Partisans go cyber: the hacker ethic and partisans’ legacy

Peculiarities of hackers and hacktivists' participation in modern hybrid conflicts. Analysis of "localization" of hactivist activity on the example of the Belarusian group "Cyber Partisans". Significance of partisan themes for modern Belarusian identity.

Рубрика Программирование, компьютеры и кибернетика
Вид статья
Язык английский
Дата добавления 24.02.2024
Размер файла 36,3 K

Отправить свою хорошую работу в базу знаний просто. Используйте форму, расположенную ниже

Студенты, аспиранты, молодые ученые, использующие базу знаний в своей учебе и работе, будут вам очень благодарны.

Noteworthy, swamp is one of the recurring motives in Bykov's late works. Swamp is the title of one of his stories describing the situation of uncertainty where a group of Soviet soldiers find themselves after being inserted behind enemy lines in order to meet the local partisans. However, it soon turns out that they had been deployed in the wrong place and throughout the whole story they are feeling uncertain as to their whereabouts and the people they meet (the group commander orders the soldiers to kill the local boy who showed them the way to the partisans' camp lest the boy should disclose their presence to the enemy) as well as to their own identity and relationships with each other (as the story unfolds, quite a few details from the characters' complex and, sometimes, compromising pasts are revealed). The story ends on a tragic note as the group come under friendly fire from the partisans. “Whatever one sees at night is weird and false. At night every shrub seems mysterious, every spot from afar bears a suspicious sign. At night the sense of hearing sharpens but it may often be deceptive by making the imagined seem real” [57]. This philosophically charged description underscores the complexity of partisan experience: being a partisan makes one doubt the things which used to seem obvious in civilian life, including moral values. It becomes problematic to justify one's actions by using these norms or official instructions. In the absence of solid ground or support, the partisan has to overcome his fear and take the risk of traversing a metaphorical bog. The soft, quaggy surface of the bog may be used to metaphorically signify the absence of the principles and rules that apply in peace time and in regular warfare. All of the above shifts the accent to the individual choices made by the participants of the partisan struggle. This specificity of the partisan ethic comes to the fore in Vasil Bykov's works, foregrounding the moral and existential problematique, individual moral experience, and personal choices made in existential or morally ambiguous situations. Thus, in order to conceptualize partisan warfare in the situation of uncertainty and the ethical dilemmas such uncertainty entails, it would be productive to consider the metaphor nomos of the swamp, elaborating on Schmitt's terminology. hacker hybrid conflict

Conclusion

My findings can be summarized as follows. Hackers and hacktivists play an active role in modern hybrid conflicts. Hacktivism may take “localized” forms as is illustrated by the case of the Cyber Partisans. The study shows the significance of the partisan movement for modern Belarusian identity and historical memory and discusses the attempts of appropriation of this topic by various political actors. The comparison between hacktivism and partisan warfare holds a certain heuristic potential, making it possible to build conceptual categories for the analysis of the hacktivists' practices and their ethical norms. Parallels may be drawn between the partisans (along with more common analogies with the pirates and “social bandits”) and hackers to shed a new light on the problem of historical predecessors and ideological roots of the hacker ethic. One of the most famous interpretations of the concept of partisan belongs to Carl Schmitt, whose approach accentuates the partisan's connection to the local territory (the telluric nature of the partisan). An interesting way to compare the hacker and partisan ethic is to look at both of them from the game- related perspective. For example, the situations described in the `partisan' literature have much in common with the prisoner's dilemma -- a popular game theory paradox. These situations of moral choice foster a particular kind of subjectivity which is closely entwined with keeping true and remaining loyal, a subjectivity that is apt to handle certain information with discretion and care. Another important aspect that could be used to draw parallels between the partisan and hacker ethic is based on the concept of nomos. The proposed notion nomos of the swamp develops Schmitt's ideas and can be applied to shed light on the partisan activity in Belarus and to gain a better understanding of partisanship in connection to the historical and modern forms of `partisan' hacktivism.

References

1. Claverie, B. and Cluzel, F. (2022), The Cognitive Warfare Concept.

2. Sidorenko, I. N. (2017), Philosophy of violence: from metaphor to concept, Minsk: BSU Publ. (In Russian).

3. Hacker (2022),

4. Thomas, D. (2003), Hacker Culture, Minnesota: University Of Minnesota Press. Sbculturelist (2022).

5. Hacktivism (2022).

6. Hare, F. (2019), Privateering in Cyberspace: Should Patriotic Hacking Be Promoted as National Policy?, Asian Security, vol. 15, is. 2, pp. 93-102.

7. Wijermars, M. and Lokot, T. (2022), Is Telegram a “harbinger of freedom”? The performance, practices, and perception of platforms as political actors in authoritarian states, Post-Soviet Affairs, vol. 38, is. 1-2, pp. 125-145.

8. Rudling P. A. (2014), The Rise and Fall of Belarusian Nationalism, 1906-1931, Pittsburg: University of Pittsburgh Press.

9. Urban, M. (1989), An Algebra of Soviet Power Elite Circulation in the Belorussian Republic 1966-86, Cambridge: University Press.

10. Litvinova, O. (2016), Evolution of partisan ethics during the Great Patriotic War (based on materials from the Bryansk region), Yaroslavl Pedagogical Bulletin, vol. 1, pp. 297-302. (In Russian)

11. Kovalenya, A. A. and Stashkevich, N. S. (2004), The Great Patriotic War of the Soviet people (in the context of World War II), Minsk: BSU Publishing Center. (In Russian)

12. Litvin, A. M. (2019), Belarus partisan. Illustrated encyclopedia of the partisan movement in Belarus during the Great Patriotic War, Minsk: Belarusian Encyclopedia named after Petrus Brouka Publ. (In Russian)

13. Bartushka, M. (2014), Partisan War in Belarus in 1941-1944, Smalensk: Inbelkult Publ. (In Belarusian)

14. Musial, B. (2018), Soviet partisans in 1941-1944: Myths and reality, Smalensk: Inbelkult Publ. (In Belarusian)

15. Lewis, S. (2020), The “Partisan Republic”: Colonial Myths and the War for Memory in Belarus.

16. Kazharski, A. (2021), Belarus' new political nation? 2020 anti-authoritarian protests as identity building, New Perspectives, vol. 29(1), pp. 69-79.

17. Jargon File (1996).

18. Levy, S. (2010), Hackers: Heroes of the Computer Revolution, Sebastopol, CA: O'Reilly Media.

19. Raymond, E. (2001), The Cathedral and the Bazaar. Musings on Linux and Open Source by an Accidental Revolutionary, Sebastopol, CA: O'Reilly Media.

20. Himanen, P. (2019), Hacker ethics and the spirit of informationalism, Moscow: AST Publ. (In Russian)

21. Coleman, G. (2013), Coding Freedom: The Ethics and Aesthetics of Hacking, Princeton: University Press.

22. Von Busch, O. and Palmas, K. (2006), Abstract hacktivism: the making of a hacker culture, London: Open Mute.

23. Jordan, T. and Paul, T. (2004), Hacktivism and Cyberwars: Rebels with a Cause?, London: Routledge.

24. Karagiannopoulos, V (2015), Living With Hacktivism From Conflict to Symbiosis, London: Palgrave Macmillan.

25. Hobsbawm, E. J. (1981), Bandits, New York: Pantheon Books.

26. Hobsbawm, E. J. (1963), Primitive Rebels, Manchester: University Press.

27. Wong, W. and Brown, P (2013), E-Bandits in Global Activism: WikiLeaks, Anonymous, and the Politics of No One, American Political Science Association, vol. 11(4), pp. 1015-1033.

28. Coleman, G. (2014), Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous, London: Verso.

29. Dwan, J. H., Paige, T. P and McLaughlin, R. (2022), Pirates of the Cyber Seas: Are State-Sponsored Hackers Modern-Day Privateers?

30. Phillips, P J. and Pohl, G. (2022), Hackers, Pirates, and Privateers.

31. Freudenberg, D. (2008), Theorie des Irreguliren. Partisanen, Guerillas, und Terroristen im modernen Kleinkrieg, Wiesbaden: VS Verlag.

32. Munkler, G. (2018), Fragments of war. The evolution of violence in the 20th and 21st centuries, Moscow: Kuchkovo pole. (In Russian)

33. Dudchik, A. (2021), Nomos of the swamp: conceptualization of the project of the Belarusian “partisan ethics”, Matica Srpska Journal of Slavic Studies, vol. 99, pp. 165-182.

34. Apresyan, R. G. (2010), Prisoner's Dilemma, in: New Philosophical Encyclopedia, vol. 2, Moscow: Mysl', p. 34. (In Russian)

35. Bykov, V (1985), Sotnikov, in: Bykov, V, Collected works: in 4 vols., vol. 2, Moscow: Molodaia gvard- iia, pp. 305-452. (In Russian)

36. Kuhn, S. (2019), Prisoner's Dilemma, in: Zalta, E. N. (ed.), The Stanford Encyclopedia of Philosophy (Winter 2019 Edition).

37. Yamamoto, H., Okada, I. and Muto, M. (2019), Effect of voluntary participation on an alternating and a simultaneous prisoner's dilemma, Physical review, vol. 100, is. 3.

38. Hobbs, A. (1998), Physis and nomos, in: Routledge Encyclopedia of Philosophy, London: Routledge, pp. 6510-6511.

39. Berger, P L. (1990), The Sacred Canopy. Elements of a Sociological Theory of Religion, Hamburg: Anchor.

40. Cover, R. M. (1983), Foreword. Nomos and Narrative, Harvard Law Review, vol. 97, no. 1, pp. 4-69.

41. Schmitt, C. (2007), The theory of the partisan: An Interim Remark on the Notion of the Political, in: Schmitt, C., Partisan Theory, Moscow: Praxis Publ., pp. 7-144. (In Russian)

42. Kurennoy, V (2007), The theory of the partisan. [Book review: Schmitt, C. The theory of the partisan, Moscow: Praxis, 2007], Neprikosnovennyi zapas, no. 1, pp. 277-278. (In Russian)

43. Dmitriev, T. A. (2007), Partisan theory yesterday and today, in: Schmitt, C. The theory of the partisan, Moscow: Praxis, pp. 203-301. (In Russian)

44. Schmitt, C. (2008), The Nomos of the Earth in the International Law of Jus Publicum Europaeum, Moscow: Vladimir Dal' Publ. (In Russian)

45. Jameson, F. (2009), Notes on Nomos, Sociological Review, vol. 8 (2), pp. 17-20.

46. Shepherd, B. and Pattinson, J. (2010), Introduction, in: Shepherd, B. (ed.), War in a Twilight World, London: Springer.

47. Giblett, R. J. (1996), Postmodern Wetlands Culture, History, Ecology, Edinburgh: University Press.

48. Stroganov, M. V (ed.) (2010), Russian swamp: between nature and culture: Proceedings of the international scientific conference, Tver': M. Batasova Publ.

49. Leontyeva, T. V. and Mokienko, V. M. (2021), The metaphor of the swamp in the characteristics of society, Bulletin of the Tomsk State University, no. 465, pp. 13-21.

50. Zhelyazko, V, Lagun, T. and Likhatsevich, A. (2016), Development of agricultural hydromelioration in Belarus, Environment Engineering, no. 4, pp. 75-80.

51. Van Creveld, M. (2005), Transformation of war, Moscow: Alpina Business Books Publ. (In Russian)

52. Duchyts, L., Lobach, U. and Sanko, S. (2004), Swamp, in: Belarusian mythology: encyclopedic Dictionary, Minsk: Belarus, pp. 41-42. (In Belarusian)

53. Kupala, J. (1942), Belarus rises, To Belarusian partisans. Maskva: Newspaper “Soviet Belorussia” Press Publ., pp. 5-10.

54. Wolin, R. (1990), Carl Schmitt, political existentialism, and the total state, Theory and Society, no. 19, pp. 389-416.

55. Marder, M. (2010), Groundless Existence. The Political Ontology of Carl Schmitt, London: Blumsbury.

56. Bykov, V. (2001), Swamp.

Размещено на Allbest.ru

...

Подобные документы

  • Сrime of ciber is an activity done using computers and internet. History of cyber crime. Categories and types of cyber crime. Advantages of cyber security. The characteristic of safety tips to cyber crime. Application of cyber security in personal compute

    презентация [203,5 K], добавлен 08.12.2014

  • The famous hacker Kevin mitnik. Tsutomu Shimomura is hacked by Kevin Mitnick. Sklyarov - a developer of software for reading electronic books. Wozniak famous for being the co-founder of Apple. Levin was accused of having committed one of the biggest bank

    презентация [904,2 K], добавлен 22.05.2012

  • Выбор операционной системы и среды программирования. Рабочие процедуры обработки IRP-пакетов. DPC–процедура отложенного вызова. Структура Legacy-драйвера. Периодичность обновления информации о процессах и потоках. ISR–процедура обработки прерываний.

    курсовая работа [227,5 K], добавлен 23.06.2009

  • Information security problems of modern computer companies networks. The levels of network security of the company. Methods of protection organization's computer network from unauthorized access from the Internet. Information Security in the Internet.

    реферат [20,9 K], добавлен 19.12.2013

  • Анализ архитектуры ОС Windows 8. Сравнение с предыдущими версиями (интерфейс Modern UI, работа с учетными записями, модель безопасности, диспетчер задач, история файлов, восстановление системы, Storage Spaces). Особенности различных версий Windows 8.

    курсовая работа [289,1 K], добавлен 25.01.2016

  • Характеристика компании Mail.ru Group, ее организационная структура, цели и стратегия. Создание интернет-портал матричного типа. Развитие современного рынка Интернет-технологий, социальных сетей, почты и мессенджеров. Применение стиля интерфейса.

    контрольная работа [29,8 K], добавлен 04.06.2015

  • Review of development of cloud computing. Service models of cloud computing. Deployment models of cloud computing. Technology of virtualization. Algorithm of "Cloudy". Safety and labor protection. Justification of the cost-effectiveness of the project.

    дипломная работа [2,3 M], добавлен 13.05.2015

  • Изучение семантической сети как набора форматов и языков, позволяющих находить и анализировать интернет-данные. Программные технологии, лежащие в основе Интернета и опубликованные в качестве стандартных в программе Веб-консорциума Semantic Web Activity.

    контрольная работа [1,3 M], добавлен 25.04.2013

  • Структурне проектування: data flow та entity-relation diagram. Об’єктно-орієнтоване проектування: use case, class, statechart, activity та sequence diagram. Верифікація та консолідація даних. Реалізація інформаційної системи для рекламного агентства.

    курсовая работа [3,4 M], добавлен 25.12.2013

  • IS management standards development. The national peculiarities of the IS management standards. The most integrated existent IS management solution. General description of the ISS model. Application of semi-Markov processes in ISS state description.

    дипломная работа [2,2 M], добавлен 28.10.2011

  • Использование UDP для экспорта данных в MS Project. Документирование моделей, формирование HTML-отчета. Технология создания SADT модели. Стоимостной анализ (Activity Based Costing). Способы создания диаграммы Ганта с помощью программы Microsoft Project.

    курсовая работа [6,2 M], добавлен 24.09.2013

  • Структура таблицы User List, Group List. Диаграмма модели "сущность-связь". Зависимости программного продукта. Краткое описание экранных форм. Краткие сведения о работе с программой. Главные особенности входа под именем администратора и пользователя.

    дипломная работа [3,4 M], добавлен 20.04.2012

  • Характеристика предприятия ТОО "Com Sales Group". Составление программ на языке программирования. Составление алгоритмов, разработка численных методов решения задач. Методы откладки программ. Анализ технологии машинной обработки экономической информации.

    отчет по практике [1,3 M], добавлен 19.04.2016

  • Основные конструкции структурированного языка запросов SQL. Изучение среды MS SQL Server Management Studio, проверка подлинности. Создание таблиц базы данных. Таблица specialit, сourse, group, discipline, account. Проектирование структур данных.

    лабораторная работа [963,2 K], добавлен 14.01.2016

  • Концептуальная модель данных: глоссарий, сущности, атрибуты. Первичные, внешние, альтернативные ключи. Определение правил ограничения ввода. Данные сущности Stations, Locomotive, Wagon, Train, Group of wagon. SQL-запросы, реализующие сущности базы данных.

    курсовая работа [458,1 K], добавлен 25.05.2014

  • Модули, входящие в пакет программного обеспечения. Project Menagement, Methodology Management, Portfolio Analysis, Timesheets, myPrimavera, Software Development Kit, ProjectLink. Иерархическая структура Primavera и ее взаимосвязь с программой MS Project.

    контрольная работа [9,5 K], добавлен 18.11.2009

  • Сущность, понятие баз данных. Краткая характеристика MS Access. Обеспечение сохраняемости объектов. Архитектура Object Data Management Group. Объектные расширения реляционных СУБД. Концептуальные особенности систем управления активными базами данных.

    курсовая работа [48,1 K], добавлен 17.05.2013

  • Обнаружение аномалий сетевого трафика на основе дискретного вейвлет-анализа с применением статистических критериев и критерия Фишера для выбросов дисперсий. Парсинг .pcap-файлов и визуализация. Блок-схемы алгоритмов функций main, analysis, koef, disp.

    курсовая работа [295,2 K], добавлен 22.03.2018

  • Анализ пакета программ схемотехнического моделирования и проектирования семейства Microcomputer Circuit Analysis Program. Особенности создания чертежа электрической схемы в МС. Общая характеристика и принципы форматов заданий компонентов и переменных.

    реферат [581,4 K], добавлен 17.03.2011

  • Общее понятие о системе Earth Resources Data Analysis System. Расчет матрицы преобразования космоснимка оврага. Инструменты геометрической коррекции, трансформирование. Создание векторных слоев. Оцифрованные классы объектов. Процесс подключения скрипта.

    курсовая работа [4,3 M], добавлен 17.12.2013

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу.