Who is Anonymous?
April 9, 2012 1 Comment
On September 15-1995 United Artists released the movie “Hackers”. Under the pseudonym “Zero Cool”, the main character at age 11 is arrested and charged with crashing 1,507 systems in one day and, causing a single-day 7-point drop in the New York Stock Exchange. Upon conviction, he is banned from owning or operating computers or touch-tone telephones until his 18th birthday. The movie has the usual evil character, chase scenes and hero ending, what is relevant is how a group of young adults use their computer skills to permeate government and public institutions, create viruses , and break into high security agencies, (U.S. Secret Service) of course all in the name of justice. Sound familiar?
In 2008 what has been called a “Hacker Collective” a group of young adults known as “Anonymous” have been brandishing their own sense of what they call justice. Their motto is “We are Legion” which in strict Merriam-Webster terms, “legion means a group of fighters, a faceless army more powerful as a whole than each individual” (Merriam Webster Online Dictionary). Anonymous takes great pains to be unidentifiable and amorphous, which means that its members are impossible to isolate as a single entity because anyone can join at anytime. They have been called pranksters and criminals. Some have dismissed them as nerds with too much free time while others have seen them as the “future form of internet-based social activism”. Their manner of attack is to use DDOS attacks abbreviated for Distributed Denial of Service a kind of network stress test in which each attacker gives consent to have his or her computer linked to a bot. net. The force of all those computers working together that focuses on one site, overwhelms the targeted site’s server and consequently disrupts, or takes the site down, better known as crashing (BBC News).
As for the literal operation of Anonymous, becoming part of it is as simple as going onto its Internet Relay Chat forums and typing away. There are numerous Twitter accounts which claim to be affiliated with Anonymous, and more websites that post and repost (known as mirroring). The real-life people involved in Anonymous could be behind their laptops anywhere, from an Internet café in Malaysia to a Michigan suburb. Anonymous appears to have no spokesperson or leader. One could participate for a minute or a day in a chat room, and then never go back again.
Where surveillance technology has been used to target individuals unjustly, and invade the privacy of individuals’ under a doctrine of “national, social and domestic security”, its use is justified, but when the same technology is used to protest it is called terrorism.
Media reports from CNN world news, the British Broadcasting Corporation, just to name a few have reported that Anonymous has hacked into FBI conferences, the U.S. Department of Justice, Mastercard, Paypal and Visa as well as numerous other government web sites worldwide over the last two years. Anonymous claims that they have numerous objectives, such as opposing extradition, email surveillance, censoring internet access, and were quoted as saying “Anonymous is you. You will not be denied your right to free speech, free press, free association and your universal right to freely access information both in real life and on the internet” (Fantz, 2012). One can like the objective but not necessarily the means.
DDOS attacks made Anonymous famous in 2010 when it targeted the sites of MasterCard, Visa and PayPal, their claim was that they were targeting the corporations because they had stopped doing business with WikiLeaks. In 2010, WikiLeaks “leaked 77,000 secret U.S. military and intelligence documents that revealed new details about the war in Afghanistan, as well as nearly a quarter United States embassy cables that showed how the U.S. kept tabs on its allies and on the UN, and turned a blind eye to human rights abuses in states it supported” CBC News, 2010). WikiLeaks editor and founder Julian Assange denied having any affiliation with the hactivists and that he had nothing to do with the attacks (Fantz, 2012).
On April 1-2012 Britain’s home office, that was previously the target of Anonymous, announced that the government will be able to monitor the calls, emails, texts and website visits of everyone in the UK under new legislation set to be announced soon. Internet firms will be required to give intelligence agency GCHQ access to communications on demand, in real time (BBC News, 2012). But it would enable intelligence officers to identify who an individual or group is in contact with, how often and for how long. They would also be able to see which websites someone had visited.
The spokesman for the government was quoted as saying that,
“It is vital that police and security services are able to obtain communications data in certain circumstances to investigate serious crime and terrorism and to protect the public,” and further that as set out in the Strategic Defence and Security Review we will legislate as soon as parliamentary time allows to ensure that the use of communications data is compatible with the government’s approach to civil liberties.” But Conservative MP and former shadow home secretary David Davis said it would make it easier for the government “to eavesdrop on vast numbers of people”. “What this is talking about doing is not focusing on terrorists or criminals it’s absolutely everybody’s emails, phone calls, web access…” (BBC News, 2012).
Nick Pickles, director of the Big Brother Watch and Shami Chakrabarti director of Liberty in the U.K. stated that it was a “drastic step in democracy that will see Britain adopt the same kind of surveillance seen in China and Iran” (BBC News, 2012). Chakrabarti went on to say that this was an absolute attack on privacy online and it is unclear how this will actually improve public safety”. Internet Service Providers Association said “any change in the law must be “proportionate, respect freedom of expression and the privacy of users” (BBC News, 2012).
Where the government has a responsibility to the people, transparency and accountability are key features of a democratic nation. When we put these features in the context of security the government should take special precautions to maintain a balance between the rights, liberties and freedoms of individuals and to balance this against providing security nationally, socially and domestically. Transparency advocates in the form of Anonymous and Wikileaks, although one takes a more radical approach, also has the ability to use technology to surveille the very government that is suveilling us in protest.
(2012, April 1). Email and web use ‘to be monitored’ under new laws. British Broadcasting
Corporation. Retrieved from: http://www.bbc.co.uk/news/uk-politics-17576745
(2012, April, 8). Expect more online attacks, Anonymous hackers say. British Broadcasting
Corporation. Retrieved from: http://www.bbc.co.uk/news/uk-17648852
Fantz, A. (2012, February 9). Who is Anonymous? Everyone and no one. CNN World News.
Retrieved from: http://articles.cnn.com/2012-02-09/world/world_anonymous-explainer_1_chat-room-internet-caf-anonymous-members?_s=PM:WORLD
Schwartz, M. (2011, October 25). Anonymous Threatens New York Stock Exchange Attack.
InformationWeek Security. http://www.informationweek.com/news/security/vulnerabilities/231900039