Sunday, April 15, 2012

Chapter 5: Hactivism

Name Chris Wyant
Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 5-5.2

1. (Knowledge)Tell three interesting elements of this chapter:
a. The F.B.I. arrested 14 people linked to this “Anonymous” group, the Britian’s Scotland Yard arrested one, and the Dutch police arrested four.
b. There are tools and software as well as tips on the internet for help with hacking
websites and other computers.
c. The Zetas (a powerful Mexican drug cartel) supposedly kidnapped but then released a member of “Anonymous”.

2. (Comprehension) Summarize what is being discussed within this chapter?
An internet group known as “Anonymous” has created a big ruckus online with police as well as other online companies and the Mexican drug cartel known as the “Zetas”. 14 people in the U.S. were arrested in response to a cyber-attack on PayPal in 2010. They have also attacked other credit card companies such as MasterCard and Visa. Barrett Lyon states the biggest issue is that it is too easy for people to download programs and software used for hacking. It’s nearly impossible to arrest everyone who hacks. A man named Barrett Brown has been seen as the face of “Anonymous” and has been seeking public attention. He also published a book about the group “Anonymous”.

3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
A solution that could help with these issues is banning the public viewing of information on hacking. Posting hacking tools and software on the internet should be banned. Relating this to a problem I experienced would be having my email account. I had my email account hacked before and a mass email was sent out to my contact list attaching a virus. In this situation I had to delete my email account and create a new one.

4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
If I was to relate hacking to something that did not relate to technology I would compare it to cracking combinations safes. This is also a threat to security and safety. In high school kids crack these locks in order to steal things out of the lockers of others. My solution to help with the hacking issue would be the same as for cracking combination safes. There should not be information online with tips and techniques to make it easier for anyone to do it. This is an online
video I found in under a minute to learn how to crack a combination lock.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I do agree that hacking is becoming a major issue. The biggest concern is that almost everyone everywhere can easily learn how to hack. If it is true that someone from the “Anonymous” group was kidnapped then it shows how real the threat of public safety is for those who hack. I think that this group may be mostly looking for attention but are capable of at least causing an inconvenience shown by their attacks on PayPal and other companies. After reading this I realized the magnitude that the hacking issue is. I did not realize it was so an issue on such a high level.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
I do think that this is a serious topic in today’s society because technology plays such a major role in our lives. Technology is everywhere and we as a society put so much faith and trust into society. After reading these articles I will begin to pay more attention to how much personal information and trust I put into technology. It is clear that hacking is a big issue and now I know how easy it is for anyone to hack.


References

Baase, Sara. A Gift Of Fire, Social, Legal, And Ethical Issues For Computing And The Internet. 3rd. Upper Saddle River NJ: Prentice Hall, 2008.

Chen, Adrian. "It Pays to Be the Face of
Anonymous." Gawker. Hackers, 04 11 2011. Web. 15 Apr 2012. .

Neuman, Scott. "Hacking Made Easier, Thanks to
User-Friendly Tools." NPR Online. N.p., 2011. Web. 15 Apr 2012.


Smith, Catharine. "Anonymous, LulzSec Respond To FBI
Arrests Of Suspected Hackers ." Huff Post Tech. The Huffington
Post, 21 7 2011. Web. 15 Apr 2012.
.

No comments:

Post a Comment