Global Security and Intelligence Studies Volume 2, Issue 1, Fall 2016 | Page 32
Global Security and Intelligence Studies
the “hacktivists” knew were in collusion with the Los Zetas narco-traffickers. Following
the murder of an internet blogger by Los Zetas in another Mexican state, Anonymous
launched a DDOS attack against websites linked to the state government of Veracruz
in protest of the “soft-response” from local officials, but also threatened to publish a
vast archive of emails detailing the corrupt relationships between the cartel and various
network partners online. In response, Los Zetas hired cyber-experts to help “reverse
hack” Anonymous in order to identify some of its members. One such hacktivist was
ultimately identified, kidnapped, and threatened with execution. This real Mexican
“stand-off ” was resolved when Anonymous agreed not to release the material, and in
exchange, the kidnap victim was freed with an accompanying warning from Los Zetas
that they would kill 10 people for every name Anonymous should subsequently chose
to publicize (Singer and Friedman, 84–86 and Rexton Kan 2013, 40). Paul Rexton
Kan, who wrote extensively of the exchange, described the stalemate as one of “. . . two
clandestine non-state groups [who] stared each other down in the digital domain” (40).
More importantly, he highlights the different benefits and values non-state actors see in
the Internet and the information age:
The members of Anonymous see cyberspace as a type of commons that should be
accessible to all…. Los Zetas, on the other hand, do not view cyberspace through an
ideological lens but through an operational lens
With the Anonymous–Los Zetas “stand-off ” firmly in mind, we turn to the
question of how vulnerable might Anonymous see itself—real or perceived—because
of ISIS’ very existence? Anonymous has a number of options that it might use in a
nonviolent or nonkinetic manner, in order to defend the Anonymous “state”. Anonymous
published a “Declaration of War” because ISIS strikes at the very heart of what those in
Anonymous believe in; that of freedom of expression and freedom of speech (Makuch
2014 and Chen 2014). While the conflict continues to progress and evolve, perhaps the
real issues to be considered are as follows:
• Can Anonymous maintain this nonviolent approach (denial of service,
release of information, etc.) and how far could they go?
• How effective could Anonymous be and is this the way forward?
• Should states embrace such action from nonviolent non-state actors,
encourage such activity even, or is it opening up a “Pandora’s box” of
interpretations, debates on thresholds?
• What constitutes an “enemy,” control of resources, or are we far too early
into this “battle in the cyber domain” construct for us to get anywhere
near beginning to understand what we are dealing with now?
Escalation Options: How Far Can Anonymous Go?
Largely as a result of the incident with Anonymous, Los Zetas embarked on a greater
effort to increase their cyber capabilities by recruiting and coercing computer
engineers and university students to assist with their cyber-crime efforts. This,
26