What is 'Hacktivism'

Hacktivism is a social or political activist plan that is carried out by breaking into and wreaking havoc on a secure computer system. Hacktivism is usually directed at corporate or government targets.

Hacktivists’ targets include religious organizations, terrorists, drug dealers, and pedophiles. An example of hacktivism is denial of service attacks (DoS) which shut down a system to prevent customer access. Other examples involve providing citizens with access to government-censored web pages or providing privacy-protected means of communication to threatened groups (such as Syrians during the Arab Spring).

Hacktivism is a mix of “hacking” and “activism” and is said to have been coined by the hacktivist group Cult of the Dead Cow (CdC).

BREAKING DOWN 'Hacktivism'

Hacktivism’s goals include the following: 

  • Circumventing government censorship by helping citizens get around national firewalls or helping protestors to organize online
  • Using social media platforms to promote human rights or help censored citizens of oppressive regimes communicate with the outside world
  • Taking down government websites that pose a danger to politically active citizens
  • Protecting free speech online
  • Promoting access to information
  • Supporting citizen uprisings
  • Assisting computer users to protect their privacy and avoid surveillance through secure and anonymous networks such as Tor and the Signal messaging app
  • Disrupting corporate or government power
  • Helping illegal immigrants cross borders safely
  • Supporting democracy
  • Protesting globalization and capitalism
  • Protesting acts of war
  • Halting the financing of terrorism.

Hacktivists’ methods may include distributed denial of service (DDoS) attacks, which flood a website or email address with so much traffic that it temporarily shuts down; data theft; website defacement; computer viruses and worms that spread protest messages; taking over social media accounts; and stealing and disclosing sensitive data.

There is disagreement within the hacktivist community over which techniques are appropriate and which are not. For example, while hacktivists may claim supporting free speech as an important cause, the use of DoS attacks, website defacements, and data theft that hinder or prevent free speech may be at odds with that goal. The methods hacktivists use are illegal and are a form of cybercrime. Yet they often are not prosecuted because they are rarely investigated by law enforcement. It can be difficult for law enforcement to identify the hackers and damages that ensue tend to be minor.

Hacktivism may be used as a substitute for or complement to traditional forms of activism such as sit-ins and protest marches. This has happened with the Occupy Wall Street and Church of Scientology protests, which involved both the physical presence of supporters in the streets and online attacks. Hacktivist attacks themselves are not violent and don’t put protestors at risk of physical harm, unlike participating in a street protest, but in some cases hacktivism might incite violence. Hacktivism also makes it possible to support geographically distant causes without having to travel there and makes it possible for geographically dispersed people with common goals to unite and act in support of a shared goal.

While there are thousands of hacktivist groups worldwide, some of the better-known from the 1990s to the present day include CdC, Hacktivismo, Lulz Security (Lulz Sec), Anonymous, Legions of the Underground, The Electronic Disturbance Theater, Young Intelligent Hackers Against Terrorism, Syrian Electronic Army, and AnonGhost.

  1. Advanced Persistent Threats (APT)

    An Advanced Persistent Threat (APT) is a large-scale, sophisticated, ...
  2. Threat Modeling

    Threat modeling is evaluating what needs to be protected in the ...
  3. Data Loss

    Data loss occurs when valuable and/or sensitive information on ...
  4. Tor

    Tor is an open source privacy network that permits users to browse ...
  5. Computer Abuse

    Computer abuse is the use of a computer to do something improper ...
  6. USA Patriot Act

    The USA Patriot Act is a law passed shortly after the September ...
Related Articles
  1. Insights

    Why Was Everyone at Standing Rock? (FB)

    Earlier this week, Facebook saw hundreds of thousands of check-ins at Standing Rock Indian Reservation in North and South Dakota. Why?
  2. Investing

    Terrorism's Effects on Wall Street

    Terrorist activity tends to have a negative impact on the markets, but just how much? Find out how to take cover.
  3. Insights

    How Terrorism Damages the Global Economy

    The economic impact of more than 1,000 known terror attacks worldwide since 2015 may be larger than most realize.
  4. Investing

    Security Stocks Up After Global Ransomware Attacks

    Investors bet that companies and governments will spend more to secure their networks.
  5. Personal Finance

    How Cyber Security Risks Impact Your Bank

    Here's how cyber security risks mean for the financial industry and consumers.
  6. Investing

    Are Hackers to Blame for Brokerage Outages? ThousandEyes Thinks So

    Online brokerages suffered intermittent outages during heightened trading this week, but ThousandEyes thinks a DDoS attack may have been at play.
  7. Tech

    SWIFT Attacks: Hackers Strike Again

    The recent SWIFT cyberattack has revealed connections to the earlier Bangladesh and Sony attacks.
  8. Personal Finance

    Social Credit Score: The Future of Credit Monitoring?

    Chinese authorities have proposed a social credit system based on troves of data.
  9. Insights

    Top Cyber Security Risks for Financial Advisors

    Cyber crime is on the rise. Here's what advisory firms, big and small, need to be aware of and how to prepare.
  1. What impact have terrorist attacks had on the insurance industry?

    Learn about the impact of terrorist attacks on the insurance industry and how the 9/11 terrorist attack led to important ... Read Answer >>
  2. What is the Social Security administration responsible for?

    Learn about the Social Security Administration's main responsibilities along with its history, structure and social safety ... Read Answer >>
Hot Definitions
  1. Standard Deviation

    A measure of the dispersion of a set of data from its mean, calculated as the square root of the variance. The more spread ...
  2. Entrepreneur

    An Entrepreneur is an individual who founds and runs a small business and assumes all the risk and reward of the venture. ...
  3. Money Market

    The money market is a segment of the financial market in which financial instruments with high liquidity and very short maturities ...
  4. Perfect Competition

    Pure or perfect competition is a theoretical market structure in which a number of criteria such as perfect information and ...
  5. Compound Interest

    Compound Interest is interest calculated on the initial principal and also on the accumulated interest of previous periods ...
  6. Income Statement

    A financial statement that measures a company's financial performance over a specific accounting period. Financial performance ...
Trading Center