1 / 15

Hacktivism

Hacktivism. Social Activism and Electronic Access. Access Denied: Chapter 6 Global Civil Society and the Securitization of the Internet. Deibert and Rohozinski mention Hacktivism in Chapter 6 when explaining how the internet altered social gathering and information exchange. Zapatistas

gavan
Télécharger la présentation

Hacktivism

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Hacktivism Social Activism and Electronic Access

  2. Access Denied: Chapter 6Global Civil Society and the Securitization of the Internet • Deibert and Rohozinski mention Hacktivism in Chapter 6 when explaining how the internet altered social gathering and information exchange. • Zapatistas • These methods were “duplicated in other similar acts directed against perceived injustice and corporate power throughout the 1990’s with ambiguous but always controversial results” (125)

  3. Hacktivism Defined….broadly…. • “Commonly defined as the marriage of political activism and computer hacking [which] combines the transgressive politics of civil disobedience with the technologies and techniques of computer hackers.1 • “Hacktivism is the nonviolent use of illegal or legally ambiguous digital tools in pursuit of political ends”2

  4. Hacktivism: 9 distinct forms of “electronic mischief” • Site defacements • virtual sabotage • Site redirection • Denial-of-Service • 1. consumption of computational resources, such as bandwidth, disk space or CPU time • 2. disruption of configuration information, such as routing information • 3. disruption of physical network components. • Information theft • Site parodies • information theft and distribution • Site parodies • Software development • Virtual Sit-Ins

  5. Some examples: • Site redirect: In 1999 a hacker redirected a KKK website to an anti-bigotry website (HateWatch). • Virtual Sabotage: 2001 InJustice worm spread through Microsoft Outlook Express and contained an attachment that apologized for the intrusion and informed the reader of the death of Palestinian boy during a conflict between Palestinian protesters and the Israeli military

  6. Common Targets • Cyberwars between • India and Pakistan • Israel and Palestine • China and the U.S. • Chinese Censorship • Anti-globalization • Anti-corporate • National Independence • Social conservative • Domestic US politics

  7. Three main types: • Political Cracking-i.e. Site defacement • Performative-i.e. Virtual sit-ins • Political Coding-i.e. circumventing Chinese Firewalls

  8. Why Hacktivism: • Gives power back to people and not just in masses • “The Internet does allow people who are taking part to share a basis of understanding as common ground from which to mediate consensus…and allows people to contribute to modifying systems…using communicative action”1

  9. Perspectives on Hacktivism • I think hacktivism should be about delivering a message, just like good old grass roots activism. It shouldn't be about doing damage to someone else network, or taking away their right to express their views. We just want to make a fuss so people will pay attention to what the message is we wish to deliver.

  10. I believe that programming code deserves protection under the First Amendment to the United States Constitution and, more generally, that censorship does not benefit society. Publishing a portion of DeCSS in my high school yearbook was a way to ensure that attempts to censor this speech would fail. (Michaels-Ober 2003)

  11. “Arguably,” one hacktivist writes, “you cannot effectively implement your right to free speech without stepping on the toes of another....hence, politically motivated hacking.”(Me Uh K. 1999) • any claim that you have 'rights' of expression online is clearly wrong. You have only what your service provider gives you. Beyond that, you'd have to challenge them under contract law through the courts - and you'll more than likely lose because in this arena it's contract law that has the primary weight, not civil rights law. (electrohippies 2003)

  12. People who have web sites up can spew whatever it is they want to say 24/7/365. If someone were to change the contents of a web site, and it remained changed for a few hours, how have they _REALLY_ infringed on their freedom of speech? (Buster 1999) • I have never participated in any DOS activities, nor will I. DOS attacks almost always have innocent, unintended victims in addition to the intended. I once worked at a small ISP which hosted several customers who drew DOS attacks. The attacks took the entire ISP offline, affecting not only the intended victim but many others as well.

  13. Food for Thought and Discussion: • Does Hacktivism do anything? Good or bad, does it make a difference? How? • Are Hacktivists saying something about free speech or are they just judging their freedom of speech to be more important than others?

  14. Information obtained from: • Andrea Samuel’s Dissertation: “Hacktivism and the Future of Political Participation” 2004 • http://www.alexandrasamuel.com/dissertation/pdfs/index.html • http://writ.news.findlaw.com/commentary/20030624_sprigman.html

More Related