Radical media, politics and culture.

Technology

"The Latest Protest Tool: 'Texting'

Protesters Use the Technology To Find, or Avoid, Hotspots"

Associated Press

NEW YORK (AP) — "Multiple reports of provocateurs setting trash fires in midtown," read one text message sent to 400-plus mobile phones this week through a service called Ruckus RNC 2004 Text Alerts.


For protesters navigating Manhattan during the Republican National Convention, text-message broadcasting services like this, sent to their cell phones, provided an up-to-the-minute guide to the action on the streets.

"Depleted Uranium:

Dirty Bombs, Dirty Missiles, Dirty Bullets"

Leuren Moret, SF BayView.com

“Military men are just dumb stupid animals to be used as pawns in foreign policy.” — Henry Kissinger, quoted in “Kiss the Boys Goodbye: How the United States Betrayed Its Own POW’s in Vietnam”

Vietnam was a chemical war for oil, permanently contaminating large regions and countries downriver with Agent Orange, and environmentally the most devastating war in world history. But since 1991, the U.S. has staged four nuclear wars using depleted uranium weaponry, which, like Agent Orange, meets the U.S. government definition of Weapons of Mass Destruction. Vast regions in the Middle East and Central Asia have been permanently contaminated with radiation.

hydrarchist writes: this article is really about p2p power and bit torrent. Jo ta ke!

Must-Download TV:
The Latest Developments in TV-Show-Trading Technology Mean You Don't Need
TiVo To Watch What You Want, When You Want

Farhad Manjoo

When the Federal Communications
Commission gave its blessing on Aug. 4 to a new TiVo service that Hollywood has opposed, the
decision was widely hailed as a triumph for techies. The news was both
unexpected and unlikely -- these days, government officials rarely move
against the wishes of giant media companies.

hydrarchist writes.... This is an article written for the e-zine http://suburbia.sindominio.net
by Nomada and Montserrat Boix about hacklabs.


translated by cain, and then edited and revised by hydrarchist


AcD
~ MeSk

Hacklabs, from Digital to Analogue

Wednesday 10 September 2003

Translated 06 June 2004
revised August 13, 2004

The history of the hacklabs began in 1999, year of the second italian hackmeeting in Milan, where the need to take a great leap forward in digital
communication and create physical links between people interested in the use of new technologies and having a social background was discussed. But let´s proceed step by step... What is a hackmeeting?... The hackmeeting emerged in Italy in 1998. The manifesto of the italian hackmeeting in 2003 underlines that it´s a "meeting of the alternative digital community", setting out a "vision of hacking as an attitude not exclusively related to computers". Our "hacker" being -- states the manifesto -- is manifested in everyday life, even when we don´t use computers. It´s shown when we fight to change everything that we don´t like, such as false and prefabricated news, the commodification and restrictions imposed on the division of knowledge and know-how, and generally the use
of technology to defend dignity and freedom. The hackmeeting meets annually, usually for a duration of 3 days, during which are organized talks and conferences related to the world of liberated data networks, free software, cyber-rights, cryptography, hacking in general and, most of all, it proposes strong links with social collectives that use the net as a space of communication, sharing and struggle for their different causes.

New "TXTMob" Messaging Available for Convention Protests

Protestors at last week's Democratic National Convention had a new tool in
their arsenal — a text messaging service designed just for them.

"TXTMob,"
as the service is called, allows users to quickly and easily broadcast
text messages to groups of cellphones. The system works much like an
electronic b-board: users subscribe to various lists, and receive messages
directly on their phones.

Eric Goldhagen writes

Germany: Bavaria Claims To Have Better Terrorism Database Than CIA, FBI

Report by Christoph Elflein and Tanja Treser.


[Source: Munich Focus in German -- centrist weekly news magazine]
[FBIS Translated Text]

The hunters with their high-tech equipment are based in a barracks from the last century: plain white walls and gray stone floors everywhere. The windows are secured by iron rods as thick as a finger. Behind a laptop sits Gerald Eder, 45, leading chief inspector of the Bavarian Office of Criminal Investigation (LKA). There is a great number of tiny black dots
linked by thin lines on the screen. This is a data cluster of the investigation and analysis system (Easy). It is the holy of holies of the protectors of state security: 12 million data sets of organized criminals and terrorism suspects, including violent radicals such as Islamist preacher Yahaya Youssef from Neu-Ulm.

bin Laden 'Suicide' Virus Pitched to Online Newsgroups

Message Designed To Lure Readers Into Trojan Horses

SEATTLE, Washington (Reuters) — A virus purporting to show images of Osama bin Laden's suicide popped up on the Internet Friday, designed to entice recipients to open a file that unleashes malicious software code, security experts said.


The virus was attached to a message that was posted on over 30,000 usenet newsgroups and is not being spread via e-mail, said Web security vendor Sophos.


The U.S. government has been hunting for bin Laden since 2001, holding him responsible for masterminding the attacks on the World Trade Center and Pentagon on September 11, 2001, but he has not yet been found.


Chris Kraft, senior security analyst at Sophos, said the message and virus was designed to lure unsuspecting readers into opening a file, similar to the Anna Kournikova virus that enticed readers to open a file that unleashed malicious software code.


"If you don't know the person or the origin of a message, you shouldn't be opening it," Kraft said.


The fake bin Laden suicide file, when opened, unleashes a program called a Trojan horse that makes it possible for attackers to take over infected personal computers running Microsoft Corp.'s Windows operating system.


Kraft said the virus itself had already appeared on the Internet before, but the virus writer had apparently repackaged it by saying it contained bin Laden's suicide photos.

Listen to the flip side

Suw Charman
Thursday July 22, 2004

The Guardian



As far as the music industry is concerned, the message is clear: file sharing is killing it. "Research clearly illustrates that the illegal use of music on the internet is damaging the entire UK music industry," said Peter Jamieson, the chairman of the BPI (British Phonographic Industry). Even Apple's chief executive, Steve Jobs, agrees. "iTunes really competes with piracy, not the other services," he said at the iTunes Music Store Europe launch last month. "Piracy is the big enemy - the market has shrunk in France and Germany and seen zero growth in the UK."

kirsten anderberg writes:

"The Gold of the Nuclear Age:
Lost and Stolen Nuclear Materials"
Kirsten Anderberg


The Los Alamos National Laboratory (www.lanl.gov) in New Mexico, USA, the birthplace of the atomic bomb, has halted much of its operations as of July 15, 2004, in an unprecedented, and open-ended, shut down of important “secret work,” until security breaches can be seriously addressed.


Citing the loss of two computer discs containing classified information from the testing and design facility of the plant, during the first week in July 2004, as well as other security concerns, the nuclear plant is regrouping. In the last year and a half, Los Alamos has admitted losing classified materials four times, according to the Albuquerque Journal. And the Associated Press is reporting that in the last year, Los Alamos employees lost 9 floppy discs, a large-capacity storage disk full of classified information, and a recordable data storage device, and the lab officials say these materials are “believed” to have been destroyed.

copyriot writes:

"'Content Flatrate' and the Social Democrats"

Rasmus Fleisher


Recently, the communities of IP critics and P2P filesharers has been hit by a wave of demands for an "alternative compensation system". June 2004 was a month of European breakthrough for the idea of "content flatrate", as a solution intended to save filesharing, whilst "compensating" copyright holders who feel that their traditional means of income are slipping out of hand due to technological development.

Here I will discuss this new tendency, its premises, weaknesses and its relation to anti-copyright-activism, polemically arguing that "flatrateism" is a mistake. My observations are based mainly on German discussions, but also on Swedish, French and American proposals of "alternative compensation systems".

Pages

Subscribe to Technology