What is 'Hacktivism'

Hacktivism is a social or political activist plan that is carried out by breaking into and wreaking havoc on a secure computer system. Hacktivism is usually directed at corporate or government targets.

Hacktivists’ targets include religious organizations, terrorists, drug dealers, and pedophiles. An example of hacktivism is denial of service attacks (DoS) which shut down a system to prevent customer access. Other examples involve providing citizens with access to government-censored web pages or providing privacy-protected means of communication to threatened groups (such as Syrians during the Arab Spring).

Hacktivism is a mix of “hacking” and “activism” and is said to have been coined by the hacktivist group Cult of the Dead Cow (CdC).

BREAKING DOWN 'Hacktivism'

Hacktivism’s goals include the following: 

  • Circumventing government censorship by helping citizens get around national firewalls or helping protestors to organize online
  • Using social media platforms to promote human rights or help censored citizens of oppressive regimes communicate with the outside world
  • Taking down government websites that pose a danger to politically active citizens
  • Protecting free speech online
  • Promoting access to information
  • Supporting citizen uprisings
  • Assisting computer users to protect their privacy and avoid surveillance through secure and anonymous networks such as Tor and the Signal messaging app
  • Disrupting corporate or government power
  • Helping illegal immigrants cross borders safely
  • Supporting democracy
  • Protesting globalization and capitalism
  • Protesting acts of war
  • Halting the financing of terrorism.

Hacktivists’ methods may include distributed denial of service (DDoS) attacks, which flood a website or email address with so much traffic that it temporarily shuts down; data theft; website defacement; computer viruses and worms that spread protest messages; taking over social media accounts; and stealing and disclosing sensitive data.

There is disagreement within the hacktivist community over which techniques are appropriate and which are not. For example, while hacktivists may claim supporting free speech as an important cause, the use of DoS attacks, website defacements, and data theft that hinder or prevent free speech may be at odds with that goal. The methods hacktivists use are illegal and are a form of cybercrime. Yet they often are not prosecuted because they are rarely investigated by law enforcement. It can be difficult for law enforcement to identify the hackers and damages that ensue tend to be minor.

Hacktivism may be used as a substitute for or complement to traditional forms of activism such as sit-ins and protest marches. This has happened with the Occupy Wall Street and Church of Scientology protests, which involved both the physical presence of supporters in the streets and online attacks. Hacktivist attacks themselves are not violent and don’t put protestors at risk of physical harm, unlike participating in a street protest, but in some cases hacktivism might incite violence. Hacktivism also makes it possible to support geographically distant causes without having to travel there and makes it possible for geographically dispersed people with common goals to unite and act in support of a shared goal.

While there are thousands of hacktivist groups worldwide, some of the better-known from the 1990s to the present day include CdC, Hacktivismo, Lulz Security (Lulz Sec), Anonymous, Legions of the Underground, The Electronic Disturbance Theater, Young Intelligent Hackers Against Terrorism, Syrian Electronic Army, and AnonGhost.

RELATED TERMS
  1. Protest Divestment

    Protest divestment is the selling of assets on a large scale ...
  2. Cybersecurity

    Cybersecurity refers to the measures taken to keep electronic ...
  3. Advanced Persistent Threats (APT)

    An Advanced Persistent Threat (APT) is a large-scale, sophisticated, ...
  4. Data Loss

    Data loss occurs when valuable and/or sensitive information on ...
  5. Eavesdropping Attack

    An eavesdropping attack is an incursion where someone tries to ...
  6. Data Breach

    A data breach is an unauthorized access and retrieval of sensitive ...
Related Articles
  1. Insights

    Why Was Everyone at Standing Rock? (FB)

    Earlier this week, Facebook saw hundreds of thousands of check-ins at Standing Rock Indian Reservation in North and South Dakota. Why?
  2. Financial Advisor

    Don't Hide From The Reality Of How Terrorism Affects The Economy

    After major terror attacks, most people don't want to think about economics. But the post-terror economy affects the lives of the whole world, so it's important to be knowledgeable.
  3. Tech

    Is It Safe to Send Money Through Facebook?

    Learn how Facebook employs strong measures to keep your information safe when sending money, but understand the rare threats that still exist.
  4. Investing

    Security Stocks Up After Global Ransomware Attacks

    Investors bet that companies and governments will spend more to secure their networks.
  5. Insights

    Amazon's Annual Shareholder Meeting: What to Expect?

    As its size and market share has grown, the Seattle company's annual meetings have begun attracting protesters.
  6. Investing

    Germany Will Fine Social Media Firms Millions for No Action on Hate Speech

    Germany has approved a plan to fine social media network operators as much as $57 million if they don't remove hate speech within 24 hours.
  7. Personal Finance

    Social Credit Score: The Future of Credit Monitoring?

    Chinese authorities have proposed a social credit system based on troves of data.
  8. Tech

    SWIFT Attacks: Hackers Strike Again

    The recent SWIFT cyberattack has revealed connections to the earlier Bangladesh and Sony attacks.
  9. Insights

    Will Paris Attacks Undo the European Union Dream?

    Last Friday's attacks in Paris are transforming the migrant crisis into an EU security threat, which could undermine the European Union dream.
  10. Financial Advisor

    Websites: The Front Door to Your Advisory Practice

    Having a vibrant and dynamic online presence is for many organizations even more important than having an actual brick and mortar office.
RELATED FAQS
  1. Can Non-U.S. Citizens Buy Stocks of U.S. Companies?

    While demand for foreign investment into U.S. stocks by non-citizens is high, find out what barriers exist to owning securities ... Read Answer >>
  2. Receiving Social Security benefits abroad

    Understand the requirements for receiving Social Security benefits while living outside the U.S. – and how citizenship and ... Read Answer >>
  3. Is getting a free credit report safe?

    Discover whether getting a free credit report is safe, and find out how to get a legitimate free credit report. Understand ... Read Answer >>
Trading Center