Talk:February 2010 Australian cyberattacks/GA2

GA Review edit

Article (edit | visual edit | history) · Article talk (edit | history) · Watch

Reviewer: Racepacket (talk) 12:27, 1 March 2011 (UTC)Reply


GA review – see WP:WIAGA for criteria


No disamb. links or invalid external links.

  1. Is it reasonably well written?
    A. Prose quality:  
    "web based companies"->"web-based companies"
    "This was dubbed "Project Freeweb" to differentiate it from the cyber attacks that were criticised by other protest groups.[16]" - avoid passive voice. Who named it?
    B. MoS compliance for lead, layout, words to watch, fiction, and lists:  
    Are we complying with WP:TITLE? Perhaps the article should be moved to "February 2010 Australian Cyberattacks" What reliable sources gave it the name, or was it named by the anonymous hackers?
  2. Is it factually accurate and verifiable?
    A. References to sources:  
    The Time magazine article reported "their second attack against the filter, which they called "Operation: Titstorm" — a reference to the sexual content that the filter will be blocking." - which is different that independent third parties giving the entire incident that name.
    B. Citation of reliable sources where necessary:  
    Is Fairfax Media a reliable source?
    C. No original research:  
  3. Is it broad in its coverage?
    A. Major aspects:  
    Background should summarize prior Australian laws regarding pornography. Was it the case that pornography was illegal prior to the initiative that would mandate the new filters?
    Please state whether the government continued with its filter program. The article implies that it did continue, but there should be explicit, sourced statements as to what happened.
    This source: Oates, John (November 25, 2010). "Meet the Oz teen behind Operation Titstorm". The Register. Retrieved 2011-03-01. says that Steve Slayo was tried for organizing this attack. The subsequent criminal investigation, prosecution and sentencing is relevant to the article.
    B. Focused:  
  4. Is it neutral?
    Fair representation without bias:  
    Does referring to the incident as an "operation" constitute POV-pushing?
  5. Is it stable?
    No edit wars, etc:  
  6. Does it contain images to illustrate the topic?
    A. Images are copyright tagged, and non-free images have fair use rationales:  
    Fair use rationale for http://en.wikipedia.org/wiki/File:Operation_titstorm.jpg is a bit weak. This is not a logo, and showing the flyer will not help the reader recognize the cyberattack.
    B. Images are provided where possible and appropriate, with suitable captions:  
  7. Overall:
    Pass or Fail:  
    This article represents significant work by its author. Putting review on hold for you to address concerns. Racepacket (talk) 12:58, 1 March 2011 (UTC)Reply
Modifications
  • Web-based: Fixed [1]
  • Who named it?: Fixed? [2]
  • "February 2010 Australian Cyberattacks" vs. "Operation Titstorm": Several sources used refereed to it as "Operation Titstorm" in the body and their titles. However, several did say "attacks" in their titles. I would be happy to err on the side of caution and rename the article as you suggest. Ca I do that now or will that throw off the transclusion of the review and GA bot?
The bot is really confused about this article already. (That is why I moved this review from GA to GA2). We can move it when we pass the review. Racepacket (talk) 03:39, 2 March 2011 (UTC)Reply
  • Time magazine article: See the comment above
  • Fairfax Media a reliable source?: For sure. See Fairfax Media. But it should be The Sydney Morning Herald anyways so made the adjustment.[3]
  • Is it broad in its coverage? Good idea. I did not know about Slayo but found a source discussing his bond instead of conviction. I also added a paragraph discussing the current status (or lath there of) of the plan. Is this sufficient? [4] Unfortunately, I cannot find any clarification on what was already illegal except for child porn. Should we mention that child porn is illegal in the Background section or is acceptable to assume?
  • "Does referring to the incident as an "operation" constitute POV-pushing?": I intentionally tried to not refer to it as "operation" in the body but one slipped through. Fixed: [5]
  • File:Operation titstorm.jpg: I originally was not planning on uploading any image but this specific image was used in multiple sources to identify the subject. See: Wired, Fairfax (the largest media company operating in New Zealand), Brisbane's daily paper The Courier Mail a UK technology news site, Australian tech site, and so on. If it comes down to removing the image or GA then it would not hurt my feelings to drop the image. I would just prefer not to. Cptnono (talk) 23:13, 1 March 2011 (UTC)Reply
The GA criteria are strict about images, and give you two choices. 1) Edit the image page and change the "fair use rationale" to one that focuses on the fact that the article discusses the flyer and its historic significance. (Remove the logo-related language about helping the reader recognize the subject of the article.) Your claim will be stronger if the article actually discusses the existence of use of such flyers. OR 2) delete the image from the article. Racepacket (talk) 03:39, 2 March 2011 (UTC)Reply
I feel like an idiot. I actually found 3 sources discussing it and one of them is already in the article I think. I will type something up, change it to "critical commentary"n instead of identification, and move it into the appropriate section. Cptnono (talk) 04:53, 2 March 2011 (UTC)Reply

March 2 Reading edit

The article is much better with the recent additions. Please consider these changes:

  • "that would require internet service providers to block illegal and what the government deemed as "unwanted" content."->"that would require internet service providers to block Australian users from accessing illegal and what the government deemed as "unwanted" content." - make clear it applies only to Australians.
  • "The filter also includes gambling sites"->"The proposed filter also includes gambling sites" - not yet set up.
  • "Estimates of perpetrators involved have ranged from hundreds to thousands."->" Estimates of the number of attacking systems involved have ranged from hundreds to thousands." - counting computers, not people.
  • "In July 2010, Conroy delayed the plan by ordering a 12-month review into"->"In July 2010, Conroy delayed implementing the plan pending a 12-month review into"
  • "The attack also resulted in criticism of the Australia's terrorism provisions"->"The attack also resulted in criticism of the Australia's terrorism laws"

As noted above, either improve the fair use rationale for the flyer or remove it from the article. Other that these items, we are done. I have rechecked the disamb links and the external links, and they still check out. Thanks, Racepacket (talk) 04:14, 2 March 2011 (UTC)Reply

    • All great calls.[6]Cptnono (talk) 04:53, 2 March 2011 (UTC)Reply
    • I believe the the FUR, placement, and commentary is now sorted. Any touch-up needed?Cptnono (talk) 07:42, 2 March 2011 (UTC)Reply
FUR is well done. Consider adding The Register source given above and moving the article per prior discussions. Congratulations. This is a very interesting article, and I am sorry that GA1 was not a professional experience. Racepacket (talk) 09:34, 2 March 2011 (UTC)Reply
Thanks! Enjoy the Wikicup. I really appreciated your input (especially with the FUR).Cptnono (talk) 03:47, 3 March 2011 (UTC)Reply