Key Terms/Definitions

Age-appropriate search engine

A tool for school-aged children to use which filters and condenses search results so that users cannot view inappropriate and irrelevant information/content while browsing the internet 1)http://www.bluecoatprimaryschool.com/media/E%20Safety/Child-Friendly_Seach_Engines.pdf

/b/

4chan’s oldest and most popular board where users post anonymously; it is known for its lack of enforced forum rules making it notorious for highly offensive or illegal content2)http://fimoculous.com/archive/post-5738.cfm

Bait

To troll an internet scammer by pretending to be interested in the falsified company/product order to waste said scammer’s time/collect useful information on the crime for law enforcement agencies and other consumers who could be affected, or simply for entertainment; could also be applied/used in terms of a social engineer luring victims to divulge sensitive information3)http://www.wired.co.uk/news/archive/2012-10/15/how-to-troll-a-scammer

/Baphomet/

A hacking news source community thread within 8chan that focuses specifically on “all news on recent hacks, exploits, danknet markets etc.” using “lulz” as a primary source of motivation. As a result, they often terrorize their subjects and release incriminating or highly sensitive information to others within the group for further exploitation.4)https://8ch.net/baphomet/index.html5)https://encyclopediadramatica.se/Baphomet

Clickjack(ing)

Malicious code is hidden behind a virtually harmless hyperlink that unsuspecting users are tricked into accessing, resulting in their computer and personal information being compromised/exploited6)http://whatis.techtarget.com/definition/clickjacking-user-interface-or-UI-redressing-and-IFRAME-overlay

Cross-site Scripting (XSS)

“Cross site scripting is an attack on the privacy of clients of a particular web site which can lead to a total breach of security when customer details are stolen or manipulated.”7)https://crypto.stanford.edu/cs155/papers/CSS.pdf

Cyberbullying

Bullying that is conducted in an online setting. This can be done by sending harassing messages to the victim, blackmailing the victim, spreading rumors about/shaming the victim using social media, or manipulating the victim using fake profiles/social media accounts. Like face-to-face bullying, victims can develop serious depression/anxiety, suffer damaged self-confidence, sever relationships, or self-harm in order to cope with the serious consequences of cyberbullying.8)http://www.stopbullying.gov/cyberbullying/

Cybermob

A group of people who collectively harass, manipulate, or threaten another person using mob mentality as a means of holding that person accountable for some real or imagined gaffe.9)https://feministfrequency.com/2015/12/10/harassment-through-impersonation-the-creation-of-a-cyber-mob/

Darknet

Not to be confused with the Deep Web; an overlay network that can be accessed using specific software; enables anonymous communication for the sake of file sharing, p2p connection through privacy networks like Tor.10)http://www.wired.com/2013/10/thompson/

Digital Alchemy

The search and subsequent evolution of outdated online media components, code or software so that they may thrive in the current market, as the face of the digital world evolves rapidly with technological innovation.11)http://www.cgw.com/Press-Center/Web-Exclusives/2015/Digital-Alchemy-Continued.aspx

DoS

Acronym for “denial of service”; often an attack which inhibits a user or users from establishing a network connection. This is usually done by overwhelming a network with information, preventing other users from accessing services like email, web browsing, etc.12)https://www.us-cert.gov/ncas/tips/ST04-015

Dox(x)

Doxing is the act of publishing someone’s personal information, of which there would be a reasonable expectation of privacy and dubious value to the conversation, in an environment that implies or encourages intimidation or threat.

Firewall

A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both.13)http://www.webopedia.com/TERM/F/firewall.html

Gaslighting

Coined by the 1938 play Gas Light; a form of psychological abuse in which the abuser selectively alters information so that the victim doubts themselves, becomes less confident, and instead increasingly dependent on the abuser. 14)http://www.elephantjournal.com/2015/08/gaslighting-the-mind-game-everyone-should-know-about/

GamerGate

A viral Twitter hashtag used to describe an ongoing controversy in which predominantly male video gamers harass/dox feminist game designers, journalists and bloggers under the guise that the movement preserves the integrity of gaming journalism.15)http://designislaw.tumblr.com/post/100651306295/the-gamification-of-terror-manufacturing

Hacker

A person who is actively involved in the programming community, and works and experiments with online systems (although other types could apply) to expose problems with software, internet security and/or online transparency. Hacking culture has made many important contributions to the technological community (one example is Unix). However, some hackers have ill intent in their work and often try to compromise others’ safety by collecting sensitive personal information without consent.16)http://www.catb.org/esr/faqs/hacker-howto.html#what_is17)http://www.catb.org/jargon/

Hacktivist

Coined in 1994 by Cult of the Dead Cow (cDc) member Omega; a person who uses computer networks to insight social change; hacking for political purposes.18)http://www.cultdeadcow.com/cDc_files/cDc-0384.php

IP Address

An IP address (internet protocol) is a computer’s unique series of numbers separated by periods which identifies the system communicating across a network.19)http://www.webopedia.com/TERM/I/IP_address.html

Internet Relay Chat Protocol (IRC)

“A teleconferencing system, which (through the use of the client-server model) is well-suited to running on many machines in a distributed fashion. A typical setup involves a single process (the server) forming a central point for clients (or other servers) to connect to, performing the required message delivery/multiplexing and other functions.”20)https://tools.ietf.org/html/rfc1459#section-1

Lulz

A variation of the online acronym LOL: laugh(ing) out loud. Signifies amusement in response to some form of online communication, especially at someone else’s expense.21)http://www.oxforddictionaries.com/us/definition/american_english/lulzhttp://www.collinsdictionary.com/dictionary/english/lulz

Pharm(ing)

An online attack which redirects traffic aimed at website to another fake site by exploiting vulnerabilities in server software, which then allows hackers to gather users’ sensitive personal information 22)http://www.computerworld.com/article/2889841/hackers-exploit-router-flaws-in-unusual-pharming-attack.html

Phish(ing)

Phishing scams use spoofed emails and websites as lures to prompt people to voluntarily hand over sensitive information like usernames/passwords, credit card information social security numbers, etc. 23)http://www.phishing.org/history-of-phishing/

Phreak(ing)

The practice of hacking phone (or other communication) networks to gain access to certain features that media companies may typically charge/exploit customers to use (ex from source: hacking the phone system to make free long distance calls).24)http://www.telephonetribute.com/phonephreaking.html

Reddit

Reddit is a social networking, news, and entertainment site where registered users can upload context and communicate with one another through a bulletin board/messageboard format. Through voting posts up or down, Reddit’s algorithm arranges posts’ positions on the site according to popularity. The site’s name is a play on words—“I read it on reddit.”25)https://www.reddit.com/wiki/faq#wiki_what_is_reddit.3F

Scam

A facetious or fraudulent ploy that takes advantage of victims in an online setting, usually resulting in the unsuspecting victim losing some sort of good (information, money, the victim’s computer may be compromised in some way, etc.)26)http://www.computerhope.com/jargon/s/scam.htm

Sexting

To send sexually explicit photos, images, text messages, or e-mails by using a cell phone, social media, web camera, or other mobile device. 27)http://www.dictionary.com/browse/sexting

Social Engineering

The act of psychological and emotional manipulation using fraudulent methods to compel people to give sensitive and confidential information, especially in an online setting.28)https://smallbluegreenblog.files.wordpress.com/2010/04/eicar98.pdf

Spoof(ing)

A situation in which one person or program successfully masquerades as another by falsifying data, thereby gaining an illegitimate advantage over the victim(s) so that their information can be used fraudulently upon disclosure. This can be done through web applications or telephone. (ex used in source: falsifying caller ID display info to coerce those accepting the call to give away sensitive information) 29)https://consumercomplaints.fcc.gov/hc/en-us/articles/202654304-Spoofing-and-Caller-ID

SWATTING

When a person or group of people draws police forces’ attention to another person or organization (i.e. filing an anonymous police report) in the hopes of instigating a police raid/investigation of the target 30)http://nationalreport.net/15-year-old-swatted-domestic-terrorism/#sthash.kEHvYW7e.dpuf

ThisTweetCalledMyBack

A Twitter hashtag started by seven popular black female activists in response to their work being appropriated and misused by mainstream media; these activists then decided to stop contributing content online in protest.31)http://atlantablackstar.com/2014/12/22/prominent-black-female-activists-twitter-launch-thistweetcalledmyback-social-media-black-mainstream-academics-steal-work/

Toolkit

A software or utility program that is used by programmers/developers to write and maintain applications.32)“http://www.pcmag.com/encyclopedia/term/52987/toolkit”

Tor

A program that can be ran on someone’s personal computer that conceals their activities, identity and location using a network of Tor users in order to expand their privacy when online. This is usually done using a browser which closes many privacy loopholes that are incorporated into unconcealed internet browsers.33)https://www.torproject.org/docs/faq#WhyCalledTor

Troll

To post deliberately inflammatory articles on an internet discussion board with the intention of offending, negatively provoking, or hurting someone; can also be used to signify someone who engages in this behavior as a means of taunting those affected and in turn engaging with them in arguments online; many trolls treat this method as an argumentative technique which degrades discourse.34)http://www.collinsdictionary.com/dictionary/english/troll

Trollstorm

Synonymous with cybermob; a group of people (trolls) who aim to collectively harass others in an online setting, usually for the sake of intimidating and/or oppressing those with opposing views

Virtual Private Network (VPN)

The extension of a private network that encompasses links across shared or public networks like the Internet. A VPN enables you to send data between two computers across a shared or public internetwork in a manner that emulates the properties of a point-to-point private link. The act of configuring and creating a virtual private network is known as virtual private networking. 35)https://technet.microsoft.com/en-us/library/bb742566.aspx

YourSlipIsShowing

A hashtag used in response to #EndFathersDay, which was an attempt by Men’s Rights Activists to divide feminist activists using fake Twitter accounts pretending to be feminists of color; #YourSlipIsShowing outed fake accounts and exposed the racism and sexism that black women experience online.36)http://www.clutchmagonline.com/2014/06/yourslipisshowing-busts-twitter-users-pretended-feminists-attack-black-women/

4chan

4chan is a messageboard/imageboard website, originally intended to be an unofficial sister site to 2chan.net—a Japanese imageboard. Users generally post anonymously, with the most recent posts appearing above the others. 4chan is split into various boards with each of their own specific content and guidelines, but it is popular for its often shocking or “not safe for work” (NSFW) content. Registration is not required or possible (except for by staff).37)https://www.4chan.org/news?all#2
38)http://gawker.com/346385/what-the-hell-are-4chan-ed-something-awful-and-b

8chan

Also called Infinitechan, is an imageboard website created as a spinoff from 4chan upon the parent site’s banning of all GamerGate threads, as site administrators identified the threads’ violation of community standards. Users create posts anonymously. The site is composed of user-created boards moderated by its respective creator, with minimal interaction from other site administration. The boards’ lack of administrative rules and community standards made it a favored alternative to 4chan. 39)https://8ch.net/faq.html

csov_logo_web_cropped

References   [ + ]

1. http://www.bluecoatprimaryschool.com/media/E%20Safety/Child-Friendly_Seach_Engines.pdf
2. http://fimoculous.com/archive/post-5738.cfm
3. http://www.wired.co.uk/news/archive/2012-10/15/how-to-troll-a-scammer
4. https://8ch.net/baphomet/index.html
5. https://encyclopediadramatica.se/Baphomet
6. http://whatis.techtarget.com/definition/clickjacking-user-interface-or-UI-redressing-and-IFRAME-overlay
7. https://crypto.stanford.edu/cs155/papers/CSS.pdf
8. http://www.stopbullying.gov/cyberbullying/
9. https://feministfrequency.com/2015/12/10/harassment-through-impersonation-the-creation-of-a-cyber-mob/
10. http://www.wired.com/2013/10/thompson/
11. http://www.cgw.com/Press-Center/Web-Exclusives/2015/Digital-Alchemy-Continued.aspx
12. https://www.us-cert.gov/ncas/tips/ST04-015
13. http://www.webopedia.com/TERM/F/firewall.html
14. http://www.elephantjournal.com/2015/08/gaslighting-the-mind-game-everyone-should-know-about/
15. http://designislaw.tumblr.com/post/100651306295/the-gamification-of-terror-manufacturing
16. http://www.catb.org/esr/faqs/hacker-howto.html#what_is
17. http://www.catb.org/jargon/
18. http://www.cultdeadcow.com/cDc_files/cDc-0384.php
19. http://www.webopedia.com/TERM/I/IP_address.html
20. https://tools.ietf.org/html/rfc1459#section-1
21. http://www.oxforddictionaries.com/us/definition/american_english/lulzhttp://www.collinsdictionary.com/dictionary/english/lulz
22. http://www.computerworld.com/article/2889841/hackers-exploit-router-flaws-in-unusual-pharming-attack.html
23. http://www.phishing.org/history-of-phishing/
24. http://www.telephonetribute.com/phonephreaking.html
25. https://www.reddit.com/wiki/faq#wiki_what_is_reddit.3F
26. http://www.computerhope.com/jargon/s/scam.htm
27. http://www.dictionary.com/browse/sexting
28. https://smallbluegreenblog.files.wordpress.com/2010/04/eicar98.pdf
29. https://consumercomplaints.fcc.gov/hc/en-us/articles/202654304-Spoofing-and-Caller-ID
30. http://nationalreport.net/15-year-old-swatted-domestic-terrorism/#sthash.kEHvYW7e.dpuf
31. http://atlantablackstar.com/2014/12/22/prominent-black-female-activists-twitter-launch-thistweetcalledmyback-social-media-black-mainstream-academics-steal-work/
32. “http://www.pcmag.com/encyclopedia/term/52987/toolkit”
33. https://www.torproject.org/docs/faq#WhyCalledTor
34. http://www.collinsdictionary.com/dictionary/english/troll
35. https://technet.microsoft.com/en-us/library/bb742566.aspx
36. http://www.clutchmagonline.com/2014/06/yourslipisshowing-busts-twitter-users-pretended-feminists-attack-black-women/
37. https://www.4chan.org/news?all#2
38. http://gawker.com/346385/what-the-hell-are-4chan-ed-something-awful-and-b
39. https://8ch.net/faq.html