Hacktivism response – the technocratic order of ICT security  12.10.11

Tim Lohman, Australian edition of Computerworld, in a piece called “Hacktivism: The fallout from Anonymous and LulzSec”:

While government and industry figures all agree that hacktivism — no matter the colour or stripe — poses a real security threat to organisations, opinion is divided on the motivations, and hence seriousness of groups such as Anonymous and LulzSec. (…) however, two schools of thought have emerged on who these groups really are. The first argues that these groups are simply teenagers doing what teenagers do: Rebel. The other school argues that in line with the digital saturation of the current generation of teens and twenty-somethings these acts of hacking are simply the modern day equivalent of street protests.

If it’s the equivalent of street protest, why is it “a real security threat”?

Australian Federal Police (AFP) High Tech Crime Operations Acting National Manager, Grant Edwards is quoted:

“Hacktivism may be similar to other forms of legitimate demonstration or protest; however it can have significant implications… The AFP and other Australian law enforcement authorities will not tolerate the attempts of hackers to damage or destroy Australian individuals, companies and national infrastructure resources.”

Autralia’s Attorney General office:

the Government does not consider ‘hacktivisim’ or other similar activity that disrupts the confidentiality, integrity or availability of electronic information to be a legitimate form of protest

Human-bot driven DDoS attacks, aka virtual sit-ins. are legal in Germany. They disrupt the availability of electronic information, just as sit-ins have disrupted transactions of nukes to their launching sites and of used nuclear fuel to interim or permanent disposal site. Mass public display of discontent in the physical world always implies the non-availability of some services. Applying the classic computer science definition of ICT security (confidentiality, integrity or availability of data) to the political sphere and to what societies perceive as threats to their security, has great potential to result in a technocratic order.

Comments are closed.