Anonymous, also known as Anons, are a collaborative being of hacktivists in the digital world also known as the internet. Hacktivists operate much like the activists in the real world, but instead of protesting physically they protest digitally. Anonymous’ work is considered to be extremely controversial by a number of people. This is mostly due to their infamous nature of broadcasting private information of those who slipped through the justice system. They have been described as vigilantes both by the people that want to rid of them and by those who praise them. The question remains, is vigilante a fitting term for this unorthodox group of internet rebels.
There are multiple ways of attacking, or hacking a website, and Anonymous uses multiple forms of it to keep the Feds off of their trail. Anonymous uses these copious amounts of attacks to penetrate a systems hard drive, and they either steal information or crash the memory of the computers. Sometimes, the hackers will use password-cracking software that are run from all the computers of Anonymous members and wreak havoc on the computer’s system they want to hack. Then, an easy password will come back to them and they have the tools to crack into a company’s website they want. Also, fake e-mails can be sent to legitimate users who could then accidentally click on a link that can enable hackers to install spyware into a computer to have access to valuable information. This is just one method most hackers use, and due to Anonymous’ sheer numbers, they have the ability to successfully hack with these more complex methods. In some cases, Anonymous convinces people in high up chains of targeted companies. Anonymous hackers have also been known to blackmail and/or pay off people who they wish to obtain secrets from. These techniques require a lot of people and a lot of resources, which is why only organizations like Anonymous are capable of pulling these tactics off. It also requires leaders within the chain, which is why Anonymous is such an interesting organization. There are no leaders, just people who step up to lead certain ops. This is how some Anonymous members have been caught, leading the charge of a certain op, and yet they still claim they have no true leadership structure. As a result, operational leadership may shift from project to project to keep the cops off of their trail, said a hacker, “pLInterFY” on a webchat. Decision making on who the next target should be, which organization to hack, or discussions about the pros and cons of hacking a certain organization are done via an internet website. Messages can be sent and received from each of the hackers computers, while keeping their identity disclosed, and this gives Anonymous another edge against the people attempting to stop them. Announcements can then be made through Anonymous accounts on Twitter, Facebook, or through a video on Youtube. Also, their website is a spot that Anonymous members can find who th next target is, why they are being targeted, or suggest a new target.
In 2003, a group primarily focused on personal entertainment began using their knowledge to “hack” into computers, posting images and messages on the monitors of unsuspecting internet users. The term hacktivist is a blend of hack as in unauthorized computer access and an activist. A Hacktivist is “a person who changes or manipulates information on the internet in order to convey a political message”. “Hacktivist,” Macmillian Dictionary, n.d., Wed. 28 Feb. 2014, online. In 2008, the group of practical jokers would become the activist group Anonymous, donning masks of Guy Fawkes a 1600 activist who perished while attempting to murder King James I. The group coordinates its efforts, protesting various organizations, agencies, governments, and the like regarding different issues around the world. Occasionally and with increasing frequency, the cumulative efforts of Anonymous’ online efforts result in the group publically gathering in protest. What would be the impact hacktivists (Anonymous), could amass considering their ability to “hack” web sites of other movements whose agenda clashes with their own?
According to Gabriella Coleman (2012), “Anonymous” began on the internet forum 4chan, and grew from the culture on that site (paragraph 1). 4chan (n.d.) describes itself as “...[A] simple image-based bulletin board where anyone can post comments and share images.” (What is 4chan? section, para. 1) The site notes that the name “Anonymous” came from the moniker used to identify posters that did not choose to register an identity for posts on the site (Who is “Anonymous”? section, para. 1).
Please note that the tribute was posted on MIT’s external website the day following Aaron Swartz’s death. Anonymous therefore hacked the world’s most prestigious technological institutes within a day of Aaron Swartz’s death. Additionally they were able to control a government webs...
I always believed that hacking was a bad thing done by malicious people. I now realize that thought there are bad hackers, many hackers follow an ethical code when acquiring information and deciding what to make of it. I have been able to pursue a lot of information largely in part because of hackers. As Cross says, “academic freedom should be restricted only as an absolute last resort, not as the fundamental basis of our national strategies for security and technological development in the 21st century” (Cross, 40) and after reading this article, I have both a new definition and appreciation for the term
15. Jansen, R., Tschorsch, F., Johnson, A., & Scheuermann, B. (n.d.). The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network. http://www.robgjansen.com/. Retrieved April 21, 2014, from http://www.robgjansen.com/publications/sniper-ndss2014.pdf
Hacking was a term established in the 1960s. This word is the concept of unauthorised intrusion of a computer or network with malicious intentions behind them. This includes any technical effort of manipulating or damaging the normal behaviour of network connections/systems or stealing information. In this generation, hacking has become evidently significant and the debate of hacking being considered ethical or unethical arises. Therefore, will hacking ever be justified? The justification (reasonableness) of hacking has become a disputation of mixed opinions and emotions amongst society. These opinions range from hacking being considered immoral due to it being illegal activity and the vast negative impact it has on people. This includes the affirmative opinions on hacking; such as hacking being considered ethical due to the “white hat” hackers.
In chapter six of the text it explained the hacker code of ethics and the issues associated with it. An ethical hacker is defined as a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for finding security vulnerabilities that malicious hackers could infiltrate. American journalist Steven Levy established six principals for hacker code of ethics. The six principal are limited computer access, free use of information, mistrusted- authority, examination of hacker, creation, and support in life for advancement. These principal has been controversial to many based on personal moral. As for creating appropriate set of guidelines for non-malicious hackers without becoming
Many people through out the world use the internet in way you can’t imagine. Hacktivism being a virtual way to make a statement for the world to see is only the beginning. A recent demonstration of hacktivism followed the death of a Chinese airman when his jet fighter collided with a U.S. surveillance plane in April 2001. Chinese and American hacktivist from both countries hacked Web sites and used them as "blackboards" for their statements. This is only an example of what hacktivist are capable of. This in my opinion is not ethical. I do understand they are making a point but the way to make the point is all wrong.