Hacktivism and dis/misinformation campaigns

Module 14 examines topics, such as hacktivism, terrorism, espionage, dis/misinformation campaigns, and warfare in cyberspace, as well as national and international perspectives and responses to these cyber activities. The purpose of this Module is to discuss these topics and identify current debates and conflicting views on these topics within and between countries.

Learning Objectives

After completing this module, you should be able to:

  • Examine hacktivism, cyberespionage, cyberterrorism, cyberwarfare, information warfare, and dis/misinformation
  • Discuss and analyses the legal frameworks governing these activities
  • Assess the lawfulness of responses to hacktivist activities
  • Propose lawful responses to some of hacktivist and disinformation activities

Summary

Hacker campaigns involving misinformation and disinformation are a concerning aspect of cyberwarfare, as they can have significant real-world consequences. Misinformation refers to false or misleading information, while disinformation is the intentional spread of false information with the aim of deceiving or manipulating people. These tactics are often used in a coordinated manner to achieve specific goals, such as sowing discord, influencing public opinion, or undermining the credibility of individuals, organizations, or even entire nations.

Nation-states may engage in misinformation and disinformation campaigns to advance their geopolitical objectives. This can involve spreading false information about other nations, political figures, or events to create confusion and manipulate perceptions.

Cyberwarfare refers to the use of digital tactics and technologies to conduct warfare in the cyberspace domain. It involves the use of computer systems, networks, and information technology infrastructure to launch attacks against an adversary, with the aim of causing damage, disruption, or gaining a strategic advantage. Cyberwarfare can be conducted by nation-states, state-sponsored groups, hacktivists, and other malicious actors.

Non-State Actors: Hacktivist groups or other non-state actors may use misinformation campaigns to promote their ideological agenda or to create social and political unrest. Elections and political processes are frequent targets of misinformation campaigns. Hackers may attempt to influence voter opinions, manipulate election outcomes, or undermine trust in democratic institutions. Businesses and corporations may be targeted to damage their reputation, affect stock prices, or gain a competitive advantage. Cultural, religious, or ethnic groups can be targeted to exacerbate existing tensions or provoke conflicts.

Methods of engaging in dis/misinformation campaigns include, but are not limited to social media manipulation, phishing attacks, deepfakes, etc.

Misinformation campaigns often leverage social media platforms to rapidly spread false information. Bots and fake accounts may be used to amplify certain narratives and create the illusion of widespread support.

Hackers may use phishing emails to deliver malicious content or to trick individuals into sharing sensitive information, which can then be used to create and spread false narratives.

The use of AI-generated deepfake technology allows for the creation of convincing fake videos or audio recordings, making it appear as though individuals are saying or doing things they never did.

The impact of dis/misinformation is not fully understood. However, there are some obvious political, economic, and security related effects. Misinformation campaigns can contribute to political instability by eroding trust in institutions, spreading rumors, and creating divisions within societies. Disinformation targeting businesses can lead to financial losses, damage to brand reputation, and a loss of customer trust. False information can also be used to manipulate individuals or organizations into taking actions that compromise their security, such as revealing sensitive information or falling victim to cyberattacks.

The ubiquitous nature of digital communication and related systems requires that end-users become increasing sophisticated and know how to both identify and/or authenticate digital resources. Promoting media literacy can help individuals critically evaluate information and discern between reliable and unreliable sources. Enhanced Cybersecurity Measures: Improved cybersecurity practices can help prevent hacking incidents and the spread of misinformation through secure channels. Cybersecurity efforts and information sharing between nations are crucial for identifying and mitigating cross-border threats.

Addressing the challenges posed by hacker campaigns of misinformation and disinformation requires a multifaceted approach involving technology, policy, and public awareness initiatives. As technology continues to evolve, staying vigilant and adaptive to emerging threats is essential in the ongoing battle against cyberwarfare.

Cyberwarfare is an evolving and complex field with significant implications for national security, international relations, and the privacy and safety of individuals. As technology continues to advance, addressing the challenges posed by cyber threats requires ongoing collaboration, innovation, and the development of robust defense strategies at both the national and international levels.

Key Terms/Concepts

Cyberterrorism
Cyberwarfare
Disinformation
Hacktivism
Hacker ethic
Misinformation

Read, Review, Watch and Listen

  1. Read The growing momentum of disinformation within cyber warfare (Federal News Network, August 2021)
  2. Read Why Disinformation is a Cybersecurity Threat (EU Disinfo Lab, May 2021)
  3. Read CISA’s Mis-, Dis-, and Malinformation (MDM) team’s disinformation_stops_with_you_infographic_set_508 Info. Graph
  4. Review Megha Shah’s 13 Types of Hackers You Should Know – Infographic (TechFunnel, Feb. 2022)
  5. Review Summary of Terrorism Threat to the U.S. Homeland:  (Department of Homeland Security, February 2022)
  6. Watch Top 10 Infamous Anonymous Hacks  (watchmojo, June, 2020) [See below]
  7. Watch Today’s Russia On The Receiving End Of Cyber Attacks By Anonymous (March, 2022) [also embedded below]
  8. Listen to A “psychological vaccine”: Why prebunking is the best way to fight misinformation (BIG Think, Nov. 2022)
  9. Listen to NPR’s An Anarchist Explains How Hackers Could Cause Global Chaos (All Tech Considered, February 2018)
  10. Listen to A disinformation expert’s guide on combatting online abuse  (Stephano Kotsonis, April 2022)
  11. Listen to Dead Cows, Oxblood and Other Cyber Vigilantes: A History of Hacktivism (CSIS, April 2018)

 

 

Read, Review, Watch and Listen to all listed materials by the due date listed within the course LMS site.

Contact the professor with any course-related questions. Report any broken links to Dr. Ramirez-Thompson (thompsne@cod.edu).

Supplemental Resources

What should I accomplish by the end of Weeks 14 & 15?

Check items off as you complete them!

Week 15

□ Read, Review, Watch, and Listen (Module 14): https://cod.pressbooks.pub/crimj1165/chapter/hacktivism-and-disinformation-campaigns/

□ Complete Module 14 Quiz

□ Continue working on term paper; due Sunday, December 3 @ 11:59PM

□ Explore Module 14 resources

Unless otherwise stated, everything listed on this checklist is due by Sunday, December 3 @ 11:59PM

 

definition

License

Icon for the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Computers and Criminal Justice Copyright © 2021 by Eric R. Ramirez-Thompson, PhD is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.

Share This Book