President Obama once declared that Cyber attacks comprise one of the most severe economic and national security challenges that the nation is faced with . Hacktivism has heightened political conscience. People are reliant on computers and electronic operating systems to an extent that these attacks open up the risk to the public. Hacktivism has the possibility to have a positive or negative force on society.
Hacktivism has generally got more than one meaning. It can be defined as a form of trespassing against a computer belonging to somebody else (Krone, 2005). The use of technology is used in acts of protest and activism. Denning (2001) describes activism as a non disruptive use of the internet to get an end result, in support of an agenda or cause. A person that has committed in an act of Hacktivism is called a hactivist. Hactivists challenge the security of the internet as a technical, economic and political platform. Website defacements, computer break ins, denial of service attacks, informational theft computer viruses and worms are regular examples of Hacktivism . Although ‘politically motivated’ hacking is what distinguishes the action of Hacktivism to hacking, they are still hard to differentiate. Clough (2010) reports that on regular there is 4000 denial of services per week which is a clear indicator of how common Hacktivism is occurring. Hactivists aim to embarrass the government, and if people support Hactivists they are wanting to over power politics. Hactivists do not act on money but merely for protest, revenge, ideology and humiliating individuals.
The relevant legislation for Hacktivism comes from the Criminal Code act 1995 . It falls under Division 477, serious computer offences. All of which have the key element of ‘intent’ and ‘unauthorised access’. The person must have had the intent to ‘hack’ into a computer system. Division 477.1 it is a criminal offence if there was unauthorised access with the intent to commit a
Cited: 2012 Data breach investigation report. (2012). Retrieved May 2013, from Verizon RISK team: http://www.wired.com/images_blogs/threatlevel/2012/03/Verizon-Data-Breach-Report-2012.pdf austlii. (2013). Commonwealth Consolidated Acts. Retrieved May 10, 2013, from austlii: http://www.austlii.edu.au/au/legis/cth/consol_act/ca2001112/sch1.html Carabotton, E. (2011, August 4). Hacking Motivations – Hacktivism. Retrieved May 2013, from talktechtome: http://www.gfi.com/blog/hacking-motivations-hacktivism/ Castell, M. (2012). View point: Manual Castells on the rise of alternativr economic cultures. Retrieved May 2013, from BBC: http://www.bbc.co.uk/news/business-20027044 , accessed March 29, 2013 Clough, J. (2011). Chapter 3:Access Offences. Priciples of Cybercrime , 48-100. Glenny, M. (Director). (2011). TED talk [Motion Picture]. Hardy, K. (2012). OPERATION TITSTORM: HACKTIVISM OR CYBERTERRORISM? Heinonline , 474-502. Kelly, B. (2013). INVESTING IN A CENTRALIZED CYBERSECURITY. "HACKTIVISM” AND CYBERSECURITY REFORM , Vol. 92:1663. Krone, T. (2005). Hacking motives high tech crime brief no.6. Canberra: Australian Institute of Criminology. Powell, A. (2013). Hacking & ‘Hacktivism’. Melbourne: RMIT.