Preview

irish republican army

Powerful Essays
Open Document
Open Document
1205 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
irish republican army
HACKTIVISM
President Obama once declared that Cyber attacks comprise one of the most severe economic and national security challenges that the nation is faced with . Hacktivism has heightened political conscience. People are reliant on computers and electronic operating systems to an extent that these attacks open up the risk to the public. Hacktivism has the possibility to have a positive or negative force on society.

Hacktivism has generally got more than one meaning. It can be defined as a form of trespassing against a computer belonging to somebody else (Krone, 2005). The use of technology is used in acts of protest and activism. Denning (2001) describes activism as a non disruptive use of the internet to get an end result, in support of an agenda or cause. A person that has committed in an act of Hacktivism is called a hactivist. Hactivists challenge the security of the internet as a technical, economic and political platform. Website defacements, computer break ins, denial of service attacks, informational theft computer viruses and worms are regular examples of Hacktivism . Although ‘politically motivated’ hacking is what distinguishes the action of Hacktivism to hacking, they are still hard to differentiate. Clough (2010) reports that on regular there is 4000 denial of services per week which is a clear indicator of how common Hacktivism is occurring. Hactivists aim to embarrass the government, and if people support Hactivists they are wanting to over power politics. Hactivists do not act on money but merely for protest, revenge, ideology and humiliating individuals.
The relevant legislation for Hacktivism comes from the Criminal Code act 1995 . It falls under Division 477, serious computer offences. All of which have the key element of ‘intent’ and ‘unauthorised access’. The person must have had the intent to ‘hack’ into a computer system. Division 477.1 it is a criminal offence if there was unauthorised access with the intent to commit a



Cited: 2012 Data breach investigation report. (2012). Retrieved May 2013, from Verizon RISK team: http://www.wired.com/images_blogs/threatlevel/2012/03/Verizon-Data-Breach-Report-2012.pdf austlii. (2013). Commonwealth Consolidated Acts. Retrieved May 10, 2013, from austlii: http://www.austlii.edu.au/au/legis/cth/consol_act/ca2001112/sch1.html Carabotton, E. (2011, August 4). Hacking Motivations – Hacktivism. Retrieved May 2013, from talktechtome: http://www.gfi.com/blog/hacking-motivations-hacktivism/ Castell, M. (2012). View point: Manual Castells on the rise of alternativr economic cultures. Retrieved May 2013, from BBC: http://www.bbc.co.uk/news/business-20027044 , accessed March 29, 2013 Clough, J. (2011). Chapter 3:Access Offences. Priciples of Cybercrime , 48-100. Glenny, M. (Director). (2011). TED talk [Motion Picture]. Hardy, K. (2012). OPERATION TITSTORM: HACKTIVISM OR CYBERTERRORISM? Heinonline , 474-502. Kelly, B. (2013). INVESTING IN A CENTRALIZED CYBERSECURITY. "HACKTIVISM” AND CYBERSECURITY REFORM , Vol. 92:1663. Krone, T. (2005). Hacking motives high tech crime brief no.6. Canberra: Australian Institute of Criminology. Powell, A. (2013). Hacking & ‘Hacktivism’. Melbourne: RMIT.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In the television program “American Greed - Hackers : Operation Get Rich or Die Tryin’ “they explain the the reason most folks get into criminal hacking is because of credit and attention and not well thought out long term plans. The program also show how the team adapted to evade law enforcement measures by not being flashy and making spaced out recreational purchases such as cars and using cash when need be.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Kingpin Ananlytical Essay

    • 377 Words
    • 2 Pages

    Introduction: Below I will present an argument that that shows the computer hacking by Max Butler, the main character, demonstrated in the book Kingpin by Kevin Poulsen, was unethical in nature. Max’s actions illustrate computer crime defined as, “any incident involving an intentional act where a victim suffered or could have suffered a loss, and a perpetrator made or could have made a gain and is associated with computers” (Parker, 1976). Max utilized his hacking skills in a malicious manner to victimize individuals by taking their personal property.…

    • 377 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Organized Crime

    • 375 Words
    • 2 Pages

    One new trend in organized crime is cybercrime. The key to it is social engineering. Hackers can easily persuade someone now a days to do things on their computer that is not in their best interest and the internet is assisting them.…

    • 375 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The article “Inside America’s Hacking Epidemic,” shows the destructive power and capability of cyberwarfare. Cyberwarfare has grown increasingly common over the years, and is one of the few areas where combat is on a level playing field. With the widespread use and access to internet, hackers and cases of hacking are continuing to grow at an alarming rate. Not only, but these hacks are usually targeted at important government facilities like the Pentagon, State Department, and the White House. Attacks substantial as this not only have the capability breach classified information, but they also carry a large risk of harming the infrastructure and national security.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cybercrime is defined as a crime in which a computer is the object of a crime or is used as a tool to carry out a crime. Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Offenders who perform these unlawful actions are often referred to as hackers (Janssen, 2010). There are several different types of cybercrimes, however four of the most common cybercrimes are: cyber fraud, cyber theft, stalking, and hacking.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Manufacturing Audit Risk

    • 1585 Words
    • 7 Pages

    As Information Systems become more complex and business organizations become better prepared at protecting these systems so has the means in which attacks on these systems evolved. Many new issues have emerged and are changing the way in which or world views hackers and the chaos that these individuals can cause. The purpose of this section is to discuss some of the most visual and controversial of these issues. Finding solutions to avoid these attacks are what drives the need for security and security systems to constantly evolve and adapt to new threats and avoid being overrun and or shut down due to malicious actions of hackers who only wish…

    • 1585 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    a profit. Hackers hate authority that stands in the way of their financial goals. The penalty for…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IT security

    • 43660 Words
    • 366 Pages

    Ethical H acking a n d C o u n te rm e a s u re s…

    • 43660 Words
    • 366 Pages
    Satisfactory Essays
  • Good Essays

    hacktivists

    • 370 Words
    • 2 Pages

    Hackers have been around for a very long time. Hacks can range from disrupting websites, cracking data bases and releasing untold amounts of sensitive or private data. There are two different types of hackers, white hats and black hats. White hats are hackers that help prevent people that are on the other side of the law. Some white hats were once black hats that may have been caught and decided to work with government agency’s such as the FBI rather than go to jail. Black hats are hackers that hack for things such as personal gain or to simply disrupt or gain access to information that they want. Almost all hackers have an alias or a handle such as Dark Dante or C0mrade.…

    • 370 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Coding Reaction

    • 778 Words
    • 4 Pages

    Coleman first attempts to provide a solid background and introduction to world of hacking. While doing this, she also attempts to show that hacking is much more than a simple act. It has brought people together to form an entire social formation linked through the thousands of computers and networks throughout the world. She wants to illustrate that the hacking culture is a distinct culture that incorporates many of things that are used to validate other cultures. For example, Coleman shows how the hacker culture has developed and changed throughout time do to development in new technology. “The fact that the BBS period is now over indicates that much of the hacker lifeworld is constituted through technological infrastructures with their own features and histories, and as subject to birth, growth, and decay as any other social formation” (Coleman 2012:31). This shows how the hacking culture is similar to many other cultures that have been studied. They have their own features and their own memories that define who they are and how they act.…

    • 778 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Anonymous hackers

    • 892 Words
    • 3 Pages

    Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The anonymous hackers are part of the hacktivisim, it originated in 2003, however, in 2008 the group began to move toward political and social change. “We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us” (Brian 2012). The anonymous hacker group has presented itself in the street of different cities in the world after downloading a Youtube video asking all the anonymous for a meeting in the street, and starting their own community.…

    • 892 Words
    • 3 Pages
    Good Essays