SlideShare a Scribd company logo
1 of 26
Download to read offline
Photocredits: “.I Travel East.” -Flickr
The beauty of earth is endless and immense.
From the bold and vibrant to sublime and
desolate. However, what happens when you
introduce a Kingston squirrel into this mix?
We interrupt this Flipbook message, to bring you a
message from Anonymous.We are Anonymous.We are a
legion.We do not forgive.We do not forget. Expect us.
Photocredit: Ben Page –Flickr
Anonymous, is an un-centralized network of
hacktivists using distributed denial of service
attacks (DDoS) .
Photocredit: Paul Gern -Flickr
Originated in 2003 on the internet forum
4chan.They have expanded their reach via social
networks backed by millions of online
members.This leads us to question…..
Photocredit: Paul Gern -Flickr
Cyber
Terrorists?
ARE THEY
Freedom
Fighters?
OR
Photocredit:
Sarah Bednarek
“Freedom fighters or
vandals? No consensus
on Anonymous.”
-Matt Krupnick, Highbeam Research
Photocredit: Lorraine Murphy –Flickr
“In December 2006, Anonymous took down
the website of white supremacist radio
show host Hal Turner. The attack ended up
with Turner paying some very expensive
bandwidth bills and dropping a lawsuit a
year later.”
–Justia.com
Photocredit: Andrew Cuba – Flickr
oFreedom Fighter
Photocredit:Ian Britton– Flickr
“Anonymous released user
information from a major
hacking forum in
February 2011, and
security firm Mandiant
was able to use this data
to link the Chinese
military to cyber-attacks
against the U.S. this
year.”
–Paul Harris, The Guardian
oFreedom Fighter
Photocredit: Kenny Teo - Flickr
“Anonymous hacked the website of
the Kasumigaura River Office in
Ibaraki Prefecture, apparently
mistaking "Kasumigaura" for
"Kasumigaseki," the location of many
central government offices.”
[Intention: to protest against the
enactment of the revised Copyright
Law]
-Yomiuri Shimbun, The Jakarta Post Tcyber Terrorists
Photocredit: The Library of Congress– Flickr
“The Westboro Baptist Church is
notoriously hateful and intolerant.
Anonymous successfully took down the
Westboro Baptist Church's website in
February 2011 in protest.”
-Asawin Suebsaeng, MotherJones
oFreedom Fighter
Photocredit: “dar_ko_16”- Flickr
“Operation DarkNet was
the group's campaign
against child
pornography in October
2011. Because
pornographers were
incredibly effective at
using technology to
hide themselves,
Anonymous used
technology to put them
out of business.”
-Micheal Stone, Examiner
oFreedom Fighter
Photocredit: Anamika Choudhary
“
” oFreedom Fighter
Photocredit: Cristian Sitov, -Flickr
o
“January 2008, Anonymous kicked off ‘Project
Chanology,’ its attack on the Churchof Scientology, a
cult-like religion which allegedly imprisons its dissident
members. They launched denial of service attacks against
the organization'swebsites, and even physically
protested.”
-Robert Vamosi, CNET
oFreedom Fighter
"People have the right to express themselves ... The Church of
Scientology has always defended the right of freedom of expression."
Both representatives also expressed concerns regarding the spread of
"hate speech".
-Staff, WKMG-TV
Photocredit: “The Library of Congress” –Flickr
Tcyber Terrorists
Photocredit: “darcyadelaide” – Flickr
“The Steubenville rape
case — in which images
of the high school
victim were disseminated
in social media —
obviously got a lot of
attention earlier this
year. Anonymous released
incriminating video,
tweets, and emails
belonging to accused
players on the school's
football team.”
-Crimesider Staff, CBC
oFreedom Fighter
Photocredit:The Library of Congress – Flickr
[Amanda Todd Case]
“ A representative of the group
told the Toronto Star that the group
doesn’t care about causing the wrong man
to be targeted. He is, after all, facing
charges. So he must be evil, right? “
“I think Anonymous and anyone else needs
to seriously weigh the further harm that
could come out of releasing names of minors
in this case or others.”
–Matt Gurney, National Post
Tcyber Terrorists
Photocredit: “Lord Bullgod” -Flickr
“Just this month, Anonymous
began ‘Operation Free
Korea.’ It's the group's
effort to get
‘controversial leader Kim
Jong-un to resign,’
‘install free democracy,’
‘abandon nuclear
ambition,’ and grant
‘uncensored internet
access’ to its citizens. On
April 3, Anonymous released
all 15,000 usernames and
passwords for the
government's web services
and threatened to wipe its
data.”
–Caitlin Dewey, Washingston Post
oFreedom Fighter
Photocredit: Bruce Irving– Flickr
“Getting onto the domestic
[North Korean] internet is
highly unlikely based on our
current understanding of the
network. It's believed to be
totally separate from the
internet with no network link
between the two for security
purposes. So this hack seems
likely to be a bluff.”
–Martyn Williams, North Korea Tech
Tcyber Terrorists
Photocredit:George Eastman House– Flickr
May 7th, Anonymous will start phase 1 of Operation USA,
which is a response to acts of “multiple war crimes in Iraq,
Afghanistan, Pakistan” and “in your own country.” The
group is protesting the Obama Administration’s uses of
targeted drone attacks that have resulted in the deaths of
“hundreds of innocent children and families.”
–This Day Live
Tcyber Terrorists
Scoreboard
Freedom Fighter o T
However, this board does not measure the
true impact of Anonymous’ actions. It is
difficult to judge what is right or wrong
and at what cost.
Cyber Terrorist
Photocredit: Created by me
Anonymous can be best described
through:
“I myself am made
entirely of flaws, stitched
together with good
intentions.”
–Augusten Burroughs, Magical Thinking
THE ANONYMOUS BROADCAST
HAS ENDED.
YOU MAY NOW RETURN TO
YOUR FEATURED FLIPBOOK
PRESENTATION “ATTACK OF THE
SQUIRRELS.”
Photocredit: “blmiers2” – Flickr
Queen’s students
constantly fear for their
lives. The squirrels are
known to attack students
at random. Earth cannot
be safe until we
exterminate the squirrels.
Sources
http://gizmodo.com/5810454/anonymous-to-nato-do-not-make-the-mistake-of-
challenging-anonymous
http://www.cnbc.com/id/100712145
http://www.computerweekly.com/news/2240181691/Anonymous-hacks-North-
Korean-websites-for-a-second-time
http://www.theverge.com/2013/2/6/3959820/federal-reserve-confirms-
anonymous-hack
http://www.thejakartapost.com/news/2012/06/29/anonymous-hackers-mistake-
kasumigaura-kasumigaseki.html
http://blog.nus.edu.sg/cantorkant/2013/02/12/anonymous-hacktivists-or-cyber-
terrorists/
http://kevtownsend.wordpress.com/2011/01/28/anonymous-wikileaks-ddos-and-
the-rights-and-wrongs-of-it-all/
http://www.examiner.com/article/anonymous-to-activision-we-are-freedom-
fighters-not-terrorists
http://cem.colorado.edu/?p=163
http://www.businessinsider.com/good-hacks-by-anonymous-2013-4?op=1
http://topics.nytimes.com/top/reference/timestopics/organizations/a/anonymo
us_internet_group/index.html
http://www.businessinsider.com/good-hacks-by-anonymous-2013-4?op=1
Sources
http://www.michaelshermer.com/2008/02/scientology-anonymous/
http://gizmodo.com/5590049/why-do-anonymous-geeks-hate-scientologists
http://www.theatlanticwire.com/global/2013/04/anonymous-north-korea-kim-
jong-un-pig/63865/
http://www.thisdaylive.com/articles/anonymous-threatens-to-take-us-off-cyber-
map-/147009/
https://whyweprotest.net/community/threads/article-on-hacking-north-korea-
bad-idea-folks.110308/
http://www.escapistmagazine.com/news/view/123089-Anonymous-Attacks-
North-Korea
http://www.escapistmagazine.com/news/view/123089-Anonymous-Attacks-
North-Korea
http://www.washingtonpost.com/blogs/worldviews/wp/2013/04/04/sorry-
anonymous-probably-didnt-hack-north-koreas-intranet/
http://www.slate.com/blogs/future_tense/2012/10/17/amanda_todd_suicide_did
_anonymous_dox_the_wrong_guy.html
http://www.inquisitr.com/367540/amanda-todd-investigation-police-say-
anonymous-outed-the-wrong-man/
http://fullcomment.nationalpost.com/2012/10/18/matt-gurney-anonymous-
bullies-the-wrong-presumed-bully/
Sources
http://www.heavy.com/news/2012/10/kody-maxson-amanda-todd-anonymous-
help/
http://dockets.justia.com/docket/new-jersey/njdce/2:2007cv00306/198438/
http://www.guardian.co.uk/technology/2013/feb/23/mandiant-unit-61398-china-
hacking
http://www.motherjones.com/mojo/2013/04/anonymous-hacks-westboro-
baptist-church-facebook-boston-marathon
http://www.advocate.com/politics/2012/08/15/hackers-attack-ugandan-
government-websites-protest-homophobia
http://www.examiner.com/article/anonymous-hacks-pedophile-website-
operation-darknet-returns
FlipBook created by: Anamika
Choudhary

More Related Content

What's hot

Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
Charles Mok
 
iSummit keynote: Free Culture & Free Speech
iSummit keynote: Free Culture & Free SpeechiSummit keynote: Free Culture & Free Speech
iSummit keynote: Free Culture & Free Speech
rmackinnon
 
Com 427 final presentation
Com 427 final presentationCom 427 final presentation
Com 427 final presentation
Kyle Basedow
 
Activism
ActivismActivism
Activism
sunnyuf
 
Com 427 final presentation
Com 427 final presentationCom 427 final presentation
Com 427 final presentation
Kyle Basedow
 

What's hot (19)

Johns Hopkins SAIS IRP Gatekeepers Talk - Min Jiang
Johns Hopkins SAIS IRP Gatekeepers Talk - Min JiangJohns Hopkins SAIS IRP Gatekeepers Talk - Min Jiang
Johns Hopkins SAIS IRP Gatekeepers Talk - Min Jiang
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
Authoritarian Governments in Cyberspace
Authoritarian Governments in CyberspaceAuthoritarian Governments in Cyberspace
Authoritarian Governments in Cyberspace
 
Social Network Supermarkets and How to Defeat Them
Social Network Supermarkets and How to Defeat ThemSocial Network Supermarkets and How to Defeat Them
Social Network Supermarkets and How to Defeat Them
 
Cybersecurity Who Cares? 2014
Cybersecurity Who Cares? 2014Cybersecurity Who Cares? 2014
Cybersecurity Who Cares? 2014
 
Wikileaks script
Wikileaks scriptWikileaks script
Wikileaks script
 
iSummit keynote: Free Culture & Free Speech
iSummit keynote: Free Culture & Free SpeechiSummit keynote: Free Culture & Free Speech
iSummit keynote: Free Culture & Free Speech
 
Com 427 final presentation
Com 427 final presentationCom 427 final presentation
Com 427 final presentation
 
Burkett matthew digital_citizenship
Burkett matthew digital_citizenshipBurkett matthew digital_citizenship
Burkett matthew digital_citizenship
 
Activism
ActivismActivism
Activism
 
The undeclared war against wikileaks
The undeclared war against wikileaksThe undeclared war against wikileaks
The undeclared war against wikileaks
 
Censorship and Regulation - OCR
Censorship and Regulation - OCRCensorship and Regulation - OCR
Censorship and Regulation - OCR
 
Transform Your Teaching Practice with Twitter: Develop a PLN
Transform Your Teaching Practice with Twitter: Develop a PLNTransform Your Teaching Practice with Twitter: Develop a PLN
Transform Your Teaching Practice with Twitter: Develop a PLN
 
COM 427 Social Media and Security
COM 427 Social Media and SecurityCOM 427 Social Media and Security
COM 427 Social Media and Security
 
Com 427 final presentation
Com 427 final presentationCom 427 final presentation
Com 427 final presentation
 
Fake News and Mainstream Media Bias
Fake News and Mainstream Media BiasFake News and Mainstream Media Bias
Fake News and Mainstream Media Bias
 
COM Ethics Final
COM Ethics FinalCOM Ethics Final
COM Ethics Final
 
5 Location Trends For 2011
5 Location Trends For 20115 Location Trends For 2011
5 Location Trends For 2011
 
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
 

Similar to Updated flipbook

Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
Bilal Ali
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
Jenny O'Meara
 
Can Internet technology still revolutionize activism?
Can Internet technology still revolutionize activism?Can Internet technology still revolutionize activism?
Can Internet technology still revolutionize activism?
Lebowitzcomics
 
China's hacker army foreign policy (1)
China's hacker army   foreign policy (1)China's hacker army   foreign policy (1)
China's hacker army foreign policy (1)
MarioEliseo3
 
Offline Activism - How successful activism facilitate social media
Offline Activism - How successful activism facilitate social mediaOffline Activism - How successful activism facilitate social media
Offline Activism - How successful activism facilitate social media
Wilson Fung
 

Similar to Updated flipbook (20)

https---uii.io-Oneanomiusandrussia.pdf
https---uii.io-Oneanomiusandrussia.pdfhttps---uii.io-Oneanomiusandrussia.pdf
https---uii.io-Oneanomiusandrussia.pdf
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
Boko haram
Boko haramBoko haram
Boko haram
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
JRN 450 - Attacking Democracy
JRN 450 - Attacking DemocracyJRN 450 - Attacking Democracy
JRN 450 - Attacking Democracy
 
JRN 450 - QAnon
JRN 450 - QAnonJRN 450 - QAnon
JRN 450 - QAnon
 
Rfl dfn internetact2
Rfl dfn internetact2Rfl dfn internetact2
Rfl dfn internetact2
 
Can Internet technology still revolutionize activism?
Can Internet technology still revolutionize activism?Can Internet technology still revolutionize activism?
Can Internet technology still revolutionize activism?
 
Citizen journalism
Citizen journalismCitizen journalism
Citizen journalism
 
georgetown talk evgeny morozov
georgetown talk evgeny morozovgeorgetown talk evgeny morozov
georgetown talk evgeny morozov
 
China's hacker army foreign policy (1)
China's hacker army   foreign policy (1)China's hacker army   foreign policy (1)
China's hacker army foreign policy (1)
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Offline Activism - How successful activism facilitate social media
Offline Activism - How successful activism facilitate social mediaOffline Activism - How successful activism facilitate social media
Offline Activism - How successful activism facilitate social media
 
How Real Are Virtual Worlds
How Real Are Virtual WorldsHow Real Are Virtual Worlds
How Real Are Virtual Worlds
 
Censorship
CensorshipCensorship
Censorship
 
Cybercrime criminal threats from cyberspace (crime, media, and popular cultur...
Cybercrime criminal threats from cyberspace (crime, media, and popular cultur...Cybercrime criminal threats from cyberspace (crime, media, and popular cultur...
Cybercrime criminal threats from cyberspace (crime, media, and popular cultur...
 
Anonymous
AnonymousAnonymous
Anonymous
 
Program Materials Excerpt From Lions, Tigers and Friends
Program Materials Excerpt From Lions, Tigers and FriendsProgram Materials Excerpt From Lions, Tigers and Friends
Program Materials Excerpt From Lions, Tigers and Friends
 
We couldbeheroes -recon2014
We couldbeheroes -recon2014We couldbeheroes -recon2014
We couldbeheroes -recon2014
 

Recently uploaded

Recently uploaded (20)

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 

Updated flipbook