15
Hacktivism Social Activism and Electronic Access

Hacktivism

  • Upload
    gavan

  • View
    34

  • Download
    0

Embed Size (px)

DESCRIPTION

Hacktivism. Social Activism and Electronic Access. Access Denied: Chapter 6 Global Civil Society and the Securitization of the Internet. Deibert and Rohozinski mention Hacktivism in Chapter 6 when explaining how the internet altered social gathering and information exchange. Zapatistas - PowerPoint PPT Presentation

Citation preview

Page 1: Hacktivism

Hacktivism

Social Activism and Electronic Access

Page 2: Hacktivism

Access Denied: Chapter 6

Global Civil Society and the Securitization of the

InternetDeibert and Rohozinski mention Hacktivism in Chapter Deibert and Rohozinski mention Hacktivism in Chapter 6 when explaining how the internet altered social 6 when explaining how the internet altered social gathering and information exchange.gathering and information exchange.

Zapatistas Zapatistas

These methods were “duplicated in other similar acts These methods were “duplicated in other similar acts directed against perceived injustice and corporate directed against perceived injustice and corporate power throughout the 1990’s with ambiguous but power throughout the 1990’s with ambiguous but always controversial results” (125)always controversial results” (125)

Page 3: Hacktivism

Hacktivism Defined….broadly….

““Commonly defined as the marriage of Commonly defined as the marriage of political activism and computer hacking political activism and computer hacking [which] combines the transgressive politics of [which] combines the transgressive politics of civil disobedience with the technologies and civil disobedience with the technologies and techniques of computer hackers.techniques of computer hackers.11

““Hacktivism is the nonviolent use of illegal or Hacktivism is the nonviolent use of illegal or legally ambiguous digital tools in pursuit of legally ambiguous digital tools in pursuit of political ends”political ends”22

Page 4: Hacktivism
Page 5: Hacktivism

Hacktivism: 9 distinct forms of

“electronic mischief”

Page 6: Hacktivism

Some examples:

Site redirect: In 1999 a hacker redirected a KKK Site redirect: In 1999 a hacker redirected a KKK website to an anti-bigotry website (HateWatch).website to an anti-bigotry website (HateWatch).

Virtual Sabotage: 2001 InJustice worm spread Virtual Sabotage: 2001 InJustice worm spread through Microsoft Outlook Express and contained an through Microsoft Outlook Express and contained an attachment that apologized for the intrusion and attachment that apologized for the intrusion and informed the reader of the death of Palestinian boy informed the reader of the death of Palestinian boy during a conflict between Palestinian protesters and during a conflict between Palestinian protesters and the Israeli militarythe Israeli military

Page 7: Hacktivism

Common Targets

Page 8: Hacktivism

Three main types:

1.1.Political CrackingPolitical Cracking--i.e. Site i.e. Site defacementdefacement

2.2.Performative-Performative-i.e. Virtual sit-insi.e. Virtual sit-ins

3.3.Political Coding-Political Coding-i.e. circumventing i.e. circumventing Chinese FirewallsChinese Firewalls

Page 9: Hacktivism

Why Hacktivism:

Gives power back to people and not just in Gives power back to people and not just in massesmasses

““The Internet does allow people who are The Internet does allow people who are taking part to share a basis of understanding taking part to share a basis of understanding as common ground from which to mediate as common ground from which to mediate consensus…and allows people to contribute to consensus…and allows people to contribute to modifying systems…using communicative modifying systems…using communicative action”action”11

Page 10: Hacktivism

Perspectives on Hacktivism

I think hacktivism should be about delivering a I think hacktivism should be about delivering a message, just like good old grass roots message, just like good old grass roots activism. It shouldn't be about doing damage activism. It shouldn't be about doing damage to someone else network, or taking away their to someone else network, or taking away their right to express their views. We just want to right to express their views. We just want to make a fuss so people will pay attention to make a fuss so people will pay attention to what the message is we wish to deliver.what the message is we wish to deliver.

Page 11: Hacktivism

I believe that programming code deserves I believe that programming code deserves protection under the First Amendment to the protection under the First Amendment to the United States Constitution and, more United States Constitution and, more generally, that censorship does not benefit generally, that censorship does not benefit society. Publishing a portion of DeCSS in my society. Publishing a portion of DeCSS in my high school yearbook was a way to ensure high school yearbook was a way to ensure that attempts to censor this speech would fail. that attempts to censor this speech would fail. (Michaels-Ober 2003)(Michaels-Ober 2003)

Page 12: Hacktivism

““Arguably,” one hacktivist writes, “you cannot Arguably,” one hacktivist writes, “you cannot effectively implement your right to free speech effectively implement your right to free speech without stepping on the toes of without stepping on the toes of another....hence, politically motivated another....hence, politically motivated hacking.”(Me Uh K. 1999)hacking.”(Me Uh K. 1999)

any claim that you have 'rights' of expression any claim that you have 'rights' of expression online is clearly wrong. You have only what your online is clearly wrong. You have only what your service provider gives you. Beyond that, you'd service provider gives you. Beyond that, you'd have to challenge them under contract law have to challenge them under contract law through the courts - and you'll more than likely through the courts - and you'll more than likely lose because in this arena it's contract law that lose because in this arena it's contract law that has the primary weight, not civil rights law. has the primary weight, not civil rights law. (electrohippies 2003)(electrohippies 2003)

Page 13: Hacktivism

People who have web sites up can spew whatever People who have web sites up can spew whatever it is they want to say 24/7/365. If someone were to it is they want to say 24/7/365. If someone were to change the contents of a web site, and it remained change the contents of a web site, and it remained changed for a few hours, how have they _REALLY_ changed for a few hours, how have they _REALLY_ infringed on their freedom of speech? (Buster infringed on their freedom of speech? (Buster 1999) 1999)

I have never participated in any DOS activities, I have never participated in any DOS activities, nor will I. DOS attacks almost always have nor will I. DOS attacks almost always have innocent, unintended victims in addition to the innocent, unintended victims in addition to the intended. I once worked at a small ISP which intended. I once worked at a small ISP which hosted several customers who drew DOS attacks. hosted several customers who drew DOS attacks. The attacks took the entire ISP offline, affecting The attacks took the entire ISP offline, affecting not only the intended victim but many others as not only the intended victim but many others as well. well.

Page 14: Hacktivism

Food for Thought and Discussion:

Does Hacktivism do anything? Good Does Hacktivism do anything? Good or bad, does it make a difference? or bad, does it make a difference? How?How?

Are Hacktivists saying something Are Hacktivists saying something about free speech or are they just about free speech or are they just judging their freedom of speech to judging their freedom of speech to be more important than others?be more important than others?

Page 15: Hacktivism

Information obtained from:

Andrea Samuel’s Dissertation: “Hacktivism Andrea Samuel’s Dissertation: “Hacktivism and the Future of Political Participation” 2004and the Future of Political Participation” 2004

http://www.alexandrasamuel.com/dissertation/pdfs/index.html

http://writ.news.findlaw.com/commentary/http://writ.news.findlaw.com/commentary/20030624_sprigman.html20030624_sprigman.html