Anony Anonymous Ethical Issues

Improved Essays
Anonymous is an internet group that defies the odds of distance and power, using various ethical methods that posts their righteous ideas onto the web. They use a combination of DDoS attacks, Black Faxes, Google Bombs, and peaceful marches that represent a Martin Luther King type protest. Anonymous knows no bounds and will continue to thrive on 4chan’s /b/ section and through Twitter.
Anonymous originated on 4chan’s /b/ section, which is a forum that random people can make random posts based on different ideas and things to do. The initiative behind Anonymous was created from 4chan that makes every post from a user labeled as “Anonymous.” Anonymous’s first operation involved the Church of Scientology when they wanted to erase Tom Cruise’s leaked
…show more content…
In cities all across the world Anons collaborate together and contact each other to organize peaceful Anonymous protests against impurities and public evils located around the world. “On March 15, 2008, several thousand Anons marched past Scientology churches in more than a hundred cities, from London to Sydney. In keeping with the theme of anonymity, the organizers decided that all the protesters should wear versions of the same mask. After considering Batman, they settled on the Guy Fawkes mask worn in “V for Vendetta,” a dystopian movie from 2005. “It was available in every major city, in large quantities, for cheap,” Gregg Housh, one of the organizers of the protests and a well-known Anon, told me. The mask was a caricature of a man with rosy cheeks, a handlebar mustache, and a wide grin.” (“An Inside Look at Anonymous, the Radical Hacking Collective” The New Yorker) This shows that Anonymous wants everyone in the world to be able to have a role in their peaceful protest. Anons and supporters would march together, wearing Guy Fawkes masks to represent their anonymity, and their unity as an organization that wants peace and freedom around the …show more content…
“One of them posted images on /b/ of what looked like pipe bombs; another threatened to blow up several football stadiums and was arrested by the F.B.I. In 2007,” (“An Inside Look at Anonymous, the Radical Hacking Collective” The New Yorker) showing the blatant threats directed toward the public in a genocidal manner. Also, in a book about Anonymous’s antics with the Federal Government it states the following, “Since chatting with a hacker from Anonymous named Topiary, he had thought he was in the clear. Now he knew someone had hacked his HBGary Federal account, possibly accessing tens of thousands of internal emails, then locked him out,” (page 8. Olson, Parmy) showing that Anons used a brute force attack to hack a Federal Agent's account which contained several classified emails that was not supposed to be viewed by the public. This shows Anonymous’ ways of using hacking methods improperly, and in an immoral fashion.
Anonymous, the undetectable activist group, uses many ways to put their opinions and ideas around the globe. They do these in an ethical fashion, getting their point across while being peaceful and precise. All the evidence presented by The New Yorker and Parmy Olson’s book on Anonymous, shows how peaceful and sincere Anonymous’ methods are.

Related Documents

  • Improved Essays

    Julie Zhuo’s essay, Where Anonymity Breeds Contempt, does not effectively reach content providers because of Zhuo’s lack of consideration to the provider’s own experiences on the topic of trolling. Throughout her essay she argues that content providers need to take control over trolling by not allowing anonymous commenters, watching over comments, and asking users to report trolls. By following these steps, Zhuo believes that trolling will decrease. Trolling is when someone makes hateful or rude comments online- usually anonymously. Zhuo’s essay was published in November of 2010 during a time when Facebook and Twitter were the most popular social media sites.…

    • 1240 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Hactivism as a process has a dual-edged character. The organised activity exposes the “transparency and accountability” (Diamond 71) of global power exploitation. However, such methods are seen questionable in the accountability and transparency of their practice(s). The main concern with hactivism is the preconceived notions of its values are translated offline as vigilantism. However, the whole concept of vigilantism is based on the idea of not condoning individual action to exercise authority if there is an immediate presence enforcing it.…

    • 609 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    First Website: www.factcheck.org This is personally one of my most frequented websites because of the last election period. Factcheck.org is one of the oldest fact checking websites on the Internet today. Since starting in 2003, the website has made it a part of their mission statement to “increase public knowledge and understanding” so that viral and false rumors don’t run rampant in our society. Because of their goal to boost awareness, the website has always been very transparent about where they get their funding from.…

    • 1719 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Imagine a civilization where violent teens run rampant, citizens live in ignorance and the government has the power to drastically alter one’s most basic views. In Anthony Burgess’s A Clockwork Orange and Ray Bradbury’s Fahrenheit 451 this is people’s reality. These dystopian worlds may not be too distant from the state the world is currently approaching. It is imperative that individuals maintain a sense of identity in a global landscape that is growing more and more uniform.…

    • 585 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Mark Buku Heritage

    • 881 Words
    • 4 Pages

    There is also the immaterial masks, which are more common in today’s society, and a little more problematic. We use our “masks” in a similar way, but for entirely different reasons. Some of us use our masks to hide what we truly feel about certain things, we use our masks so that what we want others to see is the only side they do…

    • 881 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Denial-Of-Service Attack

    • 756 Words
    • 4 Pages

    “Denial-of-Service attacks are the cyber equivalent of vandalism. Rather than seek to break into the target system, the perpetrator simply wishes to render the target system unusable” (Easttom, Taylor, 2011). This type of cybercrime prevents the end users from attaining the resource accessibility. Denial-of-Service is also known as a DOS. An attack was launched in Santa Cruz County website in California that caused “county’s government entities and programs, including Emergency Services, Law Enforcement, the Courts, Social Services, Agricultural Extension, Employment, Surplus Sales, Vendor Registration, and Construction Projects and Proposals”( U.S. Attorney’s Office,2011).…

    • 756 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Anonymous Court Case Study

    • 1946 Words
    • 8 Pages

    Not long ago it would have been unimaginable that a group of random people working remotely from anywhere in the world would be able to band together to electronically fight common enemies. However, recently a hacktivist group identifying as Anonymous has risen in power and size with the goal of fighting anyone they deem threatening to innocent people. Their operations and tactics range from gathering and leaking sensitive and/or restricted information from large corporations, to hacking Google Search in order to produce skewed (and negative) results when people searched topics related to their enemies. This type of hacktivist group is a relatively new idea and there is no set precedent for how the American government should deal with such…

    • 1946 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Why Privacy Matter Even If You Have “Nothing to Hide” In the article “Why Privacy Matter Even If You Have ‘Nothing to Hide,”’ Daniel J. Solove, talking about the government governed the information to analyze without the permission. Many people didn’t realize how many problems by let the government take their information to analyze. Solove does a great job to persuade the readers that we deserve more the privacy by using the appeal to authority and anecdote.…

    • 704 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    But it is just a fake mask worn in front of the public and behind this mask a man does not carry any human atom, just flesh and bone and hatred…

    • 217 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    c) Simon’s opinion about Why Mass Surveillance Violates International Law. 2. Paragraph 1: Does: Introduces different countries are trying to limit internet users from either posting anonymously or using encryption to communicate securely. Says: Ecuador’s internet user need to use real name on online, and “pseudonyms are outlawed in Vietnam” (para 1). Paragraph 2: Does: The author gives evidence said government try to stop internet user use from posting anonymously has violate international law.…

    • 363 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    When anyone picks up a pencil and starts writing they have a particular audience in mind. For instance, if you are writing a letter to your best friend you are going to write the letter keeping that particular person in mind. On the other hand, if you were writing the same letter to your mom it would be written differently because your attitude has changed due to the change in your target audience. Being able to reach that target audience can be tough because you have to relate information to them in a way where they agree with your points. A writer named Julie Zhuo wrote an article for the New York Times called “Where Anonymity Breeds Contempt”.…

    • 1424 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Villains are an interesting bunch in that the same person can be seen as both minor/major, or helpful/dangerous. I guess the same could be said about heroes though. Chuck Klosterman, a best selling author, wrote an essay titled “Electric Funeral,” a chapter of I Wear the Black Hat: Grappling with Villains (Real and Imagined), which details villains of today-different types of technocrats. The three “villains” he mainly focuses on are Perez Hilton, Kim Dotcom, and Julian Assange, who each vary greatly on the spectrum of their acts. Hilton is a blogger who likes to post photoshopped pictures and articles, Dotcom created Megaupload, a website to post copyrighted material illegally, and Assange is the head creator of WikiLeaks.…

    • 1254 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Ddos Response

    • 1006 Words
    • 5 Pages

    Response Paper 1: Petition asks White House to make DDoS attacks a form of protest Distributed denial of service (DDoS) attacks have long existed in a controversial area of the law. DDoS is implemented by bombarding a website with requests that overwhelm the server capacity and effectively brings the website offline. This flood of traffic is often accomplished through the use of Internet connected computers that are usually maliciously controlled by hacktivists, otherwise known as bots, and involves no actual hacking . This technicality has generated debate on the appropriate punishments for DDoS cases as it could be argued that the act was not in itself illegal. Consequently, petitions have been filed, such as the one covered by Meghan Kelly…

    • 1006 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Introduction The most powerful and prominent force in the world has without a doubt has been, the rapid advancement of technology following the industrial revolution. From the introduction of the steam engine by James Watt to the mass expansion of railway lines, technological advancement has increased productivity and globalization exponentially. By breakthroughs in communication, transportation, and information technology, the world in which we reside has become unrecognizable to what it was 200 years ago. This essay encompasses these three ways in which technological advancement has completely restructured and revamped the world of as we know it. Cementing itself as the most powerful force on the planet.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    Evolution Of Hacking

    • 1100 Words
    • 5 Pages

    We live in a world where we strive for technological advancements. Over the years we have seen nothing but progression in technology; that also means a progression in knowledge. The more we learn, the more we can create. With the advancements, we see in technology today, the more society learns. Whether that be basic computer functions, browsing the web, and even using an OS program.…

    • 1100 Words
    • 5 Pages
    Great Essays