The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | May 2017 |
| Last Sign in: | 283 Weeks Ago |
| Questions Answered: | 27237 |
| Tutorials Posted: | 27372 |
MCS,MBA(IT), Pursuing PHD
Devry University
Sep-2004 - Aug-2010
Assistant Financial Analyst
NatSteel Holdings Pte Ltd
Aug-2007 - Jul-2017
i have a 7 pages first draft Argumentative Synthesis paper and i want a writer to edit it and make changes and paraphrase it to make it a final draft. if you are using a translator to do all of your work or you can't even structure a good English sentence,please do not reply because i will not accept it.
so as i said i have a first draft Argumentative Synthesis and i need to make a lot of changes on it especially the first 3 pages. in another words i want a new paper.
i attached the article for you to look at it.
Khalid Fallatah, 2635201
Dr. Patrick Mannix
Eng 102
4/20//2015
Hacktivist: are they Criminals?
Ronald Diebert and Rafael Rohozinsk define hackers as “individuals, working alone or collectively through networks, who create software, tools, or forms of mobilization that have system wide implications –not all of them necessarily benign.” (63). They see hackers in a negative way, when they say “not all of them necessarily benign” which means that the most of the hackers do not have a good cause. On the other, hand Peter Ludlow states “A hackactivist is someone who uses technology hacking to effect the social change” (98). Ludlow defines a hacktivist in a more positive way. Hacking is to access other people’s personal information like their photos or E-mails or any important files they have on their phones or computers to use it against them or just to publish it to the rest of the world. But hacktivism should not be seen in the same way. Hacktivist are not, criminals because they promote freedom of speech, expose corruption in the social government and organizations, and promotes American values.
Hacking is not just done on people; even government websites and commercial websites get hacked for different purposes such as terrorism or for religious purpose or simply for money. Sometimes hacking is good if it is for a good cause For example, A government hacking citizen’s phones to assure the safety of the citizens in America. Hacktivisits could be considered activists because the definition of activistsis “Activistsare people who seek to create positive change. Moreover, a person who speaks out at their workplace about unsafe practices, or somebody who refuses to buy a tram ticket as a personal protest against privatization, may not see themselves as activists, yet these actions could be seen as political 'activism'”( activist rights).from this definition we can say hacktivists are real activists because hacktivist get involved with many social and political cause.
Criminal hacking also termed as cracking is a technique through which computer systems and networks can be broken into. Hacking is actually an encoding through which an existing system can be hacked. The motive behind breaking into computer soft wares and networks are accessing to confidential information, corrupting files and all sorts of forgery related to computer networks and records in data base. Criminal hacking requires quite intellectual logic as breaking into software is more difficult rather than creating one. It requires that the hacker should first understand the logic of software, which is to be hacked, and then encode one that can break into it. Those using this technology for bad motives are also termed as “black hats”.
They say “Necessity is the mother of invention”, same was what happened in case of hacking. Hacking originated likewise because of some needs that forced users to think of some ways to get access to computer systems. The first record of hacking being used is found in 1950s and 1960s in MIT University. Two students used to explore restricted access into computers through programming but that was just to explore. There was no ill intention involved in whatever they did. They used to their abilities just to enter under fake id to have more time on computer, which was limited because of less computers at that time. Peter Dreutsch was the kid who wrote a program to get access to computer under a false name. He was just twelve years of age at that time. This sort of hacking was considered to be positive and a person with hacking mastery was considered to be genius who could push the boundaries of programs beyond the purpose it was originally designed for. Those were the times when internet was not introduced so the hacking techniques were solely used for educational purposes and for intellectual stimulus. So hacking did not harm the bad way.
In 1970s hacking technology started to be used for personal benefit. One sort of such hacking was using telephone which was called as “phreaking”. In this type of hacking a Vietnam veteran by the name of John Draper used a plastic whistle which reproduces 2600 Hz tone which was required to make long distant calls. This whistle was blown into the phone for five times and AT&T’s switching system taking it as legal access granted this call and this call was granted to allow the call free of cost.
Hacking activities were not limited to computer systems but also in internet. In 1988, a new paradigm of hacker act was seen by the name of internet worm. After which hacking techniques in acquiring passwords and usernames through illegal means actually started.
Thus started, such technique grew with time and now we are facing a multitude hacking technologies which are extensively being used to protect and secure systems as well as for adverse objectives too.
Now hacking technology can harass us in any way such as socially, economically, financially and many other aspects of life.
Hacktivists promote freedom of speech in different ways. One of the ways that they refuse to be scared by government is that they promote courage to speak up. Someone else who agrees with this point is Peter Ludlow who states “ hacking is fundamentally about refusing to be intimidated or cowed into submission by any technology, about understanding the technology and acquiring the power to repurpose it to our individual needs, and for the good of the many”(100). Here Ludlow states that hcaktivist promotes freedom of speech by refusing to be intimidated. On the other hand, Diebert and Rohozinski have a different opinion which can be seen on their article when they mentioned “the concepts of ‘liberation’ and ‘control’…require qualification. Both are socially constructed ideas whose meaning and thus application can vary widely depending on the context in which they appear. Different communities work to be free (“or liberated”) from different things” (62). Here we can see that Diebert and Rohozinski believe that liberation and freedom can come in a different way and it depends on community and hacktivist are not promoting freedom.
Another of reasons that Hacktivist good is that they exposes corrupt in the government and organizations. There are hactivisit there main goals is to expose corruption one of these hacktivist are anonymous. Anonymous “is a loosely associated international network of activist and hacktivist” (anonymous group). For example in the Ferguson Police Shooting the police station did not release the name of the officer that was involved with the shooting. But anonymous revealed his name and his address to the world to see. Some people say that what that does is invading of privacy and “citing concerns that his life, and the lives of his relatives, could be endangered if his identity is made public” (HGA). Anonymous thought that the police station should reveal the shooter identity but they did not so they revealed his information because they saw it is justice been served.
TheDemocratic Values are the fundamental beliefs and constitutional principles of our society, such as “Freedom, Equality, Democracy and Champion of the little guy.These values are expressed in the Declaration of Independence, the United States Constitution and other significant documents, speeches, and other writings our nation(The Core Democratic Values). These valuesbind us together as a nation. Some of the freedom that American hold dear is religious freedom and worker rights, freedom of speech. Hacktivists threaten American democratic values. But there are some hackactivist organizations that support American democratic values to promote to freedom or equality in the U.S.
Above all, hacktivist make a move not in quest for their own advantage but instead in backing of open causes, for example, the fight against imbalance, bad form and defilement. A few programmers seemingly sees themselves as advanced Robin hoods (young et al. 2007) One more component that recognizes programmers from lawbreakers may be the peaceful way of their attacks.The regular focus on have a tendency to be extensive companies and government sites, and the degree of harm brought about by digital assaults does not exasperate open life. No hacktivist gatherings have freely focused on any discriminating base, and they are not included in digital wrongdoing.
Hacktivism is one sort of hacking which falls under the moral programmer class. Hacktivists, as different sorts of programmers are characterized by their inspiration, which for this situation is political or social. There is much civil argument about whether this kind of movement ought to be viewed as illicit, as it rotates around free discourse, and the dissenting of such.Hacktivism, or a hacktivist driven by social and political happenings, has gotten an awful notoriety throughout the years. Anyhow those included with ceasing digital wrongdoing see Hacktivists as a real advantage. That is on account of their specialized learning is seen as being profitable, and all the more possibly connected to something that advantages society.
But it can be difficult to convince a young hacker that their talents are better applied to the benefit of a company or community when there are groups like Anonymous whose exploits are shared with the world. Sometimes, the thrill of a successful exploit is worth more than a hefty paycheck.
There are a lot of things that hacktivist groups like Anonymous have done for a good cause, and for the people. For example “Anonymous released user information from a major hacking forum in February 2011, and security firm Mandiant was able to use this data to link the Chinese military to cyber-attacks against the U.S. this year.” This is one of many things that anonymous did for a good cause if they have not done this there is a very good chance that the cyber attackers will be unknown until this day.
Hacktivism advance mindfulness in individuals and give a voice to the individuals who are not listened. They convey equity to the individuals in their way; they incite individuals to talk up for themselves and not be threatened by the legislature and some social association. Hacktivist ought not be seen or regarded as offenders. They ought to be approached with deference and they ought to be bolstered by individuals
Unquestionably, politically persuaded site damages had officially happened, and hacking itself can be viewed as a manifestation of political interpretation, as we have seen. Be that as it may, these writings consider the extra probability of less discrete, more precise, shared, and innovative uses of hacking practice for unequivocally political closures – phenomena that had not yet happened. The main of these writings is John Arquilla and David Ronfeldt's (1993) 'Cyber war is Nearing!', distributed in the guard diary Comparative Strategy. It is maybe not astounding that the likelihood of hacktivism was initially distinguished by individuals from the first class institutional system conceivably undermined by it, instead of by the scholarly world. To be sure, the learning of hacktivism seems to have diffused directly through into the news media before any non-dissident or non-military-adjusted/counseled scholastics took an enthusiasm for it. Arquilla and Ronfeldt's article is a revising of the hypothesis furthermore, practice of fighting and clash, and the noteworthiness of learning in these new methods of contention. They contend that "[i]information is turning into a key asset that may demonstrate as profitable and powerful in the post-modern time as capital and work have been in the modern age" (1993: 24-5).
It has been ceaselessly reconsidered since its creation and has seen production as Guy Steele's The Hackers Dictionary (1983) and as Eric S. Raymond's The New Hackers Dictionary (1986). The most current adaptation of the Jargon File, 4.4.7 as of the season of this composition, characterizes a hacker as
1. An individual who appreciates investigating the subtle elements of programmable frameworks and how to extend their capacities, instead of most clients, who want to learn just the base important.
2. One who programs excitedly (even fanatically) or who appreciates programming instead of simply estimating about programming.
3. One who illicit security ruptures/hacking to uncover wrongdoing.
4. One wh0-hacking/security breaks to bring issues to light of issues
5. -Hacktivism towards political finishes
6. Hacktivism towards social finishes.
7. Hacktivism to advance free discourse, and dissent those foundations that hinder/confine it.
One of the significant lines of anonymous is“Hacktivist anonymous we are legion. We do not forgive. We do not forget.”Groups of hacktivist are considered as wild variables in the internet equipped for amazing us with striking operations deserving of the most talented digital armed force.
In every field of life there are some negative and positive components, perspectives and ideology. Likewise hacktivist believe the ideology of cyber war against the political and social agendas in digital code language. The hackers are criminals for them which are doing wrong things because they disclose their wrong intentions and heroes for them who take advantages for their skills. This is 21st century everyone is getting solutions for their problems through technology so are hacktivists. So it is wrong to call hacktivists criminals.
Work cited
Peter, Ludlow. “what is a ‘Hacktivist’?.” Media and the new millenium. Eds. William
Breeze, Jane Dugan, Melania Gagich, Alex Nielsen and Jessica Schantz. The Engaged Reader. 1st edition. Van-griner. Cincinnati, 2014. (97-101).
Rnald diebert Rafal Rohozinski. “Liberation vs. Control: The future of Cyberspace.”Media and the new millenium. Eds. William Breeze, Jane Dugan, Melania Gagich, Alex Nielsen and Jessica Schantz. The Engaged Reader. 1st edition. Van-griner. Cincinnati, 2014. (61-75).
Reel, Guy. "American Values." Common Dreams. N.p, 20 Apr. 2005. Web. 23 Nov. 2014.
Alvro, Jim. ”The Core Democratic Values.” Macomb.k12. 2011.Web. 23 Nov. 2014.
"Hacker Group Anonymous Releases Name That It Says Is Officer Who Shot and Killed Michael Brown." Fox News. Ed. Associted Press. N.p., 14 Aug. 2014. Web. 23 Nov. 2014
" Anonymous group" Wikipedia, The Free Encyclopedia. Wikimedia Foundation, Inc. 3 November 2014. Web. 17November 2014
Love. Dylan.” 8 Things That Anonymous, The Hacker 'Terrorist' Group, Has Done For Good.” Business insider. Apr. 27, 2013.WEB. 17November 2014
“activist rights” Fitzroy legal services.cerdi. 2014. Web. 17November 2014
----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------You----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------acq-----------uis-----------iti-----------on -----------of -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll