Abstract
Since 2010, digital direct action, including leaks, hacking and mass protest, has become a regular feature of political life on the Internet. This chapter considers the source, strengths, and weakness of this activity through an in-depth analysis of Anonymous, the protest ensemble that has been adept at magnifying issues, boosting existing – usually oppositional – movements, and converting amorphous discontent into a tangible form. It has been remarkably effective, even though it lacks the human and financial resources to engage in long-term strategic thinking or planning. This chapter covers the different historical phases of Anonymous in order to examine its logic, the sources of its geopolitical power, and its legacy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Anonymous (2007) Dear Fox News. YouTube video, 29 July 2007. www.youtube.com/watch?v=RFjU8bZR19A
Anonymous (2008) Message to Scientology. YouTube video, 21 Jan 2008. www.youtube.com/watch?v=JCbKv9yiLiQ
Arquilla J, Ronfeldt D (1996) The advent of netwar. RAND, Santa Monica
Bajak F (2014) Top South American hackers rattle Peru’s Cabinet. DailyMail.com. http://www.dailymail.co.uk/wires/ap/article-2740352/Top-South-America-hackers-rattle-Perus-Cabinet.html
Bartlulz (2011) Linton Johnson – “The face of BART.” http://bartlulz.weebly.com/
Beyer JL (2014) Expect us: online communities and political mobilization. Oxford University Press, New York
Burkart P (2014) Pirate politics: the new information policy contests. The MIT Press, Cambridge, MA
Cheng J (2010) Anonymous targets Australian government over porn filters. Ars Technica. http://arstechnica.com/tech-policy/2010/02/anonymous-targets-australian-government-over-porn-filters/
Christman T (2012) Tory Christman ex Scientologist and declared SP shares her experiences @ Dublin Offline. YouTube video, 15 Aug 2012. www.youtube.com/watch?v=SZzQUV6JUr0
Coleman G (2017a) The public interest hack. Limn issue number eight: hacks, leaks, and breaches. https://limn.it/the-public-interest-hack/
Coleman G (2017b) From internet farming to weapons of the geek. Curr Anthropol 58(S15):S91–S102
Currier C, Marquis-Boire M (2014) Leaked files: German spy company helped Bahrain hack Arab Spring protesters. The intercept. https://theintercept.com/2014/08/07/leaked-files-german-spy-company-helped-bahrain-track-arab-spring-protesters/
Currier C, Marquis-Boire M (2015) Leaked documents show FBI, DEA and US Army buying Italian spyware. The intercept. https://theintercept.com/2015/07/06/hacking-team-spyware-fbi/
Deseriis M (2015) Improper names: collective pseudonyms from the Luddites to Anonymous. University of Minnesota Press, Minneapolis
Fisher P (2015) Hack back! A DIY guide for those without the patience to wait for whistleblowers. Infosecwriters.com. http://www.infosecwriters.com/Papers/PFisher_Whistleblower.pdf
Fox News (2009) 4Chan: the rude, raunchy underbelly of the Internet. www.foxnews.com/story/0,2933,512957,00.html
Franceschi-Bicchierai L (2016a) A notorious hacker is trying to start a “hack back” political movement. Motherboard. https://motherboard.vice.com/en_us/article/qkjjnb/notorious-hacker-phineas-fishers-is-trying-to-start-a-hack-back-political-movement
Franceschi-Bicchierai L (2016b) Hacking team has lost its license to export spyware. Motherboard. https://motherboard.vice.com/en_us/article/78k8dq/hacking-team-has-lost-its-license-to-export-spyware
Franceschi-Bicchierai L (2017) Italian prosecutor makes request to close hacking team investigation. Motherboard. https://motherboard.vice.com/en_us/article/j5d53b/prosecutor-closes-hacking-team-investigation
Gallagher R (2013) Software that tracks people on social media created by defense firm. The Guardian. http://www.guardian.co.uk/world/2013/feb/10/software-tracks-social-media-defence
Gorman S (2012) Alert on hacker power play. The Wall Street Journal. https://www.wsj.com/articles/SB10001424052970204059804577229390105521090
Greenberg A (2013) This machine kills secrets: Julian Assange, the cypherpunks, and their fight to empower whistleblowers. Plume, New York
Jacquet J (2015) Is shame necessary?: new uses for an old tool. Vintage Books, New York
Jordan T, Taylor PA (2004) Hacktivism and cyberwars: rebels with a cause? Routledge, London
Karatzogianni A (2015) Firebrand waves of digital activism 1994–2014 the rise and spread of Hacktivism and Cyberconflict. Palgrave Macmillan UK, London
Kelty C (2008) Two bits: the cultural significance of free software. Duke University Press, Durham
Knuttila L (2011) User unknown: 4chan, anonymity and contingency. First Monday [Online] 16(10). http://firstmonday.org/article/view/3665/3055
LaNueve de Anonymous (2017) Hackeada la empresa Indra, responsable de la tecnología informática de las elecciones del 21-D. Tumblr.com. https://la9deanon.tumblr.com/post/168758699007/hackeada-la-empresa-indra-responsable-de-la
LulzSec (2011) https://twitter.com/LulzSec/status/69051330660007936
Maxigas (2012) Hacklabs and hackerspaces – tracing two genealogies. J Peer Prod (2). http://peerproduction.net/issues/issue-2/peer-reviewed-papers/hacklabs-and-hackerspaces/
Nguyen T (2011) Anonymous hacktivists add Stuxnet code to their arsenal. Zdnet.com. http://www.zdnet.com/article/anonymous-hacktivists-add-stuxnet-code-to-their-arsenal/
officialERICA GARNER @es_snipes (2018) Twitter.com. https://twitter.com/es_snipes/status/949439844140437504
Phillips W (2015) This is why we can’t have nice things: mapping the relationship between online trolling and mainstream culture. Massachusetts Institute of Technology Press, Cambridge, MA
Quinn B (2012) Anti-abortion activism escalating, warns clinic targeted by vigil. The Guardian. www.guardian.co.uk/world/2012/mar/13/anti-abortion-activism-clinic-vigil
Ragan S (2011) Report: HBGary used as an object lesson by Anonymous. www.thetechherald.com/articles/Report-HBGary-used-as-an-object-lesson-by-Anonymous/12723/
Sauter M (2015) The coming swarm. Bloomsbury, New York
Schrock AR (2016) Civic hacking as data activism and advocacy: a history from publicity to open government data. New Media Soc 18(4):581–599
Scott J (1985) Weapons of the weak: everyday forms of peasant resistance. Yale University Press, New Haven
Todd B (2008) Computers at the headquarters of the Obama and McCain campaigns were hacked CNN confirms. CNN. http://politicalticker.blogs.cnn.com/2008/11/06/computers-of-obama-mccain-campaigns-hacked
Tynes R (2017) When GhostSec goes hunting. Limn issue number eight: hacks, leaks, and breaches. https://limn.it/when-ghostsec-goes-hunting/
Vlavo FA (2018) Performing digital activism: new aesthetics and discourses of resistance. Routledge, New York
Zetter K (2014) Countdown to Zero Day: Stuxnet and the launch of the World’s first digital weapon. Random House Inc.
Acknowledgment
The Power and Politics behind the Mask was first published by the Centre for International Governance Innovation as Paper No. 3 in the Internet Governance Paper Series, copyright 2013, by the Centre for International Governance Innovation, and then in Organized Chaos: Reimagining the Internet, edited by Mark Raymond and Gordon Smith, published by the Centre for International Governance Innovation in 2014. Published with permission.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature B.V.
About this entry
Cite this entry
Coleman, E.G. (2020). Logics and Legacy of Anonymous. In: Hunsinger, J., Allen, M., Klastrup, L. (eds) Second International Handbook of Internet Research. Springer, Dordrecht. https://doi.org/10.1007/978-94-024-1555-1_57
Download citation
DOI: https://doi.org/10.1007/978-94-024-1555-1_57
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-024-1553-7
Online ISBN: 978-94-024-1555-1
eBook Packages: Social SciencesReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences