27.02.2013 Views

THE YES MEN AND ACTIVISM IN THE INFORMATION ... - Index of

THE YES MEN AND ACTIVISM IN THE INFORMATION ... - Index of

THE YES MEN AND ACTIVISM IN THE INFORMATION ... - Index of

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

available in print form but widely accessed online, mimics headlines from journalistic papers<br />

while poking fun at the inherent absurdity and sensationalism <strong>of</strong> the banal that is rampant in local<br />

paper headlines. 104 With the rise <strong>of</strong> the world wide web as a source <strong>of</strong> mass communication,<br />

RTMark and the Yes Men now share the stage with hoards <strong>of</strong> other activists, each with their<br />

own agenda, message, marked prey, and target audience.<br />

Among the ranks <strong>of</strong> activists using the Internet as their soapbox are those labeled<br />

“hacktivists,” a certain breed <strong>of</strong> activists who use computers and the Internet as tools for civil<br />

disobedience or cultural critique. The Yes Men fall under this classification. Hacktivism is defined<br />

by the group Cult <strong>of</strong> the Dead Cow, who coined the phrase, as “a policy <strong>of</strong> hacking, phreaking or<br />

creating technology to achieve a political or social goal.” 105 In clearer terms, hacktivism is a<br />

specific social and cultural phenomenon which emerged at the turn <strong>of</strong> the 21 st century based on<br />

popular political action carried out in cyberspace. 106 Hacking is a form <strong>of</strong> decentralized,<br />

networked resistance against a modernist, centralized power source. What makes hacking a viable<br />

form <strong>of</strong> resistance is its decentralized nature. 107 If one part goes down, there are still many other<br />

viable parts left up and running. Their targets, however, are usually centralized, with one base <strong>of</strong><br />

power. By taking out that single source <strong>of</strong> power, hacking can take down the entire power<br />

system. Though they use current technology within their distributive mode <strong>of</strong> operation,<br />

104 http://www.theonion.com/.<br />

105 Quote taken from http://www.thehacktivist.com/hacktivism.php.<br />

106 Jordan and Taylor, 1.<br />

107 Galloway, 159-60.<br />

51

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!