Anonymous: Cyber Terrorists or Internet Saviors?

Slides:



Advertisements
Similar presentations
UNIT 20 The ex-hacker.
Advertisements

Cyberbullying.
National Cybersecurity Awareness Campaign. Campaign Background  In May 2009, President Obama issued the Cyberspace Policy Review, which recommends the.
INTERNET SAFETY.
INTERNET SAFETY FOR STUDENTS
ANTI- BULLYING WEEK CYBER BULLYING 16 – 20 November 2009.
Internet Safety and Awareness Cyberbullies and Predators Enfield High School Computer Network.
Cyber-bullying and Internet Safety. What is Bullying?  Intentionally causing harm to others  Verbal harassment  Physical assault  Exclusion from a.
e-safety and cyber bullying
Prepared by: Nahed Al-Salah
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Cyberbullying Internet Saftey: Information for H.S. Students.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
INTERNET SAFETY FOR STUDENTS
National Cybersecurity Awareness Campaign: Chatting with Kids About Being Online.
Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.
Safeguarding. Your responsibility Your responsibility.
Digital Citizenship By Bhavna. Plagiarism Plagiarism is illegal and can get you arrested. If a teacher finds out you used plagiarism he/she can fail you.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
A Fleming Parent’s Guide to Child Safety on the Internet Adapted by Kam Purewal June 24,2010 Based on: Responding to Cyberbullying: A Guide for School.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Online Safety Written by: Asael Estrada. Usernames & Passwords Never give out your username or password. You shouldn’t give it out because someone might.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Cyber Bullying Challenges for Educators, Legal issues, and Advice for Students and Parents.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
YOU Only YOU Can Stop Internet Hazards NETS: 5. Digital Citizenship Students understand human, cultural, and societal issues related to technology and.
Task 1 Research on any 2 of the following: Online shopping Online banking Web broadcasting Social networking sites Discuss the disadvantages and advantages.
Do pictures always give truthful information? Can publishing it be hurtful??
100 Internet Safety Jeopardy Social Network Sites Online Shopping Words & Pictures Cyber- bullying Internet Scams.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Cyber Bullying Texting/Instant Messaging Lesson One Social Development 1 8th Grade.
Cyber Bullying By Sarah Chaouk and Astede Woldegebriel.
 Anonymous is a loosely knit internet activist group mainly focusing on standing up against internet censorship.  The group is completely democratic,
PREPARED BY: SHOUA VANG ABHINAV JUWA CHASE PAUL EASy Security Project Anonymous vs HBGary Inc.
The Security Circus.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
By: Jithin and Rey.  Cyber bullying is a form of bullying, which is carried out through an internet service such as , chat room, discussion group,
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
INTERNET SAFETY Thornell Road Library Let’s Discuss: Information Privacy Social Networking CyberbullyingNetiquette.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Cyber Safety Jamie Salazar.
Computer crimes.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Computer Crimes Justin A. Sarvey. Overview Define computer crime Define computer crime Examples of computer crime Examples of computer crime Statistics.
PROTECT YOURSELF Cyberbullying. Why do you think people cyberbully? How does your school deal with cyberbullying? Have you ever sent a mean message because.
HACKING: THE GOOD AND BAD SIDES In this presentation, we will talk about the good and bad sides of hacking, and also the different points of view on this.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Safe Surfin’ on the Internet
Creating your online identity
The Disadvantages of ICT
CYBER BULLYING 16 – 20 November 2009
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Online Safety! By: Michelle Deng.
Hacking: The Good and Bad sides
Issues In media studies: Cyberbullying
Internet Safety for Everyone
Sexting & Consent.
Follow safety rules so that YOU: Avoid getting HURT.
Cyberbullying PREPARED FOR STUDENTS OF SHAC ST. JOHN’S COLLEGE.
Internet Social Media. Internet Social Media Benefits: Internet is a useful tool if utilized appropriately. Uses Benefits: Internet is a useful tool.
CYBERSAFETY & Personal information
Internet Safety for Everyone
Bullying Prevention.
Internet Safety.
Internet Safety for Everyone
Internet Safety for Everyone
Online Safety Assembly.
Cybercrime By: Kimberly Foreiter
Presentation transcript:

Anonymous: Cyber Terrorists or Internet Saviors? Ryan Jacobs

What is Anonymous? Anonymous is a group of activists and hacktivists that spread across the globe The word hacktivist is a combination of “hack” and “activist” and is used to describe someone that computers to promote their beliefs. As you can conclude from their name, anonymity is the foundation of the group

Origin The concept of Anonymous arose on the notorious website 4chan. Discussion boards on 4chan were typically used for entertainment. One discussion board automatically set the name for anyone that posted to “anonymous” This anonymous board quickly grew popular

Origin cont. The users of this board would occasionally come together to do mass pranks and raids on various website. After a couple of these online raids there was a press story covering Anonymous calling them “hackers on steroids”. Since then Anonymous became an official group and has been expanding.

Philosophy The websites and organizations Anonymous attack seems sporadic but it seems they have a system of beliefs They are against anti-piracy campaigns, child pornography, Westboro Baptist Church and anything else they deem unmoral

Anonymous as Villains Many people view Anonymous as threats instead of heroes They see the group as immature kids messing with people on the internet The actions of the hackers have not been pure There have been cases of harassment, stolen information, releasing people’s personal information to the public, and much more

Bomb Threats In 2006 an anonymous member threatened to detonate bombs at seven NFL stadiums He never actually intended to set off any bombs; he just wanted to scare a large amount of people

Cyber Bullying Back in the day when Myspace was popular Anonymous members would using their hacking skills to get onto a person’s profile who they didn’t like and post inappropriate things and images They had nothing to gain from this, and there was no motive other than their dislike for the victim

Aaron Barr Attack Aaron Barr, the CEO of a computer security firm, researched Anonymous and threatened to expose members of the group. In February 2011 Anonymous retaliated by hacking into his email and making all of his business emails available for download to the public. The email leak caused quite a stir and Barr ended up resigning shortly after

Sony Gets Targeted Sony took measures to stop hacking taking place on their gaming console Anonymous took offense to that and responded by shutting down PlayStation Network for a month Anonymous had access to over 100 million Sony accounts, some of which included credit card information

Anonymous as Heroes Anonymous is unlike most groups They have no clear-cut leader and are spread out across the globe There is often disagreement within the group so their actions don’t represent their intentions as a whole They have done plenty of good actions that has won them supporters

Hal Turner Hal Turner was a white supremacist radio host He sued 4chan in January 2007 for copyright infringement Anonymous took his website offline and used up Turner’s bandwidth which resulted in thousands of dollars in bills

Project Chanology Anonymous openly attacked the Church of Scientology which was a cult-like religion. They hacked into their website and displayed anti-scientology material everywhere They also protested in person at multiple church events

Exposing the enemies In 2011 Anonymous leaked information on users of a big hacking form which lead the arrest of 11 Chinese men linked to cyber attacks against the U.S

Westboro Baptist Church Targeting several originations that were accused of homophobia Anonymous’s attack on Westboro was most notable because of the controversy they created by picketing soldier's funerals Anonymous hacked and brought down the website “GodHatesFags.com” Petitions were passed around to have the church’s tax-exempt status looked into They also posted the names, addresses, phone numbers, and emails of the members of the church

Operation Darknet Anonymous took a stand and fought against child pornography Most of these illegal sites hid themselves in the deep internet so Anonymous had to do the work to find them They terminated around 40 sites and then released 1589 usernames for those sites

Steunbenville Rape Case In August 2012 a girl in Ohio was raped by several members of a high school football team Anonymous was really bothered because the school tried to cover it up to protect the athletes The hackers dug up and leaked emails, tweets, and even videos that incriminated the football players and helped in their conviction

The Ferguson Shooting Following the shooting of an unarmed man by a police officer Anonymous vowed to discover the identity of the shooter They hacked into the Ferguson servers and official’s emails They posted a name of the suspected killer, but the police claimed that they had the wrong name

Operation Safe Winter Anonymous launched a campaign to raise awareness about people that live on the streets They organized different events to help out like clothing drives and community potlucks

Fight Against Government During the revolution in Tunisia and Egypt Anonymous aided the protesters They provided the protestors with a way to use their internet without government surveillance They also attacked government websites, shutting them down. Anonymous helped spread awareness of what was happening by sharing videos about the revolution

The Good prevails Despite the face Anonymous has committed some selfish, unmoral acts they have done more than enough to make up for it Most of the questionable acts were committed when the group was first formed which shows how they have matured and become more organized They have received praise from many people, one of the most notable being Time Magazine naming Anonymous one of the “100 most influential people” in the world

Sources http://mic.com/articles/3106/the-dark-side-of-anonymous-everything-you-never-knew-about-the-hacktivist-group http://www.businessinsider.com/good-hacks-by-anonymous-2013-4#1-just-this-month-anonymous-began-operation-free-korea-its-the-groups-effort-to-get-controversial-leader-kim-jong-un-to-resign-install-free-democracy-abandon-nuclear-ambition-and-grant-uncensored-internet-access-to-its-citizens-on-april-3-anonymous-released-all-15000-usernames-and-passwords-for-the-governments-web-services-and-threatened-to-wipe-its-data-8 http://www.mercurynews.com/top-stories/ci_18686764 http://www.cbc.ca/news/canada/from-anonymous-to-shuttered-websites-the-evolution-of-online-protest-1.1134948 http://www.theatlantic.com/technology/archive/2010/12/what-its-like-to-participate-in-anonymous-actions/67860/ http://www.wired.com/2012/06/anonymous-parmy-olson-review/all/ http://www.highbeam.com/doc/1G1-175951837.html