Hacktivism

Even during the early days of the Internet in the 1990s, as volumes of personal data began to accumulate on servers around the world, computer security experts were concerned with non-authorized computer users accessing such information. These non-authorized users were called hackers; many were either hard-core computer engineers intrigued by the challenge of hacking, breaking into secured systems or criminals intent on committing identity theft, computer fraud, or worse. Since the dawn of the twenty-first century, however, there have emerged savvy hackers who have breached secure websites as part of a broader commitment to social or political activism, generally either whistleblowers motivated by idealism or cyberterrorists motivated by uncompromising political or military agendas. Dubbed hacktivists, their potential impact on public services, government agencies, banking institutions, and military operations have raised concerns over how best to secure such sites.

89550581-58336.jpg

Overview

Hacktivism first came to public awareness in 1989 when an antinuclear group inserted a worm into a network of government data-systems, including the Department of Defense and NASA, as a way to protest the presumption that their computer system—or really any computer system in a free society—had the right to be secured. Because hacktivists do not seek financial gain—indeed, they are most often disillusioned idealists—they represent a difficult challenge. After the September 11 terrorist attacks, as governments significantly improved their surveillance operations, the counter operations of hacktivists have become a matter of international security. Hacktivists will go to great lengths to ensure information transparency by proving that even the most tightly fortified information systems are vulnerable to attack.

Hacktivists view their actions as necessary acts of civil disobedience that are fundamental to the processes of democracy and freedom in which protest is both a right and an obligation in precipitating change when governments and corporations overstep their boundaries. Of course, hacktivists also target corporate sites—most often banks, military contractors, and environmental conglomerates. Most frequently they deploy a distributed denial-of-service attack (DDoS) that effectively shuts down the target’s Internet website. Or they deface the website with irreverent images and messages. They may spam the networks or tap into massive e-mail systems and flood the system with random messages. But, more broadly, hacktivists can also offer subversive communication systems when oppressive governments attempt to regulate or censor the Internet. Hacktivists were central in disseminating information during political uprisings in both Iraq and Egypt in the early 2010s through their deft use of social media. Hacktivists have also released protected information about human rights violations in numerous police states, thereby raising global awareness of such atrocities. In January 2015 the hacktivist group Anonymous took credit for hacking a French jihadist website as retaliation for the terror attack against Charlie Hebdo, a satirical periodical based in Paris, earlier that month. The following month Anonymous claimed responsibility for hacking hundreds of social media accounts linked with the self-proclaimed Islamic State of Iraq and Syria (ISIS).

More problematically, however, hacktivists have been in the vanguard of breaching government security sites and releasing classified documents on the Internet. The most notable the site to engage in this behavior was Wikileaks, founded by Australian computer hacker Julian Assange in 2006. Wikileaks was central to the case of Chelsea Manning, a US Army intelligence officer in Iraq who downloaded and passed on classified US government data to the website in 2010. She was found guilty of espionage and sentenced to jail. In 2013 National Security Agency contractor Edward Snowden downloaded and released thousands of classified security materials to the press regarding the US government’s mass surveillance programs, because he believed that only an informed public could make informed decisions. While Snowden viewed himself as a whistleblower and had inside access to the information, meaning he did not use formal hacktivist tactics to obtain it, his actions demonstrated that computer systems are just as vulnerable to internal hackers as they are to external, independent hacktivists. Most computer engineers concede that despite several successful government prosecutions and the millions spent on creating firewalls, random acts of hacktivism remain virtually unstoppable.

Bibliography

Andress, Jason, and Steve Winterfeld. Cyber Warfare: Techniques, Tactics and Tools for SecurityPractitioners. New York: Syngress Digital, 2011. Print.

Assange, Julian. Cyberpunks: Freedom and the Future of the Internet. New York: OR, 2012. Print.

Brenner, Joel. America the Vulnerable: Inside the Threat Matrix of Digital Espionage, Crimes, and Warfare. New York: Penguin, 2011. Print.

Chasmar, Jessica. “Anonymous Hacks Terror Website in Retaliation for Charlie Hebdo Attack.”Washington Times. Washington Times, 12 Jan. 2015.

Coleman, Gabriella. Coding Freedom: The Ethics and Aesthetics of Hacking. Princeton: Princeton UP, 2012. Print.

Jordan, Tim, and Paul Taylor. Hacktivism and Cyberwars: Rebels with a Cause? New York: Routledge, 2004. Print.

McCormick, Ty. “Hacktivism: A Short History.” Foreign Policy. Foreign Policy Group, 29 April 2013. Web. 21 Aug. 2013.

Olson, Parmy. We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. New York: Little, 2013. Print.

Petroff, Alanna. “Hundreds of ISIS Social Media Accounts Shut Down.” CNN Money (London). CNN, 10 Feb. 2015. Web. 22 Jun. 2015.

Scherer, Michael. “The Geeks Who Leak.” Time.com. Time, 24 June 24, 2013. Web. 21 Aug. 2013.