Lecture 12 - Hacktivism Flashcards

1
Q

What are the three key elements of hacktivism available in studies according to Romagna?

A

There are three key elements traditionally present in studies on hacktivism:
1. The need of supporting an ideology or cause that has its bases in sociopolitical struggles
2. The Internet (and cyberspace) both as necessary infrastructure that allows the activity and as target of an attack
3. The desire for any group or single individual to promote a sociopolitical agenda that should either lead to a change in society or to keep the status quo.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two schools of thought on hacktivism?

A
  1. Created by Jordan and Taylor (2004), takes a broad approach, and it mainly focuses on hacktivism as a form of resistance to neoliberal globalization, dividing it in two categories:
    a. Mass action hacktivism; a combination of politics and technology. It is the closest form of traditional mass protests taken online
    b. Digitally correct hacktivism; represents instead “the political application of hacking to the infrastructure of cyberspace”. It focuses on the right of any person to get access to information.
  2. (Most Important)The second, created by Samuel (2004), is based on the combination of types of actors (hackers, programmers, artists), methods (defacements, DDoS, data theft), and orientations (transgressive or outlaw). Hacktivism is divided into three categories:
    a. Political cracking; the most aggressive form of hacktivism, making use of website defacements, cyber trespasses, website redirects, and DDoS attacks.
    b. Performative hacktivism; performative hacktivism consists of legally vague actions like virtual sit-ins and website parodies.
    c. Political coding; described as the creation and development of software meant for political uses, for instance, to avoid censorship or to remain anonymous on the Internet.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the new way of conceptualizing hacktivism?

A

Toward a New Way of Conceptualizing Hacktivism
Although Samuel’s (2004) taxonomy remains the most important in the field, other scholars have suggested different approaches to hacktivism
- Asenbaum (2018) speaks of cyborg activism, focusing on the fact that the cyborg element defines the individual as a hybrid of biology and technology.
- Wong and Brown (2013, p. 1015) take a different angle, depicting hacktivism as a form of e-banditry. Hacktivists represent a sort of modern “Robin Hood, resisting the power that […] threaten the desire to keep the Internet free…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Distinction between cyberterrorism and hacktivism?

A

According to more critical voices belonging mainly to the security industry and to governmental organizations, some hacktivists’ actions are thinly distinguished from cyberterrorism, prompting the criminal justice sector to potentially implement harsher punishments.
The distinction among hacktivism and cyberterrorism should be researched in the combination of three elements that differentiate the two phenomena:
1. The existence/lack of physical harm or at least of a severe disruption against a vital infrastructure.
a. Should the malware directly or indirectly physically harm another individual, then the hacktivism label would be abandoned, and, depending on the final aim, the cybercrime or terrorist one would be applied.
2. The presence/absence of fear in the victim of the attack and in other individuals or organizations that might be influenced by it.
a. Fear is intrinsic in terrorism. Hacktivists, instead, refuse the use of physical violence and do not aim to create fear in their targets.
3. The different use of a preset label to identify the nature of the action.
a. The distinction among hacktivism and cyberterrorism became more blurred because of media and governments’ interests. To use a parallelism taken from studies in terrorism, in the eyes of a hacktivist, these operations are seen as legitimate forms of protest, while in the view of the condemner (usually the state), they are unjust and unjustifiable forms of criminal activity or terrorism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is state-sponsored hacktivism?

A

state-sponsored hacktivism, which represents an intricate “interaction between hacktivists that voluntarily embrace the national cause and governments that subsidize, support and motivate them to hack”.
- The main problem with state-sponsored hacktivism is given by the difficulty to draw a line between spontaneous hacktivists’ actions and hacktivists’ operations launched with a massive support of governmental resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the organizational aspects of hacktivist?

A
  • Hacktivists’ operations are traditionally and more commonly linked to groups or network actions which provide better opportunities and likely higher chances of success.

This feeling of belonging to a group, sharing the same identity, and being at the same level are important aspects of hacktivism.

  • Hacktivism seems to adopt a horizontal and networked approach which emphasizes the autonomy and the role of the individual within the group, in a manner that mirrors the nodal structure of cyberspace.

While there is evidence of leaderless groups that use a democratic procedure to take decisions, there are also some strong personalities that tend to take a leading role within the team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the Hacktivist techniques?

A

Hacktivists techniques
- DOS
- DDOS
o The virtual sit-ins
 A virtual sit-in consists always and necessarily of a DDoS attack, because its aim is to block or hinder a certain target using the combined action of more devices
 3 Categories
* Requires the participation of hundreds or better thousands of protesters who rapidly, manually, and individually reload a specific web page on a targeted server, overloading it.
* Using a specific software pre-installed on the user’s device that reloades a web page.
* Makes use of voluntary botnets to launch the attacks. This means that a person offers his or her device to voluntarily become part of a botnet.
- Cyber Trespass
o Cyber trespass is the first step for many other actions and consists of accessing a computer or any other device or system network to obtain control of it, or to steal information, or to install malicious software.
- Website Defacements
o Consist of accessing a web server and replacing a web page with a new page bearing a socio-political message.
 Defacements enable hacktivists to post messages and images in which they state their ideologies and beliefs while simultaneously gaining status among the hacktivists and hacker community.
- Data Theft/Leak
o Data and information theft has become another important tool of protest for hacktivists, especially after the rise of Anonymous.
 Data theft has traditionally been considered an illegal and unacceptable form of protest and has often taken the shape of vigilant hacktivism rather than sociopolitical one.
- Website Redirect
o A website redirect is a technique that normally involves two phases:
 The usually illegal access to a website.
 The modification of its address.
o If a visitor digits that specific address, he/she will land in another, tailor-made website different from the original.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the phases of hacktivism throughout history?

A
  1. Characterized by an activist approach usually linked to leftwing ideologies.
    a. Hackers were discovering that hacking could be used to achieve different goals than the simple manipulation of computers and software.
    b. Can be divided in two subphases: The pre-web phase and web phase.
  2. Identified with the popularization and increased visibility of hacktivism, thanks to groups such as Anonymous.
    a. Anonymous transformed hacktivism from marginal skirmishes launched by sporadic cell based groups of techno-savvies to transnational and decentralized networks of hackers who try to intervene regularly into the real-world struggles.
  3. Phase 3: Represents the current phase of hacktivism.
    a. A rise of many cause-based hacktivist cells which work independently or in small networks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 4 aspects of hacktivism according to Samuel 2004

A

Hacktivism is a meeting point of four aspects (Samuel, 2004):
1. Online activism
a. Conventional (standard form of activism) or transgressive (involving a violation of moral or social boundaries)
2. Civil disobedience
a. Offline or online
3. Cyber terrorism
a. Violent or transgressive
4. Hacking
a. Political or apolitical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 3 modes of hacktivism according to samuel (2004)

A
  • Political cracking (not seen as hacktivism by Jordan & Taylor)
    o Using illegal methods to promote political goals.
  • Performative hacktivism (called ‘mass action hacktivism’ by Jordan & Taylor)
    o Offline activism based on protests, arts, without using any form of illegal action.
  • Political coding (called ‘digitally correct hacktivism’ by Jordan & Taylor)
    o Measures to avoid political surveillance.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Romonga’s taxonomy of hacktivism

A

In the taxonomy performative activism, hacktivism and political coding are all different forms of cyber activism.
- Cyber terrorism is seen as entirely seperate from hacktivism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three elements of taxonomy according to Romogna?

A
  1. Vigilante
    a. People that undertake law enforcement in their community without legal authority, typically because the legal agencies are thought to be inadequate. F.e. war on pedophiles.
  2. Patriotic
    a. Supporting one’s country through hacking.
  3. Socio-political
    a. Pursuing a socio-political goal
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why do Hacktivism, hacking, online activism and cyber terrorism differ?

A

They differ in degree of politicization, technicality, if disruption-aimed and if fear aimed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Should hacktivism be criminalized?

A
  • So should hacktivism be criminalized?
    o This depends on morals and techniques used. Website defacements are something else than doxing.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the definition of hacktivism according to Samuel (2004) and Vegh (2003)

A
  • According to Samuel (2004) hacktivism is the nonviolent use of illegal or legally ambiguous digital tools in pursuit of political ends.
  • According to Vegh (2003) hacktivism is a politically motivated single incident online action, or a campaign thereof, taken by non-state actors in retaliation to express disapproval or to call attention to an issue advocated by the activists.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is romogna definition of hacktivism?

A

Definition: The term refers to promoting a sociopolitical agenda, often tied to traditional activism, within cyberspace.
Methods: Achieved through individual and collective actions using computer hacking techniques.
Objectives: Exploiting, hindering, and disrupting ICT infrastructure without physical violence or direct economic gain.
Legal Ambiguity: Some actions fall into a gray area in terms of legality.

“The promotion of a sociopolitical agenda usually linked (but not limited) to ideologies typical of traditional activism and applied in cyberspace through individual and collective actions, using illegal or legally ambiguous computer hacking techniques that exploit, hinder, and disrupt the ICT infrastructure’s technical features, without the use of physical violence and without gaining direct economic benefits.”

17
Q

What are the differences between Hacktivism and cyber terrorism

A
18
Q

Is state-sponsored hacktivism still hacktivism?

A
  • State-sponsored hacktivism is hacktivism when:
    o Hacktivists are supported by the state but remain
    o Hacktivists have their independent. own ideology that overlaps with state’s interests. Aimed at protesting against another state.
  • State-sponsored hacktivism is not hacktivism when:
    o Hacktivists are fully financed by the state which decides targets, modus operandi and messages.
    o Hacktivists are not free to act and are recognized as branch of the state. Aimed at influencing the political situation of another state.
19
Q

How do people become hacktivist?

A
  • Most hacktivists were hackers before they came in contact with political motivations, so hacktivism is strongly dependent on the hacking culture.
  • So they experiment and engage.
  • Some are really young and go into hacking because they think its fun.
  • Others get into hacktivism through a desire to fight injustice
20
Q

What is SIMCA?

A

SIMCA
The Social Identity Model of Collective Action (SIMCA) illustrates how people can be sparked to collective action, and therefore become a hacktivist

  • Our morality ( moral values) affect our identity and how we identify others.
  • If these values are violated, (group-based) anger might rise and we take part in collective action.
  • If group efficacy, so a group’s shared belief in its conjoint capabilities to organize and execute, is triggered, collective action might also happen.
21
Q

In simca what are the 4 starting points of morality?

A
  1. People think they’re fighting crime/evil/terrorism
  2. The exposure of political/elite misconduct
  3. Patriotism
  4. Animal rights/environment

The way a person can personally identify themselves with a collective identity is also relevant in becoming a hacktivist
- Your personal identity determines your social identity. If your social identity can be identificated with a collective identity, you might be inclined to join this collective identity.

22
Q

What are factors in becoming hacktivists?

A
  • Perceived injustice (group-based anger) is also an important factor in becoming an hacktivist
    o Anger acts as an amplifier for a person’s desire to take part in collective action.
    o This anger can be based in roughly three sub-categories:
     Political actions
     Race/ethnicity/patriotism
     Social disparities
  • Perceived efficacy is also important, as it normally acts as the last step of the collective action process.
    o they think their actions can change something in society.
23
Q

What are the different approaches compared to the organizational approach of hacktivism?

A

Hacktivism can be conducted through an organizational approach, and different approaches can be:
- Teams
- Networks: many teams put together
- Loners: one person

24
Q

What Social opportunity structures explain how people get involved in hacktivism?

A
  1. Social Relationships
    a. People often start criminal activities through people they already know.
  2. Convergence settings
    a. When the social relationships are not enough to be able to get involved, people turn to convergence settings, which are places where you can find other criminals.
25
Q

What are the 3 paths for recruitment in Hacktivism?

A
  1. Teams send out a call for recruitment.
  2. Recruitment through social relations
  3. Approaching a team to get recruited
26
Q

What is the difference between hacktivists and organized crime?

A

The difference of hacktivist groups with organizational financially motivated crime, is that hacktivists don’t have to share personal information
- Members of financially motivated groups have to share personal details in order to receive money, which makes them more vulnerable. Since hacktivists don’t have to do this they are stronger.
The most important thing for hacktivists are that they are good at hacking, the ideological motivation to become part of a group is often less important than hacking skills.

27
Q

What are the variables in hacktivists teams?

A

Hacktivist teams can differ in:
1. Structure
a. Small groups, large collectives, developed networks.
2. Actions’ reach
a. Regional, national, international.
3. Motivations
a. Traditional socio-political issues, vigilantism, patriotism, religious.
Anonymous is a collective, but is made up of subgroups who work independently and are organised as teams