Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Anonymous Attack on ISIS

Anonymous Attack on ISIS

CSC 404
Ethics Presentation

Frances Coronel

December 10, 2015
Tweet

More Decks by Frances Coronel

Other Decks in Education

Transcript

  1. “ Anonymous is a loose collective of hackers who use

    their skills for activism use the Guy Fawkes mask as their trademark.
  2. But... how can a bunch of computer nerds fight an

    international terrorist group?
  3. What is a Caliphate? ◎ A caliphate is an islamic

    state led by a caliph, who is a political and religious leader that is a successor to the islamic prophet Muhammad. His power and authority is absolute. ◎ Members of ISIS are willing to establish this state to attack and use violence against non-muslims, non sunni muslims, and any muslim they consider not devote enough or not extreme enough.
  4. History of Leaders 1999 - 2006 2006 - 2010 2010

    - Present Abu Musab al- Zarqawi was the original founder of ISIS in 1999. He died in June 2006 from a U.S. strike. Abu Omar al- Baghdadi was established as ISIS’ leader in October 2006 and died in 2010 as a result of an joint U.S.-Iraqi operation. Abu Bakr al- Baghdadi was established as the leader of ISIS in 2010. In addition, on June 29, 2014 he declared himself the caliph.
  5. Where is ISIS? ◎ ISIS seized control of Iraq’s second-largest

    city, Mosul in the summer of 2015. ◎ Main base is in Raqqa, eastern Syria where they control most of the oil assets.
  6. Members of ISIS ◎ The CIA believes that ISIS has

    between 20k and 31.5k fighters. ◎ Recruits include former militants of other terrorist organizations and foreign fighters. ◎ ISIS recruits approximately over 1000 new members a month with most ranging from ages 15-20 years old. ◎ Recruiting tactics include High quality, effective video Social media And to recruit women ISIS offers “sexual comfort roles” and the promise of a devout husband.
  7. How is ISIS Funded? ◎ The best funded terrorist organization

    in history. ◎ Donations, looting, illegal trading, levying taxes, human trafficking, kidnapping, and oil bring in close to 2 billion dollars per year to the terrorist organization.
  8. Attack that Prompted Anonymous ◎ Since the jihadist grouped declared

    a global caliphate, 10,000 people have been killed. ◎ On November 13, 2015 at least 128 people were killed, and 350 injured in gunfire and blasts across Paris by ISIS. ◎ Days after the Paris attacks Anonymous declared war on ISIS.
  9. NO. The discovery of Stuxnet, a computer worm reportedly developed

    by Israel and the United States and aimed at Iran’s nuclear facilities, showed that state cyberwar is now a very real possibility. Governments and corporations are in collusion and are setting the rules of the road behind closed doors.
  10. Cyber Warfare ◎ November 14, 2014 North Korean Hackers attacked

    sony pictures and released sensitive data in response to a film sony was releasing.. ◎ The United States preceded to send a direct attack to North Korea's internet system after it was determined they were responsible. ◎ Cyber warfare has been going on for a while now
  11. Cyber Warfare Continued ◎ In May 2013, ABC News claimed

    that China hacked plans for the headquarters of the Australian Security Intelligence Organisation ◎ The Department of Information Technology created the Indian Computer Emergency Response Team (CERT-In) in 2004 to thwart cyber attacks in India ◎ MI6 reportedly infiltrated an Al Qaeda website and replaced the recipe for a pipe bomb with the recipe for making cupcakes ◎ Cyberwarfare in the United States is a part of the American military strategy of proactive cyber defence and the use of cyber warfare as a platform for attack. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war.
  12. Defining Ethics ◎ Ethics can be defined as a system

    of moral principles, or the rules of conduct recognized in reference to a certain aspect of human actions. ◎ Ethics can also be defined as a branch of philosophy that deals with values that relate to human conduct, while taking into consideration right, wrong, and the motives of certain actions.
  13. Ethical Decision Making ◎ Ethical decision-making refers to the process

    of evaluating and choosing among alternatives in a manner consistent with ethical principles. ◎ In making ethical decisions, it is necessary to perceive and eliminate unethical options and select the best ethical alternative.
  14. What makes a decision ethical? ◎ The process of making

    ethical decisions requires ◎ commitment - the desire to do the right thing regardless of the cost. ◎ consciousness - the awareness to act consistently and apply moral convictions to daily behavior. ◎ competency - the ability to collect and evaluate information, develop alternatives, and foresee potential consequences and risks.
  15. Ethical Decision Process ◎ Good decisions are both ethical and

    effective ◎ Ethical decisions generate and sustain trust demonstrate respect, responsibility, fairness and caring and are consistent with good citizenship. These behaviors provide a foundation for making better decisions by setting the ground rules for our behavior. ◎ Effective decisions are effective if they accomplish what we want accomplished and if they advance our purposes. A choice that produces unintended and undesirable results is ineffective. The key to making effective decisions is to think about choices in terms of their ability to accomplish our most important goals. This means we have to understand the difference between immediate and short- term goals and longer-range goals.
  16. Ethical Hacking ◎ An ethical hacker is a computer or

    networking professional who systematically attempts to penetrate a system on behalf of its owners for the purpose of finding security vulnerabilities that could be exploited by a hacker. ◎ These hackers use the same methods that your traditional hacker may use, but instead of taking advantage of the vulnerabilities, they document them. ◎ After they are documented, then advice is given on how to fix them so the organization can strengthen their overall security.
  17. Is this attack ethical? ◎ Although Anonymous has had their

    questionable situations with hacking in the past, for this particular instance with ISIS their actions would be considered ethical. ◎ They are using their abilities to not only combat against this infamous terrorist group, but to also help those who aren’t familiar with hacking with a form of aid to learn.
  18. “ They might do something which isn't technically correct, maybe

    it's not legally correct, but they're doing it for purposes, that in their minds at least are ethical.
  19. 5.

  20. What exactly is going on ? ◎ Anonymous is looking

    to involve as many people possible to help against the “war on Islamic State” ◎ The terrorist attacks in Paris made Anonymous vow to hunt down ISIS members and expose them Codename → OpParis ◎ An offshoot called GhostSec began to track twitter accounts of people associated with ISIS to disable them to cripple ISIS propaganda ◎ Took all the accounts of people associated with ISIS to the authority for Surveillance
  21. THE NOOB BOOK ◎ “The Noob Guide” is a guide

    for “everyone who wants to get started in the world of hacking” ◎ The guide gives coding tips of newbies such as HTML & Python ◎ Suggests users use three different distributions Linux ◎ Gives users a list of hacking tools that they can use without needing in-depth coding or computer knowledge
  22. THE REPORTER GUIDE ◎ “The Reporter Guide” is a guide

    that explains how to launch a reporter bot against a list of twitter account IDs ◎ Over 5,000 twitter accounts were targeted ◎ The reporter bot (a software application that runs automated tasks over the Internet) to report Twitter account IDs rather than usernames as this allows them to keep track of users who change their usernames often
  23. ◎ In our opinion, we believe that “The Noob Guide”

    and “The Reporter Guide” are not ethical by laws and rules of ethics but it is the right thing to do because it is for a good cause which is to fight ISIS and end their unethical behaviors.
  24. Credits ◎ http //www.bustle.com/articles/100475-who-is- anonymous-leader-the-hactivist-group-operates-under-a- shroud-of-secrecy ◎ http //fortune.com/2015/11/16/anonymous-cyber-war-isis/ ◎

    http //mic.com/articles/112944/anonymous-went-after- the-islamic-state-with-a-massive-hack-but-was-it-a-good- idea#.mnqBG671y ◎ http //www.computerworld. com/article/3005475/cyberattacks/anonymous-just-might- make-all-the-difference-in-attacking-isis.html ◎ http //searchsecurity.techtarget.com/definition/ethical- hacker ◎
  25. Credits ◎ https //www.buffalo.edu/news/releases/2011/08/12784. html ◎ http //www.businessinsider.com/good-hacks-by- anonymous-2013-4?op=1 ◎

    http //www.cbsnews.com/pictures/anonymous-most- memorable-hacks/9/ ◎ http //www.ibtimes.com/how-hack-isis-anonymous- publishes-guide-help-attack-islamic-states-online- presence-2189540 ◎ http //blink.ucsd. edu/finance/accountability/ethics/process.html