Final ethics project
I have read the article about Hacktivist, there are a lot
of story with people that people called “hacker” tried to use their expertise
and skill with their believe and ambition in the desire to get attention from
people that usually with bad action that result in making negative impact on
the target, but indeed they just the people turn back to look at something or
problem that people in the social overlook. Sometime people live their life
without caring for another people in social, just caring about their own live
or their benefit, and because of this sometime Hacktivist want to try to change
people’s attitude and aspect that people have for the better social, I think Hacktivist
is a powerful movement same like journalist that work with media to play their
role for social, but Hacktivist, or known as a hacker that have motivation to
do something as activist always use the bad action to get attention to people not
like journalist do. So, why Hacktivist have been looked as the entity or group
of people with dangerous more than to be looked as a good guy that tried to
help for the better social. Many times that Hacktivist tried to hack into some
system or cooperate or organize, they are just want to send the message or make
it to the public and want people to look back and change in something, not
intend to destroy data information, or steal sensitive information for a
financial purpose. Nowadays Hacktivism has come to have a lot more impact on social.
As I read the news about “Swagg Security or SwaggSec” the rising
hacker group that hacked Foxconn, iPhone manufacturer on February 8, 2012 to
gain access to the system resource and then releasing a sensitive massive
amount of data including email logins, server logins, trade-secret document and
even more alarming - bank account credentials of large companies like Apple,
and distributing information data though public by Bittorrent, a Peer-to-Peer (P2P)
protocol for file sharing in decentralize network that mean everyone have can share
the content independently over the Peer-to-Peer (P2P) system in the internet. Their
intention of Swagg Security is to releasing them to the people and the international
media in the world, in the ambition to have the large media organization reveal
the fact and want them to put the pressure on Foxconn. Swagg Security stages
the attack Foxconn to protest harsh working conditions.
Because Swagg Security want Foxconn and partner to deal
or change in employee’s life quality. As we saw in the news before about “The
explosion ripped through Building A5 on a Friday evening last May, an eruption
of fire and noise that twisted metal pipes as if they were discarded straws.
When workers in the cafeteria ran outside, they
saw black smoke pouring from shattered windows. It came from the area where
employees polished thousands of iPad cases a day. Two people were killed
immediately, and over a dozen others hurt. As the injured were rushed into
ambulances, one in particular stood out. His features had been smeared by the
blast, scrubbed by heat and violence until a mat of red and black had replaced
his mouth and nose.”
Swagg Security protesting harsh working conditions at
iPhone manufacturer Foxconn dumped what they said were a lot of private data will
belonging to the outsourcing big company, and the passwords inside these files
could allow individuals to make fraudulent orders under big companies like
Microsoft, Apple, IBM, and Swagg Security wrote in a message posted to Pastebin
"Be careful." The purported contents were made available in a torrent
file on The Pirate Bay, the large and popular torrent file hosting website. Several
Foxconn servers were reported as offline over the past few day. The stunt
coincided with protests planned at a half-dozen of Apple retail stores around
the world by demonstrators opposing the conditions of workers who manufacture
iPhones and other Apple hardware. A recent series carried by The New York Times
documented long hours, low pay, and an explosion that killed several workers at
Foxconn, which also makes hardware for Cisco, Dell, Sony, HP, and others.
As in the end, this
attack make Foxconn and partner have to announce to the public about
environment in the workplace and try to solve the problem. As in Hacktivist
role, this action is a bad activity, but it help the people aware of problem
that around them.