Who is ?atica (2004- Pre ram sent) dia D Anonymous is a loosely associated international lope WHY THE ? cyc network of activist and hacktivist entities. En

A nominally associated with the group describes it as "an gathering" with P ro "a very loose and decentralized command je ct C structure that operates on ideas rather h a n than directives”. The group became o lo known for a series of well-publicized ) g 3 y 0 ( publicity stunts and distributed 0 2 2 0 denial-of-service (DDoS) attacks on ( 0 N 8 ) government, religious, and A H C corporate . 4

The is a depiction “Anons” have publicly of Guy Fawkes, the best-known supported WikiLeaks and member of the , an the . attempt to blow up the in in 1605. A stylized version, designed by illustrator

David Lloyd, came to represent broader after it was used

)

t as a major plot element in “ for

n

O

e p

s Vendetta”, published in 1982, and

e

e r

r its 2006 lm adaptation. After

a

P

-

t

i

3 appearing in Internet forums, the

o

1

n

0 mask became a well-known

:

2

P

(

a symbol for Anonymous, used in

r

y

e

t

HACKTIVISM: b , the Occupy

n a

i

Main Targets c movement, and other anti-govern-

k

W

i

Hacktivism (a portmanteau of e US Government

s ment and anti-establishment

f

a

a Israeli Government

hack and activism) is the use S around the world.

B

:

i

t

n Tunisian Government

of computers and computer c

o

h i

t Ugandan Government

(

networks to promote political a 2

r

Child sites 0 e

1

ends, chiey free speech, human p

Copyright protection agencies 0 O )

rights, and information ethics. It is The Westboro Baptist Church WHAT IS A DDoS ATTACK?

carried out under the premise that PayPal In computing, a denial-of-service (DoS) or

proper use of technology can produce MasterCard distributed denial-of-service (DDoS) attack is an

results similar to those of conventional Visa

attempt to make a machine or network resource

acts of protest, activism, and Sony unavailable to its intended users.

civil disobedience.

Although the means to carry out, the motives for, and

targets of a DoS attack vary, it generally consists of e orts to

T temporarily or indenitely interrupt or suspend services of a )

h

2

e

1

O 0

2 c

-

c

1

u 1 p 0 y 2

( M

t o host connected to the Internet. n v e e m