SlideShare a Scribd company logo
1 of 40
(H)ac(k)tivism
Lecture 2
admin
• Library
• On blackboard…
• Blog
• questions
Culture Jamming cf Mark Dery
examples
• Banksy
• Joey Skaggs
• Negativland
– Chicken Diction
– Helter Stupid
Back to Situationists
10 Tactics on uses of humor
Culture jamming: how/why it works
• pierces the veil of the Spectacle
Ok but how?
• draws attention to brands, consumerism, and
other abstractions. It foregrounds them.
• makes explicit the connection between wealth
and the exploited.
• Deflates authority: cf Nolan Void essay
The Rise of Hacktivism
• The Hacker Ethic
• Cult of the Dead Cow and Hacktivism
• The early days of Hacktivism
The Mentor: Conscience of a Hacker
Another one got caught today, it's all over the
papers. "Teenager Arrested in Computer
Crime Scandal", "Hacker Arrested after Bank
Tampering"...
Damn kids. They're all alike.
The Mentor 2
But did you, in your three-piece psychology
and 1950's technobrain, ever take a look
behind the eyes of the hacker? Did you ever
wonder what made him tick, what forces
shaped him, what may have molded him?
I am a hacker, enter my world...
The Mentor 3
Mine is a world that begins with school... I'm
smarter than most of the other kids, this crap
they teach us bores me...
Damn underachiever. They're all alike.
The Mentor 4
I made a discovery today. I found a computer.
Wait a second, this is cool. It does what I want
it to. If it makes a mistake, it's because I
screwed it up. Not because it doesn't like
me... Or feels threatened by me... Or thinks
I'm a smart ass... Or doesn't like teaching and
shouldn't be here... Damn kid. All he
does is play games. They're all alike.
The Mentor 5
And then it happened... a door opened to a
world... rushing through the phone line like
heroin through an addict's veins, an electronic
pulse is sent out, a refuge from the day-to-day
incompetencies is sought... a board is found.
"This is it... this is where I belong..."
The Mentor 6
You bet your ass we're all alike... we've been
spoon-fed baby food at school when we
hungered for steak... the bits of meat that you
did let slip through were pre-chewed and
tasteless. We've been dominated by sadists,
or ignored by the apathetic. The few that had
something to teach found us will- ing pupils,
but those few are like drops of water in the
desert.
The Mentor 7
We explore... and you call us criminals. We
seek after knowledge... and you call us
criminals. We exist without skin color, without
nationality, without religious bias... and you
call us criminals. You build atomic bombs, you
wage wars, you murder, cheat, and lie to us
and try to make us believe it's for our own
good, yet we're the criminals.
The Mentor 8
Yes, I am a criminal. My crime is that of
curiosity. My crime is that of judging people
by what they say and think, not what they
look like. My crime is that of outsmarting you,
something that you will never forgive me for.
I am a hacker, and this is my manifesto. You
may stop this individual, but you can't stop us
all... after all, we're all alike.
A brief history of hacktivism
1. Electronic Disturbance Theater
In 1998, Electronic Disturbance Theater (EDT)
developed and utilized a tool called Floodnet
to target the Pentagon, the White House, the
School of the Americas, the office of Mexico’s
president, the Mexican Stock Exchange and
the Frankfurt Stock Exchange, all in support of
the Zapatista guerrilla movement in Mexico.
1. Electronic Disturbance Theater
method. Floodnet, which has subsequently been
released as part of EDT’s “Disturbance Developer
Kit,” allowed users to participate in a sit-in attack
on these sites by a simple click on an icon on
EDT's Web site. The Floodnet software then
directed the participating computers to
continually attack the target Web sites. It has
been estimated that 10,000 people accessed
Floodnet in this two-day action resulting in
targeted servers being hit at a rate of 600,000 hits
per minute.
More about EDT
Dorothy Denning: the FloodNet attack on the
Pentagon was met with perhaps the first
military response to a hacktivist attack.
Immediately after detecting the attack the
Pentagon servers redirected the FloodNet
clients to a hostile Applet which tied up the
attacking computers, ultimately forcing them
to reboot.
The Electrohippies
FloodNet has subsequently been deployed by a
group called The Electrohippies who used it to
target the World Trade Organization and
various e-commerce websites, defending their
actions in Biblical terms: "As Jesus ransacked
the temple in Jerusalem because it had
become a house of merchandise, so the
recent attacks on e-commerce web sites are a
protest against the manner of it's [sic] recent
development."
More about Electrohippies
Electrohippies recognized that DDOS attacks did
have the result of denying speech to the target,
but came up with a formula for determining
when such action was justified:
1. the acts or views perpetrated by the targets of a
[D]DoS action must be reprehensible to many in
society at large, and not just to a small group.
2. the attack should show proportionality, -- it
should focus on a single issue, and not the
organization as a whole.
More about Electrohippies
• The theory is that the attacks should be
counterpoints that allow alternative points of
view to become visible; the goal is not to
silence the targeted group but to restore
informational balance.
More about Electrohippies
• The Electrohippies also distinguished between
server side attacks and client-side attacks,
where a client-side attack is coming from
multiple individuals (using Floodnet, for
example), the though being that such action is
more democratic.
Oxblood Ruffin objects
• "Denial of Service attacks are a violation of the
First Amendment, and of the freedoms of
expression and assembly. No rationale, even
in the service of the highest ideals, makes
them anything other than what they are--
illegal, unethical, and uncivil."
2. The Internet Black Tigers (Sri Lanka)
• An offshoot of the Liberation Tigers of Tamil,
the Black Tigers showed that slick tools like
Floodnet weren’t necessary to carry out a
denial of service attack.
2. The Internet Black Tigers (Sri Lanka)
method. The Tigers, protesting the Sri Lankan
government, organized email bombings
(flooding servers with email) that attacked the
Sri Lankan consulates in Seoul and Ottowa,
taking them offline. The message flooding the
servers was also quite simple: "We are the
Internet Black Tigers and we’re doing this to
disrupt your communications."
3. Hong Kong Blondes
• The Hong Kong Blondes was an underground
network of Chinese students spread across at
least three continents. It was started by
Blondie Wong, who had reportedly witnessed
his father being stoned to death during the
1966-'76 Cultural Revolution. Group primarily
protested censorship and the violations of
human rights that occurred in China.
3. Hong Kong Blondes
method. The group launched cyberattacks against
the "Great Wall" -- a series of firewalls put in
place to block access to Western Internet sites.
With members operating inside and outside of
China, the group claimed to have found
significant security holes within Chinese
government computer networks and claimed to
have defaced government Web sites, torn down
firewalls and even disabled Chinese
communication satellites. They worked to
forewarn political dissidents of imminent arrests.
4. WANK Worm
• According to Julian Assange, the WANK worm is the first
instance of hacktivism. On Oct. 16, 1989, during the Cold
War when nuclear war was an immediate possibility,
hackers hit the NASA computers with the WANK Worm.
Two days prior to the launch of the plutonium-
fueled Galileo space probe from the Kennedy Space
Station, NASA employees logged on to see a humorous yet
frightening welcome screen: "Your computer has been
officially WANKed. You talk of times of peace for all, and
then prepare for war," and "Remember, even if you win the
rat race, you're still a rat." The machines of the U.S.
Department of Energy and NASA worldwide had been
penetrated by the anti-nuclear WANK (WORMS AGAINST
NUCLEAR KILLERS) worm.
4. WANK Worm
method. Once inside NASA’s system, the WANK worm
began to travel through the network of interconnected
computers, crawling through any holes in the security
system. While the worm attack did not stop the shuttle
launch, the recovery from the attack did require a
massive expenditure of money and effort. Because the
worm avoided attacking the computers in Australia and
New Zealand and the worm source code showed
specific instructions to avoid infecting machines in New
Zealand, it is suspected that the attack originated from
Australia. Some have credited the Melbourne-based
hackers, Electron and Phoenix.
5. Net-strike Attack Devised by the
Strano Network
• On December 21, 1995, a group called Strano
Network conducted what is recognized as the
first Internet sit-in. The action targeted the
Web sites of various French government
agencies to protest French nuclear and social
policies.
5. Net-strike Attack Devised by the
Strano Network
• Method. A web sit-in occurs when the
attackers generate a sufficient volume of
traffic to a Web site, preventing any legitimate
traffic from accessing the site. In this case
participants from all over the world were
instructed to point their browsers toward
designated sites and constantly reload the
pages. Because of the excessive traffic, the
targeted Web sites were made unavailable.
6. UrBaN Ka0s
• On June 30th, 1997, the Portuguese hacking
group UrBaN Ka0s hacked and defaced the site of
the Department of Foreign Affairs of Republic of
Indonesia and 25 other military and government
sites as part of the global protest against the
Indonesian government. The goal was to support
and bring attention to the people of Timor, who
had been oppressed and violated for decades by
the Indonesian government. It is by most
accounts the first large-scale hacktivist action.
Possible topic (from Fabio Chiusi)
• When I saw the Google Project Glass video, I
immediately thought about your experience with
virtual worlds, and your words on Facebook
dictatorship. Since this project is part of a larger wave
of unintrusive augmented reality devices, that will
bring notifications, social media streams, pop ups,
promotions etc. in front of our very eyes in real-time,
I've been guessing: what will be of the self? Will the
dictatorship of social media moguls and search engines
and targeted ads be even more severe and invasive
than it is now? And with what consequences on both
the individual and society?
• What would Debord say?
7. Toy Wars
• In 1999 an online toy retailer called eToys filed suit
against a group of European artists for their use of the
web address etoy.com – despite the fact that the artists
had been using that Web site for two years before
eToys.com came into existence. Depressingly, the court
sided with the corporation, granting an injunction
against etoy on Nov. 29 of that year. What eToys didn’t
count on was a group of hacktivists, incensed by the
injustice of the court decision, launching an internet
sit-in against eToys.com from Dec. 15-25, effectively
clogging the Web site during the Christmas shopping
season.
7. Toy Wars
• method. What was interesting about the sit-in
was that it was structured as an online game
in which the goal of players was the
devaluation of eToys stock. And indeed, eToy’s
stock began to fall immediately after the
campaign started, and the company went out
of business within a short period of time.
Some commentators consider the sit-in to be
a significant contributing factor to the
corporation’s collapse.
8. The World’s Fantabulous Defacers
• In November 2000, one of the most prolific
hacktivist goups of all time emerged and
operated for about two years, defacing, by some
estimates, more than 400 Web sites during its
operation. Called the World’s Fantabulous
Defacers, its modus operandi was to deface
institutional Web sites by inserting flash videos
and audio files that highlighted human rights
violations against Muslim populations (the goal
being to raise “global awareness” – which
presumably explains why the defacements were
in English).
8. The World’s Fantabulous Defacers
• Alexandra Samuel, then a PhD student,
interviewed two of the principle actors of
WFD (M0r0n and nightman), and learned that
they had a fairly large portfolio of causes in
the Muslim world: “We have defaced FOR
many issues, if you look at our defacements it
says “FREE KASHMIR, PALESTINE, LIFT THE
SANCTIONS ON IRAQ, FREE CHECHNIA.” So
you see we are FOR all those people suffering
in the world against atrocities!”
9. PROJECT CHANOLOGY
• Project Chanology (also called Operation
Chanology) was a protest movement against the
practices of the Church of Scientology by
Anonymous, a loosely unorganized Internet-
based group that emerged from the 4chan
message boards. The project was started as a
“mental warfare” response to the Church of
Scientology's attempts to prevent the online
sharing of a video interview with
actor/Scientologist Tom Cruise.
9. PROJECT CHANOLOGY
• Method. The project was publicly launched with a video
posted to YouTube, "Message to Scientology," on January
21, 2008. The project's goals were to "take down all
Scientology Web sites as an immediate act of retaliatory
censorship, counteract Scientology's attempts to suppress
the videos (and other cult materials) by constantly
reposting them, and publicize the cult's well-documented
history of employing suppressive and violent tactics to
mask its illegal or immoral activities." The initial cyber
attack, which came in the form of a distributed denial of
service attack, was followed by black faxes, prank calls, and
other activities intended to disrupt the Church of
Scientology's operations.
Wikileaks
• Leaking site Developed by Julian Assange
– Background as a hacker
– Endorses hacktivist ethic: information wants to be
free.
#2: Daniel-Domscheit Berg (aka Daniel Schmidt)
Member of Chaos Computer Club in Germany
DDB

More Related Content

What's hot

Authoritarian Governments in Cyberspace
Authoritarian Governments in CyberspaceAuthoritarian Governments in Cyberspace
Authoritarian Governments in Cyberspaceevgeny.morozov
 
Med122 hackers lecture
Med122 hackers lectureMed122 hackers lecture
Med122 hackers lectureRob Jewitt
 
Psychology of the Insider Threat
Psychology of the Insider ThreatPsychology of the Insider Threat
Psychology of the Insider ThreatDavid Sweigert
 
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1Onwadee18
 
The undeclared war against wikileaks
The undeclared war against wikileaksThe undeclared war against wikileaks
The undeclared war against wikileaksgorin2008
 
georgetown talk evgeny morozov
georgetown talk evgeny morozovgeorgetown talk evgeny morozov
georgetown talk evgeny morozovevgeny.morozov
 
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมาโครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมาOnwadee18
 

What's hot (9)

Authoritarian Governments in Cyberspace
Authoritarian Governments in CyberspaceAuthoritarian Governments in Cyberspace
Authoritarian Governments in Cyberspace
 
Med122 hackers lecture
Med122 hackers lectureMed122 hackers lecture
Med122 hackers lecture
 
Coppens 01
Coppens 01Coppens 01
Coppens 01
 
Psychology of the Insider Threat
Psychology of the Insider ThreatPsychology of the Insider Threat
Psychology of the Insider Threat
 
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1
 
The undeclared war against wikileaks
The undeclared war against wikileaksThe undeclared war against wikileaks
The undeclared war against wikileaks
 
The End Game Hoax
The End Game HoaxThe End Game Hoax
The End Game Hoax
 
georgetown talk evgeny morozov
georgetown talk evgeny morozovgeorgetown talk evgeny morozov
georgetown talk evgeny morozov
 
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมาโครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
 

Similar to Hacktivism 2: A brief history of hacktivism.

Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESJenny O'Meara
 
How To Write A Hypothesis Statement For A Research
How To Write A Hypothesis Statement For A ResearchHow To Write A Hypothesis Statement For A Research
How To Write A Hypothesis Statement For A ResearchAngelica Ortiz
 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lectureRob Jewitt
 
Zapatistas and online activism
Zapatistas and online activismZapatistas and online activism
Zapatistas and online activismHillbilly Gothic
 
2600 v07 n1 (spring 1990)
2600 v07 n1 (spring 1990)2600 v07 n1 (spring 1990)
2600 v07 n1 (spring 1990)Felipe Prado
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lectureRob Jewitt
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyCRS4 Research Center in Sardinia
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011hassanzadeh20
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivismBilal Ali
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newDr. Arun Verma
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...Hackito Ergo Sum
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsAdam David Brown
 

Similar to Hacktivism 2: A brief history of hacktivism. (20)

Powerpoint
PowerpointPowerpoint
Powerpoint
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
How To Write A Hypothesis Statement For A Research
How To Write A Hypothesis Statement For A ResearchHow To Write A Hypothesis Statement For A Research
How To Write A Hypothesis Statement For A Research
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lecture
 
Zapatistas and online activism
Zapatistas and online activismZapatistas and online activism
Zapatistas and online activism
 
SMP textfile
SMP textfileSMP textfile
SMP textfile
 
2600 v07 n1 (spring 1990)
2600 v07 n1 (spring 1990)2600 v07 n1 (spring 1990)
2600 v07 n1 (spring 1990)
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lecture
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human Rights
 

More from Peter Ludlow

Group Epistemology and Irregular Warfare (the chickens come home to roost)
Group Epistemology and Irregular Warfare (the chickens come home to roost)Group Epistemology and Irregular Warfare (the chickens come home to roost)
Group Epistemology and Irregular Warfare (the chickens come home to roost)Peter Ludlow
 
Digital humanities: Narrative Guidance
Digital humanities: Narrative GuidanceDigital humanities: Narrative Guidance
Digital humanities: Narrative GuidancePeter Ludlow
 
Hacktivism 6: Networks and Conspiracy
Hacktivism 6:  Networks and ConspiracyHacktivism 6:  Networks and Conspiracy
Hacktivism 6: Networks and ConspiracyPeter Ludlow
 
Hacktivism 3: Risk taking and tipping points.
Hacktivism 3: Risk taking and tipping points.Hacktivism 3: Risk taking and tipping points.
Hacktivism 3: Risk taking and tipping points.Peter Ludlow
 
Hacktivism lecture 1: The deep origins of hacktivism
Hacktivism lecture 1: The deep origins of hacktivismHacktivism lecture 1: The deep origins of hacktivism
Hacktivism lecture 1: The deep origins of hacktivismPeter Ludlow
 
Hacktivism 7: Epistemology and irregular warfare
Hacktivism 7: Epistemology and irregular warfareHacktivism 7: Epistemology and irregular warfare
Hacktivism 7: Epistemology and irregular warfarePeter Ludlow
 
Dynamic lexicon brazil 2018
Dynamic lexicon brazil 2018Dynamic lexicon brazil 2018
Dynamic lexicon brazil 2018Peter Ludlow
 
Hacktivists in trouble
Hacktivists in troubleHacktivists in trouble
Hacktivists in troublePeter Ludlow
 
What Can We Learn from the Unabomber?: Nothing.
What Can We Learn from the Unabomber?: Nothing.What Can We Learn from the Unabomber?: Nothing.
What Can We Learn from the Unabomber?: Nothing.Peter Ludlow
 

More from Peter Ludlow (10)

Group Epistemology and Irregular Warfare (the chickens come home to roost)
Group Epistemology and Irregular Warfare (the chickens come home to roost)Group Epistemology and Irregular Warfare (the chickens come home to roost)
Group Epistemology and Irregular Warfare (the chickens come home to roost)
 
Digital humanities: Narrative Guidance
Digital humanities: Narrative GuidanceDigital humanities: Narrative Guidance
Digital humanities: Narrative Guidance
 
Hacktivism 6: Networks and Conspiracy
Hacktivism 6:  Networks and ConspiracyHacktivism 6:  Networks and Conspiracy
Hacktivism 6: Networks and Conspiracy
 
Hacktivism 3: Risk taking and tipping points.
Hacktivism 3: Risk taking and tipping points.Hacktivism 3: Risk taking and tipping points.
Hacktivism 3: Risk taking and tipping points.
 
Hacktivism lecture 1: The deep origins of hacktivism
Hacktivism lecture 1: The deep origins of hacktivismHacktivism lecture 1: The deep origins of hacktivism
Hacktivism lecture 1: The deep origins of hacktivism
 
Hacktivism 7: Epistemology and irregular warfare
Hacktivism 7: Epistemology and irregular warfareHacktivism 7: Epistemology and irregular warfare
Hacktivism 7: Epistemology and irregular warfare
 
Dynamic lexicon brazil 2018
Dynamic lexicon brazil 2018Dynamic lexicon brazil 2018
Dynamic lexicon brazil 2018
 
Truth in fanfic
Truth in fanficTruth in fanfic
Truth in fanfic
 
Hacktivists in trouble
Hacktivists in troubleHacktivists in trouble
Hacktivists in trouble
 
What Can We Learn from the Unabomber?: Nothing.
What Can We Learn from the Unabomber?: Nothing.What Can We Learn from the Unabomber?: Nothing.
What Can We Learn from the Unabomber?: Nothing.
 

Recently uploaded

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

Hacktivism 2: A brief history of hacktivism.

  • 2. admin • Library • On blackboard… • Blog • questions
  • 3. Culture Jamming cf Mark Dery examples • Banksy • Joey Skaggs • Negativland – Chicken Diction – Helter Stupid Back to Situationists 10 Tactics on uses of humor
  • 4. Culture jamming: how/why it works • pierces the veil of the Spectacle Ok but how? • draws attention to brands, consumerism, and other abstractions. It foregrounds them. • makes explicit the connection between wealth and the exploited. • Deflates authority: cf Nolan Void essay
  • 5. The Rise of Hacktivism • The Hacker Ethic • Cult of the Dead Cow and Hacktivism • The early days of Hacktivism
  • 6. The Mentor: Conscience of a Hacker Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn kids. They're all alike.
  • 7. The Mentor 2 But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him? I am a hacker, enter my world...
  • 8. The Mentor 3 Mine is a world that begins with school... I'm smarter than most of the other kids, this crap they teach us bores me... Damn underachiever. They're all alike.
  • 9. The Mentor 4 I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it's because I screwed it up. Not because it doesn't like me... Or feels threatened by me... Or thinks I'm a smart ass... Or doesn't like teaching and shouldn't be here... Damn kid. All he does is play games. They're all alike.
  • 10. The Mentor 5 And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought... a board is found. "This is it... this is where I belong..."
  • 11. The Mentor 6 You bet your ass we're all alike... we've been spoon-fed baby food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. We've been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us will- ing pupils, but those few are like drops of water in the desert.
  • 12. The Mentor 7 We explore... and you call us criminals. We seek after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals.
  • 13. The Mentor 8 Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike.
  • 14. A brief history of hacktivism
  • 15. 1. Electronic Disturbance Theater In 1998, Electronic Disturbance Theater (EDT) developed and utilized a tool called Floodnet to target the Pentagon, the White House, the School of the Americas, the office of Mexico’s president, the Mexican Stock Exchange and the Frankfurt Stock Exchange, all in support of the Zapatista guerrilla movement in Mexico.
  • 16. 1. Electronic Disturbance Theater method. Floodnet, which has subsequently been released as part of EDT’s “Disturbance Developer Kit,” allowed users to participate in a sit-in attack on these sites by a simple click on an icon on EDT's Web site. The Floodnet software then directed the participating computers to continually attack the target Web sites. It has been estimated that 10,000 people accessed Floodnet in this two-day action resulting in targeted servers being hit at a rate of 600,000 hits per minute.
  • 17. More about EDT Dorothy Denning: the FloodNet attack on the Pentagon was met with perhaps the first military response to a hacktivist attack. Immediately after detecting the attack the Pentagon servers redirected the FloodNet clients to a hostile Applet which tied up the attacking computers, ultimately forcing them to reboot.
  • 18. The Electrohippies FloodNet has subsequently been deployed by a group called The Electrohippies who used it to target the World Trade Organization and various e-commerce websites, defending their actions in Biblical terms: "As Jesus ransacked the temple in Jerusalem because it had become a house of merchandise, so the recent attacks on e-commerce web sites are a protest against the manner of it's [sic] recent development."
  • 19. More about Electrohippies Electrohippies recognized that DDOS attacks did have the result of denying speech to the target, but came up with a formula for determining when such action was justified: 1. the acts or views perpetrated by the targets of a [D]DoS action must be reprehensible to many in society at large, and not just to a small group. 2. the attack should show proportionality, -- it should focus on a single issue, and not the organization as a whole.
  • 20. More about Electrohippies • The theory is that the attacks should be counterpoints that allow alternative points of view to become visible; the goal is not to silence the targeted group but to restore informational balance.
  • 21. More about Electrohippies • The Electrohippies also distinguished between server side attacks and client-side attacks, where a client-side attack is coming from multiple individuals (using Floodnet, for example), the though being that such action is more democratic.
  • 22. Oxblood Ruffin objects • "Denial of Service attacks are a violation of the First Amendment, and of the freedoms of expression and assembly. No rationale, even in the service of the highest ideals, makes them anything other than what they are-- illegal, unethical, and uncivil."
  • 23. 2. The Internet Black Tigers (Sri Lanka) • An offshoot of the Liberation Tigers of Tamil, the Black Tigers showed that slick tools like Floodnet weren’t necessary to carry out a denial of service attack.
  • 24. 2. The Internet Black Tigers (Sri Lanka) method. The Tigers, protesting the Sri Lankan government, organized email bombings (flooding servers with email) that attacked the Sri Lankan consulates in Seoul and Ottowa, taking them offline. The message flooding the servers was also quite simple: "We are the Internet Black Tigers and we’re doing this to disrupt your communications."
  • 25. 3. Hong Kong Blondes • The Hong Kong Blondes was an underground network of Chinese students spread across at least three continents. It was started by Blondie Wong, who had reportedly witnessed his father being stoned to death during the 1966-'76 Cultural Revolution. Group primarily protested censorship and the violations of human rights that occurred in China.
  • 26. 3. Hong Kong Blondes method. The group launched cyberattacks against the "Great Wall" -- a series of firewalls put in place to block access to Western Internet sites. With members operating inside and outside of China, the group claimed to have found significant security holes within Chinese government computer networks and claimed to have defaced government Web sites, torn down firewalls and even disabled Chinese communication satellites. They worked to forewarn political dissidents of imminent arrests.
  • 27. 4. WANK Worm • According to Julian Assange, the WANK worm is the first instance of hacktivism. On Oct. 16, 1989, during the Cold War when nuclear war was an immediate possibility, hackers hit the NASA computers with the WANK Worm. Two days prior to the launch of the plutonium- fueled Galileo space probe from the Kennedy Space Station, NASA employees logged on to see a humorous yet frightening welcome screen: "Your computer has been officially WANKed. You talk of times of peace for all, and then prepare for war," and "Remember, even if you win the rat race, you're still a rat." The machines of the U.S. Department of Energy and NASA worldwide had been penetrated by the anti-nuclear WANK (WORMS AGAINST NUCLEAR KILLERS) worm.
  • 28. 4. WANK Worm method. Once inside NASA’s system, the WANK worm began to travel through the network of interconnected computers, crawling through any holes in the security system. While the worm attack did not stop the shuttle launch, the recovery from the attack did require a massive expenditure of money and effort. Because the worm avoided attacking the computers in Australia and New Zealand and the worm source code showed specific instructions to avoid infecting machines in New Zealand, it is suspected that the attack originated from Australia. Some have credited the Melbourne-based hackers, Electron and Phoenix.
  • 29. 5. Net-strike Attack Devised by the Strano Network • On December 21, 1995, a group called Strano Network conducted what is recognized as the first Internet sit-in. The action targeted the Web sites of various French government agencies to protest French nuclear and social policies.
  • 30. 5. Net-strike Attack Devised by the Strano Network • Method. A web sit-in occurs when the attackers generate a sufficient volume of traffic to a Web site, preventing any legitimate traffic from accessing the site. In this case participants from all over the world were instructed to point their browsers toward designated sites and constantly reload the pages. Because of the excessive traffic, the targeted Web sites were made unavailable.
  • 31. 6. UrBaN Ka0s • On June 30th, 1997, the Portuguese hacking group UrBaN Ka0s hacked and defaced the site of the Department of Foreign Affairs of Republic of Indonesia and 25 other military and government sites as part of the global protest against the Indonesian government. The goal was to support and bring attention to the people of Timor, who had been oppressed and violated for decades by the Indonesian government. It is by most accounts the first large-scale hacktivist action.
  • 32. Possible topic (from Fabio Chiusi) • When I saw the Google Project Glass video, I immediately thought about your experience with virtual worlds, and your words on Facebook dictatorship. Since this project is part of a larger wave of unintrusive augmented reality devices, that will bring notifications, social media streams, pop ups, promotions etc. in front of our very eyes in real-time, I've been guessing: what will be of the self? Will the dictatorship of social media moguls and search engines and targeted ads be even more severe and invasive than it is now? And with what consequences on both the individual and society? • What would Debord say?
  • 33. 7. Toy Wars • In 1999 an online toy retailer called eToys filed suit against a group of European artists for their use of the web address etoy.com – despite the fact that the artists had been using that Web site for two years before eToys.com came into existence. Depressingly, the court sided with the corporation, granting an injunction against etoy on Nov. 29 of that year. What eToys didn’t count on was a group of hacktivists, incensed by the injustice of the court decision, launching an internet sit-in against eToys.com from Dec. 15-25, effectively clogging the Web site during the Christmas shopping season.
  • 34. 7. Toy Wars • method. What was interesting about the sit-in was that it was structured as an online game in which the goal of players was the devaluation of eToys stock. And indeed, eToy’s stock began to fall immediately after the campaign started, and the company went out of business within a short period of time. Some commentators consider the sit-in to be a significant contributing factor to the corporation’s collapse.
  • 35. 8. The World’s Fantabulous Defacers • In November 2000, one of the most prolific hacktivist goups of all time emerged and operated for about two years, defacing, by some estimates, more than 400 Web sites during its operation. Called the World’s Fantabulous Defacers, its modus operandi was to deface institutional Web sites by inserting flash videos and audio files that highlighted human rights violations against Muslim populations (the goal being to raise “global awareness” – which presumably explains why the defacements were in English).
  • 36. 8. The World’s Fantabulous Defacers • Alexandra Samuel, then a PhD student, interviewed two of the principle actors of WFD (M0r0n and nightman), and learned that they had a fairly large portfolio of causes in the Muslim world: “We have defaced FOR many issues, if you look at our defacements it says “FREE KASHMIR, PALESTINE, LIFT THE SANCTIONS ON IRAQ, FREE CHECHNIA.” So you see we are FOR all those people suffering in the world against atrocities!”
  • 37. 9. PROJECT CHANOLOGY • Project Chanology (also called Operation Chanology) was a protest movement against the practices of the Church of Scientology by Anonymous, a loosely unorganized Internet- based group that emerged from the 4chan message boards. The project was started as a “mental warfare” response to the Church of Scientology's attempts to prevent the online sharing of a video interview with actor/Scientologist Tom Cruise.
  • 38. 9. PROJECT CHANOLOGY • Method. The project was publicly launched with a video posted to YouTube, "Message to Scientology," on January 21, 2008. The project's goals were to "take down all Scientology Web sites as an immediate act of retaliatory censorship, counteract Scientology's attempts to suppress the videos (and other cult materials) by constantly reposting them, and publicize the cult's well-documented history of employing suppressive and violent tactics to mask its illegal or immoral activities." The initial cyber attack, which came in the form of a distributed denial of service attack, was followed by black faxes, prank calls, and other activities intended to disrupt the Church of Scientology's operations.
  • 39. Wikileaks • Leaking site Developed by Julian Assange – Background as a hacker – Endorses hacktivist ethic: information wants to be free. #2: Daniel-Domscheit Berg (aka Daniel Schmidt) Member of Chaos Computer Club in Germany
  • 40. DDB