Hacking & Hacktivism

Embed Size (px)

Citation preview

  • 7/29/2019 Hacking & Hacktivism

    1/29

    HACKING & HACKTIVISM

    Muhammad Rashidi Bin Razali (2010391069)

    Muhamad Fadzile Bin Abd Malek (2010158019)

    Muhammad Haziq Bin Mazlan (2010715319)

  • 7/29/2019 Hacking & Hacktivism

    2/29

    TOPICS COVERED IN THIS PRESENTATION

    HISTORY OF HACKING

    PURPOSE OF HACKING

    EFFECT OF HACKING

    HACKTIVISM OR POLITICAL HACKING IN MALAYSIA

    SOLUTION TAKEN & THE LAW IMPLEMENTED IN MALAYSIA

    INTRODUCTION

    CONCLUSION

  • 7/29/2019 Hacking & Hacktivism

    3/29

    HISTORY OF HACKING1960s

    MITs artificial lab

    Ken Thompson invented UNIX

    1970sDennis Ritchie invented C

    1980s

    Cyber Space coined

    414s arrestedTwo hacker group formed

    1990s

    National Crackdown on hackers

    Kevin Mitnick arrestedMicrosofts NT operating system

  • 7/29/2019 Hacking & Hacktivism

    4/29

    World Most Famous Hacker

    Stephen wozniak

    Tsutomu Shimomura

    Kevin Mitnick

    At the time of his arrest, he was the

    most-wanted computer criminal in the

    United States.

  • 7/29/2019 Hacking & Hacktivism

    5/29

    INTRODUCTION

    Hacker is a person who access computer system and network

    without authorization

    There are 3 types of hacker which is white hat, black hat and

    grey hat

    Hacker hierarchy is divided into there which is script kiddies,

    intermediate hackers and elite hackers

  • 7/29/2019 Hacking & Hacktivism

    6/29

    PURPOSE OF HACKING

    To steal

    Money

    Important data / information

    To test their knowledge in understanding network and

    computer system

    To harm someones privacy

    To become a cyber warrior

    To espionage other people

  • 7/29/2019 Hacking & Hacktivism

    7/29

    EFFECT OF HACKING

    Data loss

    Increasing maintenance cost

    Negative reputation

  • 7/29/2019 Hacking & Hacktivism

    8/29

    HACKTIVISM OR POLITICAL HACKING IN MALAYSIA

    Hactivism

    The act of hacking, or breaking into computer system,for a political or socially motivated purpose. The

    individual who performs an act of hacktivism is said to

    be a hacktivist.

    They uses the same tools and techniques as a hacker,

    but does so in order to disrupt services and bring

    attention to a political or social cause.

  • 7/29/2019 Hacking & Hacktivism

    9/29

  • 7/29/2019 Hacking & Hacktivism

    10/29

    Greetings, Malaysia, We have seen the censorship taken by the Malaysian

    government, blocking sites like The Pirate Bay, and WikiLeaks. Malaysia is one of the

    worlds strictest governments, even blocking out movies, and television shows. Theseacts of censorship are inexcusable. You are taking away a basic human right. The

    internet is here for freedom, without fear of government interference. Do not think

    that no one else notices. Your structured government has done the talking, and we

    hear loud and clear. Let this be an announcement to all your people. This is a sign, a

    warning, and an opportunity to listen to ideas above your own. In a way you are

    being stubborn. But how will this help anyone or your country. We fear that if youmake further decisions to take away human freedom. We are obligated to act fast

    and have no mercy. For rules were meant to be broken. And corruption was meant to

    be washed away and forgiven. Now we will wash your corruption away so be

    prepared. Take this as a favor.

    We are Anonymous.

    THEIR MESSAGE

  • 7/29/2019 Hacking & Hacktivism

    11/29

    This happen when Harimau Malaya won against Garuda

    Indonesia in AFF Suzuki Cup 2010.

    Attacked launched by angry Indonesian Hackers because they

    could not accept their team defeated.

    Indonesia attacked Malaysia

  • 7/29/2019 Hacking & Hacktivism

    12/29

    UiTM Website Hacked!

  • 7/29/2019 Hacking & Hacktivism

    13/29

    This is a message the hacker leave at the website.

    You never learnYou never learnYou never learnI email you

    remember? And I notice you have changed, most of the

    password after that. (And thanks to unknown Wifi owner,

    borrow your line for a while ya!)

    THEIR MESSAGE

  • 7/29/2019 Hacking & Hacktivism

    14/29

    SabahTourism.com Hacked + leaked

    Tour Malaysia (Not Tourism Malaysia) Hacked

    Tourism Malaysia Unaffected

    UiTM Penang Hacked

    JBiotech Hacked

    Social Welfare Department (Ezi2Care) Hacked

    CIDB Hacked but back up 12:20am

    Land Public Transport Commision Hacked but back up 12:15am 1Malaysia DoS / Switched off 3:45am

    Malaysian Communications and Multimedia CommissionUnaffected

    ASEANConnect DoS / Switched off

    Malaysian Meteorological Service DoS / Switched off

    List of website hacked by Indonesia hackers

  • 7/29/2019 Hacking & Hacktivism

    15/29

    Ministry of Education DoS / Switched off

    Suruhanjaya Pilihanraya Malaysia DoS / Switched off

    Bomba - DoS / Switched off TMNet Unaffected

    Perbendaharaan Malaysia - DoS / Switched off

    Kementerian Kerja Raya Malaysia - DoS / Switched off

    Parlimen Malaysia DoS / Switched off

    Malaysian Treasury DoS / Switched off

    University Kebangsaan Malaysia DoS / Switched off

    Jobs Malaysia DoS / Switched off

    Information, Communications and Culture DoS / Switched off

    Human Resouce Ministry DoS / Switched off 3:59am

    National Sports Council DoS / Switched off

    Polis Diraja Malaysia (PDRM) DoS / Switched off

    List of website hacked by Indonesia hackers (cont)

  • 7/29/2019 Hacking & Hacktivism

    16/29

    Myanmar attacked Malaysia

  • 7/29/2019 Hacking & Hacktivism

    17/29

    This issues was find at blog. The url is http://blog.wanzul.net/2012/isu-

    myanmar-rohingya-web-malaysia-di-hack/

    Why Myanmar attacked Malaysia :

    17 Ogos 2012, based on sermons, the people of Myanmar now in serious

    condition.

    They were brutally murdered. Actually, this was already old things.

    However, its not be noted from "world". We as a neighbor of the Myanmar do not give attention to them but still

    focus on Palestin, Afghanistan and Arab.

    Maybe their intention is to alert us to give attention to them but, the way

    they do is not Halal.

    Myanmar attacked Malaysia (cont)

    http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/
  • 7/29/2019 Hacking & Hacktivism

    18/29

    Political Hacking in Malaysia

  • 7/29/2019 Hacking & Hacktivism

    19/29

    KUALA LUMPUR, Aug 18 Datuk Seri Anwar Ibrahims blog was hacked late last

    night and defaced with a fake post that portrayed him as an apologist for the

    Zionist regime in Israel.

    It also included an apology to Prime Minister Datuk Seri Najib Razak as part of

    the opposition leaders message ahead of the Aidilfitri celebration tomorrow.

    We understand a screen capture of the posting had been successfully recorded

    and is now being spread by Umno cybertroopers with the intention to discredit

    and defame Dato Seri Anwar Ibrahim, the blog administrator said.

    Malay daily Sinar Harian reported that the hackers had uploaded a message

    from Anwar, claiming he felt ashamed for his partys sinful extremist position

    chasing after the prime ministers office to the extent of defaming Najib and the

    lattersfamily.

    Political Hacking in Malaysia (cont)

  • 7/29/2019 Hacking & Hacktivism

    20/29

    Cyber law in Malaysia

    Some of the cyber law in Malaysia:

    Digital Signature Act 1997

    Computer Crimes Act 1997

    Copyright (Amendment) Act 1997

    Communication and Multimedia Act 1998

  • 7/29/2019 Hacking & Hacktivism

    21/29

    Digital Signature Act 1997

    Enforced on October 1998

    Secures electronic communications especially

    on the Internet

    Digital Signature is an identity verificationstandard using encryption techniques to

    protect against e-mail forgery. The encrypted code consists of the users

    name and a hash of all the parts of themessage.

  • 7/29/2019 Hacking & Hacktivism

    22/29

    By attaching the digital signature, one can

    ensure that nobody can eavesdrop, interceptor temper with the transmitted data.

    By doing so, a more secure and safe electronic

    communication could be done.

  • 7/29/2019 Hacking & Hacktivism

    23/29

    Computer Crimes Act 1997

    Protection against the misuses of computers andcomputer criminal activities are ensured by the

    Act. Example of crimes:

    Unauthorized use of programs

    Illegal transmission of data or messages over

    computers Hacking or cracking of computer systems and

    networks.

    Computer crimes are banned by this law. Those

    who disobey this law can be charged.

  • 7/29/2019 Hacking & Hacktivism

    24/29

    By implementing the Computer Crimes Act

    1997, computer users can now protect theirrights to privacy and build trust in the

    computer system.

    This Act also enable the government to track

    the illegal activities, thus reducing the cyber

    crimes cases.

  • 7/29/2019 Hacking & Hacktivism

    25/29

    Copyright (Amendment) Act

    1997

    Brought into force on April 1999.

    The Copyright (Amendment) Act amends theCopyright Act 1987 to extend copyright law to

    the new and converged multimedia

    environment. It serves to protect the expression of thought

    and creative ideas from unauthorized copying

    or alteration.

  • 7/29/2019 Hacking & Hacktivism

    26/29

    Communication and

    Multimedia Act 1998

    Endorsed in April 1999.

    The Communication and Multimedia Act 1998creates a new system of licenses and defines the

    roles and responsibilities of those providing

    communication and multimedia services.

    The implementation of Communication and

    Multimedia Act 1998 ensures that information is

    secure, the network is safe, reliable and the

    service is affordable all over Malaysia.

  • 7/29/2019 Hacking & Hacktivism

    27/29

    In Malaysia, you can use this Act for any cases

    regarding your internet service provider andsee whether they got accuses of part of this

    law.

    This Act also ensures high level of users

    confidence in the information and

    communication technology industry.

  • 7/29/2019 Hacking & Hacktivism

    28/29

    CONCLUSION

    Hacking is a good computing skill that can be

    used for good or bad intention. There is reason to do the hack, and there are

    ways to prevent it.

  • 7/29/2019 Hacking & Hacktivism

    29/29

    Q/A

    Thank you