Gezi Park Protests, Corruption Investigation, and the Control of the Online Public Sphere

Author(s):  
Bilge Yesil

This chapter focuses on the online sphere. Through the prism of two developments in 2013—the Gezi Park protests and the corruption scandal—it discusses the possibilities and limits of online communications and the AKP's authoritarian reflex toward the burgeoning networked public sphere. It shows that the AKP's regulation and control of the online public sphere along the axes of nationalism, statism, and religious conservatism are not new, and that it has used three types of controls. These are first-generation controls that consist of Internet filtering and blocking, second-generation controls that involve passing legal restrictions, content removal requests, the technical shutdown of websites, and computer-network attacks; and third-generation controls that include warrantless surveillance, the creation of “national cyber-zones,” state-sponsored information campaigns, and direct physical action to silence individuals or group.

Author(s):  
Ilham Firdaus ◽  
Januar Al Amien ◽  
Soni Soni

Sniffing technique (ARP Spoofing) is an attack that sends fake ARP packets or ARP packets that have been modified according to the network address attacker's to poison the victim's ARP cache table. ARP spoofing attack is a dangerous attack because it can monitor the activities of victims in searching the browser and can steal social logins, office and other accounts. This attack supports the occurrence of other computer network attacks such as Denial of service, Man in the middle attack, host impersonating and others. Sniffing attacks are generally found in places that provide public Wi-Fi such as campus, libraries, cafes, and others. IDS Snort can detect sniffing attacks (Arp Spoofing). String Matching Method KMP algorithm is applied to detect attacks on snort logging files to provide alerts (messages) to users. Tests carried out are black box testing to test application functionality, and accuracy testing. All application functionality was successful, and testing the accuracy of the match between manual calculations for string matching and accurate application.


Sign in / Sign up

Export Citation Format

Share Document