Essay On Hacktivism

Great Essays
As the internet’s ever expansive growth continues, the activity of hacktivist groups advances. Although hacktivists have been targeting different governmental websites and networks, their actions are an act of protest and civil disobedience. In addition, the idea of a hacktivist has become misconstrued by the deceived public. The idea of a hacktivism needs to be made more transparent and the actions of these hacktivist groups need to be made more clear and differed from cybercrime or cyberterrorism. Hacktivism is a way to foster change and protection in the modern world, by allowing those who find themselves without a voice able to speak and messages to be sent across the globe.
Hacktivism emerged with the birth of the internet and using computer viruses and worms as means to spread their messages. One of the first instances of early hacktivism was “Worms Against
…show more content…
A whistleblower is simply a person who exposes certain information that can be deemed illegal or questionable. The Eric Snowden story involved Snowden going into government computers and leaking information about the operations of the NSA. Why he decided to leak this information is because he deemed it necessary for the public to know what the NSA was doing without our knowledge. What this information contained was how the NSA was trying to monitor the phone calls, emails and other things of all Americans. Now what separates him and other whistleblowers from a hacktivist is that Snowden was not trying to protest anything, he simply thought that the public deserved to have this knowledge about what was going on behind their back. Hacktivists focus on protesting something that is going on or creating an effect to display the public’s distaste with a current event or something that is going on; however these hacktivist strikes can go too far. There are some groups who know where the step back needs to be

Related Documents

  • Improved Essays

    Figure 6 shows Internal Security settings that were not set as high as they might have been to aide in threats that require a human response. Lesson 7: Invest in good technological defenses, but do not under invest in people who will be operating this equipment. Another, related lesson learned here is the need to strive to be excellent, rather than average. This stems from the view that we had taken during many simulation results that we were still doing "pretty good" when looked at in the context of all sectors taken together.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Hactivism as a process has a dual-edged character. The organised activity exposes the “transparency and accountability” (Diamond 71) of global power exploitation. However, such methods are seen questionable in the accountability and transparency of their practice(s). The main concern with hactivism is the preconceived notions of its values are translated offline as vigilantism. However, the whole concept of vigilantism is based on the idea of not condoning individual action to exercise authority if there is an immediate presence enforcing it.…

    • 609 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Moreover, if a hacker attains a patient’s record and adds false information to it, the risk of a medical complication increases. Categorizing Cyber Attackers Cyber attackers are categorized according to who they target, what tactics they use and which techniques they employ. 1. The Hacktivist A hacktivist is politically-motivated and targets institutions that have opposing political beliefs.…

    • 807 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Great Essays

    Anonymous Court Case Study

    • 1946 Words
    • 8 Pages

    Not long ago it would have been unimaginable that a group of random people working remotely from anywhere in the world would be able to band together to electronically fight common enemies. However, recently a hacktivist group identifying as Anonymous has risen in power and size with the goal of fighting anyone they deem threatening to innocent people. Their operations and tactics range from gathering and leaking sensitive and/or restricted information from large corporations, to hacking Google Search in order to produce skewed (and negative) results when people searched topics related to their enemies. This type of hacktivist group is a relatively new idea and there is no set precedent for how the American government should deal with such…

    • 1946 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    In the article “Internet Trolls” by Lisa Selin Davis, she talks about people who spread negativity on the internet. According to her article, people leave nasty comments on the internet because they feel like they are alone and can hide behind the computer. Also, they want to get a reaction out of people and gain attention, so they say harsh, hurtful comments. She believes people don’t think before they type. These “trolls” can be categorized into many different groups including: hackers, catfishers, and cyberbullies.…

    • 644 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    ” Anonymous effectively is working towards liberal democracy that security researcher, Ronald J. Deibert, writes about. Through Anonymous’ asymmetric warfare attacks and the inherent nature of the Internet, individuals and groups can combine forces to carry out attacks that is disproportionate to their numbers . Anonymous makes a clear statement about why you should join them in their fight for Internet freedom – free access to the Internet will prompt a societal mind shift that allows individuals to manage personal affairs, grow and develop without fear of…

    • 849 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65).…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Meliorism On The Internet

    • 712 Words
    • 3 Pages

    The internet is a tool that everyone uses. On the internet, there are many different platforms that ask people to take part, like, share, or donate to different causes in the world. People take different approaches when it comes to protesting. Many people would like a page for the cause, while others go out and protest for the same cause. Schuler in “It’s time to work for a better internet” argues that people lack the real human effort it takes to stand up for a cause due to the lack of human ties to a cause.…

    • 712 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Anonymouss Are Ethical

    • 871 Words
    • 4 Pages

    In this paper, I will argue that the group Anonymous aren’t criminals and their actions are ethical. I will argue that this thesis is true from the utilitarianism view; they are hacking for the good of the people. Some examples I will include are Project Chanology, Hal Turner, and Operation DarkNet. I will also consider the opposing position that Anonymous are bad and unethical. I will argue that it is mistaken because of misknowledge of the operations and what Anonymous’ purpose is.…

    • 871 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Explain some cases in which you would perm-ban/temp-ban people: Spamming Chat Spamming in chat is saying the same word or any other different word 3 times without waiting atleast 1 second. The punishment is a warn then if the player does it the second time it is a mute! /warn , /ban Suspicious Links / IP-Loggers: Posting any links in chat that is none opcrat related could get you banned permanently for Suspicious links or IP-Loggers.…

    • 534 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Hackers/Crooks have put hard working people in hardship by ruining their credit causing them to be unable to buy a home or even getting hired on at a job. They have been known to steal credit card numbers from websites, breaking into homes or digging into the trash to retrieve personal information, and an employee you work with that takes a look at your personal file(Federal Trade, National and State, Consumer Sentinel, 2013).Though the internet is one of the main ways identities are stolen, they will pick-pocket you, steal your mail right out of the box, your tax information, and even obtaining medical services(Cassim, 2015).…

    • 105 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    Today’s modern technology has provided a new platform for activists to advance their cause in a public forum. According to the Oxford dictionary, “Hacktivism” is defined as the act of a computer hacker whose goal is to promote a social or political cause. Hacktivism is the modern online version of traditional protests, rallies, and marches. Hacktivism acts reflect the same historical acts of civil disobedience that occurred during the Civil Rights Movement. Civil disobedience is the refusal to obey a law that violates an individual right, it is a state of resistance.…

    • 143 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Over the years internet hacking has become more and more popular for tech savvy users on social media. This coupled with the fact that the tools used for hacking are easily accessible and easy to use create a recipe for disaster, at least for big companies that got in the way of a group known as Anonymous. Anonymous is an internet hacking group or hacktivist group depending on how one would look at it. They are best known for their attacks on the Church of Scientology, Westboro Baptist Church, and their affiliation with wikileaks. The attacks done by this group have been so widely recognized that they were even covered on multiple news outlets such as FOX and the BBC.…

    • 1976 Words
    • 8 Pages
    Superior Essays
  • Decent Essays

    The term “Hacking” came around when two men (Steve Gold and fellow journalist Robert Schifreen) were convicted for forgery under the Act of Forgery and Counterfeiting of 1981. Also these two attackers gain access to the British Telecom Prestel account and got access to all of the Identification numbers of Customers. However, messages were left in the Duke of Edinburgh (Prince Phillip) private mailbox. They weren’t intentionally attempting to gain anything. They were both charged with this offence but in interest today, because of the obvious wrongness for distributing sufficiently with the attacker.…

    • 323 Words
    • 2 Pages
    Decent Essays