Introduction to Cybercrime by Hill Joshua & Marion Nancy
Author:Hill, Joshua & Marion, Nancy
Language: eng
Format: epub
ISBN: 9781440832741
Publisher: ABC-CLIO
Published: 2016-02-29T05:00:00+00:00
Internet Feds/LulzSec
The Internet Feds were a loosely organized group of hackers who engaged in what could be considered “gray hat” hacking against a variety of targets. Originally members of Anonymous, the members of the Internet Feds shared interests in a variety of issues and used their computer skills to steal private information to post publically and to deface websites with which they disagreed. Over time, the Internet Feds evolved into Lulz Security (LulzSec for short). The group conducted similar offenses until one of the members was indicted and implicated several others as part of a plea bargain.
One of the most interesting things about the group is the fact that they did not engage in classic criminal activity. That is, they did not steal money for personal gain. Rather, they engaged in classic hacking activity—as the group itself put it, they did it for the Lulz.
This fact has led many to argue that the group was not a criminal organization but rather a group of hacktivists, an argument regularly applied to Anonymous, from which Internet Feds and LulzSec derived. However, despite the fact that the groups did not engage in the same type of criminal activity that the groups mentioned earlier did, they did regularly deface websites and break into servers to steal information. These, for better or worse, are the analogues of the traditional crimes of vandalism and trespassing, along with theft, despite their digital nature.
As these groups broke away from (insofar as that is possible) Anonymous, they shared a similar structure. They closely match the swarm organizational subtype mentioned earlier. In this case, it was a very small group of individuals who were acting together to perpetrate relatively benign crimes. However, the fact that a small, nonhierarchical group was able to hack into Sony Pictures and release private information, as well as allegedly take down the CIA’s website, suggests possibilities for this type of loosely organized group.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(25281)
Hello! Python by Anthony Briggs(24333)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23419)
Kotlin in Action by Dmitry Jemerov(22503)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21956)
Dependency Injection in .NET by Mark Seemann(21837)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20704)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19517)
Grails in Action by Glen Smith Peter Ledbrook(18594)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17028)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15836)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13683)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11850)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11151)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10621)
Hit Refresh by Satya Nadella(9185)
The Kubernetes Operator Framework Book by Michael Dame(8561)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8400)
Robo-Advisor with Python by Aki Ranin(8357)