SlideShare una empresa de Scribd logo
1 de 13
The Securitization
of Online Activism
Outline
Introduction
 Background
 Anonymous
 Speech Act
 The Audience
 Emergency Measures
 Conclusion
Key Question
How are government actors in the United States taking
action to securitize hacktivism?
Hacktivism: the act of hacking, or breaking into a
computer system, for a politically or socially motivated
purpose. The individual who performs an act of
hacktivism is said to be a hacktivist (TechTarget, 2001).
Hypothesis
Hacktivism, and particularly the online activism group
Anonymous, is being securitized by government actors in
the United States through dialogue and legal mechanisms
that frame hacktivists as terrorists.
Background
How has hacktivism evolved, and in which ways do
hacktivists interact with government actors?
Method: a literature review of academic, government
and news documents on the subject of online activism,
with a focus on the United States.
Anonymous
a loosely-affiliated group of computer programmers
 organizes itself to coordinate online protests
methods include DDOS attacking websites, hacking
into organizations' servers and leaking documents.
Anonymous hasn't once used its capabilities to physically
harm another human being or the general public.
Civil Disobedience
Electronic civil disobedience is borrowing the non-violent direct
action tactics from earlier social movements (Wray, 1998).
 Diverting traffic away from a website is akin to setting up a
roadblock of picking a building
 Organizing a denial of service attack is akin to a sit-in
(Auty, 2004)
Acts of cyber disobedience are de facto illegal, but hacktivist acts
are only those that serve as social or political forms of protest
(Huschle, 2002).
Speech Act
What language have government actors in the United
States used to frame hacktivism as a threat to national
security?
Method: Document analysis of government documents,
academic and news articles
 Theory: Framing theory
Speech Act
Terrorism remains the FBI’s top priority. But in the not too
distant future, we anticipate that the cyber threat will pose the
number one threat to our country. We need to take lessons
learned from fighting terrorism and apply them to cyber crime.
We must continue to push forward, because our adversaries are
relentless. They want our money, our property, and our secrets,
and some seek to harm us well beyond that. Together, we can
turn the tide against them and bolster the security of our
nation’s information, networks, and infrastructure.
Speech Act
Today, our adversaries sit on fiber optic cables and wi-fi
networks, unknown and undetected…They seek our technology,
our intelligence and our intellectual property, even our military
weapons and strategies. In short, they have everything to gain,
and we have a great deal to lose.
The end result will be the same: we will lose our data. We may
lose access to our own information. And we may well lose our
security.
The Audience
How are citizens and the private sector responding to the
message that hacktivists pose an imminent threat?
Method: Document analysis News articles, public
sector reports and online blogs
 Theory: Constructivist theory
Emergency Measures
What emergency measures are government actors
promoting in order to strengthen their nation’s security
against hacktivism?
Method: Document analysis of government, academic,
and news documents and blogs.
 Theory: Constructivist theory
Conclusion
Government actors in the United States are in the process
of securitizing hacktivism, and in particular the online
activism group Anonymous. They are already framing
hacktivism as a form of terrorism, and highlighting the
future potential threats to national security.

Más contenido relacionado

La actualidad más candente

GOVERNMENT CYBERSECURITY FORUM
GOVERNMENT CYBERSECURITY FORUMGOVERNMENT CYBERSECURITY FORUM
GOVERNMENT CYBERSECURITY FORUM
Chuck Brooks
 
eCrypt Technologies
eCrypt TechnologieseCrypt Technologies
eCrypt Technologies
Chuck Brooks
 
Darknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint fileDarknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint file
raevenroxas
 

La actualidad más candente (20)

Cybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietyCybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil Society
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
Digital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedDigital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the Networked
 
GOVERNMENT CYBERSECURITY FORUM
GOVERNMENT CYBERSECURITY FORUMGOVERNMENT CYBERSECURITY FORUM
GOVERNMENT CYBERSECURITY FORUM
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its Discontents
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
 
6026 Cybersecurity China
6026 Cybersecurity China6026 Cybersecurity China
6026 Cybersecurity China
 
интернет
интернетинтернет
интернет
 
Polinter07
Polinter07Polinter07
Polinter07
 
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations --   Inglis 04 27-17 -- SASCCyber-enabled Information Operations --   Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidents
 
eCrypt Technologies
eCrypt TechnologieseCrypt Technologies
eCrypt Technologies
 
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
 
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
 
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
 
Darknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint fileDarknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint file
 
IT_Cutter_Publication
IT_Cutter_PublicationIT_Cutter_Publication
IT_Cutter_Publication
 
Polinter07
Polinter07Polinter07
Polinter07
 

Similar a The securitization of online activism

Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
whittemorelucilla
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816
Nicole Fields
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
rtodd599
 
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdfBriefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
archanaemporium
 
As computer and internet technologies have advanced and become m.docx
As computer and internet technologies have advanced and become m.docxAs computer and internet technologies have advanced and become m.docx
As computer and internet technologies have advanced and become m.docx
ssusera34210
 
Briefly define cyber-terrorism. Define hacktivism. Illustrate ex.docx
Briefly define cyber-terrorism. Define hacktivism. Illustrate ex.docxBriefly define cyber-terrorism. Define hacktivism. Illustrate ex.docx
Briefly define cyber-terrorism. Define hacktivism. Illustrate ex.docx
jackiewalcutt
 

Similar a The securitization of online activism (16)

Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdfBriefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
 
Traditional Terrorists
Traditional TerroristsTraditional Terrorists
Traditional Terrorists
 
As computer and internet technologies have advanced and become m.docx
As computer and internet technologies have advanced and become m.docxAs computer and internet technologies have advanced and become m.docx
As computer and internet technologies have advanced and become m.docx
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Briefly define cyber-terrorism. Define hacktivism. Illustrate ex.docx
Briefly define cyber-terrorism. Define hacktivism. Illustrate ex.docxBriefly define cyber-terrorism. Define hacktivism. Illustrate ex.docx
Briefly define cyber-terrorism. Define hacktivism. Illustrate ex.docx
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 

Último

Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
PsychicRuben LoveSpells
 
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
Faga1939
 

Último (20)

BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
 
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
 
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackVerified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
 
Julius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the TableJulius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the Table
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
 
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkoEmbed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
 
China's soft power in 21st century .pptx
China's soft power in 21st century   .pptxChina's soft power in 21st century   .pptx
China's soft power in 21st century .pptx
 
06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf
 
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
 
declarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfdeclarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdf
 
Group_5_US-China Trade War to understand the trade
Group_5_US-China Trade War to understand the tradeGroup_5_US-China Trade War to understand the trade
Group_5_US-China Trade War to understand the trade
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
 
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
 
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdf
 
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
 

The securitization of online activism

  • 2. Outline Introduction  Background  Anonymous  Speech Act  The Audience  Emergency Measures  Conclusion
  • 3. Key Question How are government actors in the United States taking action to securitize hacktivism? Hacktivism: the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist (TechTarget, 2001).
  • 4. Hypothesis Hacktivism, and particularly the online activism group Anonymous, is being securitized by government actors in the United States through dialogue and legal mechanisms that frame hacktivists as terrorists.
  • 5. Background How has hacktivism evolved, and in which ways do hacktivists interact with government actors? Method: a literature review of academic, government and news documents on the subject of online activism, with a focus on the United States.
  • 6. Anonymous a loosely-affiliated group of computer programmers  organizes itself to coordinate online protests methods include DDOS attacking websites, hacking into organizations' servers and leaking documents. Anonymous hasn't once used its capabilities to physically harm another human being or the general public.
  • 7. Civil Disobedience Electronic civil disobedience is borrowing the non-violent direct action tactics from earlier social movements (Wray, 1998).  Diverting traffic away from a website is akin to setting up a roadblock of picking a building  Organizing a denial of service attack is akin to a sit-in (Auty, 2004) Acts of cyber disobedience are de facto illegal, but hacktivist acts are only those that serve as social or political forms of protest (Huschle, 2002).
  • 8. Speech Act What language have government actors in the United States used to frame hacktivism as a threat to national security? Method: Document analysis of government documents, academic and news articles  Theory: Framing theory
  • 9. Speech Act Terrorism remains the FBI’s top priority. But in the not too distant future, we anticipate that the cyber threat will pose the number one threat to our country. We need to take lessons learned from fighting terrorism and apply them to cyber crime. We must continue to push forward, because our adversaries are relentless. They want our money, our property, and our secrets, and some seek to harm us well beyond that. Together, we can turn the tide against them and bolster the security of our nation’s information, networks, and infrastructure.
  • 10. Speech Act Today, our adversaries sit on fiber optic cables and wi-fi networks, unknown and undetected…They seek our technology, our intelligence and our intellectual property, even our military weapons and strategies. In short, they have everything to gain, and we have a great deal to lose. The end result will be the same: we will lose our data. We may lose access to our own information. And we may well lose our security.
  • 11. The Audience How are citizens and the private sector responding to the message that hacktivists pose an imminent threat? Method: Document analysis News articles, public sector reports and online blogs  Theory: Constructivist theory
  • 12. Emergency Measures What emergency measures are government actors promoting in order to strengthen their nation’s security against hacktivism? Method: Document analysis of government, academic, and news documents and blogs.  Theory: Constructivist theory
  • 13. Conclusion Government actors in the United States are in the process of securitizing hacktivism, and in particular the online activism group Anonymous. They are already framing hacktivism as a form of terrorism, and highlighting the future potential threats to national security.

Notas del editor

  1. What documents?What will I be looking for?What words or phrases?Who are the key players?
  2. For example, diverting trafficaway from a Web site is akin to setting up aroadblock or picketing a building, and organising adenial of service attack is equivalent to a sit-in.Huschle believes that all acts of cyber disobedienceare de facto illegal, but that hacktivist acts are onlythose that serve as social or political forms ofprotest – discounting malicious acts.
  3. What documents?What will I be looking for?What words or phrases?Who are the key players?This will be explored through document analysis of FBI speeches, Department of Homeland Security briefings, legal mechanisms and relevant academic and news documents. These sources will allow for analysis, through a framing theory lens, of the words and phrases used by government actors, and the interpretations of their choice of language by academics and journalists.
  4. Terrorism remains the FBI’s top priority. But in the not too distant future, we anticipate that the cyber threat will pose the number one threat to our country. We need to take lessons learned from fighting terrorism and apply them to cyber crime.We must continue to push forward, because our adversaries are relentless. They want our money, our property, and our secrets, and some seek to harm us well beyond that. Together, we can turn the tide against them and bolster the security of our nation’s information, networks, and infrastructure. Amongst all of the crimes our country faces, the FBI considers high-tech crimes to be the most significant. As a result, the FBI’s top three priorities are the previously mentioned counterterrorism and counterintelligence, followed immediately by cyber. Espionage once pitted spy versus spy, country against country. Today, our adversaries sit on fiber optic cables and wi-fi networks, unknown and undetected. They may be nation-state actors or mercenaries for hire, rogue hackers or transnational criminal syndicates. These hackers actively target our government networks. They seek our technology, our intelligence and our intellectual property, even our military weapons and strategies. In short, they have everything to gain, and we have a great deal to lose.The end result will be the same: we will lose our data. We may lose access to our own information. And we may well lose our security.
  5. Terrorism remains the FBI’s top priority. But in the not too distant future, we anticipate that the cyber threat will pose the number one threat to our country. We need to take lessons learned from fighting terrorism and apply them to cyber crime.We must continue to push forward, because our adversaries are relentless. They want our money, our property, and our secrets, and some seek to harm us well beyond that. Together, we can turn the tide against them and bolster the security of our nation’s information, networks, and infrastructure. Amongst all of the crimes our country faces, the FBI considers high-tech crimes to be the most significant. As a result, the FBI’s top three priorities are the previously mentioned counterterrorism and counterintelligence, followed immediately by cyber. Espionage once pitted spy versus spy, country against country. Today, our adversaries sit on fiber optic cables and wi-fi networks, unknown and undetected. They may be nation-state actors or mercenaries for hire, rogue hackers or transnational criminal syndicates. These hackers actively target our government networks. They seek our technology, our intelligence and our intellectual property, even our military weapons and strategies. In short, they have everything to gain, and we have a great deal to lose.The end result will be the same: we will lose our data. We may lose access to our own information. And we may well lose our security.
  6. This will be explored, through a constructivist lends, by document analysis of the previously listed sources, as well as reports issued by private sector players and opinions of citizens published on blogs. These sources will allow for analysis of the messages being directed at private sector players and citizens, and the reaction of the audience to the concept of hacktivists posing an imminent threat.
  7. This will be explored through document analysis of all previously listed sources. There sources will allow for analysis of the actions government actors have already taken, and are promoting should be taken, in order to diminish the threat of hacktivism to national security.
  8. While there are certainly voices of opposition to the comparison of hacktivists to terrorists, the discourse is dominated by those who perceive a security threat. The successful securitization of hacktivism is likely to lead to stricter penalties for hacktivists, increased government security online, and an increase in the level of monitoring and censorship of online communications and activities by the United States government