Browse Definitions:
Definition

Anonymous

Anonymous is a loosely organized hacktivist collective created to promote free speech, unimpeded access to information, and transparency in government and corporate activities.  The collective's slogan "We are Legion" refers to both the group's numbers and the anonymity of its members.

Anonymous comprises a diverse group of individuals connecting through social networking sites, forums and blogs scattered all over the world. Although the group was initially known for online pranks, it has become more serious and political in recent years. 

Activities of Anonymous have included the following:

  • In December 2010, Anonymous targeted the websites of organizations that it considered hostile to WikiLeaks or its founder Julian Assange.
  • In August 2011, Anonymous sent out a mass email/fax bomb to San Francisco Bay Area Rapid Transit's personnel and organized multiple protests at the network's Civic Center station, in response to a shutdown of cell phone service. The shutdown was an attempt to prevent the organization of a non-violent assembly protesting a police shooting.
  • In October 2011, the collective took down 40 child pornography sites, published the names of over 1500 users of those Web sites, and suggested that the FBI and Interpol follow up.
  • Throughout the latter half of 2011, the group was also involved in the organization and support of the Occupy Wall Street movement.
  • In January 2012, the collective attacked the United States Justice Department, as well as those belonging to several major entertainment industry organizations. The attack was in response to the government's seizure of Megaupload, a locker service that allows anonymous file transfers.
  • In April 2012, Anonymous took several U.K. government websites offline, as a protest against what it called the country’s “draconian surveillance proposals” and “derogation of civil rights.” The denial of service (DoS) was a response to the proposed "Patriot Act," which would allow government monitoring of all phone calls, emails, social network and Web traffic.
  • On June 17, 2015, Anonymous targeted Canadian government websites with a DoS attack in protest of the passage of bill C-51, so-called anti-terror legislation that grants additional powers to Canadian intelligence agencies, arguably infringing on the rights of citizens to privacy and freedom of speech.
  • In November 2015, Anonymous announced a major, sustained operation against ISIS following the Paris terrorist attacks. The group claimed to have taken over 5,000 ISIS members offline within days of the attacks.
This was last updated in November 2015

Continue Reading About Anonymous

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchCloudProvider

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchSecurity

  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in ...

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • National Security Agency (NSA)

    The National Security Agency is the official U.S. cryptologic organization of the United States Intelligence Community under the ...

SearchHealthIT

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...

SearchDisasterRecovery

SearchStorage

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...

  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close