Though the phrase “hacker” has been popularized over the last twenty years largely due to corporate data breaches and pop-culture references, most people outside the security community are unaware that the term does not accurately describe all types of cyber adversaries. There are different classes of hackers, most often differentiated by skill level and motivations for placing attacks. A more correct label for identifying Internet activists performing malicious actions such as those associated with the WikiLeaks movement is “hacktivists”.
Hacktivists are hackers specifically motivated to attack technological systems or organizations as a result of differing viewpoints on social or political issues (US Army, 2005, p. 37). Though most hacktivist driven cyber-attacks take form through digital vandalism or simple webpage defacement, more extreme incidents have involved large-scale distributed denial of service (DDoS) attacks knocking target organizations offline for extended periods of time. One of the most popular and well-developed hacktivist organizations is called “Anonymous”.
Anonymous was recently popularized in the mainstream media after it placed several DDoS attacks on Egyptian government resources after the nation’s leaders blocked Twitter access to pro-democracy protestors back in January (Wagenseil, 2011). The hacktivists of Anonymous also defended Wikileaks by attacking organizations such as MasterCard and PayPal after the financial institutions prohibited monetary contributions from the public to the revolutionary wiki site. (Mills, 2011). More recently, Anonymous has set its sights on the Iranian government through “Operation Iran”. The effort is currently targeting critical Iranian resources with DDoS ...
... middle of paper ...
...tacks against WikiLeaks foes. PC Magazine. Retrieved May 2, 2011, from http://www.pcmag.com/article2/0,2817,2374023,00.asp
Mills, E. (2011, April 29). Anonymous to target Iran with DoS. CNET News. Retrieved May 2, 2011, from news.cnet.com/8301-27080_3-20058700-245.html
Pfleeger, C., & Pfleeger, S. (2006). Security in computing. Upper Saddle River, NJ: Pearson Education, Inc.
US Army Training and Doctrine Command. (2005, August 15). Cyber Operations and Cyber Terrorism, Handbook No. 1.02. DCSINT Handbook. Fort Leavenworth, Kansas
Vacca, J. R. (2009). Computer and information security handbook. Burlington, MA: Morgan
Wagenseil, P. (2011, January 26). Anonymous ‘hacktivists’ attack Egyptian websites - Technology & science - Security - msnbc.com. MSNBC. Retrieved May 2, 2011, from http://www.msnbc.msn.com/id/41280813/ns/technology_and_science-security/
In this essay, the author
Explains that the term "hacker" is popularized due to corporate data breaches and pop-culture references, but most people outside the security community are unaware that it does not accurately describe all types of cyber adversaries.
Explains hacktivists are hackers specifically motivated to attack technological systems or organizations as a result of differing viewpoints on social or political issues.
Explains that anonymous was popularized in the mainstream media after it placed several ddos attacks on egyptian government resources after the nation’s leaders blocked twitter access to pro-democracy protestors back in january.
Compares hacktivists to traditional hackers in that both use similar toolkits and attack mechanisms to subvert their opponents’ technological systems. traditional hackers are often motivated by earning fame or money for placing successful attacks on highly visible organizations.
Explains that mastercard and paypal were both targeted by the hacktivist organization anonymous during "operation payback". both organizations' websites were targeted with ddos attacks due to preventing wikileaks from receiving donations or making credit card charges.
Explains that intrusion detection systems are devices that detect rogue, malicious, or suspicious behavior on a network or system, and notify system administrators to take preventative action.
Explains that intrusion detection systems follow one of two scanning mechanisms: signature based or anomaly-based, similar to how anti-virus applications scan a computer for malware or network traffic for known attack patterns.
Explains that firewalls are physical network devices or software applications that can filter traffic between systems or networks. they are effective at blocking specific types of traffic from reaching a network.
Explains load balancers monitor incoming traffic to an organization's resources, and can redirect volume to other systems within a cluster if certain assets are being utilized too heavily.
Explains the use of proxy servers and network address translation to hide internal network components to outsiders, making it more difficult for hackers to plan attacks.
Argues that non-technical solutions aimed at preventing network attacks start with a strong security policy, coupled with internal programs promoting employee security awareness. corporate policies should be comprehensive in identifying acceptable uses of technology, password management, anti-virus and antimalware scans, default system configuration, auditing, data back-up policies, and effective incident handling procedures.
Explains that a strong incident handling procedure is paramount to limiting the adverse reactions of an attack. it includes preparation, identification, containment, eradication, recovery and lessons learned.
Explains that the first phase of incident handling is "preparation", where administrators prepare critical documentation and procedures in the event of a security incident.
Explains the second phase of the incident handling process, which focuses on administrators identifying that a security incident has occurred after significant events have been gathered and analyzed.
Opines that administrators should contain a ddos attack on corporate web servers by temporarily reducing the maximum number of connection requests to prevent the network from completely failing, and allowing for forensic analysis to identify the attacker.
Advises administrators to eradicate any sign of the attack from internal systems. in the case of an attack on a corporate website, administrators may reconfigure firewalls to prevent specific types of malicious traffic.
Explains that the recovery phase focuses on restoring network resources to a “normal” state, similar to that which existed prior to the attack.
Explains the "lessons learned" phase of the incident handling process, where administrators document vulnerabilities with current systems or processes, and develop solutions to better secure assets moving forward.
Explains that 'anonymous' launches ddos attacks against wikileaks foes. pc magazine.
Cites pfleeger, c., et al. (2006). security in computing.
Although an act of cyberterrorism has yet to occur, officials and scholars continuously study the possibilities of such an attack. As our physical and virtual worlds continue to intertwine the risk of such an event rapidly increases. Everything from our transportation systems to pharmaceutical manufacturing are computer controlled. The closest the world has come to an act of cyberterrorism was in 2000. Known as the Maroochy Shire case in Queensland, Australia was committed by Vitek Boden. Boden was an engineer for Pacific Paradise, a sewage pumping in Australia. He was able to successful hack into a control system modifying the operations and dumping millions of litres of raw sewage into the local waterways. Boden’s motivation was the only reason the act was not classified as cyberterrorism was his motivation. It was personal rather than political or religious in nature (Sharp Parker, 2009). The only reason this wasn’t the first act of cyberterrorism was motivation. As companies invest in upgrading their technological capabilities, they too need to invest in security structure to protect their systems and the public from threats of terrorism. Our government must also decide how to address public safety in regards to cyberterrorism. On September 11th, 2001 America was reminded how vulnerable we are when it comes to acts of terrorism. The sheer complexity and varying design of attacks often makes it very difficult to create a catch-all defense in fighting terrorism. To improve the disruption of terrorist activities by government agencies in the United States many laws needed to be updated to include the latest areas of electronic communications.
In this essay, the author
Analyzes how the maroochy shire case in queensland, australia, was committed by vitek boden, an engineer for pacific paradise.
States that the usa patriot act was passed in response to the attack on the world trade center in new york city.
Explains that the usa patriot act allows agents to survey the actual suspect rather than independent forms of communication.
Explains how the usa patriot act modernized the investigative abilities of federal agencies to protect the american public from terrorism.
Cites the 107th congress, the department of justice, and the federation of american scientists.
With so many dangers that confront the United States, it is impossible to know all type of attacks that can happen in the cyber world. There can be combinations of not only known but also unknown vulnerabilities and attacks that makes it hard for the United States to protect its self and there classified information. “We face nation states, terrorist networks, organized criminal groups, individuals, and other cyber actors with varying combinations of a...
In this essay, the author
Explains that cybercrime has made a huge impact on how the world is run today. it involves stealing, destroying or using information that is gathered illegally from public and private sectors and being able to use maliciously.
Opines that it is impossible to know all types of attacks that can happen in the cyber world. terrorist groups and sympathizers have expressed interest in using cyber means to target the united states.
Explains that the number of cyber-attacks in 2012 was 102 attacks per week, and in 2013 was around 122 attacks. the amount of money that goes into cyber preventions is expensive.
Explains the steps taken to prevent cyber-crimes, such as the cnci, which was created by george w bush in 2008.
Analyzes how target's recent attack shows that no one is safe from cyber-attacks. target has one of the best security information groups in retails, and having this breach happen is not only mind blowing but also an eye opener.
Explains that hackers and cyber criminals have been around since computers were created. they have taken advantage of the internet epidemic by violating and exploiting their way into peoples personal information from abroad and also in the united states.
In 2008, this organization invaded a religious organization’s website which is called Church of Scientology. Anonymous organization has thousands of members. Those members were divided into dozens of people in each small group, they responded to various events. Anons had been doing this because the Church of Scientology’s reaction to Anonymous, they were calling Anonymous cyber-terrorists, KKK members, religion bigots, Fascists, Nazis and communists in a press release. Anonymous was hacking this just for ...
In this essay, the author
Opines that hacktivists are good or bad, but what about the purpose of hacking?
Explains that anonymous is an international hacktivist organization. the symbol of this organization is "man without a head".
Explains how anonymous invaded a religious organization's website called church of scientology in 2008, calling anonymous cyber-terrorists, kkk members, religion bigots and nazis.
Explains that anonymous had captured and shut down a underground pedophile website called lolita city, which had more than 100g of porn data.
Explains how anons attacked companies that no longer had cooperation with wiki leaks. paypal said that their attack just made the payment rate slow down.
Analyzes how the anons invaded the official news website of north korea and uploaded the photos that vilified kim jong-un.
Explains how the anons invaded philippine websites and asked the philippines to apologize for their coast guard shooting of taiwan fishermen.
Opines that the hacktivists anonymous have done are ethical, although hacking is illegal. they hack to make the society better.
McGuffin, Chris, and Paul Mitchell. “On domains: cyber and the practice of warfare.” International Journal 69.3 (2014): 394+. Academic OneFile. Web. 5 Oct. 2015.
In this essay, the author
Explains how warfare has evolved from fighting with sticks and stones to using gunpowder and launching missiles. the newest, and possibly most destructive, type of warfare is cyber warfare.
Explains that cyberspace is a massive land of ever changing technology and personal interaction. advanced countries use computers to guide their military, keep track of citizens, run their power grids, and hold plans for nuclear devices.
Explains that cyber warfare is used to achieve political objectives, cyber espionage and exploitation, and cyber-attacks on physical infrastructure.
Explains that anonymous is a hacking group that acts against abuses of power such as large corporations. china has been accused of hacked into government files.
Explains that cyberspace is a mysterious realm of unknown people and unknown intentions. it needs extra defense due to the amount of classified information that is stored online.
Explains that snowden's leaks about nsa global surveillance programs have provided a glimpse into the ever-broadening scope of cyber power.
Explains that warfare is always evolving and everyone wants the new and more powerful weapon. cyber warfare has the possibility to be more destructive than nuclear war.
Analyzes crowther, g. alexander, and shaheen ghori's "detangling the web: a screenshot of u.s. government cyber activity." joint force quarterly july 2015.
Describes mcguffin, chris, and paul mitchell's article, "on domains: cyber and the practice of warfare."
Opines that olender, michael, keeping pace with cyber power, defense, and warfare. journal of international and global studies 6.2 (2015): 55+.
Analyzes thomas, teka. cyber defense: who's in charge? national defense july 2015: 21+.
The hacktivist group Anonymous has initiated countless operations for similar reasons in the past. In January of 2015, Anonymous declared war on Islamic State hackers after a terrorist attack struck sattirical newspaper Charlie Hebdo in
In this essay, the author
Reports that the notorious hacktivist group anonymous attacked national police websites in canada, following vows to retaliate for the unlawful shooting of a man in "guy fawkes mask" in british columbia.
Analyzes how anonymous's "anonymous operation anondown" video, which went viral, speaks on seeking revenge for the killing of the masked protester who was shot outside of fixx restaurant in dawson creek.
Opines that anonymous calls upon the global collective of anonymous to remove the rcmp cyber infrastructure from the internet.
Explains that investigators spotted a protester wearing the guy fawks mask, but could not identify who the man was. however, police insisted that he was carrying knife.
Reports that police arrived at the scene and saw a man who they thought was responsible for the property damage.
Explains that anonymous took to twitter to publicize its new operation, aimed at canadian police.
Explains that the hacktivist group anonymous has initiated countless operations for similar reasons in the past. in january 2015, anonymous declared war on islamic state hackers after a terrorist attack struck sattirical newspaper charlie hebdo in france.
One of the major reactions to the Boston marathon bombing occurred on the internet. Social media was especially rife with speculation over who the bombers were and why they committed those acts. One of the greater spectres that has loomed over the social media landscape in the past few years is the group called “Anonymous.” While the social media reaction to the Boston bombings might be unrelated to “Anonymous,” and instead constitute a spontaneous reaction to the event, it might still be useful to look at this group of internet users as a model for how social media participants might behave. “Anonymous” is known for being a loose association of unidentified individuals who use internet technology to carry out hacks on the web in the name of protest.
In this essay, the author
Analyzes the social media reaction to the boston marathon bombings, which was unrelated to "anonymous," but it might be useful to look at this group of internet users as a model for how they might behave.
Explains that the name "anonymous" originated on the internet forum 4chan, and grew from the culture on that site.
Analyzes how phillip serracino-inglott's paper, "is it ok to be an anonymous?" explores the organization of anonymous.
Explains that anonymous uses various means of organizing activities through the internet, such as twitter, irc, and a site called "pastebin." bittorrent peer-to-peer file sharing protocol is used for sharing larger files.
Explains that anonymous has several preferred methods of attacking sites, organizations, and individuals they disagree with, both on the internet and in real life.
Analyzes how anonymous has been involved with various internet protests, the first of which was about scientology.
Describes how anonymous came to support wikileaks after receiving confidential us diplomatic cables. mastercard, visa, and paypal all caved in to us government pressure and ceased donations to the non-profit.
Argues that anonymous is worth mentioning as a demonstration of how vigilantes might behave on the internet.
In 2003, a group primarily focused on personal entertainment began using their knowledge to “hack” into computers, posting images and messages on the monitors of unsuspecting internet users. The term hacktivist is a blend of hack as in unauthorized computer access and an activist. A Hacktivist is “a person who changes or manipulates information on the internet in order to convey a political message”. “Hacktivist,” Macmillian Dictionary, n.d., Wed. 28 Feb. 2014, online. In 2008, the group of practical jokers would become the activist group Anonymous, donning masks of Guy Fawkes a 1600 activist who perished while attempting to murder King James I. The group coordinates its efforts, protesting various organizations, agencies, governments, and the like regarding different issues around the world. Occasionally and with increasing frequency, the cumulative efforts of Anonymous’ online efforts result in the group publically gathering in protest. What would be the impact hacktivists (Anonymous), could amass considering their ability to “hack” web sites of other movements whose agenda clashes with their own?
In this essay, the author
Argues that all movements begin with insurrection and disobedience putting us at odds with certain aspects of society.
Explains that the occupy wall street demonstration originated out of the 99 percent movement in 2010.
Analyzes how digital activism presents the individual with the illusion they have actively participated in aiding a good cause or movement. activists' digital campaigns can be cute and inspiring yet do nothing that, in fact, helps the cause they attempt to promote.
Analyzes how the red shirt friday campaign promotes the sale of "support our troops" red shirts, which donate a percentage of the proceeds to various veterans programs.
Analyzes how support negatively affects charities and organizations in need of physical volunteers and real financial support. armchair activists view themselves as morally upright.
States that conovere md, ferrara e. menczer f, flammini a (2013) the digital evolution of occupy wall.
Analyzes mclaughlin's program in political and social thought at the university of virginia.
Explains the difference between activism and clicktivism, which is a blend of hack as in unauthorized computer access and an activist
Argues that real social change can only be successful with actively engaged human beings. the group anonymous encourages both internet activity and the physical participation of its members in demonstrations worldwide.
Introduces richard d. alexander, the biology of moral systems, hawthorne, n.y., a. de gruyter, 1987.
Explains the real role of anonymous in occupy wall street. clicktavists.com is a website for clicktivist creating links to various organizations and movements worldwide.
Explains the definition of "hacktivist" in macmillan dictionary. kensington, lindsey, and kathryn stam. "journal of human rights practice."
Hacking has historically been associated with shady behavior or criminal connotations. It is very rare that a person condones hacking or thinks of it as anything other than a crime. However, in his article “Academic Freedom and the Hacker Ethic”, Tom Cross challenges us to redefine a hacker and what they actually do. He forces the audience to think as he states that “knowing how to do something that might be harmful is not the same as causing harm” (Cross, 38). Using this powerful statement, Cross uses his article to give the reader a new take on hacking. He proceeds to explain that often times, the information that we receive as a public is a result of hacking into government systems. He provides us with a new perspective as he divulges the
In this essay, the author
Analyzes how tom cross challenges us to redefine a hacker and what they actually do in his article "academic freedom and the hacker ethic".
Analyzes how cross addresses the question of whether or not it is right for information to be withheld from us as people with basic rights.
Argues against the stereotype that hackers are criminals accessing information that doesn't belong to them by sharing the fact that vendors, government agencies, and university labs kept software vulnerabilities secret from the general public.
Analyzes cross' point about the benefits of the information hackers have provided. they firmly believe that the pursuit of knowledge is tied directly to our freedom of speech.
Analyzes how cross challenges many of the beliefs that are instilled in us with the stigma surrounding the word hacking.
Opines that tom cross' article "academic freedom and the academic ethic" changed their perception of hackers and provided them with a new perspective of what hacking can bring to the table.
Please note that the tribute was posted on MIT’s external website the day following Aaron Swartz’s death. Anonymous therefore hacked the world’s most prestigious technological institutes within a day of Aaron Swartz’s death. Additionally they were able to control a government webs...
In this essay, the author
Opines that a formal examination of the current legal processes is required in light of aaron swartz's recent prosecution and tragic death.
Describes how aaron swartz illegally downloaded millions of articles from a digital library (jstor) with the intent to distribute them online. he was arrested by mit authorities under the computer fraud and abuse act.
Explains that despite the state dropping its charges and jstor expressing no interest in charging aaron schwartz and mit "neutrality", the federal prosecution by carmen ortiz continued to push for a heavy prosecution.
Explains that anonymous hacked the world's most prestigious technological institutes within a day of aaron swartz’s death.
Opines that the prosecution was significantly disproportionate to the damages inflicted in his actions.
Analyzes how professor simon examines the relationship between the fear of crime and the increase in prosecutorial authority.
Analyzes how the shift in the prosecutorial system affects the prosecutors' affiliation with the fear of crime, which can affect the accused's ability to a fair trial and protection against cruel and unusual punishment
Opines that the prosecution of aaron schwartz was not influenced by the fear of his crime but the possible deterrent value
Opines that the computer and abuse act is too broad and outdated to properly address the criminal sanctions of ever evolving technological advancements.
Opines that it is their hope that we reflect upon these events and identify the necessary changes needed to be made. professor simon detailed the prosecutorial complex in the aaron swartz case.
Weaver, Nicholas. "A Close Look at the NSA’s Most Powerful Internet Attack Tool." Wired.com. Conde Nast Digital, 14 Mar. 2011. Web. 15 Mar. 2014.
In this essay, the author
Explains that mass surveillance by the united states government has been a predominant reoccurring issue since classified government documents were leaked in may of 2013.
Describes edward snowden as a 29-year-old former technical assistant for the cia and current employee of the defense contractor booz allen hamiliton.
Explains that prism is an eavesdropping program that collects data from fiber-optic cable networks that carry the world's internet and phone data.
Argues that the nsa's surveillance programs have revolutionized the way the government can find and dismantle terrorist operations.
Opines that the federal government's surveillance programs need to be rebuilt. without constitutional liberties, the united states is no better than those countries we oppose because of their lack of fundamental rights.
Explains that there are three types of hackers: white, grey, and black hat. the nsa developed a system called quantum in the 2000s.
Explains that the national security agency's reach has grown considerably in recent years. tor is a brilliant way to stay anonymous from the government and independent hackers.
Explains how the nsa plans to infect millions of computers with malware. schneier, bruce, and nicholas weaver.