Hacktivismo

Last updated
Hacktivismo
Formation1999
Purpose Hacktivism
Location
Origin
Las Vegas, Nevada
Founders
Oxblood Ruffin
Products
Camera/Shy
The Six/Four System
HESSLA
Affiliations Cult of the Dead Cow
Ninja Strike Force
Website Main Site

Hacktivismo is an offshoot of Cult of the Dead Cow (cDc), whose beliefs include access to information as a basic human right. It was founded in 1999.

Contents

The group's beliefs are described fully in The Hacktivismo Declaration, which seeks to apply the Universal Declaration of Human Rights and the International Covenant on Civil and Political Rights to the Internet. Oxblood Ruffin, the director of Hacktivismo, has argued forcefully against definitions of hacktivism that include web defacements or denial-of-service attacks. Hacktivismo has also authored its own software license agreement, the Hacktivismo Enhanced-Source Software License Agreement (HESSLA). The HESSLA prohibits use or modification that would violate human rights or introduce features that spy on the user.

Connection to cDc

In 1999 Cult of the Dead Cow (cDc), a loose network of individuals, announced the formation of Hacktivismo. The group set to explore ways of preventing censorship of the Internet. In particular Hacktivismo focused on firewalls or censoring mechanisms of national governments. Press releases made it clear that cDc and Hacktivismo were different groups; however Hacktivismo was also described as "special operations group" of cDc. A press release in early 2002 described Hacktivismo as "an international cadre of hackers founded by the cDc's Oxblood Ruffin". [1]

The Hacktivismo Declaration

The group's beliefs are described fully in the "Hacktivismo Declaration" which is a list of "assertions of liberty in support of an uncensored internet" and seeks to apply the Universal Declaration of Human Rights and the International Covenant on Civil and Political Rights (ICCPR) to the Internet. The Declaration recalls the duty of member states to the ICCPR to protect the right to freedom of expression with regards to the internet and in this context what is called the "freedom of information". [2] The Hacktivismo Declaration states:

The Hacktivismo Declaration recognizes "the importance to fight against human rights abuses with respect to reasonable access to information on the Internet" and calls upon the hacker community to "study ways and means of circumventing state sponsored censorship of the internet" and "implement technologies to challenge information rights violations". The Hacktivismo Declaration does however recognize that the right to freedom of expression is subject to limitations, stating "we recognized the right of governments to forbid the publication of properly categorized state secrets, child pornography, and matters related to personal privacy and privilege, among other accepted restrictions." However, the Hacktivismo Declaration states "but we oppose the use of state power to control access to the works of critics, intellectuals, artists, or religious figures." [2]

Projects

Hacktivismo logo Skullreporter.png
Hacktivismo logo

Camera/Shy

Camera/Shy was the first Hacktivismo project released. It debuted in 2002 at the H.O.P.E. 2k2 convention in New York City. Written by The Pull, Camera/Shy is a steganographic tool that scans for and delivers decrypted content directly from the World Wide Web. It is a stand-alone, Internet Explorer-based web browser. It interprets and displays hidden information stored in the junk bits in GIF files. [3]

The Six/Four System

The Six/Four System was written by Mixter. The software is a censorship resistant network proxy. It works by using "trusted peers" to relay network connections over SSL encrypted links. [4] As an example, the distribution includes a program which will act as a web proxy, but where all of the connections will be hidden until they reach the far end trusted peer. [5]

Hacktivismo and the cDc further gained notoriety in 2003 when the Six/Four System became the first product of a hacker group to receive approval from the United States Department of Commerce for export of strong encryption. [6]

ScatterChat

ScatterChat is an encrypted instant messaging client based on Gaim. It was written by J. Salvatore Testa II and released at the H.O.P.E. Number Six conference in New York City on July 22, 2006. The source code is available, licensed under the HESSLA. It provides encryption as well as integrated onion routing with Tor, and secure file transfers. Scatterchat's security features include immunity from replay attacks and limited resistance to traffic analysis. [7] [8] Various flaws in the software have been elaborated by researchers. [9] [10]

Torpark

XeroBank Browser (formerly known as Torpark) is a variant of the Portable Firefox web browser with Tor built into it. XeroBank is intended for use on portable media such as a USB flash drive but it can also be used on any hard disk drive. cDc/Hacktivismo co-released v.1.5.0.7 along with Steve Topletz on September 19, 2006. [11] [12]

Members

Related Research Articles

<span class="mw-page-title-main">Back Orifice 2000</span> Computer program for remote administration

Back Orifice 2000 is a computer program designed for remote system administration. It enables a user to control a computer running the Microsoft Windows operating system from a remote location. The name is a pun on Microsoft BackOffice Server software.

<span class="mw-page-title-main">Hacktivism</span> Computer-based activities as a means of protest

Internet activism, hacktivism, or hactivism, is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. With roots in hacker culture and hacker ethics, its ends are often related to free speech, human rights, or freedom of information movements.

This page provides an index of articles thought to be Internet or Web related topics.

<span class="mw-page-title-main">Freedom of information</span> Freedom of a person or people to publish and consume information

Freedom of information is freedom of a person or people to publish and have access to information. Access to information is the ability for an individual to seek, receive and impart information effectively. As articulated by UNESCO, it encompasses

"scientific, indigenous, and traditional knowledge; freedom of information, building of open knowledge resources, including open Internet and open standards, and open access and availability of data; preservation of digital heritage; respect for cultural and linguistic diversity, such as fostering access to local content in accessible languages; quality education for all, including lifelong and e-learning; diffusion of new media and information literacy and skills, and social inclusion online, including addressing inequalities based on skills, education, gender, age, race, ethnicity, and accessibility by those with disabilities; and the development of connectivity and affordable ICTs, including mobile, the Internet, and broadband infrastructures".

A dark net or darknet is an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization, and often uses a unique customized communication protocol. Two typical darknet types are social networks, and anonymity proxy networks such as Tor via an anonymized series of connections.

Internet privacy involves the right or mandate of personal privacy concerning the storage, re-purposing, provision to third parties, and display of information pertaining to oneself via the Internet. Internet privacy is a subset of data privacy. Privacy concerns have been articulated from the beginnings of large-scale computer sharing and especially relate to mass surveillance.

<span class="mw-page-title-main">Oxblood Ruffin</span> Canadian hacker

Oxblood Ruffin is a Canadian hacker. He is a member of the hacker group Cult of the Dead Cow (cDc), for which he serves as "Foreign Minister." He is also the founder and executive director of Hacktivismo, an offshoot of cDc. Ruffin is active in human rights causes and is a vocal proponent of hacktivism, a term which he has helped to define. He has participated in both technology and human rights conferences, both on his own and along with cDc. He also has written articles for The Register and .net. Ruffin is also an infrequent contributor to both the cDc blog and the Hacktivismo News blog.

<span class="mw-page-title-main">Cult of the Dead Cow</span> Hacker organization

Cult of the Dead Cow, also known as cDc or cDc Communications, is a computer hacker and DIY media organization founded in 1984 in Lubbock, Texas. The group maintains a weblog on its site, also titled "[Cult of the Dead Cow]". New media are released first through the blog, which also features thoughts and opinions of the group's members.

The Hacktivismo Enhanced-Source Software License Agreement (HESSLA) is a software license proposed by Hacktivismo that attempts to put ethical restrictions on use and modification of software released under it.

<span class="mw-page-title-main">Information wants to be free</span> Phrase

"Information wants to be free" is an expression that means either that all people should be able to access information freely, or that information naturally strives to become as freely available among people as possible. It is often used by technology activists to criticize laws that limit transparency and general access to information. People who criticize intellectual property law say the system of such government-granted monopolies conflicts with the development of a public domain of information. The expression is often credited to Stewart Brand, who was recorded saying it at a Hackers Conference in 1984.

<span class="mw-page-title-main">Digital rights</span> Type of human and legal rights

Digital rights are those human rights and legal rights that allow individuals to access, use, create, and publish digital media or to access and use computers, other electronic devices, and telecommunications networks. The concept is particularly related to the protection and realization of existing rights, such as the right to privacy and freedom of expression, in the context of digital technologies, especially the Internet. The laws of several countries recognize a right to Internet access.

xB Browser Web browser designed to run on both the Tor and XeroBank anonymity networks

xB Browser was a web browser designed to run on both the Tor and XeroBank anonymity networks, and is available as component of the xB Machine and the xB Installer.

<span class="mw-page-title-main">Freegate</span> Internet software utility

Freegate is a software application developed by Dynamic Internet Technology (DIT) that enables internet users to view websites blocked by their governments. The program takes advantage of a range of proxy servers called Dynaweb. This allows users to bypass Internet firewalls that block web sites by using DIT's Peer-to-peer (P2P)-like proxy network system. FreeGate's anti-censorship capability is further enhanced by a new, unique encryption and compression algorithm in the versions of 6.33 and above. Dynamic Internet Technology estimates Freegate had 200,000 users in 2004. The maintainer and CEO of DIT is Bill Xia.

Mixter is a computer security specialist. Mixter first made the transition out of the computer underground into large-scale public awareness, in 2000, at which time newspapers and magazines worldwide mentioned a link to massively destructive and effective distributed denial of service (DDoS) attacks which crippled and shut down major websites. Early reports stated that the FBI-led National Infrastructure Protection Center (NIPC) was questioning Mixter regarding a tool called Stacheldraht. Although Mixter himself was not a suspect, his tool, the Tribe Flood Network (TFN) and an update called TFN2K were ultimately discovered as being the ones used in the attacks, causing an estimated $1.7 billion USD in damages.

An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet untraceable. It is a proxy server computer that acts as an intermediary and privacy shield between a client computer and the rest of the Internet. It accesses the Internet on the user's behalf, protecting personal information of the user by hiding the client computer's identifying information such as IP addresses. Anonymous proxy is the opposite of transparent proxy, which sends user information in the connection request header. Commercial anonymous proxies are usually sold as VPN services.

<span class="mw-page-title-main">Tor (network)</span> Free and open-source anonymity network based on onion routing

Tor is a free overlay network for enabling anonymous communication. Built on free and open-source software and more than seven thousand volunteer-operated relays worldwide, users can have their Internet traffic routed via a random path through the network.

This list of Internet censorship and surveillance by country provides information on the types and levels of Internet censorship and surveillance that is occurring in countries around the world.

Internet censorship circumvention, also referred to as going over the wall or scientific browsing in China, is the use of various methods and tools to bypass internet censorship.

Internet censorship in Switzerland is regulated by the Federal Supreme Court of Switzerland on a case by case basis. Internet services provided by the registered with BAKOM Internet service providers (ISPs) are subject to a "voluntary recommendation" by the Federal Supreme Court of Switzerland, which requires blocking of websites just after 18 December 2007. As of October 2015, this might change soon and additional topics like Online gambling are on the focus now.

Human rightsandencryption are often viewed as interlinked. Encryption can be a technology that helps implement basic human rights. In the digital age, the freedom of speech has become more controversial; however, from a human rights perspective, there is a growing awareness that encryption is essential for a free, open, and trustworthy Internet.

References

  1. Jordan, Tim; Paul A. Taylor (2004). Hacktivism and Cyberwars . Routeledge. pp.  98–99. ISBN   9780415260039. digital rights human rights.
  2. 1 2 3 "The Hacktivismo Declaration". Cult of the Dead Cow and Hacktivismo. Archived from the original on 2009-05-02. Retrieved 2008-07-25.
  3. Einhorn, Bruce. "Hackers to Beijing: Have a Cow!." Business Week online edition, August 5, 2002. Retrieved July 19, 2006.
  4. Mixter. "Six/Four System Protocol Specs," 2003. mixter@hacktivismo.com.
  5. Mixter. "The Six/Four System; A Decentralized Anonymous Peer-To-Peer Network Infrastructure With Trust," README file in Six/Four distribution, 2003.
  6. LaCroix, Norman E. "Hacktivismo_DoC_BIS.pdf Archived 2006-09-06 at the Wayback Machine ." United States Department of Commerce, January 2003. Retrieved April 20, 2006.
  7. Tectonic staff, "Secure messenger to guard against totalitarian governments Archived 2006-08-10 at the Wayback Machine ." Tectonic, July 21, 2006. Retrieved July 24, 2006.
  8. Doctorow, Cory, "ScatterChat: anonymous, secure chat Archived 2006-08-11 at the Wayback Machine ." Boing Boing blog post, July 22, 2006. Retrieved July 24, 2006.
  9. Murdoch, Steven J., "Protocol design is hard — Flaws in ScatterChat Archived 2014-04-26 at the Wayback Machine ." Light Blue Touchpaper blog post, August 11, 2006. Retrieved February 6, 2007.
  10. Schneier, Bruce, "ScatterChat." Schneier on Security blog post, July 31, 2006. Retrieved February 6, 2007.
  11. "Free anonymising browser debuts." BBC News Online , September 20, 2006. Retrieved September 22, 2006.
  12. Broersma, Matthew. "Activists unveil stealth browser Archived 2007-03-12 at the Wayback Machine ." ZDNet , September 22, 2006. Retrieved September 22, 2006.

Further reading