SlideShare a Scribd company logo
1 of 19
Download to read offline
HACKTIVISM (AGAINST)
By Sreepraneta Patel
Doesn’t it Sound Outstandingly Nobel
*HACKTIVISM
*Benefits
*Promotes Freedom of Speech and democracy
*Free speech is a birth right and I am grateful to
Hacktivist to set a platform for that.
*Plus all the points and evidence as provided by my
colleagues in their presentation.
*Before we start the tug-of-
war
*Let’s Discuss First
*Violated Law’s
*Ci vi l Di s o bedi enc e
*Pers o na l Info rm a ti o n Pro tec ti o n A c t
*Defa m a ti o n (Pro tec ti o n o f o ne’s
Reputa ti o n)
*Elec tro ni c s Co m m uni c ati o n Pri va c y A c t
*Ri ght to Pri va c y
*Many More
*Law’s Against Hacktivism
*Subsection 342.1(1) – unauthorized use of computer
*Subsection 430(1.1) – mischief in related to data of the
criminal code RSC 1985, c. C-46
*Section 184.1 Criminal Code (R.S.C., 1985, c. C-46)
clearly specifies that Every one who, by means of any
electro-magnetic, acoustic, mechanical or other device,
wilfully intercepts a private communication is guilty of an
indictable offence and liable to imprisonment for a term
not exceeding five years.
*18 U.S.C. Section 1030 Computer fraud and Abuse Act was
modified for DDOS attack in the case United State Vs
Dennis in the District of Alaska 2001
*Many More
LET’S DIG THE EVIDENCE
*
*April 17 – 19, 2011 Sony Play Station Network Outage –
Massive breach in Online Video game network leading to a
theft of 77 million user account detail including personal
and financial information.
*Anonymous – “For Once We Didn’t Do It,” though admitting
“it could be the case that other Anons have acted by
themselves.”
*In 2013 United Kingdom Information Commissioner's Office
charged Sony with a £250,000 penalty for putting a large
amount of personal and financial data of PSN clients at risk.
– Victim became the culprit.
*Evidence 2
*Dog War – an android gaming app was launched and an
animal lover Hacktivist decided to act against it.
*A malicious app claiming to be the version of the game
launched under the name “Dogowar”.
*Once started, the app sends text messages to numbers in
the user’s address book saying, “I take pleasure in
hurting small animals, just thought you should know
that.” It also sends a text to a number that signs the
user up for a text-alert service operated by People for
the Ethical Treatment of Animals.
*Evidence 3
*Cyber-Activist Jeremy Hammond Sentenced to 10 Years In Prison, Rolling
Stone, Nov. 15, 2013
*Hacked Private Intelligent Firm, linked 5 million e-mail private messages
to WiKiLeaks in 2012, $ 700,000 donated to non-profit groups.
*Majority public came for his support as everyone believed he did it for a
noble cause.
*Jeremy Hammond – Arrested for possessing Marijuana in Nov 2004 and
Dec 2010. Found Guilty on 7 Dec, 2006 for 2 years in federal prison and 3
years of Probation for breaking into computer System of Protest Warriors
a group that targeted anti-Iraq War Activities. He was also found guilty
to hack politically conserved website and stealing it’s computer
database including credit card information. Arrested again on 25 March
2010 for throwing glasses and chairs inside a restaurant to kick out David
Irving’s guest. On 29 November, 2010 he was found guilty for tearing
down Chicago 2016 and burning it to protest Chicago bid for the 2016
Summer Olympics. The big Stratfor Case on 5 March 2012.
LET’S HEAR
*Evidence 3 cont..
*Judge L o r e t t a A . P r e s k a called Jerry “unrepentant
recidivism.” and stated following points related to the case.
*There is a "desperate need to promote respect for the
law," as well as “need for adequate public deterrence.”
*“There will not be any unwarranted sentencing disparity”
with respective to UK’s court decision.
*Hammond’s activities did not line up with his activist
motivations: he “broke into critical systems, destroyed
files,” and sought to dump online information, in addition
to defacing Stratfor’s website.”
*The Italian Court of Cassation against
'Anonymous
*Supreme Court – Judgment of December 16, 2013 n. 50620
*“It is not the group in its entirety and general purpose to be
considered illegal, but some ‘cells’ with criminal plans are”.
“Beyond the ideal values, what matters is the shared program and
what ways are followed to meet the objectives of the group”
*“According to art. 416 of the Criminal Code, criminal conspiracy
exists in the presence of an agreement to illegally enter other
people’s websites. The purpose of the values ​​pursued by the
members, which coincides with the principles that are widely
shared among society, does not exclude the possibility of criminal
association”.
*Negative Impact
*Victim Becomes Accused – Evidence 1
*Damaging Society – Evidence 2
*Taking Law Lightly –Evidence 3
*Freedom of Speech does not mean invading other’s
right of speech.
*Act of Hacktivism manipulates many young minds in
the wrong direction
*Provocation – Hacktivism is not similar to the Rosa
Park incident where she refused to give up seat to
a white passenger in Montgomery, during 1950’s
which at the time was crime. It provokes people
to harm the accused via technology.
*Summary
*“Hacktivism is a Tactic not a philosophy”.
*Constitution is absolute which forms the foundation of a
civilized society.
*If you say Hacktivism promotes freedom of speech than
same way we do say ideology promotes peace irrelative of
which ideology.
*It’s not justified when people like Mafiaboy says “he did
everything just to test the security” and than knocking off
server’s of Yahoo and few other websites.
CONCLUSION
 Robin hood looks good in story books not in reality, people
have shed their share of sweat too to be successful in today’s
world.
 Self Proclaimed public representatives are similar to slow
poisoning, we won’t realize its ill effects soon but by the time it is
exposed it would be too late.
HACKTIVISM

More Related Content

What's hot

Phone hacking scandal
Phone hacking scandalPhone hacking scandal
Phone hacking scandal
ClaySkorski
 
Student Presentation Assignment
Student Presentation AssignmentStudent Presentation Assignment
Student Presentation Assignment
Muhammed Haidri
 
Janae gerard final digital law and policy
Janae gerard final digital law and policyJanae gerard final digital law and policy
Janae gerard final digital law and policy
janaegerard
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
Gerwin Ocsena
 
Awn Abrar - Patriot Act
Awn Abrar - Patriot ActAwn Abrar - Patriot Act
Awn Abrar - Patriot Act
awnabrar
 
Pornography and ethics - India specific
Pornography and ethics - India specificPornography and ethics - India specific
Pornography and ethics - India specific
Nithya Ramachandran
 

What's hot (18)

Phone hacking scandal
Phone hacking scandalPhone hacking scandal
Phone hacking scandal
 
Student Presentation Assignment
Student Presentation AssignmentStudent Presentation Assignment
Student Presentation Assignment
 
Presentación3
Presentación3Presentación3
Presentación3
 
feature homan square
feature homan squarefeature homan square
feature homan square
 
GOVERNMENT SURVEILANCE
GOVERNMENT SURVEILANCEGOVERNMENT SURVEILANCE
GOVERNMENT SURVEILANCE
 
Janae gerard final digital law and policy
Janae gerard final digital law and policyJanae gerard final digital law and policy
Janae gerard final digital law and policy
 
Anger swells after NSA phone records collection revelations
Anger swells after NSA phone records collection revelationsAnger swells after NSA phone records collection revelations
Anger swells after NSA phone records collection revelations
 
Policy Briefing Presentation
Policy Briefing PresentationPolicy Briefing Presentation
Policy Briefing Presentation
 
Prism
PrismPrism
Prism
 
With a license to kill with drones
With a license to kill with dronesWith a license to kill with drones
With a license to kill with drones
 
Privacy and the Government
Privacy and the GovernmentPrivacy and the Government
Privacy and the Government
 
Cloaking Devices, CyberPersonas, and Neutral Zones
Cloaking Devices, CyberPersonas, and Neutral ZonesCloaking Devices, CyberPersonas, and Neutral Zones
Cloaking Devices, CyberPersonas, and Neutral Zones
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussion
 
Awn Abrar - Patriot Act
Awn Abrar - Patriot ActAwn Abrar - Patriot Act
Awn Abrar - Patriot Act
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Pornography and ethics - India specific
Pornography and ethics - India specificPornography and ethics - India specific
Pornography and ethics - India specific
 

Viewers also liked (13)

重力波
重力波重力波
重力波
 
VW E-Golf
VW E-Golf VW E-Golf
VW E-Golf
 
Урок - 10, 3 сентября, 2016
Урок - 10, 3 сентября, 2016Урок - 10, 3 сентября, 2016
Урок - 10, 3 сентября, 2016
 
Sree_Case_Study
Sree_Case_StudySree_Case_Study
Sree_Case_Study
 
Who uses My HealtheVet update
Who uses My HealtheVet updateWho uses My HealtheVet update
Who uses My HealtheVet update
 
Trabajo sociales
Trabajo socialesTrabajo sociales
Trabajo sociales
 
Scooter
ScooterScooter
Scooter
 
Electriccarpres
ElectriccarpresElectriccarpres
Electriccarpres
 
Урок - 7, 13 февраля, 2016
Урок - 7, 13 февраля, 2016Урок - 7, 13 февраля, 2016
Урок - 7, 13 февраля, 2016
 
Plantilla comentario. ¡el barroco¡
Plantilla comentario. ¡el barroco¡Plantilla comentario. ¡el barroco¡
Plantilla comentario. ¡el barroco¡
 
Cv senior mechanical engineer sept-2015 - with cert
Cv senior mechanical engineer   sept-2015 - with certCv senior mechanical engineer   sept-2015 - with cert
Cv senior mechanical engineer sept-2015 - with cert
 
Motor mechanics (1)
Motor mechanics (1)Motor mechanics (1)
Motor mechanics (1)
 
Book summary: Good strategy bad strategy
Book summary: Good strategy bad strategyBook summary: Good strategy bad strategy
Book summary: Good strategy bad strategy
 

Similar to HACKTIVISM

Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)
Kim Moore
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
rmackinnon
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816
Nicole Fields
 
064-066-IPM_July_August_2013-LD
064-066-IPM_July_August_2013-LD064-066-IPM_July_August_2013-LD
064-066-IPM_July_August_2013-LD
Ted Roe
 

Similar to HACKTIVISM (9)

Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)
 
2600 v20 n2 (summer 2003)
2600 v20 n2 (summer 2003)2600 v20 n2 (summer 2003)
2600 v20 n2 (summer 2003)
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)
 
Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816
 
064-066-IPM_July_August_2013-LD
064-066-IPM_July_August_2013-LD064-066-IPM_July_August_2013-LD
064-066-IPM_July_August_2013-LD
 

HACKTIVISM

  • 2. Doesn’t it Sound Outstandingly Nobel *HACKTIVISM
  • 3. *Benefits *Promotes Freedom of Speech and democracy *Free speech is a birth right and I am grateful to Hacktivist to set a platform for that. *Plus all the points and evidence as provided by my colleagues in their presentation.
  • 4. *Before we start the tug-of- war
  • 6. *Violated Law’s *Ci vi l Di s o bedi enc e *Pers o na l Info rm a ti o n Pro tec ti o n A c t *Defa m a ti o n (Pro tec ti o n o f o ne’s Reputa ti o n) *Elec tro ni c s Co m m uni c ati o n Pri va c y A c t *Ri ght to Pri va c y *Many More
  • 7. *Law’s Against Hacktivism *Subsection 342.1(1) – unauthorized use of computer *Subsection 430(1.1) – mischief in related to data of the criminal code RSC 1985, c. C-46 *Section 184.1 Criminal Code (R.S.C., 1985, c. C-46) clearly specifies that Every one who, by means of any electro-magnetic, acoustic, mechanical or other device, wilfully intercepts a private communication is guilty of an indictable offence and liable to imprisonment for a term not exceeding five years. *18 U.S.C. Section 1030 Computer fraud and Abuse Act was modified for DDOS attack in the case United State Vs Dennis in the District of Alaska 2001 *Many More
  • 8. LET’S DIG THE EVIDENCE
  • 9. * *April 17 – 19, 2011 Sony Play Station Network Outage – Massive breach in Online Video game network leading to a theft of 77 million user account detail including personal and financial information. *Anonymous – “For Once We Didn’t Do It,” though admitting “it could be the case that other Anons have acted by themselves.” *In 2013 United Kingdom Information Commissioner's Office charged Sony with a £250,000 penalty for putting a large amount of personal and financial data of PSN clients at risk. – Victim became the culprit.
  • 10. *Evidence 2 *Dog War – an android gaming app was launched and an animal lover Hacktivist decided to act against it. *A malicious app claiming to be the version of the game launched under the name “Dogowar”. *Once started, the app sends text messages to numbers in the user’s address book saying, “I take pleasure in hurting small animals, just thought you should know that.” It also sends a text to a number that signs the user up for a text-alert service operated by People for the Ethical Treatment of Animals.
  • 11. *Evidence 3 *Cyber-Activist Jeremy Hammond Sentenced to 10 Years In Prison, Rolling Stone, Nov. 15, 2013 *Hacked Private Intelligent Firm, linked 5 million e-mail private messages to WiKiLeaks in 2012, $ 700,000 donated to non-profit groups. *Majority public came for his support as everyone believed he did it for a noble cause. *Jeremy Hammond – Arrested for possessing Marijuana in Nov 2004 and Dec 2010. Found Guilty on 7 Dec, 2006 for 2 years in federal prison and 3 years of Probation for breaking into computer System of Protest Warriors a group that targeted anti-Iraq War Activities. He was also found guilty to hack politically conserved website and stealing it’s computer database including credit card information. Arrested again on 25 March 2010 for throwing glasses and chairs inside a restaurant to kick out David Irving’s guest. On 29 November, 2010 he was found guilty for tearing down Chicago 2016 and burning it to protest Chicago bid for the 2016 Summer Olympics. The big Stratfor Case on 5 March 2012.
  • 13. *Evidence 3 cont.. *Judge L o r e t t a A . P r e s k a called Jerry “unrepentant recidivism.” and stated following points related to the case. *There is a "desperate need to promote respect for the law," as well as “need for adequate public deterrence.” *“There will not be any unwarranted sentencing disparity” with respective to UK’s court decision. *Hammond’s activities did not line up with his activist motivations: he “broke into critical systems, destroyed files,” and sought to dump online information, in addition to defacing Stratfor’s website.”
  • 14. *The Italian Court of Cassation against 'Anonymous *Supreme Court – Judgment of December 16, 2013 n. 50620 *“It is not the group in its entirety and general purpose to be considered illegal, but some ‘cells’ with criminal plans are”. “Beyond the ideal values, what matters is the shared program and what ways are followed to meet the objectives of the group” *“According to art. 416 of the Criminal Code, criminal conspiracy exists in the presence of an agreement to illegally enter other people’s websites. The purpose of the values ​​pursued by the members, which coincides with the principles that are widely shared among society, does not exclude the possibility of criminal association”.
  • 15.
  • 16. *Negative Impact *Victim Becomes Accused – Evidence 1 *Damaging Society – Evidence 2 *Taking Law Lightly –Evidence 3 *Freedom of Speech does not mean invading other’s right of speech. *Act of Hacktivism manipulates many young minds in the wrong direction *Provocation – Hacktivism is not similar to the Rosa Park incident where she refused to give up seat to a white passenger in Montgomery, during 1950’s which at the time was crime. It provokes people to harm the accused via technology.
  • 17. *Summary *“Hacktivism is a Tactic not a philosophy”. *Constitution is absolute which forms the foundation of a civilized society. *If you say Hacktivism promotes freedom of speech than same way we do say ideology promotes peace irrelative of which ideology. *It’s not justified when people like Mafiaboy says “he did everything just to test the security” and than knocking off server’s of Yahoo and few other websites.
  • 18. CONCLUSION  Robin hood looks good in story books not in reality, people have shed their share of sweat too to be successful in today’s world.  Self Proclaimed public representatives are similar to slow poisoning, we won’t realize its ill effects soon but by the time it is exposed it would be too late.