Anonymous and Security Agencies: Bedfellows for Good Against ISIS?

For centuries, there has been conflict over the freedom of expression. Sovereigns, tyrants, and governments alike have sought to deny individuals the right to express their thoughts, beliefs and political affiliations. Such rights and their expression continue to be highly contested not least in terms of the current global terrorist threat. Simply put one man’s terrorist is another’s freedom fighter. 

This conflict between the rights of freedom of speech and expression and extremism has resulted in the ‘hacktivist’ group Anonymous declaring an internet-mediated ‘war’ against ISIS for seeking to limit the freedom of expression of others – a belief that sits at the very heart of the on-line community.

This web-enabled conflict has seen Anonymous research and then publish the background and links of the leader of ISIS, to them attacking ISIS web-sites. We have now seen them identify a large number of social media sites operated by ISIS, as part of #OpISIS, no doubt in the expectation that companies such as Twitter would remove them, thereby limiting ISIS’s ability to publicise and promote their terrorist activities.

To see the extent of this on-line conflict is noteworthy not least because of the seeming willingness of Anonymous to seek the support and engagement of agencies and corporations who they have in the past been so willing to expose and embarrass, not least over issues such as their lax cyber-security.

How such corporations and agencies respond to having this new ally in the conflict with ISIS has yet to be fully seen but in the internet war over the freedom of expression we may yet find Anonymous attracting some rather strange bedfellows.

 Dr Martin Wright

Academic Director at Global Institute of Cyber, Intelligence & Security (GICIS) 

« Hackers Extort S. Korea for Data on Nuclear Plants
Despite Snowden Leaks, Internet use is Largely Unchanged »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Hack Miami

Hack Miami

HackMiami is the premier resource in South Florida for highly skilled hackers that specialize in vulnerability analysis, penetration testing, digital forensics, and all manner of IT security.

Patchstack

Patchstack

Patchstack (formerly WebARX) is a web application security platform, which allows digital agencies and developers to monitor, protect and maintain their websites.

Secardeo

Secardeo

Secardeo is a provider of corporate solutions using digital signatures and certificates. Our solutions enable the user transparent end-to-end encryption of e-mails between organizations.

CommuniTake

CommuniTake

CommuniTake builds security, enablement, and management solutions to provide people and organizations with better, and more secure mobile device use.

Citalid

Citalid

The Citalid cyber risk management platform combines threat and business intelligence to identify the risks scenarios you face.

Nucleus Security

Nucleus Security

Nucleus is a leading Vulnerability Management platform for Large Enterprises, MSPs/MSSPs, and Application Security Teams that want more from their vulnerability management tools.

eXate

eXate

eXate provides pioneering technology that empowers organisations to protect, control and manage their sensitive data centrally, providing a complete data privacy solution.

Cyphra

Cyphra

Cyphra’s team provide cyber security consulting, technical and managed services expertise and experience to support your organisation.

evolutionQ

evolutionQ

evolutionQ delivers quantum-risk management strategies and robust cybersecurity tools designed to be safe in an era with quantum computing technologies.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Sure Valley Ventures

Sure Valley Ventures

Sure Valley Ventures is an entrepreneur led venture capital fund focused on helping software entrepreneurs grow and scale businesses that will have a global impact.

Unciphered

Unciphered

Unciphered was created as the first company providing services for opening locked hardware cryptocurrency wallets.

Cyber Octet

Cyber Octet

Cyber Octet is an IT Solution, Security, Training and Services company. We provide training and services from Web Application Security to ISO 27001 implementation.

Acclaim Technical Services (ATS)

Acclaim Technical Services (ATS)

ATS provide operational products, services and solutions to the defense and intelligence communities for all types of critical mission needs.

Resmo

Resmo

Resmo is an all in one platform for SaaS app and access management for modern IT teams.

Operational Systems (OpSys)

Operational Systems (OpSys)

OpSys is a leading Managed IT and Cyber Security provider protecting the critical elements of businesses across the globe.