Exploring the Subculture of Ideologically Motivated Cyber-Attackers

@article{Holt2017ExploringTS,
  title={Exploring the Subculture of Ideologically Motivated Cyber-Attackers},
  author={Thomas J. Holt and Joshua D. Freilich and Steven M. Chermak},
  journal={Journal of Contemporary Criminal Justice},
  year={2017},
  volume={33},
  pages={212 - 233}
}
Research on physical, that is, violent, terror attacks and extremism has increased dramatically over the last decade. The growth of the Internet and computer technology has also led to concern over the use of cyberattacks by ideologically motivated offenders to cause harm and further their political and social agendas. There is, however, a lack of empirical research on cyber-attackers limiting our knowledge of the factors that affect their behavior. This study addresses this empirical gap… 

Examining Ideologically Motivated Cyberattacks Performed by Far-Left Groups

ABSTRACT Over the last two decades, there has been a massive increase in research examining terror and extremist-related violence. Few have considered the extent to which these same groups may engage

Interviewing Cybercrime Offenders

Research on cybercrime offending and victimization has increased dramatically over the past two decades, though qualitative scholarship on more technical offenses such as computer misuse has not kept

Examining the Use of Interviews in Cybercrime Research

Research on cybercrime offending and victimization has increased dramatically over the past two decades, though qualitative scholarship on more technical offenses such as computer misuse have not

An Exploratory Analysis of the Characteristics of Ideologically Motivated Cyberattacks

ABSTRACT Web defacement is a form of hacking that involves altering the content of a website, resulting in repairs to the website code, loss of revenue, internal loss of productivity, and

Perceived formal and informal sanctions on the willingness to commit cyber attacks against domestic and foreign targets

ABSTRACT Scholars have expressed concerns over the effectiveness of formal sanctions in deterring cybercrime, particularly regarding computer intrusions and cyber attacks. Little empirical research,

The Dynamics of Business, Cybersecurity and Cyber-Victimization: Foregrounding the Internal Guardian in Prevention

Analysis of the UK Cybersecurity Breaches Survey shows that the most promising ways to minimize cyber-attacks and their impacts is to invest in in-house cybersecurity human resources and enhance the employees’ online self-protection by providing cybersecurity training, rather than just basic software protection and guidance about strong passwords.

An Ethical Framework for Hacking Operations

An ethical framework can be used to both justify and condemn hacking depending on the circumstances, allowing those on the outside to distil and evaluate a political hack, both past and present, while guiding hacker collectives by providing clearer ethical tools for determining the appropriate agendas and methods.

Loners, Colleagues, or Peers? Assessing the Social Organization of Radicalization

This study explores the utility of a sociological model of social organization developed by Best and Luckenbill (1994) to classify the radicalization processes of terrorists (i.e., extremist

Explaining Why Cybercrime Occurs: Criminological and Psychological Theories

Several criminological and psychological theories and their empirical support for explaining cybercrime are reviewed. Social learning theory, self-control theory, and subcultural theories have

Do Hacker Groups Pose a Risk to Organizations? Study on Financial Institutions Targeted by Hacktivists

On average, hacking campaigns raise the target institutions’ deep web and dark web exposure by 62 percent per year during the first two years after the campaigns’ start date.

References

SHOWING 1-10 OF 79 REFERENCES

Hackers: Crime in the Digital Sublime

Hackers reveals that extreme conciliation and antagonism from the computer industry toward hackers creates potentially dangerous outcomes and argues that a new middle way must be found if the authors are to make the most of society's high-tech meddlers.

Examining Willingness to Attack Critical Infrastructure Online and Offline

The continuing adoption of technologies by the general public coupled with the expanding reliance of critical infrastructures connected through the Internet has created unique opportunities for

The Hidden Face of Jihadist Internet Forum Management: The Case of Ansar Al Mujahideen

ABSTRACT This article offers a descriptive analysis of the private interactions which took place on the jihadist Internet forum known as Ansar Al Mujahideen between 2008 and 2010. The analysis of the

Exploring the Correlates of Individual Willingness to Engage in Ideologically Motivated Cyberattacks

ABSTRACT In the last few years, there has been an increase in the use of Web defacements, where individuals post political or ideological messages on websites in place of the original content. There

Hacktivism and Cyberwars: Rebels with a Cause?

This text provides a detailed history of hacktivism's evolution from early hacking culture to its present day status as the radical face of online politics.

A Sociology of Hackers

This article outlines this community to establish the nature of hacking within ‘information societies’ and rejects any pathologisation of hackers.

Cybercrime: Vandalizing the Information Society

It is concluded that cybercrime is an inevitable downside of the information society, and that organizations and individuals consequently have a stake in ensuring their own protection.

Exploring the Intersections of Technology, Crime, and Terror

The various definitions for physical and cyberterror and the ways that these activities intersect with cybercrime are examined and the uses of computer hacking tools and malware are explored to better understand the relationship between cybercrime and terror.

Social Dynamics and the Future of Technology-Driven Crime

The future of cybercrime and cyber terrorism is not likely to follow some monotonic, simple deterministic path. The complex interplay of technology and social forces, as demonstrated in the previous

Radicalization into Violent Extremism I: A Review of Social Science Theories

In discourse about countering terrorism, the term "radicalization" is widely used, but remains poorly defined. To focus narrowly on ideological radicalization risks implying that radical beliefs are
...