Global Security and Intelligence Studies Volume 2, Issue 1, Fall 2016 | Page 31
Anonymous Versus ISIS: The Role of Non-state Actors in Self-defense
“Hisba” has been using such technologies to counter the use of the Internet’s anonymity
in protesting the on-going brutality (March and Revkin 2015).
To accomplish the above attacks requires only moderate computer expertise
when combined with existing hacking tools available throughout the World Wide Web.
On the basis of these reports, it would be easy to conclude that ISIS does not appear
to have the required computer skills to pose a serious threat to those outside their
geographic domain. However, given this base of knowledge and the resources to recruit
and employ more sophisticated tools and people, one must not disregard the potential
for ISIS to become a clear and present danger in cyberspace. There are many anarchists,
mercenaries, and states with the skills needed to do great harm in cyberspace. Given
the condition that their interests align or worse that their ideological foundations find
common ground, the prospect of ISIS fully utilizing cyberspace to commit widespread
harm is very real. Therefore, the outstanding prevailing issues would be:
• What is the learning curve for existing ISIS supporters in the cyber domain
and how long would it be before their capacity to harm individuals and
infrastructures reaches a tipping point?
• To what degree can ISIS leverage its occupied geography to identify and
conscript those with cyber capabilities?
• What is the possibility that state actors provide training and support to
further cyber conflict?
We agree that there is significant concern over ISIS’ use of the Internet to
disseminate its mission and promote global recruitment. More importantly, as
it consolidates more and more of its regional position, it will have the ability to put
resources into accelerating its cyber capabilities. This will likely result in the recruitment
of cyber-savvy “foreign fighters” to provide the skills with which to launch large-scale
distributed attacks on infrastructures throughout the world (Radio Free Europe/Radio
Liberty 2015).
Anonymous Cyber Capabilities
Largely composed of users from numerous Internet forums and chat rooms,
Anonymous is currently the most well-known “hactivist” group. Utilizing its
“do-ocratic” membership approach to identify what it believes to be just causes,
its members employ a wide-range of attacks on a wide range of targets, from official
government websites to corporate email servers belonging to low-profile criminal
organizations, high-profile groups, and individuals. Most research suggests that the
group was first established in the mid-2000s, bringing together the first “hackers” of the
1980s with those of the twenty-first century generation (Singer and Friedman 2014, 83).
Anonymous’ anonymity and notoriety have also, paradoxically, increased its profile. The
efforts of Anonymous since 2007 to right–wrongs and to bring misdeeds to light have
evolved exponentially.
In August 2011, a group of local Mexican Anonymous hackers launched Operation
PAPERSTORM, an effort to “out” those members of the local Veracruz government that
25