Uncategorized

Is CYXYMU the first "digital refugee"?

Posted by: Matthew Trost

TED Fellow, journalist and expert on political aspects of the Internet Evgeny Morozov, who spoke at TEDGlobal 2009 on web censorship, cyber-activism and the fallacy if “iPod liberalism,” has a fascinating and thoughtful blog post about yesterday’s social networking outages.

Responding to reports that the DDoS attack that downed sites such as Facebook, Twitter and Livejournal targeted one man, Morozov writes,

CYXYMY is not a crusading investigative journalist who produces breaking stories that challenge the regime; he’s more of a pundit who has very articulate and predictably Kremlin-bashing views on the regional conflicts. His blog is also somewhat of a news hub: he has done an amazing job of keeping his followers in the loop as to what happens in Abkhazia and Georgia, the two regions that are not exactly in the center of media attention (even in Russia). [...]

Thus, I think that the attackers’ real goal was humiliation, not censorship [...] A secondary  goal was to generate awe-inducing headlines about Russia’s cyberpower all over the Web; there is no better way to do it these days than to make Twitter inaccessible for a few hours.

Morozov’s whole article is worth a close read.

More TEDTalks about the powers — and weaknesses — of social media:
+ Clay Shirky on how social media can make history
+ Evan Williams on listening to Twitter’s users

Comments (1)

  • loni hamilton commented on Nov 3 2009

    a well thought out plan with backup of backup cyber crime structure allowed hackers to install an undetectable backdoor that no security blocks. all machines from A to Z(using dns servers) are infected unknowing. i went through 3 phone companys(one disapearing which can be viewed using keywords “airtel” and “montana” since aug of 2008. im still fighting this hacker/worm today untouched by microsoft. when april 1st/conficter worms came out. i got scared realizing they were detectable. they were decoys that installed a greater versionthat is well hidden. each time i striped another layer of it away, it was always a step higher. i am now working at a kernel/firmware/bios level. i fear now that it cant be removed. it infects memory/drives/firmware/bios/kernel/drivers/hubs/routers/parsings/frequencys and filters any tampering. each layer keeps eachother alive. i still infect 2000 an hour using pings.. 24/7 since febuary that i cant stop. i watch companys go through what i did.