 Anonymous is a loosely knit internet activist group mainly focusing on standing up against internet censorship.  The group is completely democratic,

Slides:



Advertisements
Similar presentations
Internet Safety Rockingham County Public Schools
Advertisements

How to protect yourself, your computer, and others on the internet
1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
Coxheath Primary School E-safety- Term Purpose To outline the use of the internet in school The use of the internet outside school What are the.
Woodland Hills School District Computer Network Acceptable Use Policy.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
What is trafficking? Is it slavery? Human trafficking involves the movement of people through violence, deception or coercion for the purpose of forced.
HALDEBIQUE Geoffroy ROYER Johan  Crime motivated attacks  Hacktivism  Cyber Warfare.
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
SANTA ROSA DISTRICT SCHOOLS , Internet, and Social Media Acceptable Use and Risk Policy 1.
Security, Privacy, and Ethics Online Computer Crimes.
School of Risk Control Excellence Employee Use of Social Media The Impact of the Virtual World on Disciplining and Firing Employees Laura Lapidus, Esq.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
Multinational Corporations Challenge State Authority and Autonomy
Th INK FOOD : What is it? An environmentally friendly fundraising project for food banks n Involves the collection & recycling of used computer printer.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.
Introduction Social Implications & EthicsSocial Implications & Ethics Since the introduction of the Internet, many policies have been introduced as a way.
By Adam, Rachelgail & Kayla. What is internet Ethics? They are principles and guidelines to be applied whilst using the internet. Codes of ethics have.
Anonymous By Kendra Kennedy, Benjamin Fleshman, and Hassan Alsuleiman.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Cyber Crimes.
St Meryl School e-Safety Presentation for Parents 16 th June 2015 Mr Davies (Computing Subject Leader)
What you should know as parents by Charles McKinley Parents’ Technology Night, 2013, sponsored by your PTSO.
Computer Ethics.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Social Media Safety Manchester Township Middle School Guidance Department
This Presentation Evening is designed to inform you about any potential threats that your children could find themselves when online. At no point is it.
Information Warfare Playgrounds to Battlegrounds.
The Internet and Constitutional Rights Copyright © Texas Education Agency, All rights reserved.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Professionalism/Customer Service in the Health Environment Communications and Professionalism This material Comp16_Unit9 was developed by The University.
PREPARED BY: SHOUA VANG ABHINAV JUWA CHASE PAUL EASy Security Project Anonymous vs HBGary Inc.
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
The Security Circus.
Social Networking Problem by: Pattamon Aksharanugraha Section1 ITCS486 Multimedia Data Technologies China'sChina's.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
GOVERNMENT REGULATION AND SURVEILLANCE OF THE INTERNET Ayman Irziqat Katarzyna Kosarska Sergio Pradel.
Component 16- Professionalism/Customer Service in the Health Environment Unit 9- Personal Communications and Professionalism This material was developed.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
Anonymous ACG 6415 Conley, Justin Glenn, Cassady Zhang, Fan.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
Freedom of Speech Computers in the World.
Breaking the law. The danger Either knowingly or otherwise, children and young people can fall foul of the law or get into trouble with other Internet.
Information Warfare Playgrounds to Battlegrounds.
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
Dangers of Online Media and Social Networking By: Micah Cochrane Maurice Gamble Shenne Howell Elvyn Morales.
Acceptable Use of Internet & Technology and Netiquette for High School Students.
Jeopardy Media If you read the chapter this is easy “That would be a great test question” Chapter stuff Potpourri Q $100 Q $200 Q $300 Q $400 Q $500 Q.
The Security Circus MPICT Summer Conference, June, 2011.
© The McGraw-Hill Companies, Inc., 2002 All Rights Reserved. McGraw-Hill/ Irwin 13-1 Business and Society POST, LAWRENCE, WEBER Managing Technological.
 Samy (also known as JS.Spacehero)  XSS worm that was designed to propagate across the MySpace social-networking site. At the time of release, it.
Woodland Hills School District Computer Network Acceptable Use Policy.
REVENUE MANAGEMENT GUIDE © Marin Management, Inc. 1 Online Networking Guide, 1585 YouTube ® A. Introduction to YouTube ® YouTube YouTube ®, a site for.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
9.1 Audience Appreciation
Social Media Safety. Discuss O As a class discuss the different types of social media and what it is used for.
Anonymous Who are they ? What are they doing ? What are they looking for ? English presentation made by Paul and Nasser Page 1.
Sarah Manuel Final Presentation MCO435-Social Media.
Digital Citizenship By: Ali Al-Thani 6B. Digital citizenship Digital citizenship is an idea which enables teachers and parents to understand what students,
Tyler Rapp.  I strongly believe anonymous posting should be legal  Why? You have the right, guaranteed to you by the 1 st Amendment in the United States.
MGT 434 Week 4 DQ 1 To purchase this material click below link 434-Week-4-DQ-1 You have just been appointed.
Privacy & Security Inservice Protected Health Information, Personal Electronic Devices & Social Media.
Anonymous: Cyber Terrorists or Internet Saviors?
A Project on CYBER SECURITY
Presentation transcript:

 Anonymous is a loosely knit internet activist group mainly focusing on standing up against internet censorship.  The group is completely democratic, making decisions based on popular vote rather than having a leader.  Tactics usually involve DDoS attacks, releasing harmful information of corrupt leaders to wikiLeaks and the public, and organized protesting in order to bring attention to laws, events, and policies where they believe there is injustice.

 Began on the 4chan.org imageboard website in 2003  Members who posted on the site often used anonymity rather than an actual username resulting in “Anonymous” as a username used by all.  Users of 4chan began to join in on mass pranks or raids either by hacking social media websites or prank calling and Skyping the responses to large audiences

 The first activism project by Anonymous was aimed at the Church of Scientology after the NY blog Gawker received a cease and desist letter on grounds of copyright violation for uploading a video in which Tom Cruise praises the church.  Anons on 4chan organized multiple DDoS attacks on the church, prank called them multiple times and sent hundreds of black faxes to their offices causing their printer cartridges to run out of ink. They then uploaded a YouTube video claiming that they would expel the church from the internet and on Febuary 10 th thousands of Anons protested outside the churches all over the world.

 About a year ago, a British man named Lauri Love exploited a security flaw in Adobe’s ColdFusion web app development platform. From here Love and others created back doors in Adobe’s software to regain access later.  These back doors have lead to breaches in the US Army, Department of Energy, Department of Health, Human Services, NASA, and it’s estimated that even more federal agencies have been breached.  On October 10 th, an internal within The Department of Energy from Ken Knobloch estimated that these hacks had breached the personal information of over 104,000 employees, contractors, family members, and information of thousands of bank accounts.  This software hack also lead to the breach of the Federal Reserve during the Superbowl game, leaking login and personal information of over 4000 individuals to twitter.

 The reason for these attacks is believed to be in demand for computer crime law reform after the suicide of activist Aaron Swartz.

 After the seize of MegaUpload in 2012, Anonymous retaliated by taking down the RIAA, MPAA, FBI, and Broadcast Music Inc.’s websites with DDoS attacks.  In 2011 Anonymous aided the Arab Spring revolution by writing a script that Tunisians could use to protect their computers form government surveillance. They also launched multiple DDoS attacks against Tunisian Government websites bringing them down.  In 2012 Anonymous posted the names, addresses, s, and phone numbers of the Westboro Baptist church members as well as took down the GodHatesFags.com website in retaliation to the churches plan to picket the Sandy Hook children’s funerals.

 Encourage the freedom of the internet and of p2p sharing sites.  Protect the internet by shutting down multiple child pornography sharing sites on Tor and releasing the information of those users. Also by defending Gawker and internet copyright policy.  Bring awareness to the people of how vulnerable our federal software systems are.  Encourage change in social systems by participating in Occupy Wall St., Million Mask March, Arab Spring, and the Egyptian revolution.  Expose corrupt leaders and authority figures.

 They act without proof or due process and release personal information of, or attack, individuals who may not be involved in any crime.  Having no leader leads to miss communication and poor organization of protests/raids.  Anyone can be a member of Anonymous meaning that the central message of the group may not always be upheld and could be used by terrorists or even politicians.  DDoS attacks against non-consenting individuals or companies as well as the use of botnets are illegal.  Innocent victims of the botnets used in DDoS attacks may be charged of a crime.  Conflict between different groups within Anonymous (ex. Anonymous Indonesia and Anonymous Australia) could lead to cyber warfare affecting innocent people.

 Is it morally okay to release personal information of an individual who, although not proven, is believed and voted as guilty of a crime or corruption?  Would the issues of loss of freedom of speech, internet freedom, and the vulnerability of our federal and personal electronics be known without Anonymous’s illegal activities?  Can we trust that the information leaked or the reason for the leaked information to be truthful if there is no leader and all members remain anonymous?  Can the actions taken by Anonymous against cases such as the WBC and the seizure of MegaUpload be morally justified even if the actions were illegal?

 long-ongoing-assault-on-us-government-sites/ long-ongoing-assault-on-us-government-sites/     problem-2D problem-2D   y2ks9cFagKw/TWa9xP98oHI/AAAAAAAABH4/hm2kJ119rLo/s1600/Anonymous+Hackers+send+a+video +message+to+Westboro+Baptist+Church.jpg y2ks9cFagKw/TWa9xP98oHI/AAAAAAAABH4/hm2kJ119rLo/s1600/Anonymous+Hackers+send+a+video +message+to+Westboro+Baptist+Church.jpg  