Can anonymous be stopped

Assignment Help Basic Statistics
Reference no: EM131040147

Can Anonymous Be Stopped?

Anonymous, the elusive hacker movement, thinks of itself as a kind of self-appointed immune system for the Internet, striking back at anyone the group perceives as an enemy of freedom, online or offl ine. Anonymous fi rst gained widespread notoriety when it staged an attack against the Church of Scientology in 2008. In the ensuing years it has carried out hundreds of cyberstrikes. One particularly controversial attack was directed against the Vatican in August 2011. The campaign against the Vatican involved hundreds of people, some of whom possessed hacking skills and some who did not.

A core group of participants openly encouraged support for the attack using YouTube, Twitter, and Facebook. Other activists searched for vulnerabilities on the Vatican Web site. When those efforts failed, Anonymous enlisted amateur recruits to fl ood the site with traffi c, hoping to cause it to crash. The attack, even though it was unsuccessful, provides insight into the recruiting, reconnaissance, and warfare tactics that Anonymous employs. The Vatican attack was initially organized by hackers in South America and Mexico before it spread to other countries. It was timed to coincide with Pope Benedict XVI's visit to Madrid in August 2011 for World Youth Day. Hackers fi rst tried to take down a Web site that the Catholic Church had set up to promote the pope's visit, handle registrations, and sell merchandise. Anonymous's goal- according to YouTube messages delivered by an Anonymous spokesperson-was to disrupt the event. The YouTube videos that were posted included a verbal attack on the pope.

One video even called on volunteers to "prepare your weapons, my dear brothers for this August 17th to Sunday August 21st, we will drop anger over the Vatican." The hackers spent weeks spreading their message via their own Web site as well as social media sites such as Twitter and Flickr. Their Facebook page called on volunteers to download free attack software while imploring them to "stop child abuse" by joining the cause. This message featured split-screen images of the pope seated on a gilded throne on one side and starving African children on the other. It also linked to articles about abuse cases and blog posts itemizing the church's assets. It took 18 days for the hackers to recruit enough people to launch their attack. Then, the reconnaissance phase of the mission began. A core group of approximately 12 skilled hackers spent three days poking around the church's World Youth Day Web site, looking for common security holes that could let them inside. Probing for such loopholes used to be tedious and slow, but the emergence of automated scanning software to locate security weaknesses has made the process much simpler and quicker. In this case, the scanning software failed to turn up any vulnerabilities. So, the hackers turned to a distributed denial-of-service (DDoS) attack that clogs a Web site with data requests until it crashes. Even unskilled supporters could take part in this attack from their computers or smartphonesOver the course of the campaign's final two days, Anonymous enlisted as many as a thousand people. In some cases it encouraged them to download attack software. In other instances it directed them to custom-built Web sites that allowed them to participate in the campaign using their smartphones. Visiting a particular Web address caused the phones to instantly start flooding the target Web site with hundreds of data requests each second, without requiring any special software.

On the first day of the DDoS, the Church site experienced 28 times its normal amount of traffic, increasing to 34 times on the following day. Hackers involved in the attack, who did not identify themselves, stated via Twitter that the two-day effort succeeded in slowing down the Web site's performance and making the page unavailable in several countries. Imperva (www.imperva.com), the firm hired by the Vatican to counter the attack, denied that the site's performance was affected. Imperva asserted that the company's technologies had successfully defended the site against the attack and that the Vatican's defenses held strong because it had invested in the infrastructure needed to repel cyber attacks. Following this unsuccessful attack, Anonymous moved on to other targets, including an unofficial site about the pope, which the hackers were briefly able to deface. Hacker movements such as Anonymous are now able to attract widespread membership through the Internet. They represent a serious threat to Web sites and organizations. Unknown to the members of Anonymous, the FBI had arrested one of the group's leaders in 2011. He had continued his hacking activities while being monitored by the agency, which had been gathering information needed to identify members of Anonymous. In a series of arrests in the summer of 2012, authorities around the world arrested more than100 alleged group members. It is impossible to say if the arrests will shut down, or even seriously inconvenience, Anonymous. The group claims is that it is not organized and it has no leaders. The possibility that Anonymous cannot be shut down by arresting key participants concerns powerful institutions worldwide. Meanwhile, Anonymous is continuing its activities. In February 2013, the group posted the phone numbers, computer login information, and other personal information of more than 4,000 bank executives on a government Web site. In that same month it threatened a massive WikiLeaks-style exposure of U. S. government secrets. The group announced details of their plan on a hacked government Web site, the U.S. Sentencing Commission (www .ussc.gov).

Questions

1. Describe the various components of Anonymous's attack on the Vatican. Which aspects of the attack are of most concern to security companies?

2. Will the arrest of key members of Anonymous shut down the group? Decrease the effectiveness of the group? Why or why not? Support your answer.

3. Debate the following statement: Anonymous provides necessary oversight of harmful activities by organizations and government agencies.

Reference no: EM131040147

Questions Cloud

Marginal cost equals average cost : If the monopolist maximizes profits when marginal revenue equals marginal cost equals average cost, economic profits must be
Formulate and solve an integer programming model : The Skimmer Boat Company manufactures three kinds of molded fiberglass recreational boats—a bass fishing boat, a ski boat, and a speedboat. The profit for a bass boat is $20,500, the profit for a ski boat is $12,000, and the profit for a speedboat is..
Problem regarding the deadweight loss : Suppose the demand for a product is given by P=30 - 2Q. Also, the supply is given by P= 5+3Q. If a $5 per unit excise tax is levied on the buyers of a good, the deadweight loss created by the tax will be:
Price and output under monopoly : If the product demand curve and the industry's cost curves were the same whether the industry operated under conditions of perfect competition or monopoly, what could be said about the price and output under monopoly vis-a-vis the competitive pric..
Can anonymous be stopped : Anonymous, the elusive hacker movement, thinks of itself as a kind of self-appointed immune system for the Internet, striking back at anyone the group perceives as an enemy of freedom, online or offl ine. Anonymous fi rst gained widespread notorie..
After the tax the buyers will pay : Suppose the demand for a product is given by P=100-2Q. Also, the supply is given by P=20+6Q. If an 8 per unit excise tax is levied on the buyers of a good, then after the tax the buyers will pay:
What is the sign of the acceleration : What is the sign of the velocity? What is the sign of the acceleration? On that interval is the speed increasing or decreasing?
Simulate organizing and hosting a community event : Action Items In this assignment, you will compose an essay of 300–500 words that describes a simulated community event. Compose your essay in a Word document and format it according to APA style. Use the items below to simulate organizing and hosting..
Profit-maximizing monopoly : In the long run, a profit-maximizing monopoly produces an output volume that

Reviews

Write a Review

Basic Statistics Questions & Answers

  Point estimate and interval estimate for population

Differentiate between a point estimate and an interval estimate for a population parameter. What is necessary for an interval estimate to be a confidence interval?

  A and b flip coins a starts and continues flipping until a

a and b flip coins. a starts and continues flipping until a tail occurs at which point b starts flipping and continues

  You conducted a t-test you found a statistically

question 1 you wish to conduct an anova one wayomnibus. in order to insure you have enough power to detect differences

  Case study-uwec undergraduates

The Focus sample contains information on the undergraduate students at the University of Wisconsin - Eau Claire (UWEC).  Open the Focus sample worksheet (Focus Sample) and do the following.

  Find what score set as lowest passing grade

She wants to choose the passing grade such that the probability of passing a student who guesses on every question is less than 1/10. What score should she set as the lowest passing grade?

  Describe the claim-experiment and test statistic

Describe the claim, the experiment, the test statistic, and clearly state the null and alternative hypotheses. In fact, the outline of a good response looks like this?

  Calculate the expected value-variance and standard deviation

The table below shows the probability distribution of the annual sales (in Millions) of a small rm. Calculate the Expected value, Variance, and Standard deviation of the annual sales?

  Explain is there enough evidence to reject the claim

Is there enough evidence to reject the claim that the average cost of a home in both locations is the same? Use α = 0.01. Clearly mark each of the five steps in hypothesis testing.

  A clinical trial is planned to compare an experimental

a clinical trial is planned to compare an experimental medication designed to lower blood pressure to a placebo. before

  Are sex and party affiliation related report the appropriate

Are sex and party affiliation related? Report the appropriate null and research hypotheses and the critical value (alpha = 0.05). In addition, provide your statistical conclusion, including calculation of test statistic and what the data suggests in ..

  Determining mean amount spent on insurance

Assume then money spent is uniformly distributed between these amounts. Determine the mean amount spent on insurance?

  Research process and modern business world

Albert Einstein stated, "The formulation of a problem is far more often essential than its solution, which may be merely a matter of mathematical or experimental skill.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd