We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

How Anonymous (Narrowly) Evaded the Cyberterrorism Rhetorical Machine

Formal Metadata

Title
How Anonymous (Narrowly) Evaded the Cyberterrorism Rhetorical Machine
Title of Series
Part Number
42
Number of Parts
177
Author
License
CC Attribution - ShareAlike 3.0 Germany:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor and the work or content is shared also in adapted form only under the conditions of this
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Anonymous—a enigmatic protest ensemble that first emerged as an activist force in 2008—has been thrust repeatedly into the media limelight due to a series of high stakes digital protest attacks, stretching from Distributed of Denial Service attacks to high profile hacks. By 2011, Anonymous targeted Fortune 500 corporations and military defense contractors. Mercenary hackers doxed Anons, revealing their identities to law enforcement by publishing their legal names, personal photos, and addresses. Anons started to leak sensitive, classified, or humiliating information. Given the prevalence of cyberware and terrorism rhetoric, it would seem effortless and straightforward for government officials to paint Anonymous as a new breed of dangerous cyberterrorists. Despite a few notable attempts to forge this precise connection, the government has thus far failed in slotting Anonymous into this well worn scaremongering trope; the great majority of news media accounts treat Anonymous not as violent cyberterrorists, but foremost as insurgent digital activists.