Hacktivism, Freedom of Speech or Cyber Terrorism Essay examples

2492 Words Oct 13th, 2014 10 Pages
Hacktivism, Freedom of Speech or Cyber Terrorism?
Josh T. Diehl
ITT-Tech Institute

I will be doing my research paper on Hacktivism and looking into the subsector that is known as “Anonymous”. Hacktivism in itself is the use of computers and computer networks to promote political ends. To see this for what it truly can be, you must look at it with the understanding that it can be carried out under the same premise that proper (and skillful) use of technology can produce results similar to these of conventional acts of protest, activism, and civil disobedience.
I plan on exploring whether it is freedom of speech or cyber terrorism, keeping an open mind when conducting my research will be the key to the integrity of this
…show more content…
A hyper-realized community of activist and hackers uniting towards common goals and undeniable provoking change.” They are a collective of many, many people that are like a flash mob. They appear suddenly, act quickly, and then disappear. Think of them, if you will, as an internet gathering with a very loose and decentralized command structure that operates on ideas rather than directives.
They have been called “Freedom Fighters” & “Digital Robin Hoods” from those who believe that what they are doing is justice to the injustice of the system. While those who try and defend said system, such as critics, has described them as a “Cyber Lynch-Mob”.
“The concept of many online and offline community users simultaneously existing as an anarchic, digitized global brain.” Anonymous members (known as “Anons”) can be distinguished in public only by the wearing of stylized Guy Fawkes Mask.

Mark Rasch, the Chief Privacy Officer at SAIC, said “It’s not like you throw them in jail and they disappear. It’s sort of like squeezing Jell-O, it just moves somewhere else. Criminalized under the federal Computer Fraud and Abuse Act (CFAA) classifies most of Anonymous’s movements as, Conspiracy and “intentional damage to a protected computer”, also, “Violating a web site’s ‘Terms of

Related Documents