Global Security and Intelligence Studies Volume 2, Issue 1, Fall 2016 | Page 34

Global Security and Intelligence Studies as websites operated by the governments of Iran, Syria, Brazil, and Pakistan (Mazzetti 2014). 3 In an opinion piece in ForeignPolicy.com in early March 2015, commentator Emerson Brooking (2015) suggested that the very people who should be charged with countering ISIS, “dispersed, rapidly regenerative online presence,” should be digital natives themselves. Brooking considered that Anonymous was perfect for the job, and should be supported with resources to do so, including paying those individuals with the online currency “Bitcoin.” He added “As a rule, hacktivists despise bullying, hypocrisy, and fundamentalism. The Islamic State couldn’t present a clearer target.” The prevailing concern is the means by which non-state actors such as Anonymous might be co-opted into serving national and international interests to do what state actors cannot or would not do. Coercion or monetary incentives are probably to go against the social tenets that Anonymous’ member espouse and may have serious future sustainability consequences for the group. In an interview with a member of the Anonymous collective known as “Nix,” who also provides legal support for those being prosecuted for hacking, the authors were told that “one of the main attractions to being a part of Anonymous is a sense of empowerment to right wrongs.” 4 Having turncoats or hired guns greatly diminishes this sense of shared social activism. If we return to Anonymous’ first principles, it is their unrelenting moral stance on issues and rights and its ability to disclose massive amounts of information on associations and activities that has propagated its renown. Thus, Nix added “In response to Anonymous’ disclosures that directly benefit society, perhaps a Cyber Samaritan Law would benefit a nation state’s efforts to limit wrongful prosecutions” (2015). Such a law would limit an activist’s liability; allow government deniability; conserve judicial resources; and provide better targeted prosecutions. Could state actors embrace such a direction? Conclusions In his article, Brooking (2015) mentions that engaging in such activity, or sanctioning the recruitment of hacktivists like Anonymous, would challenge what we would consider to be the “international norms.” But things have changed. Surely these rules are not necessarily applicable in the non-state actor realm? Can we embark on a new set of rules that takes us back before Westphalia, to the days when Indian strategic thinker Kautilya first introduced the “Mandala theory” of state security—“the enemy of my enemy is my friend”(Rangarajan 1992)? Rexton Kan concludes that the Anonymous versus Los Zetas “stand-off ” was not anticipated and suggests that cyber-conflict and the future of cyber-warfare is only limited by the human imagination. At some stage, he adds, it is likely to transition from online embarrassment and discomfort, to off-line and real—death and destruction. Clearly should such novel methods be utilized by nonstate actors, they must be met with equally creative policies and strategies from security agencies. 3 Monsegur had been partly responsible for the penetration and theft of information belonging to the Texas-based Stratfor Global Intelligence provider. Interestingly, neither Monsegur, nor any of the Anonymous felons was charged with cyber-attacks on any of these foreign websites. 4 Nix interview conducted with authors on April 12, 2015. 28