Righteous Devils: Unpacking the Ethics of Hacktivism
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
How We Became Legion: Burke's Identification and Anonymous By
How We Became Legion: Burke's Identification and Anonymous by Débora Cristina Ramos Antunes da Silva A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Master of Arts in English - Rhetoric and Communication Design Waterloo, Ontario, Canada, 2013 © Débora Cristina Ramos Antunes da Silva 2013 I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. I understand that my thesis may be made electronically available to the public. ii Abstract This thesis presents a study of how identification, according to Kenneth Burke's theory, can be observed in the media-related practices promoted by the cyber-activist collective Anonymous. Identification is the capacity of community-building through the use of shared interests. Burke affirms that, as human beings are essentially social, identification is the very aim of any human interaction. Cyber-activism deeply relies on this capacity to promote and legitimise its campaigns. In the case of Anonymous, the collective became extremely popular and is now a frequent presence even in street protests, usually organised online, around the world. Here, I argue that this power was possible through the use of identification, which helped attract a large number of individuals to the collective. Anonymous was particularly skilled in its capacity to create an ideology for each campaign, which worked well to set up a perfect enemy who should be fought against by any people, despite their demographic or social status. Other forms of identification were also present and important. -
American Behavioral Scientist
American Behavioral Scientist http://abs.sagepub.com/ ''LOIC Will Tear Us Apart'': The Impact of Tool Design and Media Portrayals in the Success of Activist DDOS Attacks Molly Sauter American Behavioral Scientist published online 15 March 2013 DOI: 10.1177/0002764213479370 The online version of this article can be found at: http://abs.sagepub.com/content/early/2013/03/15/0002764213479370 Published by: http://www.sagepublications.com Additional services and information for American Behavioral Scientist can be found at: Email Alerts: http://abs.sagepub.com/cgi/alerts Subscriptions: http://abs.sagepub.com/subscriptions Reprints: http://www.sagepub.com/journalsReprints.nav Permissions: http://www.sagepub.com/journalsPermissions.nav >> OnlineFirst Version of Record - Mar 15, 2013 What is This? Downloaded from abs.sagepub.com at MASSACHUSETTS INST OF TECH on March 17, 2013 ABSXXX10.1177/0002764213479370American Behavioral ScientistSauter 479370research-article2013 Article American Behavioral Scientist XX(X) 1 –25 “LOIC Will Tear Us Apart”: © 2013 SAGE Publications Reprints and permissions: The Impact of Tool Design sagepub.com/journalsPermissions.nav DOI: 10.1177/0002764213479370 and Media Portrayals in the abs.sagepub.com Success of Activist DDOS Attacks Molly Sauter1 Abstract This article explores the role of tool design and media coverage in the relative success of Operation Payback and earlier activist distributed denial-of-service (DDOS) actions. Through a close reading of changes in the tool’s interface and functionality across several iterations, the article considers the evolution of the Low Orbit Ion Cannon (LOIC) DDOS tool, from one that appealed to a small, inwardly focused community to one that engaged with a larger population. -
The Masked Avengers: How Anonymous Incited Online
A REPORTER AT LARGE | SEPTEMBER 8, 2014 ISSUE The Masked Avengers How Anonymous incited online vigilantism from Tunisia to Ferguson. BY DAVID KUSHNER Anyone can join Anonymous simply by claiming affiliation. An anthropologist says that participants “remain subordinate to a focus on the epic win—and, especially, the lulz.” n the mid-nineteen-seventies, when Christopher Doyon was a child in rural Maine, he spent Ihours chatting with strangers on CB radio. His handle was Big Red, for his hair. Transmitters lined the walls of his bedroom, and he persuaded his father to attach two directional antennas to the roof of their house. CB radio was associated primarily with truck drivers, but Doyon and others used it to form the sort of virtual community that later appeared on the Internet, with self- selected nicknames, inside jokes, and an earnest desire to effect change. Doyon’s mother died when he was a child, and he and his younger sister were reared by their father, who they both say was physically abusive. Doyon found solace, and a sense of purpose, in the CB-radio community. He and his friends took turns monitoring the local emergency channel. One friend’s father bought a bubble light and affixed it to the roof of his car; when the boys heard a distress call from a stranded motorist, he’d drive them to the side of the highway. There wasn’t much they could do beyond offering to call 911, but the adventure made them feel heroic. Small and wiry, with a thick New England accent, Doyon was fascinated by “Star Trek” and Isaac Asimov novels. -
ABSTRACT the Rhetorical Construction of Hacktivism
ABSTRACT The Rhetorical Construction of Hacktivism: Analyzing the Anonymous Care Package Heather Suzanne Woods, M.A. Thesis Chairperson: Leslie A. Hahner, Ph.D. This thesis uncovers the ways in which Anonymous, a non-hierarchical, decentralized online collective, maintains and alters the notion of hacktivism to recruit new participants and alter public perception. I employ a critical rhetorical lens to an Anonymous-produced and –disseminated artifact, the Anonymous Care Package, a collection of digital how-to files. After situating Anonymous within the broader narrative of hacking and activism, this thesis demonstrates how the Care Package can be used to constitute a hacktivist identity. Further, by extending hacktivism from its purely technological roots to a larger audience, the Anonymous Care Package lowers the barrier for participation and invites action on behalf of would-be members. Together, the contents of the Care Package help constitute an identity for Anonymous hacktivists who are then encouraged to take action as cyberactivists. The Rhetorical Construction of Hacktivism: Analyzing the Anonymous Care Package by Heather Suzanne Woods, B.A. A Thesis Approved by the Department of Communication David W. Schlueter, Ph.D., Chairperson Submitted to the Graduate Faculty of Baylor University in Partial Fulfillment of the Requirements for the Degree of Master of Arts Approved by the Thesis Committee Leslie A. Hahner, Ph.D., Chairperson Martin J. Medhurst, Ph.D. James M. SoRelle, Ph.D. Accepted by the Graduate School May 2013 J. Larry Lyon, Ph.D., Dean Page bearing signatures is kept on file in the Graduate School Copyright © 2013 by Heather Suzanne Woods All rights reserved TABLE OF CONTENTS LIST OF FIGURES ........................................................................................................................ -
Hacker, Hoaxer, Whistleblower, Spy the Many Faces of Anonymous
hacker, hoaxer, whistleblower, spy the many faces of anonymous Gabriella Coleman London • New York Hacker Hoaxer Whistleblower 2015 PB 13-08-15.indd 3 8/13/2015 3:44:42 PM Epilogue: The State of Anonymous “I have grown to love secrecy. It seems to be the one thing that can make modern life mysterious or marvelous to us. The commonest thing is delightful if only one hides it.” Oscar Wilde “The political education of apolitical technical people is extra ordinary.” Julian Assange he period described in this book may seem to many to represent the pinnacle of Anonymous activity: their Tsupport role in the various movements that constituted the Arab Spring; the high-profile media attention garnered by the gutsy LulzSec and AntiSec hacks; the ever growing com- mitment to domestic social justice issues seen in engagements against rape culture and police brutality. Unsurprisingly, this impressive flurry of protest activity was met with similarly impressive law enforcement crackdowns. Throughout Europe, Asia, Australia, and the Americas, law enforcement officials detained over one hundred Anonymous activists—including many of the figures profiled in this book: Jeremy Hammond and John Borell in the United States, and Ryan Ackroyd and Mustafa Al-Bassam in the United Hacker Hoaxer Whistleblower 2015 PB 13-08-15.indd 401 8/13/2015 3:44:54 PM 402 hacker, hoaxer, whistleblower, spy Kingdom. Others arrested were geeky activists whose “crime” had been to simply channel a small portion of their computer resources toward DDoS campaigns organized by Anonymous in an effort to collectively shame financial organizations, such as PayPal when they caved to government pressure and terminated all services to the embattled whistleblowing organ- ization WikiLeaks. -
Cyber Attacks and Public Embarrassment
Excerpt from Introduction to Cyber-Warfare: A Multidisciplinary Approach (Shakarian, Shakarian, and Ruef) Cyber Attacks and Public Embarrassment: A Survey of Some Notable Hacks Jana Shakarian, Paulo Shakarian, and Andrew Ruef We hear it all too often in the media: an organization is attacked, its data, often containing personally identifying information, is made public, and a hacking group emerges to claim credit. In this excerpt, we discuss how such groups operate and describe the details of a few major cyber-attacks of this sort in the wider context of how they occurred. We feel that understanding how such groups have operated in the past will give organizations ideas of how to defend against them in the future. Hacking Group Modus Operandi: the Case of Anonymous "I think what is, important about Anonymous is that it works, I don't know how it works but it works" Australian Anon quoted in NineMSN, 05/08/20081 A video, mostly published on YouTube, announcing a new campaign kicked off many projects in the past. 2 Additionally, every “operation” (“AnonOp”) is declared beforehand on Twitter (@YourAnonNews, @Anon_Central), tumblr (youranonnews.tumblr.com) and first-hand Anonymous websites, such as anonnews.org and whyweprotest.net. Other commonly used outlets are Pastebin, Pirate Bay3 and Facebook (Anonymous News Network).4 Internet Relay Chats (IRC) and image boards, Internet forums, as well as wikis serve the purpose of online communication and coordinat ion. i These as well as the partyvan.info 5 hosted raid boards and IRCs as well as those run by AnonOps (anonops.ru, i Especially 4chan, 711 chan, Encyclopedia Dramatica, IRC channels, YouTube, and (supported) blogs (e.g. -
Hacker, Hoaxer, Whistleblower, Spy: the Story of Anonymous
hacker, hoaxer, whistleblower, spy hacker, hoaxer, whistleblower, spy the many faces of anonymous Gabriella Coleman London • New York First published by Verso 2014 © Gabriella Coleman 2014 The partial or total reproduction of this publication, in electronic form or otherwise, is consented to for noncommercial purposes, provided that the original copyright notice and this notice are included and the publisher and the source are clearly acknowledged. Any reproduction or use of all or a portion of this publication in exchange for financial consideration of any kind is prohibited without permission in writing from the publisher. The moral rights of the author have been asserted 1 3 5 7 9 10 8 6 4 2 Verso UK: 6 Meard Street, London W1F 0EG US: 20 Jay Street, Suite 1010, Brooklyn, NY 11201 www.versobooks.com Verso is the imprint of New Left Books ISBN-13: 978-1-78168-583-9 eISBN-13: 978-1-78168-584-6 (US) eISBN-13: 978-1-78168-689-8 (UK) British Library Cataloguing in Publication Data A catalogue record for this book is available from the British library Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the library of congress Typeset in Sabon by MJ & N Gavan, Truro, Cornwall Printed in the US by Maple Press Printed and bound in the UK by CPI Group Ltd, Croydon, CR0 4YY I dedicate this book to the legions behind Anonymous— those who have donned the mask in the past, those who still dare to take a stand today, and those who will surely rise again in the future. -
Digital Democracy and the Impact of Technology on Governance and Politics: New Globalized Practices
Digital Democracy and the Impact of Technology on Governance and Politics: New Globalized Practices Christina Akrivopoulou Democritus University of Thrace, Greece Nicolaos Garipidis Aristotle University of Thessaloniki, Greece Managing Director: Lindsay Johnston Editorial Director: Joel Gamon Book Production Manager: Jennifer Yoder Publishing Systems Analyst: Adrienne Freeland Development Editor: Monica Speca Assistant Acquisitions Editor: Kayla Wolfe Typesetter: Christina Henning Cover Design: Jason Mull Published in the United States of America by Information Science Reference (an imprint of IGI Global) 701 E. Chocolate Avenue Hershey PA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: [email protected] Web site: http://www.igi-global.com Copyright © 2013 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher. Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. Library of Congress Cataloging-in-Publication Data Digital democracy and the impact of technology on governance and politics: new globalized practices / Christina Akrivo- poulou and Nicolaos Garipidis, editors. p. cm. Includes bibliographical references and index. Summary: “This book brings together a detailed examination of the new ideas on electronic citizenship, electronic democracy, e-governance, and digital legitimacy, combining theory with the study of law and public policy”-- Provided by publisher. ISBN 978-1-4666-3637-8 -- ISBN 978-1-4666-3638-5 (ebook) -- ISBN 978-1-4666-3639-2 (print & perpetual access) 1. -
Cascades: the Anonymous Hack of Hbgary (Epilogue)
Case Study | 2016 | RELEASE 1.0 Cascades: The Anonymous Hack of HBGary (Epilogue) OPEN TECHNOLOGY INSTITUTE | @NEWAMERICA | CASCADES (Epilogue) 1 OPEN TECHNOLOGY INSTITUTE | @NEWAMERICA | CASCADES (Epilogue) 2 This case study was created as part of the Open Technology Institute’s (OTI) effort to create a curriculum focused on how digital technology is transforming public policy and governance. It is intended for use in a classroom setting. OPEN TECHNOLOGY INSTITUTE | @NEWAMERICA | CASCADES (Epilogue) 3 CASCADES On Friday, February 4, 2011, The Financial Times The Aftermath reported that Aaron Barr, then the CEO of HBGary In the weeks after the hack, things went from bad Federal, a company that sold IT security services to worse for Barr and his firm. At first, Barr tried to the federal government, had uncovered the to downplay his research on Anonymous; in an names of senior leaders in Anonymous, a interview several days after the attack, he told prominent hacktivist collective.1 With Barr Parmy Olson, a Forbes reporter and Anonymous planning to meet with the FBI on Monday, the expert, that the document the hacktivists had hacktivists swung into action over the weekend, focused on was “an old copy of [his] research” and exploiting a series of weaknesses in the company’s that he merely planned to meet with, not sell IT defenses to gain access to Barr’s e-mails and information to, the FBI.7 But the situation did not company papers (including a document die down. Barr soon canceled his presentation at containing Barr’s research on Anonymous). They the B-Sides security conference, and by mid- also penetrated the HBGary Federal website and February the entire HBGary delegation pulled out accessed the user database for Rootkit.com, a after the company’s booth was vandalized.8 (As website created by HBGary, Inc. -
Cascades: the Anonymous Hack of Hbgary (Part A)
Case Study | 2016 | RELEASE 1.0 Cascades: The Anonymous Hack of HBGary (Part A) OPEN TECHNOLOGY INSTITUTE | @NEWAMERICA | CASCADES (A) 1 OPEN TECHNOLOGY INSTITUTE | @NEWAMERICA | CASCADES (A) 2 This case study was created as part of the Open Technology Institute’s (OTI) effort to create a curriculum focused on how digital technology is transforming public policy and governance. It is intended for use in a classroom setting. OPEN TECHNOLOGY INSTITUTE | @NEWAMERICA | CASCADES (A) 3 CASCADES In January 2011, Aaron Barr thought he had research and plans in early February, Anonymous discovered a goldmine. And it could not come unleashed an attack that overwhelmed HBGary, 5 soon enough. Since becoming the CEO of HBGary Inc., Barr’s firm, and Barr himself. More Federal (a company that sold IT security services specifically, Anonymous—which as Coleman 6 to the federal government) in fall 2009, Barr had wrote, was “ready to rumble” after seeing The struggled to generate revenue, occasionally selling Financial Times piece—defaced the company’s “social media training[s]” to private firms but website, released tens of thousands of the failing to secure the large contracts he had company’s e-mails, bragged about deleting a predicted at the start of his tenure.1 Now he terabyte of the firm’s data, and took over Barr’s 7 believed that he had uncovered the key to Twitter account. The hackers posted doctored identifying the leaders of Anonymous, a collection images of Barr, released e-mails detailing his of hacktivists that had gained prominence for marital strife, and went so far as to publish Barr’s (among other things) carrying-out attacks against home address and social security number as well 8 several financial firms that had stopped processing as several tweets with extremely crude content. -
The Coming Swarm.Indb
Sauter, Molly. "LOIC will tear us apart: DDoS tool development and design." The Coming Swarm: DDoS Actions, Hacktivism, and Civil Disobedience on the Internet. New York: Bloomsbury Academic, 2014. 109–135. Bloomsbury Collections. Web. 24 Sep. 2021. <http:// dx.doi.org/10.5040/9781628926705.0012>. Downloaded from Bloomsbury Collections, www.bloomsburycollections.com, 24 September 2021, 12:53 UTC. Copyright © Molly Sauter 2014. You may share this work for non-commercial purposes only, provided you give attribution to the copyright holder and the publisher, and provide a link to the Creative Commons licence. CHAPTER SIX LOIC will tear us apart: DDoS tool development and design In activist DDoS actions, the tool used sets the first level of community, literally serving as the collective launch point for the action. Participants will often all use one tool or one of a family of tools recommended by the organizers. Though there have been several different tools used during these actions, some ad hoc, some more polished, the two most notable tools for activist DDoS actions have been the EDT ’ s FloodNet tool, and Anonymous ’ LOIC. Because both these tools were released open source, other groups in the case of FloodNet and participants within the Anonymous collective in the case of LOIC were able to progressively adapt these tools for the needs of any given action. This adaptability extended the life and influence of these tools past the initial actions they were developed for. Through being adopted and adapted by other groups, individuals, and actions, the successive versions of these tools act as a connective string of influence, as the technological affordances, design assumptions, specific functionalities, and interface choices impact each new action that uses them. -
Employing Expert Hackers to Combat Cyber Terrorism
Vanderbilt Journal of Entertainment & Technology Law Volume 15 Issue 1 Issue 1 - Fall 2012 Article 6 2012 Hacking for Lulzi: Employing Expert Hackers to Combat Cyber Terrorism Swathi Padmanabhan Follow this and additional works at: https://scholarship.law.vanderbilt.edu/jetlaw Part of the Computer Law Commons Recommended Citation Swathi Padmanabhan, Hacking for Lulzi: Employing Expert Hackers to Combat Cyber Terrorism, 15 Vanderbilt Journal of Entertainment and Technology Law 191 (2020) Available at: https://scholarship.law.vanderbilt.edu/jetlaw/vol15/iss1/6 This Note is brought to you for free and open access by Scholarship@Vanderbilt Law. It has been accepted for inclusion in Vanderbilt Journal of Entertainment & Technology Law by an authorized editor of Scholarship@Vanderbilt Law. For more information, please contact [email protected]. Hacking for Lulzi: Employing Expert Hackers to Combat Cyber Terrorism ABSTRACT Because hacking collectives Anonymous and LulzSec have routinely breached supposedly secure computer networks-including Visa, MasterCard, and the Central Intelligence Agency-the threat of cyber terrorism has become more prominent. Many US industries and companies depend on online communication and information storage. If terrorists compromise these capabilities, they could cripple the US economy and perhaps even cause widespread fatalities. Members of Anonymous and LulzSec lack the necessary intent to be prosecuted as cyber terrorists because they hack not to cause fear, but rather to create laughter. Their method of posting all necessary instructions and information regarding intended targets on online message boards could, however, serve as a model for terrorists seeking to cause harm. Indeed, the Anonymous and LulzSec model permits an unknown number of hackers to anonymously participate in attacks.