, he argued that file-sharing is leading to “cultural diabetes” where consumers are gorging on a glut of entertainment without producing anything practical in return. </p>
<figure class="align-right zoomable">
<a href="https://images.theconversation.com/files/7252/original/rgq2bd6s-1327969396.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/7252/original/rgq2bd6s-1327969396.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/7252/original/rgq2bd6s-1327969396.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=567&fit=crop&dpr=1 600w, https://images.theconversation.com/files/7252/original/rgq2bd6s-1327969396.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=567&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/7252/original/rgq2bd6s-1327969396.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=567&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/7252/original/rgq2bd6s-1327969396.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=713&fit=crop&dpr=1 754w, https://images.theconversation.com/files/7252/original/rgq2bd6s-1327969396.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=713&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/7252/original/rgq2bd6s-1327969396.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=713&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Kim Dotcom is in big trouble.</span>
<span class="attribution"><span class="source">MartandAlexander</span></span>
</figcaption>
</figure>
<p>Lunenfeld’s thesis is that uploading is good due to its pro-active quality, while downloading is bad on account of its passive essence. Downloading rapidly crosses the line from collecting to accumulating. Gigabytes of TV episodes, films and musical content become the storage of a hoarder who just might find it difficult to find time to experience it all. </p>
<h2>Get me the doctor</h2>
<p>A closing parable. In the TV canon of Doctor Who there exist quite a few episodes for which there are no available film or videotape copies. This is due to the BBC shedding portions of their archive in the past to reclaim space. The story may be apocryphal but some episodes from the 1970s run were actually recovered because an American had produced off-air colour videotape copies for a British fan. </p>
<p>These were recovered in the 1990s and partially restored in quality for their re-entry into the archives. Technically speaking, international copyright law may have been broken in this instance but the greater good was served to Doctor Who fandom (and the BBC) by discovery of these modest treasures that were once thought to be lost. </p>
<p>Was this a case of fruit of the <a href="http://firedoglake.blogspot.com/2006/01/fruit-of-poison-tree.html">poisonous tree</a>? We are all patently aware of intellectual property issues in the digital age from a legal perspective, <a href="http://www.youtube.com/watch?v=HmZm8vNHBSU">bombarded with ads</a> and edicts and so forth.</p>
<p>But the ethics of this downloading epoch, redolent with dilemmas as it is, are still open to interpretation and need to be debated in the public domain.</p><img src="https://counter.theconversation.com/content/5083/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>John Lenarcic does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>Latest reports suggest all of the data on seized file storage website Megaupload – legal or illegal – could be erased as soon as Thursday. Clearly it’s not great news for the site’s founder Kim Dotcom…John Lenarcic, Lecturer in Business IT & Logistics, RMIT UniversityLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/42762011-11-28T19:39:33Z2011-11-28T19:39:33ZThe future of news: crowdsourced and connected<figure><img src="https://images.theconversation.com/files/5495/original/4480627524_7e31739b04_o.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">Should the changing face of media be a source of despair or optimism?</span> <span class="attribution"><span class="source">Truthout.org</span></span></figcaption></figure><p>To paraphrase Mark Twain, reports of the death of newspapers are somewhat exaggerated. But traditional media is experiencing the “perfect storm” of declining circulations, collapsing advertising revenues and seismic changes in the way news is produced and consumed. </p>
<p>This is forcing change on an industry that has to-date largely resisted it. </p>
<p>Globally, changes in news production and consumption are not happening uniformly. Newspaper circulation <a href="http://www.journalism.co.uk/news/global-circulation-falls-as-readers-become-promiscuous-/s2/a546340/">declined by 9 million worldwide in 2010</a> according to the World Press Trends report published by the <a href="http://www.wan-press.org/worldpresstrends/home.php">World Association of Newspapers and News Publishers</a>. </p>
<p>Newspapers are still read by 2.3 billion people compared to 1.9 billion who read their news online. </p>
<figure class="align-left ">
<img alt="" src="https://images.theconversation.com/files/5499/original/6237538219_5f261b2801_o.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/5499/original/6237538219_5f261b2801_o.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=680&fit=crop&dpr=1 600w, https://images.theconversation.com/files/5499/original/6237538219_5f261b2801_o.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=680&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/5499/original/6237538219_5f261b2801_o.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=680&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/5499/original/6237538219_5f261b2801_o.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=855&fit=crop&dpr=1 754w, https://images.theconversation.com/files/5499/original/6237538219_5f261b2801_o.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=855&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/5499/original/6237538219_5f261b2801_o.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=855&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption"></span>
<span class="attribution"><span class="source">Truthout.org</span></span>
</figcaption>
</figure>
<p>The impact of the circulation fall has been greatest in the US with an 11% overall decline – compared to an increase of 7% in the Asia Pacific region. </p>
<p>At the same time, newspaper advertising revenues continue to nosedive, the biggest decline again <a href="http://blogs.reuters.com/mediafile/2011/11/04/washington-post-the-latest-example-of-print-ad-plunge/">happening in the US</a>.</p>
<p>The net result of declining revenue has seen the <a href="http://newspaperdeathwatch.com/">closure of newspapers</a> and the permanent move from paper to online for others. Even for those newspapers still in business, the fall in income has seen <a href="http://newspaperlayoffs.com/">widespread layoffs of staff</a> and expectations of increased productivity from those who remain – the archetypical “<a href="http://www.youtube.com/watch?v=gKM34ijnhzI">doing more with less</a>” … and less. </p>
<p>Migration online for some news organisations has accompanied changes in the way the <a href="http://stateofthemedia.org/2011/overview-2/key-findings/">public consume the news</a>. The Pew Research Center’s Project for Excellence in Journalism report showed that 46% of Americans currently get news from 4-6 media platforms per day and 37% contribute to news creation by commenting and sharing. Only 7% get their news from a single media platform. </p>
<figure class="align-right ">
<img alt="" src="https://images.theconversation.com/files/5493/original/4948963473_1733788061_o.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/5493/original/4948963473_1733788061_o.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=578&fit=crop&dpr=1 600w, https://images.theconversation.com/files/5493/original/4948963473_1733788061_o.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=578&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/5493/original/4948963473_1733788061_o.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=578&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/5493/original/4948963473_1733788061_o.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=727&fit=crop&dpr=1 754w, https://images.theconversation.com/files/5493/original/4948963473_1733788061_o.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=727&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/5493/original/4948963473_1733788061_o.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=727&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption">Truthout.org.</span>
</figcaption>
</figure>
<p>Daily news <a href="http://futureofjournalism.com.au/wp-content/uploads/2011/10/AU-IG-111016-02.jpg">consumption patterns</a> have changed with the iPad being used in the morning and evening and mobile phones being used constantly throughout the day.</p>
<p>In all of this, the debate on what should happen next has raged. This is mainly because there’s no single obvious solution, and what you consider to be the most important problem depends on your perspective. For the CEO and shareholder, the primary focus has been to try and reverse the fall of revenue, often through slash and burn.</p>
<p>For editors, journalists and the customers, the problem has been that the nature of news and the relationship between the producers and consumers has fundamentally changed. News is no longer produced for a passive audience to consume. As mentioned previously, <a href="http://www.journalism.org/analysis_report/understanding_participatory_news_consumer">37% of internet users</a> have contributed to the creation of news, commented on it or shared it with others. Information sourced from social media, blogs and video sites often makes its way into reporting.</p>
<p>The issue with revenue can’t be tackled without first adapting news organisations to these changes.</p>
<p>John Paton, CEO of the Journal Register Company has <a href="http://jxpaton.wordpress.com/">declared</a> that traditional journalism is dead. He sees that the “crowd knows more than we do and the crowd can do what we do”. Once you reduce the cost of production of news to next to nothing, then everyone can produce “news” and can disseminate that news through social media, video and blogs. </p>
<p>Even investigative journalism is open to being crowdsourced for both funding – through sites such as <a href="http://www.spot.us/">Spot.us</a> – and for <a href="http://onlinejournalismblog.com/2011/11/08/crowdsourcing-investigative-journalism-a-case-study-part-1/">collecting data and reporting</a>.</p>
<figure class="align-left ">
<img alt="" src="https://images.theconversation.com/files/5498/original/3404104459_963c55d171_o.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/5498/original/3404104459_963c55d171_o.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=472&fit=crop&dpr=1 600w, https://images.theconversation.com/files/5498/original/3404104459_963c55d171_o.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=472&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/5498/original/3404104459_963c55d171_o.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=472&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/5498/original/3404104459_963c55d171_o.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=593&fit=crop&dpr=1 754w, https://images.theconversation.com/files/5498/original/3404104459_963c55d171_o.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=593&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/5498/original/3404104459_963c55d171_o.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=593&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption"></span>
<span class="attribution"><span class="source">Metro Library and Archive</span></span>
</figcaption>
</figure>
The crowd, of course, is local; they are at the scene when events happen, cameras, recorders and phones at hand. Everything is instantaneously uploadable and shareable. Much breaking news is now produced this way, associated with a hashtag. <p></p>
<p>The crowd is also blogging, along with expert analysis and opinion. Companies, think tanks, and academics are producing timely, informed and expert content, often at a speed and depth most news organisations find difficult to match. </p>
<p>Companies such as the <a href="http://www.huffingtonpost.com/">Huffington Post</a> have tried to aggregate some of this content with contributions from more than 9,000 bloggers – some of whom are <a href="http://www.telegraph.co.uk/technology/8448234/Bloggers-sue-Arianna-Huffington-after-being-treated-like-slaves.html">now suing the company</a> for what they allege is a lack of financial compensation – in addition to content from regular staff. Sites such as the <a href="http://www.dailykos.com/">Daily Kos</a> are also collections of contributed blog posts with a political leaning.</p>
<p>John Paxton is not the only CEO of traditional media organisations to recognise things have changed. News companies such as the <a href="http://www.theguardian.co.uk">Guardian</a>, <a href="http://www.aljazeera.com/">Al Jazeera</a> and the <a href="http://www.nytimes.com">New York Times</a> have adapted their own businesses to extend regular reports with blogs, video, Twitter and Facebook feeds, comment and community input. </p>
<p>The Guardian recently started an experiment where it has made public its <a href="http://www.guardian.co.uk/media/2011/oct/09/the-guardian-newslists-opening-up">newslists</a>, the articles and events that journalists are covering and working on. They also have a blog site, <a href="http://www.guardian.co.uk/commentisfree">commentisfree</a> where community writers can contribute blog articles.</p>
<p><figure class="align-center ">
<img alt="" src="https://images.theconversation.com/files/5494/original/5079276943_0f67d2615a_o.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/5494/original/5079276943_0f67d2615a_o.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=450&fit=crop&dpr=1 600w, https://images.theconversation.com/files/5494/original/5079276943_0f67d2615a_o.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=450&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/5494/original/5079276943_0f67d2615a_o.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=450&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/5494/original/5079276943_0f67d2615a_o.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=566&fit=crop&dpr=1 754w, https://images.theconversation.com/files/5494/original/5079276943_0f67d2615a_o.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=566&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/5494/original/5079276943_0f67d2615a_o.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=566&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption"></span>
<span class="attribution"><span class="source">Truthout.org</span></span>
</figcaption>
</figure>
</p><p>The New York Times and Al Jazeera have moved in a similar direction with equivalent features. All of the news organisations have allowed journalists and editors to interact with their readers and others on social media.</p>
<p>The New York Times has <a href="http://www.lostremote.com/2011/07/25/nytimes-tv-stations-among-most-social-companies/">been declared</a> the “most social” of companies in the US – however, two relatively unknown tech companies, <a href="http://about.intuit.com/">intuit</a> and <a href="http://www.juniper.net/us/en/">juniper</a>, were second and third, so this should probably be taken with a grain of salt.</p>
<p>Al Jazeera is <a href="http://www.mobileactive.org/covering-protest-and-revolution-lessons-al-jazeera-innovation-and-mobile-citizen-media">probably the leader</a> in its use of technology and social media to report, interact and incorporate content with and from the public. </p>
<figure class="align-right ">
<img alt="" src="https://images.theconversation.com/files/5500/original/3367869522_95521fa0af_o.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/5500/original/3367869522_95521fa0af_o.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=458&fit=crop&dpr=1 600w, https://images.theconversation.com/files/5500/original/3367869522_95521fa0af_o.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=458&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/5500/original/3367869522_95521fa0af_o.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=458&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/5500/original/3367869522_95521fa0af_o.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=576&fit=crop&dpr=1 754w, https://images.theconversation.com/files/5500/original/3367869522_95521fa0af_o.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=576&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/5500/original/3367869522_95521fa0af_o.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=576&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption"></span>
<span class="attribution"><span class="source">dorineruter</span></span>
</figcaption>
</figure>
<p>The organisation has used <a href="http://audioboo.fm">Audioboo</a> to record, upload and share audio content. It utilises live blogs to report on rapidly changing events such as the <a href="http://blogs.aljazeera.net/middle-east/2011/01/29/live-blog-301-egypt-protests">Egyptian protests</a>. </p>
<p>It uses <a href="http://www.flickr.com">Flickr</a> to share images and <a href="http://www.scribblelive.com/">Scribble Live</a> to write, edit and share collaborative content. Al Jazeera is also very active on Twitter, using feedback to determine what to report and to help shape stories that are breaking.</p>
<p>Al Jazeera has adapted to working with citizen journalists. Ultimately, the entire organisation is working in this way, a key differentiator between organisations that will succeed in the digital world and those that will fail. </p>
<figure class="align-left ">
<img alt="" src="https://images.theconversation.com/files/5503/original/2218475995_cd269913c9_o.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/5503/original/2218475995_cd269913c9_o.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=375&fit=crop&dpr=1 600w, https://images.theconversation.com/files/5503/original/2218475995_cd269913c9_o.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=375&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/5503/original/2218475995_cd269913c9_o.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=375&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/5503/original/2218475995_cd269913c9_o.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=471&fit=crop&dpr=1 754w, https://images.theconversation.com/files/5503/original/2218475995_cd269913c9_o.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=471&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/5503/original/2218475995_cd269913c9_o.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=471&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption"></span>
<span class="attribution"><span class="source"> Pragmagraphr</span></span>
</figcaption>
</figure>
<p>Other organisations are taking a different approach to collaboration between the public and professional journalists. This so-called “pro-am” (professional-amateur) process involves professional editors assisting public contributors to submit content to a set standard or quality. </p>
<p>This is the approach taken by <a href="http://theconversation.com">The Conversation</a> – a site for which academics write articles in their area of expertise which are then polished by professional editors. Earlier attempts to effectively do this, such as “<a href="http://www.wired.com/techbiz/media/news/2007/07/assignment_zero_final?currentPage=2">Assignment Zero</a>”, a collaboration between <a href="http://www.wired.com">Wired Magazine</a> and <a href="http://newassignment.net">NewAssignment.net</a> did not succeed, mainly because of a lack of supporting technology and poor organisation. </p>
<p>NewAssignment.net is collaborating with the Huffington Post on <a href="http://offthebus.net">OffTheBus.net</a> which will provide citizen journalist coverage of the US 2012 election campaign. </p>
<p><a href="http://www.shirky.com/">Clay Shirky</a>, author and academic at New York University, has <a href="http://www.shirky.com/weblog/2011/07/we-need-the-new-news-environment-to-be-chaotic/">discussed the transformation</a> news organisations are going through as a revolution where – like any revolution, perhaps – we don’t know what the end result will be. </p>
<p>We can guess the production of news has irrevocably changed from being institution-based to a hybrid of institution/crowd. We don’t know the business models that will support this and we can guess about the organisations that are most likely to succeed and fail. </p>
<p>We can also guess there is no reason that the quality of news reporting both from an immediacy aspect through to in-depth coverage should change – if anything, there is reason to believe it will improve.</p><img src="https://counter.theconversation.com/content/4276/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>David Glance is a contributor to The Conversation that is mentioned in the article.</span></em></p>To paraphrase Mark Twain, reports of the death of newspapers are somewhat exaggerated. But traditional media is experiencing the “perfect storm” of declining circulations, collapsing advertising revenues…David Glance, Director, Centre for Software Practice, The University of Western AustraliaLicensed as Creative Commons – attribution, no derivatives.