On April 15, 2013, the people of Boston experienced a tragedy they never saw coming. The Boston Marathon attack was an attack against the American people and our nation as a whole. The emergency response teams from every conceivable organization used their resources to react as quickly as possible. What happened on the morning of April fifteenth will forever live in the memories of the American people and to those who responded quickly to the matter. As much as the city of Boston was prepared for the marathon, nobody could fathom an event like the bombings to take place. The government responded as quickly as possible, and I believe to the best of their ability. Not only that, but the Bostonians, the people of Boston, had a huge impact on the
In 2003, a group primarily focused on personal entertainment began using their knowledge to “hack” into computers, posting images and messages on the monitors of unsuspecting internet users. The term hacktivist is a blend of hack as in unauthorized computer access and an activist. A Hacktivist is “a person who changes or manipulates information on the internet in order to convey a political message”. “Hacktivist,” Macmillian Dictionary, n.d., Wed. 28 Feb. 2014, online. In 2008, the group of practical jokers would become the activist group Anonymous, donning masks of Guy Fawkes a 1600 activist who perished while attempting to murder King James I. The group coordinates its efforts, protesting various organizations, agencies, governments, and the like regarding different issues around the world. Occasionally and with increasing frequency, the cumulative efforts of Anonymous’ online efforts result in the group publically gathering in protest. What would be the impact hacktivists (Anonymous), could amass considering their ability to “hack” web sites of other movements whose agenda clashes with their own?
Outrage and disbelief were the sentiments that enveloped people on April 15, 2013. Citizens of the United States were shocked by the injuries and deaths that occurred in Boston during the city’s marathon. This act of terrorism performed by two men was incomprehensible. The weapons they used were a mixture of homemade and store bought devices. Overall, this incident caused people to remember attacks on U.S soil.
A day that was supposed to be happy turned in seconds. People were injured or killed. Family members were devastated. The Boston Marathon was supposed to be a fun and exciting day for people watching and for the runners. We shouldn’t take every moment for granted, because you never know when it might be your last day or what we might consider "normal." April 15th 2013, will always be a day remembered in history.
Sean Clyne
Boston Marathon Bombing
9/20/15
It’s a day most people won’t forget, April 15th, 2013. It was a sunny day, perfect weather for a marathon. A beautiful day to celebrate the 117th running of the infamous Boston Marathon, the world’s oldest marathon.
The Boston Marathon is an annual marathon hosted by several cities in Greater Boston in eastern Massachusetts. It is always held on Patriot’s Day, the third Monday in April. Begun in 1897, the Boston Marathon is the world’s oldest annual marathons and ranks as the world’s best-known road-racing events (“Boston Bombing,” n.d.). But on April 15, 2013, the marathon made history for something else. At approximately 2:49 EST, two pressure cooker bombs struck near the finish line of the marathon, leaving three dead and one hundred and forty one injured. Among the injured, twelve were reported in critical condition. The victims, who were treated in eight different hospitals, were as young as two (Lev, 2013).
There are multiple ways of attacking, or hacking a website, and Anonymous uses multiple forms of it to keep the Feds off of their trail. Anonymous uses these copious amounts of attacks to penetrate a systems hard drive, and they either steal information or crash the memory of the computers. Sometimes, the hackers will use password-cracking software that are run from all the computers of Anonymous members and wreak havoc on the computer’s system they want to hack. Then, an easy password will come back to them and they have the tools to crack into a company’s website they want. Also, fake e-mails can be sent to legitimate users who could then accidentally click on a link that can enable hackers to install spyware into a computer to have access to valuable information. This is just one method most hackers use, and due to Anonymous’ sheer numbers, they have the ability to successfully hack with these more complex methods. In some cases, Anonymous convinces people in high up chains of targeted companies. Anonymous hackers have also been known to blackmail and/or pay off people who they wish to obtain secrets from. These techniques require a lot of people and a lot of resources, which is why only organizations like Anonymous are capable of pulling these tactics off. It also requires leaders within the chain, which is why Anonymous is such an interesting organization. There are no leaders, just people who step up to lead certain ops. This is how some Anonymous members have been caught, leading the charge of a certain op, and yet they still claim they have no true leadership structure. As a result, operational leadership may shift from project to project to keep the cops off of their trail, said a hacker, “pLInterFY” on a webchat. Decision making on who the next target should be, which organization to hack, or discussions about the pros and cons of hacking a certain organization are done via an internet website. Messages can be sent and received from each of the hackers computers, while keeping their identity disclosed, and this gives Anonymous another edge against the people attempting to stop them. Announcements can then be made through Anonymous accounts on Twitter, Facebook, or through a video on Youtube. Also, their website is a spot that Anonymous members can find who th next target is, why they are being targeted, or suggest a new target.
At first, many people were in shock and did not know what to do. Some civilians ran for safety while others ran to aid those greatly affected by the blasts and unable to help themselves. In total 264 people were injured, 14 of those had lost limbs, and three were killed. It was said that if this act of violence would have happened anywhere other than Boston, the outcome of the events could have easily been much more tragic. Boston has several hospitals in close proximity to the finish line. (Bodden, 2014
The 90's internet boom gave rise to new ways of writing in through access to cyberspace. What used to be printed or handwritten on physical surfaces such as paper, cardboard, or bulletin boards has changed to 0's and 1's, bits and bytes of digitized information that can be displayed thru the projections of computer screens. Moreover, the internet has made the process of publishing one's works, writing letters, or chatting with one another much easier and convenient for everyone around the globe. The internet became a universal tool, giving much freedom and flexibility to the users; it gave them opportunity to deliver their thoughts with little or no restrictions. Since it's impossible to regulate all cyber-activities, internet users are often unrestricted by the normal laws or authorities that would set boundaries around the various online transactions. More importantly, the fact that a net user can take on different identities in cyberspace brings about several ethical and social issues. These anonymous and unrestrictive characteristics of cyberspace often permite abusive users to easily involve themselves in serious cybercrimes such as cyberstalking, cyber-rape, and cyber-harassment through chatting services, emails, cyber communities, and other online communication.
Easily. The concept of the “username”, while prevalent in email addresses and early-adopted instant messaging programs, reached its critical mass with the advent of social media. Social media sites do not always simply suggest that their users create an online persona; in most instances, they require it upon initial registration.23 It may come as somewhat of a surprise that these social media logins actively encourage usernames to be creative, unique, and something other than the user’s individual email address; however, utilizing a pseudonym on social media is nothing new for Internet users. Social media users are entrenched in the anonymity of usernames.24 It has been suggested that the Internet may be the “greatest innovation in speech since the invention of the printing press[.]”25 As one court explained it, “[t]he rapid growth of Internet communication and Internet commerce has raised novel and complex legal issues and has challenged existing legal doctrine in many areas.”26 “The near universal use of pseudonyms in e-mail and instant messages has fostered a culture in which users are freed to say and do things they never would by offline means.”27 By using a screen name, an anonymous user “is able to create an entirely new persona for his Internet communications, based on the distinction that ‘[u]nlike real space, cyberspace reveals no