US petition seeks to make DDoS “a legal form of protesting”
- 11 January, 2013 12:00
An online petition to make distributed denial-of-service (DDoS) attacks a legalised form of free speech has been created on the whitehouse.gov website.
The creator of the petition believes DDoS is “not any form of hacking in any way” and is a legitimate form of protest with the advance of the Internet.
“It is the equivalent of repeatedly hitting the refresh button on a webpage. It is, in that way, no different than any 'occupy' protest,” the petition reads.
“Instead of a group of people standing outside a building to occupy the area, they are having their computer occupy a website to slow (or deny) service of that particular website for a short time.”
The creator of the petition is also requesting the US government to immediately release those gaoled for DDoS attacks and have these crimes removed from their records.
Hackivist group Anonymous has shown support for the petition. The @YourAnonNews Twitter account posted: “It’s legal in Germany so why not here? Sign this petition to declare DDoS a form of 1st Amendment-protected speech.”
Anonymous has used DDoS for political protests, such as its DDoS attacks in 2010 against Swiss payment transaction firm PostFinance's website in retaliation for freezing an account set up by WikiLeaks founder Julian Assanage.
The petition has to reach 25,000 signatures by 6 February to receive a White House response. So far 1441 signatures have been made in support of making DDoS attacks legal.
Follow Rebecca Merrett on Twitter: @Rebecca_Merrett
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- Tech Exchange Presentation: Modern Approaches to the Backup and Recovery of Virtual Machines
- Cost Savings Through Virtual Patching
- Data Centre Consolidation Restructures Your IT Costs for Continued Growth
- Webroot® SecureAnywhere™ Business - Endpoint Protection Technocal Overview
- Virtualisation Solution Brief
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Getting Real About Security Management and Big Data – A Roadmap for Big Data in Security Analytics
It’s an exciting yet daunting time to be a security professional. Security threats are becoming more aggressive and voracious. This whitepaper examines the escalating complexity for the security management environment; how to get more meaning from data already collected and the combination of infrastructure, analytic tools and threat intelligence need to drive business value from Big Data. Download now.
Mobility Apps: What every developer should know
Learn how others have delivered industry-leading, multi-platform management and security solutions. In this whitepaper, we look how app developers can develop, deploy and manage apps that enterprises can rely on today and into the future. Click to download!
Benefits of Deploying Microsoft Exchange Server 2010 on Dell Compellent with Data Progression
Messaging and collaboration platforms have emerged as mission critical applications, consuming a large portion of IT spending for organisations. The rich features in these applications have significantly changed the messaging requirements and needs of today’s information from anywhere with any device, the result is an ever increasing demand on storage systems both in terms of capacity and bandwidth. Many organisations are rethinking their storage strategies to meet the demanding criteria and to handle the future requirements. Read more.