Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-m9kch Total loading time: 0 Render date: 2024-06-01T13:06:56.030Z Has data issue: false hasContentIssue false

3 - Political Autonomy, the Arab Spring and Anonymous

Published online by Cambridge University Press:  18 January 2024

Ross W. Bellaby
Affiliation:
University of Sheffield
Get access

Summary

Introduction

Over their relatively short history, hackers have embarked on a broad range of different political conversations, debates, movements, events and issues, and have used a diverse array of methods ranging from online graffiti, virtual-sit-ins, message dissemination and protest organizing, to distributed-denial of services (DDoS) attacks, secret document leaking, and the launching of viruses, all with the purpose of utilizing their (threat of) coercive power and influence to effect change. Even within a single operation, the tools used and the political agenda sought can flow and change throughout its lifetime, raising a variety of different ethical questions and debates as a result. Given this fluidity it is challenging to create distinct breaks between the chapters focusing only on specific hacking tools. Instead, broad themes based on the general ethos and political objectives sought by the hackers can be established to help categorize and then facilitate the ethical evaluation. This chapter will focus on operations whose purpose is concerned with political autonomy: that is, restoring, protecting or enabling the individual's and social group's ability to act with their autonomy intact and to use that autonomy to act as political beings. This includes operations whose objective is providing for people's rights in expression, association, access to information and political engagement, and, importantly, how cyberspace has come to play a fundamental role in each of their realizations.

Some of the most infamous examples of hacking operations in this area involve those carried out as part of the Arab Spring revolutions between 2010 and 2012, where Anonymous aided the emerging protest movements throughout the region by shutting down government websites through DDoS attacks, and helping dissidents circumvent online censorship by providing ‘online care packages’ that allowed anonymous online communication and access to information. This included Operation Tunisia, where on 2 January 2010 Anonymous began landing successful DDoS attacks against several Tunisian government websites, including those belonging to the president, prime minister, Ministry of Industry, minister of foreign affairs, stock exchange and the government Internet agency that had been censoring online dissidence. This was followed by Operation Egypt, starting on 26 January 2011, using DDoS attacks on Egyptian cabinet ministers and providing online technologies to aid communications during the protests. And in 2012, Anonymous attacked Syrian government websites to fight government censorship (Greenberg, 2012b).

Type
Chapter
Information
Publisher: Bristol University Press
Print publication year: 2023

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×