Hacktivists against Terrorism: A Cultural Criminological Analysis of Anonymous' Anti-IS Campaigns
Authors/Creators
- 1. Deakin University, Australia
- 2. The University of Melbourne, Australia
Description
This article uses a cultural criminology approach to examine cyber campaigns waged by the hacker collective, Anonymous, against the jihadist organization, Islamic State (IS). Employing Jeff Ferrell and Mike Presdee’s theory as a conceptual framework, it examines how Anonymous’ anti-IS campaigns have been constructed and shaped by characteristics of the late-modern mediascape, including its affordances for carnivalesque transgression, reflexive media, and crowd-sourced politicization. Through reference to key statements and actions made by Anonymous immediately following IS-related attacks in Paris during 2015, our analysis examines high profile social and video media produced by the hacktivist collective, and relevant commentary from news media, experts, and industry representatives. With its focus on resistance and the ‘politics of meaning’, we argue that cultural criminology has much to offer in unpacking the emotional appeal, craft, public identity, and social representations of Anonymous as a hacktivist collective.
Files
Richards&WoodVol12Issue1IJCC2018.pdf
Files
(1.3 MB)
| Name | Size | Download all |
|---|---|---|
|
md5:581d2a9df9def9712df7d346f7f85dc9
|
1.3 MB | Preview Download |
Additional details
Related works
- Is identical to
- http://cybercrimejournal.com/Richards&WoodVol12Issue1IJCC2018.pdf (URL)
References
- Anonymous. (2015a, April 22). Anonymous – message #OpIsrael clarification [Video file]. Retrieved from https://www.yoMtube.com/watch?v=H7OnZUy7ycs. Anonymous (2015b, December 15). #OpISIS - A message from Anonymous and friends. Retrieved from the Anonymous website: https://www.anonymous-france.eu/we-are-on-the-side-of-the-oppressed.html. Atwan, A.B. (2015). Islamic State: The Digital Caliphate. Oakland, CA: University of California Press. Bakhtin, M. (1984). Rabelais and His World. Bloomington, IN: Indiana University Press. Baudrillard, J. (1994). Simulacra and Simulation. Ann Arbor, MI: University of Michigan Press. Bauman, Z. (2013). Liquid Modernity. Cambridge, UK: Polity BinarySec. (2015, August 27). OpISIS target list. Pastebin. Retrieved from http://pastebin.com/jrVZK7vj. Bond, A. (2015, February 11). Hacking group Anonymous remove 1,000 Islamic State websites in 3 days and warn 'we'll hunt you down'. The Mirror. Retrieved from http://www.mirror.co.uk/news/technology-science/technology/hacking-group-anonymous-remove-1000-5143903. Borges J. L. (1940). Tlön, Uqbar, Orbis Tertius. Sur, 31. Brisman, A., & South, N. (2013). A green-cultural criminology: An exploratory outline. Crime, Media, Culture, 9(2), 115-135. Brookings, E.T. (2015, January 7). Anonymous v The Islamic State. Foreign Policy. Retrieved from http://foreignpolicy.com/2015/11/13/anonymous-hackers-islamic-state-isis-chan-online-war/. Bult, L. (2015, November 24). Activist group Anonymous is 'rickrolling' ISIS. New York Daily News. Retrieved from http://www.nydailynews.com/news/world/activist-group-anonymous-rickrolling-isis-article-1.2445685. Carey, B. (2015, November 18). Stanford cybersecurity expert analyzes Anonymous' hacking attacks on ISIS. Standford News. Retrieved from http://news.stanford.edu/2015/11/18/lin-anonymous-isis-111815/. Cluley, G. (2015, January 12). Anonymous attacks jihadist websites after Parisian killings. Tripwire. Retrieved from https://www.tripwire.com/state-of-security/off-topic/anonymous-attacks-jihadist-websites/. Cohen, S. (1972). Folk Devils and Moral Panics: The Creation of the Mods and Rockers. London, UK: MacGibbon and Kee. Coleman, G. (2014). Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous. London, UK: Verso. Cottee, S. (2015, October 8). The cyber activists who want to shut down ISIS. The Atlantic. Retrieved from https://www.theatlantic.com/international/archive/2015/10/anonymous-activists-isis-twitter/409312/ Cottee, S., & Hayward, K. (2011). Terrorist (E)motives: The existential Attractions of Terrorism. Studies in Conflict & Terrorism, 34(12), 963-986. Cuthbertson, A. (2015, November 17). Anonymous #OpParis: Hacktivists publish 'Noob's Guide' for fighting ISIS online'. International Business Times. Retrieved from http://www.ibtimes.co.uk/anonymous-opparis-hacktivists-publish-noobs-guide-fighting-isis-online-1529173. Debord, G. (1983). Society of the Spectacle. Detroit, MI: Black and Red. Ferrell, J. (1993). Crimes of Style: Urban Graffiti and the Politics of Criminality. New York, NY: Northeastern University Press. Ferrell, J. (1995). Style Matters: Criminal Identity and Social Control. In J. Ferrell & C.R. Sanders, Cultural Criminology. Lebanon, NH: Northeastern University Press. Ferrell, J. (1997). Criminological verstehen: Inside the immediacy of crime. Justice Quarterly, 14(1), 3-23. Ferrell, J. (1999). Cultural Criminology. Annual Review of Sociology, 25, 395-418. Ferrell, J. (2004). Boredom, crime and criminology. Theoretical Criminology, 8(3), 287-302. Ferrell, J. (2007). For a ruthless cultural criticism of everything existing. Crime Media Culture, 3(1), 91-100. Ferrell, J. (2013). Cultural criminology and the politics of meaning. Critical Criminology, 21(3), 257-271. Ferrell J., Hayward, K., Morrison, W., & Presdee, M. (2004). Fragments of a manifesto: Introducing cultural criminology unleashed. In J. Ferrell, K. Hayward, W. Morrison & M. Presdee, Cultural Criminology Unleashed. London, UK: Routledge, 1-9. Ferrell, J., Hayward, K., & Young, J. (2008). Cultural Criminology: An Invitation. London, UK: SAGE. Ferrell, J., & Sanders, C. (1996). Cultural Criminology. Boston, MA: Northeastern University Press. Franceschi-Bicchierai, L. (2016, November 5). Inside Anonymous' 'civil war' over its fight with ISIS. Motherboard Vice. Retrieved from http://motherboard.vice.com/read/inside-anonymous-civil-war-over-its-fight-with-isis. Giddens, A. (1986). The Constitution of Society: Outline of the Theory of Structuration. Berkeley, CA: University of California Press. Giddens, A. (1991). Modernity and Self-identity: Self and Society in the Late Modern Age. Redwood City, CA: Stanford University Press. Gilbert, D. (2015, December 15). Anonymous is hacking ISIS, but warns collaborating with US government is 'deeply stupid'. IBTimes. Retrieved from http://www.ibtimes.com/anonymous-hacking-isis-warns-collaborating-us-government-deeply-stupid-2226066. Gladstone, R. (2015, March 31). Activist links more than 26,000 Twitter Accounts to ISIS. The New York Times. Retrieved from https://www.nytimes.com/2015/04/01/world/middleeast/activist-links-more-than-26000-twitter-accounts-to-isis.html. Griffin, A. (2015, November 26). Anonymous group takes down ISIS Website, replaces it with Viagra ad along with message to calm down. The Independent. Retrieved from http://www.independent.co.uk/life-style/gadgets-and-tech/news/anonymous-group-takes-down-isis-website-replaces-it-with-viagra-ad-and-message-to-calm-down-a6749486.html. Hamill, J. (2015, November 18). Anonymous publishes details of 'ISIS Recruiters' and takes down 5,500 Twitter accounts. The Mirror. Retrieved from http://www.mirror.co.uk/news/technology-science/technology/anonymous-publishes-details-isis-recruiters-6848502. Hamm, M.S. (2004). Apocalyptic violence: The seduction of terrorist subcultures. Theoretical Criminology, 8(3), 323-339. Hammond, J. (2015, December 15). Reject #OpISIS and the co-opting of Anonymous. Free Jeremy. Retrieved from https://freejeremy.net/2015/12/10/reject-opisis-and-the-co-opting-of-anonymous/https://twitter.com/groupanon/status/668281090977697792. Hayward, J. (2015, February 10). Anonymous' hackers take down ISIS social media accounts. Breitbart. Retrieved from http://www.breitbart.com/national-security/2015/02/10/anonymous-hackers-take-down-isis-social-media-accounts/. Hayward, K. J. (2011). The critical terrorism studies-cultural criminology nexus: Some thoughts on how to 'toughen up' the critical studies approach. Critical Studies on Terrorism, 4(1), 57-73. Hayward, K. J. (2015). Five spaces of cultural criminology. British Journal of Criminology, 52(3), 441-462. Hayward, K. J. (2016). Cultural criminology: Script rewrites. Theoretical Criminology, 20(3), 297-321. Hayward, K. J. & Young, J. (2004) Cultural criminology: Some notes on the script. Theoretical Criminology, 8(3), 259-273. Hern, A. (2015, November 19). Web services firm CloudFlare accused by Anonymous of helping ISIS. The Guardian. Retrieved from https://www.theguardian.com/technology/2015/nov/19/cloudflare-accused-by-anonymous-helping-isis. Hussey, M. (2015, November 17). Anonymous declares 'total war' on Islamic State after Paris attacks. The Next Web. Retrieved from https://thenextweb.com/insider/2015/11/16/anonymous-declares-total-war-on-islamic-state-after-paris-attacks/. Jackson, R. (2007). The core commitments of critical terrorism studies. European Political Science, 6(3), 244-251. Katz, J. (1988). Seductions of Crime: Moral and Sensual Attractions in Doing Evil. New York, NY: Basic Books. Lennard, N. (2012, March 9) Occupy pop culture: A lesson in détournement. Salon. Retrieved from www.salon.com/2012/03/08/occupy_pop_culture_a_lesson_in_detournement. Levy, S. (1984). Hackers: Heroes of the Computer Revolution. New York, NY: Anchor Press. Lister, C. (2014). Profiling the Islamic State. Doha, Qatar: Brookings Institution. Mastroianni, B. (2015, November 24). Anonymous vs. ISIS: Who has the upper hand in social media war?' CBS News. Retrieved from http://www.cbsnews.com/news/anonymous-vs-isis-social-media-war/. Myles, D., Benoit-Barne, C., & Millerand, F. (2016). 'Not your personal army': Vigilantism as a rhetorical figure among citizens who solve crimes online. Proceedings of the ACM 2016 conference on Social Media & Society, July 11-13, 2016, Toronto, Canada. Naegler, L. (2012). Gentrification and Resistance: Cultural criminology, control and the commodification of urban protest in Hamburg. Berlin, Germany: LIT Verlag. Parkin, S. (2016, October 6). Operation troll ISIS: Inside Anonymous' war to take down Daesh. Wired. Retrieved from http://www.wired.co.uk/article/anonymous-war-to-undermine-daesh. Presdee, M. (1999). Cultural Criminology and the Carnival of Crime. London, UK: Routledge. Price, R. (2015, November 19). There are concerns that anonymous' war on ISIS is doing more harm than good. Business Insider. Retrieved from http://www.businessinsider.com.au/will-anonymous-war-on-isis-work-ineffectual-2015-11. Ravenscroft, N., & Gilchrist, P. (2009). Spaces of transgression: governance, discipline and reworking the carnivalesque. Leisure Studies, 28(1), 35-49. Redmon, D. (2003). Playful deviance as an urban leisure activity: Secret selves, self-validation, and entertaining performances. Deviant Behavior, 24(1), 27–51. Reynolds, E. (2015, December 7). Anonymous declares December 11 'ISIS Trolling Day'. Wired. Retrieved from http://www.wired.co.uk/article/anonymous-isis-trolling-day. Richards, I. (2016). The 'spirit of terrorism' in Islamic State media. International Journal of Baudrillard Studies, 13(2), np. Rogers, K. (2015, November 25). Anonymous hackers fight ISIS but reactions are mixed. The New York Times. Retrieved from https://www.nytimes.com/2015/11/26/world/europe/anonymous-hackers-fight-isis-but-reactions-are-mixed.html?_r=0. Seal, L. (2013). Pussy Riot and feminist cultural criminology: A new 'femininity in dissent'? Contemporary Justice Review, 16(2), 293-303. Smith, J. (2015, December 5). Anonymous divided: Inside the two warring hacktivist cells fighting ISIS online. Mic. Retrieved from https://mic.com/articles/129679/anonymous-vs-isis-how-ghostsec-and-ghost-security-group-are-targeting-terrorists#.kfTw2mows. Stake, R. E. (2011). The case study method in social inquiry. In R. Gomm, M. Hammersely & P. Foster, Case Study Method. London, UK: SAGE. Steinmetz, K. F. (2015). Craft(y)ness: An ethnographic study of hacking. British Journal of Criminology, 55(1), 125-145. Steinmetz, K. F. (2016). Hacked: A Radical Approach to Hacker Culture and Crime. New York, NY: New York University Press. Steinmetz, K. F., Schaefer, B. P., & Green, E. L. W. (2016). Anything but boring: A cultural criminological exploration of boredom. Theoretical Criminology. DOI: 10.1177/1362480616652686. Solon, O. (2015, January 9). Charlie Hebdo: Anonymous declares 'war' on jihadists in retaliation for Paris massacre with #OpCharlieHebdo. Daily Record. Retrieved from http://www.dailyrecord.co.uk/news/uk-world-news/charlie-hebdo-anonymous-declares-war-4951113. Viebeck, E. (2015, December 12). Anarchist hackers start cyber war with ISIS. The Hill. Retrieved from http://thehill.com/policy/cybersecurity/232583-anarchist-hackers-go-to-cyber-war-with-isis [Last accessed 25/07/2017]. Walker, R. (2011, December 8). Recognizably Anonymous. Slate. Retrieved from http://www.slate.com/blogs/the_slatest/2017/07/01/pentagon_delays_lifting_ban_on_transgender_recruits_by_at_least_six_months.html. Weber, M. (1949). The Methodology of the Social Sciences. New York, NY: Free Press. Winter, C. (2015). Documenting the Virtual 'Caliphate'. London, UK: Quillam Foundation. Wood, M.A. (2017). Antisocial Media: Crime-watching in the Internet Age. London, UK: Palgrave Macmillan. Yar, M. (2016). Toward a Cultural Criminology of the Internet. In K.F. Steinmetz & M.R. Nobles, Technocrime and Criminological Theory (pp. 116-132). London, UK: Routledge. Young, J. (1999). The Exclusive Society. London, UK: SAGE.