Hacktivism By Gary Mckinnon

Improved Essays
In the following paper I will discuss the creative process behind our character, Gary Lamo. There is much significance of the people that were chosen to base our character off of. I will follow with what specific significance this character has in society and how he relates specifically to this course. The main idea that most of the discussion will revolve around the ideas of hacktivism.
Our character was specifically based off of two different individuals. The first was Gary McKinnon. Gary McKinnon is known to be one of the most notorious hackers in history. He had been interested in computers since he was very young and grew up learning how to hack/code programs. Much of the hacking that he did was entirely done based on curiosity and the
…show more content…
As discussed in class hacktivism is the idea of using computer technology and programs to address a political agenda or facilitate a social change. According the article by Paul Taylor titled From hackers to hacktivist: speed bumps on the global superhighway? he describes hacktivism as “the manipulation of any radical action by those seeking to redirect the social impact of hacking for their own purposes” (Taylor 633). If you look at the multitude of different post that our character made in his blog or in his social media page. Much of it calls for individuals to go against government and learn more about these aliens. Much of what our character stands for is getting information to the people. So any event that occurs involving the government hiding information he believes that its his job to get all that information and share it with his readers. He is a strong believer that the government is hiding a lot of information due to greed and that the government knows that if the people found out about this information they would rebel. I would say that our character wouldn’t be considered a cyberterrorist because there are no threats being made when he goes into the systems of big corporations or the government. Something that we talked about in the reading discussion is the fact that where can we draw the line between doing some for the sake of getting information and something that involves

Related Documents

  • Improved Essays

    The book “Code Talker” by author Joseph Bruchac is a very interesting book about a Navajo Native American and his life being a marine in World War II. Bruchac uses setting, plot development, and cultural perspective well in this book. “Code Talker” begins with a young Navajo boy and his journey to a United States government led school. There he must get his cultural long hair shaved. Also, he must learn English and never use his sacred Navajo language.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Hactivism as a process has a dual-edged character. The organised activity exposes the “transparency and accountability” (Diamond 71) of global power exploitation. However, such methods are seen questionable in the accountability and transparency of their practice(s). The main concern with hactivism is the preconceived notions of its values are translated offline as vigilantism. However, the whole concept of vigilantism is based on the idea of not condoning individual action to exercise authority if there is an immediate presence enforcing it.…

    • 609 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Moreover, if a hacker attains a patient’s record and adds false information to it, the risk of a medical complication increases. Categorizing Cyber Attackers Cyber attackers are categorized according to who they target, what tactics they use and which techniques they employ. 1. The Hacktivist A hacktivist is politically-motivated and targets institutions that have opposing political beliefs.…

    • 807 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Fake ID, by Walter Sorrels is about a Sixteen year old, Chastity and her mother have been on the run since Chass was a baby, getting new identities in every town. She doesn't know why they are running, or who her father is, or even her real name. But then on the night of Chass sixteenth birthday, her mother disappears. The cops find her abandoned car, blood matching her DNA, and a purse containing six ID cards. Chass can't believe her mother is dead, she knows that her mom just had to go on the run again, this time to protect Chass.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Alan Turing’s Invention Of Bombe : Caused The Alteration Of The Modern Era and World War II Introduction In the mid-twentieth century war broke out once more, for it lead to misfortunes and bloodshed, until a certain man stepped into the battle to alter the outcome of war. The man’s name was Alan Turing, and his intellectual mind of computer technology gave a gift for the Allied Powers to counterattack Nazi Germany. With the help of the codebreaking machine Bombe it has done a big help on hacking into German communications of World War II.…

    • 1062 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    “The Revisionaries” is a 2012 documentary meant to provide a brief view of who makes the decision that affects the American curriculum and on what grounds they are made. In Austin, Texas, those in the board of education influence what is taught to the next generation of American children. The highly politicized Texas State Board of Education rewrites the education and textbook standards, once every decade. Don McLeroy, a dentist, Sunday school teacher, and young-earth creationist. After he briefly served on his local school board, McLeroy was then elected to the Texas State Board of Education and later appointed chairman.…

    • 1713 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Survival. What is survival? Survival is continuing to live or exist under adverse or unusual circumstances. When it comes to survival in the book there are two characters, Peter and Noa.…

    • 766 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Eastwood and Tyldum both show their main characters as stoic individuals, who survive against oppressive odds; in the belief that such characters are true national heroes in the eyes of the public. The texts explore this engaging phenomenon of surviving against all odds and their insistence on their innocence. In Eastwood’s Sully, it is the final NTSB hearing where Sully asserts his contention that the computer simulations ‘did not account for the human factor’; 35 seconds. In Tyldum’s…

    • 307 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Today’s modern technology has provided a new platform for activists to advance their cause in a public forum. According to the Oxford dictionary, “Hacktivism” is defined as the act of a computer hacker whose goal is to promote a social or political cause. Hacktivism is the modern online version of traditional protests, rallies, and marches. Hacktivism acts reflect the same historical acts of civil disobedience that occurred during the Civil Rights Movement. Civil disobedience is the refusal to obey a law that violates an individual right, it is a state of resistance.…

    • 143 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    He spent a large sum of time in his teenage years submerged in an online video game known as EVO. He uses his past to shed light on his belief that virtual theft is simply part of online games. In fact, Evo actually supported in-game theft (732) He was often the offender in these scenarios and states, “A few years ago, I could have been one of those pirates.” (733) He mentions many forms of his own thievery such as: fake investments, corporation thievery, pretending to be a girl in e-relationships, etc.…

    • 714 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    We live in a time where technology has become a huge requirement in our everyday lives. Everyone from preteens and even the elderly (old and old- old) seems to have their own smart phone, laptop, and even tablets. I think technology, including the internet is essentially good because it helps us communication, our education, navigation, and many other things that we need help with on a daily basis. If we compare and contrast the technology from twenty years ago and today, there are many things that have changed for the better.…

    • 1081 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    “History will not remember him as the little orphan but the computer genius who started it all” (Blumenthal…

    • 317 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    There is always something good that comes out of bad things. Such as failing a test and getting a good grade on the next one or climbing up a steep hill to see the view of the lake. In QB1 by Mike Lupica a major topic is that there is good after bad things. Jake and the other quarterback Casey hit the struggles. head on.…

    • 781 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    During the nineteenth and twentieth centuries, artistic interpretations of the west sparked westward movement of people. A nineteenth century painting by Albert Bierstadt named the Oregon Trail (1869) depicted the west as a serene wilderness providing hope and the promise of a fulfilling life. In contrast, the photograph Lakewood California by William Garrett (1950) and a painting by John Gast called American Progress (1872) shows a more industrialized view of the west. An article written by Joshua Johns named A Brief History of Nature and the American Consciousness also describes the influence of the industrial revolution in the artistic perception of the west. These artistic interpretations of the west influenced people’s perception of the…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Invasion of privacy is when personal information is being accessed nor a person being watched by surveillance. Cameras are placed anywhere like in stores, banks, restaurants, including public areas in which a person’s privacy is invaded. Surveillance in businesses are fine because they are meant for safety, but cameras in public areas, people might not feel countable because they are being watched. In the novel The Circle by Dave Eggers is about Mae works for the circle and she experiences how the company invades the workers and the entire society privacy. Employers medical records, personal information, their location and so on are accessible to anyone who works at the circle, furthermore; the people who work in the circle can be watched anyone in surveillance cameras.…

    • 1532 Words
    • 7 Pages
    Superior Essays