Free Essay

Hacktivism, Freedom of Speech or Cyber Terrorism

In:

Submitted By Rubbrbandman
Words 2499
Pages 10
Hacktivism, Freedom of Speech or Cyber Terrorism?
Josh T. Diehl
ITT-Tech Institute

Abstract
I will be doing my research paper on Hacktivism and looking into the subsector that is known as “Anonymous”. Hacktivism in itself is the use of computers and computer networks to promote political ends. To see this for what it truly can be, you must look at it with the understanding that it can be carried out under the same premise that proper (and skillful) use of technology can produce results similar to these of conventional acts of protest, activism, and civil disobedience.
I plan on exploring whether it is freedom of speech or cyber terrorism, keeping an open mind when conducting my research will be the key to the integrity of this paper. I plan on researching online articles and post from credible sources. I will make set times while I am not at work to research and write this.
Body
First we need to look at what exactly is hacktivism and who practices it. Hacktivism in itself is defined as “The use of computers and computer networks to promote political ends, chiefly free speech, human rights, and information ethics. It is carried out under the premise that proper use of technology can produce results similar to those of conventional acts of protest, activism, and civil disobedience.” Certain groups such as Anonymous use this form (among others) as their way to speak out against what they see as injustice.
We need to look closely, past the top layer of information, to get to the honest truth about the situation. Is this right or wrong? Is actually making an effect (wither that would be a positive or negative one)?

So just who is Anonymous?
During a press release in 2010, Anonymous wanted to clarify who they are and what they do. They took this opportunity to communicate a message to the media so that the “Average Internet Citizen” can know who they are and what they represent. They went on to say this, “Anonymous is not a group of hackers. We are Average Internet Citizen ourselves and our motivation is a collective sense of being fed up with all the minor and major injustices we witness”
Anonymous is a literal embodiment of the virtual cyber-city. A hyper-realized community of activist and hackers uniting towards common goals and undeniable provoking change.” They are a collective of many, many people that are like a flash mob. They appear suddenly, act quickly, and then disappear. Think of them, if you will, as an internet gathering with a very loose and decentralized command structure that operates on ideas rather than directives.
They have been called “Freedom Fighters” & “Digital Robin Hoods” from those who believe that what they are doing is justice to the injustice of the system. While those who try and defend said system, such as critics, has described them as a “Cyber Lynch-Mob”.
“The concept of many online and offline community users simultaneously existing as an anarchic, digitized global brain.” Anonymous members (known as “Anons”) can be distinguished in public only by the wearing of stylized Guy Fawkes Mask.

Mark Rasch, the Chief Privacy Officer at SAIC, said “It’s not like you throw them in jail and they disappear. It’s sort of like squeezing Jell-O, it just moves somewhere else. Criminalized under the federal Computer Fraud and Abuse Act (CFAA) classifies most of Anonymous’s movements as, Conspiracy and “intentional damage to a protected computer”, also, “Violating a web site’s ‘Terms of Service’ and can ‘cause damages’.”
What have they been involved in?
Over the years, Anonymous has been involved in over 85+ hacktivism’s or what they call Operations / Movements / Projects, including Operation PayBack, and Avenge Assange.
Their typical M.O. is using what they call the “Low Orbit Ion Cannon” or LOIC to deliver what is known as a “Distributed Denial of Service” or DDOS attacks.
A DDOS attack floods a web site server with traffic from a network of sometimes thousands of individual computer networks of serving legitimate traffic. They use the LOIC as an application to carry out their DDOS attacks at a greater strength. One should note that this method was used in both Project Chanology and Operation Payback.
The LOIC is an application developed by 4chan-affilated hackers designed to, when used en mass by the thousands of Anonymous members/user, laugh DDOS attacks on websites by flooding the server with TCP (Transmission Control Protocol) or UDP (User Datagram Protocol) packets with the intention of disrupting the service of a particular host.
Another means of which they can obtain information to be used in hacktivism is called Doxing. Which we define as, involves finding and publishing targets personal or corporate information.
Anonymous has used this method to “dox” members of the Westboro Baptist Church after several tweeted their plans to picket the funerals of Sandy Hook victims. Hackers were able to access “church” members twitter accounts and publish their personal information, including phone numbers, emails, and hotel reservation details.
Operations and Movements Over the years Anonymous has had many movements and operations, as I previously stated, over 85+. One that was done within the last few years and amounted to the world’s biggest military leak in history, is Operation Bradical.
Operation Bradical is all about one man. Bradley Manning, who simply put it as “I want people to see the truth… Regardless of who they are, because without information, you cannot make informed decisions as a public.”
B. Manning was sentenced to 35 years in federal prison for leaking more than 700,000 classified documents and videos. This disclosure amounted to the biggest leak in U.S. military history. One thing to keep in mind is that the longest was 2 years (prior to the Manning trial).
‘This is unprecedented," said Liza Goitein, who co-directs the Brennan Center for Justice's Liberty and National Security Program. "It is dramatically longer than the longest sentence ever served for disclosing classified information to the media, which was two years."’
Now we have to look at this subjectively, as this is one of many cases of hacktivist receiving usually harsh punishment, making plea barging’s are highly sought after in the case of an arrest. Let me give you another example of a less severe case over Anonymous involving the FBI.
LuLzSec
Over periods of time Anonymous has had subsectors from the main ideal driven collective, in this case they were called “LuLzSec”. LuLzSec was purely for laughs and giggles, although most of the members of this Sector were highly skilled hackers.
LuLzSec was a group of hackers that just wanted to get some laughs and giggles in their spare time. The name is a contraction of "LuLz", for laughs, and “Sec” for "security", which is what hackers like to compromise. LuLzSec was hitting targets left and right, but never for a profit, most of the hacks were loosely about politics or information, but more for the “fun and laughs” they could achieve.
The members never met in real life, and only knew each other by online handles and only active for a 50-day period before disaster ensued. The one we are going to look at is Hector Xavier Monsegur (a.k.a. “Sabu”). Out of the six-members that made up LuLzSec, Sabu was the unofficial leader of LuLzSec, by definition giving him the most influence in what they did and to whom. After LuLzSec had gone on a hacking spree of commercial targets, Sabu decided it was time to step it up.
Sabu and the other members, then attack a government site, this was the beginning of the end for them. On one online chat room for Anonymous users, Sabu stated to the rest of the LuLzSec group, "You realize we smacked the FBI today. This means everyone in here must remain extremely secure."
When Sabu accidently forgot to hide and mask his IP address, using the Tor system which anonymizes data connections, when logging into that exact same online chat room, the FBI was waiting for him. They were able to track his unprotected IP address right back to his physical address, within a few moments, they were knocking on his door.
Confronting him, they hit him with enough charges, which would add up to around (hypothetical possibility) 126 years in prison on 12 counts. They gave him an offer, be arrested or co-operate. Having recently taken over parental care for his two nieces, who were then aged four and five, didn’t want to see them go into foster care, he chose the latter of the two. This was arguably the turning point for LuLzSec, which one could even say that those two girls decided the fate of LuLzSec. Sabu took the plea bargain and began to work with the FBI after being offline for a week. By the end of July in 2011, all members of LuLzSec had been arrested. Sabu’s punishment was incredibly reduced from a proposed 21-26 years to a mere serving time of only seven-months, after what the judge called “Extraordinarily valuable cooperation with the FBI”. Hammond stated “I was condemned to the maximum prison term for having committed ‘mass mayhem,’ while Sabu received the most lenient of all Anonymous-related sentences for embracing ‘good, not evil.”, he was sentence to a maximum of 10 years for his part in LuLzSec. This was a very, very severely different punishment than Sabu.
Hammond also stated that “Hugs and high-fives all around as Judge Preska saluted Sabu for having betrayed his comrades and his ideals, preventing hundreds of cyber-attacks, and helping the FBI catch their ‘most wanted cybercrime target’.”
“Most pressingly, it has been alleged that, while serving as an informant, Sabu encouraged members of LuLzSec to conduct cyber-attacks on foreign governments. “These intrusions, all of which were suggested by Sabu while cooperating with the FBI, affected thousands of domain names and consisted largely of foreign government websites, including those of Turkey, Brazil, Iran,”.
Hammond said this during his sentencing last year, before being cut off by U.S. District Court Judge Loretta Preska, the same judge that just let Monsegur (a.k.a. Sabu) walk this past May. Hammond went so far as to suggest that the FBI had been using him to launch cyber-attacks around the world, with Sabu acting as the coordinator.
Hammond’s final words before departing to being his sentence were, “The government celebrates my conviction and imprisonment, hoping that it will close the door on the full story. I took responsibility for my actions, by pleading guilty, but when will the government be made to answer for its crimes?”

Currently Involved In
Currently Anonymous is currently involved in the events on going in Ferguson, St. Louis involving the shooting of 17-year old Michael Brown via Police Officer Darren Wilson. Brown was shot 6 times after allegedly raising his hands above his head I means to surrender. New information is being released daily in the situation that is quickly turning from bad, to worse in only a matter of days. Anonymous has said that enough is enough. Now they are threating to DDOS attack and use Doxing on the Ferguson Police Department.
Riots have ensued, the local government has used a city wide curfew, and over 40 FBI agents are in the area investigating this case. The National Guard has also been deployed by Obama saying “They will only have a limited amount of involvement” when he issued the order, but since then things have gotten worse and the National Guard has been actively involved.
Anonymous stated on twitter, “We are watching you very closely. If you abuse, harass – or harm in anyway the protestors in Ferguson, we will take every web based asset of your Departments and Governments offline. This is not a threat, this is a promise. Attacking the protestors will result in the release of personal information on every single member of the Ferguson Police Department.” Following those remarks, Anonymous continued to say, “The time has come for more than simple justice for these atrocities. The time has come to draw a line in the sand. The time has come to bring those to justice, who served to protect us, not kill us.” “Until justice prevails, hack & protest will replace it.” They closed off their remarks with this, “Operation Ferguson engaged. We are Anonymous. We are Legion. We do no forgive. We do not forget. Ferguson, expect us.”
Right or Wrong? So this brings me back to the original topic. Do we consider what Anonymous is doing to simply be (hack) activism, or do we believe that what they do should be considered crimes committed in the cyber world? The world is scared of those imbued with the abilities to hack and access information that they believe to be “secure”. Honestly I believe we must take this case by case. If we look at “Operation Bradical” regarding Bradley Manning, yes I believe he broke his oath after swearing and signing contracts to be military, which would then be considered “cyber terrorism”. On the other hand, if we look at the Operation Payback involving Sony, most hackers are only receiving up to year in prison. So is this fair to make an “example” out of one man, while you let the rest off with a slap on the wrist (most of the time).
I would have to say most of what Anonymous does, I agree with. Hacking companies that hoard information in the hopes to monopolize it and turn a profit to just freely release it to the public is right. Hacking and recording data off of military channels, is crossing the line a little bit ehh?

References We Are Legion: The Story of Hacktivist. (2012). Retrieved August 6, 2014, from http://wearelegionthedocumentary.com/ Thompson, C. (2013, January 18). Hacktivism: Civil Disobedience or Cyber Crime? Retrieved August 6, 2014, from http://www.propublica.org/article/hacktivism-civil-disobedience-or-cyber-crime Suen, S. (2012, November 28). Intro to Civic Media: Civil Disobedience and Hacktivism | MIT Center for Civic Media. Retrieved August 6, 2014, from http://civic.mit.edu/blog/s2tephen/intro-to-civic-media-civil-disobedience-and-hacktivism Braybrooke, K. (n.d.). Hacktivism is unbound: An essay by Kat Braybrooke. Retrieved August 6, 2014, from http://hacktivism-is-unbound.tumblr.com/ Jordan, T., & Taylor, P. (2004). Hacktivism and cyberwars: Rebels with a cause? London: Routledge, 2004, from http://soniapedrosebastiao.weebly.com/uploads/2/0/3/9/20393123/20112012_gcc_e-book_hactivism_and_cyberwars.pdf Tate, J. (2013, August 21). Bradley Manning sentenced to 35 years in WikiLeaks case. Retrieved August 21, 2014, from http://www.washingtonpost.com/world/national-security/judge-to-sentence-bradley-manning-today/2013/08/20/85bee184-09d0-11e3-b87c-476db8ac34cd_story.html Writer, S. (2014, August 11). Hacker group "Anonymous" threatens Ferguson police department. Retrieved August 21, 2014, from http://fox2now.com/2014/08/11/hacker-group-anonymous-threatens-ferguson-police-department/

Similar Documents

Free Essay

Wwesa

...4 Anonymous Hacktivism and Contemporary Politics Christian Fuchs 1. INTRODUCTION It is Friday, August 6, 2012, on the Internet. Sixty-seven years earlier, on August 6, 1945, the U.S. dropped the first atom bomb on Hiroshima. One hears a song by Trey Parker: "America. Fuck yeah. [. . .] So lick my butt and suck on my balls, America, fuck yeah! Whatcha' gonna do when we come for you now? (. . .) McDonalds, fuck yeah! Wal-Mart, fuck yeah!" Pictures of cats that look human are accompanied by the request, "I want to start a collection of my fetish catboys so post moar!" There is a link to a live cam on Times Square. One also finds an image showing a burning American flag that is accompanied by the logos of McDonald's and images of a can of Mountain Dew, the Statue of Liberty, a guitar player and a screaming bear. "You should kill yourself, fucking AMERRRICCAAA, you little fag- got." A rapper writes a new song and says that the first few minutes of the discussion in his thread will become part of the song. There is a story about a brother who tries to seduce his sister, but it turns out that his sister is a large arthropod. There is a thread with images of female but- tocks, accompanied by an announcement that one of the portrayed girls receives prank phone calls. One sees a picture of a couple having oral sex accompanied by the text "PORNO FUCK YEAH!" as well as a picture of a drunk sleeping man accompanied by the text "buddy passed out after 11 Coors...

Words: 9207 - Pages: 37

Free Essay

Russian Patriotic Hacking

...Russian Patriotic Hacking During Operation Allied Force Introduction. With the increasing number of cyberattacks, many security professionals are greatly troubled by the real threat to the information technology infrastructure in the United States. While safeguarding information has been a major issue for the private and public sectors since the beginning of the computer era, the increased level of concern over the most recent attacks has resulted in devoting more resources to combat this threat. This paper analyzes numerous cyberattacks by Russian computer enthusiast group Chaos Hackers Crew and other hacktivists during Operation Allied Force in 1999, that included taking down and defacing various NATO and US Government websites, several successful virus propagation attempts on military servers and countless spamming storms. This particular case raises curious questions about the legal definition of term cyberconflict itself, magnitude of the damage from a potential cyberattack on U.S. Government by terrorists and the level of preparedness of key military and intelligence units for the cyberwar. The cyberterrorism threat is real, however it’s essential to recognize that preserving the state of continuous distress over computer vulnerabilities can be profitable. Based on this research, cultural differences play a huge role in the world of computer hackers who decide what entity to attack and how, also the scale of a cyberattack doesn’t matter as economic damage can be devastating...

Words: 8586 - Pages: 35

Free Essay

2009-Report to Congress of the Us-China E and S Review Commission

...2009 REPORT TO CONGRESS of the U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION ONE HUNDRED ELEVENTH CONGRESS FIRST SESSION NOVEMBER 2009 Printed for the use of the U.S.-China Economic and Security Review Commission Available via the World Wide Web: http://www.uscc.gov dkrause on GSDDPC29 with K1 VerDate Nov 24 2008 08:23 Nov 10, 2009 Jkt 052771 PO 00000 Frm 00003 Fmt 6012 Sfmt 6602 M:\USCC\2009\52771.XXX APPS06 PsN: 52771 M:\USCC\USChina.eps Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 3. DATES COVERED 2. REPORT TYPE 01 NOV 2009 4. TITLE AND SUBTITLE 00-00-2009 to 00-00-2009 ...

Words: 185166 - Pages: 741

Free Essay

Cyber Crime

...Cyber-crimes: A Practical Approach to the Application of Federal Computer Crime Laws Eric J. Sinrod† and William P. Reilly†† I. Introduction Cyber-crime, once the domain of disaffected genius teenagers as portrayed in the movies “War Games” and “Hackers,” has grown into a mature and sophisticated threat to the open nature of the Internet. “Cyber-criminals,” like their non-virtual traditional criminal counterparts, seek opportunity and are attracted to vacuums in law enforcement. The news media is filled with reports of debilitating denial of service attacks, defaced web sites, and new computer viruses worming their way through the nation’s computers. However, there are countless other cyber-crimes that are not made public due to private industry’s reluctance to publicize its vulnerability and the government’s concern for security.[1] Along with the phenomenal growth of the Internet has come the growth of cyber-crime opportunities.[2] As a result of rapid adoption of the Internet globally, computer crimes include not only hacking and cracking, but now also include extortion, child pornography, money laundering, fraud, software pirating, and corporate espionage, to name a few.[3] Law enforcement officials have been frustrated by the inability of legislators to keep cyber-crime legislation ahead of the fast-moving technological curve.[4] At the same time, legislators face the need to balance the competing interests between individual rights, such as privacy...

Words: 23991 - Pages: 96

Premium Essay

Ethics

...ETHICS IN INFORMATION TECHNOLOGY Third Edition This page intentionally left blank ETHICS IN INFORMATION TECHNOLOGY Third Edition George W. Reynolds Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Ethics in Information Technology, Third Edition by George W. Reynolds VP/Editorial Director: Jack Calhoun Publisher: Joe Sabatino Senior Acquisitions Editor: Charles McCormick Jr. Senior Product Manager: Kate Hennessy Mason Development Editor: Mary Pat Shaffer Editorial Assistant: Nora Heink Marketing Manager: Bryant Chrzan Marketing Coordinator: Suellen Ruttkay Content Product Manager: Jennifer Feltri Senior Art Director: Stacy Jenkins Shirley Cover Designer: Itzhack Shelomi Cover Image: iStock Images Technology Project Manager: Chris Valentine Manufacturing Coordinator: Julio Esperas Copyeditor: Green Pen Quality Assurance Proofreader: Suzanne Huizenga Indexer: Alexandra Nickerson Composition: Pre-Press PMG © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission...

Words: 204343 - Pages: 818