logo

ITNET305A Emerging Technologies Security

   

Added on  2020-04-13

9 Pages2542 Words115 Views
Running head: CYBER CRIME, TERRORISM AND ACTIVISM0Emerging Technologies

CYBER CRIME, TERRORISM AND ACTIVISM1Thesis StatementThe popularity of internet protest or Hacktivism is growing significantly; manypeoples oppose this form of protest because it is difficult to control and supervise but thepopularity of the internet has made it inevitable to stop Hacktivism; Instead, the governmentshould focus on properly regulating the Hacktivism protests.IntroductionHacktivism is a new form of protesting against social change or political agendaswhich are performed by using computer or internet based devices to hack or access the dataof organisations or individuals. There are several hacktivists association which has attackedlarge corporations and governments for various political and social causes such as Wikileaksand Anonymous. Most notable attacks of Hacktivism include Ashley Madison, Sony, PanamaPapers and others. Many peoples debate whether Hacktivism should be justified or not, andshould government create laws for regulating hacktivists activities. This report will focus onanalysing the meaning of Hacktivism and other related terms and discuss various examples ofHacktivism attacks. Further, the report will evaluate whether the Hacktivism should bejustified and if yes than what laws should be applied by the government to regulate its actionsproperly.

CYBER CRIME, TERRORISM AND ACTIVISM2Cyber Crime, Cyber Terrorism, and Cyber ActivismCybercrimes define such illegal acts which involve a computer or any other devicesthat are connected through the internet, it is also called computer crimes. Cyber terrorismreferred to illegal actions that are conducted using internet with a motive to threaten, achievepolitical gain or cause bodily harm through intimidation. Cyberactivism is the process usinginternet-based services such as social media, podcasts or email as a mode of communicationto share information regarding citizen movement and providing specific details orcoordination regarding any activism action (McCaughey & Ayers, 2013). Hacktivism isdefined as the act of breaking into, hacking or using a computer or network-based device topromote a social change or political agenda (Hampson, 2012). The hacktivist groups usuallyhack organisations or individuals’ computer for political or social causes rather than personalbenefits, the peoples who perform these actions are known as hacktivists. The term hacktivism was first provided by a Cult of Dead Cow member called Omegain 1994; the CDC is a computer hacking organisation and its motto is worldwide dominationthrough media saturation. Hacktivism is a form of activism, and they perform different actsthrough a network of hacktivists by collaborating on different projects to achieve a commonobjective (Busch, 2008). Many experts have provided different definitions of hacktivism,therefore, it is difficult to track specific activities that are included in hacktivism. Hacktivismis considered as a controversial term because many of its actions are related to cyberterrorism but the primary difference is that Hacktivism is related to social and politicalagendas. The hacktivists believe that information should be accessible to each individual andthey focus on revealing illegal secrets of governments, organisations or peoples (Kelly,2012). Many experts argue that Hacktivism shows how technology can be utilised whiletaking actions for social change, and others describe it a malicious, illegal, and destructiveacts that concentrates on undermining the securities of the internet. Primarily, the controversyof Hacktivism is divided into two parts; one side believes that activist movements should bepeaceful and they should not be destructive. And other side thinks that malicious cyber-attacks should be acceptable if they are conducted for the welfare of society by revealingillegal activities that affect a large number of peoples. According to Lohrmann (2017), the

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Is Hacktivism ever morally justified or is it just virtual vigilantism?
|6
|1835
|194

ITNET305A – Emerging Technologies Security
|9
|2728
|73

Hacktivism: Morally Justified or Virtual Vigilantism?
|20
|1041
|340

Hacktivism: A New Form of Hacking with Political Motives
|9
|2963
|30

Cybercrime, Cyberterrorism and Cyber Activism: Hacktivism
|11
|2479
|372

The Potential Consequences of Politically Motivated Hacking and Evaluation of Current Defense System
|11
|3363
|289