What Is Hacktivism?

Improved Essays
In this week’s lecture, professor Rosenzweig explained who hacktivists are, what they do, and why they exist. He provided numerous examples of hacktivist groups along with a history of their development and the objectives, they have and have not achieved, and why. In the end, he stated a thought provoking statement by comparing individuals and large corporations that play a significant role around the globe as hacktivists and how they are viewed in the eyes of the law. Hacktivism is a term to describe hackers who are political activists, cyber insurgents, and criminal mischief makers with a goal to stage a protest. They use computers in order to deliver their messages as well as attacks. A few of the examples of hacktivists that the professor

Related Documents

  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    Cybercriminals are people who carry out cybercrimes utilizing the web, a PC and the system to execute violations. 6. What sorts of Hackers are there? White-cap programmers: hacks to test your framework unprotected against demonstrate a point Dark cap programmers: hacks your framework to for illicit purposes Dim cap programmers: hacks for the sake of entertainment and to flaunt yet will offer their administrations 7.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The issues relating to the discerning use of technology has continually caused the attitude and perceptions to the social and ethical considerations of the use of technology. Stereotypically shown in the movie Die Hard 4.0, the unethical use of technology (Hacking/cracking) and other techniques was frequently used to achieve and set the tone of the movie. Unethically used by the main antagonist of the film “Thomas Gabriel” Used these techniques to create a “fire sale” which is broken down into 3 stages. To take out the transport networks, then utilities such as electricity and the water grid. Finally, to infiltrate secure financial records to gain a monetary boost to the attacker from the so called “fire sale” This example demonstrates how…

    • 208 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Throughout the insightful article, The Criminal Indictment That Could Finally Hit Spyware Makers Hard, written by Kim Zetter refers to incidents and consequences of on-line threats. This article displays the legal case against Hammad Akbar, CEO of the firm InvoCode designed StealthGenie, a spy app for Android phones, iPhones and Blackberry devices (Zetter 1). Within the beginning portion of the article, Zetter explains how the cellular device app had the capability to “secretly record phone calls and siphoned text messages and other data from a target’s phone, all of which customers of the software could view online” (Zetter 1). Not only did the threat of having phone calls and text message privacy invaded, the threat of the app also “allowed…

    • 442 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Hactivism as a process has a dual-edged character. The organised activity exposes the “transparency and accountability” (Diamond 71) of global power exploitation. However, such methods are seen questionable in the accountability and transparency of their practice(s). The main concern with hactivism is the preconceived notions of its values are translated offline as vigilantism. However, the whole concept of vigilantism is based on the idea of not condoning individual action to exercise authority if there is an immediate presence enforcing it.…

    • 609 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Why Is Aaron Swartz Unfair

    • 1317 Words
    • 6 Pages

    Thai Thompson Professor MacLennan English 101 28 October 2014 United States of America v. Aaron Swartz Unjust laws exist; shall we be content to obey them, or shall we endeavor to amend them and obey them until we have succeeded, or shall we transgress them at once? ―Henry David Thoreau Brian Knappenberger, documentarian of The Internet's Own Boy, opens his documentary on Aaron Swartz with this quote by Henry David Thoreau. Brian Knappenberger uses this quote and dramatic sound effects to demonstrate that in our world there are people who obey unjust laws, attempt to obey them until they succeed, and then there is Aaron Swartz someone who transgresses unjust laws immediately.…

    • 1317 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    Explain some cases in which you would perm-ban/temp-ban people: Spamming Chat Spamming in chat is saying the same word or any other different word 3 times without waiting atleast 1 second. The punishment is a warn then if the player does it the second time it is a mute! /warn , /ban Suspicious Links / IP-Loggers: Posting any links in chat that is none opcrat related could get you banned permanently for Suspicious links or IP-Loggers.…

    • 534 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Logan Laplante is not your typical 13-year-old boy, but one whose experiences and intelligence exceeds those of the average child. He recited his “Hackschooling Makes Me Happy” speech at TedX at the University of Nevada back in 2013. Although his primary audience is those who attended TedX, the many others who saw his speech online were drawn in as well. The purpose of this speech is to convince adults, teachers, mentors, educators, and many more that kids should be taught to be happy, healthy, and have a hacker mindset. The effectiveness of LaPlante’s speech to convince his audience to try hackschooling rather than traditional schooling is credited mainly to his primary rhetorical strategies: ethos, pathos, and logos.…

    • 928 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Marisa Bugarin Professor Bivona ENG 102 3:00-4:15 3/16/15 Annotated Bibliography Annotated Bibliography 1) Chemaly, Soraya. " A Million Peeping Toms: When Hacking Is Also A Hate Crime." Time. Com (2014): 1.…

    • 1953 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    An online drop-box where whistleblowers could anonymously share classified documents. It takes an unconventional mind to imagine and create an organisation like WikiLeaks. Most certainly, Julian Assange, its founder, is one particular character. The Australian-born has been described as a “criminal endangering both governments and individuals and by others a hero devoted to revealing vital hidden truths.” His paranoïa and predominant interest in conspiracies towards controlled information led him to be drawn into the art of hacking.…

    • 284 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    ” Anonymous effectively is working towards liberal democracy that security researcher, Ronald J. Deibert, writes about. Through Anonymous’ asymmetric warfare attacks and the inherent nature of the Internet, individuals and groups can combine forces to carry out attacks that is disproportionate to their numbers . Anonymous makes a clear statement about why you should join them in their fight for Internet freedom – free access to the Internet will prompt a societal mind shift that allows individuals to manage personal affairs, grow and develop without fear of…

    • 849 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Forms Of Digital Crime

    • 547 Words
    • 3 Pages

    The question is, “How we control to how far the next hacker goes and for what reason. This is why to media will be an eternal source for this subculture. The federal government has done a good job with catching there ethical hacker and turning them into White Hats for the great good of the country, but there still a lot of them out…

    • 547 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Security Analyst Issues

    • 1281 Words
    • 6 Pages

    You’re sitting at your desk. Typing furiously. Trying to crack a password so you can gain access to that network you’ve been sniffing all day. You’ve tried every command you know and you think you finally found a way in. This is it your about to gain access when suddenly your boss walks over and tells you funding’s been cut and your internal penetration test has been canceled.…

    • 1281 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    What Is Normative Order?

    • 213 Words
    • 1 Pages

    Holt demonstrates how hackers impact differentially in virtual versus real experience by using the concept of “Normative Order”, in which is a “set of generalized rules and common practices oriented around a common value”. The normative order is divided into five terms, which are technology, knowledge, commitment, categorization and law. Technology which is one of the five normative order explains that “The more time hackers spent familiarizing themselves with technology, the more their skill level increase”. Indicating that due to hackers spending a large amount of time using technology, they discover new things for the society which in this case wardriving, Wifi and robotics challenges, which demonstrates how important technology is in…

    • 213 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Introduction When it comes to digital crimes, various methods are used to commit such acts. These include: Hacking, malicious software as well as cyber stalking, to name a few takes place day in and day out. The names that are attached to these crimes in fact explains the what and now, the why has to be explained. In this body of work however, it will be discussed theories surrounding digital crimes. Space Transition Theory and Social Learning Theory will provide detail and insight as to the why factor: why was the crime committed, the rationale of the response, how it relates to crime in general.…

    • 795 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Social Engineering Attack

    • 467 Words
    • 2 Pages

    My Topic for the Lesson 8 Presentation The topic I have chosen for my presentation is, “Preventing Social Engineering Attacks.” A social engineering attack is one of the most powerful weapons used to steal people’s passwords, credit cards, and personal data. It takes advantage of the fact that the biggest vulnerability of any security system is the users themselves. Social Engineering uses psychological tricks in order to get users to volunteer their personal information.…

    • 467 Words
    • 2 Pages
    Decent Essays