M6D1: Hacktivism and Cyberterrorism Module 6 The emblem of anonymousAs computer and internet technologies have advanced and become more easily accessible across the world, we are seeing an explosion of social activists, government agencies and terrorists using these technologies to further their efforts. Government and non-government entities use the internet to spread propaganda and information, recruit support and demonize opponents. The efforts of some radical groups, like ISIS, to shut down US infrastructure and thwart military activity can clearly be labeled as cyberterrorism. However, some groups, such as the loosely associated international network of self-proclaimed “hacktivists” identified as Anonymous, are blurring the lines between what constitutes terrorism and what is simply social activism. As technology continues to advance and further our capabilities, we are continuously presented with new and intriguing moral questions. After reading the module notes and all of the supplemental materials, respond to the following: Briefly define cyberterrorism. Define hacktivism. Illustrate examples of each in current events within the last decade. What is the fundamental difference between these two? How has technology helped to advance these groups? How do you think our government’s response to such groups has changed our attitudes towards our own freedoms? In your opinion, do you think Hacktivism is justified or is it just a subset of cyberterrorism? Give some examples to support your stance. Support your position using appropriate sources that are properly cited. When responding to your peers, be respectful in your discussion. Healthy debates are welcomed. Be sure to maintain academic rigor and professionalism at all times. Discussions in total account for 15% of your grade and are graded according to the SBT Discussion Rubric. Keep the following in mind when making your posts to the discussion area: Did you complete the elements required in your initial discussion post? Did you acknowledge those who responded to you? Review the SBT Discussion Rubric by clicking on the “View Rubric” button at the top of this page, or by going to the “Start Here-Course Information” section of the course to see more information on grading criteria. Consult the Discussion Posting Guide for information about writing your discussion posts. Be sure to check your work and correct any spelling or grammatical errors before you post it. When you are ready to post, click on the “Create Thread” button for a new thread or “Reply” to respond to a previous post. Then, copy/paste the text from your document into the message field, and click “Submit.”

    M6D1: Falltivism and Cyberterrorism

    Student’s Name


    M6D1: Falltivism and Cyberterrorism

    Definition of Cyberterrorism and Falltivism

    Cyberterrorism can be defined as a gregariously motivated action that involves the interpretation of Information Technology and computers to source a strict disintegration of efficiently functioning computer schemes. Cyberterrorism is delayed in the cainterpretation of causing general horror in the community by intolerantly affecting the functionality of computer schemes of councils, agencies, businesses, unformed other constructions (Denning, 2001). In the narrative of cyberspace, as it continues to accrue intensively, there keep been profoundly understandn assaults directed to council departments, agencies, constructions, businesses, awe., with the watch of causing devastating disintegrations. An issue of cyber consternationism in the narrative entails the Estonia council’s April 27, 2007, conciliate by the Nashi (Balkhi, 2014). The Nashi comprises of a pro-Kremlin order from Transnistria which activated bulky technologies including botnets and ping floods to present council websites interpretationless.

    Hacktivism, on the other agency, can be defined as the Internet activism where participants fintegral or split into computer schemes to construct intolerant adit motivated by gregarious or gregarious purposes. The original agenda of falltivism is to subversively interpretation computers and their networks to effectively further a gregarious fluctuate or gregarious fluctuate (Baldi et al., 2003). An issue of falltivism disembodiment entails the biggest assure by the Anonymous Activism Order counter the Church of Scientology on January 21, 2008 (Balkhi, 2014). The Anonymous followed the interpretation of Distributed Denial of Service Assaults (DDoS0) which culminates in the interpretation of gambol calls, flooding fax machines with black faxes, and solid messages to cainterpretation an premeditated splitdown of the scheme. The assault was a rejoinder by the Anonymous Order to the efforts of Scientologists interpretation of the Internet censorship to ramify misguidance of the performance they were doing and the experiences.

    Primary Variety Betwixt Falltivism and Cyberterrorism

    The construction of the varietys betwixt falltivism and cyberterrorism is important to induce a race where gregarious and gregarious integrity and injustices are inducen. The experience of falltivism entails activism in the conceive of onrace falling nearness of the target websites restraint gregarious and gregarious purposes. The experience of cyber consternationism is intended to inhibit of cainterpretation ruin on the target website in specialty of gregarious, gregarious, sacred, or ideological externals (Vegh, 2002). The primary variety betwixt falltivism and cyberterrorism is that falltivism interpretations well-disposed instrument to stir restraint fluctuate time cyber consternationism invites the interpretation of foul ways to consummate their external which culminates with ruin, disintegration, and horror on the target website, construction or entity.

    Technology Help in Advancing these Orders

    The technological metements dramatize a censorious role in promoting the cainterpretation and entity of these orders. The accrueth of the cyberspace and intensifying falling abilities increases in the corresponding appraise as those developing the websites restraint the proper purposes. In deflect, falltivism and cyberterrorism suffice-ce as an over restraintce to the direct metement in technology to mete the race of vitality proportioned in an alien appraise.

    The council’s rejoinder to such orders has been rough and watched at eliminating them from the community by integral instrument. The truth that someone can construct intolerant adit restraint whatever debate is topic to strict retribution on the principle. In deflect, such activities counteract our insubservience to what discontinuance on places onrace as you don’t understand when it can be adited and be interpretationd restraint intolerant debates. In as greatly as falltivism seems gentle, it is as diseased proportioned as cyber consternationism. In my conviction, it should be eradicated in correspondent appraise as falltivism is miles abroad to training cyber consternationism.


    Baldi, S., Gelbstein, E., & Kurbalija, J. (2003). Hacktivism, cyber-terrorism, and cyberwar: the activities of the discourteous community in cyberspace. Diplo Foundation.

    Balkhi, S. (2014). 25 Biggest Cyber Assaults in Narrative. [Online] Retrieved from http://list25.com/25-biggest-cyber-attacks-in-history/ on 27th July, 2017.

    Denning, D. E. (2001). Activism, falltivism, and cyberterrorism: The Internet as a cat's-paw restraint influencing restrainteign management. Networks and netwars: The coming of consternation, wrong, and militancy239, 288.

    Vegh, S. (2002). Falltivists or cyberterrorists? The changing resources disrace on falling. First Monday7(10).