The Internet Has Became the New Television New Media Research & Methodologies Etay Zilberboim Alex Bal One may posit that the Internet is the new television. Much like television, the Internet has the ability to shape or understandings of reality as it encourages us to think in a particular trajectory. This trajectory poses a certain degree of danger to our individuality, self-reflexivity and personal conceptions of reality because it can be informed by the particular motives of particular individuals. It can shape our ideas and beliefs while purposely omitting information for fear that it may compromise the intended result. Unfortunately, humanity has grown to uncritically trust the Internet with copious amounts of personal information such as bank account information, while paying little attention to what the consequences may be if it falls into the wrong hands. The Internet has come to be understood as neutral and unbiased, and that most of the information is factual. Internet search results construct particular reality based on one’s past searches. This phenomenon is dangerous because it means the Internet has the potential to be used as a means to augment reality and hack personal information. Curiously, the liberation of information, such as that enacted by Wikileaks, is often chastised. The Internet is a powerful tool, one that is much more powerful than we perceive. Most of the harm stems from the fact that Internet services can be done quickly, effortlessly and practically from anywhere, regardless of security. We trust and depend on the Internet by allowing it considerable access to our lives and personal information, such as online banking and shopping. We live under the impression that we are protected, however this is not always the case. A notable instance would the cyber war that took place on January 3rd, 2011 when a hacker by name of OxOmar, illegally possessed the information of 15,000 Israeli citizens. Two days later, he released the information of 11,0000 more credit cards while claiming that he had 60,000 more at his disposal. He justified his actions by stating that he was taking the problem of “fake media and Zionist lobbing in media and Internet” into his own hands. He also claimed that he had downloaded private data from Israeli military contracting companies and threatened to share that data with the world. In response to this incident, a few Israeli hackers decided to retaliate by finding out OxOmar’s real identity. Upon hearing of this, the Israel foreign minister asking citizens to leave the matter up to the Israeli government. Conversely, the Hamas spokesman encouraged the Saudi Arabian hackers to keep up the ‘good’ effort, blessing this act and urging other Arab youths to participate and develop these acts. This was happening at the expense of innocent citizens who simply trusted the Internet with their credit information. Consequently, tensions rose between Israel and it’s neighboring countries. A frightening reality is that teenage hackers, in possession of the right information, have the capacity to render both citizens and governments defenseless, which, even if for only a moment in time may have devastating effects. OxOmar continued his spree by hacking into the El-Al website (Israel’s official airline website) and the Tel Aviv Stock Exchange website. Attacks of this sort can cripple corporations, and create an imbalance in the trading realms of stocks of Israel, which can ultimately affect the global economy. The hacker is a very different type of protestor than the typical activist who puts their physical being into harms way or risk getting arrested. This is because the hacker will go to great lengths to remain anonymous. Another frightening aspect of the hacker is the fact that their subjective understanding of the world can be actualized and literally effect the globe. A hacker may be motivated by chaos or breaking down systems of power. By the same token even if a hacker believes that they is doing the right thing he may fail to realize that it is actually inapplicable globally. Essentially, regardless of the operation, they can easily disseminate and implement ideologies at the touch of a button. Furthermore, the online tension that rose between Israel and Saudi Arabia and could have escalated to a physical war. Fortunately, the attacks continued online as Israeli hackers retaliated by shutting down the Saudi and UAE stock exchange websites. Another hacker by the alias of Hannibal (who does not live in Israel) decided to join in, and stated that he had the email information of 30 million Arab users at his disposal threatening to publish 1500 emails and their passwords per day for the next 55 years. OxOmar countered by stating that he had 30,000 Facebook passwords and emails accounts. He requested that if the Israeli foreign minister apologized for his earlier statement, the attacks would decrease (Messieh). As a result of the ability of Hackers to maintain anonymity, the question of how to stop hacking remains and it is therefore difficult to find a solution. One may suggest that such instances would not occur if people did not put so much faith in the Internet. The nature of the Internet facilitates anonymity and great access to those who have the tools. Unfortunately little penalty for hacking related crimes can be doled out due to the inability to find the culprit. (Colesky, Van Niekerk) We must recall that in modern day, all aspects of humanity are connected to the internet, from missiles in silos, to traffic lights, to banks. And thus, it is therefore possible for a person with an appetite for chaos, or a fundamentalist outlook to black out and shut down a whole country if so he desired. When used correctly, the Internet can be used as a tool of democracy. Unfortunately, it more so resembles television in that most the content is being purposely geared towards particular demographics with the aim of profit or consumption of certain ideals. This is visible in the way that most of our search engines inquiries are being filtered and adjusted in a certain way (i.e. indexing and ranking). One can see that Internet search engines show a very narrow reality to its user, who more often than not, buys into the content with haste. Indexing and ranking algorithms create bias because the user only sees what the search engine is programmed to show based on the users past history. This can be seen when searching the same topic on different computers because the results will turn out different, as they are tailored to the user’s history. The issue here is that most users believe that search results are neutral and unbiased when in reality, like any other media outlets, search engines affirmatively control their users’ experiences which creates the phenomenon of search engine bias “In theory, search engines can transcend the deficiencies of predecessor media to produce a type of media utopia. In practice, search engines are just like every other medium-heavily reliant on editorial control and susceptible to human biases. This fact shatters any illusions of search engine utopianism.” (Goldman) Furthermore, Internet search engines are not the only online medium that controls what we see and how we interpret our online experience, but as a result, it is also largely responsible for what we believe. When the KONY 2012 campaign started, it had a major global impact because the viewers were convinced that what they were watching was true. There was little skepticism voiced and most people thought that the organization that sponsored the video (Invisible Children) was a human rights movement. Thus, people willingly and gladly donated money to the cause and hoped to see Kony behind bars. But they were misled. By careful choice of video montages KONY 2012 became a viral phenomenon and the talk of the Internet a few days after it was released. Most people were unaware of the events taking place in Africa as a result of the insufficient coverage in Western Media; here lies the irony of the KONY 2012 campaign. Suddenly, all western attention became shifted to Joseph Kony (Schomerus, Allen, and Vlassenroot). The cultivation of media attention of fraudulent African social issues is evidence of the fact that most of the people are being duped by online information. Had audience members sought to critically examine these claims through research, they would have found the truth. Instead, their passive Internet consumption resulted in a false construction of reality. The reality of the situation was that Invisible Children was in fact not a humanitarian charity fighting the recruitment of child soldiers. Instead, they were affiliated with the Sudanese army and despite their call to the U.S army to get involved; they stated that their proceeds would go to the Ugandan army which, along with the Sudanese Army, have been accused of raping and looting (Nhema & Tiyambe Zeleza). The money that was raised by Invisible Children was a matter of public record because they were a charity. This has also raised concerns because the charity raised $8,676,614 of which only 32% went into direct services; the rest was salaries, filmmaking and other expenses (INVISIBLE CHILDREN FINANCIAL STATEMENTS JUNE 30, 2011 AND 2010). As for Kony, he is not been seen since 2006 (Truther). It is worth noting that the recruitment of child soldiers is not a new practice, nor is it an isolated one. Why then, did people become so passionate over this particular case? The propensity of people to passively consume information to the point that they become active participants in disseminating and supporting falsified information is of great concern. People must learn to critically engage with all information that they encounter, especially if it is on the Internet. Unlike those who use the Internet to hack into or to falsify information, there are those that use the Internet as a medium to liberate information that they believe the masses should be privy to. However, these individuals often encounter harsh resistance and prosecution from government bodies. For example, the Wikileaks website exists to liberate information with the goal of bringing critical news to the public. They aim to expose schemes and illegal actions of persons of interest that would otherwise be expunged from the record and never reach the public. Wikileaks poses a threat not only to governments, but also to journalism because the direct releases of government information makes reporting on the government obsolete. By publishing documents of military or diplomatic nature governments with skeletons in their closet become provoked. Because the documents that Wikileaks distributes are untouched by the bias that comes form packaging processed information that is intended to be viewed by the public, they serve to alert with an inconvenient truth rather than a reassuring lie (Hood). Wikileaks has received a lot of negative attention from the mainstream media, the founder, Julian Assange, has been forced to go into hiding for fear of being handed over to the U.S government and consequently, receiving an unfair trial (Kheir). Wikileaks has been charged with releasing and challenging information of in attempt to provoke governments around the globe. Wikileaks has also forefronted issues of civilians in war scenarios or combat situations, cases of torture and cases of inhumane circumstances. However, why it that these phenomena are intentionally concealed from the public’s eye? Wikileaks’ message is that an unjust action is an unjust action regardless of who commits or how well it is hidden. Thus, such information should be public domain and the individual who committed the acts must be held responsible. However, some may refer to this is as “guerilla warfare” because the volunteers that aid and work for Wikileaks are decentralized are determined to do one thing- uncover and display the truth. However, their activity prompts civilians question the state of democracy and justice. Why does classified data exist? What does it imply and whom does it involve? Wikileaks serves to compromise the artificial integrity of government institutions by uncovering the truth. Those involved in Wikileaks (with the exception of Julian Assange) are similar to hackers in that they maintain anonymity. Here, we see a positive aspect of the Internet’s pension to keep ones identity a secret. It is positive because the exposure of the unlawful government acts breaks down carefully crafted façades of truth by providing individuals with an objective, untainted reality. Those who seek out information in an effort to critically engage with, and possibly refute, particular notions fosters the ability to easily identify problems and produce creative solutions (Benkler). This is a key factor in the advancement of society and in cultivating individuals as active participants rather than spectators. For example, human rights groups have long tried to procure a copy of the military manual of Guantanamo Bay. Wikileaks publication of the manual allowed human rights groups to uncover tactics of solitary confinement and humiliation used by Guantanamo Bay to break down the detainees mentally. Many governments and corporations have to power to selectively distribute certain types of information while silencing information deemed unfavorable. Wikileaks tears down this censorship and invites the world to view institutions in a naked light. As expected, there has been a backlash against Wikileaks’ stark honesty. Lawsuits and countries banning access to the website are just a few ways that is has been expressed. Another example is Wikileaks’ release of the video that captured the murder of an Iraqi photographer, cameraman and innocent bystanders during the filming of a story on the war crimes that Americans had committed in Iraq. They were killed by a helicopter and heavy firepower that intended purpose was to be used against tanks and vehicles. This release was a catalyst for United States’ repudiation of Wikileaks. Following the backlash, Julian Assange and his associates began to receive strange text messages, death threats and, as a result, started to the feel that they were being watched and listened to at all times. Furthermore, GOP Congressman, Mike Rogers suggested that Wikileaks whistleblowers should receive the death penalty. Similarly, Foreign Policy Analyst, Cristian Whiton stated the Julian Assange and his Wikileaks associates should be treated as terrorists. He justified this by likening their liberation of truth to espionage or political warfare. In an attempt to cripple the organization, the U.S moved to shut down Wikileaks payment service, thereby, shutting down the website’s funding. Harsh penalties have been doled out to American Hackers that are suspected of having connection with Wikileaks, such as detention, questioning the confiscation of their computers. Julian Assange has also been accused of rape, which some suggest are merely the efforts of a smear campaign. As a result, Julian Assange has been living in the Ecuadorian embassy of the United Kingdom in order to avoid extradition to Sweden, where authorities want him for questioning over rape allegations. Assange fears that the Swedish authorities will hand him over to the U.S. government, where he could be tried for espionage, conspiracy, unlawful access to classified documents, and computer fraud. If convicted of espionage or treason, Assange faces the death penalty. He might be tried in a military tribunal or a secret trial, and thus, there is no guarantee that Assange will receive a fair trial. These examples illustrate the extent to which governments will go in order to keep information out of public domain. Unlike hackers and the dissemination of false information, the Wikileaks foundation performs a public service by aiming to uncover truth and educate the world. Much like television, the Internet has the unfortunate ability to shape peoples understanding of reality into predetermined moulds that serve to benefit particular individuals and their motives. This can result in the passive and naïve consumption of agendas. It is important, in an era of so much information, to be critical of the information we encounter. We must keep the possibility of bias, motive and misinformation in mind. It is also crucial that we be careful when entrusting the Internet with personal information. The Internet can be a useful tool, however, it must be taken seriously and we must remind ourselves that it is not an entirely neutral space. It must be critically engaged with and not passively consumed. Works Cited Benkler, Yochai. "A free Irresponsible Press: Wikileaks and the Battle Over the Soul of the Networked Fourth Estate." Harvard Civil Rights-Civil Liberties Law Review 6 (2011): 1-69. Print. Colesky, Michael , and Johan Van Niekerk. "Hacktivism - controlling the effects." ZAWWW, 2012 Conference . N.p., 8 Nov. 2012. Web. 29 Oct. 2012. <www.zaw3.co.za/index.php/ZA-WWW/2012/paper/view/557>. Considine & Considine. Certified Public Accountants. San Diego: Invisible Children Inc, 2009 DiMagg , Paul , and Eszter Harg. "Social Implications of the Internet." Journal of Computer-Mediated Communication 1 (2007): 345-378. Print. Goldman, Eric. "Search Engine Bias and the Demise of Search Engine Utopianism." Yale Journal of Law and Technology 8 (2006): 187-200. Print. Gregory , Sam. "Kony 2012 Through a Prism of Video Advocacy Practices and Trends ." Oxford Journals | Social Sciences | Journal of Human Rights Practice. N.p., n.d. Web. 7 Nov. 2012. <http://jhrp.oxfordjournals.org/content/early/2012/09/26/jhuman.hus024.full>. Hood, Christopher . "From FOI World to WikiLeaks World: A New Chapter in the Transparency Story?." Governance 24 (2011): 635-338. Print. Kheir, Lena. "Debate: Should Wikileaks Founder Julian Assange Be Tried in the US Under the Espionage Act?." Policymic. N.p., n.d. Web. 28 Oct. 2012. <www.policymic.com/debates/13053/julian-assange-faces-death-penalty-shouldwikileaks-founder-be-tried-in-the-us-under-the-espionage-acthttp://>. Messieh, Nancy. "THE NEXT WEB." Everything you need to know about the ongoing Israeli-Saudi hacker struggle. N.p., 18 Jan. 2012. Web. 1 Nov. 2012. <http://thenextweb.com/me/2012/01/18/everything-you-need-to-know-about-theongoing-israeli-saudi-hacker-struggle/>. Nhema, Alfred G., and Tiyambe Zeleza. The resolution of African conflicts: the management of conflict resolution & post-conflict reconstruction. Addis Ababa: Ossrea , 2008. Print. Schomerus, Mareike , Tim Allen, and Koen Vlassenroot. "3. KONY 2012 and the Prospects for Change Examining the Viral Campaign." foreign affairs 15 (2012): 1-4. Print.