Essay On Hacktivism

Amazing Essays
As the internet’s ever expansive growth continues, the activity of hacktivist groups advances. Although hacktivists have been targeting different governmental websites and networks, their actions are an act of protest and civil disobedience. In addition, the idea of a hacktivist has become misconstrued by the deceived public. The idea of a hacktivism needs to be made more transparent and the actions of these hacktivist groups need to be made more clear and differed from cybercrime or cyberterrorism. Hacktivism is a way to foster change and protection in the modern world, by allowing those who find themselves without a voice able to speak and messages to be sent across the globe.
Hacktivism emerged with the birth of the internet and using computer viruses and worms as means to spread their messages. One of the first instances of early hacktivism was “Worms Against
…show more content…
A whistleblower is simply a person who exposes certain information that can be deemed illegal or questionable. The Eric Snowden story involved Snowden going into government computers and leaking information about the operations of the NSA. Why he decided to leak this information is because he deemed it necessary for the public to know what the NSA was doing without our knowledge. What this information contained was how the NSA was trying to monitor the phone calls, emails and other things of all Americans. Now what separates him and other whistleblowers from a hacktivist is that Snowden was not trying to protest anything, he simply thought that the public deserved to have this knowledge about what was going on behind their back. Hacktivists focus on protesting something that is going on or creating an effect to display the public’s distaste with a current event or something that is going on; however these hacktivist strikes can go too far. There are some groups who know where the step back needs to be

Related Documents

  • Decent Essays

    First of all , I blame the employes and the regular users about how they are uses the technology and have no idea about the hackers and the techniques have use it to convection to open the malware. Second there are a few of firewalls might prevent and against malware. But some victims do not care about how to be secure during use Internet. What is the ransomware ? and how to protect from it ?.…

    • 1452 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Mike Lynn: Whistleblower

    • 1252 Words
    • 6 Pages

    Cisco and ISS also had a responsibility to protect their own data and also the data of their clients to whom they provided cyber security. In future maybe the company would’ve changed its way without being exposed to lawsuits and hackers. Mike Lynn left them in a really bad situation as they had to change or modify their systems to avoid problems that were created by the leakage of company information. Mike Lynn may have done the right thing but it was still illegal and harmful to the company. It’s extremely illogical for a company to reveal its own secrets and flaws at a conference where they know it can hurt them very badly.…

    • 1252 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Essay On Cybersecurity

    • 1115 Words
    • 5 Pages

    “Anything that can connect to the Internet can be vulnerable to certain exploits, and that could end up helping someone get into a network or system and cause much data loss, as well as disruption of services that are provided by the group being affected the by ‘hacker’ (Cormier)”. Cybersecurity is used to stop the hackers, but it does not work all the time. “Thieves using computers can rob banks and steal corporate trade secrets from the other side of the world (Flamini 157).” They can take down government and business websites within minutes (Flamini 157). Cyberwarfare is becoming huge because the technology…

    • 1115 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    in danger and that he is not a hero. That percentage believes that Snowden broke the law and should face the consequences of his actions. According to the Huffington Post article with Bill Gates, some surveillance is beneficial; however, big name companies have worked with the NSA to collect information on people, most of the time without people knowing. During that time, Microsoft was one of those companies, and they got more criticism about it. Since that incident, Microsoft has been working to change user data and protect its customers more.…

    • 1076 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Hacktivism Analysis

    • 1372 Words
    • 6 Pages

    When a collective of society challenges the social norms by committing crime,such as these hacktivism groups. Their beliefs will help bring in the collective change. When you have people from all over the globe, fighting for cyber and social rights, it can potentially bring down a government. While many people take streets trying to protect the freedom for free information. Hacktivist are fighting a constant war against censorship laws, speaking from my own experience.…

    • 1372 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Impacts Of Hacktivisms

    • 1524 Words
    • 7 Pages

    The editor-in-chief of the website Julian Assange claims that the most “cost-effective” method to challenge widespread “governance by fear” is through a “worldwide movement of mass leaking (Curran, 2013).” These leaked documents are a necessity to those who are willing to pore over them to understand how government surveillance programs work. By understanding how these programs work, it becomes easier for citizens and corporations to protect themselves against needless invasions of privacy and spying. Having to scan through hundreds of leaked government documents is theoretically the first step in counteracting government surveillance; however, this cannot simply be done by every individual concerned with protecting his privacy. A simpler solution to this could be to use tools that can defend a user’s personal information and…

    • 1524 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    The loss of privacy has provided many companies to help the public keep their PII safe such as Lifelock a company invented by a former FBI identity theft agent. The usage of cryptography is a viable way to extract secret or confidential information in the case of US vs Snowden cryptography is how he was exposed as the source of this extraction of information, and the decrypting of this information allowed the US government to name him as the source which will in time become the information to convict him. The loss of privacy for the normal citizen has been comprised in this digital era, but the gain far outweighs what is…

    • 2226 Words
    • 9 Pages
    Decent Essays
  • Decent Essays

    Stephen Aftergood, director of Federation of American Scientists Project on Government Secrecy argues a common viewpoint about past government leaks and their impact on society: “It has invaded personal privacy. It has published libellous material. It has violated intellectual property rights. And above all, it has launched a sweeping attack not simply on corruption, but on secrecy itself. And I think that 's both a strategic and a tactical error” (Rutger) In contemporary society, the communications revolution has made it easier for the government to spy on its citizens and track down perceived enemies or leakers.…

    • 1742 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    1) What is the difference between a virus and other types of malicious code? A virus is a particular type of malicious program designed to duplicate itself and spread from system to system. Normally, viruses attach themselves to files that can be shared enabling the malicious code to access to new computers. Viruses that are more complex may take over your email client, mailing copies of themselves to the contacts for a faster, more effective transmission (Fritsch et al, 2015). Numerous virus contain a load designed to damage the system’s data, while others only spread without causing direct damage to their hosts.…

    • 1458 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Social Engineering Threats

    • 1514 Words
    • 7 Pages

    The vice president spoke with authority and used perfect French. However, the invoice was a fake and the vice president who called her was an attacker.” (Symantec, 2013) The purpose of this attack was to install a remote access Trojan (RAT) onto the computer of the administrative assistant. This RAT was used to log keystrokes, view the desktop, and browse files. With this information they can claim passwords, screenshots of emails, and remotely download sensitive information without the assistant knowing what was going on. According to Symantec, this kind of attack is highly unusual, using both email and a phone call with perfect French.…

    • 1514 Words
    • 7 Pages
    Decent Essays