Anonymous: The Generation Of Hacktivists

Great Essays
Anonymous: The Generation of Hacktivists “We are not hackers. We are not terrorists. We are not violent. We are citizens of the world who bear witness to tyranny, oppression and censorship.” “We resist those who seek to violate our rights as human beings.” “We are everyone and we are no one.” “United as One, Divided by Zero. We are Anonymous.” These are quotes stated by hqanon, or the Headquarter of Anonymous, describing Anonymous and the fight creates against their opponents. Through the past few decades, people's lives have revolved around technology and relied on it to enhance their way of living. People’s main source of interaction with others, acquirement of knowledge, and consumption of goods and services are being scattered across all …show more content…
Anonymous is referred to as a hacktivist group, which is a word that consists of hacker and activist (Badgley). The hacker portion of this word is associated with the abundant knowledge of networking and technology that members in this organization possess. The activist portion in the title of this group is represented as a result of their motives to try and deteriorate companies, organizations, and governments that violate the human rights. Anonymous does not, however, perform any manner of hacking unless a certain cause is specified (Badgley). Though some citizens and leaders see these actions as harsh and criminalistic, the group fulfills the necessary steps that they see fit to bring attention to a cause that has affected others negatively or brings unwanted ideals to the public's …show more content…
There are two popular types of online weapons that this group employs most frequently: DDoS and Doxing (“Denial”). DDoS is an acronym which stands for Distributed Denial of Service, however it does not try to gain personal or secretive data. Instead, it attempts to make a network unavailable for people operating it. Hacktivists such as Anonymous use this because it shuts down access to the website for the whole database of users ("Denial”). DDoS attacks achieve this goal by attempting “to overload a server by sending a large number of requests requiring resource-intensive handling and processing” (“Denial”). By doing so, the router or server can not easily juggle all of the tasks, resulting in a collapse of the network. It is a route that hacktivism takes to show its defiance toward others who do not share the same humanitarian

Related Documents

  • Improved Essays

    Figure 6 shows Internal Security settings that were not set as high as they might have been to aide in threats that require a human response. Lesson 7: Invest in good technological defenses, but do not under invest in people who will be operating this equipment. Another, related lesson learned here is the need to strive to be excellent, rather than average. This stems from the view that we had taken during many simulation results that we were still doing "pretty good" when looked at in the context of all sectors taken together.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Hactivism as a process has a dual-edged character. The organised activity exposes the “transparency and accountability” (Diamond 71) of global power exploitation. However, such methods are seen questionable in the accountability and transparency of their practice(s). The main concern with hactivism is the preconceived notions of its values are translated offline as vigilantism. However, the whole concept of vigilantism is based on the idea of not condoning individual action to exercise authority if there is an immediate presence enforcing it.…

    • 609 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Generally, a hacktivist attacks using a denial of service method. This technique overloads the server until it finally crashes. When a hacktivist targets a healthcare provider, he or she is looking to attain specific information about intellectual property, patient data or to embarrass the…

    • 807 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In the article “Internet Trolls” by Lisa Selin Davis, she talks about people who spread negativity on the internet. According to her article, people leave nasty comments on the internet because they feel like they are alone and can hide behind the computer. Also, they want to get a reaction out of people and gain attention, so they say harsh, hurtful comments. She believes people don’t think before they type. These “trolls” can be categorized into many different groups including: hackers, catfishers, and cyberbullies.…

    • 644 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    First Website: www.factcheck.org This is personally one of my most frequented websites because of the last election period. Factcheck.org is one of the oldest fact checking websites on the Internet today. Since starting in 2003, the website has made it a part of their mission statement to “increase public knowledge and understanding” so that viral and false rumors don’t run rampant in our society. Because of their goal to boost awareness, the website has always been very transparent about where they get their funding from.…

    • 1719 Words
    • 7 Pages
    Improved Essays
  • Superior Essays

    As technology advances, members of the free society are able to access an increasing wealth of information. However, the Internet will always have the potential to revolutionize the world, both for the betterment of everyone and the detriment of everyone. In Lloyd Axworthy’s article “The Internet and Global Human Rights,” he compares the positives and negatives of the Internet. People have a higher potential to use the internet to pursue unethical ideas than good because the internet allows for spreading false information through the manipulation of facts, stealing of intellectual property through piracy of content, and creating a harmful atmosphere through false identities and privacy concerns.…

    • 1172 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    Ken Westin, a security market specialist, views Anonymous attacks as a way to “actually force ISIS to be a little more security savvy… [driving] them to increase their capabilities when it comes to encrypting communication and securing their sites.” ISIS now knows how and where their websites and communication techniques are vulnerable to infiltration. In effect, Anonymous’s efforts are counterintuitive towards their actual goal and are only doing more harm than good. By having the government being able to monitor and track ISIS recruiting actions they can develop plans to effectively combat those activities. Now government agency effectiveness is decreased as ISIS operatives move towards other means of…

    • 1865 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    In the article “The Internet is a surveillance state”, which appeared on CNN.com on March 16, 2013, Bruce Schneier claims the government can see our every move on the internet. He goes on to state, “Whether we admit it to ourselves or not, whether we like it or not, we’re being tracked at all times.” (55). He uses specific and persuasive examples from his work experience to share his thoughts and beliefs on a subject that not everyone is aware of, but the ones who do are usually chilled by it. This paper will analyze Schneier’s article from his view as an American security technologist, cryptologist, and author of “Liars and authors:…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Denial-Of-Service Attack

    • 756 Words
    • 4 Pages

    “Denial-of-Service attacks are the cyber equivalent of vandalism. Rather than seek to break into the target system, the perpetrator simply wishes to render the target system unusable” (Easttom, Taylor, 2011). This type of cybercrime prevents the end users from attaining the resource accessibility. Denial-of-Service is also known as a DOS. An attack was launched in Santa Cruz County website in California that caused “county’s government entities and programs, including Emergency Services, Law Enforcement, the Courts, Social Services, Agricultural Extension, Employment, Surplus Sales, Vendor Registration, and Construction Projects and Proposals”( U.S. Attorney’s Office,2011).…

    • 756 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Anonymous Court Case Study

    • 1946 Words
    • 8 Pages

    Not long ago it would have been unimaginable that a group of random people working remotely from anywhere in the world would be able to band together to electronically fight common enemies. However, recently a hacktivist group identifying as Anonymous has risen in power and size with the goal of fighting anyone they deem threatening to innocent people. Their operations and tactics range from gathering and leaking sensitive and/or restricted information from large corporations, to hacking Google Search in order to produce skewed (and negative) results when people searched topics related to their enemies. This type of hacktivist group is a relatively new idea and there is no set precedent for how the American government should deal with such…

    • 1946 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Meliorism On The Internet

    • 712 Words
    • 3 Pages

    The internet is a tool that everyone uses. On the internet, there are many different platforms that ask people to take part, like, share, or donate to different causes in the world. People take different approaches when it comes to protesting. Many people would like a page for the cause, while others go out and protest for the same cause. Schuler in “It’s time to work for a better internet” argues that people lack the real human effort it takes to stand up for a cause due to the lack of human ties to a cause.…

    • 712 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Hate Group Downfall

    • 332 Words
    • 2 Pages

    Hate groups can be defined as organizations or movements that practice hatred and/or violence towards certain members of society based on sexual orientation, race, color, religion etc. Many factors can affect hate groups. According to Steven Chermak, a lead investigator affiliated with The National Consortium for the Study of Terrorism and Responses to Terror (START), some of these factors include funding, age of organization, size of organization, and military members (Chermark, 196-7). The more they have of these and the older and more experienced the members are make a more powerful and notable hate group. Furthermore, a crime motivated by a hate group is called a hate crime.…

    • 332 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    “Resist the Internet” The internet, resembles the dictator of our day to day lives. In life technology constantly bombards people of all ages. Humans are enslaved to the internet as author Ross Douthat states. Younger generations especially fall into this category because of the daily exposure to technology.…

    • 420 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In Malcolm Gladwell’s article “Small Change”, activism and its development into modern day society is targeted. Through the repetition of examples that happened in the real world, a sense of reality and importance is placed on the activism. As the article opens, it tells of four college students sitting in at the Woolworth’s and their protest that sparked the interest of many others. Iran’s Twitter war is brought up to repeat the activism in the article and introduce the actions in a more modern-day view. The people who go onto Facebook are called, “Facebook warriors,” in the article.…

    • 705 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Digital Democracy

    • 1113 Words
    • 4 Pages

    Digital democracy: Politics and the Internet LITERATURE REVIEW Peter Van Aelst, Stefaan Wargrave (2002) and Manual Castells (2012) explore the emergence of new media technologies, focusing on the Internet, in relation to it’s role in engaging individuals to perform social movements that are materialized through various forms. This is exemplified in the formation of organized protests, online petitions and campaigns that contribute to a united cause. Within Van Aelst and Walgrave’s article, the establishment of social movements that are based online are dissected through articulating them through 3 aspects: a shared interest that forms a collective identity, actual mobilization and a network of different organizations (Van Aelst & Walgrave…

    • 1113 Words
    • 4 Pages
    Great Essays