Virtual Sit-in Countermeasure Examples

 
June 10, 1998: Mexican Government Strikes Back
The Mexican Government or programmers hired by the government developed a countermeasure for the June 10 FloodNet target, Secretaria de Gobernacion's web site. The Electronic Disturbance Theater believes the following is what happened:
JavaScript was placed in the Secretaria de Gobernacion's website that was designed to activate whenever FloodNet was directed toward it. Upon activation, the Gobernacion site would open window after window on the FloodNet user's browser. If the FloodNet user remained connected long enough, the Secretaria de Gobernacion's website caused their browser to crash; whether it be Netscape or Explorer.

September 9, 1998: Pentagon Strikes Back
Pentagon programmers developed a countermeasure for the Sept. 9th Electronic Civil Disobedience FloodNet performance. The Electronic Disturbance Theater believes the following is what happened:
A Java Applet named "Hostile Applet" was placed in the Pentagon website. "Hostile Applet" was activated whenever FloodNet was directed toward it. Upon activation, the Pentagon site would open the same blank window over and again on the FloodNet user's browser. The Pentagon's "Hostile Applet" quickly crashed the user's browser.
 
 

back to foyer