SlideShare ist ein Scribd-Unternehmen logo
1 von 28
1
The policy or action of using vigorous campaigning to
bring about political or social change.
3
“Use ofTechnology over large distances to effect change.”
“Grassroots activists using networked technologies for social
and political change campaigns.”
“Goal of Political or Social Change + DigitalTechnology.”
4
 Maps & Maptivism
 QR Codes
 File-Sharing
 Media Hijacking
 Trend a hashtag
 Search Engine
Optimisation
 Livestreaming
 Check-Ins
 Self-Surveillance
 Flash Mobs
5
6
Digital Activism is separated from Hacktivism by Computer Crime
 Computer Crime is well defined:
▪ UnauthorisedAccess to computer material
▪ Unauthorised access with intent to commit further offences
▪ Unauthorised acts with intent to impair the operation of a computer
▪ Making, supplying or obtaining article for use in computer misuse offences
Hactkivism is separated from CyberTerrorism byTerrorism
 Terrorism in this context is well defined
▪ Anything designed to interfere with or seriously disrupt an electronic system
and
▪ Use or threat to influence government or intimidate the public and
▪ Use or threat is made for the purpose of advancing a political or ideological
cause
8
 Software distribution
 Website mirroring
 Defacements
 Typosquatting
 Redirects
 Denial of Service Attacks (DOS)
 Web Sit-ins
 Email Bombs
 Distributed Denial of Service Attacks (DDOS)
 Opt-In Botnets
 Malware Botnets
 Doxing
 SWATting
9
Denial of Service
 An attempt by an attacker to deny a victims
services to it’s users.
1. Exploit that causes victim to fail
2. Resource exhaustion:
▪ Network Bandwidth
▪ Computing Power
▪ Memory
11
Distributed Denial of Service
 A Dos launched simultaneously from multiple points
 Usually a resource exhaustion attack
 Attackers now build networks (Botnets) of compromised computers
(zombies or loads) from which to launch their attacks
 Large Botnets are now available for hire or to buy for pocket money.
12
1000 Loads 5000 Loads 10,000 Loads
World Mix $25 $110 $200
EU Mix $50 $225 $400
DE,CA, GB $80 $350 $600
USA $120 $550 $1000
13
14
15
16
First known Hacktivism recorded in 1989
 Worms Against Nuclear Killers
 Australian Hacktivists
 InfectedVMS DECNet systems
18
Formed in 2003 from the
4chan /b/ message
board
Since 2004 4chan is a
forced anonymous
community
The Btards Initially
focused on
pranks, trolling and
griefing
19
 Anonymous were ‘politicised’ in 2008 following a
series of actions involving the Church of
Scientology.
 Actions inlcuded:
 Physical protests
▪ Guy Fawkes masks
 Prank calls
 Black faxes
 DDoS attacks
▪ Low Orbit Ion Cannon (LOIC)
 IRC channels used to coordinate attacks.
20
Operation Payback (2010)
 DDoS attacks on the Pirate Bay by
MPAA & RIAA
 Expands to include other copyright-
related targets
 Attacks on Paypal, Matercard andVisa
related toWikileaks
Operation Darknet (2011)
 Targeted child pornography sites on the
Tor network
 Release usernames from the site “Lolita
City”
21
 Angry
 Chaotic
 Constantly changing
 International
 Broad themes not specific goals
 Uncoordinated
 Unfinanced
 Differences in philosophy and undefined
subgroups
 No long term vision
22
 A splinter group formed in 2011 as a result of
Operation Darknet known as Lulzsec
 50 day rampage
 Anti-Sec Movement
 “Demonstrating insecurity to improve
security”
23
 Pro-Syrian Regime Hacktivists
 First seen May 2011
 Targeting major news organisations
 BBC
 Associated Press
 Guardian
 CBS News
 NPR
 Also activists
 Columbia University
 Human RightsWatch
 And oddly … FIFA
 Sepp Blatter
 2014World Cup
24
25
The underground community has learnt lessons
from Lulzsec
 They have reviewed the evidence presented in
court
 Developing guidance:
 Create a cover
 Work on the legend
 Create sub-aliases
 Never contaminate
 Produced the “10 Hack Commandments”
27
Introduction to Hacktivism

Weitere ähnliche Inhalte

Was ist angesagt?

Maeve mis presentation
Maeve mis presentationMaeve mis presentation
Maeve mis presentationmisecho
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3misecho
 
5 Media Innovations From The Secret Deep Web
5 Media Innovations From The Secret Deep Web5 Media Innovations From The Secret Deep Web
5 Media Innovations From The Secret Deep WebAmber Horsburgh
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat IntelligenceMarlabs
 
An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of GovernmentsRobbie Mitchell
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
Cybercrime or...? by Johnny Lundberg, Deputy Police Chief, The National polic...
Cybercrime or...? by Johnny Lundberg, Deputy Police Chief, The National polic...Cybercrime or...? by Johnny Lundberg, Deputy Police Chief, The National polic...
Cybercrime or...? by Johnny Lundberg, Deputy Police Chief, The National polic...InfinIT - Innovationsnetværket for it
 
The Dark Web
The Dark WebThe Dark Web
The Dark WebJan Siy
 
Towngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationTowngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationCharles Mok
 
The WikiLeaks Conundrum
The WikiLeaks ConundrumThe WikiLeaks Conundrum
The WikiLeaks ConundrumMsifry
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around uslichuyuliting
 

Was ist angesagt? (18)

Maeve mis presentation
Maeve mis presentationMaeve mis presentation
Maeve mis presentation
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3
 
5 Media Innovations From The Secret Deep Web
5 Media Innovations From The Secret Deep Web5 Media Innovations From The Secret Deep Web
5 Media Innovations From The Secret Deep Web
 
Dark net
Dark netDark net
Dark net
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat Intelligence
 
Piracy
PiracyPiracy
Piracy
 
An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of Governments
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
Darknet
DarknetDarknet
Darknet
 
Cybercrime or...? by Johnny Lundberg, Deputy Police Chief, The National polic...
Cybercrime or...? by Johnny Lundberg, Deputy Police Chief, The National polic...Cybercrime or...? by Johnny Lundberg, Deputy Police Chief, The National polic...
Cybercrime or...? by Johnny Lundberg, Deputy Police Chief, The National polic...
 
Dark net
Dark netDark net
Dark net
 
Darknet
DarknetDarknet
Darknet
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
 
Towngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationTowngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentation
 
Scuba diving into The Deep Dark Web
Scuba diving into The Deep Dark WebScuba diving into The Deep Dark Web
Scuba diving into The Deep Dark Web
 
The WikiLeaks Conundrum
The WikiLeaks ConundrumThe WikiLeaks Conundrum
The WikiLeaks Conundrum
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around us
 

Andere mochten auch

First Responders Course - Session 8 - Digital Evidence Collection [2004]
First Responders Course - Session 8 - Digital Evidence Collection [2004]First Responders Course - Session 8 - Digital Evidence Collection [2004]
First Responders Course - Session 8 - Digital Evidence Collection [2004]Phil Huggins FBCS CITP
 
PIANOS: Protecting Information About Networks The Organisation and It's Syste...
PIANOS: Protecting Information About Networks The Organisation and It's Syste...PIANOS: Protecting Information About Networks The Organisation and It's Syste...
PIANOS: Protecting Information About Networks The Organisation and It's Syste...Phil Huggins FBCS CITP
 
First Responder Course - Session 10 - Static Evidence Collection [2004]
First Responder Course - Session 10 - Static Evidence Collection [2004]First Responder Course - Session 10 - Static Evidence Collection [2004]
First Responder Course - Session 10 - Static Evidence Collection [2004]Phil Huggins FBCS CITP
 
First Response - Session 11 - Incident Response [2004]
First Response - Session 11 - Incident Response [2004]First Response - Session 11 - Incident Response [2004]
First Response - Session 11 - Incident Response [2004]Phil Huggins FBCS CITP
 
PIANOS: Protecting Information About Networks The Organisation and It's Systems
PIANOS: Protecting Information About Networks The Organisation and It's Systems PIANOS: Protecting Information About Networks The Organisation and It's Systems
PIANOS: Protecting Information About Networks The Organisation and It's Systems Phil Huggins FBCS CITP
 
Cyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksCyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksPhil Huggins FBCS CITP
 
First Responders Course- Session 1 - Digital and Other Evidence [2004]
First Responders Course- Session 1 - Digital and Other Evidence [2004]First Responders Course- Session 1 - Digital and Other Evidence [2004]
First Responders Course- Session 1 - Digital and Other Evidence [2004]Phil Huggins FBCS CITP
 
Security and Resilience Vulnerabilities in the UK’s Telecoms Networks
Security and Resilience Vulnerabilities in the UK’s Telecoms Networks Security and Resilience Vulnerabilities in the UK’s Telecoms Networks
Security and Resilience Vulnerabilities in the UK’s Telecoms Networks Phil Huggins FBCS CITP
 

Andere mochten auch (20)

Security Analytics Beyond Cyber
Security Analytics Beyond CyberSecurity Analytics Beyond Cyber
Security Analytics Beyond Cyber
 
Intelligence-led Cybersecurity
Intelligence-led Cybersecurity Intelligence-led Cybersecurity
Intelligence-led Cybersecurity
 
First Responders Course - Session 8 - Digital Evidence Collection [2004]
First Responders Course - Session 8 - Digital Evidence Collection [2004]First Responders Course - Session 8 - Digital Evidence Collection [2004]
First Responders Course - Session 8 - Digital Evidence Collection [2004]
 
PIANOS: Protecting Information About Networks The Organisation and It's Syste...
PIANOS: Protecting Information About Networks The Organisation and It's Syste...PIANOS: Protecting Information About Networks The Organisation and It's Syste...
PIANOS: Protecting Information About Networks The Organisation and It's Syste...
 
Delivering Secure Projects
Delivering Secure ProjectsDelivering Secure Projects
Delivering Secure Projects
 
Measuring black boxes
Measuring black boxesMeasuring black boxes
Measuring black boxes
 
First Responder Course - Session 10 - Static Evidence Collection [2004]
First Responder Course - Session 10 - Static Evidence Collection [2004]First Responder Course - Session 10 - Static Evidence Collection [2004]
First Responder Course - Session 10 - Static Evidence Collection [2004]
 
First Response - Session 11 - Incident Response [2004]
First Response - Session 11 - Incident Response [2004]First Response - Session 11 - Incident Response [2004]
First Response - Session 11 - Incident Response [2004]
 
Security Metrics [2008]
Security Metrics [2008]Security Metrics [2008]
Security Metrics [2008]
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Network Reconnaissance Infographic
Network Reconnaissance InfographicNetwork Reconnaissance Infographic
Network Reconnaissance Infographic
 
PIANOS: Protecting Information About Networks The Organisation and It's Systems
PIANOS: Protecting Information About Networks The Organisation and It's Systems PIANOS: Protecting Information About Networks The Organisation and It's Systems
PIANOS: Protecting Information About Networks The Organisation and It's Systems
 
Probability Calibration
Probability CalibrationProbability Calibration
Probability Calibration
 
Countering Cyber Threats
Countering Cyber ThreatsCountering Cyber Threats
Countering Cyber Threats
 
Cyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksCyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber Shocks
 
First Responders Course- Session 1 - Digital and Other Evidence [2004]
First Responders Course- Session 1 - Digital and Other Evidence [2004]First Responders Course- Session 1 - Digital and Other Evidence [2004]
First Responders Course- Session 1 - Digital and Other Evidence [2004]
 
UK Legal Framework (2003)
UK Legal Framework (2003)UK Legal Framework (2003)
UK Legal Framework (2003)
 
Security and Resilience Vulnerabilities in the UK’s Telecoms Networks
Security and Resilience Vulnerabilities in the UK’s Telecoms Networks Security and Resilience Vulnerabilities in the UK’s Telecoms Networks
Security and Resilience Vulnerabilities in the UK’s Telecoms Networks
 
Resilience is the new cyber security
Resilience is the new cyber securityResilience is the new cyber security
Resilience is the new cyber security
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 

Ähnlich wie Introduction to Hacktivism

2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats ReportMcafeeCareers
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxchrixymae
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGJyotisheklingji
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxwhittemorelucilla
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...CODE BLUE
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activismjwilso
 
Cyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and OmanCyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and OmanMubarak Al Hadadi
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick SurveyArindam Sarkar
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 

Ähnlich wie Introduction to Hacktivism (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats Report
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Final ppt
Final pptFinal ppt
Final ppt
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 
NCSC Speaker
NCSC Speaker NCSC Speaker
NCSC Speaker
 
Cyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and OmanCyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and Oman
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
 
Polinter11
Polinter11Polinter11
Polinter11
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Kürzlich hochgeladen

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxtrishalcan8
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 

Kürzlich hochgeladen (20)

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 

Introduction to Hacktivism

  • 1. 1
  • 2.
  • 3. The policy or action of using vigorous campaigning to bring about political or social change. 3
  • 4. “Use ofTechnology over large distances to effect change.” “Grassroots activists using networked technologies for social and political change campaigns.” “Goal of Political or Social Change + DigitalTechnology.” 4
  • 5.  Maps & Maptivism  QR Codes  File-Sharing  Media Hijacking  Trend a hashtag  Search Engine Optimisation  Livestreaming  Check-Ins  Self-Surveillance  Flash Mobs 5
  • 6. 6
  • 7.
  • 8. Digital Activism is separated from Hacktivism by Computer Crime  Computer Crime is well defined: ▪ UnauthorisedAccess to computer material ▪ Unauthorised access with intent to commit further offences ▪ Unauthorised acts with intent to impair the operation of a computer ▪ Making, supplying or obtaining article for use in computer misuse offences Hactkivism is separated from CyberTerrorism byTerrorism  Terrorism in this context is well defined ▪ Anything designed to interfere with or seriously disrupt an electronic system and ▪ Use or threat to influence government or intimidate the public and ▪ Use or threat is made for the purpose of advancing a political or ideological cause 8
  • 9.  Software distribution  Website mirroring  Defacements  Typosquatting  Redirects  Denial of Service Attacks (DOS)  Web Sit-ins  Email Bombs  Distributed Denial of Service Attacks (DDOS)  Opt-In Botnets  Malware Botnets  Doxing  SWATting 9
  • 10.
  • 11. Denial of Service  An attempt by an attacker to deny a victims services to it’s users. 1. Exploit that causes victim to fail 2. Resource exhaustion: ▪ Network Bandwidth ▪ Computing Power ▪ Memory 11
  • 12. Distributed Denial of Service  A Dos launched simultaneously from multiple points  Usually a resource exhaustion attack  Attackers now build networks (Botnets) of compromised computers (zombies or loads) from which to launch their attacks  Large Botnets are now available for hire or to buy for pocket money. 12 1000 Loads 5000 Loads 10,000 Loads World Mix $25 $110 $200 EU Mix $50 $225 $400 DE,CA, GB $80 $350 $600 USA $120 $550 $1000
  • 13. 13
  • 14. 14
  • 15. 15
  • 16. 16
  • 17.
  • 18. First known Hacktivism recorded in 1989  Worms Against Nuclear Killers  Australian Hacktivists  InfectedVMS DECNet systems 18
  • 19. Formed in 2003 from the 4chan /b/ message board Since 2004 4chan is a forced anonymous community The Btards Initially focused on pranks, trolling and griefing 19
  • 20.  Anonymous were ‘politicised’ in 2008 following a series of actions involving the Church of Scientology.  Actions inlcuded:  Physical protests ▪ Guy Fawkes masks  Prank calls  Black faxes  DDoS attacks ▪ Low Orbit Ion Cannon (LOIC)  IRC channels used to coordinate attacks. 20
  • 21. Operation Payback (2010)  DDoS attacks on the Pirate Bay by MPAA & RIAA  Expands to include other copyright- related targets  Attacks on Paypal, Matercard andVisa related toWikileaks Operation Darknet (2011)  Targeted child pornography sites on the Tor network  Release usernames from the site “Lolita City” 21
  • 22.  Angry  Chaotic  Constantly changing  International  Broad themes not specific goals  Uncoordinated  Unfinanced  Differences in philosophy and undefined subgroups  No long term vision 22
  • 23.  A splinter group formed in 2011 as a result of Operation Darknet known as Lulzsec  50 day rampage  Anti-Sec Movement  “Demonstrating insecurity to improve security” 23
  • 24.  Pro-Syrian Regime Hacktivists  First seen May 2011  Targeting major news organisations  BBC  Associated Press  Guardian  CBS News  NPR  Also activists  Columbia University  Human RightsWatch  And oddly … FIFA  Sepp Blatter  2014World Cup 24
  • 25. 25
  • 26.
  • 27. The underground community has learnt lessons from Lulzsec  They have reviewed the evidence presented in court  Developing guidance:  Create a cover  Work on the legend  Create sub-aliases  Never contaminate  Produced the “10 Hack Commandments” 27

Hinweis der Redaktion

  1. Activism often involves peaceful protest. The social trade-off is that the protesters are arrested when they break the law and get their day in court to argue their case.Technology & Change are the key themes in digital activism.A potential lack of identity of ‘digital protestors’ is an increasing problem for a definition of a digital peaceful protest.
  2. Traditional activism actions can almost all be translated to the digital arena.Gene Sharp – The Politics of Nonviolent Action (1973)Three volumes, Volume 2 was The Methods of Nonviolent Action.198 methods of activism defined.GoogleBombs
  3. Techtoolsforactivism.orgOx4.org – Web hostingAktivix.org – Email & VPNsNetwork23.org – Blogs and webhostingRiseup.net – EmailTachanka.org – Web hostingIndy.im - MicrobloggingHacktionlab.org – Meetups and trainingThe Guardian Project – Android Mobile apps
  4. Term Hacktivism first coined in 1995Computer Misuse Act (1990) Part 5 of the Police and Justice Act 2006 (Sections 35 – 38)UK Terrorism Act (2000)Not clear there has ever been a Cyberterrorist incident.The use of Hacktivism and CyberTerrorism blurred.
  5. Software distributionPhil Zimmerman – PGPHacking tools under EU Cybercrime law?Website mirroring is an issue of Hacktivism if the content is ‘illegal’.SWATting usually relies on some form of caller ID spoofing.
  6. Lethal Packets – ping of death. Aimed at bugs in the operating system or networking code.High impact Packets Crypto processing Less of a concern now due to excess of processing power
  7. Malware as a service
  8. Russian Cybercrime-as-a-service exposed by the BBC in 2009Includes an MP3 player!Zeus crimeware kit
  9. Master zombies & slave zombiesNot immediately obvious it’s an attack if there are potential high-volume uses of the service.Spoofed IP packets common, hard to filter and harder to track back.They don’t need to receive data back.
  10. Reflectors are uninfected machines.Requests from Slaves to reflectors look like connection requests from the victim.Reflectors respond to the victim as though it had tried to connect to them.Tend to be much bigger attacks.
  11. First hacktivistDDoS may have been the Zippies on Guy Fawkes Day in 1994 protesting the Criminal Justice Bill.Email bomb – large volumes of email.Code for DoSsynfloods published in 1996 in 2600. First publicly reported case was Panix an NY ISP..
  12. 4chan was created by ‘moot’ a member of the Something Awful forums that spawned the Goons, another group of trolls and griefers between 2003 and 2004.Habbo Hotel was an isometric avatar driven ‘hangout for teens’. Originally a target of the Goons it drew the attention of Btards.Habbo Raid July 2006, Black avatar wearing a suit with an affro. They would congregate in large numbers and block access to the swimming pools claiming they were closed due to aids, they also often formed up into large swastikas. Disruptive but unfocused.
  13. Video on Gawker of Tom Cruise praising the religion led to a cease-and –desist letter. V for Vendetta. – Anarchist revolutionary.
  14. HBGary Federal attack (Qinetiq leak)SQL injection on the website CMS Grabbed the database – usernames, email, passwords Admins at HBGary used their same passwords everywhere (Twitter, linkedin, the email server, shell server) Social engineered another administrator using a high privileged email account.HBGary had been investigating Anonymous and made some public claims about their ability to identify them.Rootkit.com admin access.
  15. Concerns have been shown to focus on civil liberty and privacy.See themselves as doing evil to avoid a greater evil.Some informal links to Occupy.
  16. Anti-Sec Goes back to 1999 with EL8 and Project MayhemHector Monsegur, Sabu, turned federal witness againstLulzsec and Anonymous. Reused anonymous usernames and mixed identities Logged into IRC without anonymising his connection Leaked personal information in conversations Mentioned a Whois record with his real name and address while using an alias Used a stolen credit card to send goods to his home addressStratfor, corporate intelligence firm, emails subsequently distributed by Wikileaks.SQL injection again.Credit card detailsMade donations to charities using credit cards from HBGaryBackfired on the charitiesBecause SABU had been turned he was able to record the entire hack and related conversations which led to the downfall of Lulzsec
  17. Facebook PageWebsite Registered by Syrian Computer Society – Headed by al-Assad in the 1990s Hosted on Syrian government networks Claims that a Syrian owned Dubai company is funding the attacksNot clear that only Syrians are involved as there has been a recruitment drive via social media.Suspicion of technical support from Russia.Targeted facebook pages and now twitter accounts.Phishing attacks used. Breaches are more extensive than the twitter posts suggest.
  18. The Associated Press hack described a successful bomb attack on President Obama.$130bn value dropped off the stock market.Dow Jones Industrial dropped 145 points.Stock markets recovered.
  19. Search on slideshare.net for Opsec for HackersNever reveal your operational detailsNever reveal your plansNever trust anyoneNever confuse recreation and hackingNever operate from your own houseBe proactively paranoid, it doesn’t work retroactivelyKeep personal life and hacking separatedKeep your personal environment contraband freeDon’t talk to the PoliceDon’t give anyone power over you