Hacktivism Analysis

Great Essays
Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purposes.The phrase “Hacktivism” originated in 1996 by a hacktivist grouped named “Cult of the Dead Cow” (Denning, 2015, para. 5). Over the last few years, computer hacking has transitioned from being a small collective of computer enthusiast, into huge political platform.The first politically motivated hacking attack has been dated as far as 1987 (Dreyfus, 1997, p.2). This platform has helped give people who use the internet a voice. Which ultimately helped created the first state of the internet. Although there is the deviant percent who do abuse their technical abilities for they own benefit.
The hacktivist movement is made up of
…show more content…
If passed this act would give local government the power to block access to entire internet as well as censoring content.This caused an uproar in the cyber computer because it would have allowed censorship all over the internet. On January 18, 2012, the cyber community responded by causing an internet blackout. Hacktivist shutdown senate.gov, paypal and any other communities who supported SOPA. This gained more momentum when multinational technology companies such as Google, Facebook, Apple, etc joined in by coordinating service …show more content…
Emile Durkheim 's theory which implies that crime serves a function in society. Crime is a very potent way to bring in acts of social change. Which is why hacktivism is such a big part of the computer hacking realm. Most computer hacking attacks are the cause of the governmental secrecy and human rights violation involving people from all over the world inside and outside of the interwebs. When a collective of society challenges the social norms by committing crime,such as these hacktivism groups. Their beliefs will help bring in the collective change.
When you have people from all over the globe, fighting for cyber and social rights, it can potentially bring down a government. While many people take streets trying to protect the freedom for free information. Hacktivist are fighting a constant war against censorship laws, speaking from my own experience. They are participating in the first cyber revolution. Computer hacking has become more than just tinkering with machine, it has become and idea (Heinzen,Picciano, 2008, p

Related Documents

  • Improved Essays

    Hactivism as a process has a dual-edged character. The organised activity exposes the “transparency and accountability” (Diamond 71) of global power exploitation. However, such methods are seen questionable in the accountability and transparency of their practice(s). The main concern with hactivism is the preconceived notions of its values are translated offline as vigilantism. However, the whole concept of vigilantism is based on the idea of not condoning individual action to exercise authority if there is an immediate presence enforcing it.…

    • 609 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Introduction Emile Durkheim presents an argument for crime’s benefit to society from The Rules of Sociological Method, 1938. Daniel Patrick Moynihan presents the opposing view in an issue of the American Scholar, Volume 62, in the winter 1993. Durkheim’s argument centers on peer pressure. Crime could disappear if it was offensive enough to society as a whole, thus socially forcing individuals committing such crime into socially pressured good behavior.…

    • 757 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Anonymous Court Case Study

    • 1946 Words
    • 8 Pages

    Not long ago it would have been unimaginable that a group of random people working remotely from anywhere in the world would be able to band together to electronically fight common enemies. However, recently a hacktivist group identifying as Anonymous has risen in power and size with the goal of fighting anyone they deem threatening to innocent people. Their operations and tactics range from gathering and leaking sensitive and/or restricted information from large corporations, to hacking Google Search in order to produce skewed (and negative) results when people searched topics related to their enemies. This type of hacktivist group is a relatively new idea and there is no set precedent for how the American government should deal with such…

    • 1946 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Marisa Bugarin Professor Bivona ENG 102 3:00-4:15 3/16/15 Annotated Bibliography Annotated Bibliography 1) Chemaly, Soraya. " A Million Peeping Toms: When Hacking Is Also A Hate Crime." Time. Com (2014): 1.…

    • 1953 Words
    • 8 Pages
    Improved Essays
  • Decent Essays

    Today’s modern technology has provided a new platform for activists to advance their cause in a public forum. According to the Oxford dictionary, “Hacktivism” is defined as the act of a computer hacker whose goal is to promote a social or political cause. Hacktivism is the modern online version of traditional protests, rallies, and marches. Hacktivism acts reflect the same historical acts of civil disobedience that occurred during the Civil Rights Movement. Civil disobedience is the refusal to obey a law that violates an individual right, it is a state of resistance.…

    • 143 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The use of Distributed Denial of Service against MasterCard and Visa has facilitated a societal mind shift to a culture that values individual freedom. Clay Shirky said, “Authoritarian governments stifle communication among their citizens because they fear, correctly, that a better-coordinated populace would constrain their ability to act without oversight. ” This may have once been the case, but in recent years, governments have changed their stance on Internet freedom, with impact from hacktivist groups such as Anonymous. In January 2010, US Secretary of State Hillary Clinton outlined how the government would promote Internet Freedom within the USA and abroad . Clinton described freedom to access information, freedom to produce public media, and the freedom to converse with others.…

    • 849 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Forms Of Digital Crime

    • 547 Words
    • 3 Pages

    The question is, “How we control to how far the next hacker goes and for what reason. This is why to media will be an eternal source for this subculture. The federal government has done a good job with catching there ethical hacker and turning them into White Hats for the great good of the country, but there still a lot of them out…

    • 547 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Improved Essays

    "Since the internet was invented in 1990, politicians have debated over a very pressing question: how much power should the government have over the internet? I, for one, believe that the government should not have any control over the internet, but overall, that ideal is unrealistic. Without some sort of government regulation, the free network we have come to know may be abused by large corporations in order to turn a profit. In contrast, if there is too much government involvement, the internet could easily become flooded with propaganda or shut off completely if it so pleased those in power. In the end, neither side can truly win without there being some sort of socio-political ramifications.…

    • 783 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Non Digital Crimes

    • 938 Words
    • 4 Pages

    There are various theories that can be used to explain the causes of digital crimes. One of the theories that adequately fit for this is the routine activities theories. This is one of the theories that have connections with crime in general. There are also some of the non-digital crimes that are connected to this crime (Vito & Maahs, 2011).…

    • 938 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Ethical Hacking

    • 741 Words
    • 3 Pages

    There is a component to these ethical hacking assignments, which requires that you look at your own beliefs, ethics and morality. In some cases you can accomplish the tasks without engaging in any form of deception, harm, or social or physical injury to the target. If you can not complete the task without offending your own ethics, then you need to state that you did not complete the task, but you really need to post how you would have done it, and discuss where the edge is between what you feel is proper behavior, and what you deem to be improper behavior… but the key is you need to explain it, and “get your head around it” as For example, from a completely theoretical perspective, lets us say that for sake of discussion that you selected a card that instructs you to punch a classmate in the head, and then to steal their wallet and money. While there is no possible way that we would ever be asked to do this, but let’s say you did. You, and the rest of the people in class would of course refused to perform such a task as it would be an affront to our individual moralities and shared ethical code.…

    • 741 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    Introduction When it comes to digital crimes, various methods are used to commit such acts. These include: Hacking, malicious software as well as cyber stalking, to name a few takes place day in and day out. The names that are attached to these crimes in fact explains the what and now, the why has to be explained. In this body of work however, it will be discussed theories surrounding digital crimes. Space Transition Theory and Social Learning Theory will provide detail and insight as to the why factor: why was the crime committed, the rationale of the response, how it relates to crime in general.…

    • 795 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    It is clear that in today’s world the consent of crime and deviancy are redefined in our communities. Many types of deviant behavior are normalized; not only citizens but also the authorities are ignoring these things, which can be considered as criminal acts. Daniel Patrick Moynihan showed throughout his paper that redefining deviancy is what is keeping us from being a healthy society. I totally agree with Moynihan’s ideas of redefining deviancy, we are citizens have to pay more attention to what is going on around us. Only on Emile Durkheim’s world crime is beneficial to society.…

    • 119 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Is Crime Beneficial to Society? By Christy Evans 8/30/17 French sociologist Emile Durkheim’s position on crime is that it is normal to a functioning society. He believed that by defining what is deviant, we are enabled to know what is not, and hence to live by shared standards. Durkheim thought that deviance promoted social unity and moral boundaries.…

    • 766 Words
    • 4 Pages
    Improved Essays