SlideShare ist ein Scribd-Unternehmen logo
1 von 13
The Securitization
of Online Activism
Outline
Introduction
 Background
 Anonymous
 Speech Act
 The Audience
 Emergency Measures
 Conclusion
Key Question
How are government actors in the United States taking
action to securitize hacktivism?
Hacktivism: the act of hacking, or breaking into a
computer system, for a politically or socially motivated
purpose. The individual who performs an act of
hacktivism is said to be a hacktivist (TechTarget, 2001).
Hypothesis
Hacktivism, and particularly the online activism group
Anonymous, is being securitized by government actors in
the United States through dialogue and legal mechanisms
that frame hacktivists as terrorists.
Background
How has hacktivism evolved, and in which ways do
hacktivists interact with government actors?
Method: a literature review of academic, government
and news documents on the subject of online activism,
with a focus on the United States.
Anonymous
a loosely-affiliated group of computer programmers
 organizes itself to coordinate online protests
methods include DDOS attacking websites, hacking
into organizations' servers and leaking documents.
Anonymous hasn't once used its capabilities to physically
harm another human being or the general public.
Civil Disobedience
Electronic civil disobedience is borrowing the non-violent direct
action tactics from earlier social movements (Wray, 1998).
 Diverting traffic away from a website is akin to setting up a
roadblock of picking a building
 Organizing a denial of service attack is akin to a sit-in
(Auty, 2004)
Acts of cyber disobedience are de facto illegal, but hacktivist acts
are only those that serve as social or political forms of protest
(Huschle, 2002).
Speech Act
What language have government actors in the United
States used to frame hacktivism as a threat to national
security?
Method: Document analysis of government documents,
academic and news articles
 Theory: Framing theory
Speech Act
Terrorism remains the FBI’s top priority. But in the not too
distant future, we anticipate that the cyber threat will pose the
number one threat to our country. We need to take lessons
learned from fighting terrorism and apply them to cyber crime.
We must continue to push forward, because our adversaries are
relentless. They want our money, our property, and our secrets,
and some seek to harm us well beyond that. Together, we can
turn the tide against them and bolster the security of our
nation’s information, networks, and infrastructure.
Speech Act
Today, our adversaries sit on fiber optic cables and wi-fi
networks, unknown and undetected…They seek our technology,
our intelligence and our intellectual property, even our military
weapons and strategies. In short, they have everything to gain,
and we have a great deal to lose.
The end result will be the same: we will lose our data. We may
lose access to our own information. And we may well lose our
security.
The Audience
How are citizens and the private sector responding to the
message that hacktivists pose an imminent threat?
Method: Document analysis News articles, public
sector reports and online blogs
 Theory: Constructivist theory
Emergency Measures
What emergency measures are government actors
promoting in order to strengthen their nation’s security
against hacktivism?
Method: Document analysis of government, academic,
and news documents and blogs.
 Theory: Constructivist theory
Conclusion
Government actors in the United States are in the process
of securitizing hacktivism, and in particular the online
activism group Anonymous. They are already framing
hacktivism as a form of terrorism, and highlighting the
future potential threats to national security.

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietyCybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietySarah Granger
 
Digital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedDigital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedMsifry
 
GOVERNMENT CYBERSECURITY FORUM
GOVERNMENT CYBERSECURITY FORUMGOVERNMENT CYBERSECURITY FORUM
GOVERNMENT CYBERSECURITY FORUMChuck Brooks
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its DiscontentsMsifry
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal PrivacyEmerson Bryan
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsChuck Brooks
 
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations --   Inglis 04 27-17 -- SASCCyber-enabled Information Operations --   Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASCDavid Sweigert
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidentsassanesignate
 
eCrypt Technologies
eCrypt TechnologieseCrypt Technologies
eCrypt TechnologiesChuck Brooks
 
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks
 
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks
 
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...Chuck Brooks
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacyopeyemiatilola1992
 
Darknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint fileDarknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint fileraevenroxas
 

Was ist angesagt? (20)

Cybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietyCybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil Society
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
Digital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedDigital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the Networked
 
GOVERNMENT CYBERSECURITY FORUM
GOVERNMENT CYBERSECURITY FORUMGOVERNMENT CYBERSECURITY FORUM
GOVERNMENT CYBERSECURITY FORUM
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its Discontents
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
 
6026 Cybersecurity China
6026 Cybersecurity China6026 Cybersecurity China
6026 Cybersecurity China
 
интернет
интернетинтернет
интернет
 
Polinter07
Polinter07Polinter07
Polinter07
 
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations --   Inglis 04 27-17 -- SASCCyber-enabled Information Operations --   Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidents
 
eCrypt Technologies
eCrypt TechnologieseCrypt Technologies
eCrypt Technologies
 
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
 
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
 
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
 
Darknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint fileDarknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint file
 
IT_Cutter_Publication
IT_Cutter_PublicationIT_Cutter_Publication
IT_Cutter_Publication
 
Polinter07
Polinter07Polinter07
Polinter07
 

Ähnlich wie The securitization of online activism

Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxwhittemorelucilla
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816Nicole Fields
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docxrtodd599
 
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdfBriefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdfarchanaemporium
 
As computer and internet technologies have advanced and become m.docx
As computer and internet technologies have advanced and become m.docxAs computer and internet technologies have advanced and become m.docx
As computer and internet technologies have advanced and become m.docxssusera34210
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Briefly define cyber-terrorism. Define hacktivism. Illustrate ex.docx
Briefly define cyber-terrorism. Define hacktivism. Illustrate ex.docxBriefly define cyber-terrorism. Define hacktivism. Illustrate ex.docx
Briefly define cyber-terrorism. Define hacktivism. Illustrate ex.docxjackiewalcutt
 

Ähnlich wie The securitization of online activism (16)

Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdfBriefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
 
Traditional Terrorists
Traditional TerroristsTraditional Terrorists
Traditional Terrorists
 
As computer and internet technologies have advanced and become m.docx
As computer and internet technologies have advanced and become m.docxAs computer and internet technologies have advanced and become m.docx
As computer and internet technologies have advanced and become m.docx
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Briefly define cyber-terrorism. Define hacktivism. Illustrate ex.docx
Briefly define cyber-terrorism. Define hacktivism. Illustrate ex.docxBriefly define cyber-terrorism. Define hacktivism. Illustrate ex.docx
Briefly define cyber-terrorism. Define hacktivism. Illustrate ex.docx
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 

Kürzlich hochgeladen

complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkbhavenpr
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsnaxymaxyy
 
Opportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationOpportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationReyMonsales
 
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest2
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdfGerald Furnkranz
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfauroraaudrey4826
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoSABC News
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.NaveedKhaskheli1
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeAbdulGhani778830
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkbhavenpr
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerOmarCabrera39
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victoryanjanibaddipudi1
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012ankitnayak356677
 

Kürzlich hochgeladen (13)

complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the rounds
 
Opportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationOpportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and information
 
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global News
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdf
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election Manifesto
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for Justice
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpk
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert Oppenheimer
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012
 

The securitization of online activism

  • 2. Outline Introduction  Background  Anonymous  Speech Act  The Audience  Emergency Measures  Conclusion
  • 3. Key Question How are government actors in the United States taking action to securitize hacktivism? Hacktivism: the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist (TechTarget, 2001).
  • 4. Hypothesis Hacktivism, and particularly the online activism group Anonymous, is being securitized by government actors in the United States through dialogue and legal mechanisms that frame hacktivists as terrorists.
  • 5. Background How has hacktivism evolved, and in which ways do hacktivists interact with government actors? Method: a literature review of academic, government and news documents on the subject of online activism, with a focus on the United States.
  • 6. Anonymous a loosely-affiliated group of computer programmers  organizes itself to coordinate online protests methods include DDOS attacking websites, hacking into organizations' servers and leaking documents. Anonymous hasn't once used its capabilities to physically harm another human being or the general public.
  • 7. Civil Disobedience Electronic civil disobedience is borrowing the non-violent direct action tactics from earlier social movements (Wray, 1998).  Diverting traffic away from a website is akin to setting up a roadblock of picking a building  Organizing a denial of service attack is akin to a sit-in (Auty, 2004) Acts of cyber disobedience are de facto illegal, but hacktivist acts are only those that serve as social or political forms of protest (Huschle, 2002).
  • 8. Speech Act What language have government actors in the United States used to frame hacktivism as a threat to national security? Method: Document analysis of government documents, academic and news articles  Theory: Framing theory
  • 9. Speech Act Terrorism remains the FBI’s top priority. But in the not too distant future, we anticipate that the cyber threat will pose the number one threat to our country. We need to take lessons learned from fighting terrorism and apply them to cyber crime. We must continue to push forward, because our adversaries are relentless. They want our money, our property, and our secrets, and some seek to harm us well beyond that. Together, we can turn the tide against them and bolster the security of our nation’s information, networks, and infrastructure.
  • 10. Speech Act Today, our adversaries sit on fiber optic cables and wi-fi networks, unknown and undetected…They seek our technology, our intelligence and our intellectual property, even our military weapons and strategies. In short, they have everything to gain, and we have a great deal to lose. The end result will be the same: we will lose our data. We may lose access to our own information. And we may well lose our security.
  • 11. The Audience How are citizens and the private sector responding to the message that hacktivists pose an imminent threat? Method: Document analysis News articles, public sector reports and online blogs  Theory: Constructivist theory
  • 12. Emergency Measures What emergency measures are government actors promoting in order to strengthen their nation’s security against hacktivism? Method: Document analysis of government, academic, and news documents and blogs.  Theory: Constructivist theory
  • 13. Conclusion Government actors in the United States are in the process of securitizing hacktivism, and in particular the online activism group Anonymous. They are already framing hacktivism as a form of terrorism, and highlighting the future potential threats to national security.

Hinweis der Redaktion

  1. What documents?What will I be looking for?What words or phrases?Who are the key players?
  2. For example, diverting trafficaway from a Web site is akin to setting up aroadblock or picketing a building, and organising adenial of service attack is equivalent to a sit-in.Huschle believes that all acts of cyber disobedienceare de facto illegal, but that hacktivist acts are onlythose that serve as social or political forms ofprotest – discounting malicious acts.
  3. What documents?What will I be looking for?What words or phrases?Who are the key players?This will be explored through document analysis of FBI speeches, Department of Homeland Security briefings, legal mechanisms and relevant academic and news documents. These sources will allow for analysis, through a framing theory lens, of the words and phrases used by government actors, and the interpretations of their choice of language by academics and journalists.
  4. Terrorism remains the FBI’s top priority. But in the not too distant future, we anticipate that the cyber threat will pose the number one threat to our country. We need to take lessons learned from fighting terrorism and apply them to cyber crime.We must continue to push forward, because our adversaries are relentless. They want our money, our property, and our secrets, and some seek to harm us well beyond that. Together, we can turn the tide against them and bolster the security of our nation’s information, networks, and infrastructure. Amongst all of the crimes our country faces, the FBI considers high-tech crimes to be the most significant. As a result, the FBI’s top three priorities are the previously mentioned counterterrorism and counterintelligence, followed immediately by cyber. Espionage once pitted spy versus spy, country against country. Today, our adversaries sit on fiber optic cables and wi-fi networks, unknown and undetected. They may be nation-state actors or mercenaries for hire, rogue hackers or transnational criminal syndicates. These hackers actively target our government networks. They seek our technology, our intelligence and our intellectual property, even our military weapons and strategies. In short, they have everything to gain, and we have a great deal to lose.The end result will be the same: we will lose our data. We may lose access to our own information. And we may well lose our security.
  5. Terrorism remains the FBI’s top priority. But in the not too distant future, we anticipate that the cyber threat will pose the number one threat to our country. We need to take lessons learned from fighting terrorism and apply them to cyber crime.We must continue to push forward, because our adversaries are relentless. They want our money, our property, and our secrets, and some seek to harm us well beyond that. Together, we can turn the tide against them and bolster the security of our nation’s information, networks, and infrastructure. Amongst all of the crimes our country faces, the FBI considers high-tech crimes to be the most significant. As a result, the FBI’s top three priorities are the previously mentioned counterterrorism and counterintelligence, followed immediately by cyber. Espionage once pitted spy versus spy, country against country. Today, our adversaries sit on fiber optic cables and wi-fi networks, unknown and undetected. They may be nation-state actors or mercenaries for hire, rogue hackers or transnational criminal syndicates. These hackers actively target our government networks. They seek our technology, our intelligence and our intellectual property, even our military weapons and strategies. In short, they have everything to gain, and we have a great deal to lose.The end result will be the same: we will lose our data. We may lose access to our own information. And we may well lose our security.
  6. This will be explored, through a constructivist lends, by document analysis of the previously listed sources, as well as reports issued by private sector players and opinions of citizens published on blogs. These sources will allow for analysis of the messages being directed at private sector players and citizens, and the reaction of the audience to the concept of hacktivists posing an imminent threat.
  7. This will be explored through document analysis of all previously listed sources. There sources will allow for analysis of the actions government actors have already taken, and are promoting should be taken, in order to diminish the threat of hacktivism to national security.
  8. While there are certainly voices of opposition to the comparison of hacktivists to terrorists, the discourse is dominated by those who perceive a security threat. The successful securitization of hacktivism is likely to lead to stricter penalties for hacktivists, increased government security online, and an increase in the level of monitoring and censorship of online communications and activities by the United States government