‘The Slenderman case is a very powerful example of peer to peer horizontal transmission.’ ibid. Richard Dawkins
‘Morgan recalls having hallucinations as early as three.’ ibid. mother
Amanda Todd, the teenager from BC, whose very name is synonymous with bullying, suicide and loss. Tonight: the never before told story of the man accused of stalking her online. How many more victims would there be? The Fifth Estate: Stalking Amanda Todd: The Man in the Shadows, CBC 2014
The story of Amanda Todd’s torment begins in the Netherlands. The teenager and her tormentor divided by continents but connected by the internet. This is the story of one Dutch man who authorities say would bully and blackmail the BC teen without ever leaving his home in Holland. He lived his life in the shadows. ibid.
They’re a new breed of cyber predators who capture the girls’ images. ibid.
Norway: he was carefully planning to ruin another girl’s life … The police were closing in. ibid.
Amanda’s death would kick that investigation into overdrive. ibid.
Out of the periphery of most online users there’s a vast hidden space in the ether used by activists, drug dealers and anyone else who wants to remain anonymous. It’s called the Dark Web. Abby Martin, The Empire Files: Privacy, Control & the Darknet, Abby Martin online May 2017
‘You’re dealing with a massive amount of power that is threatened by just what the idea of what the Silk Road represents which is democratization.’ ibid. Alex Winter
‘An enormous amount of the hard drugs that were being sold were being sold by federal law enforcement, both corrupt and straight.’ ibid.
Napster is seeking input for an idea. A global internet community, access to every music file on every hard drive, everywhere. Nothing like it exists … Downloaded, opening captions, 2013
‘I’ve never seen the industry under siege like this.’ ibid. David Munns
‘You would load up this app and it would basically connect one of our servers and ask for a Napster server that would be accessible …’ ibid. founder
‘Many universities nationwide maintain that they banned Napster because it put an enormous strain on their internet connection.’ ibid.
‘Napster to face trial on music piracy …’ ibid. CNet News online article 8th May 2000
The shuttle launched without incident but the WANK worm continued to spread affecting 300,000 computer terminals around the world. We Steal Secrets: The Story of Wikileaks, 2013
‘A mountain of secrets dumped into the public domain by a website.’ ibid. news
Julian Assange was obsessed with secrets … He built a machine for leaking secrets and called it Wikileaks. The website boasted an electronic drop-box. ibid.
‘We’re going to fuck them all … crack the world open and let it flower into something new. ibid. Assange
[Bradley] Manning was regarded as one of the smartest intelligence analysts in the unit. ibid.
‘The biggest leak of secret material in the history of this particular planet.’ ibid. journalist
The [Afghanistan] war logs revealed a conflict that was very different from what citizens had been told. ibid.
A secret American assassination squad with a terrible record of wounding and killing women and children. ibid.
‘He was the focus of intense enemies.’ ibid. journalist
The Wikileaks website came under cyber-attack. ibid.
So this is it: Silicon Valley … There’s Goggle just down here, Tesla, Apple’s headquarters, Facebook, and over there in the distance you’ve got San Francisco … The tech gods here are selling us all a brighter future. But Silicon Valley’s promise to build a better world relies on tearing up the world as it is: they call it disruption. Secrets of Silicon Valley I: The Disruptors, BBC 2017
This is the story of how Silicon Valley’s mission to connect all of us is disrupting politics, plunging us into a world of political turbulence that no-one can control. Secrets of Silicon Valley II
Section 230: ‘No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.’ ibid.
The tech gods suck in all this data about how we use their technologies to build their vast fortunes. ibid.
Google’s admitted classified relationships with government agencies like the NSA … The US government made 6,192 requests for Google to remove information from its services in the latter half of 2011. The Corbett Report, Just Be Evil, James Corbett online 2012
It’s own [Google’s] violations and abuses of users’ privacy and the unsettling statements that its executives have made about the very concept of privacy. ibid.
The arrival of social media was the next step in this evolution … Governments and militaries were even quicker in recognising the potential to use this new medium to more effectively spread their own propaganda. Their goal: to shape public discourse around global events in a way favourable to their standing military and geo-political objectives. Their method: the weaponization of social media. The Corbett Report, The Weaponization of Social Media, James Corbett online 2018
Social media was designed specifically to take advantage of your psychological weaknesses and keep you addicted to your screen. ibid.
The Pentagon announced last week that it was sending $40 million to the State Department’s ‘Global Engagement Centre’ to ‘counter foreign disinformation’. Much of the money will go to creating US disinformation, to meddling in the internal affairs of other countries … The Corbett Report: Inside the State Department’s Troll Farm with Daniel McAdams, James Corbett online 2018
The social media purge. The crackdown. Obviously the largest name, the big example, that everyone will point to is of course Alex Jones. The Corbett Report, Problem Reaction Solution: Internet Censorship Edition, James Corbett online 19.07
The false dichotomy … underlying assumption … the public’s fear is now Twitter and Facebook … We have got to get government in to regulate … It’s factually wrong. ibid.
Telecom companies are currently scrambling to implement fifth-generation cellular network technology, dubbed 5G. The Corbett Report, The 5G Dragnet, James Corbett online June 2019
The harmful effects of electromagnetic radiation present in current mobile technologies will be amplified by orders of magnitude in the much more powerful and denser extremely high frequency radiation network that 5G relies on. ibid.
Privacy and security would be next to impossible. ibid.
Why is there such a headlong rush to connect this network? ibid.
He’s actually getting up there and calling for online censorship and suppression of political speech, and de-platforming people he disagrees with … It is laughable. The Corbett Report: Sacha Baron Cohen is Wrong About Everything, James Corbett online 2019
We can hardly move about, surf the internet, communicate or do our shopping without all our data being recorded, stored and analysed, whether its through our smartphone, discount card, e-government login, medical file, search query, digital thermostat or Facebook account. Are we the last generation for whom privacy and freedom was seen as self-evident? The Bureau of Digital Sabotage, PVRO 2014
A dragnet that whistleblower Edward Snowden made visible. ibid.
Can we even exist without these nine companies that control our online communications? And how much leeway do we have to circumvent this invisible digital dragnet? ibid.
‘All we can do is try to publicize the facts. Not what the government is saying but the facts.’ Freedom Downtime, opening comments, 2001
He called himself Phiber Optik, and you’d have to look pretty hard to find somebody who didn’t think he was brilliant … Phiber learnt by exploring … They got him for conspiracy. ibid.
Phiber came out ten months later a hero. ibid.
Kevin Mitnick, the world’s most dangerous computer hacker. ibid.
Kevin’s name was enough to convict him regardless of the actual evidence. ibid.
It was mostly about fun and exploration. ibid.
Eight months of solitary confinement. ibid.
‘Part hype, part hysteria, part lack of understanding, part fear.’ ibid. Jennifer Granick
‘Miramax have decided to make a movie about him. The script is false. It makes him out to be a violent racist …’ ibid. supporter