Hacktivist

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 690 Experts worldwide ranked by ideXlab platform

Paul Mobbs - One of the best experts on this subject based on the ideXlab platform.

Mei - One of the best experts on this subject based on the ideXlab platform.

Kieran Mclaughlin - One of the best experts on this subject based on the ideXlab platform.

  • big fish little fish critical infrastructure an analysis of phineas fisher and the Hacktivist threat to critical infrastructure
    2020 International Conference on Cyber Situational Awareness Data Analytics and Assessment (CyberSA), 2020
    Co-Authors: Peter Maynard, Kieran Mclaughlin
    Abstract:

    The Hacktivist threat actor is listed in many risk decision documents. Yet their tactics and techniques often remain a mystery. We create a MITRE ATT&CKTM (ATT&CK) model of a well known Hacktivist who goes under the pseudonym of Phineas Fisher, and map that threat to critical infrastructure. The analysis is derived from hacker manifestos, journalist reporting, and official government documentation. This analysis fills a gap in current threat models, to better define what skills and methods a determined hacker might employ. This paper also identifies seven essential mitigations which can be deployed by critical infrastructure operations and asset owners, to prevent such intrusions by Hacktivists. We are in the process of contributing this threat actor into the MITRE ATT&CKTM knowledge base.

  • Big Fish, Little Fish, Critical Infrastructure: An Analysis of Phineas Fisher and the 'Hacktivist' Threat to Critical Infrastructure
    arXiv: Cryptography and Security, 2020
    Co-Authors: Peter Maynard, Kieran Mclaughlin
    Abstract:

    The Hacktivist threat actor is listed in many risk decision documents. Yet their tactics and techniques often remain a mystery. We create a MITRE ATT&CK (ATT&CK) model of a well known Hacktivist who goes under the pseudonym of Phineas Fisher, and map that threat to critical infrastructure. The analysis is derived from hacker manifestos, journalist reporting, and official government documentation. This analysis fills a gap in current threat models, to better define what skills and methods a determined hacker might employ. This paper also identifies seven essential mitigations which can be deployed by critical infrastructure operations and asset owners, to prevent such intrusions by Hacktivists. We are in the process of contributing this threat actor into the ATT&CK knowledge base.

  • CyberSA - Big Fish, Little Fish, Critical Infrastructure: An Analysis of Phineas Fisher and the ‘Hacktivist’ Threat to Critical Infrastructure
    2020 International Conference on Cyber Situational Awareness Data Analytics and Assessment (CyberSA), 2020
    Co-Authors: Peter Maynard, Kieran Mclaughlin
    Abstract:

    The Hacktivist threat actor is listed in many risk decision documents. Yet their tactics and techniques often remain a mystery. We create a MITRE ATT&CKTM (ATT&CK) model of a well known Hacktivist who goes under the pseudonym of Phineas Fisher, and map that threat to critical infrastructure. The analysis is derived from hacker manifestos, journalist reporting, and official government documentation. This analysis fills a gap in current threat models, to better define what skills and methods a determined hacker might employ. This paper also identifies seven essential mitigations which can be deployed by critical infrastructure operations and asset owners, to prevent such intrusions by Hacktivists. We are in the process of contributing this threat actor into the MITRE ATT&CKTM knowledge base.

Shona Leitch - One of the best experts on this subject based on the ideXlab platform.

  • the syrian electronic army a Hacktivist group
    Journal of Information Communication and Ethics in Society, 2016
    Co-Authors: Matthew Warren, Shona Leitch
    Abstract:

    Purpose The aim of the paper is to assess the Hacktivist group called the Syrian Electronic Army and determine what their motivations, in terms of ethical and poetical motivations. Design/methodology/approach The paper looks at chronological examples of Syrian Electronic Army activities and assess them using a developed Hacktivist criteria to try and gain a greater understanding of the motivations of the Syrian Electronic Army. The paper uses a Netnography research approach. Findings The paper determines that the Syrian Electronic Army is motivated to protect the Syrian government. This protection is highlighted by the new media and social media organisations that the Syrian Electronic Army attack online. Research limitations/implications The paper focuses only on one group the Syrian Electronic Army. Practical implications A greater understanding of the Syrian Electronic Army. Originality/value A unique study into the motivation of the Syrian Electronic Army.

  • The Syrian Electronic Army – a Hacktivist group
    Journal of Information Communication and Ethics in Society, 2016
    Co-Authors: Matthew Warren, Shona Leitch
    Abstract:

    Purpose The aim of the paper is to assess the Hacktivist group called the Syrian Electronic Army and determine what their motivations, in terms of ethical and poetical motivations. Design/methodology/approach The paper looks at chronological examples of Syrian Electronic Army activities and assess them using a developed Hacktivist criteria to try and gain a greater understanding of the motivations of the Syrian Electronic Army. The paper uses a Netnography research approach. Findings The paper determines that the Syrian Electronic Army is motivated to protect the Syrian government. This protection is highlighted by the new media and social media organisations that the Syrian Electronic Army attack online. Research limitations/implications The paper focuses only on one group the Syrian Electronic Army. Practical implications A greater understanding of the Syrian Electronic Army. Originality/value A unique study into the motivation of the Syrian Electronic Army.

Leonie Maria Tanczer - One of the best experts on this subject based on the ideXlab platform.

  • Book review: living with hacktivism - from conflict to symbiosis by Vasileios Karagiannopoulos
    2018
    Co-Authors: Leonie Maria Tanczer
    Abstract:

    Convictions of politically-motivated hackers - so-called 'Hacktivists' - have hit the headlines in recent years. Living with Hacktivism: From Conflict to Symbiosis offers one of the first legal and regulatory analyses of this evolving phenomena. Author Vasileios Karagiannopoulos attentively guides the reader through the shortcomings of the contemporary legislative cybercrime and cyberterrorism landscape, focusing specifically on the USA and UK. Although Leonie Maria Tanczer would have hoped to see a stronger engagement with the work of ‘hackademics’, the publication is an important contribution to the evolving body of cybercrime literature.

  • The Terrorist – Hacker/Hacktivist Distinction: An Investigation of Self-Identified Hackers and Hacktivists
    2017
    Co-Authors: Leonie Maria Tanczer
    Abstract:

    The academic literature on terrorism is filled with references to online activities, and the equation of hacking and hacktivism (i.e., politically motivated hacking) with cyberterrorism. This perspective ignores differences in capacities, scope, and motives. Besides, scholarly research is lacking examinations of those perceived as alleged ‘security threats’. This chapter therefore uses interviews with self-identified hackers and Hacktivists (N = 35) to address this gap. It examines the distinction between hacking, hacktivism, and cyberterrorism, and studies the discourses and practices of hackers and Hacktivists. Building upon the theoretical concept of (in)securitisation and the method of thematic analysis, the findings provide insights into (a) perceptions of hackers and Hacktivists by external actors and their (b) self-assessment that stands in contrast to the viewpoints expressed earlier. The results highlight interviewees' objections to the translation of hacking and hacktivism into violent acts of any nature, with participants articulating that the connection of these concepts poses threats to civil liberties and political rights online. The chapter therefore has implications both for academic as well as professional discourse. It seeks to foster a more reflected engagement with these concepts and points to the need for concrete terminological delineations.

  • the terrorist hacker Hacktivist distinction an investigation of self identified hackers and Hacktivists
    2017
    Co-Authors: Leonie Maria Tanczer
    Abstract:

    The academic literature on terrorism is filled with references to online activities, and the equation of hacking and hacktivism (i.e., politically motivated hacking) with cyberterrorism. This perspective ignores differences in capacities, scope, and motives. Besides, scholarly research is lacking examinations of those perceived as alleged ‘security threats’. This chapter therefore uses interviews with self-identified hackers and Hacktivists (N = 35) to address this gap. It examines the distinction between hacking, hacktivism, and cyberterrorism, and studies the discourses and practices of hackers and Hacktivists. Building upon the theoretical concept of (in)securitisation and the method of thematic analysis, the findings provide insights into (a) perceptions of hackers and Hacktivists by external actors and their (b) self-assessment that stands in contrast to the viewpoints expressed earlier. The results highlight interviewees' objections to the translation of hacking and hacktivism into violent acts of any nature, with participants articulating that the connection of these concepts poses threats to civil liberties and political rights online. The chapter therefore has implications both for academic as well as professional discourse. It seeks to foster a more reflected engagement with these concepts and points to the need for concrete terminological delineations.

  • Hacktivism and the male-only stereotype
    New Media & Society, 2015
    Co-Authors: Leonie Maria Tanczer
    Abstract:

    This research explores hacktivism as a new form of online political activism. It uses qualitative interviews with a gender-equal sample of 10 self-defined Hacktivists to address issues of gender and the discursive strategies used by males and females to handle the Hacktivist community’s male-only stereotype. The semi-structured interviews are analysed using Foucauldian discourse analysis (FDA). The analysis indicates that male Hacktivists relate to this dominant male-only representation through discursive techniques such as the suppression of gender (Male Oblivious Discourse) or mechanisms of vindication (Male Justification Discourse). Female Hacktivists use the accentuation of gender and sexism to counteract male-dominant discourses and establish Female Discourses of Resistance (Emphasis Discourse; Negation Discourse). These gender-related argumentative positions and rhetorical mechanisms demonstrate how the male-only stereotype is created and maintained and how it affects not only Hacktivists’ talk and sense-making but also their identity and the Hacktivist actions they perform.

  • Hacktivism and the Male-Only Stereotype
    2015
    Co-Authors: Leonie Maria Tanczer
    Abstract:

    This research explores hacktivism as a new form of online political activism. It uses qualitative interviews with a gender-equal sample of ten self-defined Hacktivists to address issues of gender and the discursive strategies used by males and females to handle the Hacktivist community’s male-only stereotype. The semi-structured interviews are analysed using Foucauldian discourse analysis (FDA). The analysis indicates that male Hacktivists relate to this dominant male-only representation through discursive techniques such as the suppression of gender (Male Oblivious Discourse) or mechanisms of vindication (Male Justification Discourse). Female Hacktivists use the accentuation of gender and sexism to counteract male-dominant discourses and establish Female Discourses of Resistance (Emphasis Discourse; Negation Discourse). These gender-related argumentative positions and rhetorical mechanisms demonstrate how the male-only stereotype is created and maintained, and how it affects not only Hacktivists’ talk and sense-making, but also their identity and the Hacktivist actions they perform.