Sunday, April 15, 2012

Chapter 5: Crime HACTIVISM

1. (Knowledge)Tell three interesting elements of this chapter:

 a. Hactivism has changed over the years, but one thing that has stayed constant is that a person “hacks” into a computer or database and steals unlawful information.

b. Since the growth of web hackers people are increasingly losing their amount of privacy. Web hackers can steal credit card numbers, social security numbers and other important personal information.

c. Hacking has become more popular due to things like script kiddie’s and groups like anonymous. Script kiddie’s make it possible for hackers to steal tools off the net and use them against other people.

2. (Comprehension) Summarize what is being discussed within this chapter?

Hacking has been around for many centuries. Hacking has three phases; phase one was the early years of technology, the 60’s an 70’s. This was when hacking was used as a positive term that was someone who was creative and created many of the first computer games and operating systems. Hackers of this time …”were not authorized users, the early hackers mostly sought knowledge and intellectual challenges”(Baase p. 254). In the late 1970’s to 1990’s the name hacking began to have a negative meaning. As computers and technology increasingly became popular, so did hacking and stealing information. From this time on hacking has been known as something detrimental to society. Hackers of these times steal an abundance of information and can sell or bribe a company with the stolen information. The ‘Anonymous’ group has had many attempts to take down the Internet. The problem with the Anonymous group is that no one can be completely sure if they are posing a threat of people are pretending to be these cyber hackers. In an article by Tom Gjelten, titled ‘Anonymous’ Hacking Group Threatens the Internet. Tom wrote, “The contradictions highlighted the difficulty of assessing whether a hacking threat should be attributed to Anonymous or to hackers merely posing as Anonymous”(¶ 7). These contradictions can be harmful to the Internet because no one can know for sure if these threats are real or not. The problem with the Internet is the amount of crime that can erupt from different websites and information. Hackers tend to put worms in these websites that flood your computer and erase and steal important data.


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

The reason that hacking is so popular is due to the fact that there is no way of controlling these hackers. Groups like Anonymous have greatly changed the privacy of the Internet. Although the Internet does not have many privacy options, information like SSN and credit card numbers should not be able to be found on the Internet. Not only do SSN and credit card numbers get hacked, but so do large corporate businesses and even databases that the FBI and CIA use. A new solution to the increasing rate of hackers is to find software that could eliminate hackers from entering your computer. A situation that I faced with cyber hacking was when I got my credit card numbers stolen. My information was hacked because I gave an unsecure website my personal information. I then had hundreds of dollars stolen from my account by a man in England. This hacker was never found or punished for the money he stole. Since there are so many hackers they could not properly trace back who specifically stole my money.

4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

“Hactivism is the use of hacking to promote a political cause”(Baase p. 263). Hackers use the internet to try and change the government and to threaten it. This can compare to the use of propaganda, which became popular during World War II. Propaganda was used to support the government by telling people to join the war or have some sort of support for the country. This is similar to hactivism because hackers try to threaten the government so there duties can change. In the article “Anonymous, LulzSec Respond To FBI Arrests Of Suspected Hackers” by Huffington Post, hactivist claim that they will not change because the government lies to its citizens and takes money to change contracts, but hackers believe that the government can not fulfill these tasks. Hactivist use these arguments to justify their reasoning for government hacking.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

These articles discuss the meaning of hactivist and why these people hack into websites. Reasons people do these is for money, popularity and to show that they have power. I do not agree with the ideas of a hacker or hactivist. Hackers can be extremely dangerous and very intimidating Hactivist are the main people who try to bribe the government and continuously threaten the Internet and our personal space.



6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic, hactivism is extremely relevant in today's society because people are constantly being hurt by these hackers. Hackers everyday steal important information and as of now there is no way to stop them. Hactivism is when hackers steal information from the government which can be extremely detrimental. Baase stated that someone hacked into the US government system and tried to get information to defend the Soviet Union during the war. There should be a harsh punishment for hackers therefore it could eliminate the amount of hackers by punishing them. Many hackers cannot be stopped and since this is such a wide spread issue there should be more ways to protect a person from being hacked.


References
http://www.npr.org/2012/03/30/149712036/anonymous-hacking-group-threatens-the-internet

No comments:

Post a Comment