What is 'Hacktivism'

Hacktivism is a social or political activist plan that is carried out by breaking into and wreaking havoc on a secure computer system. Hacktivism is usually directed at corporate or government targets.

Hacktivists’ targets include religious organizations, terrorists, drug dealers, and pedophiles. An example of hacktivism is denial of service attacks (DoS) which shut down a system to prevent customer access. Other examples involve providing citizens with access to government-censored web pages or providing privacy-protected means of communication to threatened groups (such as Syrians during the Arab Spring).

Hacktivism is a mix of “hacking” and “activism” and is said to have been coined by the hacktivist group Cult of the Dead Cow (CdC).

BREAKING DOWN 'Hacktivism'

Hacktivism’s goals include the following: 

  • Circumventing government censorship by helping citizens get around national firewalls or helping protestors to organize online
  • Using social media platforms to promote human rights or help censored citizens of oppressive regimes communicate with the outside world
  • Taking down government websites that pose a danger to politically active citizens
  • Protecting free speech online
  • Promoting access to information
  • Supporting citizen uprisings
  • Assisting computer users to protect their privacy and avoid surveillance through secure and anonymous networks such as Tor and the Signal messaging app
  • Disrupting corporate or government power
  • Helping illegal immigrants cross borders safely
  • Supporting democracy
  • Protesting globalization and capitalism
  • Protesting acts of war
  • Halting the financing of terrorism.

Hacktivists’ methods may include distributed denial of service (DDoS) attacks, which flood a website or email address with so much traffic that it temporarily shuts down; data theft; website defacement; computer viruses and worms that spread protest messages; taking over social media accounts; and stealing and disclosing sensitive data.

There is disagreement within the hacktivist community over which techniques are appropriate and which are not. For example, while hacktivists may claim supporting free speech as an important cause, the use of DoS attacks, website defacements, and data theft that hinder or prevent free speech may be at odds with that goal. The methods hacktivists use are illegal and are a form of cybercrime. Yet they often are not prosecuted because they are rarely investigated by law enforcement. It can be difficult for law enforcement to identify the hackers and damages that ensue tend to be minor.

Hacktivism may be used as a substitute for or complement to traditional forms of activism such as sit-ins and protest marches. This has happened with the Occupy Wall Street and Church of Scientology protests, which involved both the physical presence of supporters in the streets and online attacks. Hacktivist attacks themselves are not violent and don’t put protestors at risk of physical harm, unlike participating in a street protest, but in some cases hacktivism might incite violence. Hacktivism also makes it possible to support geographically distant causes without having to travel there and makes it possible for geographically dispersed people with common goals to unite and act in support of a shared goal.

While there are thousands of hacktivist groups worldwide, some of the better-known from the 1990s to the present day include CdC, Hacktivismo, Lulz Security (Lulz Sec), Anonymous, Legions of the Underground, The Electronic Disturbance Theater, Young Intelligent Hackers Against Terrorism, Syrian Electronic Army, and AnonGhost.

RELATED TERMS
  1. Denial Of Service Attack (DoS)

    A Denial Of Service Attack (DoS) is an intentional cyberattack ...
  2. Advanced Persistent Threats (APT)

    An Advanced Persistent Threat (APT) is a large-scale, sophisticated, ...
  3. Zero Day Attack

    Zero Day Attack is an attack that exploits a potentially serious ...
  4. Social Engineering

    Social engineering is the act of exploiting human weaknesses ...
  5. Threat Modeling

    Threat modeling is evaluating what needs to be protected in the ...
  6. Combating the Financing of Terrorism ...

    Combating the Financing of Terrorism is deterring and preventing ...
Related Articles
  1. Investing

    Terrorism's Effects on Wall Street

    Terrorist activity tends to have a negative impact on the markets, but just how much? Find out how to take cover.
  2. Tech

    3 Ways Cyber-Crime Impacts Business

    Cyber-crime is on the rise among American businesses, and it is costing them dearly.
  3. Investing

    How the Paris Attacks Could Impact the Economy

    The horrific terror attacks in Paris will have a ripple effect on comsumer spending and tourism.
  4. Investing

    Germany Will Fine Social Media Firms Millions for No Action on Hate Speech

    Germany has approved a plan to fine social media network operators as much as $57 million if they don't remove hate speech within 24 hours.
  5. Financial Advisor

    Websites: The Front Door to Your Advisory Practice

    Having a vibrant and dynamic online presence is for many organizations even more important than having an actual brick and mortar office.
  6. Tech

    Protect Your Small Business from Cybercrime

    Small business owners are a growing target for cyber-attacks; protect yourself and your clients.
  7. Tech

    Bitcoin Gold Hack Shows 51% Attack Is Real

    Bitcoin Gold might be at the receiving end of a 51% attack. If true, this theoretically means a hacker can take control of the cryptocurrency.
  8. Insights

    Facebook Employees Take Day Off to Protest on Int'l Workers' Day

    Facebook is joining a growing list of companies that let employees take paid leave to protest.
  9. Insights

    The Underground Internet Economy Of Cybercrime

    Cybercrime represents an underground economy worth $114 billion. Let's take a look at how this economy operates.
  10. Tech

    SWIFT Admits Hackers Sent Fraudulent Messages

    Earlier this morning, SWIFT, the international consortium of financial entities, admitted that hackers sent fraudulent messages over its network.
RELATED FAQS
  1. What impact have terrorist attacks had on the insurance industry?

    Learn about the impact of terrorist attacks on the insurance industry and how the 9/11 terrorist attack led to important ... Read Answer >>
  2. Can Non-U.S. Citizens Buy Stocks of U.S. Companies?

    While demand for foreign investment into U.S. stocks by non-citizens is high, find out what barriers exist to owning securities ... Read Answer >>
  3. Receiving Social Security benefits abroad

    Understand the requirements for receiving Social Security benefits while living outside the U.S. – and how citizenship and ... Read Answer >>
Hot Definitions
  1. Discount Rate

    Discount rate is the interest rate charged to commercial banks and other depository institutions for loans received from ...
  2. Economies of Scale

    Economies of scale refer to reduced costs per unit that arise from increased total output of a product. For example, a larger ...
  3. Quick Ratio

    The quick ratio measures a company’s ability to meet its short-term obligations with its most liquid assets.
  4. Leverage

    Leverage results from using borrowed capital as a source of funding when investing to expand the firm's asset base and generate ...
  5. Financial Risk

    Financial risk is the possibility that shareholders will lose money when investing in a company if its cash flow fails to ...
  6. Enterprise Value (EV)

    Enterprise Value (EV) is a measure of a company's total value, often used as a more comprehensive alternative to equity market ...
Trading Center