Anonymous and Security Agencies: Bedfellows for Good Against ISIS?

For centuries, there has been conflict over the freedom of expression. Sovereigns, tyrants, and governments alike have sought to deny individuals the right to express their thoughts, beliefs and political affiliations. Such rights and their expression continue to be highly contested not least in terms of the current global terrorist threat. Simply put one man’s terrorist is another’s freedom fighter. 

This conflict between the rights of freedom of speech and expression and extremism has resulted in the ‘hacktivist’ group Anonymous declaring an internet-mediated ‘war’ against ISIS for seeking to limit the freedom of expression of others – a belief that sits at the very heart of the on-line community.

This web-enabled conflict has seen Anonymous research and then publish the background and links of the leader of ISIS, to them attacking ISIS web-sites. We have now seen them identify a large number of social media sites operated by ISIS, as part of #OpISIS, no doubt in the expectation that companies such as Twitter would remove them, thereby limiting ISIS’s ability to publicise and promote their terrorist activities.

To see the extent of this on-line conflict is noteworthy not least because of the seeming willingness of Anonymous to seek the support and engagement of agencies and corporations who they have in the past been so willing to expose and embarrass, not least over issues such as their lax cyber-security.

How such corporations and agencies respond to having this new ally in the conflict with ISIS has yet to be fully seen but in the internet war over the freedom of expression we may yet find Anonymous attracting some rather strange bedfellows.

 Dr Martin Wright

Academic Director at Global Institute of Cyber, Intelligence & Security (GICIS) 

« Hackers Extort S. Korea for Data on Nuclear Plants
Despite Snowden Leaks, Internet use is Largely Unchanged »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

QA Systems

QA Systems

QA Systems provides software testing solutions for safety and business critical sectors and software safety and security standards.

Cognizant

Cognizant

Cognizant offer services and solutions for IT Infrastructure Security, Enterprise Mobility and Internet of Things.

Ammune.ai

Ammune.ai

Ammune.ai (formerly L7 Defense) helps organizations to protect their infrastructure, applications, customers, employees, and partners against the growing risk of API-borne attacks.

Engineering Group

Engineering Group

Engineering is the Digital Transformation Company, a leader in Italy and with over 80 offices across Europe, the United States, and South America.

Grimm Cyber

Grimm Cyber

GRIMM makes the world a more secure place by increasing the cyber resiliency of our client’s systems, networks, and products.

Information Network Security Agency (INSA) - Ethiopia

Information Network Security Agency (INSA) - Ethiopia

INSA's vision is to realize a globally competent National Cyber capability which plays a key role in protecting the national interests of Ethiopia.

NEC

NEC

NEC offers a complete array of solutions to governments and enterprises to protect themselves from the threats of digital disruption.

Optiv

Optiv

Optiv is a market-leading provider of end-to-end cyber security solutions. We help clients plan, build and run successful cyber security programs that achieve business objectives.

H3C Group

H3C Group

H3C provides a full range of Computer, Storage, Networking and Security solutions.

Cybertonica

Cybertonica

Cybertonica is a FinTech company which detects and prevents fraudulent transactions and reduces risk for financial services organisations.

Argo Group

Argo Group

Argo is an international underwriter of specialty insurance. Argo Cyber offers a full spectrum of coverage solutions related to professional and technology services.

TierPoint

TierPoint

TierPoint delivers secure, reliable, and connected infrastructure solutions at the internet’s edge. We meet you where you are in your journey to solve for data storage, compute, and recovery.

Berezha Security Group (BSG)

Berezha Security Group (BSG)

BSG is a cybersecurity consulting firm specializing in all aspects of application security and penetration testing.

X Technologies

X Technologies

X Technologies provide world-class engineering, information technology, information security, program management and repair services to Federal, State and commercial customers.

Trace3

Trace3

Trace3 is a pioneer in business transformation solutions, empowering organizations to keep pace with the rapid changes in IT innovations and maximize organizational health.

Cyber Defense International (CDI)

Cyber Defense International (CDI)

At CDI, we utilize decades of experience in designing and building large-scale cybersecurity programs, creating tailored solutions and services that protect businesses from cyber threats.