Skip to main content icon/video/no-internet

Hacking and Hacktivism

Hacking is generally defined as the unauthorized use or entry into a computer or computer system. Hacktivism bridges computer-hacking techniques with political or social protest action. Such actions are sometimes referred to as electronic civil disobedience (ECD). In hacktivism, the hacker is not interested in personal gain but in the dissemination of a particular message. That message may be directed at a particular organization, such as the case in which an anti-fur activist hacked the Website of a furrier, or the Website itself may be inconsequential, serving only as a means of reaching viewers. There are many means by which hacktivism takes place. Common methods include Website defacement, e-mail bombs, and electronic sit-ins or denial-of-service attacks, but these techniques are not universally accepted as ethical within the hacker community.

A programmer scans code to determine the location of a system virus. Hackers and hacktivists enter into others' computer systems and perform Website defacement, send e-mail bombs, or cause denial-of-service attacks to demonstrate civil disobedience or to make a statement that information should be free and that authority should not be trusted.

None

Website Defacement

In Website defacement, the goal is to break into the system and upload a new version of the page that has been modified by the hackers. However, there is sometimes more to this effort than simply uploading a new web page. If the hackers gain complete access to the system (or “root”) they may be able to alter user identification codes and passwords such that the page cannot be taken down until the system administrators are able to break into their own system. This prolongs viewer exposure to the modified page. There are varying degrees of sophistication within the hacker community, and this is reflected in Website defacements. Many defacements are simple messages consisting of the hacker's name and a short note or perhaps a graphic. These are often mass defacements, done by simply scanning networks for servers with open ports or looking for unpatched systems. These hackers seem more interested in disseminating their message as widely as possible, with little consideration of the site itself. On the other hand, some defacements are clearly targeted to send a message to the owner of the Website.

Denial-of-Service Attacks and Electronic Sit-Ins

As the name implies, electronic sit-ins are similar to physical sit-ins: Both seek to deny access by occupying space. Rather than occupying space physically, as in a traditional sit-in, electronic sit-ins occupy space in the form of connections and bandwidth. Servers can handle only as many connections as bandwidth allows. When this connection limit is exceeded, others attempting to access material on that server will be denied access until those who are already connected are no longer accessing material. This is why these kinds of actions are called denial-of-service (DOS) or distributed-denial-of-service (DDOS) attacks. Such attacks are simple to implement and require little skill to enact; some groups, such as Electronic Disturbance Theater, have even automated the process. At its most basic level, a DOS attack can be enacted merely by going to a Web page and continually hitting the refresh button. Most servers can handle this kind of action, but if hundreds or thousands of computers do this, even powerful servers may be brought down.

...

  • Loading...
locked icon

Sign in to access this content

Get a 30 day FREE TRIAL

  • Watch videos from a variety of sources bringing classroom topics to life
  • Read modern, diverse business cases
  • Explore hundreds of books and reference titles

Sage Recommends

We found other relevant content for you on other Sage platforms.

Loading