Preview

Anonymous Heroes Or Internet Heroes

Good Essays
Open Document
Open Document
1234 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Anonymous Heroes Or Internet Heroes
Anonymous Hackers: Internet Heroes or Villains
We live in the time of the World Wide Web and it brings the biggest changes ever. The effects from this powerful invention, the Internet, has made the world flat and the opportunities huge. Every big change can have an affect on people, it could be positive or negative. In early 2002, researchers evaluated the presence and role of hackers and their role in technological innovations. “A decade ago, people in the tech field were angry that hackers had been labeled the dangerous villains who threatened national security” (Nissenbaum, 2015). This negative association contrasts with the beginning days of the 1970’s when hackers “were seen as ardent if quirky programmers, capable of near-miraculous,
…show more content…
Josh Harkinson wrote “Cyber bullies with a Cause” shows the stand that was taken by Anonymous that clearly breaks the stereotype about what this group does and why are they doing it. The story of Rehtaeh Persons’ rape and suicide, serve as a reminder that Anonymous took action on the side of fairness and justice when no one else would (Harkinson, 2013). When some of the members of the cyber activist group Anonymous take hear of the shameful acts of sexual violence that occurred against an innocent teenager, they refuse to ignore the fact that the police have done absolutely nothing. Anonymous used cyber tactics of “vigilante-style online activism” to force officials to respond appropriately and in accordance with the law (Harkinson, 2013). Some disagreed with this method of action. Others supported only the messengers and Anonymous should be credited for doing the job that law enforcement was unable to do; or unwilling. Organizing for justice is the spirit of democracy. Anonymous in this case, facilitated for justice to be served and a new way opened. These words below would never have been said, if Anonymous had not stood up for Retiah’s honor. “For four hours, women stood up, some clad in Fawkes masks, and shared their stories of abuse -- rapes at parties, date rapes, rapes by friends and …show more content…
They argue that more intensive and harsh laws must be carried out against the groups that break the law and gain illegal access to the Internet (Goodwin, 2003). From their point of view, any criminal who can get their hands into a computer has the opportunity to hack any data in any country in the world represents more of a threat to security than the benefits their “activist” Internet protests and shut downs can bring. The criminals take advantage of the fact that there is very little the law can do to catch the hackers. Moreover, even if they can catch them, breaking the law has different punishments in different countries leaving the world. As a result, accounting and finance firms have so much more at risk that hackers, like Anonymous if they decided to, could damage in a major way. However, it is not acceptable for the acts of social justice by groups such as Anonymous, to be subject to the same policing and profiling, as those who are villains without an agenda for the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The article “Inside America’s Hacking Epidemic,” shows the destructive power and capability of cyberwarfare. Cyberwarfare has grown increasingly common over the years, and is one of the few areas where combat is on a level playing field. With the widespread use and access to internet, hackers and cases of hacking are continuing to grow at an alarming rate. Not only, but these hacks are usually targeted at important government facilities like the Pentagon, State Department, and the White House. Attacks substantial as this not only have the capability breach classified information, but they also carry a large risk of harming the infrastructure and national security.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Good Essays

    I101 Unit 1 Assignment

    • 1542 Words
    • 7 Pages

    As we learned in lecture, technology just means something that is scientifically used for personal betterment. Although we mostly dealt with Information Technology in this course, technology is everywhere. People have been using technology for centuries, even the basic wheel is an example of technology. As long as people have been using technology for the good of their peers, others have used it to benefit themselves at the cost of their peers. Paul Marks of New Scientist shines light on the first recorded hacking, in 1903 a magician and inventor interfered with Guglielmo Marconi’s early wireless telegraphy to display mean messages in Morse code. While in the Technoethics lecture, Logan opened my eyes to the masses of people trying to disturb others for their own personal gain. I can understand how a few people in the shady ends of the internet are trying to steal from others, but not how these scammers are everywhere on the internet preying on those who don’t know any better. It is unsettling to think about the population of people who aren’t overly knowledgeable about the internet who are blindly walking into traps left and right. An example is when Logan talked about phishing and how realistic some scamming attempts look. There are a few emails currently in my inbox that smell a little fishy, but I am relatively well versed on the internet. I am usually able to pick out scams on the internet. My Grandparents though, due to the nature of…

    • 1542 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    Who Are Hackers ­ A Hacker 's Tools Of The Trade | Hackers | FRONTLINE | PBS. (n.d.).…

    • 820 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Manufacturing Audit Risk

    • 1585 Words
    • 7 Pages

    As Information Systems become more complex and business organizations become better prepared at protecting these systems so has the means in which attacks on these systems evolved. Many new issues have emerged and are changing the way in which or world views hackers and the chaos that these individuals can cause. The purpose of this section is to discuss some of the most visual and controversial of these issues. Finding solutions to avoid these attacks are what drives the need for security and security systems to constantly evolve and adapt to new threats and avoid being overrun and or shut down due to malicious actions of hackers who only wish…

    • 1585 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    There have been recent technological advances that have brought with them significant benefits to society, but there has always been a negative aspect to it. The internet is a new technological innovation that has changed a lot of people’s lives. The internet also has its dangers to the people who use it. All computer systems are globally inter-connected, and therefore are vulnerable to forms of attack. People have feared of attacks since September 11, 2001 when the New York World Trade Center was attacked where the media said this not only opened us to physical attacks, but also virtual attacks. If we were to be virtually attacked the attackers would most likely go for our critical infrastructure’s such as energy, finance, transportation, and other essential services. These potential dangers are taken very seriously, and the United States has procedures to stop them from happening.…

    • 940 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Peter Krapp Analysis

    • 703 Words
    • 3 Pages

    Peter Krapp builds a well-constructed argument designed to persuade readers that computer hacking is a danger that steals our most valuable possession—personal information—from our most vulnerable people--students. The article focuses on personal information about college students stolen from college computer networks. The writer builds his argument brick by brick. He starts by giving an example of student data stolen from a college by hackers in China, relating his topic to an event that really happened. The writer quickly establishes himself as an expert in the topic so readers can trust his information. Krapp asks and answers questions about the theft of data, goes into more depth about the type of information stolen from college networks, and then briefly touches on the laws, or the lack of laws, to protect students. He points out that data is stolen from students by not only foreign hackers, but also by American companies. The writer finishes with a call for colleges to protect student data, clearly stating his purpose.…

    • 703 Words
    • 3 Pages
    Good Essays
  • Better Essays

    World Phone Hacking Scandal

    • 2502 Words
    • 11 Pages

    Small, M. (2011, November/December). The Lessons of the Hacking Scandal. Information World Review, 268, 14. Retrieved from Business Source Complete database. (72887448)…

    • 2502 Words
    • 11 Pages
    Better Essays
  • Good Essays

    Today the internet has completely changed the way people communicate with each other. It has changed the people conduct commerce, changed the way people research topics, the way people entertain and the way people break the law (Schmalleger, 2011, p. 70). Many of the crimes that are committed on the internet include: prostitution, drug sales, theft, fraud, conspiracy, bullying, and harassment. As the internet becoming more and more of a dominator factor in how society is driven so has these crimes. Kids are being bullied and harassed by their peers to the point that they are committing suicide. Stopping these acts are hard because it’s very difficult tracking everyone in America’s computer and it’s illegal without the correct warrant and process to monitor someone’s actions. The more that the internet becomes an everyday use for everyday America the more is going to be taken advantage of and break the law. I can see this being beneficial or detrimental to society as a whole. It can be beneficial by connecting the world but also detrimental by someone corrupting and hacking into the world. It’s going to be on the government and us to see how this outcome turns…

    • 1059 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Douse Online Flamers

    • 275 Words
    • 2 Pages

    Self published content such as message boards and other web pages have made the legal debate on anonymous users even more difficult. Keen cites the case of Dr Lisa Krinsky, a Miami, FL based president of a drug corporation who filed suit against her anonymous flamers on a Yahoo message board. This of course begs the question, if someone is believing everything they read on the internet does it really matter what they…

    • 275 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The Internet has grown faster and has become more invasive and integrated into our lives than most people could have ever imagined. Since the year 2000, Internet usage has increased by 566%. [1] Current statistics estimate that 63.2% of Western Europeans are digitally active on a regular basis. When broken down generationally, 93% of teenagers are active. [2] From this and the constant progression of technology we can assume 100% of Europeans will be classed as digital citizens in the year 2020. Indeed Eric Schmidt, CEO of Google, has gone as far as to say that 100 % of the world’s population will be online in the year 2020 [3] Therefore it is increasingly important that we analyze and dissect how this new cyber reality is affecting individuals and society as a whole.…

    • 2138 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In “Douse the Online Flamers” Andrew Keen writes about individuals who choose to hide behind a façade in cyber crime. He goes on to speak of the unlawful acts inflicted upon innocent individuals of cyber space. Keen reflects on three major cases where cyber criminals are protected under the freedom of speech act while the innocent are left vulnerable. In all three cases, the judges failed the victims of unidentified slander. In his article, Keen forcefully expresses his opinion on why he believes we, as Americans, should take a stand against the anonymity of today’s internet tormenters because too many innocent lives are destroyed due to the cruel intentions of anonymous speech.…

    • 428 Words
    • 2 Pages
    Good Essays