Search Results for: Cyber

The Downstairs Gays

Longreads Pick

John Sherman straddles the line between cyberstalking and innocent curiosity in this humorous essay about his fascination with the downstairs neighbors.

Published: Aug 13, 2015
Length: 9 minutes (2,284 words)

A Brief History of AOL

Photo by redux, Flickr

A short reading list on the many lives of AOL, which will be acquired by Verizon for $4.4 billion. Fifteen years ago, AOL acquired Time Warner for $165 billion.  Read more…

We Were Awful to Monica Lewinsky But We’d Like to Think We’d Act Differently Today

Ms. Lewinsky was quickly cast by the media as a “little tart,” as The Wall Street Journal put it. The New York Post nicknamed her the “Portly Pepperpot.” She was described by Maureen Dowd in The New York Times as “ditsy” and “predatory.”

And other women — self-proclaimed feminists — piled on. “My dental hygienist pointed out she had third-stage gum disease,” said Erica Jong. Betty Friedan dismissed her as “some little twerp.”

“It’s a sexual shaming that is far more directed at women than at men,” Gloria Steinem wrote me in an email, noting that in Ms. Lewinsky’s case, she was also targeted by the “ultraright wing.” “I’m grateful to [her],” Ms. Steinem said, “for having the courage to return to the public eye.”

Had the Lewinsky story unfolded today, certainly the digital reality of it would have been worse (or at least more pungent). “They would have dug up her private photos,” said Danielle Citron, a law professor and the author of “Hate Crimes in Cyberspace.” But there would have also been avenues to push back: more outlets, more varied voices, probably even a #IStandWithMonica hashtag.

“If it happened today, I think the consensus that she deserved to be thrown under the bus would be considerably weaker,” said Clay Shirky, a journalism professor at N.Y.U. who studies Internet culture. “And the key thing that’s changed is not information — there were credible press reports about Cosby for years, just as Clinton’s denial was ridiculous on its face — but the ability to coordinate reaction.”

Jessica Bennett, profiling Monica Lewinsky for the New York Times. Lewinsky has reemerged in the public sphere as of late, reclaiming her story and recasting it as a narrative about the price of shame.

Read the story

How ‘The Grapes of Wrath’ Got Its Name

John Steinbeck—who would have been 113 today—wrote more than thirty books, and The Grapes of Wrath, which you were most likely assigned to read in high school, is widely considered to be his best work. The novel was published in 1939 to great acclaim, both critically and commercially; it “was a phenomenon on the scale of a national event. It was publicly banned and burned by citizens, it was debated on national talk radio; but above all, it was read.” It was also the New York Times’ bestselling book of 1939, and won both a Pulitzer Prize and a National Book Award.

As for the title, where did the phrase “The Grapes of Wrath” come from? As David Greetham notes  in his 1998 book Textual Transgressions: Essays Toward the Construction of a Bibliography:

As is well-known, it was Carol Henning, Steinbeck’s wife, who provided the almost-finished novel with its title, drawn, of course, from Julia Ward Howe’s “Battle Hymn of the Republic.” As Steinbeck reported in his journal for September 3, 1938, “Carol got the title last night…The book has being at last.” But what was the “being” the novel had achieved…? The story proceeds: because Steinbeck had already destroyed a 70,000-word draft of an earlier version in which California growers were polemically attacked, he was very sensitive to the political meaning of the new version and decided that one way to avoid the charge of radicalism, foreign-inspired propaganda was (almost literally) to wrap the book in the flag by insisting that the words and music of “Battle Hymn of the Republic” be printed in the endpapers. In fact, when the first proof was returned by his editor with only one verse [of the song] as prologue, Steinbeck wrote back “I meant to print all, all, all the verses of the Battle Hymn. They’re all pertinent and they’re all exciting. And the music too.”

Meet the Man Who Finds Your Stolen Passwords

Longreads Pick

A profile of Alex Holden, a Ukrainian immigrant who lives in Milwaukee and runs a cyber security firm. His work often takes him deep into the so-called Dark Web.

Published: Feb 5, 2015
Length: 12 minutes (3,000 words)

The 2015 National Magazine Award Winners: A Reading List

This year’s National Magazine Awards were handed out Monday night in New York, with General Excellence honors going to publications including The New Yorker, Glamour, Garden & Gun, Nautilus and The Hollywood Reporter. Vogue won the award for “Magazine of the Year.”

Here’s a brief rundown of some of the winning stories from the night:

* * *

Multimedia: “Beyond the Border” (Texas Observer)

Texas has become the deadliest state in the US for undocumented immigrants. In 2012, 271 migrants died while crossing through Texas, surpassing Arizona as the nation’s most dangerous entry point. The majority of those deaths didn’t occur at the Texas-Mexico border but in rural Brooks County, 70 miles north of the Rio Grande, where the US Border Patrol has a checkpoint. To circumvent the checkpoint, migrants must leave the highway and hike through the rugged ranchlands. Hundreds die each year on the trek, most from heat stroke. This four-part series looks at the lives impacted by the humanitarian crisis.

Read more…

The Meaning We Put Behind Our Passwords

Perhaps my biggest surprise has been how willing, eager actually, people are to openly discuss their keepsakes. The friends I queried forwarded my request, and before long I started receiving passwords from complete strangers. There was the former prisoner whose password includes what used to be his inmate identification number (“a reminder not to go back”); the fallen-away Catholic whose passwords incorporate the Virgin Mary (“it’s secretly calming”); the childless 45-year-old whose password is the name of the baby boy she lost in utero (“my way of trying to keep him alive, I guess”).

Sometimes the passwords were playful. Several people said they used “incorrect” for theirs so that when they forgot it, the software automatically prompted them with the right one (“your password is incorrect”). Nicole Perlroth, The New York Times’s cybersecurity reporter, told me about the awkward conversation she had not long ago, when, locked out of her account, she was asked by the newspaper’s tech-support staff to disclose her password: a three-digit code plus an unpublishable epithet — a reference to a funny exchange she overheard years earlier between a store clerk and a thief.

— Ian Urbina, in the New York Times Magazine, on how we instill meaning into the passwords we create.

Read the story

Scammed

Longreads Pick

Some of America’s poorest people are being targeted by cyber-scammers. Can an errant hacker find the culprits?

Mike’s encounter with these scammers began one rainy day in January of last year, he says when I call. His voice is flat and matter-of-fact; he could be an accountant discussing a company’s tax return. He tells me it started with a text message: “Do you need up to $1,600 today? It’s secure and takes only a minute at http://www.quickhelpfunds.com”. Mike, who is 34, was on a job for a major software manufacturer and was bored, so he signed up for a loan using a fake name, just to see what would happen.

Source: Matter
Published: Apr 23, 2014
Length: 23 minutes (5,778 words)

What Silicon Valley Is Really Selling Us

Wired senior editor Bill Wasik on the public’s changing relationship with both Silicon Valley and the technology it creates and promotes:

One of the most toxic memes to waft out of the industry recently has been the idea of quasi-secession, whether it was Peter Thiel’s dream of floating hacker communities or Tim Draper’s plan to make Silicon Valley its own state or Balaji Srinivasan’s vision of an “ultimate exit” to someplace where engineers could build a world “run by technology.” But they’ve got it entirely backward. People don’t crave technology like drugs, wanting it so bad they’ll wire bitcoins to the offshore plutocracy of Libertaristan just to get it. They adopt technology when they’re seduced by the communities that grow up around it, often for love rather than money. If inventing new modes of communication or collaboration was seen as a mercenary act—as no nobler than drilling a well or devising a mortgage-backed security—then such platforms would never thrive, because their value tends to arise from a long, slow, unprofitable process of experimentation.

If anything, the public love affair with Silicon Valley is more crucial today than ever.

There’s a reason why web giants adopt slogans like “Don’t be evil” or endorse “the Hacker Way”: The entire business models of Google and Facebook are built not on a physical product or even a service but on monetizing data that users freely supply. Were either company to lose the trust and optimism of its customers, it wouldn’t just be akin to ExxonMobil failing to sell oil or Dow Chemical to sell plastic; it would be like failing to drill oil, to make plastic.

When William Gibson envisioned cyberspace as a “consensual hallucination,” he was right. Unsettle the consensus about the social web and you don’t just risk slowing its growth or depopulating it slightly. You risk ending it, as mistrust of corporate motives festers into cynicism about the entire project.

Read the full story at Wired

Read more on Silicon Valley

***

Photo: itia4u, Flickr

We need your help to get to 5,000 Longreads Members: Join us.

Taking Care of Business: A Reading List

Hackers! Gen Y CEOs! Multibillion dollar success stories! International expansion! Top-secret projects! Cute clothes! Hamburgers! Capitalism is so exciting, and so are these longreads about popular U.S. companies.

1. “In-N-Out’s Burger Queen.” (Patrick J. Kiger, Orange Coast, Jan. 2014)

31-year-old Lynsi Snyder presides over In-N-Out’s $1.1 billion industry, founded by her grandparents in the 1940s. What’s the company secret? Never change. Seem counterintuitive? Not if you’ve ever had an In-N-Out burger.

2. “You Can Explain eBay’s $50 Billion Turnaround With Just This One Crazy Story.” (Nicholas Carlson, Business Insider, Feb. 2014)

A group of six twenty-somethings fly to Sydney, Australia on a secret mission for eBay. Carlson brings the eBay executives and employees to life; I felt like I was watching “The Social Network.”

3. “A Sneaky Path Into Target Customers’ Wallets.” (Elizabeth A. Harris, Nicole Perlroth, Nathaniel Popper and Hilary Stout, Washington Post, Jan. 2014)

Merry Christmas, you’ve been hacked! In the midst of the 2013 holiday season, millions of Target customers received an ominous email; Cybercriminals targeted the store’s credit card machines, stole card numbers and PINs and endeavored to sell the information in the creepy corners of the internet.

4. “The J. Crew Invasion.” (Emma Rosenblum, Bloomberg Businessweek, Nov. 2013)

J. Crew executives hope the brand’s casual-chic niche will find a foothold in London.

***

Photo: Kevin Dooley

We need your help to get to 5,000 Longreads Members.

Join Longreads now and help us keep going.