SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
Anonymous
Who are they ? What are they doing ? What are they looking for ?




English presentation made by Paul and Nasser


                                                                   Page 1
Anonymous
Plan of the presentation

 Who are they ?
 • Presentation of the group
 • Ideas defended by Anonymous
 • « Symbols » of Anonymous group


 What they did, What they do, What they will do ?

 • List of operations and explications
 In the past, present and in the future




 Conclusion, What can we think of the group?




                                                    Page 2
Anonymous




            WHO ARE THEY ?

                             Page 3
Anonymous
Who are they ? - Presentation of the group

  Some people on the internet :
  Hackers, computer scientists, students, ordinary people from 4Chan
  Anonymous does not have a leader or controlling group, but operates as a loose
  collective which share similar ideals and aims.

  Nobody knows How much members exist !

  They define themself as the new superconsciousness of the Internet.


                    “Anonymous is a group, in the sense that a flock of birds is a group.
                    How do you know they're a group? Because they're traveling in the
                     same direction. At any given moment, more birds could join, leave,
                                                  peel off in another direction entirely.”
                                                                   Anonymous member



                                                                                   Page 4
Anonymous
Who are they ? - Ideas defended by Anonymous

  Defends all « Freedom » on the Internet
 •   Against censors
 •   Against enemies of the piracy on Internet
 •   Against dictator
 •   “Freedom online and of course in life”


  Expose the dangers of cults
 • Church of Scientology
 • Westboro Baptist Church


 • Try to demonstrate, any governement can’t gouvern The internet
  #AntiSec - #SOPA - #Hadopi - #OpMegaupload




                                                                    Page 5
Anonymous
Who are they ? - « Symbols » of Anonymous group

  V for Vendetta’s Mask
 • Express the revenge against censorship
  Black suit and black tie
 • Express the “Anonymous” term : “We are everybody”

  Their slogan

 “We are anonymous, We are legion. We do not forgive. We do not forget, expect us”


   Their logo

   Their robotic voice on their video




                                                                             Page 6
Anonymous




   WHAT THEY DID / DO / WILL DO ?

                                Page 7
Anonymous
What they did ?

  January 2008 :
 Church of Scientology - Projet Chanology
 Against censorship of a video of Tom Cruise
 http://www.dailymotion.com/video/xagw2n_tom-cruise-scientologue-interview-
 i_shortfilms
            Doing some manifestation and putting down officials website
            of Scientology



  October 2010 :
 Wikileaks and Julian Assange - Operation Payback
 Against censorship of the Wikileaks website
        Attacked Websites / Entreprises who abandon WL
        (Visa / PostFinance.ch / PayPal)




                                                                              Page 8
Anonymous
What they did ?

  January 2011 :
 Tunisia - Operation Tunisia
 Against governements censorship and black-out
         Attack Officials Websites
         Set up proxy to bypass websites censored by the government
         (Like Youtube/Tweeter/FaceBook)




  March 2011 :
 Sony - Operation Sony
 Against Sony's lawsuit against George Hotz
         Attack Officials Sony websites




                                                                      Page 9
Anonymous
What they did ?

  June 2011 :
 ANTI SECURITY - Operation AntiSec
 Alliance with a famous group of hacker : Lulzec.
 A spirit alliance.

 Anonymous goal : Freedom, free speaking, no censorship
 Lulzec : Just do it … for fun !

 The first and unique goal of this operation : Steal and
 publish government information and demonstrate a simple
 thing : “Any government or enterprise can’t have or
 censure the internet”,




                                                           Page 10
Anonymous
What they did ?

  June 2011 – … today and tomorow :
 Resume of all action on Operation AntiSec
 June : The group released a collection of documents stolen from the
 Arizona Department of Public Safety, these document included officers forwarding racist chain emails, a
 Fraternal Order of Police member who is also a convicted sex offender.

 July : Operation : « Turkish Takedown Thursday », who brought down and replaced the content of 74 official
 Turkish website for denouncing supposed attempts at internet censorship by the Turkish government.
 On 21 July, Anonymous released two PDFs purportedly taken from servers belonging to NATO. The first two
 documents released relate to outsourcing communication and information services (CIS) in Kosovo and the
 funding request for the project.

 August : On 16, Anonymous gained access to the email account of Richard Garcia, former Assistant director
 in Charge of the FBI field office in Los Angeles and Senior Vice President of Vanguard Defense Industries,
 The group released 1 gigabyte of information three days later, all of it taken from Garcia's personal email
 account.
                                                                          More than 50 actions on 6 month :
                                For the complet list : go to http://en.wikipedia.org/wiki/Operation_AntiSec




                                                                                                      Page 11
Anonymous
What they did ?

      September 2011 – December 2011 :
     Occupy Wall Street
 It’s a protest movement
 • began September 17, 2011 in Zuccotti Park, located in New York City's
      Wall Street financial district.

 •     The protests are against social and economic inequality, high
       unemployment, greed, as well as corruption, and the undue influence
       of corporations—particularly from the financial services sector—on
       government.

 •     The protesters' slogan “We are the 99%” refers to the growing income
       and wealth inequality in the U.S. between the wealthiest 1% and the
       rest of the population.

     Member of Anonymous group have given vocal support to the
     Occupy Wall Street movement, with vast numbers of members attending local protests and several blogs run
     by members covering the movement extensively




                                                                                                      Page 12
Anonymous
What they do now ?

 They continue their actions by regularly posting messages on various means of
 expression available on the Internet :




                                                                                 Page 13
Anonymous
What they will do ?

 WHO KNOWS ?

 And to sum up that : A trailer about a new documentary : “We are legion”




                                                                            Page 14
Anonymous
Conclusion, What can we think of the group?



   A group which born in 2008.


   We don't actually know how many people it concern.


   The anonymous is an anachist group without known leader


   Their activities range from computer hacking to manifestations in the street


   It’s a phenomenon which has interested the media since the 2008 crisis




                                                                                   Page 15
Anonymous
Conclusion, What can we think of the group?




                                              And have you got any
 Thank you for listening
                                                   question ?
         to us




                                                           Page 16

Más contenido relacionado

La actualidad más candente

Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark WebMiteshWani
 
AI and Blockchain 2017
AI and Blockchain 2017AI and Blockchain 2017
AI and Blockchain 2017Peter Morgan
 
The dark web
The dark webThe dark web
The dark webBella M
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark webJisc
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?Pierluigi Paganini
 
Tor the onion router
Tor  the onion routerTor  the onion router
Tor the onion routerAshly Liza
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Anshu Prateek
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...Falgun Rathod
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityAbhimanyu Singh
 
OSINT e Ingeniería Social aplicada a las investigaciones
OSINT e Ingeniería Social aplicada a las investigacionesOSINT e Ingeniería Social aplicada a las investigaciones
OSINT e Ingeniería Social aplicada a las investigacionesemilianox
 

La actualidad más candente (20)

Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
 
AI and Blockchain 2017
AI and Blockchain 2017AI and Blockchain 2017
AI and Blockchain 2017
 
Deep web
Deep webDeep web
Deep web
 
The dark web
The dark webThe dark web
The dark web
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark web
 
Dark web
Dark webDark web
Dark web
 
The Dark web | Presentation
The Dark web | Presentation The Dark web | Presentation
The Dark web | Presentation
 
Dark wed
Dark wedDark wed
Dark wed
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?
 
Tor the onion router
Tor  the onion routerTor  the onion router
Tor the onion router
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
Osint
OsintOsint
Osint
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
PPT dark web
PPT dark webPPT dark web
PPT dark web
 
OSINT e Ingeniería Social aplicada a las investigaciones
OSINT e Ingeniería Social aplicada a las investigacionesOSINT e Ingeniería Social aplicada a las investigaciones
OSINT e Ingeniería Social aplicada a las investigaciones
 

Similar a Présentation of Anonymous group

Research Paper On Anonymous
Research Paper On AnonymousResearch Paper On Anonymous
Research Paper On AnonymousNicole Cochran
 
Wikileaks May Have Saved Tunisia From Political Disaster
Wikileaks May Have Saved Tunisia From Political DisasterWikileaks May Have Saved Tunisia From Political Disaster
Wikileaks May Have Saved Tunisia From Political DisasterShannon Olsen
 
Offline Activism - How successful activism facilitate social media
Offline Activism - How successful activism facilitate social mediaOffline Activism - How successful activism facilitate social media
Offline Activism - How successful activism facilitate social mediaWilson Fung
 
Personal Ethnography Report
Personal Ethnography ReportPersonal Ethnography Report
Personal Ethnography ReportChantel Marie
 
Film 260 Flipbook
Film 260 FlipbookFilm 260 Flipbook
Film 260 FlipbookKylie Myers
 
Silk Road Ethnography
Silk Road EthnographySilk Road Ethnography
Silk Road EthnographyLisa Olive
 
The Effects Of Internet On The Internet
The Effects Of Internet On The InternetThe Effects Of Internet On The Internet
The Effects Of Internet On The InternetJennifer Reither
 
FOSS and activism
FOSS and activismFOSS and activism
FOSS and activismsky croeser
 
Global Economic Meltdown Of 2008
Global Economic Meltdown Of 2008Global Economic Meltdown Of 2008
Global Economic Meltdown Of 2008Denise Hudson
 
How To Improve Your Essay Writing Skills - Dark Side O
How To Improve Your Essay Writing Skills - Dark Side OHow To Improve Your Essay Writing Skills - Dark Side O
How To Improve Your Essay Writing Skills - Dark Side ODawn Mora
 
Winter Writing Paper Lined .... Free To Use Free To Shar
Winter Writing Paper Lined .... Free To Use  Free To SharWinter Writing Paper Lined .... Free To Use  Free To Shar
Winter Writing Paper Lined .... Free To Use Free To SharSasha Jones
 
Common Elements Of Censorship In Fahrenheit 451 And 1984
Common Elements Of Censorship In Fahrenheit 451 And 1984Common Elements Of Censorship In Fahrenheit 451 And 1984
Common Elements Of Censorship In Fahrenheit 451 And 1984Claudia Brown
 
World War 1 Essay Conclusion
World War 1 Essay ConclusionWorld War 1 Essay Conclusion
World War 1 Essay ConclusionJill Johnson
 
Topic Sentence Examples For Compare And Contrast Essay Conclusion
Topic Sentence Examples For Compare And Contrast Essay ConclusionTopic Sentence Examples For Compare And Contrast Essay Conclusion
Topic Sentence Examples For Compare And Contrast Essay ConclusionMelody Rios
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESJenny O'Meara
 
How to engage your audience with a call to action
How to engage your audience with a call to actionHow to engage your audience with a call to action
How to engage your audience with a call to actionDonata Columbro
 
Rockefeller And Carnegie
Rockefeller And CarnegieRockefeller And Carnegie
Rockefeller And CarnegieDonna Castro
 
Microsoft makes money by designing, writing, and selling software. B.docx
Microsoft makes money by designing, writing, and selling software. B.docxMicrosoft makes money by designing, writing, and selling software. B.docx
Microsoft makes money by designing, writing, and selling software. B.docxdrennanmicah
 

Similar a Présentation of Anonymous group (20)

Social Media For Peace
Social Media For PeaceSocial Media For Peace
Social Media For Peace
 
Research Paper On Anonymous
Research Paper On AnonymousResearch Paper On Anonymous
Research Paper On Anonymous
 
Wikileaks May Have Saved Tunisia From Political Disaster
Wikileaks May Have Saved Tunisia From Political DisasterWikileaks May Have Saved Tunisia From Political Disaster
Wikileaks May Have Saved Tunisia From Political Disaster
 
Offline Activism - How successful activism facilitate social media
Offline Activism - How successful activism facilitate social mediaOffline Activism - How successful activism facilitate social media
Offline Activism - How successful activism facilitate social media
 
National Mall Protest
National Mall ProtestNational Mall Protest
National Mall Protest
 
Personal Ethnography Report
Personal Ethnography ReportPersonal Ethnography Report
Personal Ethnography Report
 
Film 260 Flipbook
Film 260 FlipbookFilm 260 Flipbook
Film 260 Flipbook
 
Silk Road Ethnography
Silk Road EthnographySilk Road Ethnography
Silk Road Ethnography
 
The Effects Of Internet On The Internet
The Effects Of Internet On The InternetThe Effects Of Internet On The Internet
The Effects Of Internet On The Internet
 
FOSS and activism
FOSS and activismFOSS and activism
FOSS and activism
 
Global Economic Meltdown Of 2008
Global Economic Meltdown Of 2008Global Economic Meltdown Of 2008
Global Economic Meltdown Of 2008
 
How To Improve Your Essay Writing Skills - Dark Side O
How To Improve Your Essay Writing Skills - Dark Side OHow To Improve Your Essay Writing Skills - Dark Side O
How To Improve Your Essay Writing Skills - Dark Side O
 
Winter Writing Paper Lined .... Free To Use Free To Shar
Winter Writing Paper Lined .... Free To Use  Free To SharWinter Writing Paper Lined .... Free To Use  Free To Shar
Winter Writing Paper Lined .... Free To Use Free To Shar
 
Common Elements Of Censorship In Fahrenheit 451 And 1984
Common Elements Of Censorship In Fahrenheit 451 And 1984Common Elements Of Censorship In Fahrenheit 451 And 1984
Common Elements Of Censorship In Fahrenheit 451 And 1984
 
World War 1 Essay Conclusion
World War 1 Essay ConclusionWorld War 1 Essay Conclusion
World War 1 Essay Conclusion
 
Topic Sentence Examples For Compare And Contrast Essay Conclusion
Topic Sentence Examples For Compare And Contrast Essay ConclusionTopic Sentence Examples For Compare And Contrast Essay Conclusion
Topic Sentence Examples For Compare And Contrast Essay Conclusion
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
How to engage your audience with a call to action
How to engage your audience with a call to actionHow to engage your audience with a call to action
How to engage your audience with a call to action
 
Rockefeller And Carnegie
Rockefeller And CarnegieRockefeller And Carnegie
Rockefeller And Carnegie
 
Microsoft makes money by designing, writing, and selling software. B.docx
Microsoft makes money by designing, writing, and selling software. B.docxMicrosoft makes money by designing, writing, and selling software. B.docx
Microsoft makes money by designing, writing, and selling software. B.docx
 

Último

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum ComputingGDSC PJATK
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?SANGHEE SHIN
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIUdaiappa Ramachandran
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdfJamie (Taka) Wang
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncObject Automation
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 

Último (20)

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AI
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation Inc
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 

Présentation of Anonymous group

  • 1. Anonymous Who are they ? What are they doing ? What are they looking for ? English presentation made by Paul and Nasser Page 1
  • 2. Anonymous Plan of the presentation Who are they ? • Presentation of the group • Ideas defended by Anonymous • « Symbols » of Anonymous group What they did, What they do, What they will do ? • List of operations and explications In the past, present and in the future Conclusion, What can we think of the group? Page 2
  • 3. Anonymous WHO ARE THEY ? Page 3
  • 4. Anonymous Who are they ? - Presentation of the group  Some people on the internet : Hackers, computer scientists, students, ordinary people from 4Chan Anonymous does not have a leader or controlling group, but operates as a loose collective which share similar ideals and aims.  Nobody knows How much members exist ! They define themself as the new superconsciousness of the Internet. “Anonymous is a group, in the sense that a flock of birds is a group. How do you know they're a group? Because they're traveling in the same direction. At any given moment, more birds could join, leave, peel off in another direction entirely.” Anonymous member Page 4
  • 5. Anonymous Who are they ? - Ideas defended by Anonymous  Defends all « Freedom » on the Internet • Against censors • Against enemies of the piracy on Internet • Against dictator • “Freedom online and of course in life”  Expose the dangers of cults • Church of Scientology • Westboro Baptist Church • Try to demonstrate, any governement can’t gouvern The internet  #AntiSec - #SOPA - #Hadopi - #OpMegaupload Page 5
  • 6. Anonymous Who are they ? - « Symbols » of Anonymous group  V for Vendetta’s Mask • Express the revenge against censorship  Black suit and black tie • Express the “Anonymous” term : “We are everybody”  Their slogan “We are anonymous, We are legion. We do not forgive. We do not forget, expect us”  Their logo  Their robotic voice on their video Page 6
  • 7. Anonymous WHAT THEY DID / DO / WILL DO ? Page 7
  • 8. Anonymous What they did ?  January 2008 : Church of Scientology - Projet Chanology Against censorship of a video of Tom Cruise http://www.dailymotion.com/video/xagw2n_tom-cruise-scientologue-interview- i_shortfilms Doing some manifestation and putting down officials website of Scientology  October 2010 : Wikileaks and Julian Assange - Operation Payback Against censorship of the Wikileaks website Attacked Websites / Entreprises who abandon WL (Visa / PostFinance.ch / PayPal) Page 8
  • 9. Anonymous What they did ?  January 2011 : Tunisia - Operation Tunisia Against governements censorship and black-out Attack Officials Websites Set up proxy to bypass websites censored by the government (Like Youtube/Tweeter/FaceBook)  March 2011 : Sony - Operation Sony Against Sony's lawsuit against George Hotz Attack Officials Sony websites Page 9
  • 10. Anonymous What they did ?  June 2011 : ANTI SECURITY - Operation AntiSec Alliance with a famous group of hacker : Lulzec. A spirit alliance. Anonymous goal : Freedom, free speaking, no censorship Lulzec : Just do it … for fun ! The first and unique goal of this operation : Steal and publish government information and demonstrate a simple thing : “Any government or enterprise can’t have or censure the internet”, Page 10
  • 11. Anonymous What they did ?  June 2011 – … today and tomorow : Resume of all action on Operation AntiSec June : The group released a collection of documents stolen from the Arizona Department of Public Safety, these document included officers forwarding racist chain emails, a Fraternal Order of Police member who is also a convicted sex offender. July : Operation : « Turkish Takedown Thursday », who brought down and replaced the content of 74 official Turkish website for denouncing supposed attempts at internet censorship by the Turkish government. On 21 July, Anonymous released two PDFs purportedly taken from servers belonging to NATO. The first two documents released relate to outsourcing communication and information services (CIS) in Kosovo and the funding request for the project. August : On 16, Anonymous gained access to the email account of Richard Garcia, former Assistant director in Charge of the FBI field office in Los Angeles and Senior Vice President of Vanguard Defense Industries, The group released 1 gigabyte of information three days later, all of it taken from Garcia's personal email account. More than 50 actions on 6 month : For the complet list : go to http://en.wikipedia.org/wiki/Operation_AntiSec Page 11
  • 12. Anonymous What they did ?  September 2011 – December 2011 : Occupy Wall Street It’s a protest movement • began September 17, 2011 in Zuccotti Park, located in New York City's Wall Street financial district. • The protests are against social and economic inequality, high unemployment, greed, as well as corruption, and the undue influence of corporations—particularly from the financial services sector—on government. • The protesters' slogan “We are the 99%” refers to the growing income and wealth inequality in the U.S. between the wealthiest 1% and the rest of the population. Member of Anonymous group have given vocal support to the Occupy Wall Street movement, with vast numbers of members attending local protests and several blogs run by members covering the movement extensively Page 12
  • 13. Anonymous What they do now ? They continue their actions by regularly posting messages on various means of expression available on the Internet : Page 13
  • 14. Anonymous What they will do ? WHO KNOWS ? And to sum up that : A trailer about a new documentary : “We are legion” Page 14
  • 15. Anonymous Conclusion, What can we think of the group?  A group which born in 2008.  We don't actually know how many people it concern.  The anonymous is an anachist group without known leader  Their activities range from computer hacking to manifestations in the street  It’s a phenomenon which has interested the media since the 2008 crisis Page 15
  • 16. Anonymous Conclusion, What can we think of the group? And have you got any Thank you for listening question ? to us Page 16