ABSTRACT the Rhetorical Construction of Hacktivism

Total Page:16

File Type:pdf, Size:1020Kb

ABSTRACT the Rhetorical Construction of Hacktivism ABSTRACT The Rhetorical Construction of Hacktivism: Analyzing the Anonymous Care Package Heather Suzanne Woods, M.A. Thesis Chairperson: Leslie A. Hahner, Ph.D. This thesis uncovers the ways in which Anonymous, a non-hierarchical, decentralized online collective, maintains and alters the notion of hacktivism to recruit new participants and alter public perception. I employ a critical rhetorical lens to an Anonymous-produced and –disseminated artifact, the Anonymous Care Package, a collection of digital how-to files. After situating Anonymous within the broader narrative of hacking and activism, this thesis demonstrates how the Care Package can be used to constitute a hacktivist identity. Further, by extending hacktivism from its purely technological roots to a larger audience, the Anonymous Care Package lowers the barrier for participation and invites action on behalf of would-be members. Together, the contents of the Care Package help constitute an identity for Anonymous hacktivists who are then encouraged to take action as cyberactivists. The Rhetorical Construction of Hacktivism: Analyzing the Anonymous Care Package by Heather Suzanne Woods, B.A. A Thesis Approved by the Department of Communication David W. Schlueter, Ph.D., Chairperson Submitted to the Graduate Faculty of Baylor University in Partial Fulfillment of the Requirements for the Degree of Master of Arts Approved by the Thesis Committee Leslie A. Hahner, Ph.D., Chairperson Martin J. Medhurst, Ph.D. James M. SoRelle, Ph.D. Accepted by the Graduate School May 2013 J. Larry Lyon, Ph.D., Dean Page bearing signatures is kept on file in the Graduate School Copyright © 2013 by Heather Suzanne Woods All rights reserved TABLE OF CONTENTS LIST OF FIGURES ......................................................................................................................... v ACKNOWLEDGMENTS .............................................................................................................. vi CHAPTER ONE .............................................................................................................................. 1 Introduction ......................................................................................................................... 1 History of Anonymous ............................................................................................... 3 Justification and Research Questions ....................................................................... 10 Method ..................................................................................................................... 14 Outline of Chapters .................................................................................................. 20 CHAPTER TWO ........................................................................................................................... 25 Literature Review ............................................................................................................. 25 Introduction .............................................................................................................. 25 Characteristics of a Social Movement: a Sociological and Rhetorical Perspective . 26 The Rhetoric of Social Movements ......................................................................... 30 Rhetorical Criticism, Dissent, and the Identity Turn ............................................... 33 The Communicative Characteristics of Digital Dissent ........................................... 38 The Rise of Hacktivism ............................................................................................ 43 The Beginnings of Anonymous Scholarship ........................................................... 48 Conclusion ............................................................................................................... 50 CHAPTER THREE ....................................................................................................................... 58 Analysis ............................................................................................................................ 58 Introduction .............................................................................................................. 58 Hacktivism as A Fluid Concept ............................................................................... 59 The Anonymous Care Package as a Generative and Instructional Text .................. 64 Branding and aesthetics: Anonymous is You! ..................................................... 67 The Mask .............................................................................................................. 68 Artwork ................................................................................................................. 75 Tools for Digital Dissent. ..................................................................................... 83 Taking It To the Streets ............................................................................................. 91 Conclusion ................................................................................................................ 97 CHAPTER FOUR ......................................................................................................................... 106 Conclusion ....................................................................................................................... 106 Introduction ............................................................................................................. 106 Supplementing the Literature Base ......................................................................... 107 Hacktivism as A Rhetorical Tactic and Term of Art .............................................. 109 The Constitutive Rhetoric of Anonymous .............................................................. 114 Limitations and Areas for Future Research ............................................................ 117 BIBLIOGRAPHY ......................................................................................................................... 124 iv LIST OF FIGURES Figure 1: The Guy Fawkes Mask ................................................................................... 79 Figure 2: Business Man Assemblage ............................................................................. 88 Figure 3: Anonymous Globe/Map Logo ........................................................................ 88 v ACKNOWLEDGMENTS Foremost I wish to express gratitude to my advisor and mentor Dr. Leslie Hahner. Dr. Hahner has been a supportive and inspirational figure throughout my time at Baylor University. In her role as thesis advisor, Dr. Hahner spent countless hours reviewing my work, offering equal parts critique, wisdom, and humor in her comments. I will be forever grateful for her insistence that I push myself beyond my comfort zone; her dedication to my work challenges me to become a better writer and thinker. In addition to her role as thesis chairperson, Dr. Hahner made herself available to me as a mentor, offering both guidance and motivation in coursework and professional development. I am truly appreciative for her assistance. I would also like to offer thanks to the members of my thesis committee. Beyond their assistance as committee members, both Dr. Martin J. Medhurst and Dr. James M. SoRelle have helped me grow as a scholar and a citizen. Dr. Medhurst’s instruction and guidance assisted in my acclimation to the field and the profession. I am especially grateful Dr. Medhurst was willing to entertain my unique perspective in discussion and seminar papers. Dr. SoRelle’s course on the civil rights movement was one of the most challenging and rewarding courses I’ve ever taken. It inspired me to situate my scholarship within history and to be unsatisfied with surface-level accounts of complex human phenomena. Several other individuals deserve mention for their assistance with this thesis project. Dr. Scott J. Varda routinely listened to my thesis brainstorming sessions, offering vi suggestions and additional readings. Dr. Matt Gerber reviewed several earlier versions of this thesis, and helped to cure me of my obsession with the word “inchoate.” I am blessed to have an amazing support system of friends and loved ones. My friend and colleague Caitlin Reynolds edited numerous drafts of my thesis chapters, providing sharp critical insight and also pictures of cats. Blake Hallinan routinely shuttled interesting and relevant literature my way and became a sounding board for my crazy ideas about the Internet. I am also indebted to Alex McVey for his support, patience, and sense of humor as I completed this thesis. Finally, I would like to offer a special thanks to my family for their encouragement and advice. My mother, Suzette Woods, has supported me in every single one of my endeavors, even when my dreams sent me across the globe or to Texas. She regularly lends me her strength, and I will spend the rest of my life trying to pay her back. Last, but certainly not least, I want to express appreciation to my little brother, Joshua Woods. Whether or not he knew it, Josh became a key contributor in brainstorming sessions and continues to help me understand the complex and ever- changing environment of the digital sphere. vii CHAPTER ONE Introduction As social media changes the online landscape, the Internet is becoming a political battleground, marshaling and galvanizing ever more individuals to participate in various
Recommended publications
  • How We Became Legion: Burke's Identification and Anonymous By
    How We Became Legion: Burke's Identification and Anonymous by Débora Cristina Ramos Antunes da Silva A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Master of Arts in English - Rhetoric and Communication Design Waterloo, Ontario, Canada, 2013 © Débora Cristina Ramos Antunes da Silva 2013 I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. I understand that my thesis may be made electronically available to the public. ii Abstract This thesis presents a study of how identification, according to Kenneth Burke's theory, can be observed in the media-related practices promoted by the cyber-activist collective Anonymous. Identification is the capacity of community-building through the use of shared interests. Burke affirms that, as human beings are essentially social, identification is the very aim of any human interaction. Cyber-activism deeply relies on this capacity to promote and legitimise its campaigns. In the case of Anonymous, the collective became extremely popular and is now a frequent presence even in street protests, usually organised online, around the world. Here, I argue that this power was possible through the use of identification, which helped attract a large number of individuals to the collective. Anonymous was particularly skilled in its capacity to create an ideology for each campaign, which worked well to set up a perfect enemy who should be fought against by any people, despite their demographic or social status. Other forms of identification were also present and important.
    [Show full text]
  • The Changing Face of American White Supremacy Our Mission: to Stop the Defamation of the Jewish People and to Secure Justice and Fair Treatment for All
    A report from the Center on Extremism 09 18 New Hate and Old: The Changing Face of American White Supremacy Our Mission: To stop the defamation of the Jewish people and to secure justice and fair treatment for all. ABOUT T H E CENTER ON EXTREMISM The ADL Center on Extremism (COE) is one of the world’s foremost authorities ADL (Anti-Defamation on extremism, terrorism, anti-Semitism and all forms of hate. For decades, League) fights anti-Semitism COE’s staff of seasoned investigators, analysts and researchers have tracked and promotes justice for all. extremist activity and hate in the U.S. and abroad – online and on the ground. The staff, which represent a combined total of substantially more than 100 Join ADL to give a voice to years of experience in this arena, routinely assist law enforcement with those without one and to extremist-related investigations, provide tech companies with critical data protect our civil rights. and expertise, and respond to wide-ranging media requests. Learn more: adl.org As ADL’s research and investigative arm, COE is a clearinghouse of real-time information about extremism and hate of all types. COE staff regularly serve as expert witnesses, provide congressional testimony and speak to national and international conference audiences about the threats posed by extremism and anti-Semitism. You can find the full complement of COE’s research and publications at ADL.org. Cover: White supremacists exchange insults with counter-protesters as they attempt to guard the entrance to Emancipation Park during the ‘Unite the Right’ rally August 12, 2017 in Charlottesville, Virginia.
    [Show full text]
  • SHOULD WE TAX UNHEALTHY FOODS and DRINKS? Donald Marron, Maeve Gearing, and John Iselin December 2015
    SHOULD WE TAX UNHEALTHY FOODS AND DRINKS? Donald Marron, Maeve Gearing, and John Iselin December 2015 Donald Marron is director of economic policy initiatives and Institute fellow at the Urban Institute, Maeve Gearing is a research associate at the Urban Institute, and John Iselin is a research assistant at the Urban-Brookings Tax Policy Center. The authors thank Laudan Aron, Kyle Caswell, Philip Cook, Stan Dorn, Lisa Dubay, William Gale, Genevieve Kenney, Adele Morris, Eric Toder, and Elaine Waxman for helpful comments and conversations; Joseph Rosenberg for running the Tax Policy Center model; Cindy Zheng for research assistance; Elizabeth Forney for editing; and Joanna Teitelbaum for formatting. This report was funded by the Laura and John Arnold Foundation. We thank our funders, who make it possible for Urban to advance its mission. The views expressed are those of the authors and should not be attributed to our funders, the Urban-Brookings Tax Policy Center, the Urban Institute, or its trustees. Funders do not determine our research findings or the insights and recommendations of our experts. For more information on our funding principles, go to urban.org/support. TAX POLICY CENTER | URBAN INSTITUTE & BROOKINGS INSTITUTION EXECUTIVE SUMMARY A healthy diet is essential to a long and vibrant life. But there is increasing evidence that our diets are not as healthy as we would like. Obesity, diabetes, hypertension, and other conditions linked to what we eat and drink are major challenges globally. By some estimates, obesity alone may be responsible for almost 3 million deaths each year and some $2 trillion in medical costs and lost productivity (Dobbs et al.
    [Show full text]
  • Social Media and Tactical Considerations for Law Enforcement
    Social Media and Tactical Considerations For Law Enforcement This project was supported by Cooperative Agreement Number 2011-CK-WX-K016 awarded by the Office of Community Oriented Policing Services, U.S. Department of Justice. The opinions contained herein are those of the author(s) and do not necessarily represent the official position or policies of the U.S. Department of Justice. References to specific agencies, companies, products, or services should not be considered an endorsement by the author(s) or the U.S. Department of Justice. Rather, the references are illustrations to supplement discussion of the issues. The Internet references cited in this publication were valid as of the date of this publication. Given that URLs and websites are in constant flux, neither the author(s) nor the COPS Office can vouch for their current validity. ISBN: 978-1-932582-72-7 e011331543 July 2013 A joint project of: U.S. Department of Justice Police Executive Research Forum Office of Community Oriented Policing Services 1120 Connecticut Avenue, N.W. 145 N Street, N.E. Suite 930 Washington, DC 20530 Washington, DC 20036 To obtain details on COPS Office programs, call the COPS Office Response Center at 800-421-6770. Visit COPS Online at www.cops.usdoj.gov. Contents Foreword ................................................................. iii Acknowledgments ........................................................... iv Introduction ............................................................... .1 Project Background.........................................................
    [Show full text]
  • Activists, Bodies, and Political Arguments
    Liminalities: A Journal of Performance Studies Vol. 11, No. 4 (October 2015) Activists, Bodies, and Political Arguments Jason Del Gandio The following essay is adapted from a keynote address presented at the 2014 Patti Pace Performance Festival. The live address included a PowerPoint presentation involving a series of images and videos.1 One of the great strengths of the Patti Pace Festival is the wide range of attendees, which include high school students, undergraduate and graduate students, and professors. This address aims for a middle ground by targeting the undergraduate audience. In brief, the address discussed the manner by which activists use their bodies to make political arguments. Setting the Stage: An Introduction People often think of argumentation in terms of verbal communication—for example, someone advances a claim, supports it with evidence, and provides an overall rationale. But we can also use nonverbal communication to make argu- ments. This is particularly true with activists. Think of anti-war protesters conducting a classic “die-in.” The activists choose a rhetorically significant location—perhaps a military recruiting center or the office of a pro-war representative. The activists gather at the location and at a pre-designated time one of them blows a whistle. Everyone suddenly drops to the ground. Another activist stands among the “lifeless bodies” and recites an anti-war statement. And still another activist is using a handheld projector to cast images onto the side of the building: bombs, fire fights, injured bodies, Jason Del Gandio is an Assistant Professor of Instruction in the Department of Stra- tegic Communication at Temple University.
    [Show full text]
  • Cyberbullying and Ohio Schools: a Social Justice Framework to Understand and Create Change Lorri A
    Cyberbullying and Ohio Schools: A Social Justice Framework to Understand and Create Change Lorri A. Gerwig-Parker Donna Tromski-Klingshirn Rebecca Kolssak Joshua D. Miller Wright State University Abstract In 2019, 36.5% of students, age 12-17, reported that they were cyberbullied at some point in their life. Cyberbullying is a growing problem within Ohio. Self-mutilation, attempted suicide, and death have been linked to victims of cyberbullying. Within Ohio, there are also legal implications for schools to consider. Using Bronfenbrenner’s ecological systems framework, different types of cyberbullies, bullying practices, and proposed solutions for cyberbullying can be addressed in a more comprehensive manner within the schools. Ultimately, schools can be the vanguards for social justice, creating the cultural shift to end cyberbullying and its devastating effects on victims. Keywords: cyberbullying, school administration and faculty, adolescents, social justice, ecological model Cyberbullying, also known as e-bullying or digital harassment, has grown from a technological possibility to a universal problem among communities of young people within the past two decades. Adolescent populations have both high rates of victimization and potentially severe consequences to their mental and physical health. Hinduja and Patchin (2019) indicated that 36.5% of adolescents ages 12 to 17 in the United States reported being cyberbullied at least once. Further, according to Pacer’s National Bullying Prevention Center (2019) only 33% of adolescent victims
    [Show full text]
  • Reclaiming the Streets: Black Urban Insurgency and Antisocial Security
    Reclaiming the streets Black urban insurgency and antisocial security in twenty-fi rst-century Philadelphia Jeff Maskovsky Abstract: Th is article focuses on the emergence of a new pattern of black urban insurgency emerging in major US metropolitan areas such as Philadelphia. I lo- cate this pattern in the context of a new securitization regime that I call “antiso- cial security.” Th is regime works by establishing a decentered system of high-tech forms of surveillance and monitory techniques. I highlight the dialectic between the extension of antisocial security apparatuses and techniques into new political and social domains on the one hand and the adoption of these same techniques by those contesting racialized exclusions from urban public space on the other. I end the article with a discussion of how we might adapt the commons concept to consider the centrality of race and racism to this new securitization regime. Keywords: commoning, inner city, race, securitization, United States, urban politics In Philadelphia, on 10 April 2013, dozens of Af- broadcast sensationalized reports about “crazed rican American youth converged in what mu- teens,” “mob violence,” and “youth rioting.” nicipal authorities described as a “fl ash mob” at In 2011, Philadelphia mayor Michael Nutter the heart of the city’s central business district. (2008–2016) criticized African American teens Called together with the use of social media, for participating in unruly gatherings in public these young people blocked traffi c, massed on spaces. From the pulpit of Mount Carmel Bap- street corners, and ran down several city blocks tist Church in West Philadelphia, where he is until they were dispersed by the local police.
    [Show full text]
  • POPULAR SOCIAL MEDIA SITES Below Is a List of Some of the Most Commonly Used Youth and Teen Social Networking Sites and Tools
    POPULAR SOCIAL MEDIA SITES Below is a list of some of the most commonly used youth and teen social networking sites and tools. Ask.fm (http://ask.fm) Participants log on, post a question anonymously and anyone may answer anonymously. “Do you think I am fat?” or “Would you date me?” are examples of questions posted in the past. There have also been examples in which individuals were encouraged to kill themselves. The site has courted controversy by not having workable reporting, tracking or parental control processes, which have become the norm on other social media websites. Twitter (https://twitter.com) An online social networking and microblogging service that enables users to send and read "tweets", which are text messages limited to 140 characters. Instagram (http://instagram.com) A photo-sharing app for iPhone. Kik (http://kik.com) Kik is as an alternative to email or text messaging and its popularity has grown in the last two years. Kik is accessible on smartphones and supports over 4 million users, called “Kicksters.” Users are not restricted to sending text messages with Kik. Images, videos, sketches, emoticions and more may be sent. A user can block users on Kik from contacting them. Wanelo (http://wanelo.com) Wanelo (from Want, Need, Love) sells unique products online, all posted by users. Products posted for sale range from dishes, clothing, intimate wear and other potentially “R-Rated” products. Vine (https://vine.co) Vine is used to create and share free and instant six-second videos. Topic and content ranges. Snapchat (http://www.snapchat.com) A photo messaging application.
    [Show full text]
  • Sociotechnical Security As an Analytic Framework
    Entanglements and Exploits: Sociotechnical Security as an Analytic Framework Data & Society Research Institute Columbia University Matt Goerzen, ​ ​Elizabeth Anne Watkins, ​ Open Technology Fund Research Fellow Gabrielle Lim, ​ Abstract Unfortunately, platform-linked violence like the incidents in The rise of social media platforms has produced novel Christchurch and San Diego are not uncommon and are security threats and vulnerabilities. Malicious actors can unlikely to subside in the near future. Other forms of now exploit entanglements of once disparate technical and problematic and potentially dangerous content also social systems to target exposed communities. These proliferate. False and misleading content distributed on exploits pose a challenge to legacy security frameworks Whatsapp in India led to the murders of over two dozen drawn from technical and state-based conceptions of people in 2018 (Goel et al., 2018). The genocide of the referent objects and bounded information systems. In this Rohyinga in Myanmar was partially incited by the military paper we propose a new framework of analysis to meet this through disinformation and false accounts on Facebook challenge, Sociotechnical Security (STsec), which (Mozur, 2018). Facebook usage may also correlate with acknowledges how the interplay between actors produces higher rates of anti-refugee attacks in Germany (Müller and emergent threats to participant communities. This Schwarz 2018). Meanwhile, targeted harassment has been exploratory paper offers an overview of sociotechnical linked to self-censorship and a chilling effect on systems, explains why these threats and vulnerabilities internet-based communications (UN Office of the High require us to expand our understanding of security with Commissioner, 2017). Amnesty International in 2018, for regards to participatory technology, and how sociotechnical example, declared Twitter trolling of women a human rights security can be operationalized as a framework for analysis.
    [Show full text]
  • From Clicktivism to Hacktivism: Understanding Digital Activism
    Information & Organization, forthcoming 2019 1 From Clicktivism to Hacktivism: Understanding Digital Activism Jordana J. George Dorothy E. Leidner Mays Business School, Texas A&M University Baylor University ABSTRACT Digital activism provides new opportunities for social movement participants and social movement organizations (SMOs). Recent IS research has begun to touch on digital activism, defining it, exploring it, and building new theory to help understand it. This paper seeks to unpack digital activism through an exploratory literature review that provides descriptions, definitions, and categorizations. We provide a framework for digital activism by extending Milbrath’s (1965) hierarchy of political participation that divides activism into spectator, transitional, and gladiatorial activities. Using this framework, we identify ten activities of digital activism that are represented in the literature. These include digital spectator activities: clicktivism, metavoicing, assertion; digital transitional activities: e-funding, political consumerism, digital petitions, and botivism; and digital gladiatorial activities: data activism, exposure, and hacktivism. Last, we analyze the activities in terms of participants, SMOs, individuals who are targeted by the activity, and organizations that are targeted by the activity. We highlight four major implications and offer four meta-conjectures on the mechanisms of digital activism and their resulting impacts, and reveal a new construct where participants digitally organize yet lack an identifying cause, which we label connective emotion. Key Words Digital activism, social activism, political participation, social movements, connective emotion, literature review 1.0 Introduction Not long ago, activism to promote social movements was relegated to demonstrations and marches, chaining oneself to a fence, or writing to a government representative. Recruiting, organizing, and retaining participants was difficult enough to ensure that often only largest, best supported movements thrived and creating an impact often took years.
    [Show full text]
  • IDENTITY and PERSUASION How Nations Remember Their Pasts and Make Their Futures
    IDENTITY AND PERSUASION How Nations Remember Their Pasts and Make Their Futures By CONSUELO CRUZ* DENTITY politics now occupies center stage. It is on explosive dis- Iplay in a wide range of settings, from Africa to the Balkans. And it is more subtly at work in the democracies of the West: NATO leaders must reexamine their own guiding principles in the face of multiple human- itarian disasters brought about by tribal, ethnic, and religious hatreds, while simultaneously dealing with increasingly heterogenous popula- tions at home and ceaseless migrant flows from east and south. It is no surprise, then, that identity should figure prominently in scholarly debates about conflict resolution, migration, citizenship, transnational alliances, democratization, nation and state building, and even globalization. Nor is it a puzzle that long-standing debates about identity should have produced the two clearly defined camps that we know as primordialists and constructivists.1 What is perplexing is the current failure to investigate systematically the complex linkages be- tween identity formation and the expressive practices of political actors. After all, we approach reality rhetorically—that is, with an intent to convince.2 This is why persuasion is the hallmark of effective leader- ship. Short of pure coercion, it is the most direct way to mobilize or paralyze a group. And this is why rhetorical power—recognized as cen- * I would like to thank Peter Hall, Jeffrey Legro, Sheri Berman, and Mehmet Tabak for their in- sightful suggestions on a previous version of this article. I am also grateful to Deborah Yashar, Anna Seleny, Paola Cesarini, and the anonymous reviewers for their helpful comments on the present ver- sion.
    [Show full text]
  • Wikileaks and the Afterlife of Collateral Murder
    International Journal of Communication 8 (2014), Feature 2593–2602 1932–8036/2014FEA0002 WikiLeaks and the Afterlife of Collateral Murder CHRISTIAN CHRISTENSEN Stockholm University, Sweden In this essay, the author considers not only what is shown in the WikiLeaks Collateral Murder video but reflects upon what the act of uploading this video symbolized and continues to symbolize and how the multifaceted symbolic value of the video has led to its steady inscription and reinscription into the public consciousness during a wide variety of popular and political debates. Apart from the disturbing content of the film, showing a potentially criminal act, the author argues that the uploading of the film was itself an act of dissent and, thus, a challenge to U.S. power. This combination of content and context makes the WikiLeaks Collateral Murder video an interesting case study that touches upon several key areas within academic study. Keywords: WikiLeaks, journalism, war, visual culture, Iraq, Collateral Murder, video Introduction On April 5, 2010, WikiLeaks released Collateral Murder, a video showing a July 12, 2007, U.S. Apache attack helicopter attack upon individuals in New Baghdad. Among the more than 23 people killed by the 30-mm cannon fire were two Reuters journalists. WikiLeaks published this statement in conjunction with the release: WikiLeaks has released a classified U.S. military video depicting the indiscriminate slaying of over a dozen people in the Iraqi suburb of New Baghdad — including two Reuters news staff. Reuters has been trying to obtain the video through the Freedom of Information Act, without success since the time of the attack.
    [Show full text]