Hacktivism and the First Amendment: Drawing the Line Between Cyber Protests and Crime
Total Page:16
File Type:pdf, Size:1020Kb

Load more
Recommended publications
-
From Clicktivism to Hacktivism: Understanding Digital Activism
Information & Organization, forthcoming 2019 1 From Clicktivism to Hacktivism: Understanding Digital Activism Jordana J. George Dorothy E. Leidner Mays Business School, Texas A&M University Baylor University ABSTRACT Digital activism provides new opportunities for social movement participants and social movement organizations (SMOs). Recent IS research has begun to touch on digital activism, defining it, exploring it, and building new theory to help understand it. This paper seeks to unpack digital activism through an exploratory literature review that provides descriptions, definitions, and categorizations. We provide a framework for digital activism by extending Milbrath’s (1965) hierarchy of political participation that divides activism into spectator, transitional, and gladiatorial activities. Using this framework, we identify ten activities of digital activism that are represented in the literature. These include digital spectator activities: clicktivism, metavoicing, assertion; digital transitional activities: e-funding, political consumerism, digital petitions, and botivism; and digital gladiatorial activities: data activism, exposure, and hacktivism. Last, we analyze the activities in terms of participants, SMOs, individuals who are targeted by the activity, and organizations that are targeted by the activity. We highlight four major implications and offer four meta-conjectures on the mechanisms of digital activism and their resulting impacts, and reveal a new construct where participants digitally organize yet lack an identifying cause, which we label connective emotion. Key Words Digital activism, social activism, political participation, social movements, connective emotion, literature review 1.0 Introduction Not long ago, activism to promote social movements was relegated to demonstrations and marches, chaining oneself to a fence, or writing to a government representative. Recruiting, organizing, and retaining participants was difficult enough to ensure that often only largest, best supported movements thrived and creating an impact often took years. -
Hacks, Leaks and Disruptions | Russian Cyber Strategies
CHAILLOT PAPER Nº 148 — October 2018 Hacks, leaks and disruptions Russian cyber strategies EDITED BY Nicu Popescu and Stanislav Secrieru WITH CONTRIBUTIONS FROM Siim Alatalu, Irina Borogan, Elena Chernenko, Sven Herpig, Oscar Jonsson, Xymena Kurowska, Jarno Limnell, Patryk Pawlak, Piret Pernik, Thomas Reinhold, Anatoly Reshetnikov, Andrei Soldatov and Jean-Baptiste Jeangène Vilmer Chaillot Papers HACKS, LEAKS AND DISRUPTIONS RUSSIAN CYBER STRATEGIES Edited by Nicu Popescu and Stanislav Secrieru CHAILLOT PAPERS October 2018 148 Disclaimer The views expressed in this Chaillot Paper are solely those of the authors and do not necessarily reflect the views of the Institute or of the European Union. European Union Institute for Security Studies Paris Director: Gustav Lindstrom © EU Institute for Security Studies, 2018. Reproduction is authorised, provided prior permission is sought from the Institute and the source is acknowledged, save where otherwise stated. Contents Executive summary 5 Introduction: Russia’s cyber prowess – where, how and what for? 9 Nicu Popescu and Stanislav Secrieru Russia’s cyber posture Russia’s approach to cyber: the best defence is a good offence 15 1 Andrei Soldatov and Irina Borogan Russia’s trolling complex at home and abroad 25 2 Xymena Kurowska and Anatoly Reshetnikov Spotting the bear: credible attribution and Russian 3 operations in cyberspace 33 Sven Herpig and Thomas Reinhold Russia’s cyber diplomacy 43 4 Elena Chernenko Case studies of Russian cyberattacks The early days of cyberattacks: 5 the cases of Estonia, -
Teamster Families Lose Homes to Fires; Union Steps up Again
Joint Council 7 TEAMSTER Volume 62, Number 5 Serving members in Northern California, the Central Valley, and Northern Nevada December 2017/January 2018 David Larson is Teamster families lose homes interviewed on the local CBS station when he returned to see if there to fires; union steps up again was anything to salvage from his charred home in Glen Ellen. Member saves neighbor; both lose their homes Early in the morning on October 8, David Larson made one of his most important pick up and deliver- ies, saving his elderly, disabled neighbor. Just after midnight, the 25-year UPS veteran and member of Local 665 got a call from his dad who saw on the news that a fire was approaching his Glen Ellen home and moving quickly. The parking lot at Local 665’s Santa Rosa hall served as the staging area for donations for fire victims. Here, Teamsters and “I put on sneakers, looked out the back door, and community volunteers take a break from sorting goods to show their solidarity. saw a huge plume of smoke. I heard the police going down the road giving the evacuation notice. I knew After one of the worst natural disasters in 856 members had their homes destroyed, as did a California history, the Teamsters came together few members each from Locals 70, 137, 150, 315, and that this was the real thing,” he explained. again to help our brothers and sisters and to support 853. The fire had moved so swiftly that most evacu- As Larson made his plan to exit, he remembered their communities. -
Ethics of Hacktivism by Tennille W
Ethics of Hacktivism by Tennille W. Scott and O. Shawn Cupp Introduction Do hacktivists have ethics? Some would say yes and others suggest that no, they do not. Are there rules that those who engage in hacking follow or abide by during the conduct of their activities? Does the hacktivist maintain any semblance of actions described under the just war theory? If so, it would seem to be only in jus in bello1 or the just conduct in war, due to the perpetual nature of hacker activities and hacktivist operations. First, what is a hacktivist?2 They are defined as those who through the nonviolent use for political ends of “illegal or legally ambiguous digital tools” like website defacements, information theft, website parodies, denial-of-service attacks, virtual sit-ins, and virtual sabotage.3 This provides the basis for understanding more about where hacktivists’ motivations come from and what kinds of ideologies they may exhibit. Nevertheless, hacktivists must conform to some sort of norm. Based upon the nature of hacktivist activities, there must be a way to categorize or identify their overarching ethic. Understanding the motivation of this group is a huge undertaking because of the great variance and diversity of the people who make up the hacktivist collective. Unlike cyberterrorists, who typically belong to a hierarchical group structure and have a common cause, hacktivists are not bound in the same way, which makes them more dynamic and difficult to analyze. A prime example is the hacktivist group known as Anonymous and its spinoff group, Lulz Security (LulzSec), who eventually participated in different activities with different motives. -
Shallow Reservoir Plan Questioned
December 29, 2019 Lake Okeechobee News – merger of Okeechobee News, Clewiston News, Glades County Democrat, and The Sun 1 Vol. 110 No. 156 Sunday, December 29, 2019 $1.00 plus tax Shallow reservoir plan questioned 12,500-acre reservoir Engineers’ plan to build a shallow reservoir missioners responded to the letter Congress- with a 12,500-acre footprint in Glades County man Brian Mast sent to Mr. Bartlett. In the planned for north of lake just north of Lake Okeechobee would be a Dec. 11 letter, Rep. Mast recommended de- literally won’t hold water, waste of taxpayers’ money because it simply laying the northern storage project known as won’t hold water, according to a letter from the Lake Okeechobee Watershed Restoration say local landowners Okeechobee County Commission Chairman Project and concentrating available funding Terry Burroughs to South Florida Water on southern storage. By Katrina Elsken Management District Executive Director Drew In LOWRP, the U.S. Army Corps of Engi- neers proposes a shallow (with water up to Inspiring Lake Okeechobee News Bartlett. Okeechobee LOWRP 2 OKEECHOBEE — The U.S. Army Corps of The Okeechobee County Board of Com- See — Page 5 Girls soccer team off to best start in years By Richard Marion IRSC expands Lake Okeechobee News 7 nursing program OKEECHOBEE — The Okeechobee High School Lady Brahman varsity soccer team has Lake Levels capitalized on a dominating win streak during the month of December and jumped out to a 7-2-1 record halfway through their season. 13.01 feet They currently hold the No. 2 seed in their Last Year: 12.72 feet district behind Suncoast. -
Download the November 2019 Issue
November 2O19 3 Enforcement & Education 4 Best Practices 7 Being a Professional THE 8 Region 10 Spotlight 9 Partner Spotlight: FMCSA 10 From the Bench 11 Awards & Events 12 Traffic Safety Calendar LELLaw Enforcement Improving Traffic Safety Panelists discuss tools and tactics to strengthen law enforcement/SHSO relationships at the GHSA 2019 Annual Meeting. From left: Darrin Grondel, Director, Washington Traffic Safety Commission; GHSA consultant Tom Gianni; National LEL Program Manager Tim Burrows; Greg Fredericksen, Regional Administrator, NHTSA Region 10; Amy Davey, Administrator, Nevada Office of Traffic Safety; and Oro Valley (AZ) Police Department Chief Daniel Sharp. Partners in Safety A new toolkit from the Governors Highway Safety Association (GHSA) will help strengthen interactions between State Highway Safety Offices (SHSOs) and law enforcement. By Amadie Hart The project LAW ENFORCEMENT IS A CRITICAL PARTNER IN EF- the scope of the problem. Among the issues identi- first kicked forts to make our roadways safer, but too often the fied were a lack of motivation and interest within law off in 2017 connections between law enforcement agencies enforcement leadership to prioritize traffic safety with a series and the SHSO are weak or non-existent. A set of among numerous competing priorities, law enforce- of interviews tools developed by GHSA, under contract with the ment leadership turnover and resource challenges in to determine National Highway Traffic Safety Administration law enforcement agencies (staffing and funding). the scope -
ABSTRACT the Rhetorical Construction of Hacktivism
ABSTRACT The Rhetorical Construction of Hacktivism: Analyzing the Anonymous Care Package Heather Suzanne Woods, M.A. Thesis Chairperson: Leslie A. Hahner, Ph.D. This thesis uncovers the ways in which Anonymous, a non-hierarchical, decentralized online collective, maintains and alters the notion of hacktivism to recruit new participants and alter public perception. I employ a critical rhetorical lens to an Anonymous-produced and –disseminated artifact, the Anonymous Care Package, a collection of digital how-to files. After situating Anonymous within the broader narrative of hacking and activism, this thesis demonstrates how the Care Package can be used to constitute a hacktivist identity. Further, by extending hacktivism from its purely technological roots to a larger audience, the Anonymous Care Package lowers the barrier for participation and invites action on behalf of would-be members. Together, the contents of the Care Package help constitute an identity for Anonymous hacktivists who are then encouraged to take action as cyberactivists. The Rhetorical Construction of Hacktivism: Analyzing the Anonymous Care Package by Heather Suzanne Woods, B.A. A Thesis Approved by the Department of Communication David W. Schlueter, Ph.D., Chairperson Submitted to the Graduate Faculty of Baylor University in Partial Fulfillment of the Requirements for the Degree of Master of Arts Approved by the Thesis Committee Leslie A. Hahner, Ph.D., Chairperson Martin J. Medhurst, Ph.D. James M. SoRelle, Ph.D. Accepted by the Graduate School May 2013 J. Larry Lyon, Ph.D., Dean Page bearing signatures is kept on file in the Graduate School Copyright © 2013 by Heather Suzanne Woods All rights reserved TABLE OF CONTENTS LIST OF FIGURES ........................................................................................................................ -
Many Changes in Teaching Staff War Model Fair at MSC Sept. 7
LEDGER UP and ENTRIES Being a Collection of Varioiu Topics of Local and FIFTIETH YEAR LOWELL, MICHIGAN, AUGUST 20, 1942 No. 15 General Interest AMERICA CTARTS ATTACK Local Farm Hand AMERICAN people, during Many Changes in Drowns in River Everything AO Set for the the paat eight months, have News of Our Boys suffered the moat disaatroue ex- Funeral services were held on perience of defeat they ever knew Monday at the Roth Chapel for Kent County 4-H Club Fair In their history. One of the valued Teaching Staff Frank F. How, 48, who was drown- With the U.S. Rag possessions, the great Philippine ed late Saturday in Grand river Islands, was conquered by a School Officials Solving and the body was taken to Midland Horse Show and Other New Features, Amusements, Mr. and Mrs. Frank Schwacha treacherous enemy. Our people and for burial. Many Problems have just received a letter from Ionia Free Fair ends this week their allies were driven from one Mr. How had worked on a num- Races, Games, Contests, Exhibits, Etc. The Board of Education met In a ber of farms in this vicinity and their son Stanley (Bob, to you), Saturday night. It's a first claac posiiion to the next, and forced Kent County 4-H Club Fair—bigger and better than ever—will open By K. K. Vlnlng long session on Monday and was of late had resided in Lowell with who has been with the A. E. F. in show. to constantly retreat and give up. at Recreation Park, Lowell, next week Wednesday and continue confronted by many problems. -
South Central Regional Safety Coalition Quarterly Meeting
South Central Regional Safety Coalition Quarterly Meeting Our Mission is to reduce the human and economic toll on Louisiana's surface transportation system due to traffic crashes through widespread collaboration and an integrated 4E approach. Our Vision is to reach Destination Zero Deaths on Louisiana roadways February 6, 2019 Our Goal is to halve fatalities by 2030 10:00am – 12:00pm SCPDC, 5058 West Main Street Houma, LA 70364 10:00 am Welcome F. Besson Prayer TBA Pledge of Allegiance TBA 10:05 am Introductions ALL 10:10 am 1. Approval of the November 1, 2018 Meeting Minutes (p.1) Motion Needed 10:15 am 2. LADOTD Safety Update Jessica Deville/L. Riggs am 10:20 am 3. Brief Explanation of Strategies, Data & Deliverables (p.5) C. Parker 10:25 am 4. Impaired Driving (ID) 2019 Work Plan (p.7) D. Foreman/T. Colombel a. Approve Plan & Appoint Action Step Leaders 10:40 am 5. Distracted Driving (DD) 2019 Work Plan (p.19) D. Poche a. Appoint Co-Leader b. Approve Plan & Appoint Action Step Leaders 10:55 am 6. Occupant Protection (OP) 2019 Work Plan (p.33) R. Dantin/N.Soudelier/L. Giroir/J. VaNetta a. Approve Plan & Appoint Action Step Leaders 11:10 am 7. Young Drivers (ID) 2019 Work Plan (p.43) J. LaGrange/D. Duplantis a. Approve Plan & Appoint Action Step Leaders 11:25 am 8. Partner Reports ALL 11:40 am 9. Stay Informed C. Parker a. 2019 LA Safety Calendar & SCRSC Meetings b. South Central Bike Ped Safety Plan S. Bruning c. Brownfields Program L. -
Chapter 1 Introduction: Into the World of Hacktivism
Chapter 1 Introduction: Into the world of hacktivism January 1997: Visitors to www.plannedparenthood.com are greeted with the words, “Welcome to the Planned Parenthood Home Page!” above an ad for the anti-abortion book, “The Cost of Abortion.” The web site is operated not by Planned Parenthood, but by anti- abortion activist Richard Bucci. April 1998: Visitors to Mexican President Zedillo’s web page find that the site has slowed to a crawl. A “virtual sit-in” that has overwhelmed the web site with traffic, in an action aimed at drawing attention to the Zapatista rebellion. June 2000: Visitors to nike.com find themselves reading information about the problems of global capitalism. Nike’s web site has been redirected to the web site of s11, an anti- globalization group. September 2001: Visitors to the web site of Iran’s Ministry of the Interior are met with a picture of Osama bin Laden, and the caption “Osama die.” The web site’s defacers say that they are “outraged at the acts of terrorism and such which are taking place in this day in [sic] age.” 1 February 2003: Chinese web surfers can visit censored web sites like CNN, NPR, and Playboy. A new software tool lets surfers illegally circumvent China’s Internet firewall. Across the political spectrum and around the world, incidents like these have emerged to spawn a new entry into the political lexicon: hacktivism. Commonly defined as the marriage of political activism and computer hacking (Denning 1999; National Infrastructure Protection Center 2001), hacktivism combines the transgressive politics of 1 One dilemma in reproducing the many quotations from web sites, e-mails, and online chats that are contained in this dissertation is that Internet communications tend to be more relaxed about grammar and spelling. -
PP Nov 2015 Vol 7 Issue 6 Pages:Layout 2
PREVENTIONPRESS Printed by the Howell Municipal Alliance • 2015 • Volume 7 • Issue 6 The Howell Alliance: Building a stronger community for a better tomorrow through prevention, education, and awareness. IN THE NEWS On the Back: Holiday Fun, Holiday Danger: Stay Safe This Season Meet Howell Township’s New Chief of Police, Andrew Kudrick, Jr. In July, Chief Andrew Kudrick, Jr. well-equipped and have a civilian- assumed leadership of the Howell run safety fund to raise money and Township Police Department, taking buy equipment for extras. This the torch from retiring Chief Ronald greatly helps provide what we need Carter. Chief Kudrick, a lifelong to keep our schools and officers Howell resident, worked his way up safe.” through the ranks of the department, starting as a police cadet at age 16 Howell’s police officers are proactive before becoming a 9-1-1 dispatcher, and visible throughout the community, a police officer, and department addressing and heading off potential leader in multiple capacities. During issues before problems arise. The his decades with the Howell Howell Police Department also has a Township Police Department, Chief dedicated crime suppression unit with Kudrick has worked in just about highly trained, experienced officers every department and at every level. focused primarily on narcotics and “I have been with the Howell police overdose death investigations. Howell force for over 21 years, and I still has several major highways such as have the same passion for serving Route 9 and I-195 running through, my community today as I did when I linking it to many cities known to have first started out,” comments Chief large drug distribution networks. -
Hacktivism, Anonymous & a New Breed of Protest in a Networked World
HACKTIVISM, ANONYMOUS & A NEW BREED OF PROTEST IN A NETWORKED WORLD Noah C.N. Hampson Introduction Early on the morning of November 30, 2010, WikiLeaks.org came under assault by a hacker known as ‚th3j35t3r‛ (The Jester).1 By launching what is known as a denial of service (DoS) attack with soft- ware of his own invention, The Jester overwhelmed WikiLeaks’ serv- ers with requests for information.2 WikiLeaks.org soon crashed, and remained down for over a day.3 Days before, WikiLeaks made interna- tional headlines by posting on its website roughly 250,000 classified documents stolen from the U.S. government.4 On his Twitter feed, The Jester claimed credit: ‚www.wikileaks.org — TANGO DOWN — for attempting to endanger the lives of our troops, ‘other assets’ & foreign relations #wikileaks #fail‛.5 To get its web site back online, WikiLeaks promptly switched hosting providers and began renting bandwidth from Amazon.com.6 DoS and other attacks against WikiLeaks continued, but were unsuc- cessful.7 Shortly thereafter, however, Amazon ousted WikiLeaks from 1 Sean-Paul Correll, ‘Tis the Season of DDoS – WikiLeaks Edition, PandaLabs Blog (Dec. 4, 2010), http://pandalabs.pandasecurity.com/tis-the-season-of-ddos-wikileaks-editio/. 2 See Neil J. Rubenkind, WikiLeaks Attack: Not the First by th3j35t3r, PC (Nov. 29, 2010), http://www.pcmag.com/article2/0,2817,2373559,00.asp 3 See Correll, supra note 1. 4 See Scott Shane & Andrew W. Lehren, Leaked Cables Offer Raw Look at U.S. Diplomacy, N.Y. Times, Nov. 29, 2010, at A1, available at http://www.nytimes.com/2010/11/29/world/29cables.html.