Hacktivism

From P2P Foundation
Jump to navigation Jump to search

Definition

1.

" There are various definitions of the term 'hacktivism'. For those whose interests rest primarily with computers hacktivism is the promotion of computer hacking (hacker + activism). For those who approach computing from the social perspective it actually has more relevance as the use of computers and technology for hi-tech campaigning for social change (hi-tech + activism). The argument between hacker groups who have different opinions on the use of computers for political or social objectives has become key to the re-interpretation of the role of modern technology within the emerging 'information society'." (http://www.internetrights.org.uk/glossary.shtml)


2.

"Hacktivism is the fusion of hacking and activism; politics and technology. More specifically, hacktivism is described as hacking for a political cause. In this context, the term hacker is used in reference to its original meaning. As defined in the New Hacker's Dictionary, a hacker is "a person who enjoys exploring the details of programmable systems and how to stretch their capabilities" and one who is capable of "creatively overcoming or circumventing limitations". (http://www.thehacktivist.com/hacktivism.php)


Typology

Jarkko Moilanen:

"I have selected two authors whose definitions are at least to some extent considered to be basic definitions; Jordan’s and Samuel’s. Both have three-tier model of hacktivism. Jordan is often cited scholar concerning issues related to hacktivism. Jordan describes hacktivism to be: “ a combination of grassroots political protest with computer hacking” (Jordan and Taylor 2004).


In previous writings Jordan defines hacktivism as “politically motivated hacking” (Jordan 2002).


Jordan has defined three different types of virtual forms of political activity which are often labelled as hacktivism (Jordan 2008). These forms are:

  • mass embodied online protest,
  • internet infrastructure and information politics and
  • communicative practices and activity organising


Samuel has written a dissertation about “Hacktivism and the Future of Political Participation”.


'Samuel's definition of hacktivism is a bit less broad:

“hacktivism is the non-violent use of illegal or legally ambiguous digital tools in pursuit of political ends” (Samuel 2004, 2.)


In her dissertation research Samuel has interviewed over fifty (51) hacktivists. On the basis of the interviews and other material, Samuel has constructed a taxonomy of hacktivism.


In her study, Samuel also (like Jordan) divides hacktivism to three subcategories:

  • political cracking,
  • political coding and
  • performative hacktivism.


Political Cracking

Political cracking is hacker-programmer hacktivist activity which is according to Samuel

“consistent with what I call an “outlaw” orientation. These are the most illegal forms of hacktivism such as defacements, redirects, denial of service attacks, sabotage, and information theft.“(Samuel 2004, 15)

It must be noted that all the above activities are not necessarily hacktivism, but some of them can be pure hacking. What separates pure hacking and hacktivism is the hacktivists’ intention to have political consequences. In other words hacking can be both political and apolitical. To put it briefly, these are the ‘bad’ guys. In my opinion, political cracking activities might in some situations lean towards cyberterrorism or criminality.


Political Coding

Political coding and political cracking are separated by a thin and arguably sometimes vague line. Compared to political cracking discussed above, political coding hacktivists operate inside the legal boundaries. Their actions might be transgressive but not illegal. Typical activities include political software development. (Samuel 2004, 15)


The software development issue is not so simple as Samuel it so neatly puts. She gives an example of this type software. One hacktivist software development (Six/Four) is intended to address the problems of internet censorship (Samuel 2004, 14). Product of this software development is used to circumvent firewalls anywhere where authoritarian (or other repressive type) regimes deny free access to internet from the citizens. I agree with Samuel that this type of software development can easily be labelled as political coding.


However, there is a lot of quite similar software development which in my opinion can not so clearly be included under the umbrella of political coding. Let’s take for example Tor. Tor is a software to hide true identity of computer user in the internet. Tor uses multiple nodes(servers) to hide users traces while in the net. Tor also crypts messages and content. It can really easily be integrated to other software (for example with web browsers and IRC clients). Tor can be used to serve political activities but it is not clear what were the intentions of the coders. Can Tor be labelled as product of political coding? On the other hand, some people use Tor just to defend their right to privacy about what they do in internet, where they have visited or what they have discussed and with who. Even in the latter, politics is involved, since it is about privacy in the age in information. In my opinion the political or hacktivist aspect of the software depends also on how or who it is used by, not only who coded and developed it.

Performative Hacktivism

Samuel defines the third form of hacktivism to be performative hacktivism:

“which is practised by hacktivists from artist-activist backgrounds who have a transgressive orientation. Its forms are web site parodies and virtual sit-ins, most often as part of anti-corporate, anti-globalization, or pro-independence protests.”(Samuel 2004, 15)

An example of this type of activity is Electrohippies actions during WTO conference in Seattle 1999. During the conference they used DDoS attacks. Instead of using totally automated network of bots, supporters needed to download a Java-based software which enabled attacks if the user choose to use it. Result was that, according to organizers, 450 000 protesters took part to this net-based event and WTO servers slowed down and eventually were blocked (Jordan 2008, 23; Samuel 2004, 16). The net-based activity was not separated from the real world protest which took place at the same time.

According to Jordan the virtual world and so called real world are falsely for some reason thought to be separate issues. In hacktivism these two realms are different in some manner, but they are not mutually exclusive or antagonist." (http://extreme.ajatukseni.net/2010/04/13/hacktivism-as-3-tier-model/)


Discussion

From What is Hacktivism, a paper by Metac0m, 2003:

"Hacktivism is the fusion of hacking and activism; politics and technology. More specifically, hacktivism is described as hacking for a political cause. In this context, the term hacker is used in reference to its original meaning. As defined in the New Hacker's Dictionary, a hacker is "a person who enjoys exploring the details of programmable systems and how to stretch their capabilities" and one who is capable of "creatively overcoming or circumventing limitations".

(1) Activism is defined as "a policy of taking direct and militant action to achieve a political or social goal".

(2) Therefore, a clinical definition of hacktivism is: Hacktivism: a policy of hacking, phreaking or creating technology to achieve a political or social goal.

However, both hacking and activism, and thus hacktivism, are loaded words ripe for a variety of interpretation.

Therefore it is preferable not to clinically define hacktivism but rather to describe the spirit of hacktivism.

Hacktivism is root. It is the use of one's collective or individual ingenuity to circumvent limitations, to hack clever solutions to complex problems using computer and Internet technology. Hacktivism is a continually evolving and open process; its tactics and methodology are not static. In this sense no one owns hacktivism - it has no prophet, no gospel and no canonized literature." (http://www.thehacktivist.com/whatishacktivism.pdf)


More Information

  1. This article is an extensive examination of 'Hacktivism', at http://www.thehacktivist.com/hacktivism.php
  2. The Wikipedia entry, at http://en.wikipedia.org/wiki/Hacktivism describes the controversies surrounding the term and its associated practices.
  3. What is Hacktivism?, http://www.thehacktivist.com/whatishacktivism.pdf


Literature related to topic [1]:


Chamberlain, Kristen (2004) REDEFINING CYBERACTIVISM: THE FUTURE OF ONLINE PROJECT. Review of Communication Jul-Oct 2004, Vol. 4 Issue 3/4, pp 139-146

Illia, Laura (2003) PASSAGE TO CYBERACTIVISM: HOW DYNAMICS OF ACTIVISM CHANGE. Journal of Public Affairs, Volume 3, Number 4, November 2003 , pp. 326-337(12)

Jordan, Tim (2008) THREE TYPES OF “HACKTIVISM”: POLITICS OF INTERNET TECHNOLOGIES. In Net working / Networking – Citizen Initiated Internet Politics, pp. 254 - 280. Häyhtiö & Rinne (eds.), Tampere University Press. TUP.

Jordan, Tim, and Paul A. Taylor (2004) HACKTIVIM: INFORMATIONAL POLITICS FOR INFORMATIONAL TIMES. Routledge.

Jordan, Tim (2002) ACTIVISM! : DIRECT ACTION, HACKTIVISM AND THE FUTURE OF SOCIETY. London: Reaktion Books.

Manion, M. and A. Goodrum (2000) TERRORISM OR CIVIL DISOBEDIENCE: TOWARD A HACKTIVIST ETHIC. ACM SIGCAS Computers and Society 30(2): 14-19.

Samuel, Alexandra (2004) HACKTIVISM AND THE FUTURE OF POLITICAL PARTICIPATION. Harvard University, Cambridge, Massachusetts

Werbin, Kenneth C. (2005) CYBERACTIVISM: ONLINE ACTIVISM IN THEORY AND PRACTICE. Canadian journal of communication 30.1 (2005): 156-158.


See also:

  1. Hackerspaces