Hacktivism and dis/misinformation campaigns

Module 14 examines topics, such as hacktivism, terrorism, espionage, dis/misinformation campaigns, and warfare in cyberspace, as well as national and international perspectives and responses to these cyber activities. The purpose of this Module is to discuss these topics and identify current debates and conflicting views on these topics within and between countries.


Learning Objectives

After completing this module, you should be able to:

  • define misinformation and disinformation and differentiate between the two within the context of cyberwarfare.
  • identify the Actors Involved in Misinformation Campaigns: Recognize the roles of nation-states, non-state actors, and hacktivists in conducting misinformation and disinformation campaigns.
  • explain the specific methods used in these campaigns, including social media manipulation, phishing, and the use of AI-generated deepfakes.
  • identify common targets such as political processes, businesses, and social groups, and discuss the potential impacts on these targets.
  • recognize how misinformation affects political stability, economic security, and social harmony.
  • understand how misinformation can compromise individual and organizational security.
  • describe learn strategies to critically evaluate information and discern between reliable and unreliable sources.
  • explain cybersecurity practices that can help prevent the spread of misinformation and enhance national and international security.
  • describe the importance of international collaboration and information sharing in mitigating the threats posed by misinformation.
  • list developed strategies for combating misinformation and disinformation in cyberwarfare, incorporating technology, policy, and public awareness initiatives.

Summary

Hacker campaigns leveraging misinformation and disinformation have become fundamental elements of modern cyberwarfare, significantly influencing global events. These campaigns, orchestrated by both nation-states and non-state actors such as hacktivists, aim to deceive audiences, manipulate public opinion, and erode trust in institutions. Common tactics include the exploitation of social media platforms, phishing schemes, and the use of AI-generated deepfakes to disseminate false narratives. Such activities pose severe risks to political stability, economic security, and social cohesion.

Nation-states often engage in misinformation campaigns to achieve geopolitical objectives by spreading falsehoods about other nations, political figures, or events to create confusion and influence perceptions. Cyberwarfare itself involves leveraging digital tools, networks, and IT infrastructure to disrupt, damage, or gain strategic advantages over adversaries. It is not limited to governments; hacktivists and other non-state actors frequently use similar methods to further ideological agendas or incite unrest.

Targets of disinformation campaigns are varied and include elections, political systems, businesses, and cultural or ethnic groups. Hackers may aim to influence voter behavior, undermine democratic institutions, damage corporate reputations, or exacerbate societal tensions. Social media platforms serve as a powerful tool for spreading misinformation, where bots and fake accounts amplify false narratives to create the illusion of widespread support.

Phishing attacks and deepfake technology have also become critical components of disinformation campaigns. Phishing emails are used to steal sensitive information or deliver malicious content, which can then be weaponized to fabricate and spread falsehoods. Meanwhile, deepfake technology allows hackers to create convincing fake videos or audio recordings, fabricating statements or actions by individuals to further their agendas.

The impact of misinformation and disinformation is multifaceted, affecting political stability, economic resilience, and societal trust. Such campaigns can erode confidence in institutions, cause financial losses, and even provoke divisions within communities. The rapid proliferation of digital communication necessitates greater media literacy to enable individuals to critically assess the credibility of information. Furthermore, robust cybersecurity measures are essential to secure systems and prevent the dissemination of false narratives.

Addressing the challenges posed by cyberwarfare requires a comprehensive strategy that includes advancements in technology, policy development, and public awareness. International cooperation is critical to mitigating cross-border cyber threats and ensuring national and global security. As technology evolves, continued vigilance and adaptive measures are necessary to confront emerging risks and maintain stability in the face of complex cyber threats.

Key Takeaways

Click on the following key term/concept to view the definition:

Key Terms/Concepts

Click on the following key term/concept to view the definition:

Countermeasures
Cyberterrorism
Cyberwarfare
Deepfake Technology
Disinformation
Economic Security
Geopolitical Objectives
Hacktivism
Hacker Campaigns
Hacker ethic
International Cooperation
Media Literacy
Misinformation
Nation-State Actors
Non-State Actors
Political Stability
Social Media Manipulation

Read, Review, Watch and Listen

  1. Read The growing momentum of disinformation within cyber warfare (Federal News Network, August 2021)
  2. Read Why Disinformation is a Cybersecurity Threat (EU Disinfo Lab, May 2021)
  3. Read CISA’s mdm-incident-response-guide_508
  4. Read AP (2024), In global game of influence, China turns to a cheap and effective tool: fake news (DIDI TANG and DAVID KLEPPER)
  5. Review Megha Shah’s 13 Types of Hackers You Should Know – Infographic (TechFunnel, Feb. 2022)
  6. Review Summary of Terrorism Threat to the U.S. Homeland:  (Department of Homeland Security, February 2022)
  7. Watch Top 10 Infamous Anonymous Hacks  (watchmojo, June, 2020) [See below]
  8. Watch Today’s Russia On The Receiving End Of Cyber Attacks By Anonymous (March, 2022) [also embedded below]
  9. Listen to A “psychological vaccine”: Why prebunking is the best way to fight misinformation (BIG Think, Nov. 2022)
  10. Listen to NPR’s An Anarchist Explains How Hackers Could Cause Global Chaos (All Tech Considered, February 2018)
  11. Listen to A disinformation expert’s guide on combatting online abuse  (Stephano Kotsonis, April 2022)
  12. Listen to Dead Cows, Oxblood and Other Cyber Vigilantes: A History of Hacktivism (CSIS, April 2018)

 

 

Read, Review, Watch and Listen to all listed materials by the due date listed within the course LMS site.

Contact the professor with any course-related questions. Report any broken links to Dr. Ramirez-Thompson (thompsne@cod.edu).

Supplemental Resources

  • The Lonely Work of Moderating Hacker News (The New Yorker, August 2019) [last accessed, November 2023]
  • 2600 News (last accessed, November 2023)
  • Blackhat (last accessed, November 2023)
  • Center for Strategic & International Studies (CSIS) [last accessed, November 2023]
  • Cybercrime Cyberterrorism Cyberwarfare: Averting an Electronic Waterloo (CSIS, 1998 as cited in DOJ OJP, 2023) [last accessed, November 2023]
    • In 1998, this article was merely theoretical and stringently criticized by government and enforcement officials. Retrospectively, the article was visionary and a warning to both private and governmental sectors throughout the world.
  • Combating Misinformation (Meta March 2020) [last accessed, November 2023]
  • Institute for Strategic Dialogue (ISD)
    • Since 2006, ISD has been at the forefront of analyzing and responding to extremism in all its forms. Our teams of researchers, digital analysts, policy experts, frontline practitioners, technologists and activists have kept ISD’s work systematically ahead of the curve on this fast-evolving set of threats. We have innovated and scaled sector-leading policy and operational programmes – on- and offline – to push back the forces threatening democracy and cohesion around the world today.
  • Defense & Security Analysis (2022), by Andrew Dowse, Sascha Dov Bachmann, Information Warfare Methods to Counter Disinformation (posted on rand.org Sep 8, 2022).

Read, Review, Watch and Listen to all listed materials by the due date listed within the course LMS site.

Click HERE to report any needed updates, e.g., broken links.

 

definition

License

Icon for the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Computers and Criminal Justice Copyright © 2021 by Eric R. Ramirez-Thompson, PhD is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.

Share This Book