SlideShare une entreprise Scribd logo
Hacktivism:
An overview
plus high-
profile groups
What is Hacktivism?
Who do hacktivists target?
Hacktivists targets include government agencies, multinational
corporations, and powerful individuals. Hacktivists may target any
group or individual they consider unjust or in the way of a
particular cause.
What motivates hacktivists?
•Politically motivated hacktivism seeks to promote or upheave a political agenda,
sometimes to the extent of anarchy.
•Socially motivated hacktivism sets out to expose social injustices, ranging from
government censorship to human rights.
•Religiously motivated hacktivism acts in the name of a religious ideology and may
seek to discredit or encourage the belief.
Types of hacktivism
Hacktivism comes in many forms, each with its own way to support a hacktivist’s intentions. That might
be promoting free speech and information, crashing websites, or exposing incriminating information.
Here are 10 known types of hacktivism.
1. Anonymous blogging
2. RECAP
3. Website defacemen
4. Website redirects
5. Website mirroring
6. Denial of Service (DoS) or Distributed Denial of Service attacks (DDoS)
7. Virtual sit-ins
8. Leaks
9. Doxing
10. Geo-bombing
6 notable
hacktivist
groups
Most hacktivist groups want to
stay anonymous. Some are
widely recognized and adopted
an acronym as their name. Here
are six known and notorious
hacktivist groups.
Hacktivism in
the news: 8
high-profile
attacks
Group Name Year Motivation Type of attack
DkD 2003 Political Website defacing
Anonymous’s Project
Chanology
2008
Social and
religious
DDoS attack
WikiLeaks’s
exposure of the
Afghan War log and
Iraq War documents
2010
Political
and social
Leak
Anonymous’s
Operation Darknet
2011 +
2017
Social DDoS
LulzSec on Sony
Corporation
2011 Social
Doxing (via SQL
injection)
Syrian Electronic
Army on the U.S.
Executive Branch
2013 Political Defacement
WikiLeaks’s leak of
DNC emails
2016 Political Leak
Anonymous on
police brutality
2020
Political
and social
DDoS and
defacement
The first-known hacktivism attack
is traced to 1989, when an anti-
nuclear group, The Realm,
attempted to attack U.S.
government networks. Hacktivism
has evolved exponentially since,
and hacktivism attacks are more
frequent, occurring as recently as
the Covid-19 pandemic
Hacktivism.pdf

Contenu connexe

Similaire à Hacktivism.pdf

COVID 19 lockdown! A breeding ground for online radicalization to violent ext...
COVID 19 lockdown! A breeding ground for online radicalization to violent ext...COVID 19 lockdown! A breeding ground for online radicalization to violent ext...
COVID 19 lockdown! A breeding ground for online radicalization to violent ext...
Belayneh Zelelew
 
Counterinsurgency Operations Explained_.pdf
Counterinsurgency Operations Explained_.pdfCounterinsurgency Operations Explained_.pdf
Counterinsurgency Operations Explained_.pdf
DC Diew
 
Understanding Factors driving Extremism on Social Media
Understanding Factors driving Extremism on Social MediaUnderstanding Factors driving Extremism on Social Media
Understanding Factors driving Extremism on Social Media
Artificial Intelligence Institute at UofSC
 
Galliotti Policy Reccomendation ISIS and social media
Galliotti Policy Reccomendation ISIS and social mediaGalliotti Policy Reccomendation ISIS and social media
Galliotti Policy Reccomendation ISIS and social media
Austin Schiano
 
C02.8 the social underpinnings
C02.8 the social underpinningsC02.8 the social underpinnings
C02.8 the social underpinnings
Matthew Boutross
 
The face of terrorism 2013
The face of terrorism   2013The face of terrorism   2013
The face of terrorism 2013
Martin Brown
 
Revolutions and Contention
Revolutions and ContentionRevolutions and Contention
Revolutions and Contention
atrantham
 
Revolutions and contention
Revolutions and contentionRevolutions and contention
Revolutions and contention
atrantham
 
Weaponized Religion and Other Extreme Actions.pdf
Weaponized Religion and Other Extreme Actions.pdfWeaponized Religion and Other Extreme Actions.pdf
Weaponized Religion and Other Extreme Actions.pdf
DC Diew
 
Building Community Resilience to Violent Extremism – Government approaches”
Building Community Resilience to Violent Extremism – Government approaches”Building Community Resilience to Violent Extremism – Government approaches”
Building Community Resilience to Violent Extremism – Government approaches”
FRSA Communications
 
Required Readings Warburton. (2013) Chapter 4.Warburton. (201.docx
 Required Readings Warburton. (2013) Chapter 4.Warburton. (201.docx Required Readings Warburton. (2013) Chapter 4.Warburton. (201.docx
Required Readings Warburton. (2013) Chapter 4.Warburton. (201.docx
aryan532920
 
Revolutions and Contention
Revolutions and ContentionRevolutions and Contention
Revolutions and Contention
atrantham
 
Terrorism, Human Rights and Diplomacy.pdf
Terrorism, Human Rights and Diplomacy.pdfTerrorism, Human Rights and Diplomacy.pdf
Terrorism, Human Rights and Diplomacy.pdf
International Islamic University Islamabad
 
Terrorism- An International Problem
Terrorism- An International ProblemTerrorism- An International Problem
Terrorism- An International Problem
Keshav Choudhary
 
Re-branding Islam through Digital Marketing
Re-branding Islam through Digital MarketingRe-branding Islam through Digital Marketing
Re-branding Islam through Digital Marketing
Happy Marketer
 
Mapping, Researching and Documenting Hate Speech_Skills for Civil Society O...
Mapping, Researching and  Documenting Hate Speech_Skills for Civil Society  O...Mapping, Researching and  Documenting Hate Speech_Skills for Civil Society  O...
Mapping, Researching and Documenting Hate Speech_Skills for Civil Society O...
211 Check
 
Differing definitions of terrorism
Differing definitions of terrorismDiffering definitions of terrorism
Differing definitions of terrorism
bentogo
 
Know-the-signs.pdf
Know-the-signs.pdfKnow-the-signs.pdf
Know-the-signs.pdf
EdouardHusson
 
Comms 239 Group 5 presentation
Comms 239 Group 5 presentationComms 239 Group 5 presentation
Comms 239 Group 5 presentation
hannahwhipple
 
Some Perspective on Hackers
Some Perspective on HackersSome Perspective on Hackers
Some Perspective on Hackers
Randi Lovelett
 

Similaire à Hacktivism.pdf (20)

COVID 19 lockdown! A breeding ground for online radicalization to violent ext...
COVID 19 lockdown! A breeding ground for online radicalization to violent ext...COVID 19 lockdown! A breeding ground for online radicalization to violent ext...
COVID 19 lockdown! A breeding ground for online radicalization to violent ext...
 
Counterinsurgency Operations Explained_.pdf
Counterinsurgency Operations Explained_.pdfCounterinsurgency Operations Explained_.pdf
Counterinsurgency Operations Explained_.pdf
 
Understanding Factors driving Extremism on Social Media
Understanding Factors driving Extremism on Social MediaUnderstanding Factors driving Extremism on Social Media
Understanding Factors driving Extremism on Social Media
 
Galliotti Policy Reccomendation ISIS and social media
Galliotti Policy Reccomendation ISIS and social mediaGalliotti Policy Reccomendation ISIS and social media
Galliotti Policy Reccomendation ISIS and social media
 
C02.8 the social underpinnings
C02.8 the social underpinningsC02.8 the social underpinnings
C02.8 the social underpinnings
 
The face of terrorism 2013
The face of terrorism   2013The face of terrorism   2013
The face of terrorism 2013
 
Revolutions and Contention
Revolutions and ContentionRevolutions and Contention
Revolutions and Contention
 
Revolutions and contention
Revolutions and contentionRevolutions and contention
Revolutions and contention
 
Weaponized Religion and Other Extreme Actions.pdf
Weaponized Religion and Other Extreme Actions.pdfWeaponized Religion and Other Extreme Actions.pdf
Weaponized Religion and Other Extreme Actions.pdf
 
Building Community Resilience to Violent Extremism – Government approaches”
Building Community Resilience to Violent Extremism – Government approaches”Building Community Resilience to Violent Extremism – Government approaches”
Building Community Resilience to Violent Extremism – Government approaches”
 
Required Readings Warburton. (2013) Chapter 4.Warburton. (201.docx
 Required Readings Warburton. (2013) Chapter 4.Warburton. (201.docx Required Readings Warburton. (2013) Chapter 4.Warburton. (201.docx
Required Readings Warburton. (2013) Chapter 4.Warburton. (201.docx
 
Revolutions and Contention
Revolutions and ContentionRevolutions and Contention
Revolutions and Contention
 
Terrorism, Human Rights and Diplomacy.pdf
Terrorism, Human Rights and Diplomacy.pdfTerrorism, Human Rights and Diplomacy.pdf
Terrorism, Human Rights and Diplomacy.pdf
 
Terrorism- An International Problem
Terrorism- An International ProblemTerrorism- An International Problem
Terrorism- An International Problem
 
Re-branding Islam through Digital Marketing
Re-branding Islam through Digital MarketingRe-branding Islam through Digital Marketing
Re-branding Islam through Digital Marketing
 
Mapping, Researching and Documenting Hate Speech_Skills for Civil Society O...
Mapping, Researching and  Documenting Hate Speech_Skills for Civil Society  O...Mapping, Researching and  Documenting Hate Speech_Skills for Civil Society  O...
Mapping, Researching and Documenting Hate Speech_Skills for Civil Society O...
 
Differing definitions of terrorism
Differing definitions of terrorismDiffering definitions of terrorism
Differing definitions of terrorism
 
Know-the-signs.pdf
Know-the-signs.pdfKnow-the-signs.pdf
Know-the-signs.pdf
 
Comms 239 Group 5 presentation
Comms 239 Group 5 presentationComms 239 Group 5 presentation
Comms 239 Group 5 presentation
 
Some Perspective on Hackers
Some Perspective on HackersSome Perspective on Hackers
Some Perspective on Hackers
 

Dernier

留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 

Dernier (16)

留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 

Hacktivism.pdf

  • 3. Who do hacktivists target? Hacktivists targets include government agencies, multinational corporations, and powerful individuals. Hacktivists may target any group or individual they consider unjust or in the way of a particular cause.
  • 4. What motivates hacktivists? •Politically motivated hacktivism seeks to promote or upheave a political agenda, sometimes to the extent of anarchy. •Socially motivated hacktivism sets out to expose social injustices, ranging from government censorship to human rights. •Religiously motivated hacktivism acts in the name of a religious ideology and may seek to discredit or encourage the belief.
  • 5. Types of hacktivism Hacktivism comes in many forms, each with its own way to support a hacktivist’s intentions. That might be promoting free speech and information, crashing websites, or exposing incriminating information. Here are 10 known types of hacktivism. 1. Anonymous blogging 2. RECAP 3. Website defacemen 4. Website redirects 5. Website mirroring 6. Denial of Service (DoS) or Distributed Denial of Service attacks (DDoS) 7. Virtual sit-ins 8. Leaks 9. Doxing 10. Geo-bombing
  • 6. 6 notable hacktivist groups Most hacktivist groups want to stay anonymous. Some are widely recognized and adopted an acronym as their name. Here are six known and notorious hacktivist groups.
  • 7. Hacktivism in the news: 8 high-profile attacks Group Name Year Motivation Type of attack DkD 2003 Political Website defacing Anonymous’s Project Chanology 2008 Social and religious DDoS attack WikiLeaks’s exposure of the Afghan War log and Iraq War documents 2010 Political and social Leak Anonymous’s Operation Darknet 2011 + 2017 Social DDoS LulzSec on Sony Corporation 2011 Social Doxing (via SQL injection) Syrian Electronic Army on the U.S. Executive Branch 2013 Political Defacement WikiLeaks’s leak of DNC emails 2016 Political Leak Anonymous on police brutality 2020 Political and social DDoS and defacement The first-known hacktivism attack is traced to 1989, when an anti- nuclear group, The Realm, attempted to attack U.S. government networks. Hacktivism has evolved exponentially since, and hacktivism attacks are more frequent, occurring as recently as the Covid-19 pandemic