SlideShare una empresa de Scribd logo
1 de 12
Media Pitch
Shaun Evans
Hypothesis
I expect to find out more about the powers of
hacking on the internet and how hacking can
also be used for good instead of bad.
Relating my investigation to very current
stories such as Edward Snowden and the
NSA.
My Idea...
My idea for my essay is how hacking affects
our privacy. I could concentrate on the two
biggest organised hacking groups, Lulzsec
and Anonymous who both originated from
Reddit or Tumblr.
My idea continued...
I want to also concentrate on how hacking into
our systems means the hacker can access
nearly everything about us without us even
knowing. But at the same time, some
organised hacking operations are planned
for the good of people. For example, the
hacking group Anonymous brought down
multiple child porn websites from the
internet and found out information about
every single member of those websites and
leaked their information on the internet.
Why did I pick this subject?
The main reason I want to do my essay and
production about hacking is because many
people underestimate the power of hacking
and hacking is also a very current discussion
at the moment.
Also research USA Today, are you ready for a
cyber-attack (video)
List of texts to analyse
http://www.usatoday.com/story/tech/colum
nist/komando/2013/09/06/cyberattack-
hackers-syrian-electronic-army/2757833/
“How prepared are you for a cyberattack?”
http://smallbusiness.chron.com/effects-
computer-hacking-organization-17975.html
“The Effects of Computer Hacking on an
Organization”
Edward Snowden
I will also be concentrating on Edward
Snowden who revealed to the world that the
NSA is monitoring our internet searches and
what we do on a daily basis.
http://en.wikipedia.org/wiki/Edward_Snowde
n
Many support Snowden’s work calling him
patriotic but a lot of others see him as
against his country.
The NSA
The NSA (National Security Agency) may not
be a hacking organisation but they are
monitoring everything we search for on the
internet, meaning our privacy is breached.
The NSA could be related to the theory of the
hypodermic needle, because they have
brainwashed the public into believing
Edward Snowden is a criminal. Also, then
the public jump on this bandwagon and call
Snowden a criminal or a traitor, when they
don’t understand what he did.
Anonymous and Lulz Security
Both groups originated from websites such as
Reddit and Tumblr, but both groups are
completely different in their motives.
Lulz Security hack into websites and
companies for a joke or for the “lulz”.
Whereas Anonymous are a lot more serious,
hacking into illegal websites and bringing
them down, also helping the smaller person
such as civilians in third world countries.
Meaning they have been sometimes named
the “Robin Hoods of the cyber world”
Lulzsec
http://www.news.com.au/technology/sophos
-says-lulz-security-effective-as-schoolboys-
boasting-about-imaginary-girlfriends/story-
e6frfro0-1226076458883
“Lulz Security about as effective as
‘schoolboys boasting about imaginary
girlfriends’”
“Developing: Anonymous is currently keeping
multiple child porn websites offline right
now for #OpAlice: @reportapedo.
#TangoDown” - Anonymous
(@AnonOpsLegion)
http://www.news.com.au/technology/anony
mous-hackers-attack-north-korea-news-
website-flickr-account-and-twitter-
feed/story-e6frfro0-1226612875474
Linked Production
My linked production will be a film trailer
about two hackers who steal £50m from
bank accounts and get arrested and are
forced to work for the government against
cyber attacks from terrorists…
There will obviously be more but this is only a
brief description

Más contenido relacionado

Destacado

Sistem pakar
Sistem pakarSistem pakar
Sistem pakarIkhsan Bz
 
Science aug-2005-cardillo-et-al
Science aug-2005-cardillo-et-alScience aug-2005-cardillo-et-al
Science aug-2005-cardillo-et-alSamiullah Hamdard
 
12 Lessons from Content Marketing World 2013
12 Lessons from Content Marketing World 201312 Lessons from Content Marketing World 2013
12 Lessons from Content Marketing World 2013Lenovo
 
Content Marketing World Sydney: 125 tweeted takeaways
Content Marketing World Sydney: 125 tweeted takeawaysContent Marketing World Sydney: 125 tweeted takeaways
Content Marketing World Sydney: 125 tweeted takeawaysLenovo
 
UX STRAT Europe, Peter Boersma: Adding Strategists to the UX Team
UX STRAT Europe, Peter Boersma: Adding Strategists to the UX TeamUX STRAT Europe, Peter Boersma: Adding Strategists to the UX Team
UX STRAT Europe, Peter Boersma: Adding Strategists to the UX TeamUX STRAT
 
Manajemen keuangan bab 16
Manajemen keuangan bab 16Manajemen keuangan bab 16
Manajemen keuangan bab 16Lia Ivvana
 
Thesis on Human Malarial Infection in Afghan Refugees Camp Chakdara By Me
Thesis on Human Malarial Infection in Afghan Refugees Camp Chakdara By MeThesis on Human Malarial Infection in Afghan Refugees Camp Chakdara By Me
Thesis on Human Malarial Infection in Afghan Refugees Camp Chakdara By MeSamiullah Hamdard
 
Pertemuan 3 jurnal dan posting
Pertemuan 3 jurnal dan postingPertemuan 3 jurnal dan posting
Pertemuan 3 jurnal dan postingLia Ivvana
 
Khuda ki tareekh www.pdfbooksfree.blogspot.com
Khuda ki tareekh www.pdfbooksfree.blogspot.comKhuda ki tareekh www.pdfbooksfree.blogspot.com
Khuda ki tareekh www.pdfbooksfree.blogspot.comSamiullah Hamdard
 
Ohmslaw power (002)
Ohmslaw power (002)Ohmslaw power (002)
Ohmslaw power (002)Trnka
 
AuthorCurb2013Demo
AuthorCurb2013DemoAuthorCurb2013Demo
AuthorCurb2013DemoAuthorsCurb
 

Destacado (20)

Sistem pakar
Sistem pakarSistem pakar
Sistem pakar
 
Science aug-2005-cardillo-et-al
Science aug-2005-cardillo-et-alScience aug-2005-cardillo-et-al
Science aug-2005-cardillo-et-al
 
12 Lessons from Content Marketing World 2013
12 Lessons from Content Marketing World 201312 Lessons from Content Marketing World 2013
12 Lessons from Content Marketing World 2013
 
Content Marketing World Sydney: 125 tweeted takeaways
Content Marketing World Sydney: 125 tweeted takeawaysContent Marketing World Sydney: 125 tweeted takeaways
Content Marketing World Sydney: 125 tweeted takeaways
 
Dapodik 2013
Dapodik 2013Dapodik 2013
Dapodik 2013
 
UX STRAT Europe, Peter Boersma: Adding Strategists to the UX Team
UX STRAT Europe, Peter Boersma: Adding Strategists to the UX TeamUX STRAT Europe, Peter Boersma: Adding Strategists to the UX Team
UX STRAT Europe, Peter Boersma: Adding Strategists to the UX Team
 
Digital rangefinder
Digital rangefinderDigital rangefinder
Digital rangefinder
 
Manajemen keuangan bab 16
Manajemen keuangan bab 16Manajemen keuangan bab 16
Manajemen keuangan bab 16
 
Thesis on Human Malarial Infection in Afghan Refugees Camp Chakdara By Me
Thesis on Human Malarial Infection in Afghan Refugees Camp Chakdara By MeThesis on Human Malarial Infection in Afghan Refugees Camp Chakdara By Me
Thesis on Human Malarial Infection in Afghan Refugees Camp Chakdara By Me
 
Pertemuan 3 jurnal dan posting
Pertemuan 3 jurnal dan postingPertemuan 3 jurnal dan posting
Pertemuan 3 jurnal dan posting
 
Khuda ki tareekh www.pdfbooksfree.blogspot.com
Khuda ki tareekh www.pdfbooksfree.blogspot.comKhuda ki tareekh www.pdfbooksfree.blogspot.com
Khuda ki tareekh www.pdfbooksfree.blogspot.com
 
Ohmslaw power (002)
Ohmslaw power (002)Ohmslaw power (002)
Ohmslaw power (002)
 
The Bible the Quran Science
The Bible the Quran ScienceThe Bible the Quran Science
The Bible the Quran Science
 
Cell Best Described
Cell Best DescribedCell Best Described
Cell Best Described
 
AuthorCurb2013Demo
AuthorCurb2013DemoAuthorCurb2013Demo
AuthorCurb2013Demo
 
Islam 2
Islam 2Islam 2
Islam 2
 
Kaustav_Resume
Kaustav_ResumeKaustav_Resume
Kaustav_Resume
 
тема самоосвіти
тема самоосвітитема самоосвіти
тема самоосвіти
 
Quimica presentacion
Quimica presentacionQuimica presentacion
Quimica presentacion
 
2. ηθικη
2. ηθικη2. ηθικη
2. ηθικη
 

Similar a Media Pitch

Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESJenny O'Meara
 
The digital divide in the post-Snowden era
The digital divide in the post-Snowden eraThe digital divide in the post-Snowden era
The digital divide in the post-Snowden eraIan Clark
 
The story behind the stuxnet virus bruce schneier
The story behind the stuxnet virus bruce schneierThe story behind the stuxnet virus bruce schneier
The story behind the stuxnet virus bruce schneierAykut Özmen
 
2600 v16 n4 (winter 1999)
2600 v16 n4 (winter 1999)2600 v16 n4 (winter 1999)
2600 v16 n4 (winter 1999)Felipe Prado
 
Reply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docxReply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docxcarlt4
 
GOVERNMENT SURVEILANCE
GOVERNMENT SURVEILANCEGOVERNMENT SURVEILANCE
GOVERNMENT SURVEILANCEYusuf Qadir
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of PrivacyDiane Allen
 

Similar a Media Pitch (8)

Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
The digital divide in the post-Snowden era
The digital divide in the post-Snowden eraThe digital divide in the post-Snowden era
The digital divide in the post-Snowden era
 
The Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era PresentationThe Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era Presentation
 
The story behind the stuxnet virus bruce schneier
The story behind the stuxnet virus bruce schneierThe story behind the stuxnet virus bruce schneier
The story behind the stuxnet virus bruce schneier
 
2600 v16 n4 (winter 1999)
2600 v16 n4 (winter 1999)2600 v16 n4 (winter 1999)
2600 v16 n4 (winter 1999)
 
Reply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docxReply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docx
 
GOVERNMENT SURVEILANCE
GOVERNMENT SURVEILANCEGOVERNMENT SURVEILANCE
GOVERNMENT SURVEILANCE
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 

Último

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 

Último (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 

Media Pitch

  • 2. Hypothesis I expect to find out more about the powers of hacking on the internet and how hacking can also be used for good instead of bad. Relating my investigation to very current stories such as Edward Snowden and the NSA.
  • 3. My Idea... My idea for my essay is how hacking affects our privacy. I could concentrate on the two biggest organised hacking groups, Lulzsec and Anonymous who both originated from Reddit or Tumblr.
  • 4. My idea continued... I want to also concentrate on how hacking into our systems means the hacker can access nearly everything about us without us even knowing. But at the same time, some organised hacking operations are planned for the good of people. For example, the hacking group Anonymous brought down multiple child porn websites from the internet and found out information about every single member of those websites and leaked their information on the internet.
  • 5. Why did I pick this subject? The main reason I want to do my essay and production about hacking is because many people underestimate the power of hacking and hacking is also a very current discussion at the moment. Also research USA Today, are you ready for a cyber-attack (video)
  • 6. List of texts to analyse http://www.usatoday.com/story/tech/colum nist/komando/2013/09/06/cyberattack- hackers-syrian-electronic-army/2757833/ “How prepared are you for a cyberattack?” http://smallbusiness.chron.com/effects- computer-hacking-organization-17975.html “The Effects of Computer Hacking on an Organization”
  • 7. Edward Snowden I will also be concentrating on Edward Snowden who revealed to the world that the NSA is monitoring our internet searches and what we do on a daily basis. http://en.wikipedia.org/wiki/Edward_Snowde n Many support Snowden’s work calling him patriotic but a lot of others see him as against his country.
  • 8. The NSA The NSA (National Security Agency) may not be a hacking organisation but they are monitoring everything we search for on the internet, meaning our privacy is breached. The NSA could be related to the theory of the hypodermic needle, because they have brainwashed the public into believing Edward Snowden is a criminal. Also, then the public jump on this bandwagon and call Snowden a criminal or a traitor, when they don’t understand what he did.
  • 9. Anonymous and Lulz Security Both groups originated from websites such as Reddit and Tumblr, but both groups are completely different in their motives. Lulz Security hack into websites and companies for a joke or for the “lulz”. Whereas Anonymous are a lot more serious, hacking into illegal websites and bringing them down, also helping the smaller person such as civilians in third world countries. Meaning they have been sometimes named the “Robin Hoods of the cyber world”
  • 11. “Developing: Anonymous is currently keeping multiple child porn websites offline right now for #OpAlice: @reportapedo. #TangoDown” - Anonymous (@AnonOpsLegion) http://www.news.com.au/technology/anony mous-hackers-attack-north-korea-news- website-flickr-account-and-twitter- feed/story-e6frfro0-1226612875474
  • 12. Linked Production My linked production will be a film trailer about two hackers who steal £50m from bank accounts and get arrested and are forced to work for the government against cyber attacks from terrorists… There will obviously be more but this is only a brief description