SlideShare a Scribd company logo
1 of 3
December 8, 2010


Hackers Give Web Companies a
Test of Free Speech
By ASHLEE VANCE and MIGUEL HELFT
A hacking free-for-all has exploded on the Web, and Facebook and Twitter are
stuck in the middle.

On Wednesday, anonymous hackers took aim at companies perceived to have
harmed WikiLeaks after its release of a flood of confidential diplomatic
documents. MasterCard, Visa and PayPal, which had cut off people’s ability to
donate money to WikiLeaks, were hit by attacks that tried to block access to the
companies’ Web sites and services.

To organize their efforts, the hackers have turned to sites like Facebook and
Twitter. That has drawn these Web giants into the fray and created a precarious
situation for them.

Both Facebook and Twitter — but particularly Twitter — have received praise in
recent years as outlets for free speech. Governments trying to control the flow of
information have found it difficult to block people from voicing their concerns or
setting up meetings through the sites.

At the same time, both Facebook and Twitter have corporate aspirations that
hinge on their ability to serve as ad platforms for other companies. This leaves
them with tough public relations and business decisions around how they should
handle situations as politically charged as the WikiLeaks developments.

Some internet experts say the situation highlights the complexities of free speech
issues on the Internet, as grassroots Web companies evolve and take central
control over what their users can make public. Clay Shirky, who studies the
Internet and teaches at New York University, said that although the Web is the
new public sphere, it is actually “a corporate sphere that tolerates public speech.”

Marcia Hofmann, a lawyer at the Electronic Frontier Foundation, said, “Any
Internet user who cares about free speech or has a controversial or unpopular
message should be concerned about the fact that intermediaries might not let
them express it.”
She added, “Your free speech rights are only as strong as the weakest
intermediary.”

The problem came into relief on Wednesday, through an effort called Operation
Payback, organized by a group calling itself Anonymous. The group spent much
of the day posting notes on Facebook and Twitter that told followers which
companies to single out and that documented hacking successes.

But Facebook banned one of the group’s pages, saying that using the site to
organize hacking attacks like that violated its terms of use. The group went on
Twitter to complain.

A Facebook spokesman issued a statement saying that the company was
“sensitive to content that includes pornography, bullying, hate speech, and
threats of violence” and would “take action on content that we find or that’s
reported to us that promotes unlawful activity.”

In an interview Wednesday morning, Joe Sullivan, Facebook’s chief security
officer, addressed WikiLeaks’s own presence on the site. He said the company
had not received any official requests to disable pages or accounts associated with
the WikiLeaks organization.

Facebook generally resists requests by governments or advocacy groups to take
down material if that content is not illegal or does not violate Facebook’s terms of
service, which prohibit attacks on individuals or incitements to violence.

“Facebook is a place where people come to talk about all sorts of things, including
controversial topics,” Mr. Sullivan said. It was not clear whether anyone had
asked Facebook to take down the Operation Payback page.

Twitter allowed the Operation Payback account to stay active most of Wednesday.
But the group’s account was disabled late in the day, after it posted a link to a file
that provided thousands of consumer credit card numbers, according to a person
with direct knowledge of the situation.

A Twitter spokesman declined to discuss the details of the situation. “We don’t
comment about the specific actions we take around user accounts,” he said.
The company is not overly concerned about hackers’ attacking Twitter’s site, he
said, explaining that it faces security issues all the time and has technology to
deal with the situation.

Twitter is in a particularly delicate situation because its founders have celebrated
their service’s role in political protest and free speech. They have not been shy
about trying to capitalize on the good will engendered by playing that role.

WikiLeaks’s own Twitter account remains active, and it is the group’s main
channel for reaching supporters and the media.

Last week, Amazon.com fell into a similar position when it decided to stop
storing files for WikiLeaks. Advocates of WikiLeaks complained that
Amazon.com was bowing to political pressure to cut the organization from its
Web services. An Amazon.com spokesman said the company was simply banning
an organization that had violated its terms of service by trying to distribute
documents it did not own.

The last week has given rise to a hacking war in which groups have blocked access
to WikiLeaks’s Web sites by bombarding them with requests.

And now the WikiLeaks supporters have responded in kind, flying the freedom of
speech banner as the motivation for their actions.

Claire Cain Miller contributed reporting.

More Related Content

What's hot

Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the WorkplaceEric Swenson
 
Government2.0
Government2.0Government2.0
Government2.0ksabol
 
Challenging Web 2.0
Challenging Web 2.0Challenging Web 2.0
Challenging Web 2.0Roland Alton
 
facebook privacy and legal issues
facebook privacy and legal issuesfacebook privacy and legal issues
facebook privacy and legal issuesAman Khanna
 
Cmcl 334 case study project
Cmcl 334 case study projectCmcl 334 case study project
Cmcl 334 case study projectappeters22
 
Web 2.0 for Lawyers, 2009
Web 2.0 for Lawyers, 2009Web 2.0 for Lawyers, 2009
Web 2.0 for Lawyers, 2009Kate Fitz
 
facebook
facebookfacebook
facebookabhinav
 
Facebook pulls Islam Exposed page over claims of nudity, lawsuit threatened -...
Facebook pulls Islam Exposed page over claims of nudity, lawsuit threatened -...Facebook pulls Islam Exposed page over claims of nudity, lawsuit threatened -...
Facebook pulls Islam Exposed page over claims of nudity, lawsuit threatened -...cerrajeriaznaoeste62
 
Motivation for Participation in Sociable Media
Motivation for Participation in Sociable MediaMotivation for Participation in Sociable Media
Motivation for Participation in Sociable Mediamolodiez
 
Web 1.0, Web 2.0 & Web 3.0
Web 1.0, Web 2.0 & Web 3.0Web 1.0, Web 2.0 & Web 3.0
Web 1.0, Web 2.0 & Web 3.0tokey_sport
 
Journalists and the Social Web 3
Journalists and the Social Web 3Journalists and the Social Web 3
Journalists and the Social Web 3ardessie
 
Chatham Guidance Counsellors Forum
Chatham Guidance Counsellors ForumChatham Guidance Counsellors Forum
Chatham Guidance Counsellors ForumMelissa Cheater
 
The Next Big Thing is Web 3.0. Catch It If You Can
The Next Big Thing is Web 3.0. Catch It If You Can The Next Big Thing is Web 3.0. Catch It If You Can
The Next Big Thing is Web 3.0. Catch It If You Can Judy O'Connell
 
Bus356 Facebook Ethics
Bus356 Facebook EthicsBus356 Facebook Ethics
Bus356 Facebook EthicsKatie Dunn
 
Dow Jones Government Round Table Collaboration And Metadata
Dow Jones Government Round Table   Collaboration And MetadataDow Jones Government Round Table   Collaboration And Metadata
Dow Jones Government Round Table Collaboration And Metadataeb98jdb
 

What's hot (20)

Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the Workplace
 
Government2.0
Government2.0Government2.0
Government2.0
 
Sxsw 2010 - recap
Sxsw 2010 - recapSxsw 2010 - recap
Sxsw 2010 - recap
 
Challenging Web 2.0
Challenging Web 2.0Challenging Web 2.0
Challenging Web 2.0
 
facebook privacy and legal issues
facebook privacy and legal issuesfacebook privacy and legal issues
facebook privacy and legal issues
 
11 web 2.0 and 3.0
11 web 2.0 and 3.011 web 2.0 and 3.0
11 web 2.0 and 3.0
 
Cmcl 334 case study project
Cmcl 334 case study projectCmcl 334 case study project
Cmcl 334 case study project
 
Web 2.0 for Lawyers, 2009
Web 2.0 for Lawyers, 2009Web 2.0 for Lawyers, 2009
Web 2.0 for Lawyers, 2009
 
facebook
facebookfacebook
facebook
 
Facebook pulls Islam Exposed page over claims of nudity, lawsuit threatened -...
Facebook pulls Islam Exposed page over claims of nudity, lawsuit threatened -...Facebook pulls Islam Exposed page over claims of nudity, lawsuit threatened -...
Facebook pulls Islam Exposed page over claims of nudity, lawsuit threatened -...
 
Motivation for Participation in Sociable Media
Motivation for Participation in Sociable MediaMotivation for Participation in Sociable Media
Motivation for Participation in Sociable Media
 
Web 1.0, Web 2.0 & Web 3.0
Web 1.0, Web 2.0 & Web 3.0Web 1.0, Web 2.0 & Web 3.0
Web 1.0, Web 2.0 & Web 3.0
 
Tanjeel communication websites
Tanjeel   communication websitesTanjeel   communication websites
Tanjeel communication websites
 
Journalists and the Social Web 3
Journalists and the Social Web 3Journalists and the Social Web 3
Journalists and the Social Web 3
 
Chatham Guidance Counsellors Forum
Chatham Guidance Counsellors ForumChatham Guidance Counsellors Forum
Chatham Guidance Counsellors Forum
 
Web 1.0
Web 1.0Web 1.0
Web 1.0
 
The Next Big Thing is Web 3.0. Catch It If You Can
The Next Big Thing is Web 3.0. Catch It If You Can The Next Big Thing is Web 3.0. Catch It If You Can
The Next Big Thing is Web 3.0. Catch It If You Can
 
Bus356 Facebook Ethics
Bus356 Facebook EthicsBus356 Facebook Ethics
Bus356 Facebook Ethics
 
Web 2.0 and Web 3.0
Web 2.0 and Web 3.0Web 2.0 and Web 3.0
Web 2.0 and Web 3.0
 
Dow Jones Government Round Table Collaboration And Metadata
Dow Jones Government Round Table   Collaboration And MetadataDow Jones Government Round Table   Collaboration And Metadata
Dow Jones Government Round Table Collaboration And Metadata
 

Similar to December 8

Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013Shoplet_
 
Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013post_it
 
Ip issues in social media
Ip issues in social mediaIp issues in social media
Ip issues in social mediaAltacit Global
 
Big Tech, Privacy, and Power
Big Tech, Privacy, and Power Big Tech, Privacy, and Power
Big Tech, Privacy, and Power Dharmendra Rama
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network SecurityBrian Honan
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network SecuritySource Conference
 
India is a massive market for us tech giants, frequent run ins with indian go...
India is a massive market for us tech giants, frequent run ins with indian go...India is a massive market for us tech giants, frequent run ins with indian go...
India is a massive market for us tech giants, frequent run ins with indian go...aditi agarwal
 
What social media is doing to the world
What social media is doing to the worldWhat social media is doing to the world
What social media is doing to the worldJulieCarn
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineBrenden Brown
 
Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarThomas Jones
 
ArticleFacebook Ignites Debate Over Third-Party Access to User.docx
ArticleFacebook Ignites Debate Over Third-Party Access to User.docxArticleFacebook Ignites Debate Over Third-Party Access to User.docx
ArticleFacebook Ignites Debate Over Third-Party Access to User.docxdavezstarr61655
 
Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discoveryLogikcull.com
 
FSM420 Case 2018 Privacy Commissioner launches Facebook i.docx
FSM420  Case 2018 Privacy Commissioner launches Facebook i.docxFSM420  Case 2018 Privacy Commissioner launches Facebook i.docx
FSM420 Case 2018 Privacy Commissioner launches Facebook i.docxhanneloremccaffery
 
The Guardians article​ ​‘I made Steve Bannon’s psychological .docx
The Guardians article​ ​‘I made Steve Bannon’s psychological .docxThe Guardians article​ ​‘I made Steve Bannon’s psychological .docx
The Guardians article​ ​‘I made Steve Bannon’s psychological .docxrtodd33
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationBenjamin Morley
 
Tech Companies and the Fight for Privacy
Tech Companies and the Fight for PrivacyTech Companies and the Fight for Privacy
Tech Companies and the Fight for PrivacyTier10
 

Similar to December 8 (20)

Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013
 
Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013
 
Ip issues in social media
Ip issues in social mediaIp issues in social media
Ip issues in social media
 
Big Tech, Privacy, and Power
Big Tech, Privacy, and Power Big Tech, Privacy, and Power
Big Tech, Privacy, and Power
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
India is a massive market for us tech giants, frequent run ins with indian go...
India is a massive market for us tech giants, frequent run ins with indian go...India is a massive market for us tech giants, frequent run ins with indian go...
India is a massive market for us tech giants, frequent run ins with indian go...
 
What social media is doing to the world
What social media is doing to the worldWhat social media is doing to the world
What social media is doing to the world
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy Online
 
Social_Networking_Project
Social_Networking_ProjectSocial_Networking_Project
Social_Networking_Project
 
Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information War
 
ArticleFacebook Ignites Debate Over Third-Party Access to User.docx
ArticleFacebook Ignites Debate Over Third-Party Access to User.docxArticleFacebook Ignites Debate Over Third-Party Access to User.docx
ArticleFacebook Ignites Debate Over Third-Party Access to User.docx
 
Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discovery
 
FSM420 Case 2018 Privacy Commissioner launches Facebook i.docx
FSM420  Case 2018 Privacy Commissioner launches Facebook i.docxFSM420  Case 2018 Privacy Commissioner launches Facebook i.docx
FSM420 Case 2018 Privacy Commissioner launches Facebook i.docx
 
The Guardians article​ ​‘I made Steve Bannon’s psychological .docx
The Guardians article​ ​‘I made Steve Bannon’s psychological .docxThe Guardians article​ ​‘I made Steve Bannon’s psychological .docx
The Guardians article​ ​‘I made Steve Bannon’s psychological .docx
 
Social Networking and E-discovery
Social Networking and E-discoverySocial Networking and E-discovery
Social Networking and E-discovery
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of Globalization
 
Tech Companies and the Fight for Privacy
Tech Companies and the Fight for PrivacyTech Companies and the Fight for Privacy
Tech Companies and the Fight for Privacy
 
News bytes-July 2013
News bytes-July 2013News bytes-July 2013
News bytes-July 2013
 
Twittering from the bench
Twittering from the bench Twittering from the bench
Twittering from the bench
 

December 8

  • 1. December 8, 2010 Hackers Give Web Companies a Test of Free Speech By ASHLEE VANCE and MIGUEL HELFT A hacking free-for-all has exploded on the Web, and Facebook and Twitter are stuck in the middle. On Wednesday, anonymous hackers took aim at companies perceived to have harmed WikiLeaks after its release of a flood of confidential diplomatic documents. MasterCard, Visa and PayPal, which had cut off people’s ability to donate money to WikiLeaks, were hit by attacks that tried to block access to the companies’ Web sites and services. To organize their efforts, the hackers have turned to sites like Facebook and Twitter. That has drawn these Web giants into the fray and created a precarious situation for them. Both Facebook and Twitter — but particularly Twitter — have received praise in recent years as outlets for free speech. Governments trying to control the flow of information have found it difficult to block people from voicing their concerns or setting up meetings through the sites. At the same time, both Facebook and Twitter have corporate aspirations that hinge on their ability to serve as ad platforms for other companies. This leaves them with tough public relations and business decisions around how they should handle situations as politically charged as the WikiLeaks developments. Some internet experts say the situation highlights the complexities of free speech issues on the Internet, as grassroots Web companies evolve and take central control over what their users can make public. Clay Shirky, who studies the Internet and teaches at New York University, said that although the Web is the new public sphere, it is actually “a corporate sphere that tolerates public speech.” Marcia Hofmann, a lawyer at the Electronic Frontier Foundation, said, “Any Internet user who cares about free speech or has a controversial or unpopular message should be concerned about the fact that intermediaries might not let them express it.”
  • 2. She added, “Your free speech rights are only as strong as the weakest intermediary.” The problem came into relief on Wednesday, through an effort called Operation Payback, organized by a group calling itself Anonymous. The group spent much of the day posting notes on Facebook and Twitter that told followers which companies to single out and that documented hacking successes. But Facebook banned one of the group’s pages, saying that using the site to organize hacking attacks like that violated its terms of use. The group went on Twitter to complain. A Facebook spokesman issued a statement saying that the company was “sensitive to content that includes pornography, bullying, hate speech, and threats of violence” and would “take action on content that we find or that’s reported to us that promotes unlawful activity.” In an interview Wednesday morning, Joe Sullivan, Facebook’s chief security officer, addressed WikiLeaks’s own presence on the site. He said the company had not received any official requests to disable pages or accounts associated with the WikiLeaks organization. Facebook generally resists requests by governments or advocacy groups to take down material if that content is not illegal or does not violate Facebook’s terms of service, which prohibit attacks on individuals or incitements to violence. “Facebook is a place where people come to talk about all sorts of things, including controversial topics,” Mr. Sullivan said. It was not clear whether anyone had asked Facebook to take down the Operation Payback page. Twitter allowed the Operation Payback account to stay active most of Wednesday. But the group’s account was disabled late in the day, after it posted a link to a file that provided thousands of consumer credit card numbers, according to a person with direct knowledge of the situation. A Twitter spokesman declined to discuss the details of the situation. “We don’t comment about the specific actions we take around user accounts,” he said.
  • 3. The company is not overly concerned about hackers’ attacking Twitter’s site, he said, explaining that it faces security issues all the time and has technology to deal with the situation. Twitter is in a particularly delicate situation because its founders have celebrated their service’s role in political protest and free speech. They have not been shy about trying to capitalize on the good will engendered by playing that role. WikiLeaks’s own Twitter account remains active, and it is the group’s main channel for reaching supporters and the media. Last week, Amazon.com fell into a similar position when it decided to stop storing files for WikiLeaks. Advocates of WikiLeaks complained that Amazon.com was bowing to political pressure to cut the organization from its Web services. An Amazon.com spokesman said the company was simply banning an organization that had violated its terms of service by trying to distribute documents it did not own. The last week has given rise to a hacking war in which groups have blocked access to WikiLeaks’s Web sites by bombarding them with requests. And now the WikiLeaks supporters have responded in kind, flying the freedom of speech banner as the motivation for their actions. Claire Cain Miller contributed reporting.