Week 5 - Ways Hacktivism is performed globally.
Hacktivism: a label associated with movement of people
that use their hacking/cracking know-how to carry out their personal
view of justice.
Purpose: The purpose of
this blog is to identify who fits within the hacktivist label, and how
do they affect professional/personal internet interactions?
Today's Topic: Different Types of Hacktivism
Every since the start of oppressive movements, rebellions have formed. Just like the gossip smoke-pits of the 70s have turned into online forums, I feel that this generations rebellious activity is a tad more sophisticated than those from our past that resorted to torching barns! Instead they turn to another plain, and use the internet to conduct their activities. This post will address the several methods we see them use to accomplish their heinous 'crimes.'
1. Hacktivist activities require a method to communicate with the world. Needing a real-world cloak of invisibility to spread their thoughts and ideas or even talk to their fellow, they turn to using anonymous forums. Much like this, but masking who they are ...... obviously im not part of their world, since I have my name on the front page!
2. Hacktivities also tend to spawn from their governments oppressive rules. For instance, the USA does not permit the distribution of copyright files. Using VPNs and other encryption services allow them to hide their file transfers from prying eyes.
3. Standing up servers that preach the good word... Of things deemed illegal is difficult to do when the government has gone through certain lengths to ensure those sites are blocked. I'm not saying that the Dark Web is a good place, but some sites that publish news articles that could paint targets on reports / whistle blowers is something that may be needed form time to time. Using the TOR network allow access to those sites. Since those sites require a specific top-level domain just to view them, this helps those folks get around certain cyber-fences.
Future Items of Interest:
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?
No comments:
Post a Comment