Saturday, April 2, 2016

Week 3 - Target Selection?


 Hacktivism:  a label associated with movement of people that use their hacking/cracking know-how to carry out their personal view of justice.

Purpose: The purpose of this blog is to identify who fits within the hacktivist label, and how do they affect professional/personal internet interactions?

Today's Topic: How do hacktivists choose their target? When they choose a target what is the typical information targeted?  

All hacktivists are out there wanting to accomplish something that hits them personally. They are not your mercenaries that are contracted to perform tasks and activities. They are out there doing something themselves in response to something they are against. How do they choose their targets? They look for what offends them, and focus on knocking them off of the playing field. Lately, it seems that most of the media centered attacks are honed in on political scandals, freedom from oppression, and freedom of information. In most cases, these guys and gals are trying to help investigate those that were put into a position of power over the masses that resorted to greed instead of helping others.

This then focuses on the type of information they are after. When all is said and done, they alter or publish the information that they can get their hands on. For instance, the last couple FBI/CIA directors have had their personal emails, addresses, calendars dumped on the internet because that is the information that the hacktivist could get their hands on. I am sure that they would have dumped other vital information if it would help with the success of their vision. Other instances focus on official documentation that proves someone is guilty or lying on a court stand. For instance, when Edward Snowden provided documentation that several high officials in the intelligence community lied. This information helped him prove his point that the government was not doing what he wanted. While he was a whistle-blower, he was a hacktivist in his own right. He had the credentials to perform several insider hacking tricks to steal information and disclose it to those who did not have a need to know.



Articles to check out:




Future Items of Interest:
-Is hacktivism a good thing?
-Is hacktivism legal?
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?

No comments:

Post a Comment