Case Study: Anonymous

Great Essays
Case study: Anonymous

While the motivation of terrorist acts remains the same, the rapid evolution of technique has provided to those that use terror as a method to attain their goals, new weapons with a potential that is not fully quantified. The database, the measures of protection and security, the equipments meant to reassure our safety are exposed to those new types of weapons, the traditional methods of fight becoming impractical.
The cyber-crimes are a supplement for cyber-terrorism in what concerns the methods used although the motivations are different from each person. Many of these attacks are made either to produce anarchy, for amusement, to reaffirm the hacker?s position, or from a political motivation.
When speaking of cyber-terrorism, the first thing to take into consideration is the geographic component that vanish and there is a slight chance on the terrestrial identification of the attacker due to the fact that internet offers us anonymity. Another point to reflect is that the distance from which it is the attack because in the lack of a clear legislation, any failure does not impose restrictions in the future and so
…show more content…
The image of Fawkes from the protests of today has its origins in the comic series V for Vendetta from the '80s, written by the anarchist Alan Moore and illustrated along with the illustrator David Lloyd, both British. The action takes place in a dystopian UK in '97, under dictatorship, with a population depressed and helpless. the plot is centered around Evey, an orphan, and V, a rebel who lay eyes on her costume, an anti-hero who disturbs the authoritarian state through acts of violent resistance. Throughout the series, V wears a mask that never failed her out, the stylized face of Guy Fawkes: bleached skin and flushed cheeks, thin mustache and goatee quietly, eyes narrowed over an inscrutable

Related Documents

  • Improved Essays

    DESPITE HIPPA’S HITECH ACT, CYBERATTACKS CONTINUE TO RISE HIPPA’s HITECH Act and the Omnibus rule were enacted to prevent data breaches in healthcare; however, healthcare data breaches are on the rise. Since its enactment in 1996, several provisions have been incorporated into the original Health Information Profitability and Accountability Act (HIPAA), one of which is the Health Information Technology for Economic and Clinical Health Act (HITECH): In 2009, The U.S. Department of Health and Human Services (HHS) enacted the American Recovery and Reinvestment Act, which includes the HITECH Act. On March 26,2013, HHS enacted a final Omnibus rule to implement several provisions of the HITECH Act. These provisions aim to strengthen the confidentiality…

    • 807 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Criminals and Terrorist have similarities in the way they plan to commit crimes yet, there poses a distinct difference in the act of motivation. Criminals are usually motivated by greed; whereas, Terrorist are motivated by religious and political ideologies, which encompasses short and long-term goals (Clarke, R.V. & Newman, G. R., 2008). Some of the key components that are considered by Criminals and Terrorist include, the target of choice, the method and tools required to perform the act, and opportunity (Clarke, R.V. & Newman, G. R., 2008). Terrorism can come in many shapes, forms, and fashions; all of which are governed by the benefits of the act and the opportunity to attack. The degree and level of attack can pose damages that are far…

    • 775 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    9/11 Types Of Terrorism

    • 1378 Words
    • 6 Pages

    The most memorable terrorist attack from 2001 to 2015 was on the World Trade Center and Pentagon on September 11, 2001 (Paul, Dorin, Bugnar, and Mester 6). About three-thousand innocent people lost their lives during this violent attack (“Department of Government and Justice Studies”). This important event in American History should be remembered to hopefully prevent it from ever happening again. As terrorism changed from the 1980s to today, so did the types of people who became terrorists (O’Connor). This paper will look at what terrorism is, the types of terrorism, who becomes terrorists, and what their motives may be.…

    • 1378 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    "In this day of age, we have dedicated large portions of our lives to the internet and staying connected. This allows a wide variety of knowledge and entertainment to be brought into every home. However, the vast amount of resources available online can possibly be a bad thing. Countless organizations of crime and terrorism roam the online world with a sense of anonymity and the resources to mass spread their ideologies across the world. This has led to the creation of governmental organizations such as the National Security Agency (NSA) that hold the main goal of trying to prevent terrorist and crime organizations from carrying out evil and violent attacks on the people of the United States and the world.…

    • 523 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Anonymous Court Case Study

    • 1946 Words
    • 8 Pages

    Not long ago it would have been unimaginable that a group of random people working remotely from anywhere in the world would be able to band together to electronically fight common enemies. However, recently a hacktivist group identifying as Anonymous has risen in power and size with the goal of fighting anyone they deem threatening to innocent people. Their operations and tactics range from gathering and leaking sensitive and/or restricted information from large corporations, to hacking Google Search in order to produce skewed (and negative) results when people searched topics related to their enemies. This type of hacktivist group is a relatively new idea and there is no set precedent for how the American government should deal with such…

    • 1946 Words
    • 8 Pages
    Great Essays
  • Superior Essays

    However, given this project seeks analyse a limited point in time when an individual is isolated from wider networks and operating alone (the moment of violent action), I believe Gill, Horgan and Deckert’s definition of a “individual terrorist with command and control links” is an acceptable alternative to Spaaij’s definition. This term includes those who may have links to international networks, but crucially operate autonomously – essentially, they have a very high level of agency in conducting their attacks. For the purpose of this project, this definition is satisfactory. It avoids the difficult issue of attribution (did this person belong to a network? If so, how relevant is that?) and allows for a focus on the primary issue of this project:…

    • 1985 Words
    • 8 Pages
    Superior Essays
  • Decent Essays

    Throughout the cold war, the intelligence policy has been characterised by a certain degree of continuity throughout the different administrations. The first President to remove a Director of Central Intelligence in charge in favour of a party-affiliated DCI was President Carter in 1976, who did not confirm the mandate of then DCI Bush. Despite that episode, continuity has profoundly marked the work of the Intelligence, by assuring it a stable structure, endowed with autonomy, and by maintaining an exclusive focus on the Soviet threat, which remained at a priority of the US agenda regardless of the President in charge.…

    • 349 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Cyber deterrence has been thrown out in the public, governmental, and military sectors for the better part of the first half of the decade, stretching into discussions currently in organizations like NATO, and governments worldwide. The theory is simple: “deter someone from doing something out of fear of repercussion or retaliation.” Theory and concept however, are very different premises and conclusions. Everyone in the information warfare area knows that attribution is a slippery slope, and with the quick typing of a few characters on a keyboard, an attacker can choose to be anyone they want to appear to be. Officials pounding any “attribution” on any pulpit, continue to learn nothing, and attackers will continue with their cyber-shenanigans.…

    • 1639 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Anonymouss Are Ethical

    • 871 Words
    • 4 Pages

    In this paper, I will argue that the group Anonymous aren’t criminals and their actions are ethical. I will argue that this thesis is true from the utilitarianism view; they are hacking for the good of the people. Some examples I will include are Project Chanology, Hal Turner, and Operation DarkNet. I will also consider the opposing position that Anonymous are bad and unethical. I will argue that it is mistaken because of misknowledge of the operations and what Anonymous’ purpose is.…

    • 871 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Although most people today view terrorism as a type of warfare that developed relatively recently based on this generation’s experiences with the World Trade Center bombing in 1993 and the federal building bombing two years later, modern terrorism has its roots in events that took place hundreds of years ago. Beginning with the Enlightenment in the eighteenth century, ordinary citizens began to demand social changes that would lead to the state’s protection of all people, not just the nobility. The increased demand for democracy produced tension between the ruling class and the governed, which led in some cases to violence. The American Revolution began in 1775 and ended in 1783.…

    • 673 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    ¨Usually law enforcement agencies collect data on a suspect after they have been identified. This often resulted in missed opportunities, lost lives, just paving the way for only more destruction. But what if data could be collected in advance, before the suspect was even known? What if just the act of collecting data could result in the identification of completely new suspects? More than a few have pondered this question, just days after the Sept. 11th attacks on New York and the Pentagon, John Yoo, the Justice Department lawyer at the time, wrote an internal memo that argued that the government should use "electronic surveillance techniques and equipment that are more powerful and sophisticated than those available to law enforcement agencies…

    • 806 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Essay On Hacktivism

    • 1659 Words
    • 7 Pages

    As the internet’s ever expansive growth continues, the activity of hacktivist groups advances. Although hacktivists have been targeting different governmental websites and networks, their actions are an act of protest and civil disobedience. In addition, the idea of a hacktivist has become misconstrued by the deceived public. The idea of a hacktivism needs to be made more transparent and the actions of these hacktivist groups need to be made more clear and differed from cybercrime or cyberterrorism. Hacktivism is a way to foster change and protection in the modern world, by allowing those who find themselves without a voice able to speak and messages to be sent across the globe.…

    • 1659 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    Martha Crenshaw’s 1981 article “The Causes of Terrorism” outlines an analysis on the causes of terrorism by examining the preconditions, precipitants, reasons, the psychological aspects of the individual. Crenshaw attempts to show the reader the causes of terrorism in this article. She begins by providing a definition of terrorists. She defines terrorism as the premeditated use or threat of violence committed by a group of people in order to convey a political message. She then divides her paper into three distinct categories that explore the framework, the reasons, and the motivation for terrorism.…

    • 1247 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Evolution Of Terrorism

    • 767 Words
    • 4 Pages

    Terrorism is a very serious and extremely common crime in the world today. The evolution of terrorism is very complex, however in the beginning of the twentieth century the most often used method was assasination. Since then, terrorists have displayed much more significant threats and acts of terrorism on different parts of the world. Terrorism is generally defined as the unlawful use of force against persons or property in order to intimidate the government, frighten the civilian population, or coerce a segment of the public to surrender to political and social demands. (Karmen, A.)…

    • 767 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Impacts Of Hacktivisms

    • 1524 Words
    • 7 Pages

    With the onslaught of hacking and breaches in privacy by groups ranging from hacker cults to the NSA, individuals and corporations must take steps to protect themselves and their data to prevent any further damage. The impacts of coordinated hacking attacks are widespread and can affect any online services: ranging from PayPal to Sony’s PlayStation Network. A team of hackers, especially one with global support such as Anonymous advocate a policy called “hacktivism”. The concept of hacktivism usually involves using illegal means to target single issues while gaining collective support by a team to proceed with such hacks (Kelly, 2012).…

    • 1524 Words
    • 7 Pages
    Improved Essays