Anonymous By Kendra Kennedy, Benjamin Fleshman, and Hassan Alsuleiman.

Slides:



Advertisements
Similar presentations
Anonymous 20*20. Director of Security Intelligence for Akamai Technologies  Former Research Director, Enterprise Security [The 451 Group]  Former Principal.
Advertisements

Senior Seminar Mrs. Civitella. Civil disobedience- noun: a refusal to obey laws, pay taxes, etc: a non-violent means of protesting or of attempting to.
7 Effective Habits when using the Internet Philip O’Kane 1.
HALDEBIQUE Geoffroy ROYER Johan  Crime motivated attacks  Hacktivism  Cyber Warfare.
By Leo Koo and Chris Mendoza AP Government Mr. Lohman Period 4.
The Anatomy and Security of an Anonymous Operation
Anatomy of an Web Application Attack
Wikileaks By Ruth & Becca. Overview Of Wikileaks Wikileaks is a non profitable online organization that publishes private and secret information. The.
Vs The Illusion of Security. Aaron Barr : “Security Expert” CEO of security company HBGary Federal Provide Security Training Create Malicious Software.
Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.
Cracking down on international cyberterrorism
Special Anatomy of an Attack Or Layered Security Failure.
Hacktavism: Friend or Foe Storyboard Andrew Wells.
George M. Aloth. Definitions  E-Discovery = The collection, preparation, review and production of electronic documents in litigation discovery. This.
 Three different Klans  1 st Klan was from 1865 to 1874  2 nd Klan was from 1915 to 1944  3 rd Klan was from 1950s to the 1960s  Started after the.
Economic Collapse  Stimulus package Plan to fix the economy after the banking collapse  Occupy Wall Street Protest movement that started against corporate.
Middle East Quest Review Quest is tomorrow. Judaism and Islam can both trace their roots back to what person?
A Growing Threat Debbie Russ 1/28/2015. What is Ransomware? A type of malware which restricts access to the computer system that it infects, and demands.
Module 3 – Security and Privacy SOCIAL MEDIA IN BUSINESS.
the Tunisian revolution during Arab spring Done by :Rashid Hussein.
 Anonymous is a loosely knit internet activist group mainly focusing on standing up against internet censorship.  The group is completely democratic,
Process. TE Lawrence Military Sheet John Walker Lindh Labelled by the American government as "Detainee 001" in the "war on terror", John occupies.
The Security Circus.
Egypt : The Journey towards Freedom. What I would have normally spoke about ?
ISIS THREATS ONLINE PERSIST, MILITARY FAMILIES RETHINK ONLINE LIVES By: Kennedy Samson.
AS History Matters AS History Matters Monday, 16 November 2015 How are countries run and won? Introducing the French.
WHAT ARE THE LIMITS OF PUBLIC KNOWLEDGE? Julian Assange and Wikileaks.
Anonymous ACG 6415 Conley, Justin Glenn, Cassady Zhang, Fan.
Amanda Reyes Chris Connell Lindsey McQuiston Amanda Reyes Chris Connell Lindsey McQuiston.
Get Social Putting social media to work in your accounting practice Presented by: Daniel Hood, Editor-in-Chief.
CyberPatriot: Introduction to Cyber Security 9/10/10 Joshua White Director of CyOON R&D Everis Inc (315)
Cyber Attacks Threaten: privacy reliability safety resiliency 2.
Granbury I.S.D. Acceptable Use Policy for Technology Resources
Andrew Woods English 250 HE April 28 th, 2012 MEDIATION: MUSIC PIRACY VS. MUSIC INDUSTRY.
F.B.I. Gašper Glastovec 1.Ra. Contents History What is FBI Headquarters What do they do Science.
The October Crisis and its affect on our culturally divided country.
The Security Circus MPICT Summer Conference, June, 2011.
Introduction To Cyberlaw Presented By: Allison R. Seidel.
PKK Leadership & leadership structure
What is the impact of the internet and social media on politics? By A Student & B Student.
FOSSIL FUEL DIVESTMENT 101. What is divestment? getting rid of stocks, bonds or investment funds that are unethical or morally ambiguous the opposite.
Do Now – p. 138 Read the brief introduction on your Do Now slip and then answer the questions below Paste and Answer.
The Security Circus CNIT 120 Jan 14, Linus Thorvalds.
The Security Circus & DoS Attacks. Bio Summary The DoS Circus Layer 4 DDoS: Thousands of attackers bring down one site Layer 7 DoS: One attacker brings.
On 13 th Dec a man was stabbed by a suspected terrorist at a tube station. A Muslim security guard who witnessed the event shouted “You ain’t no Muslim,
Federalism in Law Enforcement Intro to LPSCS 1. Federal and State Law Enforcement Agencies County State Federal Municipal Different Governments Different.
9.1 Audience Appreciation
Anonymous Who are they ? What are they doing ? What are they looking for ? English presentation made by Paul and Nasser Page 1.
A small independent church in Topeka Kansas Know for their extreme ideologies against homosexuality, abortion, and many more Infamously known nation wide.
Amanda Reyes Chris Connell Lindsey McQuiston Amanda Reyes Chris Connell Lindsey McQuiston.
Department of Law Private power and new media: the case of the corporate suppression of WikiLeaks and its implications for the exercise of fundamental.
President Task’s schedule
Process.
Arab Spring.
Anonymous: Cyber Terrorists or Internet Saviors?
Egypt, Morocco, Tunisia cases Artem Uldanov. HSE 2017
Palestine and the Muslim Faith
Egypt.
Quebec’s Quiet Revolution
Dwarf planets Comets Pluto?.
Hackers and Hacking George Pearson rev. 05/29/2018.
THE #17 PLACE WHERE CHRISTIAN PERSECUTION IS WORST
Trudeau, the FLQ and the War Measures Act
Wikileaks, Anonymous, and The Jester
Facebook and the Arab Revolutions
Social media & Social Movements
WikiLeaks avoids shutdown as supporters go on the offensive
4-H Guidelines for Social Media and Online Presence
Palestine and the Muslim Faith
Turmoil in north Africa and southwest Asia
Presentation transcript:

Anonymous By Kendra Kennedy, Benjamin Fleshman, and Hassan Alsuleiman

Propaganda EHIKQ

how did Anonymous start?

Operation: Payback is a Bitch (2010) Purpose: Retaliating against attacks on sites like the PirateBay Targets: Aiplex Software, Recording Industry Association of America, Motion Picture Association of America, British law firm ACS:Law, the Australian Federation Against Copyright Theft, the British nightclub Ministry of Sound, the Spanish copyright society Sociedad General de Autores y Editores, the US Copyright Office, and lesser known sites. Estimated total down time of all sites: 538 Hours.

Operation: Avenge Assange (2010) Purpose: An extension of Operation: Payback, retaliating against those pressuring WikiLeaks to stop publishing secret U.S. diplomatic cables Targets: PayPal, PostFinance, the Swedish Prosecution Authority, MasterCard, and Visa

Operation Tunisia (2011) Purpose: To Support Arab Spring Movement in Tunisia Targets: Tunisian government websites, the Tunisian Prim Minister’s website Operation Egypt (2011) Purpose: To support Arab Spring Movement in Egypt Targets: Egyptian Government websites,

Other Noteworthy Attacks, Hacks, and Protests Westboro Baptist Church (2011) Sony (2011) Occupy Wall street (2011) Operation Darknet ( )

Subgroups Lulzsec: Used a BotNet owned by member KMS consisting of 8,000 infected servers for DDoS attacks. LulzRaft: A group or individual responsible for cyberterrorist activities in Canada. Targeted conservative political groups and Husky Energy.

2011 Arrests Hector "Sabu" Monsegur: Member and leader in Lulzsec. Rolled over on key members and worked with FBI to avoid potential 124 year sentencing. Jeremy Hammond: "I did this because I believe people have a right to know what governments and corporations are doing behind closed doors" Source: anonymous-arrests-fbi_n_ html

2011 Arrests (Cont.) Chris Doyan: Arrested for a cyberattack on the website for Santa Cruz county in California. Dmitriy Guzner: First person arrested in an Anonymous DDoS attack. Fingered in 2008 by the FBI for attacks against the church of scientology.

Noteable Recent Activity Operation Safe Winter( Today): A yearly non-hacking humanitarian effort to raise awareness of life on the streets. Operation Charlie Hebdo(2015): A retaliation to the Charlie Hebdo shootings to take down twitter accounts and websites associated with Islamic extremist groups. Operation ISIS(2015): Retaliation against ISIS for recent events. An attempt to take down social media accounts associated with the terrorist group in which 9,200 twitter accounts where recorded and released.

Sources began-quite-some-time-ago/ internet-group/ free.html?ref=topics/ payback_n_ htmlhttp:// payback_n_ html charlie-hebdo-attack