x

Like our Facebook Page

   
Early Times Newspaper Jammu, Leading Newspaper Jammu
 
Breaking News :   Poverty and Unemployment: The Silent Crisis | 2025: The Turning Point in India’s Technological Self-Determination | Changing Times | Strengthen professional programmes to meet emerging academic, industry demands: LG Sinha | With 97% drop in cases, India to eradicate Malaria in short time: Amit Shah | 2 Kashmiri men detained in Bareilly | Rusted mortar shell defused near LoC | Cyber Police detain 2 | PM Modi says 2025 year of proud milestones for India | They want turmoil: Dr Farooq defends Ruhullah’s house arrest | Fake jobs, real fraud: CBK files chargesheet | Comprehensive New Year Security plan in place at Vaishno Devi Shrine for successful Yatra: IGP Jammu | Mehbooba Mufti, Ruhullah Mehdi among leaders under house arrest ahead of students' quota protest | Sodhi calls on LG Manoj Sinha; LG reiterates commitment to sports development in J&K | 2 day orientation programme on POCSO Act concludes at Jammu | SSP Reasi conducts security review meeting at Bhawan ahead of New Year | Javid Dar chairs Kissan Mela at Udhampur; seeks feedback on farmer's welfare schemes | Satish Sharma holds public outreach programme in Chowki Choura, reviews development, public services | Enforcement of NDPS Act by GRP Jammu 2024-2025 | Bovine smuggling bid foiled by police | CM Yogi govt's investment model emerges as Uttar Pradesh's defining identity | Mathura Vrindavan is ready to welcome sea of devotees this new year | MPL-3 concludes successfully; Star Viper Cricket Club emerges victorious | UP model gains national recognition; strong security and rule of law make state preferred investment destination: CM | Pal Peace Foundation organises langar | Kishtwar police organises powerlifting championship under civic action programme | BJP leader Pradeep Sharma explained the true meaning of 'Atmanirbhar Bharat' | Grand finale of Kids Teen Stars Jammu celebrates Young Talent | JKCCA, IAFA organize National Exhibition of Paintings at Amritsar | GGF honoured by White Knight Corps for Relief Support during Op Sindoor & Op Rahat | Pathania Champions Cow Protection, Livelihoods & Flood Rehabilitation | Sardar Beant Singh State University, Gurdaspur Observes Veer Bal Diwas | Police seize vehicle involved in illegal Khair wood smuggling | District Jammu Gymnastics Championship 2025-26 held | Kathua Admin Cup: GDC Kathua XI cruises to 6- wicket win over DIC XI | Shaheedi Committee Jandi organises 4th free medical camp at Hiranagar | Indian badminton in 2025: Sen, Satwik-Chirag deliver highs as youth offer hope in transition | IQAC GDC Bhaderwah organised two day international Conference | Taekwondo Association of District Srinagar to host 15th District Srinagar Taekwondo Championships | SMVDU Mechanical Engineering faculty secure research funding for addressing tribal energy needs, post-harvest agriculture losses in J&K | Yoga, wellness programs of Bharatiya Yog Sansthan receive SBI Support under CSR | BJP leaders attend 129th Episode of Mann Ki Baat at Channi Himmat | Photograph with Buddhist Stupas found in France Reveals Kashmir’s glorious past: PM Modi | Back Issues  
 
news details
Hacktivism – The ‘ism’ of Technocrats
5/20/2021 11:53:38 PM
Abhigya Mahajan

In a 1995 article about New Media artist Shu Lea Cheang’s film Fresh Kill, writer Jason Sack first coined the term hacktivism. The term, however, is often attributed to Cult of the Dead Cow member “Omega,” who used it in a 1996 e-mail to the group. Derived from combining the words ‘Hack’ and ‘Activism’, it is the act of hacking, or breaking into a computer system, for politically or socially motivated purposes. The definition of hacktivism is nebulous due to the variety of meanings of its root words, and there is significant disagreement over the types of activities and purposes it encompasses. The individual who performs an act of hacktivism is said to be a hacktivist. Hacktivists who participate in such actions (such as sabotaging an organization’s website or divulging information about an organization), aims to send a message and gain visibility for a cause they support.
Government agencies, multinational corporations, and any other entity perceived as ‘bad’ or ‘wrong’ by the hacktivist group or individual are common targets. Obtaining unauthorized access to any organization’s assets through such activities is, of course, a criminal act, regardless of the intent. Mainly, hacking is triggered by individuals or groups’ perception of what they consider to be “wrong” or “unfair”, so they are encouraged to do something about it. Motivations include revenge, political or social motives, ideology, protest, the desire to embarrass certain organizations or individuals in these organizations, or sometimes purely destructive behavior. In general, hacker groups aim to question, provoke and challenge governments, organizations, and companies that violate ethical standards.
There are many hacktivist groups around the world, all with the goal of disrupting or exposing the inner workings of government or private organizations in the name of transparency and the public good. The most well-known of these hacktivist groups is dubbed ‘Anonymous’. The ‘Anonymous’ hacktivist group, founded in 2008, rose to prominence after leaking a video involving Tom Cruise on YouTube, exposing the Church of Scientology organization. Following requests from Church of Scientology executives to remove the video, Anonymous continued with a Distributed Denial of Service attack that brought the Church’s website down. Since then, the group has continued their campaigns of nonviolent online protests with a steady stream of DDoS attacks, even targeting the terrorist group ISIS in their efforts to bring their version of justice to the rest of the world.
What is the difference between cyber terrorism and hacktivism?
The concept of cyber terrorism is surrounded by various ideas. Online directed action to protest a specific cause has been labeled cyber terrorism in some cases. Civil disobedience is evolving into Electronic Civil Disobedience (ECD) in order to practice sociopolitical resistance within digital networks. One point of contention is whether computer hacking for political activism should be classified as cyber terrorism. Because hacktivism and Internet vandalism do not directly threaten victims’ lives and livelihoods, they may be incorrectly labeled as cyber terrorism. Website defacement can be considered a form of digital vandalism, and it was originally done to boost the attacker’s ego. As a result, the impact of ‘Internet anarchy’ influences whether a digital attack can be classified as an act of cyber terrorism. Because cyber terrorism is frequently confused with hacktivism and ECD, it is important to consider the context of cyber terrorism. Hacktivists are politically motivated, and they target institutions that hold opposing political views to their own. They most commonly use a Dos attack to overload a server until it crashes. Cyber terrorists target systems in order to disrupt or destroy a specific nation’s, sector’s, or organization’s critical services and infrastructure. Hacktivists may hack to demonstrate their support for a specific cause or issue by interfering with services. Sites may be closed down, or corporate information may be revealed. As a result, serious damage is rarely carried out. Cyber terrorists take it a step further by attacking critical infrastructure and services, causing widespread damage and shock.
Some of the infamous hacktivist campaigns:
In June 2020, In support of the major social and political movement Black Lives Matter, the Anonymous group coined, Anon released a video on Twitter specifically criticizing the Minneapolis Police Department. And as a result the Minneapolis Police Department website, its parent website, and the Buffalo, New York, government site disabled over the course of a weekend.
Hacktivists protesting the Iranian election – Hacktivists operating outside of Iran targeted the Iranian government and other state-sponsored websites in this DDoS attack. As a result, the Iranian government blocked access to various social networking sites in order to prevent netizens from reporting on the current state of affairs on the ground.
Russian hacktivists targeting Social Networks hosting Georgian blogger – by using DDoS attacks, to bring down social network services such as Facebook and Twitter. This was their retaliation campaign against a controversial Georgian blogger who had accounts on these networks.
Hacktivism has evolved over time into a powerful virtual weapon capable of causing massive disruptions in day-to-day operations. As a result, businesses and organizations must ensure that all IT systems, operating systems, applications, and websites are regularly updated. It also aids in the collection and analysis of anomalies in network activity to aid in the mitigation of threats.
In addition, to maintain a “human firewall,” implement appropriate technical controls and properly educate the staff. Looking ahead, hacktivism is far too unpredictable to be able to predict a potential attack with any degree of certainty—so it is best to remain vigilant against this era’s cyber vigilantes.
  Share This News with Your Friends on Social Network  
  Comment on this Story  
 
 
 
Early Times Android App
STOCK UPDATE
 
 
 
 
 
 
 
   
Home About Us Top Stories Local News National News Sports News Opinion Editorial ET Cetra Advertise with Us ET E-paper
 
 
J&K RELATED WEBSITES
J&K Govt. Official website
Jammu Kashmir Tourism
JKTDC
Mata Vaishnodevi Shrine Board
Shri Amarnath Ji Shrine Board
Shri Shiv Khori Shrine Board
UTILITY
Train Enquiry
IRCTC
Matavaishnodevi
BSNL
Jammu Kashmir Bank
State Bank of India
PUBLIC INTEREST
Passport Department
Income Tax Department
JK CAMPA
JK GAD
IT Education
Web Site Design Services
EDUCATION
Jammu University
Jammu University Results
JKBOSE
Kashmir University
IGNOU Jammu Center
SMVDU