Browse Definitions:
Definition

Anonymous

Anonymous is a loosely organized hacktivist collective created to promote free speech, unimpeded access to information, and transparency in government and corporate activities.  The collective's slogan "We are Legion" refers to both the group's numbers and the anonymity of its members.

Anonymous comprises a diverse group of individuals connecting through social networking sites, forums and blogs scattered all over the world. Although the group was initially known for online pranks, it has become more serious and political in recent years. 

Activities of Anonymous have included the following:

  • In December 2010, Anonymous targeted the websites of organizations that it considered hostile to WikiLeaks or its founder Julian Assange.
  • In August 2011, Anonymous sent out a mass email/fax bomb to San Francisco Bay Area Rapid Transit's personnel and organized multiple protests at the network's Civic Center station, in response to a shutdown of cell phone service. The shutdown was an attempt to prevent the organization of a non-violent assembly protesting a police shooting.
  • In October 2011, the collective took down 40 child pornography sites, published the names of over 1500 users of those Web sites, and suggested that the FBI and Interpol follow up.
  • Throughout the latter half of 2011, the group was also involved in the organization and support of the Occupy Wall Street movement.
  • In January 2012, the collective attacked the United States Justice Department, as well as those belonging to several major entertainment industry organizations. The attack was in response to the government's seizure of Megaupload, a locker service that allows anonymous file transfers.
  • In April 2012, Anonymous took several U.K. government websites offline, as a protest against what it called the country’s “draconian surveillance proposals” and “derogation of civil rights.” The denial of service (DoS) was a response to the proposed "Patriot Act," which would allow government monitoring of all phone calls, emails, social network and Web traffic.
  • On June 17, 2015, Anonymous targeted Canadian government websites with a DoS attack in protest of the passage of bill C-51, so-called anti-terror legislation that grants additional powers to Canadian intelligence agencies, arguably infringing on the rights of citizens to privacy and freedom of speech.
  • In November 2015, Anonymous announced a major, sustained operation against ISIS following the Paris terrorist attacks. The group claimed to have taken over 5,000 ISIS members offline within days of the attacks.
This was last updated in November 2015

Continue Reading About Anonymous

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close