Skip to main content

Home/ OUANet308-2011/ Group items tagged Cyber

Rss Feed Group items tagged

Chris Johnson

Anonymous hackers take on the Church of Scientology - 13 views

You may like this article Keith http://www.news.com.au/technology/anonymous-vows-payback-for-sonys-case-against-playstation-3-hackers/story-e6frfrnr-1226033974414 The Chriso

anonymous hackers DoS Cyber Crime Net308oua-2011

Josh van de Scheur

Anonymous Hamburg: Tools to help the Revolutions Part II - Online resistance cell organ... - 1 views

  •  
    This article presents tools and strategies for setting up collaborative networks in the form of localized resistance 'cells'. Anonymous use this system of local and semi-independent networks as storage points for resources and to maintain its global communications beyond larger web services. It is these "autonomously acting local cells" that allow Anonymous to keep "resources, videos, pictures, and most important (their) protest and resistance organization online"(anon, 2011). While these strategies have resulted from challenging oppressive political regimes and fighting to maintain freedom of information, the ideas can be adapted to working in more general and everyday online environments. Anonymous see small local groups acting as autonomous and self-reliant parts of a larger network, to make the entire structure stronger and more resilient as a whole. Their tactics have grown "organically in cyberspace rather than reflecting the cyber version of existing real world phenomena" (Keane, B, 2011) and show how local sub-groups can effectively create strong, flexible networks when collaborating on a global scale. Some of the major advantages of working in a localized cell are identified as being "Local organization only needs a local focus" (anon, 2011), hinting at the benefits of a simpler organizational structure; "You can continue the fight as a team even if cut of from all the other protesters/activists"(anon, 2011), which if adapted to collaboration in general suggests more resilient and efficient networks; and "you can gather resources there, videos pics, voice files, flyers and re-upload it from there if you lose resources to deletion or block"(anon, 2011), showing the benefits of decentralized networks as both data protection and archiving tools. References anon. (2011) 'Tools to help the Revolutions Part II - Online resistance cell organization'. Anonymous Hamburg. 23rd of February 2011. Available from: http://hamburger-anon.blog
  •  
    Anonymous, being a decentralised network, relies upon the interest of tech savvy individuals to contribute to their campaigns. When challenged by legal representatives of the targets of their attacks, such as the 'Cult of Scientology' (Anonymous, 2011), their efforts to disseminate information through mainstream channels may be thwarted by take-down notices. In the case presented in this article hosted by Blogspot, they admit to having been frustrated by such interference with distributing videoes, pictures, and other resources online (Anonymous, 2011). The blog entry continues with offering alternatives and suggestions for anyone interested in contributing to Anonymous' on-going campaigns, providing advice and recommendations for useful tools and techniques. It outlines the advantages to contributing in the online movement, such as 'continue the fight as a team even if cut off from all the other protesters/activists' (Anonymous, 2011), suggesting a reward through participation, which is a prime motivator for other online crowd-sourcing initiatives (Belleflamme, Lambert, & Schwienbacher, 2011). The article proceeds to then explain how a user can participate by listing potential resources the assist without danger of being identified, and caught, suggesting such websites as wall.fm, noting that the service probably has a server farm that won't suffer in the event of a Distributed Denial of Service attack. It also explains how to create a social network, including links to free domain registration services, and free webhosting, to facilitate the potential new member of the Anonymous network into building an online resistance cell. Anonymous Hamburg. (2011). We do what we must, because we can. Retrieved from http://hamburger-anon.blogspot.com/2011/02/tools-to-help-revolutions-part-ii.html. Belleflamme, P., Lambert, T., & Schwienbacher, A. (2011). Tapping the Right Crowd. Retrieved from http://ssrn.com/abstract=157817.
Helen Pidoulas

Anonymous and the global correction - Opinion - Al Jazeera English - 4 views

  •  
    The online protest group 'Anonymous' use web based networking and collaboration tools as effective ways to support and achieve their collective goals. This article follows the technological and social conditions that have shaped the groups innovative use of the internet as a tool for political protest. Like the author states, "as the social, political and technological environment has developed, some have already begun to explore new options, seizing new chances for digital activism"(Anonymous, 2011). In many ways it is hard to see how decentralized networks of like-minded protesters can achieve political change. While Anonymous are aware of how "a loose network of people with shared values and varying skill sets (providing) substantial help to a population abroad is seen as quixotic"(Anonymous, 2011), recent campaigns in Egypt, Tunisia and Libya are generally recognized as highly effective and indicative of what is achievable when collaborating on real world projects via web-based networks (see, Keane, B. 2011). Like Wikipedia and other mass-collaboration projects, it is a global network that drives Anonymous' influence. For example, anonymous use tools such as 'Low Orbit Ion Cannon'; or 'LOIC' (see, Arthur, C. 2010), allowing people from around the world to collaborate together. LOIC enables the group to carry out "distributed denial of service (DDoS) attacks, involving thousands of computer users who request large amounts of data from a website simultaneously, overwhelming it" (Anonymous, 2011). Online systems of mass-collaboration are proving to be productive and influential vehicles for social or political change. To understand their success we need to acknowledge how the "technological infrastructure that allows these movements has been in place for well under a decade - but phenomena such as WikiLeaks and Anonymous have already appeared, expanded, and even become players within the geopolitical environment" (Anonymous, 2011).
  • ...4 more comments...
  •  
    How one man tracked down Anonymous-and paid a heavy price While Anonymous may have seized "new chances for digital activism" it remains subject to investigations and attacks both on the group's concepts and any individuals that can be identified. Its aim to achieve political change through civil disobedience leaves individuals open to prosecution and persecution if identified. This article looks further at attempts to infiltrate Anonymous. It becomes a contest between those seeking to expose the real identities of the Anonymous activists and the activist's responses to these attacks. This article describes one such conflict. It is not clear from the article just what the result was and it is implied that publicity was the aim for an attempt to gain Government Internet Security contracts. The interesting point is that a loose gathering of diversely motivated activists is as vulnerable to cyber attacks as the targets they attack. In a private e-mail Barr is quoted to have said :"They think I have nothing but a hierarchy based on IRC [Internet Relay Chat] aliases!" he wrote. "As 1337 as these guys are supposed to be they don't get it. I have pwned them! :)" (Andersen, 2011) The article claims that from leaked e-mails it attained the full story of how Barr infiltrated Anonymous, used social media to compile his lists, and even resorted to attacks on the codebase of the Low Orbit Ion Cannon-and how others at his own company warned him about the pitfalls of his research. What is 'pwned'? "Pwned" means "to be controlled against your will", or "to be defeated by a superior power". The noun version is pwnage. The "pwn" expression originated in the 1980's from the word "owned". It was used to describe when a hacker would take remote control of a server or another computer. The use of "p" to replace "o" was simply a misspelling at first, but the spelling stuck as a stylistic point. (Gil, 2011) What is 1337? "H
  •  
    What is 1337? "Hacker "Sp33k" for leet, or elite. Originating from 31337 "eleet" the UDP port used by Dead Cow Cult, a hacker group, to access Windows 95 using Back Orifice, a notorious hacking program." (Urban Dictionary, 2011) Works Cited Andersen, N. (2011, March). How one man tracked down Anonymous-and paid a heavy price. Retrieved April 12, 2011, from ars technica: http://arstechnica.com/tech-policy/news/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price.ars Gil, P. (2011). What is 'pwned'? Retrieved April 10, 2011, from About.com: http://netforbeginners.about.com/od/p/f/pwned.htm Urban Dictionary. (2011). Retrieved April 10, 2011, from Urban Dictionary: http://www.urbandictionary.com/define.php?term=1337
  •  
    Low Orbit ION Cannon This hacking tool can be downloaded free of charge by anyone from Source Forge. (abatishchev, 2011) This is interesting as it will probably be illegal for anyone to use the tools to "impair the operation" of a computer which includes servers. According to reports on the Source Forge you should note that the program may include Trojans. There is a clear warning: USE ON YOUR OWN RISK. WITH NO ANY EXPRESS OR IMPLIED WARRANTIES. In Great Britain for example anyone who uses Low Orbit ION Cannon would be likely to have committed an offence under Computer Misuse Act 1990. Specifically: "This subsection applies if the person intends by doing the act-(a)to impair the operation of any computer;(b)to prevent or hinder access to any program or data held in any computer;(c)to impair the operation of any such program or the reliability of any such data; or(d)to enable any of the things mentioned in paragraphs (a) to (c) above to be done." "A person guilty of an offence under this section shall be liable-(a)on summary conviction in England and Wales, to imprisonment for a term not exceeding 12 months or to a fine not exceeding the statutory maximum or to both;(b)on summary conviction in Scotland, to imprisonment for a term not exceeding six months or to a fine not exceeding the statutory maximum or to both;(c)on conviction on indictment, to imprisonment for a term not exceeding ten years or to a fine or to both." (Computer Misuse Act 1990, 1990) Works Cited abatishchev. (2011, January 23). Low Orbit Ion Cannon. Retrieved April 11, 2011, from SourceForge: http://sourceforge.net/projects/loic/ Computer Misuse Act 1990. (1990). Retrieved April 11, 2011, from legislation.gov.uk: http://www.legislation.gov.uk/ukpga/1990/18/section/3
  •  
    A loosely organised group of hackers is targeting oppressive regimes and says this is just the beginning (Anonymous, 2011). Anonymous presents a mechanism for socio-political change, using the available technological infrastructure that also facilitates such movements as WikiLeaks. This opinion piece, hosted by Al Jazeera, describes an evangelical movement in protest against what they perceive to be oppressive establishments, as governments or institutions. They consider themselves a movement for digital activism, and in this article focus almost exclusively on the plight of the Tunisian people, with mentions of attacks on the Church of Scientology and WikiLeaks, and the Australian government following the introduction of internet censorship laws (Anonymous, 2011). The article reads like a resume of Anonymous' achievements, and the motivations behind their actions, such as the WikiLeaks release of material exposing atrocities perpetrated by the Tunisian government provoking participants in the Anonymous network to attack via distributed denial of service (DDoS) non-essential government websites and replace them with messages of support for the Tunisian people (Anonymous, 2011). Such activities require the concerted efforts of collaborating individuals across a potentially widely dispersed online network. When compared with GetUp!, a community-minded tool for promoting activism for campaigns relevant to Australians, or Avaaz, a global community-minded campaign tool, the Anonymous movement, though also created with the best intentions, still reads in this article as taking matters more directly into their own hands, with limited accountability. The article uses such language as 'information warfare', 'revolution', and 'attacking', and endorses the breaking of laws to achieve what members of the movement believe in; '[t]here is a reason, after all, that those of us who have seen the movement up close have dedicated our lives to what it stands for, and have even vio
  •  
    One of the problems with digital activism is that the internet is a tool that can be accessed by many people, cross-border and across many different countries. What might be acceptable practice and perfectly legal in a country like Australia, might be liable to prosecution in countries like China where the government censors not only the internet, but people in general. Freedom in countries like Australia is taken for granted. Other countries might not enjoy this freedom, and when people try to access content that is politically sensitive or illegal in their country, questions are raised about who is providing the illegal content, and the person accessing the material can be liable to prosecution. Internet laws are also changing rapidly, and it is very difficult for people to keep up with the constantly changing landscape of laws that are evolving and reshaping. While there is a need for activism, an awareness or a better understanding of the potential for breaking the law needs to be clearly understood when posting politically or socially active sensitive material online. There is a real danger that activities that are legal for people surfing the web in Australia are not legal in other countries, and the implications this can mean for people not only posting material, but those reading and interacting content, especially if they have to by-pass traditional methods of accessing the internet to get through to what they want to read, hear or see. Louis-Jacques, L. (2003). Legal Research on International Law Issues. Retrieved from http://www2.lib.uchicago.edu/~llou/forintlaw.html
  •  
    Digital or online 'Hacktivism' has a perception of existing as a natural extension of more traditional forms of protest. Being that the Internet has moved on from being a relatively static information source and into a dynamic realm where regulation and social policy is conducted by governments, protesting has struggled to find its place. An example of collaboration gone astray can be seen in the story of 22 year old Matthew George. In October 2009, in reaction to the Australian Federal Government's attempts to legislate an Internet filter Matthew volunteered to let his PC take part in a denial of service attack on government websites. In collaborating with other PC's Matthew thought "We hoped to achieve a bit of media attention to why internet censorship was wrong..." (SMH 2011) Charged and bought before court, the hacking was not seen as protest by authorities but more akin to cyber-terrorism. Whilst the 'real world' allows avenues for protest, as in registered street marches...the Internet has no such outlet, with the exception of self-publication on forums and social media. This has led to a situation where online collaborative protest seems to lead frequently to vandalism in the form of denial of service attacks. Meet the hacktivist who tried to take down the government (2011) Retrieved from http://www.smh.com.au/technology/security/meet-the-hacktivist-who-tried-to-take-down-the-government-20110314-1btkt.html#ixzz1L9cdAeuE
Jocelyn Peucker

Image, Bonding, and Collective Identity Across Multiple Platforms: Avaaz on Facebook, M... - 5 views

  •  
    Since 2007, Anastasia Kavada is a post-doctoral researcher, with her current role as developing research on: social technologies (such as blogs, social networking sites, picture and video sharing sites) in the establishment of international campaigns and political coalitions, in practices of citizenship and democracy, as well as in the formation of political identities and feelings of belonging to political groups (The University of Westminster, n.d.). In her article, Collective action and the social web: Comparing the architecture of Avaaz.org and Openesf.net, Kavada discusses the differences between the two platforms for "... the European Social Forum [ESF] and [the] global movement website Avaaz" (Kavada, 2009b, p. 130). The following main topics are discussed: * Web 2.0 And Transnational Collective Action * Political Organizations And Web Interactivity * Openesf: Openness And Distributed Construction * Avaaz: Outward Orientation And Central * Coordination Of Individual Contributions She concludes that whilst both platforms are inherently different for use in their particular organisations, Avaaz has gone one step further to reaching people using social networking sites such as Facebook (REF). In 2010, Kavada wrote an article titled Image, Bonding, and Collective Identity Across Multiple Platforms: Avaaz on Facebook, MySpace, and YouTube (Kavada, 2010). In this paper, Kavada explores the prospective spaces for global activism by "... examining the case of Avaaz.org, a 'global web movement' created in 2007 aiming to bring people-powered politics to global decision-making" (Kavada, 2010, p. 1). * Growth of digital activism * Web Platforms, Bonding and Group Identity: Two Complementary Views * Methods and research * Platforms as a Surface of Bonding and Group Identity * Platforms As a Site of Engagement, Bonding and Group Identity In brief, this article discusses whether or not, Avaaz can hold onto
  •  
    its identity whilst spread across multiple platforms. Kavada has established that organisations such as Avaaz can indeed remain in control of its identity even though they lack in "... interpersonal interaction among supporters" (Kavada, 2010, p. 19). The Avaaz organisational strategy has met with success as more than thirty-seven million actions have been completed by its members (Avaaz.org, 2011). Bibliography: Avaaz.org. (2011). Avaaz - The World in Action - About. Retrieved from http://www.avaaz.org/en/about.php Kavada, A. (2007). The 'Horizontals' and the "Verticals": Competing Communicative Logics in the 2004 European Social Forum. Paper presented at the General Conference of the European Consortium for Political Research, 6-8 September, Pisa, Italy. Kavada, A. (2009a). Decentralization and Communication: Email Lists and the Organizing Process of the European Social Forum. pp. 188-204 in A. Karatzogianni (Ed.) Cyber Conflict and Global Politics. London: Routledge. Kavada, A. (2009b). Collective action and the social web: Comparing the architecture of Avaaz.org and Openesf.net. In Communicative Approaches To Politics And Ethics In Europe. Tartu University Press. Retrieved from http://homepages.vub.ac.be/~ncarpent/suso/reco_book5.pdf#page=130 Kavada, A. (2010). Image, Bonding, and Collective Identity Across Multiple Platforms: Avaaz on Facebook, MySpace, and YouTube. All Academic Inc. Retrieved from http://www.allacademic.com/meta/p404477_index.html The University of Westminster. (n.d.). Anastasia Kavada - CAMRI Post-Doctoral Researcher. Retrieved from http://www.westminster.ac.uk/schools/media/camri/research-staff/kavada,-anastas
1 - 4 of 4
Showing 20 items per page