Hacktivate Content

[MAIN PAGE]

Hacktivate provides an online space where hacktivists around the world can access useful information, establish connections and form communities.

In order to become involved in activities centred on hacktivism it is essential to gain an understanding of what is required to become an effective hacktivist. Here we have provided information that will give you some background knowledge about hacktivism and how to get started using the Internet for direct electronic action.

[WHAT IS HACKTIVISM?]

What is hacktivism?

Hacktivism is a term used to describe individuals who use their computer and Internet skills to achieve social and political goals. It can be understood as the writing of code to promote a particular political ideology. Acts of hacktivism can produce similar results to regular activism depending on the effectiveness of the message aimed to evoke change.

A history of hacktivism [INFOGRAHPIC]

http://mashable.com/2012/03/28/history-of-hacktivism/

The Evolution of Anonymous

http://mashable.com/2012/03/26/evolution-of-anonymous/

 

What is a hacktivist?

A hacktivist is someone who engages in hacktivism. Hacktivists most likely would not consider themselves criminals despite the fact that what they are doing is illegal. This is because hacking is used in such a way as to emphasize the significance of particular issues and bring these to people’s attention in an attempt to promote change.

[FORMS OF HACKTIVISM

Forms of hacktivism

  1. Defacing web pages

This typically involves a hacktivist making significant alterations to a company’s or governmental agency’s website. This is not a widely accepted method because the motivation behind the message can be difficult to discern.

2. Web Sit-ins

Hacktivists attempt to send a large amount of traffic to a particular website so that it will become overwhelmed, subsequently making the site inaccessible or temporarily unavailable. This is also commonly referred to as a denial-of-service attack.

3. Email bombing

An email bomb is a form of hactivisim that consists of sending masses of emails containing large file attachments to their specified targets in an attempt to overwhelm the server. The two key methods in carrying out email bombs are:

4.

I.     Mass Mailing

This method consists of sending a multitude of duplicate emails to the same address. Mass mailing is also commonly performed as a DDoS attack involving the use of ‘zombie’ botnets. Essentially hierarchical networks of computers that use malware, (short for malicious software) which are under the attacker’s control, designed to either disrupt computer operation or gather sensitive information.

II.     List Linking

This method of email bombing involves signing a target’s email address up to numerous email list subscriptions. Hacktivists are reluctant to use this method because most email subscription services send a confirmation email to the target’s address before they are registered for a subscription.

5. Website mirroring

This technique commonly involves bypassing censorship blocks on websites in order to access the censored content on the site and post it on other domains and sub-domains, which are unrestricted.

  1. Geo-bombing

Hactivists can enable a more effective dissemination of YouTube videos that campaign for social and political change through the use of Google’s mapping applications such as Google Maps and Google Earth.

How to Geo-tag your video:

http://advocacy.globalvoicesonline.org/projects/advocacy-20-guide-tools-for-digital-advocacy/geo-bombing-youtube-google-earth/

6. Anonymous blogging

Blogging is a popular method used by hacktivists because it allows them to communicate to a global audience about human rights issues as well as government oppression and other societal concerns.

7. Doxing

As a form of hacktivism, doxing is a method that has been pioneered by the organisation WikiLeaks. This method involves disseminating private information about individuals and more broadly exposing embarrassing information about organisations.

8. Swatting

This typically involves instigating a police raid on a target for retaliation or harassment by providing false information to law enforcement.

[HACKER ETHICS

Hacker Ethics

 

The definition of the term hacker has changed radically during the 21st Century. It is now no longer used exclusively to refer to those who engage in illegal activity but also includes those who use their hacking skills as a form of activism.

Is hacking an ethical practice?

Ethical hacking refers to those individuals with exceptional skills who use their knowledge and expertise to test the strength of security systems. This type of hacking is legal in nature and is not attempting to cause any type of damage.

Other forms of hacking usually involve illegal activity and do cause damage. But is it possible to use hacking skills to the benefit of society? We say yes!

What is ‘hacker ethic’?

Hacker ethic is the generic phrase used to refer to the moral standards and philosophy of those engaged in the hacker community.

The term is attributed to journalist Steven Levy, who first described it in is 1984 book, titled Hackers: Heroes of the Computer Revolution. Levy summarized what he considered to be the six tenets of hacker ethic:

  • Sharing
  • Openness
  • Decentralization
  • Free Access to computers
  • World improvement

 

Jenny Brockie speaks directly with hackers and hacktivists – some of them wearing masks, disguises and using voice distortion devices – to ask them how they choose their targets, and where they draw the line.

 

[GETTING STARTED]

Getting started!

The key reason for the impact of hacktivists is the ease with which they can share their voice. Whether through social networking sites or action emails to friends, everyone can make a difference using the Internet. This is all that it takes to influence the drive for change to an issue you care about. Greenpeace’s article on their use of cyber-activism states that passion, more than anything, is neccessary to be successful in changing people’s minds: “Aim to generate passion, inspire action, evoke emotions, and empower people to join the movement”.

Through social media Facebook groups can be used to garner attention. If justified, people may be inspired to help spread the cause, or donate. These pages are providing information to users, and if it is credible, well explained and authentic, you will at the bare minimum raise awareness for the cause; hopefully leading towards material contributions such as support for the page or even donations. This may simply be through ‘sharing’ or ‘liking’ the page, or more direct involvement; all of these outlets of support have value

The process of publicizing your page should transcend simply educating and persuading friends. You may want to include an e-petition either from the start or as your cause gains popularity. Holise Cleveland recommends engaging in conversation and posting information on other popular pages, preferably those relevant to your cause: “Engage in conversation with others on various pages in hopes that they will eventually come to your page and sign your petition.” Through Twitter, you can attempt to get big name Twitter accounts to retweet a link to your cause (whether its on facebook, twitter, a blog or website). One of these outlets should be the centre of your campaign and they should all be interconnected. If you make an important update on your website, it should be announced to followers on facebook and twitter. Similarly, there should be twitter and facebook feeds somewhere on your website.

HackBloc.org | Exploit Code Not People

http://hackbloc.org/

This entry was posted in Uncategorized. Bookmark the permalink.

Leave a comment