Modern scholars have in the recent decades engaged in the controversial debate on the actual classification of the group Anonymous. Some scholars classify the group as trolls while other associates it with hackers groups. As defined, hackers are individuals or groups that search and exploit the computer system weakness (Messmer 65). In most instances, hackers engage in discouraging and unappealing activities for multiple reasons including challenging the existing systems, protesting against the prevailing rules and regulations, and for profit making. On the other hand, trolls are groups of individuals who engage in the process of sowing discord on the internet through instigating arguments that aim at upsetting community members and leaders (Keith 11). Trolls are also popular for posting off-topic, extraneous, and inflammatory information on the internet. Although hackers and trolls are the main actors in the current threatening cyber crimes, the two groups have varying reasons for abusing the existing technology. Moreover, despite the existence of detailed and intensive strategies to address the two groups of crime, the actors have been outshining the global policy implementers and formulators in numerous occasions (Messmer 65). However, based on the available evidence, the Anonymous group is more of a hacker group than a troll group.
Historically, the Anonymous has been engaging in activities that qualifies the group as hacker group as opposed to troll organisation. The group began its operation on December 2010 by attacking the MasterCard for blocking the Wiki Leaks website donations (Coleman 1). In January 2011, the Anonymous group attack the Tunisian government website for using illegal means against protesters. In February...
... middle of paper ...
...tid=45049
Keith By. Around the World, Hackers are Drawn to `Honeypots' --- Cybersleuths Study the Web-Site Invaders at Work, Develop Countermeasures. vol. No.1,(2000). Wall Street Journal, 8th May 2014. Web:
Messmer, Ellen. "'Decoy Nets' Gain Backers in Battle Against Hackers." vol.18, no.10 (2001) 1-66. Network World 8th May 2014. Web: http://search.proquest.com/business/docview/215973549/475BF353A3C04828PQ/8?a ccountid=45049
Norton, Quinn. Inside Anonymous, Wired ProQuest vol.1, no. 3,(2013). 8th May 2014. Web: http://search.proquest.com/docview/1027765513?accountid=13044
Phillips, Whitney. The House That Fox Built: Anonymous, Spectacle, and Cycles of Amplification.Television & New Media vol. 1, no. 14, (2013), 494-509. 8th May 2014. Web: https://scholarsbank.uoregon.edu/xmlui/bitstream/handle/1794/12204/phillips_houset hatfoxbuilt_2012.pdf?sequence=1
In the essay “Where Anonymity Breeds Contempt” the author Julie Zhou demonstrates the negative impact Anonymity in the internet has had on human beings. Following with a convincing argument for unmasking these “trolls” of the internet.
Our generation is the first to travel within cyberspace, a virtual world that exists with all the computers that form the global network. For most people today, cyberspace is still a bewildering and alien place. How computers work and how they affect our lives is still a mystery to all but the experts, but expertise doesn't necessarily guarantee morality. Originally the word hacker meant computer enthusiasts but now that the internet has revealed its potential for destruction and profit the hacker has become the outlaw of cyberspace. Not only do hackers commit crimes that cost millions of dollars, they also publicize their illegal techniques on the net where innocent minds can find them and be seduced by the allure of power and money.
“We are #Anonymous. We are Legion. We do not forgive. We do not forget #ExpectUs #MillionMaskMarch #OpVendetta #UK”. That message is from the many tweets off of Twitter that the group Anonymous. That message has been one of their many slogans. In Anonymous’ case how do you have an all-encompassing slogan when you have no structure or hierarchy? When you are just a loosely aligned group of internet users how do you become an international group that is an example of an alienated counter-culture Anonymous is many things. Lots of different people have their opinions on them. One thing for sure is that they use Twitter to voice their alienation. The alienation I believe is the strongest is the feeling and belief that they are a counter-culture. They think they are exposing the corruption of the majority and the societal system. Anonymous thinks they are the moral opposite of that corruption. However, the group has many battles to fight. There are many who mock the group. To find research on the group, you have to go to nontraditional media sources often including their home website 4chan. The alienation felt by Anonymous is that of a counter-culture. First however, you must learn what is Anonymous is, how they started, and what they did. That may answer where they will go next.
On September 7, 2012, a 15-year-old girl named Amanda Todd posted an eight-minute-long video describing her struggle with online bullying. In the video, Todd describes how her tormentor had used a photo in which she flashed her breasts as a tool for extortion. Ultimately, the stress was too much and on October 12, 2012, Amanda Todd committed suicide. Her suicide drew mass attention from both the mainstream media and an online following. In addition, her suicide brought to light a growing online problem that we’ve now termed “sextortion”. To avenge the suicide of Todd, the hacktivist group Anonymous provided details online of a man they claimed was responsible for the harassment of Todd that led to her suicide. The act drew praise from the online community but also quick condemnation by law enforcement because of a lack of due process. In the end, the person named by Anonymous was never linked to Amanda Todd or her suicide.
Technology has provided our society with numerous innovations that have been created to improve the quality of life on a daily basis. One such innovation is the Internet. The access to a wide variety of information is perhaps the most valuable tool, as well as the most important tool, that we have entering the twenty-first century. There are virtually no limits on how much can be achieved through the use of the Internet. This is not, however, necessarily a good thing. Most people find that offensive material such as child pornography and hate-related propaganda can be viewed by people too easily via the Internet. While child pornography is a detestable subject, it does not have the sort of appeal that a hate group website does in that there are stricter guidelines preventing individuals from attaining child pornography material from the Internet. These stricter guidelines include the Communications Decency Act (1995), which forbids the use of the Internet for such purposes as attaining material of a child pornographic nature (Wolf, 2000). This law can also be used to monitor the hate group websites, but since the law is too broad, it is rarely held up in court. The hate group websites do, however, have a large enough following that there is legislation being formed to specifically target the material on the sites. Despite the highly offensive nature of hate group websites, the sites should not be censored because the right to free speech must be preserved. In this paper we will define what is considered to be hateful content; why this hateful content should be protected; what else can be done to monitor this material on the Internet; and when are the people cr...
Today, many people invest much of their time online whether it is to read the news, be on social media or check bank accounts, but little do they realize there is no control and no security online. On January 11, 2017, Thomas L. Friedman’s New York Times article, “Online and Scared”, argues how cyberspace lacks control and regulations and therefore it makes the internet a scary place for many people. Friedman starts by alarming his audience of a recent event, telling some personal opinions, and backing up his claims with many examples and reliable sources. First, Friedman began his article by reminding the audience of winter 2016 about the technology meeting with Vladimir Putin, Donald Trump, Mark Zuckerberg, and Jeff Bezos. As these men are very powerful, they have a huge impact on technology and the world.
Although Anonymous operates effectively and consciously, no organization fighting for civil disobedience is always perfect, but the actions they have taken that are seen as controversial are vastly different than other organizations that are considered to be more radical. One of the controversial actions was when protests were going on at Ferguson and the police officers took off their name badges so that protesters could not identify them. People viewed that as the police being guilty and trying to hide from any wrongdoing, so Anonymous uploaded the information of the police officers so that protestors could identify them. The problem with this is that many police officers did not have their name badges on in order to protect them and their
With the way the world is shaping technology and the cyber world are becoming larger each day. Things started to change around the year 2003 when the (would be) leading role in the cyber security world would form. Anonymous has been shaping itself more each day to the get the brand of being internet anarchists and wearing the signature Guy Fawkes masks. Some even dub the group as the protectors of the internet fighting crime where they believe is morally right. The anarchist view of Anon was that no one had any sort of control over it and anyone and everyone could claim to be a part of Anon. There are no written rules when it comes to Anonymous but the idea is to collectively promote freedom of speech, try and combat government control where they deem
(Schwabach 1). The Clipper Chip and programs like it are what the internet needs protection from, and that’s why Anonymous exists: to protect those unable to do so from oppressive governments. This was first exhibited when, “Anonymous gained prominence worldwide as a hacktivist group for Project Chanology, an initiative that targeted the Church of Scientology for conduct it believed constituted internet censorship” (Pandmanabhan 4). Through this first act of censorship prevention, Anonymous sealed their fate as protectors of the peace on the internet to millions of users. With a rallying cry
The ability of Anonymous to be everything and anything is their power. It is not individuals, it‘s a collective. This is what makes them as strong and powerful as they are, and gives them the
As much as Anonymous tries to portray themselves as the protector they are the perfect example of a cyberbully, whose goal is to intimidate, threaten, and cause
Ethics in Hacktivism: Moral and Legal Considerations Jamie Uy Hacktivism is the nonviolent use of illegal or legally ambiguous digital tools in pursuit of political ends, or, as defined by British technologist and writer, Ben Hammersley, “the explicit pursuit of political activism via the prankster methods that characterise the tabloid press’s typical hacker.” The term ‘hacktivism' is often applied to suggest that acts that would otherwise be classified as cybercrime or terrorism such as data theft, mail bombs, viruses, worms, and distributed denial of service attacks should be treated as acts of civil disobedience and political protest due to the hacker’s intentions. But is hacktivism a genuine form of activism, or glorified cybercrime?
Anonymous Culture In order to more deeply understand the motives and psychology behind the group of 'Hackers, pranksters and activists' that call themselves Anonymous, we must first understand the culture that online anonymity has created. “Before Facebook and Twitter became avenues for advertising ourselves and our careers, before Internet dating became not only acceptable but preferable to the alternatives, before so much of our social and professional lives came to be conducted on the Web, social spaces of a different kind existed online.” the people who populated the web felt more at home in communities “built around semi-anonymous, real-time, written discourse.” (Anonymity as Culture Treatise, David Auerbach)
The 90's internet boom gave rise to new ways of writing in through access to cyberspace. What used to be printed or handwritten on physical surfaces such as paper, cardboard, or bulletin boards has changed to 0's and 1's, bits and bytes of digitized information that can be displayed thru the projections of computer screens. Moreover, the internet has made the process of publishing one's works, writing letters, or chatting with one another much easier and convenient for everyone around the globe. The internet became a universal tool, giving much freedom and flexibility to the users; it gave them opportunity to deliver their thoughts with little or no restrictions. Since it's impossible to regulate all cyber-activities, internet users are often unrestricted by the normal laws or authorities that would set boundaries around the various online transactions. More importantly, the fact that a net user can take on different identities in cyberspace brings about several ethical and social issues. These anonymous and unrestrictive characteristics of cyberspace often permite abusive users to easily involve themselves in serious cybercrimes such as cyberstalking, cyber-rape, and cyber-harassment through chatting services, emails, cyber communities, and other online communication.
Cybercrime is a global issue plaguing the world. The dictionary defines cybercrime as “crime conducted via the Internet or some other computer network”(Merriam-Webster). The definition remains very broad because the word “cyber” is defined as “relating to the culture of computers, information technology, and virtual reality.” Due to the growing number of people gaining access to the internet, rapid development of technology, and the globalization of the world, more of the world population is becoming susceptible to involvement in cybercrime – whether it be as a victim or a criminal. Cybercrime involves different levels of the world on both the victim and criminal side, from an individual citizen, to small groups, businesses, and the government, to the countries of the world.