Verified Document

Hacktivism One Expression Of The Research Paper

Wikileaks is probably the best know hactivist site to the general public because of the sheer volume of political information that it has made public and because of the unapologetic nature of the owner of the site. This is unfortunate in many ways because it has given individuals a false view of what hacktivism is because Julian Assange seems to have been motivated more often by pique than by genuine political concerns for making the world a better place. This is not, as one might guess, how the Wikileaks founder sees the nature of his mission.

Wikileaks, like Anonymous, is based on the idea that information -- all information -- should be available to everyone. This is a radical claim, and indeed resembles radical claims made by groups in the 1960s and 1970s, with the difference being that current radicals have the power to make good on their promises of crashing the system. Wikileaks has taken an extreme position in a world in which governments have often taken extreme positions to justify hiding information from their citizens in the name of national security.

Assange and Wikileaks do not take advantage of the essential advantages of the internet, treating it more like a mimeograph machine:

[T]he many-to-many and one-to-many characteristics of the Internet multiply manifold the access points for publicity and information in the political system. The global dimension of the Web facilitates transnational movements transcending the boundaries of the nationstate. The linkage capacity strengthens alliances and coalitions. Moreover…the values that pervade many transnational advocacy networks….seem highly conducive to the irreverent, egalitarian, and libertarian character of the cyber-culture.(Norris, 2001)

Wikileaks lacks the irreverent quality of most hacktivism, which includes, along with its usually serious intent, a sense of play.

While it is certainly true that governments often plead "national security" when they simply do not want to release information, it is also arguably true that some (even only a very small) amount of information should remain secret. There are, in fact, real issues of national security: Posting the nuclear launch codes seems a bad idea even to most people who argue for making the activities of governments and corporations as transparent as possible. This promotion of what is essentially old-fashioned anarchism (such as practiced by the Badder-Meinhoff gang) troubles many in the online world.

Wikileaks has made a practice of leaking information that even many advocates of libertarian concepts of free speech consider to be better kept secret. Moreover, and this may well be what has bothered other hactivists more, Wikileaks has released a large amount of personal,...

Other hacktivists have objected to this not on the grounds that personal information should stay private once it is put online but rather that it is petty and reduces hacktivism to simple hacking.
The website attacks launched by supporters of WikiLeaks show 21st-century cyber warfare evolving into a more amateur and anarchic affair than many predicted.

While most countries have plowed much more attention and resources into cyber security in recent years, most of the debate has focused on the threat from militant groups such as al Qaeda or mainstream state on state conflict.

But attempts to silence WikiLeaks after the leaking of some 250,000 classified State Department cables seem to have produced something rather different -- something of a popular rebellion amongst hundreds or thousands of tech-savvy activists. (Analysis Wikileaks, 2010).

Conclusion

Our world in the twenty-first century has grown increasingly unequal to the point that the distance between the haves and the have-nots seems impossible to bridge. The haves may view this as their due; the have-nots are much more likely to see this division of wealth as terrible and unbearable. People in industrialized countries fear that the generations that will come after them will see an increasingly limited and impoverished life.

Hacktivism allows some people powerful tools to attack those who have power in every other aspect of society. Even more satisfying, not just for hacktivists but for many members of the 99%, is that hacktivism uses the tools of the establishment itself to bring down the rich and the powerful. This desire to see the mighty humbled has always existed. It is only that the peasants have put down their rocks and picked up their iPads.

Works Cited

"Analysis: WikiLeaks -- a new face of cyber-war?" Reuters. http://www.reuters.com/article/2010/12/09/us-wikileaks-cyberwarfare-amateur-idUSTRE6B81K520101209. Retrieved 8 May 2012.

The Atlantic Wire. http://www.theatlanticwire.com/technology/2011/07/did-lulzsec-trick-police-arresting-wrong-guy/40522/. Retrieved 10 Mary 2012.

Castells, Manuel. The Internet galaxy: Reflections on the Internet, business, and society. Oxford: Oxford: Oxford UP, 2001.

Old-time hacktivists: Anonymous, you've crossed the line. CNET News March 30, 2012. Retrieved 10 May 2012.

Ruffin, Oxblood (3 June 2004). "Hacktivism, From Here to There." http://www.cultdeadcow.com/cDc_files/cDc-0384.php. Retrieved 9 may 2012.

Samuel, Alexandra. (2004). Hacktivism and the Future of Political Participation. http://www.alexandrasamuel.com/dissertation/pdfs/Samuel-Hacktivism-chapter1.pdf. Retrieved 9 May 2012.

Sources used in this document:
Works Cited

"Analysis: WikiLeaks -- a new face of cyber-war?" Reuters. http://www.reuters.com/article/2010/12/09/us-wikileaks-cyberwarfare-amateur-idUSTRE6B81K520101209. Retrieved 8 May 2012.

The Atlantic Wire. http://www.theatlanticwire.com/technology/2011/07/did-lulzsec-trick-police-arresting-wrong-guy/40522/. Retrieved 10 Mary 2012.

Castells, Manuel. The Internet galaxy: Reflections on the Internet, business, and society. Oxford: Oxford: Oxford UP, 2001.

Old-time hacktivists: Anonymous, you've crossed the line. CNET News March 30, 2012. Retrieved 10 May 2012.
Ruffin, Oxblood (3 June 2004). "Hacktivism, From Here to There." http://www.cultdeadcow.com/cDc_files/cDc-0384.php. Retrieved 9 may 2012.
Samuel, Alexandra. (2004). Hacktivism and the Future of Political Participation. http://www.alexandrasamuel.com/dissertation/pdfs/Samuel-Hacktivism-chapter1.pdf. Retrieved 9 May 2012.
Cite this Document:
Copy Bibliography Citation

Related Documents

Expression of Ideas and Information and Structuring
Words: 554 Length: 2 Document Type: Thesis

Expression of Ideas and Information and Structuring Written Communications Containing a Thesis and Argument The most important part of academic writing is to make sure that the audience understands what is being communicated and there are some solid ways of achieving this if certain steps are followed, including providing a thesis statement and using topic sentences. It is also vitally important for academic writers to encapsulate their main thesis and argument

Hacker/Hacker Techniques the Hackers in
Words: 3074 Length: 8 Document Type: Term Paper

Such people may not generally take shelter under the canopy of hackers but as a result of the more serious attributes of their motivation. (Hacker Motivation) Most of the people are anxious about the probability of being an objective for exploitation by a hacker. It is quite normal that if a computer has been installed for home use and only connected to the Internet for two hours once a

Computer Systems Are Used, One Has to
Words: 2506 Length: 8 Document Type: Article Critique

computer systems are used, one has to delve a bit deeper into how those issues occur and what they mean for the people who use computers. Addressed here will be a critique of two articles addressing DNS attacks and network intrusion detection, in order to determine the severity of the issues these attacks are causing and what can be done in order to lessen the risks and protect the

Hero in Popular Culture- One
Words: 2872 Length: 8 Document Type: Term Paper

Camera angles that focus on wretched faces, of young boys in red coated uniforms begging for mercy, and of the arrogance of the British officer corps, not just towards Americans, but towards their own enlisted men, are shown with filming skill. As might be expected for this type of film, John Williams' score was masterful and very much in line with the generation of epics from the 1950s and

Security Issues of Online Communities
Words: 15576 Length: 60 Document Type: Term Paper

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:

Schneck Medical Center: The Baldrige Award Schneck
Words: 3190 Length: 10 Document Type: Capstone Project

Schneck Medical Center: The Baldrige Award Schneck Medical Center: Overview The Schneck Medical Center according to the National Institute of Standards and Technology -- NIST (2011) "is a 93-bed nonprofit hospital providing primary and specialized services to the residents of Jackson County, Ind., and surrounding communities." The facility as NIST (2011) further points out, offers a variety of primary care services including but not limited to cancer care, noninvasive cardiac care, and

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now