LIMN

Search Search
No. 8
Hacks, Leaks, and Breaches
Published February, 2017
Hacks, Leaks, and Breaches

Hardly a day passes without news of a major hack, leak, or breach; with the scale of computer use and reliance on digital forms of data, no sector of society is immune to these data dumps, infiltrations, and floods. From the surveillance of dissidents to the hacking of elections to the weaponization of memes, hacking is changing in character, and it is changing the world. In this issue we ask whether hacking and hacks have crossed a techno-political threshold: how are hacks, leaks and breaches transforming our world, creating new collectives, and changing our understanding of security and politics. How has the relationship of hacking and hackers to their own collectives, to governments, and to the tools and techniques been transformed recently? What does it mean to be a hacker these days, and how does it differ from engineering, from “cyber-security,” from information warfare or from hacktivism?

Published February 2017

In This Issue

Can You Secure an Iron Cage?
Are bureaucracies defensible? Nils Gilman, Jesse Goldhammer, and Steven Weber explore the Office of Personnel Management hack, and what it tells us about the inherent vulnerabilities of bureaucratic organizations in a digital age.
Nils Gilman
Jesse Goldhammer
Steven Weber
The Paradoxical Authority of the Certified Ethical Hacker
Can hackers be certified? Rebecca Slayton looks at efforts to blend, certify and market the subversive skills of hacking with the ethos of professionalism.
Rebecca Slayton
The Extortion Stack
Finn Brunton explores the dream of the perfect leak, and what a science fiction story can tell us about the state of truth today.
Finn Brunton
Half-Lives of Hackers and the Shelf Life of Hacks
What is the speed of hacking? Luca Follis and Adam Fish explore the temporality of hacking and leaking in the cases of Snowden, the DNC leaks and the Lauri Love case.
Luca Follis
Adam Fish
Survival of the Cryptic
Should we have privacy for the weak and transparency for the powerful? Sarah Myers West reminds us that we've been agonizing over this question since at least the 1990s, when the cypherpunks first started discussing it.
Sarah Myers West
When GhostSec Goes Hunting
GhostSec engaged in vigilante counter-terrorism against ISIS. Robert Tynes explores whether this makes them part of the state, part of civil society, or part of empire.
Robert Tynes
I am Not a Hacker
The term "hacker" is notoriously slippery. Paula Bialski dives into the practices and micropolitics of self-proclaimed non-hackers.
Paula Bialski
The Political Meaning of Hacktivism
Philosopher-kings or Fawkes masks? Ashley Gorham explores the truth-telling zeal of WikiLeaks and the lulzy opinions of Anonymous.
Ashley Gorham
Refuse and Resist!
Joan Donovan dives into the dumpster of the Internet, and comes up holding some tasty ideas about what "doxing" means today and yesterday.
Joan Donovan
On Reusable Pasts and Worn-out Futures
Sara Tocchetti explores the reusable pasts of hacking and the worn-out productions of biohackers.
Sara Tocchetti
The Illicit Aura of Information
Does the unfiltered, illicit status of a leak change the nature of information? Molly Sauter offers a consideration of the half-life of stolen data.
Molly Sauter
Hacking/​Journalism
Philip Di Salvo explores the trading zone between journalism and hacking.
Philip Di Salvo
The Logic of Leaks, reconsidered
Are leaks fast and slow? Does their “illicit aura” matter? Naomi Colvin dives into the debate about leaking and the politics of journalism today.
Naomi Colvin
Power Down
OMG! Hackers take down energy grid! David Murakami Wood and Michael Carter calmly explain the how and why (or why not) of infrastructure hacking today.
David Murakami Wood
Michael Carter
Utopian Hacks
Not all engineers create equally. Götz Bachmann takes us inside the labs of "radical engineers" and the starkly different futures they imagine for us.
Götz Bachmann
The Public Interest Hack
How are hacking and leaking related? Gabriella Coleman introduces us to the “public interest hack” and explains how it emerged.
E. Gabriella Coleman
Interview: Kim Zetter
Cybersecurity journalist Kim Zetter talks with Limn about infrastructure hacking, the DNC hacks, the work of reporting on hackers and much more.
Christopher M. Kelty
Kim Zetter
Interview: Lorenzo Franceschi-Bicchierai
Journalist Lorenzo Franceschi-Bicchierai talks with Limn about the details of the DNC hacks, making sense of leaks, and being a journalist working on hackers today.
E. Gabriella Coleman
Lorenzo Franceschi-Bicchierai
What Is to Be Hacked?
Security is no longer a privilege of the few, or a commodity in the hands of those few who can afford it. Claudio (“nex”) Guarnieri explains why civil society isn’t going to secure itself, and why it needs help from hackers.
Claudio (“nex”) Guarnieri
Interview: Mustafa Al-Bassam
Limn talks with security expert Mustafa Al-Bassam (a.k.a “tflow”) about the responsibility for information security, the incentive problems it creates and the available solutions.
Mustafa Al-Bassam
E. Gabriella Coleman
Christopher M. Kelty
Hacker Madness
Defense lawyer Tor Ekeland gives us an up-close, first-person view of a widespread pathology: how misplaced fear and hysteria is driving an over-reaction to the positive work that hackers can do.
Tor Ekeland
Who’s hacking whom?
What can you do with a Tor exploit? Renée Ridgway discusses an ethical dilemma for security researchers, a surreptitious game of federal investigators, and the state of online anonymity today.
Renée Ridgway
The Spy Who Pwned Me
How did we get to state-sponsored hacking? Matt Jones traces the legal authorities and technical capacities that have transformed the power of the nation-state since the 1990s.
Matthew L. Jones
Car Wars
A self-driving car is a computer you put your body in. Fiction by Cory Doctorow.
Cory Doctorow