Browse Definitions :
Definition

Anonymous

Anonymous is a loosely organized hacktivist collective created to promote free speech, unimpeded access to information, and transparency in government and corporate activities.  The collective's slogan "We are Legion" refers to both the group's numbers and the anonymity of its members.

Anonymous comprises a diverse group of individuals connecting through social networking sites, forums and blogs scattered all over the world. Although the group was initially known for online pranks, it has become more serious and political in recent years. 

Activities of Anonymous have included the following:

  • In December 2010, Anonymous targeted the websites of organizations that it considered hostile to WikiLeaks or its founder Julian Assange.
  • In August 2011, Anonymous sent out a mass email/fax bomb to San Francisco Bay Area Rapid Transit's personnel and organized multiple protests at the network's Civic Center station, in response to a shutdown of cell phone service. The shutdown was an attempt to prevent the organization of a non-violent assembly protesting a police shooting.
  • In October 2011, the collective took down 40 child pornography sites, published the names of over 1500 users of those Web sites, and suggested that the FBI and Interpol follow up.
  • Throughout the latter half of 2011, the group was also involved in the organization and support of the Occupy Wall Street movement.
  • In January 2012, the collective attacked the United States Justice Department, as well as those belonging to several major entertainment industry organizations. The attack was in response to the government's seizure of Megaupload, a locker service that allows anonymous file transfers.
  • In April 2012, Anonymous took several U.K. government websites offline, as a protest against what it called the country’s “draconian surveillance proposals” and “derogation of civil rights.” The denial of service (DoS) was a response to the proposed "Patriot Act," which would allow government monitoring of all phone calls, emails, social network and Web traffic.
  • On June 17, 2015, Anonymous targeted Canadian government websites with a DoS attack in protest of the passage of bill C-51, so-called anti-terror legislation that grants additional powers to Canadian intelligence agencies, arguably infringing on the rights of citizens to privacy and freedom of speech.
  • In November 2015, Anonymous announced a major, sustained operation against ISIS following the Paris terrorist attacks. The group claimed to have taken over 5,000 ISIS members offline within days of the attacks.
This was last updated in November 2015

Continue Reading About Anonymous

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close