An Ode To Love: A Poem By Michael Wharton
To some, love is a romantic stroll on the beach,
To others it's a destination much harder to reach,
Through immeasurable hedge-maze lined with thorns,
An uphill struggle with bleeding sores and corns,
The few who make it look easy only worsen our plight,
Our efforts feel huge whilst theirs appear so slight,
Like newly hatched turtles crawling to the ocean,
We wrestle with obstacles and constant commotion,
Not all of us survive unscathed on the turbulent journey,
A lot of us frequently end up on the surgical gurney,
Suffering from severe takotsubo cardiomyopathy,
Only relieved by kind ears and anecdotal sympathy,
Not all of our journeys are fraught with such peril,
Some abandon all such efforts and go almost feral,
Hermits from reality shielded behind an Internet gate,
In biology like systems have a tendency to integrate,
They drift through cyberspace searching for happiness,
Filling out questionnaires to find another to caress,
Tirelessly looking for a lover with matching criteria,
“The one” could be sat across the room in works cafeteria,
If there is just one predetermined person for each individual,
How will we know when we find them what is the signal?
Does love just happen by chance or does it have to be made?
What is love? A private matter or a prize to be displayed?
The answers to these questions are not carved in stone,
They are found best in pairs and not discovered alone,
Fare thee well on your journey bumpy as it may be,
May you find the answers that have thus far eluded me,
So I done wrote a poem about love, as it goes I am not an absolute cynic about romance! I am a romantic, I just find romance very difficult. Good luck to all the lovers, even the ones who make it look effortless! This poem was written on the suggestion of Lauren Daley, who is one of those lucky people in a relationship that looks effortless!
Our Raspberry Pi Has Arrived!
It came through the letterbox, like it was a letter, or a rented DVD. This was no regular post, this one came with Pi, Raspberry Pi. Roger had mail ordered it when it was first available for inquiry all those months ago, so did some people we know. The first batches were shipped and friends of ours got theirs and we were so jealous, now ours has arrived and we've been playing with it every day since.
Here are some close-up photos.
Anonymous Operation Payback Targets Opponents Of Wikileaks
Okay, so due to really badly timed server issues, I have not been able to blog during the latest developments of what is now being called the first global cyber-revolution (thanks to Roger Davies for helping me out!). As my last blog entry: Twittocracy, Interactivism, Hacktivism & Cyber Anarchy: Cause covered Operation Payback, it was a vendetta campaign against those attempting to censor online content based on copyright infringement. Those perpetrating the attacks were Anonymous, the mysterious hacktivist group behind the latest cyber protests against opponents of Wikileaks.
At the end of last year, Wikileaks released the torrent of leaked American diplomatic cables they called Cablegate. To say that this prompted a lot of international reaction would be the understatement of this century. Most world leaders had something to say on the matter and the majority of it was not sounding too good for Wikileaks or its founder Julian Assange. The web server that Wikileaks was hosted on came under DDoS attacks, similar in style to those carried out by Anonymous during Operation Payback Is a Bitch: Save The Pirate Bay. Wikileaks then had its money supply cut off by Paypal, Visa, Mastercard and Amazon dropped hosting. Anonymous; as a hive collective, decided to leap into action. The public home pages of Visa, Paypal and Mastercard were targetted for DDoS by Operation Payback: Save Wikileaks, and hundreds of alternate mirrors of the site's Cablegate Datatbase were spawned.
Anonymous Changes Tactics: Operation Leakspin
The cyber protests in the form of DDoS caught the ever gazing eye of the worlds media and Anonymous got a lot of press attention, using this attention Anonymous launched into a new direction with a new campaign; Operation Leakspin. Operation Payback had successfully brought attention to the shameful acts of private corporations under the intimidation of the United Sates of America. More importantly it had won the support of the people of the internet for Wikileaks, and freedom of the press. With this heightened level of awareness, Operation Leakspin was to spread the contents of the leaked diplomatic cables virally; via social media sites like Twitter, Facebook and Youtube. Other spin off Anonymous Operations were Operation Blackout/Face-Off which encouraged people to replace their internet avatars with a plain black square, and Operation Paperstorm which encouraged people to print out and distribute paper flyers about Wikileaks and Operation Leakspin. A new hub site emerged as a centralised meeting -place for organisation of such Anonymous Operations with resources such as web chat, IRC and forums.
Wikileaks, Anonymous & The Coming Arabic Cyber Revolution
In the last two weeks, the internet; in particular, Twitter, Wikileaks and Anonymous , have played a vital role in the on-going cyber revolution across the Arab world. Firstly in Tunisia, where internet censorship has been used to silence dissenting voices for a while, one incident sparked a wave of protests across the country. A single individual immolated himself publicly leading to days of protests, until the leader of Tunisia, Zine El Abidine Ben Ali, fled to Saudi Arabia. More recently since January 25th, Egypt has been awash with protests against their tyrannical dictator Muhammad Hosni Sayyid Mubarak. Over the last few days these protests have descended into violent chaos, as Mubarak attempts to cling onto power by inciting violence among his minority of supporters. At one point Mubarak was desperate enough to shut down the entire country's internet access, to try and end this burgeoning revolution. According to the latest news sources, Mubarak was no longer intending to run for re-election in September yet refused to step down as President. [UPDATE] Mubarak has now handed over power to his senior military leadership; who were instrumental in advising him to step aside at the behest of his people. The people of Egypt seem to have accepting this situation as an interim to a new democratic government, but have planned to hold a public demonstration for this Friday (18/02/2011), to garner public opinion on the progression of this process . [/UPDATE]
As if inspired by the courage displayed by the brave Tunisian and Egyptian people; similar protests have taken place across the Arab world. Algeria, Syria, Lebanon, Yemen, Libya, Iran, Jordan, Oman, Sudan, Morocco, Mauritania and even Saudi Arabia have all had incidents ranging from small protests to all out revolution. This democratic movement is largely driven through social media and the internet, which is why net neutrality is so important globally. The open internet model is necessary to maintain the freedoms of expression of those who are oppressed. In those countries where oppression is most rampant, the internet is used as a means to silence dissent. The voices of freedom cry out to the internet and are silenced, but Anonymous, and other internet freedom groups have taken up the mantle of freedom of speech. These internet vigilantes or hacktivists, have provided services to such affected regions such as Google's Speak to Tweet or information on proxies like Tor.
[UPDATE] (17/02/2011) Anonymous & Wikileaks Versus The FBI & HBGary [/UPDATE]
In the recent weeks the FBI in the USA and British Police have arrested several "Members of Anonymous". The FBI hired a company called HBGary to infiltrate and gather intelligence on the group Anonymous. Their efforts did not go unnoticed by the more skilled hacktivists of the group, who proceeded to hack into HBGary's server. They replaced the home page with the above image, and leaked thousands of emails to and from the company.
It seems like the message from Anonymous is pretty clear; the world governments and organisations who seek to control the internet have three options now:
A) Release all of your secret information in an organised fashion
B) People inside your organisation feel compelled to leak the information and do so
C) The extremist arm of the internet comes and takes all your secrets and leaks them into the public domain
Whatever the future holds, the internet is key not only to observing and predicting social change, but generating it.