Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Unit 4 Lesson 10

Name(s)_______________________________________________ Period ______ Date ________________

Cybersecurity and Crime One-


Pager Template
<your title goes here>
Note: All text in Italics, including this text, is intended to be replaced by your responses, and deleted once you’ve
completed your one-pager.

Overview
When did the event happen?
Whose data was lost / stolen / leaked? How many people / organizations were affected?
Provide any other context necessary to understand the “big picture” of the event.

How and How to Prevent


What specific type of attack / mistake led to the data falling into the wrong hands? Reference terms in “How Not to
Get Hacked” where applicable. What types of cybersecurity techniques might be used to help prevent this from
happening again?

Data Specifics
What specific data was stolen? Try to avoid vague terms like “financial data” and instead find the specific pieces of
information like “credit card numbers”. Specific answers here will strengthen your explanation in the next section.

Data Privacy / Security / Storage Concern


What specific concerns arise from this data being used in unintended ways or by unintended people? Is there
already evidence of the data being used in these ways? Cite sources if you can find specific news stories.

Sources
List all websites that you used to find any information you wrote here. Include the permanent URL. Identify the
author, title, source, the date you retrieved the source, and, if possible, the date the reference was written or
posted. You should number your sources, here is a template you can follow:

[1] Author’s Last name, First name. “Title of Web Page.” Title of Website, Publisher, Date, URL. Date retrieved.
[2] Author’s Last name, First name. “Title of Web Page.” Title of Website, Publisher, Date, URL. Date retrieved.
[3] ….

1
Unit 4 Lesson 10

Name(s)_______________________________________________ Period ______ Date ________________

Anonymous and it’s Cyberattacks

Who/what are they?


Anonymous is a movement mainly known for its cyberattacks against multiple governments, institutions,
corporations and people. They are decentralized international activists that originated in 2003 and are usually
distinguished in public by using Guy Fawkes masks in the style of the graphic novel V for Vendetta.

2013
One of its many attacks, the Operation Safe Winter, happened in 2013 and had the goal to raise awareness about
homelessness through the collection, distribution and redistribution of resources. According to Wikipedia, “Three
missions using a charity framework were suggested in the original global spawning a variety of direct actions from
used clothing drives to pitch in community potlucks feeding events in the UK, US and Turkey”. Encouraging
participation from the general public, this operation has raised questions of privacy and the changing nature of the
Anonymous community's use of monikers.

2014
Another big cyberattack happened in 2014, after a fatal police shooting of unarmed African-American
Michael Brown in Ferguson, Missouri. The “Operation Ferguson” was an organized cyberprotest against the police
hosted in a set up website and a twitter profile. The Anonymous involved with this attack “promised that if any
protesters were harassed or harmed, they would attack the city's servers and computers, taking them offline”. The
internet crashed at the City Hall, phones died and e-mail systems were targeted.

Anonymous vs. KKK


The week before November 19th 2014, the group declared cyber war on the Ku Klux Klan (KKK) after it
made death threats following the Ferguson riots. The Anonymous hacked and attacked KKK’s Twitter account and
hosting sites, as well as leaked and released personal details of 350 members of the opposing group, as well as
links to their social media accounts. The article Anonymous posts Ku Klux Klan alleged sympathizers list by BBC
News, “They said the data was ‘a form of resistance’ against racial violence [since] The KKK last year threatened to
use ‘deadly force’ against those protesting over the killing of a black youth in Ferguson, Missouri”. Also in November
2014, some of the Anonymous members shut down Cleveland city’s website and posted a video after Tamir Rice.
He was a twelve year old boy who was armed with a BB gun and was shot to death by a police officer in a park in
Cleveland. “Anonymous also used ‘BeenVerified' to uncover the phone number and address of a police officer
involved in the shooting”.

2
Unit 4 Lesson 10

Name(s)_______________________________________________ Period ______ Date ________________

Anonymous in the present day


The group is still active to this day, making appearances in situations like the murder of George Floyd,
evidence against ex US President Donald Trump and Jeffrey Epstein, Bill Gates, The Brittish Royal Family and
multiple other public people. They also took actions about the pandemic, the Nigerian and Russian government, the
Texas Heart Act and the war between Russia and Ukraine.

2022 and the war between Russia and Ukraine


According to Wikipedia, “On February 25, 2022 Twitter accounts associated with Anonymous declared that they had
launched 'cyber operations' against the Russian Federation, in retaliation for the invasion of Ukraine” They attacked
and disabled state owned websites, as well as “leaked 200GB worth of emails from the Belarusian weapons
manufacturer Tetraedr, which provided logistical support for Russia in the Russian invasion of Ukraine”. The
Anonymous also “hacked into Russian TV channels and played Ukrainian music through them”. They also “showed
uncensored news of what was happening in Ukraine” since all of that information was being kept from Russian
citizens.

Data Privacy / Security / Storage Concern


Powerful groups and organizations like the Anonymous have incredible abilities, and with them, specific
concerns arise. People’s data is something incredibly personal, so the information leaking about these people
naturally makes many people nervous, not exactly because they have something to hide, but because it is so
personal. Thankfully, there are many ways of preventing your computer from being hacked.

How to prevent being hacked and having your


personal data leaked?
Although Anonymous mostly focuses on hacking and stealing information about famous and important
people, it is possible to remember that we are always vulnerable to this type of crime. The site “wired” contains a
really helpful article about this. Bellow is a resume of all of the topics covered in it.

Multi-Factor Authentication
According to the site, using Multi- Factor Authentication is “Arguably the most effective thing you can do to
protect your online accounts [...] for as many of your accounts as possible. The method uses a secondary piece of
information—often a code generated by an app or sent via SMS—alongside a password”.

Password Manager

“All the passwords you use for your online accounts should be strong and unique. What this really means is
they should be long, include a mixture of different character types, and not be used across multiple websites.”
“The best way to do this is by using a password manager. Password managers create strong passwords for
you and store them securely. If the fact that they can stop you getting hacked isn’t enough to make you consider
using one, a password manager also means you never have to struggle to remember a forgotten password again.”

3
Unit 4 Lesson 10

Name(s)_______________________________________________ Period ______ Date ________________


Learn How to Spot a Phishing Attack
“Hackers have used the pandemic as cover to launch wave after wave of phishing attacks and […] Google
Drive scams.
Anyone can fall for these types of scams. The main thing to do is to think before you click. Scam messages
try to trick people into behaving in a way they wouldn’t normally—with, say, pretend instant demands from a boss or
messages that say an urgent response is required.
There’s no foolproof way to identify every type of phishing effort or scam—scammers are constantly upping
their game—but being aware of the threat can help reduce its effectiveness. Be cautious, think before you click, and
download files only from people and sources you know and trust.”

Update Everything

“Every piece of technology you use […] is open to attack. Thankfully, companies are always finding new
bugs and fixing them. That’s why it’s crucial you download and update the latest versions of the apps and software
you’re using”.

Encrypt Everything
“Using encrypted services means that what you're sending is better protected against surveillance and
won’t be accessible if your device gets lost or stolen”.
“There are two main end-to-end encrypted messaging services, Signal and WhatsApp. Messages (including
photos and videos) plus voice calls and video calls are encrypted by default within both apps. They both also let you
use disappearing messages, which remove what you’ve sent after a set period of time. The practice can help keep
your chats private, even from those that have access to your devices. Our advice is to use Signal where possible,
as it collects less metadata than WhatsApp and isn’t owned by Facebook”.

sources :
[1] “Title of WebAnonymous (hacker group).” Wikipedia, March 04, 2022,
https://en.wikipedia.org/wiki/Anonymous_(hacker_group). March 9th 2022.

[2] Woolf, Nicky. “Title of Web Page.” Anonymous leaks identities of 350 alleged Ku Klux Klan members, The
Guardian, November 6th 2015, https://www.theguardian.com/technology/2015/nov/06/anonymous-ku-klux-klan-
name-leak, March 10th 2022.

[3] “Anonymous posts Ku Klux Klan alleged sympathizers list”, BBC News, November 06, 2015,
https://www.citationmachine.net/apa/cite-a-website/confirm March 10, 2022

[4] “6 Things You Need to Do to Prevent Getting Hacked” Wired, August 29, 2021,
https://www.wired.com/story/how-to-prevent-getting-hacked/
March 10 2022,

You might also like