The Syrian Electronic Army – a hacktivist group

DOIhttps://doi.org/10.1108/JICES-12-2015-0042
Published date09 May 2016
Pages200-212
Date09 May 2016
AuthorMatthew Warren,Shona Leitch
Subject MatterInformation & knowledge management,Information management & governance,Information & communications technology
The Syrian Electronic
Army – a hacktivist group
Matthew Warren
Deakin University Centre for Cyber Security Research, Deakin University,
Melbourne, Australia, and
Shona Leitch
College of Business, RMIT University, Melbourne, Australia
Abstract
Purpose – The aim of the paper is to assess the hacktivist group called the Syrian Electronic Army and
determine what their motivations in terms of ethical and poetical motivations.
Design/methodology/approach – This paper looks at chronological examples of Syrian Electronic
Army activities and assess them using a developed hacktivist criteria to try and gain a greater
understanding of the motivations of the Syrian Electronic Army. The paper uses a netnography
research approach.
Findings – This paper determines that the Syrian Electronic Army is motivated to protect the Syrian
Government. This protection is highlighted by the new media and social media organisations that the
Syrian Electronic Army attacks online.
Research limitations/implications – This paper focuses only on one group the Syrian Electronic
Army.
Practical implications – A greater understanding of the Syrian Electronic Army.
Social implications – A greater understanding of the development of hacktivism.
Originality/value – A unique study into the motivation of the Syrian Electronic Army.
Keywords Ethics, Netnography, Hacking, Socio-politics
Paper type Research paper
Introduction
We have seen a rise in computer misuse at a global level; In many cases “Hackers” have
been found responsible for these attacks[1]. Hackers are often characterised as
adolescent males in dark bedrooms that can cause damage to global information
technology systems through using their computers and computer skills. A more
romantic perception portrays hackers as being determined cyber knights, who use
personal codes of conduct to live by and are reminiscent of the great Arthurian knights
(Warren and Hutchinson, 2003). Moreover, “hacker” is what computer intruders choose
to call themselves, not as a criminal pejorative, but as a noble title given to those “soaked
through with heroic anti-bureaucratic sentiment” (Sterling, 1993). Hacking then, can
describe the determination to make access to computers and information as free as
possible. Hacking can involve the heartfelt conviction that beauty can be found in
computers, that the ne aesthetic in a perfect program can liberate the mind and the
spirit (Levy, 1984).
Contrasting this romantic perception is the way Sterling (1993) portrays “Hacking” in
his book titled The Hacker Crackdown.InSterling’s (1993) book, “Hacking” is described
The current issue and full text archive of this journal is available on Emerald Insight at:
www.emeraldinsight.com/1477-996X.htm
JICES
14,2
200
Received 15 December 2015
Accepted 10 March 2016
Journalof Information,
Communicationand Ethics in
Society
Vol.14 No. 2, 2016
pp.200-212
©Emerald Group Publishing Limited
1477-996X
DOI 10.1108/JICES-12-2015-0042

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT