Archive for the ‘hacktivist’ Category
Jake “Topiary” Davis 18 year old.
For the Internet collective known as Anonymous, the lulz are bittersweet this week with the arrest of the hacktivist extraordinaire known as Topiary.
“Topiary” is the online alias of 18-year-old Jake Davis. Authorities claim Davis is a key player in the Anonymous collective. Davis is also accused of association with Lulz Security (LulzSec) – the short lived but stunningly successful offshoot of Anonymous.
An analysis of China’s domestic political situation shows how, increasingly, moderates want to take part in the decision-making process. However, they face the all-out opposition of the party, which fears losing its leadership role. Social unrest is just around the corner.
Boston: The computer hacking community is gearing up for its own version of the annual Oscars, with two notorious “hacktivist” groups and industry heavyweight WikiLeaks among those vying for the top award.
Sony Corp and EMC Corp’s RSA Security division will also be recognised at next week’s award ceremony, for the dubious distinction of having fallen victim to hackers.
Hacker group Anonymous has struck PayPal again, this time by urging its followers to empty their accounts and stop using the payments provider’s services following news that U.S. prosecutors are looking to imprison a university student involved in the denial-of-service attacks on the company’s blog last year.
Anonymous, together with LulzSec, issued a press release Wednesday urging PayPal users to close their accounts immediately and consider an alternative. They pointed to PayPal’s willingness to “fold to legislation” as proof that it doesn’t deserve its customers and the business they give to the payments providers.
BOSTON (Reuters) – The computer hacking community is gearing up for its own version of the annual Oscars, with two notorious “hacktivist” groups and industry heavyweight WikiLeaks among those vying for the top award.
Sony Corp and EMC Corp’s RSA Security division will also be recognized at next week’s award ceremony, for the dubious distinction of having fallen victim to hackers.
Legal authorities agree there are gray areas and a fine line between activism on the one hand, and terrorism and hostile action against a government on the other. When you in- clude the use of cyber attacks in the equation, the line quickly expands to an area of gray. The legal framework for analyzing the use of cyber arms has been called a blur and be- comes even more out of focus when you add the complexities and irregularities sur- rounding the use of cyber weaponry to launch attacks in pursuit of the ideologies of these groups. Many activists, extremists and terrorist groups have taken to using cyber arms or cyber weapons against their targets. Perhaps the most intriguing question that surrounds acts of cyber aggression (cyber attacks) is – are they protests, criminal acts, terrorist at- tacks or acts of war? In the last several years, there has been a debate as to whether cy- ber weapons should be included in the definition of weapons of mass destruction (WMD).
Unlike WMDs, cyber weapons require no restricted or hard to acquire mate- rials – only a computer and network connection. In addition, unlike WMD, the knowl- edge to create a cyber weapon is much more widely available. In fact, you don’t have to develop cyber weapons; you can buy or rent them.
Working Definition of Cyber Arms
The first step in effectively analyzing and establishing a legal framework for cyber at- tacks is to develop a definition of “cyber arms”. For purposes of this article, cyber arms (aka cyber weapons) are defined as any computer or microprocessor controlled piece of hardware, software or code that is used as an instrument or instrumentality of attack or defense against an adversary. A cyber weapon is a tool used to apply force for the pur- pose of combat or protest. A cyber weapon uses digital communications or the execution of malicious software or code to harm or incapacitate a target. It also includes any digital asset that is used to outwit or get the better of an opponent.
The Hacktivist are coming run for your life. These hackers are going to turn off the power grid and throw us into chaos. Are you scared the evil hackers are going to shut off Facebook and how can you live without Facebook, I gota Tweet that now- wait a sec.
via US Cyber Labs – Blog.