We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

How Anonymous (Narrowly) Evaded the Cyberterrorism Rhetorical Machine

Formale Metadaten

Titel
How Anonymous (Narrowly) Evaded the Cyberterrorism Rhetorical Machine
Serientitel
Teil
42
Anzahl der Teile
177
Autor
Lizenz
CC-Namensnennung - Weitergabe unter gleichen Bedingungen 3.0 Deutschland:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen und das Werk bzw. diesen Inhalt auch in veränderter Form nur unter den Bedingungen dieser Lizenz weitergeben.
Identifikatoren
Herausgeber
Erscheinungsjahr
Sprache

Inhaltliche Metadaten

Fachgebiet
Genre
Abstract
Anonymous—a enigmatic protest ensemble that first emerged as an activist force in 2008—has been thrust repeatedly into the media limelight due to a series of high stakes digital protest attacks, stretching from Distributed of Denial Service attacks to high profile hacks. By 2011, Anonymous targeted Fortune 500 corporations and military defense contractors. Mercenary hackers doxed Anons, revealing their identities to law enforcement by publishing their legal names, personal photos, and addresses. Anons started to leak sensitive, classified, or humiliating information. Given the prevalence of cyberware and terrorism rhetoric, it would seem effortless and straightforward for government officials to paint Anonymous as a new breed of dangerous cyberterrorists. Despite a few notable attempts to forge this precise connection, the government has thus far failed in slotting Anonymous into this well worn scaremongering trope; the great majority of news media accounts treat Anonymous not as violent cyberterrorists, but foremost as insurgent digital activists.