Skip to main content

Home/ OUANet308-2011/ Group items tagged hackers

Rss Feed Group items tagged

Helen Pidoulas

Anonymous and the global correction - Opinion - Al Jazeera English - 4 views

  •  
    The online protest group 'Anonymous' use web based networking and collaboration tools as effective ways to support and achieve their collective goals. This article follows the technological and social conditions that have shaped the groups innovative use of the internet as a tool for political protest. Like the author states, "as the social, political and technological environment has developed, some have already begun to explore new options, seizing new chances for digital activism"(Anonymous, 2011). In many ways it is hard to see how decentralized networks of like-minded protesters can achieve political change. While Anonymous are aware of how "a loose network of people with shared values and varying skill sets (providing) substantial help to a population abroad is seen as quixotic"(Anonymous, 2011), recent campaigns in Egypt, Tunisia and Libya are generally recognized as highly effective and indicative of what is achievable when collaborating on real world projects via web-based networks (see, Keane, B. 2011). Like Wikipedia and other mass-collaboration projects, it is a global network that drives Anonymous' influence. For example, anonymous use tools such as 'Low Orbit Ion Cannon'; or 'LOIC' (see, Arthur, C. 2010), allowing people from around the world to collaborate together. LOIC enables the group to carry out "distributed denial of service (DDoS) attacks, involving thousands of computer users who request large amounts of data from a website simultaneously, overwhelming it" (Anonymous, 2011). Online systems of mass-collaboration are proving to be productive and influential vehicles for social or political change. To understand their success we need to acknowledge how the "technological infrastructure that allows these movements has been in place for well under a decade - but phenomena such as WikiLeaks and Anonymous have already appeared, expanded, and even become players within the geopolitical environment" (Anonymous, 2011).
  • ...4 more comments...
  •  
    How one man tracked down Anonymous-and paid a heavy price While Anonymous may have seized "new chances for digital activism" it remains subject to investigations and attacks both on the group's concepts and any individuals that can be identified. Its aim to achieve political change through civil disobedience leaves individuals open to prosecution and persecution if identified. This article looks further at attempts to infiltrate Anonymous. It becomes a contest between those seeking to expose the real identities of the Anonymous activists and the activist's responses to these attacks. This article describes one such conflict. It is not clear from the article just what the result was and it is implied that publicity was the aim for an attempt to gain Government Internet Security contracts. The interesting point is that a loose gathering of diversely motivated activists is as vulnerable to cyber attacks as the targets they attack. In a private e-mail Barr is quoted to have said :"They think I have nothing but a hierarchy based on IRC [Internet Relay Chat] aliases!" he wrote. "As 1337 as these guys are supposed to be they don't get it. I have pwned them! :)" (Andersen, 2011) The article claims that from leaked e-mails it attained the full story of how Barr infiltrated Anonymous, used social media to compile his lists, and even resorted to attacks on the codebase of the Low Orbit Ion Cannon-and how others at his own company warned him about the pitfalls of his research. What is 'pwned'? "Pwned" means "to be controlled against your will", or "to be defeated by a superior power". The noun version is pwnage. The "pwn" expression originated in the 1980's from the word "owned". It was used to describe when a hacker would take remote control of a server or another computer. The use of "p" to replace "o" was simply a misspelling at first, but the spelling stuck as a stylistic point. (Gil, 2011) What is 1337? "H
  •  
    What is 1337? "Hacker "Sp33k" for leet, or elite. Originating from 31337 "eleet" the UDP port used by Dead Cow Cult, a hacker group, to access Windows 95 using Back Orifice, a notorious hacking program." (Urban Dictionary, 2011) Works Cited Andersen, N. (2011, March). How one man tracked down Anonymous-and paid a heavy price. Retrieved April 12, 2011, from ars technica: http://arstechnica.com/tech-policy/news/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price.ars Gil, P. (2011). What is 'pwned'? Retrieved April 10, 2011, from About.com: http://netforbeginners.about.com/od/p/f/pwned.htm Urban Dictionary. (2011). Retrieved April 10, 2011, from Urban Dictionary: http://www.urbandictionary.com/define.php?term=1337
  •  
    Low Orbit ION Cannon This hacking tool can be downloaded free of charge by anyone from Source Forge. (abatishchev, 2011) This is interesting as it will probably be illegal for anyone to use the tools to "impair the operation" of a computer which includes servers. According to reports on the Source Forge you should note that the program may include Trojans. There is a clear warning: USE ON YOUR OWN RISK. WITH NO ANY EXPRESS OR IMPLIED WARRANTIES. In Great Britain for example anyone who uses Low Orbit ION Cannon would be likely to have committed an offence under Computer Misuse Act 1990. Specifically: "This subsection applies if the person intends by doing the act-(a)to impair the operation of any computer;(b)to prevent or hinder access to any program or data held in any computer;(c)to impair the operation of any such program or the reliability of any such data; or(d)to enable any of the things mentioned in paragraphs (a) to (c) above to be done." "A person guilty of an offence under this section shall be liable-(a)on summary conviction in England and Wales, to imprisonment for a term not exceeding 12 months or to a fine not exceeding the statutory maximum or to both;(b)on summary conviction in Scotland, to imprisonment for a term not exceeding six months or to a fine not exceeding the statutory maximum or to both;(c)on conviction on indictment, to imprisonment for a term not exceeding ten years or to a fine or to both." (Computer Misuse Act 1990, 1990) Works Cited abatishchev. (2011, January 23). Low Orbit Ion Cannon. Retrieved April 11, 2011, from SourceForge: http://sourceforge.net/projects/loic/ Computer Misuse Act 1990. (1990). Retrieved April 11, 2011, from legislation.gov.uk: http://www.legislation.gov.uk/ukpga/1990/18/section/3
  •  
    A loosely organised group of hackers is targeting oppressive regimes and says this is just the beginning (Anonymous, 2011). Anonymous presents a mechanism for socio-political change, using the available technological infrastructure that also facilitates such movements as WikiLeaks. This opinion piece, hosted by Al Jazeera, describes an evangelical movement in protest against what they perceive to be oppressive establishments, as governments or institutions. They consider themselves a movement for digital activism, and in this article focus almost exclusively on the plight of the Tunisian people, with mentions of attacks on the Church of Scientology and WikiLeaks, and the Australian government following the introduction of internet censorship laws (Anonymous, 2011). The article reads like a resume of Anonymous' achievements, and the motivations behind their actions, such as the WikiLeaks release of material exposing atrocities perpetrated by the Tunisian government provoking participants in the Anonymous network to attack via distributed denial of service (DDoS) non-essential government websites and replace them with messages of support for the Tunisian people (Anonymous, 2011). Such activities require the concerted efforts of collaborating individuals across a potentially widely dispersed online network. When compared with GetUp!, a community-minded tool for promoting activism for campaigns relevant to Australians, or Avaaz, a global community-minded campaign tool, the Anonymous movement, though also created with the best intentions, still reads in this article as taking matters more directly into their own hands, with limited accountability. The article uses such language as 'information warfare', 'revolution', and 'attacking', and endorses the breaking of laws to achieve what members of the movement believe in; '[t]here is a reason, after all, that those of us who have seen the movement up close have dedicated our lives to what it stands for, and have even vio
  •  
    One of the problems with digital activism is that the internet is a tool that can be accessed by many people, cross-border and across many different countries. What might be acceptable practice and perfectly legal in a country like Australia, might be liable to prosecution in countries like China where the government censors not only the internet, but people in general. Freedom in countries like Australia is taken for granted. Other countries might not enjoy this freedom, and when people try to access content that is politically sensitive or illegal in their country, questions are raised about who is providing the illegal content, and the person accessing the material can be liable to prosecution. Internet laws are also changing rapidly, and it is very difficult for people to keep up with the constantly changing landscape of laws that are evolving and reshaping. While there is a need for activism, an awareness or a better understanding of the potential for breaking the law needs to be clearly understood when posting politically or socially active sensitive material online. There is a real danger that activities that are legal for people surfing the web in Australia are not legal in other countries, and the implications this can mean for people not only posting material, but those reading and interacting content, especially if they have to by-pass traditional methods of accessing the internet to get through to what they want to read, hear or see. Louis-Jacques, L. (2003). Legal Research on International Law Issues. Retrieved from http://www2.lib.uchicago.edu/~llou/forintlaw.html
  •  
    Digital or online 'Hacktivism' has a perception of existing as a natural extension of more traditional forms of protest. Being that the Internet has moved on from being a relatively static information source and into a dynamic realm where regulation and social policy is conducted by governments, protesting has struggled to find its place. An example of collaboration gone astray can be seen in the story of 22 year old Matthew George. In October 2009, in reaction to the Australian Federal Government's attempts to legislate an Internet filter Matthew volunteered to let his PC take part in a denial of service attack on government websites. In collaborating with other PC's Matthew thought "We hoped to achieve a bit of media attention to why internet censorship was wrong..." (SMH 2011) Charged and bought before court, the hacking was not seen as protest by authorities but more akin to cyber-terrorism. Whilst the 'real world' allows avenues for protest, as in registered street marches...the Internet has no such outlet, with the exception of self-publication on forums and social media. This has led to a situation where online collaborative protest seems to lead frequently to vandalism in the form of denial of service attacks. Meet the hacktivist who tried to take down the government (2011) Retrieved from http://www.smh.com.au/technology/security/meet-the-hacktivist-who-tried-to-take-down-the-government-20110314-1btkt.html#ixzz1L9cdAeuE
Chris Johnson

Anonymous hackers take on the Church of Scientology - 13 views

You may like this article Keith http://www.news.com.au/technology/anonymous-vows-payback-for-sonys-case-against-playstation-3-hackers/story-e6frfrnr-1226033974414 The Chriso

anonymous hackers DoS Cyber Crime Net308oua-2011

Kellie Ramm

SETI@home - An Experiment in Public-Resource Computing - 0 views

  •  
    This article talks about SETI @home's "design and implementation and discuss[es] its relevance to future distributed systems" (Anderson, Cobb, Korpela, Lebofsky, & Werthimer, 2002). The authors of this article are all staff of the University of California, Berkeley, in the space sciences laboratory. The University of California, Berkeley is the home of the SETI @home program. This resource gives a more in depth understanding of how the SETI @home program, in particular how public-resource computing works to aid in the processing of the data. All members of the SETI @home program are initially required to download the client program. This program collects a work unit from the main server, computes a result, returns this result to the main server, then gets another work unit. This article also shows the mathematics behind how this system gives so much computing power, but basically the more client programs computing the work units, the faster the data is processed. The stringent safety precautions are why this system is assured as so safe from malicious attacks from hackers and viruses. There is no communication at all between the various client machines, with each computer talking directly to the main server. As discussed within, for this to work public-resource computing projects need to attract users to their program, and keep them interested in remaining members. SETI @home uses word-of-mouth from its members, referral programs and mass-media news coverage to attract members. The client program can run as either a "GUI application or a screensaver", and runs during what is normally computer idling time which means that the impact on the user is minimal.
  •  
    According to their 2002 poll the SETI @home user base is heavily dominated by males (93% of all users (Anderson et al., 2002)). This information can help them target market to their users. Some of the user benefits include the use of an online community where members can exchange ideas, and a competitive team/individual scoring system. Research is continuing into how to make this, and other forms, of public-resource computing more reliable and efficient in scientific calculations and discovery. Anderson, D., Cobb, J., Korpela, E., Lebofsky, M., & Werthimer, D. (2002). SETI@home: An Experiment in Public-Resource Computing. Communications of the ACM. 45(11), 56-61. doi: 10.1145/581571.581573
Keith Law

Anonymous - 15 views

Anonymous on FOX11 http://www.youtube.com/watch?v=DNO6G4ApJQY This is a four minute so called investigative news item. Anonymous is described as a Internet Meme originating in...

ouaNet308-2011 anonymous hacking Fox11 collaboration

started by Keith Law on 02 Apr 11 no follow-up yet
Jocelyn Peucker

Avaaz - The World in Action - 3 views

  •  
    "Avaaz is a global web movement to bring people-powered politics to decision-making everywhere" (Avaaz.org, 2011). Avaaz means voice, in "... several European, Middle Eastern and Asian languages" (Avaaz.org, 2011a). This is not a website where you need to prove your credentials or log in to be a member. However, it is one of the most powerful and influential organisations in the world. The Avaaz community "... empowers millions of people from all walks of life to take action on pressing global, regional and national issues, from corruption and poverty to conflict and climate change" (Avaaz.org, 2011a). Their online platform "... allows thousands of individual efforts, however small, to be rapidly combined into a powerful collective force" (Avaaz.org, 2011a). The Avaaz community supports campaigns in 14 languages, has a core team on 4 continents, includes thousands of volunteers. Overall, the community helps organise the signing of petitions, funding media campaigns and direct actions, contact through emailing, calling and lobbying governments, and organizing "offline" protests and events. They do this to "... ensure that the views and values of the world's people inform the decisions that affect us all" (Avaaz, 2011a). Two very good examples of the strength of the community include: * Stand With Anna Hazare (Avaaz.org, 2011b) shows of a petition where over 624,876 people have signed since the campaign launched on the 7th April, 2011. Before the goal of one million signatures was reached, a victory has been announced. * Blackout-proof the protests (Avaaz.org, 2011c) is a current petition to "...secure satellite modems and phones, tiny video cameras, and portable radio transmitters, plus expert support teams on the ground -- to enable
  • ...3 more comments...
  •  
    activists to broadcast live video feeds even during internet and phone blackouts" (Avaaz.org, 2011c). This is a campaign to raise monies through 30,000 donors. Many more of their success stories can be viewed on the highlights page of the Avaaz website, success stories from the Avaaz movement worldwide (Avaaz.org, 2011d). References: Avaaz.org. (2011a).The World in Action Retrieved from http://www.avaaz.org/en/about.php Avaaz.org. (2011b). Stand With Anna Hazare [Petition]. Retrieved from http://www.avaaz.org/en/stand_with_anna_hazare/ Avaaz.org. (2011c). Blackout-proof the protests [Fund-raising]. Retrieved from https://secure.avaaz.org/en/blackout_proof_the_protests/?vc Avaaz.org. (2011d). Success stories from the Avaaz movement worldwide. Retrieved from http://www.avaaz.org/en/highlights.php
  •  
    The opening statement to this web site reads " Avaaz is a global movement to bring people-powered politics to decision-making everywhere" (Avaaz.org, 2011) Immediately the reader is in no doubt that this is an organisation that is able to bring together large numbers of people to influence governments worldwide. Like other commentators I had not been aware of this organisation and spent some time researching. Unlike flash mobs and Anonymous, it appears that Avaaz has a formal structure and employs staff. As their website points out the staff write email alerts to the community and work with experts to develop campaign strategies (Avaaz.org, 2011). But it is the Avaaz community that decide where and how to campaign. This is very reminiscent of the Australian Democrats, where all policies are decided by a poll of members (Australian Democrats, 2011). Flash mobs occur in local communities, but the global nature of Avaaz means that this can be magnified to call attention to new issues on a worldwide or country-by-country basis if needed. The key to Avaaz, flash mobs and Anonymous is the use of Internet communication Technology. As the Avaaz website points out in "previous times each group would need to build up a constituency to reach a scale that could make a difference….Today thanks to new technology and ….. global interdependence this constraint no longer applies" (Avaaz.org, 2011). Australian Democrats.(2011). Structure of the Australian Democrats. Retrieved from http://www.democrats.org.au/about/structure.htm Avaaz.org.(2011). The World in Action. Retrieved from http://www.avaaz.org/en/about.php
  •  
    Avaaz's systems of collaboration allow decentralized networks to form around community and global projects, " ...(taking) action on pressing global, regional and national issues, from corruption and poverty to conflict and climate change" (Avaaz 2011). The Avaaz community, like Anonymous, are examples of how decentralized networks of like-minded individuals are capable of achieving common goals. The influences and successes that these groups are currently having regarding the sharing of global resources and fighting for basic human rights and freedoms of information show how powerful these network structures can be. The strength and flexibility of collective intelligence networks such as Avaaz and Anonymous is found in the diversity of their participants. For example, Avaaz uses methods that "allows thousands of individual efforts, however small, to be rapidly combined into a powerful collective force" (Avaaz 2011). Similarly, Anonymous is "a loose network of people with shared values and varying skill sets" (Anonymous, 2011). Like all collective intelligence networks, every member of these groups is acknowledged as having valuable skills that can benefit the community - so a method of harnessing this is input has been developed. However Avaaz and Anonymous use different techniques regarding how they attempt to achieve their goals. Avaaz use socially and politically transparent methods of traditional protest such as "signing petitions, funding media campaigns and direct actions, emailing, calling and lobbying governments, and organizing "offline" protests and events". In contrast, Anonymous are notorious for their use of "distributed denial of service (DDoS) attacks" using software such as 'Low Orbit Ion Cannon'; or 'LOIC' (see, Arthur, C. 2010). These different ways of collaborating online show that while "the social, political and technological environment has developed, some have already begun to explore new options, seizing new chances
  •  
    Avaaz addresses global issues to generate global interest in improved conditions - globally. The world in action (Avaaz.org). Available in fourteen different language, it encourages borderless interest in issues relevant locally and internationally, promoting campaigns to 'close the gap between the world we have and the world most people everywhere want' (About Avaaz, n.d.). Avaaz is to the world what GetUp! is doing for Australia, including its policy on transparency, evidenced in the availability of financial reports, member statistics, and its member-funded, crowd-sourced model. Rather than a distributed, region-dependent staff and budget, Avaaz has a 'single, global team with a mandate to work on any issue of public concern' (Avaaz.org, n.d.). It is Avaaz members who decide where to direct resources The website projects a sense of global community, as much in being available in so many languages as in movements presented on every page heralding from many different countries representing the plights of many and varied communities. Avaaz is a global example of social awareness instigating social movements, easily promoted through the connectivity of the internet and the tools for social networking, to create a better world. Websites and movements for campaigns such as Avaaz and GetUp! Australia are helping to raise awareness and reclaim power for the people. Avaaz.org.(2011). The World in Action. Retrieved from http://www.avaaz.org. GetUp. (n.d.) GetUp! Retrieved from http://www.getup.org.au.
  •  
    As yet another online resource for the "lounge chair activist" Avaaz.org seems to cover it all. Whether you're interested in saving the whales, climate change, gay rights or donating to flood victims, there is a cause available for you. Avaaz, started in 2007 with the mission to "organise citizens of all nations to close the gap between the world we have and the world most people everywhere want" (Avaaz.org, 2011). So far they seem to be achieving this goal. With over 8 million members worldwide, who have so far taken over 38 "actions" this is a website that seems to be doing what it's promised. To ensure that there is no underlying bias, no political voice hiding behind the curtains, Avaaz ensures there is "democratic accountability" by being 100% member-funded. It is mainly staffed by volunteers, who email actions to members in way that registers interest in the project and nothing more. These actions are also normally put forward by Avaaz members themselves, rather than outside parties. Avaaz, like BOINC, relies on word-of-mouth to spread the word. Also using social network sites to keep up the interest between members. Their hope is that once someone joins through a campaign for one specific issue, that they will then continue to support other actions. To prove their success, after "China's violent crackdown on the March '08' protests and riots in Tibet"(Avaaz, 2011) Avaaz was able to build the most successful global position to date. They were able to achieve 1.5 million signatures in just three weeks calling for dialogue between China and the Dalai Lama. Whether you just sign a petition or donate money, having so many available voices ensures that Avaaz will make it count. As stated by Zainab Bangura, the foreign minister of Sierra Leone "Avaaz is an ally, and a rallying place, for disadvantaged people everywhere to help create real change"(Avaaz, 2011). Avaaz.org. (2011). Avaaz.org: The World in Action. R
Keith Law

Attacks by Anonymous WikiLeaks Proponents not anonymous - 8 views

http://doc.utwente.nl/75331/ This is an academic paper from Tewnte University in the Netherlands. It claims that the tools used by Anonymous did not provide adequate security. On Nov...

ouaNet308-2011 Anonymous hackers security wiklleaks collaboration

started by Keith Law on 06 Apr 11 no follow-up yet
1 - 6 of 6
Showing 20 items per page