As discussed from the previous lecture, it is perhaps believable that the act of hacktivism has their very own peculiar motives and some are still remain unidentified of reasons. For instance, Julian Assange has live to his act of hacktivism where he aims to leak secret information to publish to the site called Wikileaks for the reason to attain the freedom of information, while Anonymous is a famously well-known group of hackers that hacks and publicly stunt the act of distributed denial-of-service (DDoS) outbreaks on corporate, religious and government websites where their motive were remain vague.
The revolution of hacking has become more intense and terrifying as technology has grow to become more advance where hackings job can dip through every little corner and crook to get to their entry of purpose. Initially, the phenomena of hacking has start off with simple cybercrime where Mitew (2014) stressed the examples like stealing identity of credit cards, passports, Trojans, exploits, rootkits, botnets, phishing kits and credentials. According to Mitew (2014), hacker ethos define themselves as the don’t damage computer system break in and they don’t change the information in those system that share information. Hacker that now act on cybercrime are no longer that humble anymore hence the immoral cybercrime has now grown to more inferior where cyberwar occurs.
Mitew (2014) define the cyberwar activities as a type surveillance, subversion, hacking, impersonation, hardware attacks and exploits to certain organization’s site. Cyberwar is a beyond intimidating where data and information can be sabotage or espionage through the hack of stealing. One of the best example of cyberwar is the Israeli Air Force bombs Syrian in the year of 2007 where Israel had compromised the Syrian air defense system and placed a logic bomb in the system that will bomb at a certain time and the exact time they would be attacking (Yarosh, 2011).
Now we see how the internet technologies have drive our human’s life activities where there is no need a physical war but through just a click of button cyberwar could happen anytime.
Mitew, T 2014, ‘Dark fiber: Hackers, botnets, cyber war’, lecturer slides, accessed on 18/10/2014, http://prezi.com/iiied2_aa8tc/digc202-dark-fiber-hackers-botnets-cyberwar/
Yarosh, S 2007, ‘Cyber War Examples’, University of Pennsylvania, accessed on 18/10/2014, https://sites.google.com/site/uscyberwar/cyber-war-example