Wardlow 1

Cassie Wardlow CST 300L December 4, 2012 Remember, Remember the 5th of November

Hackers have been around for many centuries. It wasn’t until recently that they started to have a huge impact on society. Of course what they do has changed over the years, but they still all have the same idea. They don’t agree with government and they make sure their opinion is heard. Before the digital age, weren’t really seen as a threat. Now that they can get into highly protected systems, the government is starting to worry. The history of how hackers came about is an interesting, especially how they have formed large groups today, like the famous

Anonymous. Big important businesses and corporations may not enjoy hackers, but they are good for society. Hackers want the public to know that certain business are doing something wrong.

Hacktivism is described as “the nonviolent use of legal and/or illegal digital tools in pursuit of political ends” (Skelton, 2012). In October of 1989, the first ever hack was done by a group called W.A.N.K. The stance of W.A.N.K was to bring awareness against the nuclear armament. They hacked into government computers, including NASA, and used a worm to change to login screens. This is what appeared on their screens:

Image 1 Wardlow 2

Hackers were still around before computers but just doing things a little bit differently. In the

1600s, Guy Fawkes was in protest against religious intolerance. Guy Fawkes and a group of provincial English Catholics planned to assassinate King James I of England and VI of Scotland.

They planned to do this by blowing up the House of Lords. He was discovered before he could execute his plan and was found with thirty-six barrels of gunpowder. This all occurred on

November 5, 1605.

However, the word “hack” didn’t come around until September of 1946. Students at MIT created a club called The Tech Model Railroad Club and they mostly did pranks “imbued with innovation, style, and technical virtuosity” (Levy). Since the computer wasn’t around yet, people were hacking into the phone systems to get free long distant calling. In Berlin, Germany, 1981 there was a group called and they believed that the government should operate transparently and that information should be free. The CCC is one of the world’s biggest organizations. Cult of the Dead Cow was formed in 1984 in Lubbock, Texas. This group wanted to achieve “global domination through media saturation” (Luminant Films, 2012) and later declared “war” on the Church of Scientology. The Electronic Frontier Foundation was formed in July of 1990. Its members include lawyers, policy analysts, activists, and technologists. They said they are first in the line of defense “when our freedoms in the networked world comes under attack” (Luminant Films, 2012).

The term was coined by a member of the Cult of the Dead Cow in 1996 and is defined as “the use of hacking as a form of political protest, subverting government surveillance of repressive regimes and the ideal that access to information is a basic human right” (Luminant Wardlow 3

Films, 2012). The Strano Network executed one of the earliest hacktivist protests. They shut down various French government websites for a one hour Net’Strike because of their opposition of the country’s nuclear and social policies. A Portuguese hacktivist group UrBaN KaOs attacked thirty Indonesian government website in protest to the oppression of East Timor.

Today, the popular group named is doing hacktivist protests around the world. These protests include going against the Church of Scientology, PayPal, and Australia for trying to censor the internet. They also shut down the Egyptian government website in support of the Arab Spring protests. Anonymous is constantly shutting down government and company websites if they do something the group doesn’t agree with. Along with shutting down websites, they steal personal information such as passwords and email addresses.

There are three types of hackers, which include: white hat, grey hat and black hat. White hat hackers are considered the good guys in the hacker world. They hack into a computer system or network and to identify a security weakness. Instead of taking advantage of this, the let the system’s owner know about the weakness so they can fix it before it will be taken advantage of by a black hat hacker. Many white hat hackers work for companies to secure their computer systems (Rouse, 2007). Grey hat hackers are very similar to the white hat hackers. The grey hat finds a security weakness in a computer system, but doesn’t bring the attention to the owners.

The goal is to improve the security but they publicize the information. Therefore, they make it a target for other hackers (Rouse, 2007). Lastly, the black hat hackers are the bad guys. Black hats break into a computer system with malicious intent. Their motives are to take advantage of the low security and destroy files or steal data for future purpose. It is possible that they will Wardlow 4 leak the information to the public so other hackers can exploit the system before it can be secured (Rouse, 2007).

There are seven different types of hacking that hacktivist could use to carry out their plans. Many of these are readily available on the internet. The first form is defacing a web page.

Between 1995 and 1999, approximately 5,000 websites were defaced. This means that a hacktivist will make significant changes to the front page of the company’s, or government’s, website (UV, 2011). The next form is called a web sit-in where hackers send so much traffic to the site that is gets overwhelmed and makes the site crash, therefore making it inaccessible to other users (UV, 2011). Another type of hacktivism is email bombing. This is where hacktivists send a large amount of emails with large file attachments to someone’s email address. Code and coding can be tools of hacktivism as well. Code can be used to obtain outside software and websites to achieve political purpose (UV, 2011). One example would be WikiLeaks. Website mirroring is used as a tool to bypass censorship blocks on a website. It copies content from a censored website and posts it to other sites without censors (UV, 2011). Geo-bombing is where a geo-tag is attached to a YouTube video so the location can be displayed on Google Earth (UV,

2011). Anonymous blogging is the last form of hacking. It is a method used to speak out about human rights issues and government oppression. They uses many web tools to remain anonymous such as, free email accounts, IP masking and blogging software (UV, 2011).

There are many issues surrounding hacktivism today. The hackers themselves don’t think they are a threat to anyone and are just trying to get a point across. On the other hand, the government is starting to label them as terrorist and criminals. The real question is should they be considered a threat or a harmless computer hacker? To answer this question we need to ask Wardlow 5 how far these hacktivist are willing to take their hacking. One professor, from the University of

Buffalo, says that they don’t create big threats and are mostly a nuisance. They start to become a threat when they attack the nation’s infrastructure (Hsu, 2011). There have been some attacks to cybersecurity on the Pentagon where the hackers stole critical and sensitive information (Hsu,

2011). Many government officials are against hacktivists because “today you generally don’t even know that you’ve been infected, which buys more time for criminals to use hijacked machines” (Clemmitt, 2011). Hacking is definitely on the rise as well. In 2010, Spain based

Panda Security founded 59 million varieties of , which is up from 38 million in 2009

(Clemmitt, 20122). There is a difference between cybercriminals and hacktivists though.

Hacktivists want to be heard and want to show the company that they can’t get away with wrong doings. Cybercriminals, on the other hand, are very sneaky and don’t like to be known about.

They do things that beyond defacing a website for public interest. Chenxi Wang said, “...the weapon is much more accessible, the technology is more sophisticated. Everything is online - your life, my life - which makes it much more lethal” (Sengupta, 2012). The government needs to focus more on the real problem, cybercriminals not the hacktivists.

In the past when people disagreed with something they tried to protest it. Today,

Hacktivists are the modern protestor. They are utilizing technology and the internet to get their point across, instead of marching outside of company buildings with signs and chants. Today, hacktivists attack the websites so the company knows they mean business. One hacktivist says,

“The internet is not some playground that corporations and governments can take basic civil liberties with and destroy them and get away with it” (Cox, 2012). A big part of hacktivism is to make a company loose profit from their website being down or defaced. Hopefully, that will Wardlow 6 make the company open their eyes and realize whatever they were doing was wrong. Another hacktivist says, “I’m not under the illusion that we’re going to change the world, but if we can make a big enough noise for people to notice there’s a problem and scream loud enough, someone’s going to take notice” (Cox, 2012). Hacktivists are just trying to prove a point and help those in need. The group Anonymous has helped many protestors in the Middle East against their government and is even thinking of targeting Facebook because they don’t agree with their privacy rules. They aren’t trying to steal money or a person’s identity, they are trying to stand up for the population as a whole.

Image 2

When first started doing research on the hacktivist movement, I was completely against hacktivists. I thought the only thing hackers did was cause problems and steal things. I didn’t agree with the things that they did and thought they should be punished for their actions. Turns out there are two sides of every story and hacktivists don’t seem bad after all. The media gives them a bad name because they are trying to stand up for what they believe in, except doing it in a way that most average Joe’s don’t know how to do. Probably the biggest reason why people are so afraid of hacktivists is because they don’t know how it works and think that they will be attacked. Hacktivists don’t attack individuals, ordinary people like you and me. They attack Wardlow 7 companies and governments all over the world. Hackers were something that came along with the digital age and people are just going to have to get used to it. They aren’t going anywhere anytime soon so the government should accept them because they will only get smarter.

There are a few limitations when it comes to taking the side of hacktivists. Hacktivists are thought to be the good guys now, but they could easily be turned into something more detrimental to society. They could just be crashing a website now but it could lead to more serious consequences. The things they are doing now could be considered child’s play if they go to the next level. Hackers could be a really huge threat to a countries infrastructure. If they leak top secret information to other countries, it could put a huge target on a nation’s back. Identity theft could also become a more serious issue than is thought. Hackers could possibly frame innocent people for their work. If the hacktivist community starts to become more black hats than white hats, things could go terribly wrong. Bad things could happen and money could be lost by all parties. Some small hacker groups are already targeting banks, but the loss isn’t that significant. Some people worry that there will be greater consequences in the future from these hackers. Hackers could cause the government to crack down on internet laws and take control of our freedoms. The technology will get better and therefore hackers will become stronger and able to do more than just crash a site, “Hacktivism is a civic ethic that I think is integral to a liberal democratic society today... But I dont condone breaking the law” (Mills, 2012).

Hopefully, these hacktivists don’t loose what their original goal was to protect the people.

If hacktivists stick to their goal then they can change the world and make a big impact, continue to do what they already have done. They aren’t afraid to stand up for what they believe in and the government is afraid of how confident they are. Hacktivists of the past should be Wardlow 8 proud of how far the hackers have come in such a short amount of time. The hackers of today have even taken it down a notch since Guy Fawkes’ original plan was to kill royalty. The government should be happy hackers just shut down a website instead of killing CEOs.

However, the government doesn’t see it that way. The government thinks every hacker is a cybercriminal even if they aren’t breaking the law. There are cybercriminals out there, but that’s a completely different field. Cybercriminals should be the ones suffering consequences, not hacktivists. Hacking is definitely logical because if it weren’t for them then big corporations would get away with a lot more than they already do. Anyone can join the hacktivist community as well from their own home. They don’t necessarily have to know how to code or hack, they just have to sit back and click a button to help crash a site. If people want to stand up for a cause without having to physically stand, then they can join the hacktivist community. Being a hacker entails being anonymous so people don’t have to worry too much about being caught. A way to protect oneself from hackers is to have secure passwords and not store too much personal information on the computer or on the internet. The most important thing to remember about hackers is that they aren’t all bad. They do things for a good reason, not just to inconvenience someone. Hacktivists are just the modern day hippies with a computer. Try not to be afraid of these hackers and maybe join in on a hack or two to see how powerful these people are.

Overall, hacktivism could be the most interesting issue of the digital age. They have reinvented the term activist and taken it to a whole new level. They have shown governments and corporations that they are a group to be taken seriously and that they mean business. The beginning groups should be proud of the growth of hacktivism. The founding hackers created a good foundation for big groups like Anonymous to work from. Their idea of having the Wardlow 9 government be transparent and not hide information is something we should support. Hacktivists can cause damage and steal money but they choose not to. All they care about is making a statement. They continue to do the right thing instead of becoming cybercriminals. A documentary called “We are Legion” profiles hacktivists and describes them as, “...activists and protectors of free speech, and tend to rise up most powerfully when they perceive a threat to internet freedom or personal privacy” (Legion, 2012). Stop being afraid of hacktivists and join them to protect the Internet everyone knows and loves.

Wardlow 10

BBC News UK. (2012, November 22). Anonymous hackers ‘cost PayPal $3.5 million.’ BBC News UK. Retrieved from http://www.bbc.co.uk/news/uk-20449474

Clemmitt, M. (2011, September 16). Computer hacking. CQ Researcher, 21, 757-780. Retrieved from http://library.cqpress.com/cqresearcher/

Cox, S. (2012, November 26). Anonymous, hacktivism and the rise of the cyber prostester. BBC. Retrieved from http://www.bbc.co.uk/news/technology-20446048

Hsu, C. (2011, August 15). ‘Hacktivist’ groups like ‘Anonymous’ are not the biggest threat to cybersercurity, say UB information assurance expert. University of Buffalo. Retrieved from http://www.buffalo.edu/news/12784

Luminant Films. (2012). We are Legion. We are Legion Documentary. Retrieved from http:// wearelegionthedocumentary.com/hacktivist-timeline/

Mills, E. (2012, March 30). Old-time hacktivists: Anonymous, you've crossed the line. Cnet. Retrieved from http://news.cnet.com/8301-27080_3-57406793-245/old-time- hacktivists-anonymous-youve-crossed-the-line/

Olson, P. (2012, July 3). Anonymous rattles a Chinese web giant. Forbes. Retrieved from http:// www.forbes.com/sites/parmyolson/2012/07/03/anonymous-rattles-a-chinese-web- giant/

Rouse, M. (2007, June). What is a black hat? SearchSecurity. Retrieved from http:// searchsecurity.techtarget.com/definition/black-hat

Sengupta, S. (2012, March 17). The soul of the new hacktivist. The New York Times. Retrieved from http://www.nytimes.com/2012/03/18/sunday-review/the-soul-of-the-new- hacktivist.html?_r=1&

Skelton, C. (2012, March 28). A history of hacktivism. Retrieved from http://mashable.com/ 2012/03/28/history-of-hacktivism/

University of Virginia. (2011). Forms of hacktivism. University of Virginia. Retrieved from https://sites.google.com/site/pwordsecuritykate/forms-of-hacktivism