hacktivist culture and violence

32
Running head: HACKTIVIST CULTURE AND VIOLENCE 1 Hacktivist Culture and Violence Amy Stockhausen University of Utah

Upload: utah

Post on 08-Jan-2023

0 views

Category:

Documents


0 download

TRANSCRIPT

Running head: HACKTIVIST CULTURE AND VIOLENCE 1

Hacktivist Culture and Violence

Amy Stockhausen

University of Utah

HACKTIVIST CULTURE AND VIOLENCE 2

Hacktivist Culture and the Concept of Violence

Between the years 2007-2012, 16 people were arrested and charged with violating the

Computer Fraud and Abuse Act for advocating and participating in distributed denial of service

attacks (DDOS). These attacks have been used by myriad groups since the early 1990s to

temporarily shut down websites. The 16 individuals who have been arrested for DDOS were all

associated with political activist groups, and their cases have led to a discussion about DDOS

and whether it should be considered an act of activism or fraud; advocacy or terrorism

(Doctorow, 2011; Gladwell, 2010; Lawson, 2011; Morozov, 2009). For this study, the goal is not

to decide which perspective is correct; asking which is correct is, frankly, the wrong question.

Instead, this paper focuses on the construction and designation of violence by activists operating

within a framework of social movement rhetoric. This study is built on the understanding that the

fundamental problem in this issue is a clash of perspectives between that of the law and

politically motivated cyber-activists. Using concepts from Benjamin’s Critique of Violence and

Kafka’s parable Before the Law and the framework of social movement criticism, it is possible to

construct the force behind the rhetoric of DDOS activists as it is portrayed in various online

sources. This construction acts as a clear example of how individuals can act under a definition

of violence that does not coincide with that of the law and at times overtly opposes it. This

behavior is thus criminalized, perpetuating the cycle of violence and retaliation.

In order to contextualize its rhetorical artifacts, this study will use the framework of

social movement criticism. The rhetoric used by DDOS activists tends to fit the various functions

of social movement rhetoric by “raising the possibility that the system itself is in question and

that a group can successfully challenge it” (Cathcart, 1980, p. 269). In doing so, cyber-activist

speech fulfills certain categories, such as justifying the movement and prescribing a course of

HACKTIVIST CULTURE AND VIOLENCE 3

action to non-institutional entities (Cathcart, 1980; Griffin, 1980; Lucas, 1980; Stewart, Smith, &

Denton, 2007; Stewart, 1980). These two areas are of great concern because they invoke

interpretive frameworks surrounding the issue of DDOS as an activist technique. The social

movement must first articulate a threat from an outside organization—in this case, the threat of

the law—and then specify what must be done (Stewart et al., 2007; Stewart, 1980). The threats

articulated in the chosen artifact are interpreted through Benjamin’s Critique of Violence

(Benjamin & Demetz, 1986), paying particular attention to law-preserving violence and the

violence that occurs in denying natural law. For hacktivists, the method of choice for pressuring

the law is DDOS, a computer-facilitated attack on a website. These attacks are likened by the

activists to civil disobedience and other tactics of non-violence (Anonymous, 2012a;

Dominguez, 2012). The tactic itself does not specify a threat or articulate a grievance, but it is

sometimes used as the sole communication with an offending institution. For this reason, the

artifacts collected for this study are not confrontational, but rather the rhetoric that articulates a

problem and suggests DDOS as a solution. Found on websites for the Electronic Disturbance

Theatre and Anonymous, the five artifacts are aimed at existing members of the group and

interested parties. Although the two groups differ in structure and purpose, both the Electronic

Disturbance Theatre and Anonymous advocate the use of DDOS in order to address perceived

violence in the form of law.

Before venturing further into the use of DDOS, it is necessary to examine the topic of

speech and the internet. Whether we choose to call it speech, writing, or code, symbolic

communication takes on a vital role online. Nowhere is Derrida’s (1998) argument for the

difference between speech and writing more clearly enacted than the internet. Derrida asserts that

writing encompasses much of what speech cannot, as exemplified by the disjunction between the

HACKTIVIST CULTURE AND VIOLENCE 4

spoken and written différance as opposed to its homonym différence. The meaning here resides

in the peculiarity of the written text as opposed to its spoken sound. The same can be said of

language use online, which further problematizes the categorization of rhetoric and action. What

is a webpage but a list of written commands? The user who surfs the internet does so by sending

and receiving encoded packets of written data, a transaction that would fit even the most

elementary of communication models. From the lowest level of computerized communication,

the writing is apparent: binary is written in combinations of ones and zeroes that resides on

physical media; this code is translated by a computer into Arabic characters and symbols which

comprise a written code for a file or program; this level of code is then read by the computer to

constitute and create the specified item (Lessig, 1999, 2006). If it is a program, it will execute

commands and cause the computer to act in a specified way. If it is a file, it will engage another

program to act and make sense of the file. When it comes to the digital realm, writing or code

alone implies action, and when it is read, it causes action. On this scale, it becomes difficult to

state that an event is purely rhetorical or mechanical. This contributes to the competing

perspectives on the issue of DDOS as a protest tactic. By interpreting the denial of service as a

rhetorical act, it implies non-violence. No one is hurt, and nothing is lost. On the other hand, if

interpreting the denial of service as pure action, it is far easier to see it as law-breaking activity.

There is no statement, only monetary damage. We must ask, is the computer seen as a bullhorn

through which to broadcast a message or a weapon with which to cause destruction?

In the case of a distributed denial of service attack, the computer tries its hardest to take

down a targeted website (“How a ‘denial of service’ attack works - CNET News,” 2000;

Strickland, n.d.). The user initiates the attack by using a program that they either gain access to

through a website or download. The program then uses the computer’s internet connection to

HACKTIVIST CULTURE AND VIOLENCE 5

repeatedly attempt to access a previously specified webpage. This involves the computer sending

a small amount of data to the server where the webpage is stored; the data is essentially a request

for the server to send back the content of the page. By sending requests in quick succession,

theoretically, the server will become overloaded—so burdened with processing all of the

requests that it shuts down entirely. However, this is very rarely done by a single user. Servers

owned by corporations and government entities are designed to withstand a great deal of traffic,

far more than what can be produced by a single computer. It is for this reason that activists tend

to recruit huge numbers of people to run the attack at the same time. In doing so, they generate

enough traffic to put the website down.

The task of generating traffic through multitudes of networked users can, at times, be

difficult. For some DDOS users, the easier way to increase numbers is through a botnet—a string

of computers that have been remotely accessed and hijacked, almost always by a virus or piece

of malware (Strickland, n.d.). These operations are almost always prosecuted for their use of

botnets rather than their use of DDOS. It is, perhaps, this use of force against unexpecting

computers that tends to set such actions apart from the basic use of DDOS. For many activists,

this kind of action is distasteful; it implicates those who are not involved or savvy enough to

realize that their computer is hanging out with a bad crowd. It could be said that botnets elicit

unintentional writing; evoking unwelcome code in others’ computers.

As long as the writing and reading of code originates with the computers’ owners,

activists are happy to claim it as their own. It is popular as a hacktivist tactic, but even those

politically-minded internet users would argue that it is hardly hacktivist (Hick & McNutt, 2002;

Jordan, 2002; Taylor, 2005, 2007). It requires no hacking at all. Hacking involves the targeted

invasion of a computer either without authorization or exceeding intended authorization

HACKTIVIST CULTURE AND VIOLENCE 6

(“Computer Fraud and Abuse Act (CFAA) - Internet Law Treatise,” n.d.). During a DDOS

attack, users access only public files. They are doing so in a disruptive manner, but their action—

sending the server a request for information—is well within the rights of any internet user.

Arguably, if DDOS users are to be charged with a crime, it is for the monetary damage they

cause in bandwidth fees and lost customers, not hacking. The legal status of DDOS attacks in the

United States is difficult to discern. The users who are arrested for such attacks have been

repeatedly convicted of fraud. The fraud in a DDOS attack occurs through the traffic created by

the computer. Each visit takes a small amount of energy and bandwidth, and by visiting the site

repeatedly, the DDOS user is implicitly saying “I want to see your website again and again.”

However, what we know to be true is that the user is in fact taking energy and bandwidth for the

purpose of crashing the website, not viewing its content. Therefore, the user has committed many

tiny infractions, each one chipping away at the resources of the website and its server.

When cyber-activists wage a campaign, they must convince their followers that

something must be done and that they can specify just what ought to be done (Cathcart, 1980;

Stewart et al., 2007; Stewart, 1980). There is a particular vision of the world that permeates

hacktivist culture, and it encourages the use of tactics like DDOS (Jordan, 2002; Taylor, 2005,

2007). This worldview is concerned with violence, and it describes the actions of the law as

violent. Protests using DDOS, on the other hand, are described as tactics of civil disobedience.

As long as these activists and the government hold polarizing opinions on these issues, there will

be continued struggle, more arrests, and further website blackouts. First, we must explore what

constitutes violence for internet activists and how it relates to the law. Then, using artifacts from

the Electronic Disturbance Theatre and Anonymous, we can construct a view on violence both as

it pertains to their opposition of the government and their understanding of the DDOS tactic.

HACKTIVIST CULTURE AND VIOLENCE 7

Once the use of violence by the law is defined as a social movement motivator and its absence

noted in describing DDOS, it becomes clear that the activists are using rhetoric that is

constrained within a particular perspective. This perspective limits their ability to compromise

with or find solutions within the law.

Before the Law

When DDOS is used for activist purposes, it is often because the protesters understand

the internet to be a more level playing field than the non-digital world. This is seen where groups

of people with no notable power are able to bring down the websites of large corporations or

government entities. In recent years, Anonymous has taken on Sony (Neal, 2011), the RIAA

(Hachman, 2010), and Israel (McMillan & Ackerman, 2012); a more classic example is the

Zapatista takedown of Mexican government websites (Krempl, 2000). Such as in these cases, it

is far more common to find an individual who can make sweeping changes to online

infrastructure than it is to find an individual who can bring legitimate change to the structure of

law or government. In fact, the ability for individuals to code and create programs that change

the average user’s experience and interaction with the digital realm signifies the drastically

different nature of code online. One can hardly imagine the parallel: an amateur lawyer sitting at

home playing with bits of law; he eventually crafts a legal mechanism which, upon its speaking,

enacts different protections and limitations on its speaker. Instead, this phenomenon is solely

property of the internet, and quite likely what increases the sense of efficacy held by so-called

‘hacktivists.’

One of the greatest benefits of the internet to activism is its increased promotion of

efficacy (Elin, 2003). Not only can an interested individual join a group immediately (Ayers,

HACKTIVIST CULTURE AND VIOLENCE 8

2003), they can begin to organize and participate within moments of receiving acceptance by the

group. The speed with which one can join and assimilate only exacerbates the differences

between traditional and online social movements. The greater efficacy of hacktivist culture

engenders a distrust of the government and American democratic method, along with an

acknowledgement that the government favors corporations and the wealthy (Anonymous, 2011;

Dominguez, 2012; Electronic Disturbance Theatre disinformation, 2011). To them, it is nearly

impossible to be influential to the government through legitimate, legal means. To abide by the

law is to accept and propagate the status quo. This attitude may appear overly cynical, but as a

foundation, it leads directly to the support and utilization of DDOS tactics.

To better understand the viewpoint of DDOS hacktivists, there is a parable by Kafka that

portrays the law in an equally bleak and problematic way. Before the Law (Gray, 2005) imagines

law as place, existing behind a series of gates. A man arrives to gain access to the law, as all are

free to do, and is informed by a gatekeeper that it is not time to enter the gate. Years pass, and

the man is never given permission. In his dying moments, he is informed that the gate will close

because it was intended only for him. For Kafka, the law is at best a paradox and at worst an

outright lie. While all men in a democratic nation are said to have access, only the elite ever have

significant influence. Any individual who wants to enact change in the law must wait for

permission: to alter the law, one must first obey it. The pre-existing law is given power in all

steps of the process, and as such, it can resist change indefinitely.

Can anyone then blame those who approach the gate of the law and turn around? If one

believes that the law reinforces itself, or acts as what Benjamin would describe as a law-

preserving law (Benjamin & Demetz, 1986), then there is little hope of getting anything done

without extraordinary means. The average citizen is deprived of their ability to live in a world

HACKTIVIST CULTURE AND VIOLENCE 9

that is just and sensible to them. As Benjamin describes, “the violence of which present-day law

is seeking in all areas of activity to deprive the individual appears really threatening, and arouses

even in defeat the sympathy of the mass against law” (p. 281). The public is aware that it is

constrained by the very laws which it is purported to control, and as such are sympathetic to

those acts that fight against the control of law-preserving laws. This particular type of violence

perpetrated by the law is articulated again and again by protesters who use DDOS as a tactic, and

it thus serves as a viable way to explain the issues of a social movement (Anonymous - Message

to the American People, 2011, Anonymous, 2012b, Electronic Disturbance Theatre

disinformation, 2011; Dorian Batycka, 2012). For them, DDOS bypasses the gates of the law—

forgoes the realm of law entirely—to make a noticeable and tangible change in the outside

world. The change may be temporary, but it is nonetheless noticeable.

What must be stressed here is the element of violence. In his Critique of Violence,

Benjamin criticizes the law, and names it as a source of violence (1986). As a control

mechanism, the law limits the activities of its citizens, particularly in respect to those activities

that would suspend or destroy law. Furthermore, Benjamin posits that violence is necessary to

break out of these bonds, stating that “every conceivable solution to human problems, not to

speak of deliverance from the confines of all the world-historical conditions of existence

obtaining hitherto, remains impossible if violence is totally excluded in principle” (1986, p. 293).

If suppression through law constitutes violence, then so too does the suppression of interaction

and communication through DDOS. In many ways, the enactment of DDOS tactics mirrors the

law-preserving laws of the government; the rhetoric of users tends toward a characterization of

the internet as a bastion of free speech, but the DDOS enforces silence on those who threaten that

HACKTIVIST CULTURE AND VIOLENCE 10

ideal. It is an element of control used by those who purport to favor freedom; a laissez-faire

internet with libertarian goals exists only for those who embrace it.

Hacktivist Rhetoric

Performing a distributed denial of service attack requires a large number of people, and

as a result, hacktivists using this tactic are frequently recruiting internet users to join in on the

attack (Anonymous, 2012a; Brown, 2011; Dominguez, 2012). This was, perhaps, more common

before the rise of the hacktivist mega-group Anonymous, but even this group has left traces of

their work. The type of rhetoric used by each group is usually defined both by its location online

and the nature of the group. Highly organized collectives like the Electronic Disturbance Theatre

have official missives written by their leaders. Decentralized groups like Anonymous rely on

everyday discourse that either proliferates as it gains popularity or dies out through disuse.

Regardless of the specific form, the rhetoric that arises from these hacktivist organizations

addresses the concept of violence as it is enacted by law. These articulations then have the force

to send users to battle for the social movement, employing DDOS to silence their opponents. Just

as described in models of social movement rhetoric (Cathcart, 1978, 1980; Stewart, 1980), the

digital attack is precipitated by a perception of violence that is articulated by a leader or

influential member, whether it is done to the hacktivist group or outside entities. These internet

activists then go to battle, motivated by a conception of their own acts as being less violent or an

alternative to that which is being done to the public (Stewart et al., 2007). These basic premises

are repeated frequently, and this study examines both rhetorical components: the call to action

and the definition of an amenable tactic.

HACKTIVIST CULTURE AND VIOLENCE 11

The popular webcomic XKCD created a comic strip illustrating the differences in

perception between “people” and “computer experts” on the issue of DDOS. This widely-

circulated comic iterates the difference in perception of a DDOS attack from those are familiar

with the technology behind the attack and those who aren’t, likening the true nature of DDOS to

tearing down a poster (see Figure 1). Such an act would hardly be criminalized, and this

metaphor serves as reinforcement for the attitudes already held by most DDOS activists. This

very argument is used to try to distinguish just why the denial of service attack is criminalized—

because the public, and by extension the lawmakers, are not familiar with what is involved in a

DDOS attack. It gets conflated with more serious actions such as hacking and information theft.

Therefore, DDOS is guilty by association. Misinformation about tactics such as DDOS runs

rampant, and as a result, the public labels it ‘hacking’ (Gunkel, 2005; Vegh, 2003, 2005).

The Electronic Disturbance Theatre

One of the groups that have tried the hardest to dispel the myths surrounding DDOS is

the Electronic Disturbance Theatre (EDT). Starting in the early 1990s to promote art and

Figure 1. CIA. XKCD comic strip portraying how the public and computer experts perceive DDOS attacks.

HACKTIVIST CULTURE AND VIOLENCE 12

activism, the EDT is famous for coining the phrase “electronic civil disobedience” (Vegh, 2003).

This phrase alone situates its associated techniques squarely within the realm of social

movements and non-violent protest. For them, the DDOS is simply a virtual sit-in (Dominguez,

2012). Whereas a traditional sit-in involves the participation of many people sitting down in

some type of commercial or institutional building in order to prohibit its functioning by taking up

space, the virtual sit-in occupies the server. When done well, a distributed denial of service

attack effectively fills the metaphorical building, populating it with so many people that the

doors cannot open to legitimate customers. The differences, however, are striking—DDOS

attacks can last as long as there are individuals with access to computers and each person is

taking up space not just for themselves, but rather a multiplicity of self (“How a ‘denial of

service’ attack works - CNET News,” 2000; Strickland, n.d.). The former condition makes for a

plausibly endless attack. The latter is dependent on the computing power of any individual

participant. The stronger the computer, the more frequently it will access the server. This

essentially multiplies ones’ presence in accordance with their processor and internet connection.

While these two effects may constitute a significant differentiation from what one would call a

traditional sit-in, the DDOS is nonetheless frequently referred to through such a metaphor.

The EDT has sponsored and organized many activist campaigns since its creation (Dorian

Batycka, 2012; Garrido & Halavais, 2003), with a theme of supporting indigenous peoples

throughout Mexico and the United States. One of their most recent campaigns focused on the

campus of the University of California, San Diego. A call-to-action was posted on the website

for the b.a.n.g. lab, a virtual lab for visual arts at UCSD run by Ricardo Dominguez—one of the

founders of the EDT. There, Dominguez writes:

HACKTIVIST CULTURE AND VIOLENCE 13

Our people will rise to decolonize UCSD, which is on occupied Kumeyaay land, to

decriminalize the border and to smash imperialism and capitalism in our country and

throughout the world. Through collective struggle we will reverse the privatization of our

universities and reclaim public education as a human right for all people. (Dominguez,

2012)

This statement shows a clear perception of violence by Dominguez and the EDT. He asserts that

not only is UCSD on occupied land, it exists near a criminalized border, and it takes part in the

privatization of universities in the United States. The government, the laws, and the culture of

privatization that influence the crafting of the laws have perpetrated a violence against the

Kumeyaay people, those who are made to be criminals for crossing the US-Mexico border, and

the students of UCSD who are guaranteed a public education, but are denied it through

privatization and rising tuition costs. After describing these grievances to engage his followers,

Dominguez offers a course of action.

In order to protest against the multiple sources of perceived violence imposed by the law,

Dominguez and the EDT had planned “virtual action.” This allows not only those who are

present in San Diego to lend their support, but anyone globally who has access to a computer and

internet access. To this end, Dominguez writes, “we cordially invite the citizens of the world to

become actors in a performance of Electronic Civil Disobedience through a virtual sit-in on

bankofamerica.com, universityofcalifornia.edu, and jerrybrown.org” (Dominguez, 2012). Links

with instructions are posted further down the missive. It is interesting to note the choice of

targets—The Bank of America, the University of California, and Jerry Brown, governor of

California. Each serves as a symbolic site of struggle. The banking industry, the university

system, and the state-level government are all players within the issues articulated by

HACKTIVIST CULTURE AND VIOLENCE 14

Dominguez. This specific case uses these websites symbolically. It can be assumed that the EDT

is not necessarily concerned with restricting access to these websites, but rather with the

symbolic gesture of silencing them or making them invisible. If the EDT wanted to permanently

remove the functionality of the websites, they would need to resort to other measures. A DDOS

attack, like a sit-in, is only effective as long as there are numerous people presenting a concerted

effort to take space. The DDOS effectively limits the presence of each of these offending

websites during the duration of the attack. Furthermore, these actions also perform the duty of

calling attention to the associated cause. The statement made by Dominguez is easy enough to

find, and it clearly links the DDOS attack to the perceived acts of violence described above. To

deny service is thus a dual action: a performance of silencing and an attempt to raise public

awareness.

Given that Dominguez and the EDT are using DDOS to fight against violence, it must

still be asked how they characterize their own actions. Like the EDT’s use of the phrase

“electronic civil disobedience,” Dominguez clearly links the proposed attack to the techniques of

prior social movements:

By taking part in this gesture of Electronic Civil Disobedience, you will align yourself in

the traditions of non-violent direct action and civil disobedience established by peaceful

dissenters throughout world history. Proponents of Electronic Civil Disobedience are

borrowing tactics of trespass and blockade from earlier social movements and applying

them to the virtual sphere. Electronic Civil Disobedience, as a form of mass de-

centralized electronic direct action, utilizes virtual blockades and virtual sit-ins.

(Dominguez, 2012)

HACKTIVIST CULTURE AND VIOLENCE 15

The call to virtual action is clear. Dominguez accomplishes the necessary tasks of defining the

act of violence and providing a set of actions for those who are interested in taking part in the

movement. He then ties those actions directly to non-violent social movement tactics. Such an

argument is deemed innovative by social movement research (Stewart et al., 2007). It switches

violence into non-violence, advocating for the members of the movement to not respond in kind

to the perceived violent act, but rather to change the tone. The DDOS attack, referred to only as a

“virtual sit-in” is described as being non-violent, de-centralized, and a type of direct action.

Describing the act as non-violent highlights a major concern of many protesters, the de-

centralized nature of the action symbolically opposes the hierarchical structure of the

government, and the appeal of direct action is that it is essentially a way to jump Kafka’s fence.

It is an attempt to influence the law without having to go through approved channels and

gatekeepers.

Through Dominguez’s call to action for the Electronic Disturbance Theatre, it is easy to

see the articulation of violence at work. Not only is violence asserted, but the DDOS tactic is

given as the appropriate response. The tactic is couched in social movement terms, labeling it

clearly as non-violent. Dominguez’s writing urges readers to join in the protest, his rhetoric

attempting to garner enough force to take down the listed websites. What is notable about these

assertions of violence is that they are external to the act of DDOS. The occupation of lands by

non-native people encoded into law by the US government and the privatization of the public

education system are deemed violent, but they threaten populations that are not necessarily the

same as those who take part in the DDOS action. It is far more common, especially with the

recent rise of Anonymous, to see the opposite: using DDOS to fight against the violence of

limiting the ability to use technologies such as DDOS.

HACKTIVIST CULTURE AND VIOLENCE 16

Anonymous

Since early 2008, the group of internet users known as Anonymous have taken up

increasingly large and public causes that they fight using a host of tactics. Their most commonly

used technique, however, is the distributed denial of service attack (Brown, 2011; Dana

Kennedy, 2010). The DDOS attack is particularly easy to employ because Anonymous consists

of a large network of internet users that spans not only its own user base, but other affiliated

websites. As an example, one of the first highly publicized attacks committed by Anonymous

involved taking down the Church of Scientology’s websites for several days (Denton, 11;

Marcus Baram, 2008). This was done not just by the members of Anonymous, but also users on

various websites where members had posted persuasive appeals to join the campaign. This type

of networking is done on a case-by-case basis, and the highly decentralized nature of

Anonymous only reinforces this tendency. It is also for this reason that rhetoric used by members

of Anonymous must be thought of differently than that which comes from more traditional

organizations. The venues in which Anonymous plans its campaigns are often message boards

and internet relay chat (IRC) rooms. This must be taken into consideration when defining what

constitutes important or forceful rhetoric. For the purpose of this study, that definition hinges on

the repetition of any written text. On message boards and in IRC rooms, the only way to

guarantee that a text survives the automatic deletions inherent in these formats is to repeat the

text. Therefore, if users think that a message is particularly valuable, it will be copied and

reposted in intervals.

One such text during the campaign planning for the DDOS attack on the Church of

Scientology worked as an iteration of perceived violence against the /b/ message board used by

Anonymous. It read (with formatting and spelling preserved):

HACKTIVIST CULTURE AND VIOLENCE 17

I think it's time for /b/ to do something big.

People need to understand not to fuck with /b/, and talk about nothing for ten minutes,

and expect people to give their money to an organization that makes absolutely no

fucking sense.

I'm talking about "hacking" or "taking down" the official Scientology website.

(Anonymous, 2008)

This posting served as the first message in a thread that began Anonymous’ strike against the

Church of Scientology. It articulates a threat by referring to a video of Tom Cruise that had been

leaked in which he “talks about nothing for ten minutes.” The video had been posted on the

website Gawker.com, and the Church of Scientology immediately filed suit against the website

and released notices threatening all those downloaded and re-hosted the video. This included

numerous members of the Anonymous user base. Here again, it is possible to see an assertion of

violence in which the offending organization violates the perceived norms of the internet, though

it is somewhat more oblique than previous example. Unlike the course of action proposed by the

EDT, this call to action involves retaliating for the removal of content by barring access to the

websites of the Church. It subversively suggests that Anonymous should silence those who

would silence Anonymous, an idea that a pervasive distaste for anything that would not be

deemed natural law (Benjamin & Demetz, 1986) for the internet. According to Benjamin, natural

law is that which arises out of necessity or common sense. It creates protections and freedoms

that are formed from the citizenry rather than for the protection of the existing government. To

Anonymous, the restriction of information imposed by the Church of Scientology violated the

natural law of the internet and was thus an act of law-preserving violence.

HACKTIVIST CULTURE AND VIOLENCE 18

A similar theme is seen in other texts produced by members of Anonymous. In early

2011, a document titled “The Anonymous Manifesto” was posted on the Anonymous-affiliated

website Anonnews.org. In this document, there is a clear delineation of what constitutes violence

for members of Anonymous which is framed in contrast to their suggested natural law. The text

lists five stipulations for a free society. The first, a summary of a point from the Universal

Declaration of Human Rights, states that “a society must be allowed to share information

unrestricted and uncensored if it is to maintain cultural and technological evolution and uphold

the rights and liberties of its citizens” (Anonymous, 2011). The second stipulation asserts that

“citizens must be allowed to organize their own institutions without being harassed by existing

institutions privileged by greater resources, influence and power” (Anonymous, 2011). In other

words, members of the public must be free to circulate uncensored information in order to

guarantee their rights; furthermore, those rights are violated when a more powerful institution,

such as the law or government, unfairly uses its sway to disband or harass citizen organizations.

If indeed DDOS is interpreted as a rhetorical act, then the Anonymous manifesto is asserting the

group’s right to assemble and perform such protest activities. In fact, it would not be very much

of an extension to assume that members of Anonymous interpret DDOS in this very way. On

another Anonymous-affiliated website, on a page that explains the use and litigation of DDOS,

the tactic is described as “the online equivalent of fans at a football game yelling so loud that the

offensive line can’t hear the quarterback” (Anonymous, n.d.-a). Through this manifesto,

members of Anonymous are identifying and problematizing the actions of the law that violate

what they would consider to be natural law for the internet. Among these actions, they specify

the ability to circulate information and use free speech. With the mentality that DDOS is

equivalent to tearing down a poster, performing a sit-in, or yelling at a football game, it is not

HACKTIVIST CULTURE AND VIOLENCE 19

hard to see how Anonymous members could construe a denial of service as a protected speech

act. This perceived freedom is furthered by the following points in the manifesto.

The Anonymous manifesto continues with the two following points addressing privacy of

citizens and institutions. According to the text, privacy of individuals should be maintained at all

costs, and “citizens shall not be the target of any undue surveillance” (Anonymous, 2011). The

treatment of institutions is somewhat different, in which “privacy and secrecy are privileges

granted to the institutions built by citizens and their communities, as long as the institution does

not utilize that secrecy to deceive, or act against the common interests of humanity”

(Anonymous, 2011). Institutions are granted the privilege of privacy as long as the institution

acts within boundaries of the common good as conceived by Anonymous. These stipulations

suggest that the violation of individual privacy by governmental or corporate organizations

constitutes a type of violence; and additionally, an institution that acts deceitful or against the

“common interests of humanity” constitutes further violence. Whereas the natural law of

Anonymous would stipulate that privacy must be protected at all costs, the law directly

disregards it. Within these postulates, there is an undercurrent of maximizing the rights of the

individual citizen while increasing oversight for governmental bodies, whether that is the realm

of information or privacy.

The final stipulation put forth in the Anonymous Manifesto brings the discourse back to

implementing forms of protest. It states that “it is the responsibility of all citizens to take action

and maintain an open and transparent society, and to deal appropriately with institutions or

citizens whose actions are a direct transgression of these postulates” (Anonymous, 2011). While

this statement does not directly mention the methods through which to deal with offending

institutions, it is nonetheless a call to arms for those who feel that they are hindered or threatened

HACKTIVIST CULTURE AND VIOLENCE 20

in their ability to manage information, whether it is about the outside world, their government, or

their own lives. The manipulation or monopoly of information by governing bodies is seen to be

a threat—an act of violence like that portrayed in Kafka’s Before the Law. The gate is there, and

we are purported to have access, but it is demonstrably not so. For Anonymous, the answer is not

to wait for access, but rather to engulf the gatekeepers and silence them with an overwhelming

number of requests for access.

The ideas of the Manifesto are repeated throughout the texts created by members of

Anonymous (Anonymous - Message to the American People, 2011, Anonymous, 2012b;

Anonymous, n.d.-a; Brown, 2011). After LulzSec, one of the more radical Anonymous splinter

groups, was outed by an FBI informant in March 2012, Anonymous members began planning

campaigns to help the six individuals who were arrested. One such person was Jeremy

Hammond, a Chicago-based activist. Hammond, in particular, has become an important figure

within the Anonymous community because of his treatment by the government. Unlike the

others who were arrested at the same time, Hammond has been held in jail without bail or trial

since March 5th, 2012. This indefinite imprisonment has led to a surge of support among

Anonymous members. On a page promoting a benefit CD for Hammond, there is another

assertion of violence:

Exploiting an organization and exposing its secrets is not a crime when that organization

is corrupt and its secrets protect its crimes. The State calls Jeremy Hammond a criminal

for these, exploiting an organization and exposing its secrets, are the crimes he is accused

of having committed but the organization he exploited is sponsored by a corrupt State and

the secrets he exposed threaten the lies we, the people, have been told by that State; The

HACKTIVIST CULTURE AND VIOLENCE 21

very State now prosecuting him. Regardless of their efforts to ignore our grievances, we

will be heard. (Anonymous, n.d.-b)

Again, Anonymous asserts that corrupt institutions have no privilege of privacy; therefore

Hammonds’ acts are warranted. The text refers to Hammonds’ role in receiving and

disseminating data that was leaked from the FBI. However, this leak was planned, orchestrated

by the FBI with the cooperation of the leader of LulzSec. Hammond was caught doing just what

the Manifesto would have him do: take the information of a government he perceives to be

corrupt in order to distribute it to the public. This being the case, it is not difficult to see why

Anonymous would deem such actions violent.

If Anonymous’ use of DDOS and information distribution undermine the laws of the

country, then the arrest of Anonymous activists is merely the enactment of law-preserving laws.

A corrupt democratic government would not be able to continue without risking the loss of its

democratic status. Therefore, according to the logic of Anonymous, it must create and enforce

laws that force its citizens to stay outside, out of the law, and away from the information that

might incriminate it. It is of the government’s best interest to create restrictions on the internet

because it is simply the easiest way for the public to find and share information that might trigger

the public into questioning its government. The status quo is maintained through careful

deprivation, and for this reason, Anonymous is interested in the liberation of the internet.

Whether that liberty comes from the ability to write and not fear censorship or to perform a

DDOS attack without being charged with fraud, it is all deemed progress for hacktivist groups.

One must keep the internet free in order to keep knowledge free, and those who would commit

the violence of suppression are to be suppressed themselves.

HACKTIVIST CULTURE AND VIOLENCE 22

Law and Violence

The definitions of violence perpetuated by hacktvist culture are inherently in conflict with

the definition of violence put forth by the law. Whether the hacktivists’ allegations against the

law and government pertain to the occupation of land, the privatization of public colleges, or

criminalization of certain types of information sharing, the government would never

acknowledge them as violent. Similarly, as detailed by Anonymous and the Electronic

Disturbance Theatre, hacktivist culture does not define DDOS attacks as violent, but rather as

rhetorical tactics of civil disobedience. Such a conflict makes it difficult to see a solution for the

two parties. On the one hand, the government is unlikely to change its stance on denial of

service, and as a result, it will continue to arrest and prosecute members of hacktivist groups who

employ DDOS. As long as these perceptions stay in place, there will be legal conflict. Unlike

Kafka’s parable, the fence and what it guards are not just inanimate objects, but rather complex

systems filled with individuals who are concerned with maintaining their status in the order. The

fence cannot just be jumped, but it must be navigated; and gaining access is not just persuading a

series of single gatekeepers, but rather seeking clearance from institutional networks. To be able

to make a change on either side—the law or the activists—there would need to be sweeping

change.

The difference in perspective between the government and the hacktivists leads directly

to conflict. This particular conflict is articulated by Kerr (2003) who describes the issue as a

battle between internal and external perspectives on the internet. The internal perspective is

characterized by the logic that drives the internet. At present, this would be the libertarian ethic

that comes from freedom of speech and a competitive market. The external perspective is one

that attempts to impose the laws of the physical world onto the internet. Both perspectives have

HACKTIVIST CULTURE AND VIOLENCE 23

certain complications: the internal perspective assumes that the internet is exceptional, and the

external perspective assumes that the internet is entirely ordinary. The idea of exception is based

in the concept of the internet as an ideal sphere; communication is global and instantaneous, and

the structuring of the internet levels the playing field in all realms. Therefore, it must be

protected at all costs. This perspective neglects the facts that it is only a democratizing agent for

those who either can afford or have access to the necessary technology, and that the structure of

the internet is ideal only if you neglect to note the market functions that dictate who can have

space on the internet and how their content is privileged. On the other side, the external view

assumes that the internet is like anything else: it is a particular situation constituted by facts, and

those facts can lead to a construction of law. The problem here is that the internet allows certain

behaviors that have no parallel in the physical world and thus do not correspond to what would

be traditionally construed as violent or illegal. Even though it is described as a digital sit-in, a

DDOS attack would be better described as protesters knocking on the walls of an institution until

the building temporarily disappeared. There is no clear analog to DDOS in the physical world,

despite all of the metaphors that get used by hacktivists. The lack of precedent also affects the

government. As new technology arises, the law must accommodate new types of offenses, and

one cannot expect a complex governmental body to understand technology like the internet in the

same way as habituated users. The multiple perspectives thus lead to differing allegations of law-

preserving and law-breaking violence, each spurring on the other.

The differences between the internal and external perspectives are not only sources of

conflict, but also indicative of the rupture between online and real-world experience. The

question of how to best apply law to the internet is not easily answered. To this end, Kerr argues:

HACKTIVIST CULTURE AND VIOLENCE 24

whether the problem of perspectives will remain as important as it is today depends on

two competing forces. … the advance of technology will make virtual realities more

lifelike and convincing. This should make the internal perspective more appealing… At

the same time, I expect that the external perspective will draw adherents from the

increasing numbers who understand how the Internet works. (2003, p. 25)

The idea that the external perspective is impeded only by a misunderstanding of technology on

the part of lawmakers is echoed in the writings of Lessig on cyberlaw (1999, 2006). Lessig is a

proponent of the libertarian internet, but is concerned by the application of law to such an

unusual space. The uniqueness described by Lessig is summed up in his phrase, “code is law”

(1999). Just as the internet is constituted by code, behaviors and activities are regulated by code.

What one is able to do online is defined strictly through what is coded into the website. For this

reason, law is then embodied in code and vice versa. This gives the power of law to any person

who can create code. Very often, this is done through major commercial entities such as

Microsoft, Apple, or other content providers. These companies effectively restrict and define

behavior in the same way that law condones or constrains behaviors. For this reason, Lessig

advances the idea of external government on the internet. Rule by corporation must be avoided at

all costs, and the way to do that is to extend the freedoms of the Bill of Rights onto the internet.

With that come the protections and processes guaranteed by the Constitution. In this sense,

Lessig is advocating for emancipatory law to be used on the internet, protecting citizens from

undue restrictions or influence rather than solely prosecuting them for perceived acts of law-

breaking violence. In a way, this contradicts the ideas of the Anonymous manifesto while still

upholding the freedoms they seek. While Lessig doubts that natural law can arise from the

HACKTIVIST CULTURE AND VIOLENCE 25

internet without commercial influence, he nonetheless wants protection for speech and

information.

Through the frameworks of cyberlaw proposed by Kerr and Lessig, it is possible to see

how the internet has created a multiplicity of perspectives on violence, the role of law, and the

nature of DDOS. Each party’s perspective shapes whether they advocate for self-governance of

the internet or not, and furthermore, it affects their allegations of violence through law-

preserving laws. The hacktivists that employ DDOS tend to frame their own work as non-violent.

It is a rhetorical act akin to traditional types of protest—yelling, ripping down posters, and

performing a sit-in. The denial of service is harmless because they look at it from an internal

perspective. From the viewpoint of the user, they are merely making a website inaccessible, an

act that is more visual than anything. The act is constructed as a new step in the long procession

of social movement tactics, used to assert rights and fight the acts of violence they perceive from

the government and the law. On the side of the law, the hacktivists are certainly committing law-

breaking, violent acts by costing businesses and government entities money, usually for

maintaining their servers after denial of service attacks. In the case of the Anonymous hack of

Sony, the damage was estimated to be from $1-2 billion due to the millions of accounts

comprised and the length of time the Playstation Network was offline (Dwayne Holder, 2011).

The external perspective of government focuses entirely on the material consequences of the

outside world, while attempting to make laws that bridge the gap to the internal space of the

internet. Another rupture in perspective occurs simply because of the differing natures of the two

sides: one is a voluntary network of politically-minded, internet-savvy individuals, and the other

is an immense hierarchical construction concerned with the regulation and protection of an

HACKTIVIST CULTURE AND VIOLENCE 26

immense populace. Both parties represent only a partial view of the issue, and from this, there

arises conflict.

It is impossible to declare either side of the issue of DDOS litigation as correct when one

acknowledges the different foundations on which each party is formed. The government is

concerned with maintaining a public free from crime, and the hacktivists appear to be a threat.

Hacktivist culture, conversely, sees the law as opposition to their natural law. Concerned with

upholding a libertarian view of the internet in which all are free to speak and participate in the

economy of information, the hacktivists must fight with what they have available to them. To

uphold their values, they turn to DDOS—a tactic that intuitively feels non-violent. The technique

takes down a webpage by making the server busy; it is an exploit of the material reality of the

system. It is a flood of information: bits, requests, packets, sets of numbers. For this reason, they

define it as rhetorical, and furthermore, as an act of protest. This description is necessary, and it

provides the motivation necessary to continue a social movement by both defining the problem

and prescribing a course of action. DDOS does not change the way that the law works, but

rather, it changes the landscape of the virtual space. It temporarily establishes a virtual, symbolic

world in which the targeted institution does not exist, be that the Bank of America, PayPal, or the

Church of Scientology. These hacktivists are aware that they cannot affect the law in any direct

way. They neither have the power nor the status within society to do so. What they do have is a

replicated universe in which everyone has the same power and status, a micro-cosmos of global

citizens navigating commercial and governmental entities in pursuit of their own ends. In this

digital realm, there is a gate, but the gatekeeper is structured by code. And that code is easily

overwhelmed. All you need to do is ask it too many questions, and suddenly you’re through the

gate.

HACKTIVIST CULTURE AND VIOLENCE 27

References

Anonymous. (2008, January 15). #51051816. 4chan.org/b/. Retrieved from

http://web.archive.org/web/20110724205615/http://4chanarchive.org/brchive/dspl_thread

.php5?thread_id=51051816

Anonymous. (2011, January 1). AnonNews.org : Everything Anonymous. AnonNews.org:

Everything Anonymous. Retrieved November 5, 2012, from

http://anonnews.org/press/item/199/

Anonymous. (2012a, January 22). How to Join Anonymous - A Beginner’s Guide. Social

Network Unionism. Retrieved December 5, 2012, from

http://snuproject.wordpress.com/2012/01/22/how-to-join-anonymous-a-beginners-guide/

Anonymous. (n.d.-a). Digital Sit-ins: DDOS is legitimate civil disobedience. Anonymous: We

Are Legion. Retrieved November 5, 2012, from

http://anonyops.org/post/16585162289/digital-sit-ins-ddos-is-legitimate-civil-

disobedience

Anonymous. (n.d.-b). Hear Us Now! AnonNews.org: Everything Anonymous. Retrieved

November 5, 2012, from http://anonnews.org/press/item/1837/

Anonymous - Message to the American People. (2011). Retrieved from

http://www.youtube.com/watch?v=HrXyLrTRXso&feature=youtube_gdata_player

Anonymous: Operation Israel. (2012b). Retrieved from

http://www.youtube.com/watch?v=MkC357RQt0c&feature=youtube_gdata_player

Ayers, M. D. (2003). Comparing collective identity in online and offline feminist activities. In

M. McCaughey & M. D. Ayers (Eds.), Cyberactivism: Online activism in theory and

practice (pp. 145–164). New York: Routledge.

HACKTIVIST CULTURE AND VIOLENCE 28

Benjamin, W., & Demetz, P. (1986). Reflections: essays, aphorisms, autobiographical writing.

Schocken Books.

Brown, B. (2011, May 3). Yes, you should join Anonymous. Daily Kos. Retrieved December 5,

2012, from http://www.dailykos.com/story/2011/05/03/972830/-Yes-you-should-join-

Anonymous

Cathcart, R. S. (1978). Movements: Confrontation as rhetorical form. Southern Speech

Communication Journal, 43(3), 233–247. doi:10.1080/10417947809372383

Cathcart, R. S. (1980). Defining social movements by their rhetorical form. Central States

Speech Journal, 31(4), 267–273. doi:10.1080/10510978009368066

Computer Fraud and Abuse Act (CFAA) - Internet Law Treatise. (n.d.). Electronic Frontier

Foundation. Retrieved November 3, 2012, from

http://ilt.eff.org/index.php/Computer_Fraud_and_Abuse_Act_(CFAA)

Dana Kennedy. (2010, December 9). WikiLeaks: Who Is “Anonymous” and What Is “Operation

Payback”? AOL News. Retrieved December 5, 2012, from

http://www.aolnews.com/2010/12/09/wikileaks-who-is-anonymous-and-what-is-

operation-payback/

Denton, N. (11). Church of Scientology claims copyright infringement. Gawker.

Doctorow, C. (2011, June 29). Moral Suasion. MAKE. Retrieved December 5, 2012, from

http://blog.makezine.com/2011/06/29/moral-suasion/

Dominguez, R. (2012, February 29). Call to Virtual Action – March 1st, 2012 – by Public

Education Coalition (UCSD). b.a.n.g. lab. Retrieved November 4, 2012, from

http://bang.calit2.net/2012/02/call-to-virtual-action-march-1st-2012-by-public-education-

coalition-ucsd/

HACKTIVIST CULTURE AND VIOLENCE 29

Dorian Batycka. (2012, June 23). Electronic Disturbance Theatre and Transversals of Rhizomatic

Resistance. b.a.n.g. lab. Retrieved December 5, 2012, from

http://bang.calit2.net/2012/06/network-architecture-and-electronic-civil-disobedience/

Dwayne Holder. (2011, May 10). PSN Intrusion Could Cost Sony Billions. Game Rant.

Retrieved December 5, 2012, from http://gamerant.com/sony-psn-intrusion-cost-billions-

hold-83850/

Electronic Disturbance Theatre disinformation. (2011). Retrieved from

http://www.youtube.com/watch?v=aR1U7uI487E&feature=youtube_gdata_player

Elin, L. (2003). The radicalization of Zeke Spier: How the internet contributes to civic

engagement and new forms of social capital. In M. McCaughey & M. D. Ayers (Eds.),

Cyberactivism: Online activism in theoryand practice (pp. 97–114). New York:

Routledge.

Garrido, M., & Halavais, A. (2003). Mapping networks of support for the Zapatista movement:

Applying social-networks analysis to study contemporary social movements. In M.

McCaughey & M. D. Ayers (Eds.), Cyberactivism: Online activism in theory and

practice (pp. 165–184). New York: Routledge.

Gladwell, M. (2010, October 4). Small Change. The New Yorker. Retrieved from

http://www.newyorker.com/reporting/2010/10/04/101004fa_fact_gladwell

Gray, R. T. (2005). A Franz Kafka Encyclopedia. Greenwood Publishing Group.

Griffin, L. M. (1980). On studying movements. Central States Speech Journal, 31(4), 225–232.

doi:10.1080/10510978009368062

Gunkel, D. J. (2005, October). Editorial: introduction to hacking and hacktivism. New Media &

Society, pp. 595–597.

HACKTIVIST CULTURE AND VIOLENCE 30

Hachman, M. (2010, October 29). “Anonymous” DDoS Attack Takes Down RIAA Site.

PCMAG. Retrieved December 5, 2012, from

http://www.pcmag.com/article2/0,2817,2371784,00.asp

Hick, S. F., & McNutt, J. G. (2002). Advocacy, activism, and the internet: Community

organization and social policy. Chicago, IL: Lyceum Books, Inc.

How a “denial of service” attack works - CNET News. (2000, February 9). CNET. Retrieved

December 5, 2012, from http://news.cnet.com/2100-1017-236728.html

Jordan, T. (2002). Activism!: Direct Action, Hacktivism and the Future of Society. Reaktion

Books.

Kerr, O. S. (2003). The Problem of Perspective in Internet Law. Georgetown Law Review, 91,

357–405. doi:10.2139/ssrn.310020

Krempl, S. (2000, February 16). Computerized resistance after the big flood | Telepolis. heise

onlnie. Retrieved December 5, 2012, from http://www.heise.de/tp/artikel/5/5801/1.html

Lawson, S. (2011, July 1). Denial of Service: Sit-in? No. Protest? Yes. - Forbes. Forbes.

Retrieved December 5, 2012, from

http://www.forbes.com/sites/seanlawson/2011/07/01/denial-of-service-sit-in-no-protest-

yes/

Lessig, L. (1999). Code and other laws of cyberspace. New York: Basic Books.

Lessig, L. (2006). Code: And Other Laws of Cyberspace, Version 2.0. Basic Books.

Lucas, S. E. (1980). Coming to terms with movement studies. Central States Speech Journal, 31,

255–266.

Marcus Baram. (2008, March 27). Anonymous Group Takes on Scientology. Retrieved

December 5, 2012, from http://abcnews.go.com/US/story?id=4513883&page=1

HACKTIVIST CULTURE AND VIOLENCE 31

McMillan, R., & Ackerman, S. (2012, November 28). Despite Ceasefire, Israel-Gaza War

Continues Online. Danger Room. Retrieved December 5, 2012, from

http://www.wired.com/dangerroom/2012/11/israel-gaza-ddos/

Morozov, E. (2009, May 19). The brave new world of slacktivism. Foreign Policy Blogs.

Retrieved from

http://neteffect.foreignpolicy.com/posts/2009/05/19/the_brave_new_world_of_slacktivis

m

Neal, D. (2011, May 5). Sony says Anonymous DDoS attacks distracted it. Retrieved December

5, 2012, from http://www.theinquirer.net/inquirer/news/2068111/sony-anonymous-ddos-

attacks-distracted

Stewart, C. J. (1980). A functional approach to the rhetoric of social movements. Central States

Speech Journal, 31(4), 298–305. doi:10.1080/10510978009368070

Stewart, C. J., Smith, C. A., & Denton, R. E. (2007). Persuasion and social movements.

Waveland Press.

Strickland, J. (n.d.). HowStuffWorks “Distributed Denial of Service Attacks.” HowStuffWorks.

Retrieved December 5, 2012, from http://computer.howstuffworks.com/zombie-

computer.htm

Taylor, P. A. (2005). From hackers to hacktivists: speed bumps on the global superhighway?

New Media & Society, 7(5), 625–646. doi:10.1177/1461444805056009

Taylor, P. A. (2007). Hacktivism – Resistance is Fertile? In C. Sumner (Ed.), The Blackwell

Companion to Criminology (pp. 486–500). Blackwell Publishing Ltd. Retrieved from

http://onlinelibrary.wiley.com/doi/10.1002/9780470998960.ch26/summary

HACKTIVIST CULTURE AND VIOLENCE 32

Vegh, S. (2003). Classifying forms of online activism: The case of cyberprotests against the

world bank. In M. McCaughey & M. D. Ayers (Eds.), Cyberactivism: Online activism in

theory and practice (pp. 71–96). New York: Routledge.

Vegh, S. (2005). The media’s portrayal of hacking, hackers, and hacktivism before and after

September 11. First Monday, 1–1.