Saturday, April 23, 2016

Week 6 - What are the repercussions of being a hacktivist?


 Hacktivism:  a label associated with movement of people that use their hacking/cracking know-how to carry out their personal view of justice.

Purpose: The purpose of this blog is to identify who fits within the hacktivist label, and how do they affect professional/personal internet interactions?

Today's Topic: What can happen is someone is caught being a hacktivist?

There are five main categories when it comes to getting caught doing hacker-like activity that can get you in prison. The five categories are mainly stacked up in regards to how much damage you cause to the victim.

Computer Crime 1st degree: If you make more than $10,000 in damages then you can go to prison for up to 20 years and pay up to $15,000 in just fines.

Computer Crime 2nd degree: If you make more than $5,000 in damages then you can go to prison for up to 10 years and pay up to $10,000 in just fines.

Computer Crime 3rd degree: If you make more than $1,000 in damages then you can go to prison for up to 5years and pay up to $5,000 in just fines.

Computer Crime 4th degree: If you make more than $500 in damages then you can go to prison for up to 1 years and pay up to $2,000 in just fines.

Computer Crime 1st degree: If make any damage then you can go to prison for up to 6 months and pay up to $1,000 in just fines.


https://www.cga.ct.gov/2012/rpt/2012-R-0254.htm



Future Items of Interest:
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?

Saturday, April 16, 2016

Week 5 - Ways Hacktivism is performed globally.


 Hacktivism:  a label associated with movement of people that use their hacking/cracking know-how to carry out their personal view of justice.

Purpose: The purpose of this blog is to identify who fits within the hacktivist label, and how do they affect professional/personal internet interactions?

Today's Topic: Different Types of Hacktivism

Every since the start of oppressive movements, rebellions have formed. Just like the gossip smoke-pits of the 70s have turned into online forums, I feel that this generations rebellious activity is a tad more sophisticated than those from our past that resorted to torching barns! Instead they turn to another plain, and use the internet to conduct their activities. This post will address the several methods we see them use to accomplish their heinous 'crimes.'

1. Hacktivist activities require a method to communicate with the world. Needing a real-world cloak of invisibility to spread their thoughts and ideas or even talk to their fellow, they turn to using anonymous forums. Much like this, but masking who they are ...... obviously im not part of their world, since I have my name on the front page!

2. Hacktivities also tend to spawn from their governments oppressive rules. For instance, the USA does not permit the distribution of copyright files. Using VPNs and other encryption services allow them to hide their file transfers from prying eyes.

3. Standing up servers that preach the good word... Of things deemed illegal is difficult to do when the government has gone through certain lengths to ensure those sites are blocked. I'm not saying that the Dark Web is a good place, but some sites that publish news articles that could paint targets on reports / whistle blowers is something that may be needed form time to time. Using the TOR network allow access to those sites. Since those sites require  a specific top-level domain just to view them, this helps those folks get around certain cyber-fences.



Future Items of Interest:
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?

Sunday, April 10, 2016

Week 4 - Is hacktivism a good thing?


 Hacktivism:  a label associated with movement of people that use their hacking/cracking know-how to carry out their personal view of justice.

Purpose: The purpose of this blog is to identify who fits within the hacktivist label, and how do they affect professional/personal internet interactions?

Today's Topic: Do I think that hacktivism is a good thing?

"Beauty is in the eye of the beholder" is a great way to assess today's question. Hacktivism is bad, due to the means in which the movement is carried out. By definition, the hacktivist is vying to overcome a system that they are not permitted to access. The way in which they gain access itself is typically considered illegal. Then the actions they perform afterwards is also usually highly illegal. For instance, corrupting file systems and destroying intellectual or private property is the next level of virtual vandalism. Or in another example, stealing information and then distributing it regardless of its classification is also bad. But the question is whether or not this is a good thing.

This boils down to the intention of the hooded figure behind the screen and the opinion of the target audience. From the perspective of the victim, their secrets or information was just improperly disclosed. Perhaps they were trying to fix a problem or cover up a mistake. To them, it was solely their right to handle their information, not the hacktivist's. However, the target audience may have wanted this information to prove someone else's innocence. Perhaps to see the true colors of a political candidate .For them, this information is something that should have been public because it assists their goals.



Future Items of Interest:
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?

Saturday, April 2, 2016

Week 3 - Target Selection?


 Hacktivism:  a label associated with movement of people that use their hacking/cracking know-how to carry out their personal view of justice.

Purpose: The purpose of this blog is to identify who fits within the hacktivist label, and how do they affect professional/personal internet interactions?

Today's Topic: How do hacktivists choose their target? When they choose a target what is the typical information targeted?  

All hacktivists are out there wanting to accomplish something that hits them personally. They are not your mercenaries that are contracted to perform tasks and activities. They are out there doing something themselves in response to something they are against. How do they choose their targets? They look for what offends them, and focus on knocking them off of the playing field. Lately, it seems that most of the media centered attacks are honed in on political scandals, freedom from oppression, and freedom of information. In most cases, these guys and gals are trying to help investigate those that were put into a position of power over the masses that resorted to greed instead of helping others.

This then focuses on the type of information they are after. When all is said and done, they alter or publish the information that they can get their hands on. For instance, the last couple FBI/CIA directors have had their personal emails, addresses, calendars dumped on the internet because that is the information that the hacktivist could get their hands on. I am sure that they would have dumped other vital information if it would help with the success of their vision. Other instances focus on official documentation that proves someone is guilty or lying on a court stand. For instance, when Edward Snowden provided documentation that several high officials in the intelligence community lied. This information helped him prove his point that the government was not doing what he wanted. While he was a whistle-blower, he was a hacktivist in his own right. He had the credentials to perform several insider hacking tricks to steal information and disclose it to those who did not have a need to know.



Articles to check out:




Future Items of Interest:
-Is hacktivism a good thing?
-Is hacktivism legal?
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?