Documenting The Birth of Hacktivist


Archive for the ‘Cyber Arms’ Category

Hacktivist Group Anonymous Releases Tool To Hijack Twitter Trending Topics

leave a comment »

Anonymous has released a tool that aims to help others hijack trending topics on Twitter and tweet perhaps unrelated messages using them. The Twitter version of the U.R.G.E. tool (which stands for Universal Rapid Gamma Emitter) was launched to make it easier for anyone to hijack trending topics faster without having to copy and paste the trending topic manually into tweets.

Members of the group say that they are tired of constantly seeing trending topics that are redundant or related to pop culture and created this tool to help create more attention for topics that may have a wider meaning or different kind of impact on other Twitter users. In a statement, members say that, “This is not a hacking tool nor is it an exploit tool.”

via Hacktivist Group Anonymous Releases Tool To Hijack Twitter Trending Topics.


Written by gatoMalo

September 10, 2011 at 2:18 pm

The Right to Bear Cyber Arms

leave a comment »

Legal authorities agree there are gray areas and a fine line between activism on the one hand, and terrorism and hostile action against a government on the other. When you in- clude the use of cyber attacks in the equation, the line quickly expands to an area of gray. The legal framework for analyzing the use of cyber arms has been called a blur and be- comes even more out of focus when you add the complexities and irregularities sur- rounding the use of cyber weaponry to launch attacks in pursuit of the ideologies of these groups. Many activists, extremists and terrorist groups have taken to using cyber arms or cyber weapons against their targets. Perhaps the most intriguing question that surrounds acts of cyber aggression (cyber attacks) is – are they protests, criminal acts, terrorist at- tacks or acts of war? In the last several years, there has been a debate as to whether cy- ber weapons should be included in the definition of weapons of mass destruction (WMD).

Unlike WMDs, cyber weapons require no restricted or hard to acquire mate- rials – only a computer and network connection. In addition, unlike WMD, the knowl- edge to create a cyber weapon is much more widely available. In fact, you don’t have to develop cyber weapons; you can buy or rent them.

Working Definition of Cyber Arms

The first step in effectively analyzing and establishing a legal framework for cyber at- tacks is to develop a definition of “cyber arms”. For purposes of this article, cyber arms (aka cyber weapons) are defined as any computer or microprocessor controlled piece of hardware, software or code that is used as an instrument or instrumentality of attack or defense against an adversary. A cyber weapon is a tool used to apply force for the pur- pose of combat or protest. A cyber weapon uses digital communications or the execution of malicious software or code to harm or incapacitate a target. It also includes any digital asset that is used to outwit or get the better of an opponent.

Read More >

Written by gatoMalo

July 24, 2011 at 5:25 pm

Posted in Cyber Arms, hacktivist