Beacons of freedom: The changing face of Anonymous

It’s late January 2012. Governments all over the world are considering signing up to a new US-led trade proposal intended to curtail copyright violation, the Anti-Copyright Trade Agreement (ACTA). There have been widespread protests, on and offline: the loose-knit collective of activists, hackers and internet denizens of all stripes known as ‘Anonymous’ believe ACTA represents an attempt by governments to limit and control the core freedoms of the internet, in particular the massive cultural exchange of ideas and information made possible by file-sharing online.

In Poland, the agreement has already been signed off; all that is needed for it to be adopted into law is a majority vote in parliament. The government website is offline, taken down by a distributed denial of service (DDoS) attack launched by Anonymous, which sends a message to politicians who are considering voting in favour. By the final week of January, over 10,000 people gather in Krakow in a last-ditch protest to influence the vote.

Members of the Palikot Movement Party protest against the ratification of the Anti-Counterfeiting Trade Agreement

And then something unexpected happens: on 26 January 2012, while casting their votes in parliament, some members of the Polish government conceal their faces with paper Guy Fawkes masks. The mask, by now the signature icon for Anonymous, has become common protest regalia among rabble-rousers across the globe, from Egypt’s Tahrir Square to London’s Occupy protests. But this is the first case of public servants adopting the symbol. The image is circulated far and wide on social media platforms. Although Polish politicians used it to launch a specific protest against ACTA, the gesture and its photographic memorialisation worked in a much broader capacity to legitimate Anonymous. ‘These parliamentarians were wearing Anonymous Guy Fawkes masks,’ one Anonymous activist blogged, ‘while the parliament’s website was down due to DDoS by Anonymous. We can’t emphasise that point enough – this is a game-changer.’

Less than a month later a very different image of Anonymous was circulated. On 21 February 2012, the Wall Street Journal reported that General Keith Alexander, the director of the United States National Security Agency (NSA), had briefed officials at the White House in secret meetings, claiming Anonymous ‘could have the ability within the next year or two to bring about a limited power outage through a cyberattack’. So only weeks after the ‘game changer’, the group was described as an imminent and credible threat.

The ‘ability’ to bring about a power outage was undefined. Could it mean that hackers had already acquired passwords that would give them access to power facilities? Or was the warning based on information supplied by an informant who had been working with Anonymous? Either way, General Alexander’s claims were frightening and bold, as well as vague. An attack on the power grid systems would cause havoc and potentially even threaten lives.

It is unlikely that we will ever find out whether the NSA assessment was based on credible intelligence or whether it was simply meant to smear and discredit Anonymous. Further news reports quoted activists and security experts and dismissed NSA claims as ‘fear-mongering’. The group, for all its varied tactics, both legal and illegal, has to date never been known to publicly call for such an attack – and there is no evidence to suggest that it would so much as consider it. A tactic like this would be very out of character for the collective, which, though often subversive, generally conforms to ethical norms and defends civil liberties.

While Anonymous has never occupied a controversy-free place on the world stage, by February 2012 it began to be portrayed as an open source brand of radical protest politics and not necessarily as hooligans hell-bent on unleashing extremist, chaotic acts like taking down power grids. More significantly, while the name has been used to pull together a range of unrelated causes, from environmental rights to snuffing out paedophilia rings, Anonymous activists are most effective and forceful when fighting censorship.

With campaigns like Operation Payback, which targeted corporations like MasterCard when it stopped providing services to WikiLeaks, OpTunisia, which responded to Tunisian government tactics against protesters and journalists, and OpJapan and OpMegaupload, launched in response to proposed copyright legislation, it is when Anonymous activists defend the internet’s core freedoms and expose the shadowy workings of state and corporate surveillance that it has the most impact. The NSA news story about the exigent threat from Anonymous failed to gain traction in the public consciousness. Perhaps it would have if it had come earlier, for instance between May and July 2011, at the height of attacks led by Lulzsec.

Anonymous launched Operation Megaupload

In contrast to most Anonymous actions, Lulzsec, a break-away hacker group, acted whimsically, its hacks not always tethered to a political issue. Lulzsec sometimes hacked to make a political statement and, in other instances, for lulz, internet slang for laughs. During this period, media attention, which was colossal, was most heavily focused on Anonymous as hackers rather than as a general protest group. Activities under the Anonymous banner, such as those of Lulzsec, show that even though Anonymous has gained a measure of respect because it champions free speech and privacy causes, it is also notorious for its irreverent and controversial approach to dissent.

To be sure, most of its activities are legal, but a small subset of tactics – such as DDoS attacks and hacking – are illegal, a criminal offence under all circumstances. These tactics also score the most headlines. Some, like ‘doxing’ (the leaking of personal, sensitive information, such as social security numbers and home addresses), reside in a legal grey zone because mined information is found on publicly accessible websites. During the course of a single operation different participants might deploy all three modes – legal, illegal and legally grey tactics.

Take Operation Bart, in August 2011. Anonymous focused on getting the word out when San Francisco Bay Area Rapid Transit (BART) officials disabled mobile phone reception on station platforms to thwart planned anti-police brutality protests. Soon after, Anonymous helped organise street demonstrations. But a couple of individuals also hacked into BART’s computers and released customer data in order to garner media attention – at least that’s how one participant explained the incident to Amy Goodman on television and radio programme Democracy Now. Someone also found a racy, semi-nude photo of BART’s official spokesperson Linton Johnson on his personal website, which was then republished on the ‘bartlulz’ website with considerable fanfare, along with the brazen rationalisation: ‘if you are going to be a dick to the public, then I’m sure you don’t mind showing your dick to the public.’

During the course of an operation, vulnerability and weakness is often identified and exploited. These sorts of actions provoke controversy (even within Anonymous) and also find their way into headlines, boosting the group’s public profile. At times, members of the loose collective are purposely deceitful and propagate false information about their activities. This can be a tactic for self-protection in some cases, and in other cases an antic to coax headlines out of the media, which can be somewhat enamoured with hacking.

Antisec, one of the more well-known hacker groups affiliated with Anonymous, might claim an exploit without having actually been involved in the activity. Hackers will often rely on botnets – networks of compromised computers – to momentarily knock a website offline, but won’t advertise this fact in press releases. Between 10 and 11 September 2012, for instance, Antisec claimed to have procured 12 million unique device identification numbers from Apple iOS devices by hacking into an FBI agent’s laptop computer. As it turns out, while the identification numbers were verified, the source turned out to be an iPhone and iPad app developer, Blue Toad. Because tactics range from the frivolous to the controversial to the illegal and because it has been known to generate hype around its own activities, it can be easily targeted itself. Obfuscation and deceit contributes to Anonymous’s mystique and its power, but also makes it vulnerable to misinformation campaigns spread by others.

Antisec – One of the more well-known hacker groups affiliated with Anonymous

The biggest lesson that can be learned from Anonymous is that the internet will judge – often quite swiftly – the actions of individuals, corporations and governments. And by the internet I mean the countless hackers and geeks from São Paulo to Sydney who understand how the web works, a smaller class who know how to subvert routers and protocols, and a larger number who will rally when the internet and values associated with it are in danger.

This is not to say that every geek and hacker supports Anonymous. In fact, many rather dislike it or its controversial tactics, such as DDoS; some hackers are resolute and unyielding in their view that DDoS is a species of censorship in itself. There are also many different ways to defend the internet, such as writing open source software or joining the Pirate Party. Anonymous is a distinct, emerging part of this diverse and burgeoning political landscape. Its real threat may lie not so much in its ability to organise cyberattacks but in the way it has become a beacon, a unified front against censorship and surveillance.

It might be best thought of as the irascible and provocative protest wing of the internet’s nascent free speech and privacy movement. Though it works to publicise specific issues at the most inconvenient time for the individual, group or company being exposed, it also brings into sharp focus an important trend, dramatising the value of privacy and anonymity in an era where both are rapidly eroding.

Anonymous, of course, champions anonymity, and this is echoed in both the iconography associated with it and its ethical codes. Seeking individual recognition and especially fame is taboo, for example; you are expected to do work for the team, not for one’s own personal benefit or status. The movement, therefore, provides a rare countermeasure in deeds, words and symbols against a world that encourages people to reveal their lives, where the internet remembers everything about us, where our histories are permanently stored in search indexes and government databases – and at a time when governments’ ability to surveil its citizens has grown exponentially thanks to low-cost, ubiquitous digital technologies and new public-private partnerships.

 

However explosive Anonymous is today, its continued presence on the world stage is certainly not guaranteed to last. It is plagued by infighting, fragmentation, as well as brand fatigue. Paranoia exploded in spring 2012 after the news broke that Hector Xavier Monsegur, known more commonly by his hacker handle ‘Sabu’, had been exposed as an FBI informant. Most troubling for its long-term survival is government crackdown: since summer 2011, over 100 alleged participants have been arrested around the globe, from Romania, Turkey, Italy, the UK, the US, Chile and Germany. But even if the loose-knit collective fades away, irreverent political protest on the internet is unlikely to end.

Since 2008, when individuals started to organise diverse collective actions under the banner of Anonymous, a living model was created, demonstrating to the world what a radical politics of dissent on the internet looks like. Even if Anonymous was to vanish, its history, exploits and propaganda material are here to stay; there will likely be others — in different forms and with distinct twists — who will take its place.

What is a little less clear is what will eventually become of freedom of expression online, given the increasing capabilities for surveillance, censorship and control all over the world. Is Anonymous merely the party at the funeral of online freedom? Or does it represent the irreverent clowns, rabble rousers, and tricksters who are keeping the reaper at bay and enabling others, from protesters on the street to elected representatives in parliament, to join the raucous political carnival and challenge threats to personal privacy and freedom?

Gabriella Coleman is Wolfe Chair in Scientific and Technological Literacy at the Department of Art History and Communication Studies at McGill University. She tweets from @BiellaColeman

This article appears in Digital Frontiers. Click here for subscription options and more

Why is Wikipedia down?

As Wikipedia and other websites begin blackout to protest against US anti-piracy laws, Index and the international human rights community speak out on PROTECT IP Act

Sen. Harry Reid
Majority Leader
United States Senate
522 Hart Senate Office Bldg
Washington, DC 20510

Dear Majority Leader Harry Reid,

As human rights and press freedom advocates, we write to express our deep concern about S. 968, the PROTECT IP Act (PIPA), and the threat it poses to international human rights. Like H.R. 3261, the Stop Online Piracy Act (SOPA), PIPA requires the use of internet censorship tools, undermines the global nature of the internet, and threatens free speech online. PIPA introduces a deeply concerning degree of legal uncertainty into the internet economy, particularly for users and businesses internationally. The United States has long been a global leader in support of freedom of speech online, and we urge the Senate not to tarnish that reputation by passing PIPA.

Today, some of the world’s most repressive countries, like China, Iran, Yemen, Saudi Arabia, and Syria use DNS filtering as a means to silence their citizens. As over 80 human rights organizations recently wrote in a letter opposing SOPA, “institutionalizing the use of internet censorship tools to enforce domestic law in the United States… creates a paradox that undermines its moral authority to criticize repressive regimes.”[1] In fact, PIPA would send an unequivocal message to other nations that the use of these tools is not only acceptable, but encouraged.

DNS filtering is a blunt form of censorship that is ineffective at achieving its stated goal, while causing collateral damage to online communities on a massive scale. But while DNS filtering is trivial for users to circumvent, this technology would fundamentally undermine the integrity of the global internet, making users more vulnerable to cybersecurity attacks and identity fraud. Additionally, any legislation that mandates filtering of websites is prone to unintended consequences, such as overblocking. For example, in early 2011, when the Immigration and Customs Enforcement agency seized the domain mooo.com, it accidentally removed the web addresses of 84,000 (almost exclusively legal) connected domain names.[2] Moreover, once the technical infrastructure enabling censorship is in place, it allows future governments (and private actors) to block virtually any type of content on the web, making the provisions of this bill prone to mission creep.

The attempts at due process provisions in this bill do not respect the global nature of the internet. The network effects of the internet are realized when users and innovators are able to connect around the globe. However, creating a mechanism that requires a representative of a website to make a court appearance in the U.S. in order to defend themselves against an allegation of infringement would disproportionately impact smaller online communities and start-ups based abroad that do not have the capacity to address concerns in the United States. These websites would risk losing access to advertising services, payment providers, search engine listings, and their domain name. Together, these pieces of the bill would drive international innovators away from depending on U.S. services as a hedge against legal threats, while missing what should be the target of this legislation: preventing large-scale commercial infringement.

PIPA further creates a double jurisdiction problem, whereby non-U.S.-based sites must determine whether a site is legal in both the country it is operating in and the United States. This raises serious concerns about the scope of the bill, as foreign websites falling under PIPA’s definition of infringement may be perfectly legal in other jurisdictions. For example, the domain of a Spanish site, rojadirecta.org, was seized in early 2011 by U.S. authorities without adequate due process, notification to the site’s owners, or an option to defend themselves, despite having been declared legal by two Spanish courts.[3]

The definition of “information location service” is overly broad and would have a chilling effect on online speech. PIPA would make nearly every U.S.-based actor on the internet, including not only blogs, chat rooms, and social networks but users as well, potentially subject to enforcement orders of the bill. Additionally, the requirement that these service providers act “as expeditiously as possible to remove or disable access” to an allegedly infringing website imposes an unprecedented burden on any service that contains links, incentivizing the screening and removal of content in order to avoid being caught up in legal proceedings. Further, even if an accused website is later found to be innocent, links to that website could have effectively disappeared from the web, having been permanently removed when the court notice was served.

PIPA is also vague with respect to how links would be defined, including if all links associated with a domain or subdomain would be required to be blocked and if this would apply to future attempts by users to post content. This provision could potentially be interpreted in a way that would force services that allow users to post links to proactively monitor and censor the activities of their users, dramatically altering the role of these platforms in promoting free speech and setting a dangerous precedent for other countries.

We understand the pressure that lawmakers face in passing copyright enforcement legislation, and agree that protecting the rights of creators is an important goal. However, enforcement should not come at the expense of free speech or due process. This bill is fundamentally flawed due to its wide range of restrictive and potentially repressive measures. Even if individual elements of the proposal, such as DNS filtering are modified, postponed or amended, the legislation as a whole represents a precedent that is a real danger for human rights on the internet. We must remain conscious of the fact that the internet is a key enabler of human rights and innovation, and decisions over its governance should not be made hastily and without full consideration of collateral consequences.

We strongly urge the Senate to stand for human rights, defend the open internet, and reject the PROTECT IP Act.

Sincerely,

Access
AGEIA DENSI
Amnesty International
Asociatia pentru Technologie si Internet (ApTI)
Association for Progressive Communications (APC)
Article 19
Bits of Freedom
Bytes for All Pakistan
Centre for Internet and Society – India
Communication is Your Right!
Computer Professionals for Social Responsibility
Creative Commons Guatemala
ONG Derechos Digitales – Chile
Demand Progress
Digitale Gesellschaft e.V.
Eduardo Bertoni on behalf of iLEI/CELE UP (Iniciativa Libertad de Expresión en Internet, Centro de Estudios en Libertad de Expresión, Universidad de Palermo, Argentina)
Electronic Frontier Finland (EFFi)
EsLaRed
European Digital Rights (EDRi) (an association of 27 privacy and civil rights groups in Europe)
FGV/CTS
FoeBuD
Foundation for a Free Information Infrastructure (FFII)
Free Network Foundation
Free Press Unlimited
Free Software Foundation Europe (FSFE)
Fundación Karisma
FUNREDES
German Working Group against Internet Blocking and Censorship (Arbeitskreis gegen Internet-Sperren und Zensur, AK Zensur)
Hiram Meléndez-Juarbe on behalf of the New Technologies, Intellectual Property and Society Clinic University of Puerto Rico Law School
Human Rights Watch
Index on Censorship
Instituto Nupef
Internet Democracy Project – India
Iuridicum Remedium o.s.
Julia Group
Guardian Project
La Quadrature du Net
MayFirst/People Link
Net Users Rights Protection Association (NURPA)
Open Rights Group (ORG)
Open Source Initiative
Palante Technology Cooperative
Panoptykon Foundation
People Who
Public Sphere Project
Quintessenz
Reporters Without Borders
Vrijschrift
WITNESS
wlan slovenia, open wireless network

Pirate community radio operators fined and jailed

Community radio stations have had a difficult time in Latin America in the last four years. In Mexico, Brazil and Chile, community radios have been penalised for operating without a government license, according to Aleida Callejas, local director of the World Association of Community Radio Broadcasters (AMARC Mexico). In Mexico, the authorities have began using a 2004 law that protects the country’s patrimony or “Ley de Bienes Generales” to punish community radio stations that operate without a government license with prison sentences and fines. This move has been criticised by both the Organisation of American States and the United Nations Special Rappourteur for Freedom of the Press. The new law, which applies its article 150 to community radios, is more draconian than the Radio and Television law used in similar cases in the past.

The case of Hector Camero of Radio Tierra y Libertad in Monterre is the most recent example, Canero was sentenced to two years in prison for operating his station. His case will probably be appealed before the country’s Supreme Court. “The law is draconian” says Callejas.

The debate over whether community radios are legal has been argued robustly across Latin America. In Mexico, promoters argue that they serve underrepresented communities, including indigenous areas. Several community radio stations have eventually managed to obtain operating licenses, a move criticised by commercial networks, who argue that their business is being affected by unlicensed pirate stations. Callejas worries that now, the commercial radio stations are pressuring regional governors across the country to follow the Canero’s example and penalise community radio projects.

SUPPORT INDEX'S WORK