Hacktivism and Habermas: Online Protest As Neo-Habermasian

Total Page:16

File Type:pdf, Size:1020Kb

Hacktivism and Habermas: Online Protest As Neo-Habermasian Hacktivism and Habermas: Online Protest as Neo-Habermasian Counterpublicity A thesis submitted in partial fulfilment of the requirements for the Degree of Doctor of Philosophy in Media and Communication in the University of Canterbury by Tessa Jade Houghton University of Canterbury 2010 1 Table of Contents Acknowledgements ................................................................................................... 1! Abstract ..................................................................................................................... 2! Chapter 1 ................................................................................................................... 3! Introduction ............................................................................................................... 3! 1.1 An overview of the thesis chapters ................................................................... 5! Chapter 2 ................................................................................................................. 10! Methodology and research questions .................................................................... 10! 2.1 Finding an appropriate methodology: False starts and dead ends .................. 11! 2.1.1 Difficult subjects, and the inappropriateness of quantitative methods .... 12! 2.2 A qualitative methodology ............................................................................. 15! 2.2.1 Constructing a ‘data pool’ of possible cases for analysis ........................ 16! 2.2.2 An overview of critical discourse analysis .............................................. 17! 2.2.2.1 Context .............................................................................................. 22! 2.2.2.2 Text ................................................................................................... 22! 2.2.2.3 Access and control ............................................................................ 23! 2.2.3 The use of theoretical sampling to select case studies ............................. 25! 2.2.3.1 A rationale for the ‘binding cause’ for the case studies ........................ 29! 2.2.3.2 Case One: Hacktivismo .................................................................... 34! 2.2.3.3 Case Two: The Creative Freedom Foundation and the New Zealand Internet blackout ........................................................................................... 35! 2.2.3.4 Case Three: Anonymous and Australian Internet censorship ........... 36! 2.2.3.5 The overall representativeness of the case studies ............................ 37! 2.2.3.6 The selection and collection of a data corpus for each case study and critical discourse analysis ............................................................................. 38! 2.2.4 Research questions ................................................................................... 39! 2.2.4.1 A ‘theoretical turn’: Research question 1 ......................................... 39! 2.2.4.2 Hacktivism as counterpublic spheres: Research question 2 ............. 41! Chapter 3 ................................................................................................................. 43! The evolution and current form of hacking: An investigation of existing knowledge ................................................................................................................ 43! 3.1 The emergence and evolution of hacking: Motivations and perceptions ....... 44! 3.1.1 Generation one: The true or original hackers .......................................... 48! 3.1.1.1 The contested nature of ‘the hack’ .................................................... 48! 3.1.2 Generation two: The hardware hackers ................................................... 50! 3.1.3 Generation three: The software or game hackers .................................... 51! 3.1.3.1 The hacker ethic ................................................................................ 52! 3.1.4 Generation four: The hacker as criminal (a.k.a. the cracker) .................. 53! 3.1.4.1 The media and the beginning of the myth of the ‘electronic bogeyman’ .................................................................................................... 55! 3.1.5 Generations five and six: The Microserfs and the free/libre and open source software (FLOSS) movement ................................................................ 58! 3.1.5.1 Black hat / White hat ........................................................................ 58! 3.1.6 Tim Jordan and Paul Taylor: A summarisation and extension of hacking and its generational evolution ........................................................................... 63! 3.1.6.1 The collective identity negotiation of hackers .................................. 65! 3.1.6.2 Hacking as an explicitly political act ................................................ 71! 2 3.1.7 The seventh generation: The emergence and identification of hacktivism proper ................................................................................................................ 75! 3.1.8 The increasing conflation of hacking and cybterterrorism ...................... 77! 3.1.9 Conclusion ............................................................................................... 80! Chapter 4 ................................................................................................................. 83! Hacktivism: The revival and extension of the political ideology within hacking .................................................................................................................................. 83! 4.1 The imaginary hacktivist ................................................................................ 84! 4.1.1 Hacktivism and Netwar ........................................................................... 84! 4.1.2 The Critical Arts Ensemble and electronic civil disobedience ................ 86! 4.2 The emergence of a hacktivist reality ............................................................. 90! 4.3 The conflation of hacktivism and cyberterrorism: Hacktivism’s inheritance of hacking’s image problems, pre-9/11 ..................................................................... 93! 4.3.1 Electronic civil disobedience or hacktivism? .......................................... 95! 4.3.2 Hacktivism and publicity: An unavoidably necessary evil ...................... 99! 4.4 Hacktivism and the post-9/11 world ............................................................. 100! 4.4.1 Hacktivism and the repertoire of electronic contention ......................... 101! 4.4.2 Hacking for democracy: Media representations of online public resistance to elite control ................................................................................ 102! 4.4.2.1 Differentiating hacktivism from cyberwar, and internally differentiating hacktivists ........................................................................... 103! 4.4.2.2 Hacktivism and publicity: An unavoidably necessary evil (redux) 104! 4.4.3 Mass Action and Digitally Correct: An internal differentiation of hacktivism ....................................................................................................... 107! 4.4.4 Political coders, performative hacktivists and political cracking: An improved internal differentiation of hacktivism ............................................. 111! 4.4.4.1 Hacktivism as a form of identity construction ................................ 113! 4.4.4.2 Political coding and policy circumvention ..................................... 114! 4.4.4.3 Hacktivism, free speech, and accountability .................................. 114! 4.4.5 The imagined community of hacktivism ............................................... 116! 4.4.6 The morality (or lack thereof) of hacktivism ......................................... 117! 4.4.7 Hacking and hacktivism: Conclusions and the lack of a public sphere theoretical interpretation of hacktivism .......................................................... 119! 4.5 A summary of the literature and emergent definitions ................................. 123! 4.5.1 A ‘definition’ of hacking ....................................................................... 123! 4.5.2 A comparative definition of hacktivism ................................................ 124! 4.5.3 An internal typology of hacktivism ....................................................... 126! Chapter 5 ............................................................................................................... 129! The Habermasian public sphere .......................................................................... 129! 5.1 The Structural Transformation of the Public Sphere ................................... 130! 5.1.1 Habermas and the Frankfurt School ...................................................... 131! 5.1.2 The rise of the bourgeois public sphere ................................................. 132! 5.1.3 The rationalisation of exclusion ............................................................. 135! 5.1.4 The fall of the bourgeois public sphere ................................................. 137! 5.1.4.1 The refeudalisation of society and the public sphere ...................... 138! 5.1.4.2 The role of the mass media ............................................................. 140! 3.1.4.3 The modern ‘public sphere’ and the possibility of renewal ............ 142! 5.2 Habermas’s ‘linguistic
Recommended publications
  • Fill Your Boots: Enhanced Embedded Bootloader Exploits Via Fault Injection and Binary Analysis
    IACR Transactions on Cryptographic Hardware and Embedded Systems ISSN 2569-2925, Vol. 2021, No. 1, pp. 56–81. DOI:10.46586/tches.v2021.i1.56-81 Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis Jan Van den Herrewegen1, David Oswald1, Flavio D. Garcia1 and Qais Temeiza2 1 School of Computer Science, University of Birmingham, UK, {jxv572,d.f.oswald,f.garcia}@cs.bham.ac.uk 2 Independent Researcher, [email protected] Abstract. The bootloader of an embedded microcontroller is responsible for guarding the device’s internal (flash) memory, enforcing read/write protection mechanisms. Fault injection techniques such as voltage or clock glitching have been proven successful in bypassing such protection for specific microcontrollers, but this often requires expensive equipment and/or exhaustive search of the fault parameters. When multiple glitches are required (e.g., when countermeasures are in place) this search becomes of exponential complexity and thus infeasible. Another challenge which makes embedded bootloaders notoriously hard to analyse is their lack of debugging capabilities. This paper proposes a grey-box approach that leverages binary analysis and advanced software exploitation techniques combined with voltage glitching to develop a powerful attack methodology against embedded bootloaders. We showcase our techniques with three real-world microcontrollers as case studies: 1) we combine static and on-chip dynamic analysis to enable a Return-Oriented Programming exploit on the bootloader of the NXP LPC microcontrollers; 2) we leverage on-chip dynamic analysis on the bootloader of the popular STM8 microcontrollers to constrain the glitch parameter search, achieving the first fully-documented multi-glitch attack on a real-world target; 3) we apply symbolic execution to precisely aim voltage glitches at target instructions based on the execution path in the bootloader of the Renesas 78K0 automotive microcontroller.
    [Show full text]
  • Additional Resources
    Resource Guide to Communication Scholarship on Social Justice Activism Lawrence R. Frey, Kellie Brownlee, Jeanette Musselwhite Additional Resources Conceptual/Theoretical Scholarship on Communication and Social Justice Activism A. Communication Aldás, E. N., & Pinazo, D. (2013). “Communication and engagement for social justice.” Peace Review, 25, 343–348. doi:10.1080/10402659.2013.816552 Andersen, P. A. (1993). “Beyond criticism: The activist turn in the ideological debate.” Western Journal of Communication, 57, 247–256. doi:10.1080/10570319309374447 Barge, J. K. (Ed.). (1996). “Dialogue: Communication and social justice [Special section].” Communication Studies, 47, 110–151. Contains the essays: Frey, L. R., Pearce, W. B., Pollock, M. A., Artz, L., & Murphy, B. A. O. “Looking for justice in all the wrong places: On a communication approach to social justice.” 110–127. doi:10.1080/10510979609368467 Wood, J. T. “Social justice research: Alive and well in the field of communication.” 128–134. doi:10.1080/10510979609368468 Makau, J. M. “Notes on communication education and social justice.” 135–141. doi:10.1080/10510979609368469 Pollock, M. A., Artz, L., Frey, L. R., Pearce, W. B., & Murphy, B. A. O. “Navigating between Scylla and Charybdis: Continuing the dialogue on communication and social justice.” 142–151. doi:10.1080/10510979609368470 Broome, B. J., Carey, C., De La Garza, S. A., Martin, J., & Morris, R. (2005). “In the thick of things: A dialogue about the activist turn in intercultural communication.” In W. J. Starosta & G.-M. Chen (Eds.), Taking stock in intercultural communication: Where to now? (pp. 145–175). Washington, DC: National Communication Association. Carragee, K. M., & Frey, L.
    [Show full text]
  • “Hackers and Hacking Attacks”- Magician and Their Magic Wand For
    ISSN XXXX XXXX © 2019 IJESC Research Article Volume 9 Issue No. 5 “Hackers and Hacking Attacks”- Magician and Their Magic Wand for Security Breech Manish JitendrabhaiVankani Department of SOE – MCA RK University, Rajkot, Gujarat, India Abstract: In Modern era, each and every data is available online. Any person across the world can access that data very easily. Some people use this data to gain the information while other people use this data to fulfil their malicious intent. There are lots of methods used for protection of data but the hacker is far more intelligent to hack the security. There are main two types of hackers that are different from each other on the basis of their purpose. The one who tries to break the computer system’s security with malicious intention is known as bad hacker or cracker. The other one who has good purpose is known as ethical hacker because he uses his skills to provide security to sensitive data of big firms.In this paper I describe the types of Hackers,Ethical hacking,typesof Hacking attacks and Hacking tools. Keywords: Ethical hackers, Hacking, cracker. I. INTRODUCTION: hardware as well as software. Hacker is a computer dedicated and expert in a programming language, security, and networks. As the computer technology enhances, it has its darker side He is kind of person who loves to gain knowledge ofdifferent also. In modern era the need of the internet is growing rapidly. technologies, details of the computer system and enhances his Enormous amount of data is moving online, therefore, data capability and skills.
    [Show full text]
  • Lezione 2 Cenni Storici Sviluppo Di Software Sicuro (9 CFU), LM Informatica, A
    Lezione 2 Cenni storici Sviluppo di software sicuro (9 CFU), LM Informatica, ! ! 2"2"#2"2$ Dipartimento di Scienze Fisic&e, Informatiche e Matematiche Universit' di Modena e Re))io *milia http+##we,la,!ing!unimore!it/people#andreolini#didattica#sviluppo-software-sicuro 1 Quote of t&e da/ (Meditate, )ente, meditate!!!) “If history repeats itself, and the unexpected always happens, how incapable must Man be of learning from experience.” 0eor)e Bernard S&aw (1234 – 193") Scrittore, drammatur)o, lin)uista, critico musicale utore de “Il Pigmalione8 2 Sir John mbrose Fleming (12:9-$9:3) (;he electrical en)ineer and ph/sicist) Inventore, in)e)nere, radiotecnico, elettrotecnico! Inventore del diodo e della valvola termoionica! Consulente (fra le altre) della Marconi <ireless ;ele)rap& Compan/! 3 Jo&n Nevil Mas>el/ne ($2?9-$9$@) (;he ma)ician) Mago. Inventore del ,agno pu,,lico 6a )ettone8! Fondatore del 6Comitato Occulto8 (antesi)nano dellBodierno CIC 7)! 1903: Mas>elyne rovina una dimostrazione pu,,lica del tele)rafo 6sicuro8 senza Cli (svolta da Flemin))! (iesce ad inviare insulti in codice Morse!.. 4 Eni)ma (1924) (;&e encr/ption#decr/ption machine) Macc&ina elettro-meccanica usata per cifrare e decifrare messa))i! Usata dalla <e&rmac&t durante la Seconda Guerra Mondiale! Considerata indecifrabile per lun)o tempo! 5 rthur Scher,ius (12@2-$929) (LBinventore di *nigma) In)e)nere tedesco! 1918: ,revetta Eni)ma (macc&ina cifrante ,asata su rotori)! 1926: la Marina Militare tedesca adotta una variante di Eni)ma per le sue comunicazioni cifrate! 6 LBEnigma militare (LBinventore di *nigma) Uso di un pannello di controllo ag)iuntivo (detto 6plu),oard”) per offuscare ulteriormente il processo di cifratura.
    [Show full text]
  • Digital Activism in Asia: Good, Bad, and Banal Politics Online
    Asiascape: Digital Asia 7 (2020) 5-19 brill.com/dias Digital Activism in Asia: Good, Bad, and Banal Politics Online Bart Barendregt Leiden Institute of Cultural Anthropology and Sociology, Leiden, the Netherlands [email protected] Florian Schneider Leiden University Institute for Area Studies, Leiden, the Netherlands [email protected] Abstract This article introduces the special issue on ‘Digital Activism’ by exploring some of the trends in social media activism and scholarship thereof. The authors ask to what extent this literature helps us understand Asian forms of online activism, which forms of activism have relatively done well, and whether Asian activism requires its own the- orizing. Most of all, it is a plea for a careful and ethnographically informed approach to digital activism. Although outwardly they look similar and use the same templates, manuals, or even similar media strategies, not all forms of online activism promote democratic values. Furthermore, we argue that much of what happens under the ban- ner of digital activism is not necessarily politics with a capital P but, rather, consists of everyday forms of engagement, with sometimes seemingly vulgar contents and often familiar routines and natural forms, yet in their impact such ‘banal activism’ may have political implications. Keywords Asia – civic engagement – digital activism – mediatization – online community – social media © Koninklijke Brill NV, Leiden, 2020 | doi:10.1163/22142312-bja10004Downloaded from Brill.com09/25/2021 02:48:27AM via free access 6 Barendregt and Schneider 1 Hopes and Hoaxes New media have always held not just the promise of compressing space/time but also, and inherently, of spreading the values of transparency and democ- racy and of serving as a potential means of better and just governance.
    [Show full text]
  • PC Magazine Fighting Spyware Viruses And
    01_577697 ffirs.qxd 12/7/04 11:49 PM Page i PC Magazine® Fighting Spyware, Viruses, and Malware Ed Tittel TEAM LinG - Live, Informative, Non-cost and Genuine ! 01_577697 ffirs.qxd 12/7/04 11:49 PM Page ii PC Magazine® Fighting Spyware, Viruses, and Malware Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256-5774 www.wiley.com Copyright © 2005 by Wiley Publishing Published simultaneously in Canada ISBN: 0-7645-7769-7 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 1B/RW/RS/QU/IN No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, e-mail: [email protected]. Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials.
    [Show full text]
  • Social Media and Politics: Theoretical and Methodological Considerations in Designing a Study of Political Engagement
    Social Media and Politics: Theoretical and Methodological Considerations in Designing a Study of Political Engagement Paper presented at Politics: Web 2.0: An International Conference New Political Communication Unit Royal Holloway, University of London April 17-18, 2008 Maja Turnšek University of Ljubljana, Faculty of Social Sciences, Slovenia [email protected] Nicholas W. Jankowski Virtual Knowledge Studio for the Humanities and Social Sciences, Amsterdam, The Netherlands [email protected] 1 Introduction Web 2.0 has become the buzz word describing a plethora of social media available on the internet, includingblogs, photo and file sharing systems (e.g., Flickr, SlideShare, YouTube), and social networking sites (e.g., Friendster, MySpace, SecondLife). Although these media are largely designed for personal presentation, political speech and action sometime emerge, such as in postings protesting government actions on YouTube, creation of candidate headquarters in SecondLife, and utilization of still image and video functionalities on mobile phones during demonstrations and police confrontations. Last year, as candidates began preparing for the U.S. Presidential Primaries, CNN coined the term YouTube-ification of Politics to describe this development. From a perspective ascribing importance to everyday settings as venues for political expression, these Internet-based social media have become both the tools for and sites of politics. The question, however, is how such manifestations of political life can be empirically investigated within a social science theoretical framework. In this paper we examine the theoretical and methodological approaches involved in studying social media utilized for political expression and action. In question form, we ask: How do empirically oriented social scientists consider the theoretical and methodological challenges involved in investigating social media? We address this question through examining a sample of research-oriented peer reviewed journal articles addressing facets of social media.
    [Show full text]
  • From Clicktivism to Hacktivism: Understanding Digital Activism
    Information & Organization, forthcoming 2019 1 From Clicktivism to Hacktivism: Understanding Digital Activism Jordana J. George Dorothy E. Leidner Mays Business School, Texas A&M University Baylor University ABSTRACT Digital activism provides new opportunities for social movement participants and social movement organizations (SMOs). Recent IS research has begun to touch on digital activism, defining it, exploring it, and building new theory to help understand it. This paper seeks to unpack digital activism through an exploratory literature review that provides descriptions, definitions, and categorizations. We provide a framework for digital activism by extending Milbrath’s (1965) hierarchy of political participation that divides activism into spectator, transitional, and gladiatorial activities. Using this framework, we identify ten activities of digital activism that are represented in the literature. These include digital spectator activities: clicktivism, metavoicing, assertion; digital transitional activities: e-funding, political consumerism, digital petitions, and botivism; and digital gladiatorial activities: data activism, exposure, and hacktivism. Last, we analyze the activities in terms of participants, SMOs, individuals who are targeted by the activity, and organizations that are targeted by the activity. We highlight four major implications and offer four meta-conjectures on the mechanisms of digital activism and their resulting impacts, and reveal a new construct where participants digitally organize yet lack an identifying cause, which we label connective emotion. Key Words Digital activism, social activism, political participation, social movements, connective emotion, literature review 1.0 Introduction Not long ago, activism to promote social movements was relegated to demonstrations and marches, chaining oneself to a fence, or writing to a government representative. Recruiting, organizing, and retaining participants was difficult enough to ensure that often only largest, best supported movements thrived and creating an impact often took years.
    [Show full text]
  • Black Hat Hacker White Hat Hacker Gray Hat Hacker
    Crackers or Malicious Hackers: System crackers attempt to access computing facilities for which they have not been authorized. Cracking a computer's defenses is seen as the ultimate victimless crime. The perception is that nobody is hurt or even endangered by a little stolen machine time. Crackers enjoy the simple challenge of trying to log in, just to see whether it can be done. Most crackers can do their harm without confronting anybody, not even making a sound. In the absence of explicit warnings not to trespass in a system, crackers infer that access is permitted. Others attack for curiosity, personal gain, or self-satisfaction. And still others enjoy causing chaos, loss, or harm. There is no common profile or motivation for these attackers. Classification of Hackers: Hackers can be classified broadly into three different categories: 1. Black Hat Hacker 2. White Hat Hacker 3. Grey Hat Hacker Black Hat Hacker Black-hat Hackers are also known as an Unethical Hacker or a Security Cracker. These people hack the system illegally to steal money or to achieve their own illegal goals. They find banks or other companies with weak security and steal money or credit card information. They can also modify or destroy the data as well. Black hat hacking is illegal. White Hat Hacker White hat Hackers are also known as Ethical Hackers or a Penetration Tester. White hat hackers are the good guys of the hacker world. These people use the same technique used by the black hat hackers. They also hack the system, but they can only hack the system that they have permission to hack in order to test the security of the system.
    [Show full text]
  • Investigating Web Defacement Campaigns at Large
    Session 11: Malware and Web ASIACCS’18, June 4–8, 2018, Incheon, Republic of Korea Investigating Web Defacement Campaigns at Large Federico Maggi, Marco Balduzzi, Ryan Flores, Lion Gu, Vincenzo Ciancaglini Forward-Looking Threat Research Team - Trend Micro, Inc. ABSTRACT the attack, team affiliation of the defacer(s), or nicknames ofthe Website defacement is the practice of altering the web pages of a supporting actors. Over the years, defacers have abandoned their website after its compromise. The altered pages, called deface pages, interested in defacing for the mere purpose of advertising the com- can negatively affect the reputation and business of the victim site. promise, pursuing defacement more as a mean to broadcast strong Previous research has focused primarily on detection, rather than messages “to the World”—by compromising popular websites. exploring the defacement phenomenon in depth. While investigat- Despite several actors are still driven by the desire of promot- ing several defacements, we observed that the artifacts left by the ing their own reputation, an increasing number of defacers strive defacers allow an expert analyst to investigate the actors’ modus instead to promote their ideologies, religious orientation, political operandi and social structure, and expand from the single deface views, or other forms of activism, often closely following real-world page to a group of related defacements (i.e., a campaign). However, events (e.g., war, elections, crisis, terrorist attacks). We refer to this manually performing such analysis on millions of incidents is te- phenomenon as dark propaganda, to highlight that legitimate re- dious, and poses scalability challenges. From these observations, we sources are abused for pushing the actors’ viewpoints.
    [Show full text]
  • Paradise Lost , Book III, Line 18
    _Paradise Lost_, book III, line 18 %%%%%%%%%%%%%%%%%%%%%%%% ++++++++++Hacker's Encyclopedia++++++++ ===========by Logik Bomb (FOA)======== <http://www.xmission.com/~ryder/hack.html> ---------------(1997- Revised Second Edition)-------- ##################V2.5################## %%%%%%%%%%%%%%%%%%%%%%%% "[W]atch where you go once you have entered here, and to whom you turn! Do not be misled by that wide and easy passage!" And my Guide [said] to him: "That is not your concern; it is his fate to enter every door. This has been willed where what is willed must be, and is not yours to question. Say no more." -Dante Alighieri _The Inferno_, 1321 Translated by John Ciardi Acknowledgments ---------------------------- Dedicated to all those who disseminate information, forbidden or otherwise. Also, I should note that a few of these entries are taken from "A Complete List of Hacker Slang and Other Things," Version 1C, by Casual, Bloodwing and Crusader; this doc started out as an unofficial update. However, I've updated, altered, expanded, re-written and otherwise torn apart the original document, so I'd be surprised if you could find any vestiges of the original file left. I think the list is very informative; it came out in 1990, though, which makes it somewhat outdated. I also got a lot of information from the works listed in my bibliography, (it's at the end, after all the quotes) as well as many miscellaneous back issues of such e-zines as _Cheap Truth _, _40Hex_, the _LOD/H Technical Journals_ and _Phrack Magazine_; and print magazines such as _Internet Underground_, _Macworld_, _Mondo 2000_, _Newsweek_, _2600: The Hacker Quarterly_, _U.S. News & World Report_, _Time_, and _Wired_; in addition to various people I've consulted.
    [Show full text]
  • Reporting, and General Mentions Seem to Be in Decline
    CYBER THREAT ANALYSIS Return to Normalcy: False Flags and the Decline of International Hacktivism By Insikt Group® CTA-2019-0821 CYBER THREAT ANALYSIS Groups with the trappings of hacktivism have recently dumped Russian and Iranian state security organization records online, although neither have proclaimed themselves to be hacktivists. In addition, hacktivism has taken a back seat in news reporting, and general mentions seem to be in decline. Insikt Group utilized the Recorded FutureⓇ Platform and reports of historical hacktivism events to analyze the shifting targets and players in the hacktivism space. The target audience of this research includes security practitioners whose enterprises may be targets for hacktivism. Executive Summary Hacktivism often brings to mind a loose collective of individuals globally that band together to achieve a common goal. However, Insikt Group research demonstrates that this is a misleading assumption; the hacktivist landscape has consistently included actors reacting to regional events, and has also involved states operating under the guise of hacktivism to achieve geopolitical goals. In the last 10 years, the number of large-scale, international hacking operations most commonly associated with hacktivism has risen astronomically, only to fall off just as dramatically after 2015 and 2016. This constitutes a return to normalcy, in which hacktivist groups are usually small sets of regional actors targeting specific organizations to protest regional events, or nation-state groups operating under the guise of hacktivism. Attack vectors used by hacktivist groups have remained largely consistent from 2010 to 2019, and tooling has assisted actors to conduct larger-scale attacks. However, company defenses have also become significantly better in the last decade, which has likely contributed to the decline in successful hacktivist operations.
    [Show full text]