SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Anonymous
Who are they ? What are they doing ? What are they looking for ?




English presentation made by Paul and Nasser


                                                                   Page 1
Anonymous
Plan of the presentation

 Who are they ?
 • Presentation of the group
 • Ideas defended by Anonymous
 • « Symbols » of Anonymous group


 What they did, What they do, What they will do ?

 • List of operations and explications
 In the past, present and in the future




 Conclusion, What can we think of the group?




                                                    Page 2
Anonymous




            WHO ARE THEY ?

                             Page 3
Anonymous
Who are they ? - Presentation of the group

  Some people on the internet :
  Hackers, computer scientists, students, ordinary people from 4Chan
  Anonymous does not have a leader or controlling group, but operates as a loose
  collective which share similar ideals and aims.

  Nobody knows How much members exist !

  They define themself as the new superconsciousness of the Internet.


                    “Anonymous is a group, in the sense that a flock of birds is a group.
                    How do you know they're a group? Because they're traveling in the
                     same direction. At any given moment, more birds could join, leave,
                                                  peel off in another direction entirely.”
                                                                   Anonymous member



                                                                                   Page 4
Anonymous
Who are they ? - Ideas defended by Anonymous

  Defends all « Freedom » on the Internet
 •   Against censors
 •   Against enemies of the piracy on Internet
 •   Against dictator
 •   “Freedom online and of course in life”


  Expose the dangers of cults
 • Church of Scientology
 • Westboro Baptist Church


 • Try to demonstrate, any governement can’t gouvern The internet
  #AntiSec - #SOPA - #Hadopi - #OpMegaupload




                                                                    Page 5
Anonymous
Who are they ? - « Symbols » of Anonymous group

  V for Vendetta’s Mask
 • Express the revenge against censorship
  Black suit and black tie
 • Express the “Anonymous” term : “We are everybody”

  Their slogan

 “We are anonymous, We are legion. We do not forgive. We do not forget, expect us”


   Their logo

   Their robotic voice on their video




                                                                             Page 6
Anonymous




   WHAT THEY DID / DO / WILL DO ?

                                Page 7
Anonymous
What they did ?

  January 2008 :
 Church of Scientology - Projet Chanology
 Against censorship of a video of Tom Cruise
 http://www.dailymotion.com/video/xagw2n_tom-cruise-scientologue-interview-
 i_shortfilms
            Doing some manifestation and putting down officials website
            of Scientology



  October 2010 :
 Wikileaks and Julian Assange - Operation Payback
 Against censorship of the Wikileaks website
        Attacked Websites / Entreprises who abandon WL
        (Visa / PostFinance.ch / PayPal)




                                                                              Page 8
Anonymous
What they did ?

  January 2011 :
 Tunisia - Operation Tunisia
 Against governements censorship and black-out
         Attack Officials Websites
         Set up proxy to bypass websites censored by the government
         (Like Youtube/Tweeter/FaceBook)




  March 2011 :
 Sony - Operation Sony
 Against Sony's lawsuit against George Hotz
         Attack Officials Sony websites




                                                                      Page 9
Anonymous
What they did ?

  June 2011 :
 ANTI SECURITY - Operation AntiSec
 Alliance with a famous group of hacker : Lulzec.
 A spirit alliance.

 Anonymous goal : Freedom, free speaking, no censorship
 Lulzec : Just do it … for fun !

 The first and unique goal of this operation : Steal and
 publish government information and demonstrate a simple
 thing : “Any government or enterprise can’t have or
 censure the internet”,




                                                           Page 10
Anonymous
What they did ?

  June 2011 – … today and tomorow :
 Resume of all action on Operation AntiSec
 June : The group released a collection of documents stolen from the
 Arizona Department of Public Safety, these document included officers forwarding racist chain emails, a
 Fraternal Order of Police member who is also a convicted sex offender.

 July : Operation : « Turkish Takedown Thursday », who brought down and replaced the content of 74 official
 Turkish website for denouncing supposed attempts at internet censorship by the Turkish government.
 On 21 July, Anonymous released two PDFs purportedly taken from servers belonging to NATO. The first two
 documents released relate to outsourcing communication and information services (CIS) in Kosovo and the
 funding request for the project.

 August : On 16, Anonymous gained access to the email account of Richard Garcia, former Assistant director
 in Charge of the FBI field office in Los Angeles and Senior Vice President of Vanguard Defense Industries,
 The group released 1 gigabyte of information three days later, all of it taken from Garcia's personal email
 account.
                                                                          More than 50 actions on 6 month :
                                For the complet list : go to http://en.wikipedia.org/wiki/Operation_AntiSec




                                                                                                      Page 11
Anonymous
What they did ?

      September 2011 – December 2011 :
     Occupy Wall Street
 It’s a protest movement
 • began September 17, 2011 in Zuccotti Park, located in New York City's
      Wall Street financial district.

 •     The protests are against social and economic inequality, high
       unemployment, greed, as well as corruption, and the undue influence
       of corporations—particularly from the financial services sector—on
       government.

 •     The protesters' slogan “We are the 99%” refers to the growing income
       and wealth inequality in the U.S. between the wealthiest 1% and the
       rest of the population.

     Member of Anonymous group have given vocal support to the
     Occupy Wall Street movement, with vast numbers of members attending local protests and several blogs run
     by members covering the movement extensively




                                                                                                      Page 12
Anonymous
What they do now ?

 They continue their actions by regularly posting messages on various means of
 expression available on the Internet :




                                                                                 Page 13
Anonymous
What they will do ?

 WHO KNOWS ?

 And to sum up that : A trailer about a new documentary : “We are legion”




                                                                            Page 14
Anonymous
Conclusion, What can we think of the group?



   A group which born in 2008.


   We don't actually know how many people it concern.


   The anonymous is an anachist group without known leader


   Their activities range from computer hacking to manifestations in the street


   It’s a phenomenon which has interested the media since the 2008 crisis




                                                                                   Page 15
Anonymous
Conclusion, What can we think of the group?




                                              And have you got any
 Thank you for listening
                                                   question ?
         to us




                                                           Page 16

Weitere ähnliche Inhalte

Was ist angesagt?

Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on itWSO2
 
Malware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptxMalware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptxAlamgir Hossain
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its typesJatin Kumar
 
DDoS Attack Presentation.pptx
DDoS Attack Presentation.pptxDDoS Attack Presentation.pptx
DDoS Attack Presentation.pptxHusamKhan1
 
Sony Playstation Hack Presentation
Sony Playstation Hack PresentationSony Playstation Hack Presentation
Sony Playstation Hack PresentationCreditCardFinder
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 
Operating system security
Operating system securityOperating system security
Operating system securityRachel Jeewa
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Umesh Mahawar
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber securityPrateek Panda
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsEric Vanderburg
 

Was ist angesagt? (20)

Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Malware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptxMalware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptx
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
DDoS Attack Presentation.pptx
DDoS Attack Presentation.pptxDDoS Attack Presentation.pptx
DDoS Attack Presentation.pptx
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfare
 
malware analysis
malware  analysismalware  analysis
malware analysis
 
Sony Playstation Hack Presentation
Sony Playstation Hack PresentationSony Playstation Hack Presentation
Sony Playstation Hack Presentation
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Spyware
SpywareSpyware
Spyware
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
Dos attack
Dos attackDos attack
Dos attack
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 

Ähnlich wie Anonymous Group's History and Impact Explained

Offline Activism - How successful activism facilitate social media
Offline Activism - How successful activism facilitate social mediaOffline Activism - How successful activism facilitate social media
Offline Activism - How successful activism facilitate social mediaWilson Fung
 
Film 260 Flipbook
Film 260 FlipbookFilm 260 Flipbook
Film 260 FlipbookKylie Myers
 
FOSS and activism
FOSS and activismFOSS and activism
FOSS and activismsky croeser
 
How To Improve Your Essay Writing Skills - Dark Side O
How To Improve Your Essay Writing Skills - Dark Side OHow To Improve Your Essay Writing Skills - Dark Side O
How To Improve Your Essay Writing Skills - Dark Side ODawn Mora
 
World War 1 Essay Conclusion
World War 1 Essay ConclusionWorld War 1 Essay Conclusion
World War 1 Essay ConclusionJill Johnson
 
Topic Sentence Examples For Compare And Contrast Essay Conclusion
Topic Sentence Examples For Compare And Contrast Essay ConclusionTopic Sentence Examples For Compare And Contrast Essay Conclusion
Topic Sentence Examples For Compare And Contrast Essay ConclusionMelody Rios
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESJenny O'Meara
 
How to engage your audience with a call to action
How to engage your audience with a call to actionHow to engage your audience with a call to action
How to engage your audience with a call to actionDonata Columbro
 
Kazakh User Generated Content And Conversations
Kazakh User Generated Content And ConversationsKazakh User Generated Content And Conversations
Kazakh User Generated Content And ConversationsDaveLaFontaine
 
Ancient Greek Dbq Essay
Ancient Greek Dbq EssayAncient Greek Dbq Essay
Ancient Greek Dbq EssayRenee Spahn
 
Richard Wright Essay.pdf
Richard Wright Essay.pdfRichard Wright Essay.pdf
Richard Wright Essay.pdfAndrea Santiago
 
Richard Wright Essay.pdf
Richard Wright Essay.pdfRichard Wright Essay.pdf
Richard Wright Essay.pdfHeather Lopez
 
Paramount Studios Anti-Piracy Co-Op Initiative -- Strategic Document
Paramount Studios Anti-Piracy Co-Op Initiative -- Strategic DocumentParamount Studios Anti-Piracy Co-Op Initiative -- Strategic Document
Paramount Studios Anti-Piracy Co-Op Initiative -- Strategic DocumentGunther Sonnenfeld
 
Grade 12 Trade Union Essay
Grade 12 Trade Union EssayGrade 12 Trade Union Essay
Grade 12 Trade Union EssayAndrea Ngo
 
Engaging Times 2017
Engaging Times 2017Engaging Times 2017
Engaging Times 2017Steven Clift
 
The Good Hamburger - A Writing Lesson On Creatin
The Good Hamburger - A Writing Lesson On CreatinThe Good Hamburger - A Writing Lesson On Creatin
The Good Hamburger - A Writing Lesson On CreatinMary Burg
 

Ähnlich wie Anonymous Group's History and Impact Explained (18)

Social Media For Peace
Social Media For PeaceSocial Media For Peace
Social Media For Peace
 
Offline Activism - How successful activism facilitate social media
Offline Activism - How successful activism facilitate social mediaOffline Activism - How successful activism facilitate social media
Offline Activism - How successful activism facilitate social media
 
Film 260 Flipbook
Film 260 FlipbookFilm 260 Flipbook
Film 260 Flipbook
 
FOSS and activism
FOSS and activismFOSS and activism
FOSS and activism
 
How To Improve Your Essay Writing Skills - Dark Side O
How To Improve Your Essay Writing Skills - Dark Side OHow To Improve Your Essay Writing Skills - Dark Side O
How To Improve Your Essay Writing Skills - Dark Side O
 
World War 1 Essay Conclusion
World War 1 Essay ConclusionWorld War 1 Essay Conclusion
World War 1 Essay Conclusion
 
Topic Sentence Examples For Compare And Contrast Essay Conclusion
Topic Sentence Examples For Compare And Contrast Essay ConclusionTopic Sentence Examples For Compare And Contrast Essay Conclusion
Topic Sentence Examples For Compare And Contrast Essay Conclusion
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
How to engage your audience with a call to action
How to engage your audience with a call to actionHow to engage your audience with a call to action
How to engage your audience with a call to action
 
Wikipedia as a democracy
Wikipedia as a democracyWikipedia as a democracy
Wikipedia as a democracy
 
Kazakh User Generated Content And Conversations
Kazakh User Generated Content And ConversationsKazakh User Generated Content And Conversations
Kazakh User Generated Content And Conversations
 
Ancient Greek Dbq Essay
Ancient Greek Dbq EssayAncient Greek Dbq Essay
Ancient Greek Dbq Essay
 
Richard Wright Essay.pdf
Richard Wright Essay.pdfRichard Wright Essay.pdf
Richard Wright Essay.pdf
 
Richard Wright Essay.pdf
Richard Wright Essay.pdfRichard Wright Essay.pdf
Richard Wright Essay.pdf
 
Paramount Studios Anti-Piracy Co-Op Initiative -- Strategic Document
Paramount Studios Anti-Piracy Co-Op Initiative -- Strategic DocumentParamount Studios Anti-Piracy Co-Op Initiative -- Strategic Document
Paramount Studios Anti-Piracy Co-Op Initiative -- Strategic Document
 
Grade 12 Trade Union Essay
Grade 12 Trade Union EssayGrade 12 Trade Union Essay
Grade 12 Trade Union Essay
 
Engaging Times 2017
Engaging Times 2017Engaging Times 2017
Engaging Times 2017
 
The Good Hamburger - A Writing Lesson On Creatin
The Good Hamburger - A Writing Lesson On CreatinThe Good Hamburger - A Writing Lesson On Creatin
The Good Hamburger - A Writing Lesson On Creatin
 

Kürzlich hochgeladen

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Kürzlich hochgeladen (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Anonymous Group's History and Impact Explained

  • 1. Anonymous Who are they ? What are they doing ? What are they looking for ? English presentation made by Paul and Nasser Page 1
  • 2. Anonymous Plan of the presentation Who are they ? • Presentation of the group • Ideas defended by Anonymous • « Symbols » of Anonymous group What they did, What they do, What they will do ? • List of operations and explications In the past, present and in the future Conclusion, What can we think of the group? Page 2
  • 3. Anonymous WHO ARE THEY ? Page 3
  • 4. Anonymous Who are they ? - Presentation of the group  Some people on the internet : Hackers, computer scientists, students, ordinary people from 4Chan Anonymous does not have a leader or controlling group, but operates as a loose collective which share similar ideals and aims.  Nobody knows How much members exist ! They define themself as the new superconsciousness of the Internet. “Anonymous is a group, in the sense that a flock of birds is a group. How do you know they're a group? Because they're traveling in the same direction. At any given moment, more birds could join, leave, peel off in another direction entirely.” Anonymous member Page 4
  • 5. Anonymous Who are they ? - Ideas defended by Anonymous  Defends all « Freedom » on the Internet • Against censors • Against enemies of the piracy on Internet • Against dictator • “Freedom online and of course in life”  Expose the dangers of cults • Church of Scientology • Westboro Baptist Church • Try to demonstrate, any governement can’t gouvern The internet  #AntiSec - #SOPA - #Hadopi - #OpMegaupload Page 5
  • 6. Anonymous Who are they ? - « Symbols » of Anonymous group  V for Vendetta’s Mask • Express the revenge against censorship  Black suit and black tie • Express the “Anonymous” term : “We are everybody”  Their slogan “We are anonymous, We are legion. We do not forgive. We do not forget, expect us”  Their logo  Their robotic voice on their video Page 6
  • 7. Anonymous WHAT THEY DID / DO / WILL DO ? Page 7
  • 8. Anonymous What they did ?  January 2008 : Church of Scientology - Projet Chanology Against censorship of a video of Tom Cruise http://www.dailymotion.com/video/xagw2n_tom-cruise-scientologue-interview- i_shortfilms Doing some manifestation and putting down officials website of Scientology  October 2010 : Wikileaks and Julian Assange - Operation Payback Against censorship of the Wikileaks website Attacked Websites / Entreprises who abandon WL (Visa / PostFinance.ch / PayPal) Page 8
  • 9. Anonymous What they did ?  January 2011 : Tunisia - Operation Tunisia Against governements censorship and black-out Attack Officials Websites Set up proxy to bypass websites censored by the government (Like Youtube/Tweeter/FaceBook)  March 2011 : Sony - Operation Sony Against Sony's lawsuit against George Hotz Attack Officials Sony websites Page 9
  • 10. Anonymous What they did ?  June 2011 : ANTI SECURITY - Operation AntiSec Alliance with a famous group of hacker : Lulzec. A spirit alliance. Anonymous goal : Freedom, free speaking, no censorship Lulzec : Just do it … for fun ! The first and unique goal of this operation : Steal and publish government information and demonstrate a simple thing : “Any government or enterprise can’t have or censure the internet”, Page 10
  • 11. Anonymous What they did ?  June 2011 – … today and tomorow : Resume of all action on Operation AntiSec June : The group released a collection of documents stolen from the Arizona Department of Public Safety, these document included officers forwarding racist chain emails, a Fraternal Order of Police member who is also a convicted sex offender. July : Operation : « Turkish Takedown Thursday », who brought down and replaced the content of 74 official Turkish website for denouncing supposed attempts at internet censorship by the Turkish government. On 21 July, Anonymous released two PDFs purportedly taken from servers belonging to NATO. The first two documents released relate to outsourcing communication and information services (CIS) in Kosovo and the funding request for the project. August : On 16, Anonymous gained access to the email account of Richard Garcia, former Assistant director in Charge of the FBI field office in Los Angeles and Senior Vice President of Vanguard Defense Industries, The group released 1 gigabyte of information three days later, all of it taken from Garcia's personal email account. More than 50 actions on 6 month : For the complet list : go to http://en.wikipedia.org/wiki/Operation_AntiSec Page 11
  • 12. Anonymous What they did ?  September 2011 – December 2011 : Occupy Wall Street It’s a protest movement • began September 17, 2011 in Zuccotti Park, located in New York City's Wall Street financial district. • The protests are against social and economic inequality, high unemployment, greed, as well as corruption, and the undue influence of corporations—particularly from the financial services sector—on government. • The protesters' slogan “We are the 99%” refers to the growing income and wealth inequality in the U.S. between the wealthiest 1% and the rest of the population. Member of Anonymous group have given vocal support to the Occupy Wall Street movement, with vast numbers of members attending local protests and several blogs run by members covering the movement extensively Page 12
  • 13. Anonymous What they do now ? They continue their actions by regularly posting messages on various means of expression available on the Internet : Page 13
  • 14. Anonymous What they will do ? WHO KNOWS ? And to sum up that : A trailer about a new documentary : “We are legion” Page 14
  • 15. Anonymous Conclusion, What can we think of the group?  A group which born in 2008.  We don't actually know how many people it concern.  The anonymous is an anachist group without known leader  Their activities range from computer hacking to manifestations in the street  It’s a phenomenon which has interested the media since the 2008 crisis Page 15
  • 16. Anonymous Conclusion, What can we think of the group? And have you got any Thank you for listening question ? to us Page 16