{"id":5,"date":"2012-11-29T07:52:59","date_gmt":"2012-11-29T07:52:59","guid":{"rendered":"http:\/\/blogs.scu.edu\/analyticalhypertext\/?page_id=5"},"modified":"2012-12-05T23:04:34","modified_gmt":"2012-12-05T23:04:34","slug":"definition-hacktivism","status":"publish","type":"page","link":"https:\/\/blogs.scu.edu\/analyticalhypertext\/definition-hacktivism\/","title":{"rendered":"What is Hacktivism?"},"content":{"rendered":"<p style=\"text-align: left\"><a href=\"http:\/\/www.thehacktivist.com\/whatishacktivism.pdf\">Hacktivism<\/a> is the act of hacking, or breaking into an unauthorized access to a computer system, and carrying out various disruptive actions as a mean of achieving\u00a0\u00a0 politically or social motivated goals. Hacktivism is superior to the state level, and has become a continued engagement between parties connected to ongoing conformist conflict, whose goal is power of the adversary.<\/p>\n<div id=\"attachment_31\" style=\"width: 245px\" class=\"wp-caption alignleft\"><a href=\"http:\/\/blogs.scu.edu\/analyticalhypertext\/files\/2012\/11\/hacktivism3.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-31\" class=\"size-full wp-image-31 \" src=\"http:\/\/blogs.scu.edu\/analyticalhypertext\/files\/2012\/11\/hacktivism3.jpg\" alt=\"\" width=\"235\" height=\"135\" \/><\/a><p id=\"caption-attachment-31\" class=\"wp-caption-text\">Havtivism, Source: <a href=\"http:\/\/securityaffairs.co\/wordpress\/3524\/cyber-crime\/verizon-report-the-wind-of-hacktivism-pushes-cybercrime.html\">Security Affai<\/a><a href=\"http:\/\/www.thehacktivist.com\/whatishacktivism.pdf\">Hacktivism<\/a> is the act of hacking, or breaking into an unauthorized access to a computer system, and carrying out various disruptive actions as a mean of achieving\u00a0\u00a0 politically or social motivated goals. Hacktivism is superior to the state level, and has become a continued engagement between parties connected to ongoing conformist conflict, whose goal is power of the adversary.<\/p><\/div>\n<p style=\"text-align: left\">Hacktivism has become a controversial term, being that it has a variety of ranges from passive to active and non-violent to violent activities, it can often be formed as cyber terrorism. Hacktivism is often understood as the writing of code to endorse political thought and promote expressive politics, free speech, human rights, or information ethics. Acts of hacktivism are carried out in the belief that appropriate use of code will be able to produce similar results to those produced by regular activism or civil disobedience.<\/p>\n<p style=\"text-align: left\">Individuals who perform this action are called hacktivist. A hacktivist uses the sametechniques and tools as a hacker, but does so in order to disturb services and bring attention to a political or social cause. Hacktivist have a goal to ensure free access to information, to get around the hurdles and securities of censorship and to prevent monopoly control of technology.<\/p>\n<p style=\"text-align: left\">Two of the main attitudes about hacktivist as described in the book <a href=\"http:\/\/www.amazon.com\/Hackers-Heroes-Computer-Revolution-Anniversary\/dp\/1449388396\"><em>Hackers<\/em><\/a> by Steven Levy are that all information should be free and to mistrust authority and promote decentralization. As far as putting hacktivism\u00a0on a political spectrum, it cannot be put on the left or right, as the main objective is just to free information to the public, regardless of who is holding the information.<\/p>\n<p style=\"text-align: left\">In the novel <em><a href=\"http:\/\/craphound.com\/littlebrother\/Cory_Doctorow_-_Little_Brother.pdf\">Little Brother<\/a><\/em>, by Cory Doctorow two types of hacktivism occurred throughout the story which were Cyberattack \u00a0and Cyberwar.<\/p>\n<p style=\"text-align: left\"><a href=\"http:\/\/www.techopedia.com\/definition\/24748\/cyberattack\">Cyberattack<\/a>\u00a0is the attempt to disrupt, damage, or gain unauthorized access to a computer system, or electronic communication network. Cyberattacks use spiteful codes to modify computer codes, data or logic, resulting in disruptive results that can compromise data and lead to cybercrimes, such as identity and information theft.<\/p>\n<p style=\"text-align: left\"><a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/cyberwarfare\">Cyberwar<\/a>\u00a0is Internet-based war involving politically motivated attacks on information systems. Cyberwar outbreaks can immobilize official websites and networks. It can disrupt or incapacitate crucial services, steal or alter confidential data and cripple financial systems.<\/p>\n<p style=\"text-align: left\">Relating back to the novel <em>Little Brother<\/em>, Marcus and his friends ditch school to take part in\u00a0<a href=\"http:\/\/webpages.scu.edu\/ftp\/blawler\/lbhfm.html\">Harajuku Fun Madness (ARG)<\/a>, and found themselves caught in the wrong place at the wrong time, and trapped in a huge aftermath of a major terrorist attacks on San Francisco. Confused and shocked Darryl is stabbed and Marcus and his friends, become suddenly detained by the Department of Homeland Security, and are taken away to an underground imprisonment where they are harshly cross-examined for days. After the 3 days of cross-examination, they are released, and forced to sign documents saying that they are freely held and questioned. By this time, Darryl is still missing, and Marcus is still confused, irritated, but motivated to fight back against the DHS. He then begins a cyberattack and cyberwar using encoded Wi-Fi connections through his X-BOX, and creates an underground network with his friends to fight against the DHS.<\/p>\n<div id=\"attachment_33\" style=\"width: 280px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/blogs.scu.edu\/analyticalhypertext\/files\/2012\/11\/sidebox1.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-33\" class=\" wp-image-33  \" src=\"http:\/\/blogs.scu.edu\/analyticalhypertext\/files\/2012\/11\/sidebox1-300x223.jpg\" alt=\"\" width=\"270\" height=\"201\" srcset=\"https:\/\/blogs.scu.edu\/analyticalhypertext\/files\/2012\/11\/sidebox1-300x223.jpg 300w, https:\/\/blogs.scu.edu\/analyticalhypertext\/files\/2012\/11\/sidebox1-403x300.jpg 403w, https:\/\/blogs.scu.edu\/analyticalhypertext\/files\/2012\/11\/sidebox1.jpg 734w\" sizes=\"auto, (max-width: 270px) 100vw, 270px\" \/><\/a><p id=\"caption-attachment-33\" class=\"wp-caption-text\">Hacktivist, Source: Security Affairs<\/p><\/div>\n<p style=\"text-align: left\">Whether hacktivism is a crime is a debatable subject. Antagonists argue that hacktivism causes damage in a medium where there is already a sufficient opportunity for no disruptive free speech. Others claim that such an act is equal or equivalent to protest and therefore falls within the realm of the First Amendment.<\/p>\n<p style=\"text-align: center\"><strong><br \/>\n<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hacktivism is the act of hacking, or breaking into an unauthorized access to a computer system, and carrying out various disruptive actions as a mean of achieving\u00a0\u00a0 politically or social motivated goals. Hacktivism is superior to the state level, and &hellip; <a href=\"https:\/\/blogs.scu.edu\/analyticalhypertext\/definition-hacktivism\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":299,"featured_media":0,"parent":0,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"qubely_global_settings":"","qubely_interactions":"","kk_blocks_editor_width":"","_kiokenblocks_attr":"","_kiokenblocks_dimensions":"","footnotes":""},"class_list":["post-5","page","type-page","status-publish","hentry"],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/blogs.scu.edu\/analyticalhypertext\/wp-json\/wp\/v2\/pages\/5","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.scu.edu\/analyticalhypertext\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.scu.edu\/analyticalhypertext\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.scu.edu\/analyticalhypertext\/wp-json\/wp\/v2\/users\/299"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.scu.edu\/analyticalhypertext\/wp-json\/wp\/v2\/comments?post=5"}],"version-history":[{"count":31,"href":"https:\/\/blogs.scu.edu\/analyticalhypertext\/wp-json\/wp\/v2\/pages\/5\/revisions"}],"predecessor-version":[{"id":30,"href":"https:\/\/blogs.scu.edu\/analyticalhypertext\/wp-json\/wp\/v2\/pages\/5\/revisions\/30"}],"wp:attachment":[{"href":"https:\/\/blogs.scu.edu\/analyticalhypertext\/wp-json\/wp\/v2\/media?parent=5"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}