SlideShare a Scribd company logo
1 of 19
Hacktivism in Online Games: Negotiating Transparency, Privacy, & Policy Making Burcu S. Bakioğlu Peter Ludlow
Hacktivism
Justice League United
Griefing
PatrioticNigras
Woodbury University
The Wrong Hands
Haruhi Thespian/Shadowcat
Lex Luther
Brainiac Wiki Tracked suspected griefers Compile information on SL users Records of chatlogs from JLU meetings with unsuspecting parties Plots to entice LL G-Team into banning players/users Damaged JLU reputation: misinformation, curious links btw them and LL
Threatened to sue Haruhi (legitimate access/no NDA) DMCA takedowns against bloggers who published the Wiki Pixeleen Mistral (editor of AH) outed as Mark McCahill (AppleII, POPMail, Gopher), claims fair use for journalism DMCA used to cover up extensive surveillance operation & full scope of its abuses in SL
Paradox Intrusion into private networks by social engineering/hacking Systemic violations of privacy by institutions and coding authorities

More Related Content

What's hot

Montilla K32 - DEEP WEB
Montilla K32 - DEEP WEBMontilla K32 - DEEP WEB
Montilla K32 - DEEP WEB
Poch Montilla
 

What's hot (7)

RSTREET17
RSTREET17RSTREET17
RSTREET17
 
Privacy and the Government
Privacy and the GovernmentPrivacy and the Government
Privacy and the Government
 
US mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledgeUS mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledge
 
Montilla K32 - DEEP WEB
Montilla K32 - DEEP WEBMontilla K32 - DEEP WEB
Montilla K32 - DEEP WEB
 
Hass & Associates Online Reviews
Hass & Associates Online ReviewsHass & Associates Online Reviews
Hass & Associates Online Reviews
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
 
Prism
PrismPrism
Prism
 

Viewers also liked

This is an interesting metadata source. Can I import it into Koha?
This is an interesting metadata source. Can I import it into Koha?This is an interesting metadata source. Can I import it into Koha?
This is an interesting metadata source. Can I import it into Koha?
Dobrica Pavlinušić
 
Re-Negotiating Narrative: Emergent Storytelling
Re-Negotiating Narrative: Emergent StorytellingRe-Negotiating Narrative: Emergent Storytelling
Re-Negotiating Narrative: Emergent Storytelling
PaleFire
 
Spectacular Subcultures: From luz to hacktivism
Spectacular Subcultures: From luz to hacktivismSpectacular Subcultures: From luz to hacktivism
Spectacular Subcultures: From luz to hacktivism
PaleFire
 
Poaching LG15: ARG-style
Poaching LG15: ARG-stylePoaching LG15: ARG-style
Poaching LG15: ARG-style
PaleFire
 
Kako napraviti Google od zgrade sa računalima?
Kako napraviti Google od zgrade sa računalima?Kako napraviti Google od zgrade sa računalima?
Kako napraviti Google od zgrade sa računalima?
Dobrica Pavlinušić
 
Slobodni softver za digitalne arhive: EPrints u Knjižnici Filozofskog fakulte...
Slobodni softver za digitalne arhive: EPrints u Knjižnici Filozofskog fakulte...Slobodni softver za digitalne arhive: EPrints u Knjižnici Filozofskog fakulte...
Slobodni softver za digitalne arhive: EPrints u Knjižnici Filozofskog fakulte...
Dobrica Pavlinušić
 

Viewers also liked (20)

This is an interesting metadata source. Can I import it into Koha?
This is an interesting metadata source. Can I import it into Koha?This is an interesting metadata source. Can I import it into Koha?
This is an interesting metadata source. Can I import it into Koha?
 
Re-Negotiating Narrative: Emergent Storytelling
Re-Negotiating Narrative: Emergent StorytellingRe-Negotiating Narrative: Emergent Storytelling
Re-Negotiating Narrative: Emergent Storytelling
 
Oslobodimo Hardware
Oslobodimo HardwareOslobodimo Hardware
Oslobodimo Hardware
 
Test
TestTest
Test
 
Spectacular Subcultures: From luz to hacktivism
Spectacular Subcultures: From luz to hacktivismSpectacular Subcultures: From luz to hacktivism
Spectacular Subcultures: From luz to hacktivism
 
REST ili kao sam se prestao brinuti o HTTP-u i zavolio ga (HTTP Server sa RFI...
REST ili kao sam se prestao brinuti o HTTP-u i zavolio ga (HTTP Server sa RFI...REST ili kao sam se prestao brinuti o HTTP-u i zavolio ga (HTTP Server sa RFI...
REST ili kao sam se prestao brinuti o HTTP-u i zavolio ga (HTTP Server sa RFI...
 
IAZ2013 - Gopress voor openbare bibliotheken
IAZ2013 - Gopress voor openbare bibliothekenIAZ2013 - Gopress voor openbare bibliotheken
IAZ2013 - Gopress voor openbare bibliotheken
 
Virtual Reality Applications in Career Consulting - Potential & Restictions
Virtual Reality Applications in Career Consulting  - Potential & RestictionsVirtual Reality Applications in Career Consulting  - Potential & Restictions
Virtual Reality Applications in Career Consulting - Potential & Restictions
 
Denk- en discussiedag sept 2010: digitale collectie
Denk- en discussiedag sept 2010: digitale collectieDenk- en discussiedag sept 2010: digitale collectie
Denk- en discussiedag sept 2010: digitale collectie
 
Wiki: Open Collaborative Learning Environment
Wiki: Open Collaborative Learning EnvironmentWiki: Open Collaborative Learning Environment
Wiki: Open Collaborative Learning Environment
 
Poaching LG15: ARG-style
Poaching LG15: ARG-stylePoaching LG15: ARG-style
Poaching LG15: ARG-style
 
Post-relational databases: What's wrong with web development? v3
Post-relational databases: What's wrong with web development? v3Post-relational databases: What's wrong with web development? v3
Post-relational databases: What's wrong with web development? v3
 
Ppt Demo Slideshare
Ppt Demo SlidesharePpt Demo Slideshare
Ppt Demo Slideshare
 
Web scale monitoring
Web scale monitoringWeb scale monitoring
Web scale monitoring
 
Free Libre Open Source Software at FFZG library
Free Libre Open Source Software at FFZG libraryFree Libre Open Source Software at FFZG library
Free Libre Open Source Software at FFZG library
 
What Is Powerpoint
What Is PowerpointWhat Is Powerpoint
What Is Powerpoint
 
Εκπαίδευση Web 2.0 στο Δημόσιο
Εκπαίδευση Web 2.0 στο ΔημόσιοΕκπαίδευση Web 2.0 στο Δημόσιο
Εκπαίδευση Web 2.0 στο Δημόσιο
 
Kako napraviti Google od zgrade sa računalima?
Kako napraviti Google od zgrade sa računalima?Kako napraviti Google od zgrade sa računalima?
Kako napraviti Google od zgrade sa računalima?
 
Towards an Instructional Design Motivational Framework to Address the Retenti...
Towards an Instructional Design Motivational Framework to Address the Retenti...Towards an Instructional Design Motivational Framework to Address the Retenti...
Towards an Instructional Design Motivational Framework to Address the Retenti...
 
Slobodni softver za digitalne arhive: EPrints u Knjižnici Filozofskog fakulte...
Slobodni softver za digitalne arhive: EPrints u Knjižnici Filozofskog fakulte...Slobodni softver za digitalne arhive: EPrints u Knjižnici Filozofskog fakulte...
Slobodni softver za digitalne arhive: EPrints u Knjižnici Filozofskog fakulte...
 

Similar to Hacktivism in Virtual Worlds

Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
Prashant Angadi
 

Similar to Hacktivism in Virtual Worlds (6)

The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav Gaur
 
Ethical hacking for computer science
Ethical hacking for computer scienceEthical hacking for computer science
Ethical hacking for computer science
 
Cyber war as a modern war weapon
Cyber war as a modern war weaponCyber war as a modern war weapon
Cyber war as a modern war weapon
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
 

Hacktivism in Virtual Worlds

Editor's Notes

  1. The sins of the bad boys in the Woodbury group seems to be a little bit more serious… not because that they harbered griefers extraordinaire amongst themselves (which unfortunately they did) but that they ruffled up some feathers in the ranks of Lindens. First the JLU Wiki leak masterminded by the WU subgroup, the Wrong Hands, then the exposition of the Emerald viewer developers, Jcool et al… again by the Wrong Hands… Let’s put it this way: the information revealed as a result of the Brainiac Wiki leak suggested that some of the folks in the G-team had been getting rather cozy with some of the people who like to wear tight spandex. The questioning of Fractured Crystal (Jcool) as to his motives (and his questionable background) by the Wrong Hands and the disclosure of the datamining that had been taking place in the Emerald viewer severly undermined the credibility of LL who gave its blessing to the tainted viewer. So the logical conclusion, in the absence of any other explanation at the wake of this unexpected move was that these two incidents led to the mass ban of WU.Feted Inner Core -> Feted Inner SandboxDepartment of Media, Culture, and Design, Edward Clift