x

Like our Facebook Page

   
Early Times Newspaper Jammu, Leading Newspaper Jammu
 
Breaking News :   Deciphering recent Raj Sabha elections | Library at the Airport: Turning waiting hours into reading hours | Indian Women’s Cricket: Saluting a New Flight, a New Horizon | Remembering Baba Jitto | Aadhaar data recovery opens new can of worms in NIA probe | Preserving cultural heritage crucial for economic growth: LG Sinha | JKCA disowns cancelled IHPL tournament, calls it ‘illegal event’ | Pak terrorists to get ‘Goli Ka Jawab Goley Se’: Amit Shah | Crisis-ridden world looking at India with hope: Bhagwat | J&K ACB nabs Patwari red-handed taking bribe | Registers FIR in illegal petrol pump construction case | Budgam Bypolls: EC issues notice to PDP candidate on late-night campaign | Navy adding one new indigenous warship or submarine every 40 days: Admiral Tripathi | File comprehensive reply on pleas challenging online gaming law: SC to Centre | Court convicts ex-MD of J&K Cooperative Development for forgery | Mini bus overturns in Rajouri | Drone recovered from field | No need for countersignature of transfer certificates: CBSE tells schools | 9 climbers, including 2 local guides, killed | Kashmiri displaced people highlight demands | UPES marks Uttarakhand’s silver jubilee celebrations by hosting flagship exhibition | Hardcore criminal from Miran Sahib area booked under psa | NDA symbolizes good governance, RJD-Congress represent ‘Jungle Raj’: CM Yogi | Mumbai students receives insight into Post-370 J&K from community leaders | GDC Vijaypur organises storytelling, poster making competition | GDC Ramnagar organises awareness lecture on “Strengthening Democracy through Informed Voting” | QCFI convention on Quality Concepts CCQC-2025 held at Shri Mata Vaishno Devi University | Shri Lakshmi Narayan Mandir Management Trust elects president | NMC Pleads with 8th pay commission for merger of 50 percent DA | Director Information, DIPR employees condole demise of Accredited Journalist Tariq Bhat | Samba police seizes 11 vehicles including 4 dumpers for illegal mining | IIM Jammu conducts Innovation Boot camp at YCET Jammu | Natrang to stage Bawa Jitto on 6th, 7th Nov at Jhiri | Reasi District Netball championship begin | Abhivyakti: A celebration of Hindi Ghazal at MCM | Sucha Singh, Sunny Nanda selected for 16th International Raffa Boules Championship | PGIMER's Dr Rama Walia delivers Prestigious Subhash Mukherjee Oration on Puberty Disorders | NSS Volunteers took a Pledge on Sardar Vallabhbhai Patel’s Jayanti | GDC Hiranagar, organises Industrial visit for the students | BSF Jammu to host Marathon Expo Ahead of Jammu BSF Marathon | Man kills minor pregnant girlfriend in Jharkhand’s Gumla | Picking of button mushroom inaugurates at DCTC, Krishi Bhawan | An 11-year-old’s Triumph over tragedy at Shri Mata Vaishno Devi Narayana Superspeciality Hospital | 1 missing lady traced out, reunited with her Family members | Miran Sahib Police arrested drug peddler, heroin recovered | Director Agriculture Jammu reviews Departmental Display Stall at Jhiri Mela | Back Issues  
 
news details
Hacktivism – The ‘ism’ of Technocrats
5/20/2021 11:53:38 PM
Abhigya Mahajan

In a 1995 article about New Media artist Shu Lea Cheang’s film Fresh Kill, writer Jason Sack first coined the term hacktivism. The term, however, is often attributed to Cult of the Dead Cow member “Omega,” who used it in a 1996 e-mail to the group. Derived from combining the words ‘Hack’ and ‘Activism’, it is the act of hacking, or breaking into a computer system, for politically or socially motivated purposes. The definition of hacktivism is nebulous due to the variety of meanings of its root words, and there is significant disagreement over the types of activities and purposes it encompasses. The individual who performs an act of hacktivism is said to be a hacktivist. Hacktivists who participate in such actions (such as sabotaging an organization’s website or divulging information about an organization), aims to send a message and gain visibility for a cause they support.
Government agencies, multinational corporations, and any other entity perceived as ‘bad’ or ‘wrong’ by the hacktivist group or individual are common targets. Obtaining unauthorized access to any organization’s assets through such activities is, of course, a criminal act, regardless of the intent. Mainly, hacking is triggered by individuals or groups’ perception of what they consider to be “wrong” or “unfair”, so they are encouraged to do something about it. Motivations include revenge, political or social motives, ideology, protest, the desire to embarrass certain organizations or individuals in these organizations, or sometimes purely destructive behavior. In general, hacker groups aim to question, provoke and challenge governments, organizations, and companies that violate ethical standards.
There are many hacktivist groups around the world, all with the goal of disrupting or exposing the inner workings of government or private organizations in the name of transparency and the public good. The most well-known of these hacktivist groups is dubbed ‘Anonymous’. The ‘Anonymous’ hacktivist group, founded in 2008, rose to prominence after leaking a video involving Tom Cruise on YouTube, exposing the Church of Scientology organization. Following requests from Church of Scientology executives to remove the video, Anonymous continued with a Distributed Denial of Service attack that brought the Church’s website down. Since then, the group has continued their campaigns of nonviolent online protests with a steady stream of DDoS attacks, even targeting the terrorist group ISIS in their efforts to bring their version of justice to the rest of the world.
What is the difference between cyber terrorism and hacktivism?
The concept of cyber terrorism is surrounded by various ideas. Online directed action to protest a specific cause has been labeled cyber terrorism in some cases. Civil disobedience is evolving into Electronic Civil Disobedience (ECD) in order to practice sociopolitical resistance within digital networks. One point of contention is whether computer hacking for political activism should be classified as cyber terrorism. Because hacktivism and Internet vandalism do not directly threaten victims’ lives and livelihoods, they may be incorrectly labeled as cyber terrorism. Website defacement can be considered a form of digital vandalism, and it was originally done to boost the attacker’s ego. As a result, the impact of ‘Internet anarchy’ influences whether a digital attack can be classified as an act of cyber terrorism. Because cyber terrorism is frequently confused with hacktivism and ECD, it is important to consider the context of cyber terrorism. Hacktivists are politically motivated, and they target institutions that hold opposing political views to their own. They most commonly use a Dos attack to overload a server until it crashes. Cyber terrorists target systems in order to disrupt or destroy a specific nation’s, sector’s, or organization’s critical services and infrastructure. Hacktivists may hack to demonstrate their support for a specific cause or issue by interfering with services. Sites may be closed down, or corporate information may be revealed. As a result, serious damage is rarely carried out. Cyber terrorists take it a step further by attacking critical infrastructure and services, causing widespread damage and shock.
Some of the infamous hacktivist campaigns:
In June 2020, In support of the major social and political movement Black Lives Matter, the Anonymous group coined, Anon released a video on Twitter specifically criticizing the Minneapolis Police Department. And as a result the Minneapolis Police Department website, its parent website, and the Buffalo, New York, government site disabled over the course of a weekend.
Hacktivists protesting the Iranian election – Hacktivists operating outside of Iran targeted the Iranian government and other state-sponsored websites in this DDoS attack. As a result, the Iranian government blocked access to various social networking sites in order to prevent netizens from reporting on the current state of affairs on the ground.
Russian hacktivists targeting Social Networks hosting Georgian blogger – by using DDoS attacks, to bring down social network services such as Facebook and Twitter. This was their retaliation campaign against a controversial Georgian blogger who had accounts on these networks.
Hacktivism has evolved over time into a powerful virtual weapon capable of causing massive disruptions in day-to-day operations. As a result, businesses and organizations must ensure that all IT systems, operating systems, applications, and websites are regularly updated. It also aids in the collection and analysis of anomalies in network activity to aid in the mitigation of threats.
In addition, to maintain a “human firewall,” implement appropriate technical controls and properly educate the staff. Looking ahead, hacktivism is far too unpredictable to be able to predict a potential attack with any degree of certainty—so it is best to remain vigilant against this era’s cyber vigilantes.
  Share This News with Your Friends on Social Network  
  Comment on this Story  
 
 
 
Early Times Android App
STOCK UPDATE
 
 
 
 
 
 
 
   
Home About Us Top Stories Local News National News Sports News Opinion Editorial ET Cetra Advertise with Us ET E-paper
 
 
J&K RELATED WEBSITES
J&K Govt. Official website
Jammu Kashmir Tourism
JKTDC
Mata Vaishnodevi Shrine Board
Shri Amarnath Ji Shrine Board
Shri Shiv Khori Shrine Board
UTILITY
Train Enquiry
IRCTC
Matavaishnodevi
BSNL
Jammu Kashmir Bank
State Bank of India
PUBLIC INTEREST
Passport Department
Income Tax Department
JK CAMPA
JK GAD
IT Education
Web Site Design Services
EDUCATION
Jammu University
Jammu University Results
JKBOSE
Kashmir University
IGNOU Jammu Center
SMVDU