MA Thesis |
Hacktivism: An Analysis of the Motive to Disseminate Confidential Information
View Abstract
Anonymous, LulzSec, and the AntiSec movement are Internet-based organizations seeking to obtain and disseminate confidential data. Governments worldwide have made an attempt to crack down on these groups in response to the actions taken by them. Several countries, including the United States (Federal Bureau of Investigation, 2011a; 2011b; Department of Justice, 2011), the United Kingdom (Halliday, Arthur, & Ball, 2011; Halliday, 2011b), Spain (Tremlett, 2011), France (Manach, 2012), the Netherlands (Associated Press, 2011), Italy, Switzerland, Turkey (Harris, 2011), Argentina, Chile, and Colombia (Associated Press, 2012) have made arrests and have raided residences belonging to Anonymous and LulzSec members. It is believed that hacktivist groups were responsible for more stolen data than cybercriminals during 2011 (Verizon, 2012), the first year that cybercriminals’ participation in hacking was surpassed by another type of cyber actor. The infamy and notoriety gained by these organizations makes it clear; disseminated confidential information is a threatening phenomenon on the rise in the 21st century affecting governmental security worldwide. The Internet, the most crucial element for the facilitation of these groups’ actions, is responsible for bringing them together.
|
2012 |
Held, W. V. |
View
Publisher
|
Report |
Cyber Swarming, Memetic Warfare and Viral Insurgency: How Domestic Militants Organize on Memes to Incite Violent Insurrection and Terror Against Government and Law Enforcement
View Abstract
The Report you are about to read, “Cyber Swarming: Memetic Warfare and Viral Insurgency,” represents a breakthrough case study in the capacity to identify cyber swarms and viral insurgencies in nearly real time as they are developing in plain sight. The result of an analysis of over 100 million social media comments, the authors demonstrate how the “boogaloo meme,” “a joke for some, acts as a violent meme that circulates instructions for a violent, viral insurgency for others.” Using it, like turning off the transponders on 9/11, enables the extremists to hide in plain sight, disappearing into the clutter of innocent messages, other data points. It should be of particular concern, the authors note, for the military, for whom “the meme’s emphasis on military language and culture poses a special risk.”
Because most of law enforcement and the military remain ignorant of “memetic warfare,” the authors demonstrate, extremists who employ it “possess a distinct advantage over government officials and law enforcement.” As with the 9/11 terrorists, “they already realize that they are at war. Public servants cannot afford to remain ignorant of this subject because as sites, followers, and activists grow in number, memes can reach a critical threshold and tipping point, beyond which they can suddenly saturate and mainstream across entire cultures.” This Report is at once an urgent call to recognize an emerging threat and a prescription for how to counter it. As such, it offers that rarest of opportunities: the chance to stop history from repeating itself.
|
2020 |
Goldenberg, A. and Finkelstein, J. |
View
Publisher
|
PhD Thesis |
A Critical Reflection On the Construction of the Cyberterrorist Threat in the United Kingdom of Great Britain and Northern Ireland
View Abstract
Cyberterrorism has not occurred. Furthermore, the definitional parameters of cyberterrorism have not been conclusively defined by either policymakers or academia. However, in 2010 the threat posed by the terrorist application of cyber weaponry to target British critical national infrastructure became a ‘Tier One’ threat to the UK. This thesis is the first comprehensive mapping and analysis of the official British construction of the threat of cyberterrorism between 12th May 2010 and 24th June 2016. By using interpretive discourse analysis, this thesis identifies ‘strands’ from a comprehensive corpus of policy documents, statements and speeches from Ministers, MPs and Peers. This thesis examines how the threat of cyberterrorism was constructed in the UK, and what this securitisation has made possible. In addition, this thesis makes novel contributions to the Copenhagen School’s ‘securitisation theory’ framework. Accordingly: this thesis outlines the framework for a ‘tiered’, rather than monolithic audience; refines the ‘temporal’ and ‘spatial’ conditioning of a securitisation with reference to the unique characteristics of cyberterrorism; and lastly, details the way in which popular fiction can be ascribed agency in securitising moves to ‘fill in’ a lack of case studies of threat with gripping vicarious fictional narratives. It is identified that the 2010 British Coalition Government’s classification of cyberterrorism as a ‘Tier One’ threat created a central strand upon which a discursive securitisation was established. Despite the absence of a ‘cyberterrorist’ incident across the period under scrutiny, the securitisation did not recede. The threat posed by cyberterrorism was articulated partially within a ‘New Terrorism’ frame, and it was deemed by Ministers, MPs and Lords to be a threat that was likely to escalate in both severity and possibility over time. A notable finding is the positioning of the securitisation against a particular ‘cyberterrorist’ identity epitomised by social actors using cyberspace, rather than the tangible environments of cyberspace.
|
2018 |
Mott, G. |
View
Publisher
|
Book |
Online Terrorist Propaganda, Recruitment, and Radicalization
View Abstract
Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists’ online presence is utilized for terrorism funding, communication, and recruitment purposes. The book offers an in-depth coverage of the history and development of online “footprints” to target new converts, broaden their messaging, and increase their influence. Chapters present the emergence of various groups; the advancement of terrorist groups’ online presences; their utilization of video, chat room, and social media; and the current capability for propaganda, training, and recruitment.
With contributions from leading experts in the field-including practitioners and terrorism researchers-the coverage moves from general factors to specific groups practices as relate to Islamic State of Iraq and the Levant (ISIL), and numerous other groups. Chapters also examine the lone wolf phenomenon as a part of the disturbing trend of self-radicalization. A functional, real-world approach is used regarding the classification of the means and methods by which an online presence is often utilized to promote and support acts of terrorism.
Online Terrorist Propaganda, Recruitment, and Radicalization examines practical solutions in identifying the threat posed by terrorist propaganda and U.S. government efforts to counter it, with a particular focus on ISIS, the Dark Web, national and international measures to identify, thwart, and prosecute terrorist activities online. As such, it will be an invaluable resources for intelligence professionals, terrorism and counterterrorism professionals, those researching terrorism funding, and policy makers looking to restrict the spread of terrorism propaganda online.
|
2019 |
Vacca, J. R. |
View
Publisher
|
Book |
Cyber Racism and Community Resilience: Strategies for Combating Online Race Hate
View Abstract
This book highlights cyber racism as an ever growing contemporary phenomenon. Its scope and impact reveals how the internet has escaped national governments, while its expansion is fuelling the spread of non-state actors. In response, the authors address the central question of this topic: What is to be done? Cyber Racism and Community Resilience demonstrates how the social sciences can be marshalled to delineate, comprehend and address the issues raised by a global epidemic of hateful acts against race. Authored by an inter-disciplinary team of researchers based in Australia, this book presents original data that reflects upon the lived, complex and often painful reality of race relations on the internet. It engages with the various ways, from the regulatory to the role of social activist, which can be deployed to minimise the harm often felt. This book will be of particular interest to students and academics in the fields of cybercrime, media sociology and cyber racism.
|
2017 |
Jakubowicz, A., Dunn, K., Mason, G., Paradies, Y., Bliuc, A.M., Bahfen, N., Oboler, A., Atie, R. and Connelly, K. |
View
Publisher
|
Chapter |
Online Hate: From the Far-Right to the ‘Alt-Right’ and from the Margins to the Mainstream
View Abstract
In the 1990s and early 2000s, there was much discussion about the democratic and anti-democratic implications of the Internet. The latter particularly focused on the ways in which the far-right were using the Internet to spread hate and recruit members. Despite this common assumption, the American far-right did not harness the Internet quickly, effectively or widely. More recently, however, they have experienced a resurgence and mainstreaming, benefitting greatly from social media. This chapter examines the history of their use of the Internet with respect to: (1) how this developed in response to political changes and emerging technologies; (2) how it reflected and changed the status of such movements and their brand of hate; and (3) the relationship between online activity and traditional methods of communication.
|
2019 |
Winter, A. |
View
Publisher
|