Abstracts
Résumé
Depuis 2008, Anonymous, un groupe hacktiviste décentralisé et inclusif, a lancé des centaines de campagnes singulières, éphémères et similaires, ciblant principalement les infrastructures en ligne des gouvernements et privilégiant certains types de cyberattaques (Coleman, 2020 ; Steinmetz, 2022). En raison de la normalisation de la sélection des cibles et des cyberattaques, nous avons utilisé la théorie de l’association différentielle pour comprendre si l’association entre pairs facilite le processus d’apprentissage des nouveaux membres d’Anonymous (appelé « Anons ») au cours d’une campagne de piratage. Les données proviennent de conversations sur des forums IRC (« internet relay chats ») durant le Printemps Érable de 2012 au Québec, où Anonymous a piraté différents sites web gouvernementaux. Les résultats indiquent que les techniques de piratage constantes sont dues à l’utilisation de ressources d’apprentissage préétablies, qui assurent l’apprentissage de techniques et de motivations similaires. Les pairs dans ces forums encourageant les nouveaux Anons à pirater le gouvernement en associant une moralité à certaines cibles jugées légitimes et à affiner leurs compétences individuelles, tout en inculquant des valeurs normatives définissant les cibles légitimes et illégitimes. Ces novices sont encouragés à renforcer leur approbation de ces comportements en promouvant les actes d’Anonymous sur les médias sociaux. Cet environnement en ligne peut transformer des novices en pirates compétents, augmentant le potentiel de futures campagnes.
Mots-clés :
- Cybercriminalité,
- Désobéissance numérique,
- Apprentissage en ligne,
- Communautés virtuelles,
- Sous-cultures hacktivistes
Abstract
Since 2008, the decentralized and inclusive hacktivist group Anonymous has launched hundreds of stand-alone campaigns, primarily targeting government using certain hacking techniques (Coleman, 2020; Steinmetz, 2022). Due to the standardization of both target selection and types of cyberattacks, we used Differential Association theory to understand whether peer association facilitates the learning process of new Anonymous members (known as "Anons") during a hacking campaign. The data derives from IRC conversations during the 2012 Maple Spring Protests, where Anons hacked the Québec provincial government. A thematic content analysis suggests that Anonymous’ consistency stems from the use of pre-established resources that ensure all participants learn similar techniques and motivations that can be applied across all campaigns. Congruent with the tenents of Differential Association theory, our results indicate that peers in the chats sustained the learning process of newcomers, not only transmitting technical skills but also inculcating values and definitions that distinguish legitimate from illegitimate targets. Newcomers are also encouraged to reinforce their approval of such behaviors by promoting Anonymous’ hacks on social media. Together, this online environment can transform novices into proficient hackers, increasing the potential for future campaigns.
Keywords:
- Cybercrime,
- digital disobedience,
- online activism,
- virtual communities,
- hacktivist subcultures
Appendices
Bibliographie
- Anderson, N. (2012, 4 mai). Literally the day he was arrested, hacker “Sabu” helped the FBI [Nouvelles]. Ars Technica. https://arstechnica.com/tech-policy/news/2012/05/literally-the-day-of-his-arrest-hacker-sabu-helped-the-fbi.ars
- Babko-Malaya, O., Cathey, R., Hinton, S., Maimon, D., et Gladkova, T. (2017). Detection of hacking behaviors and communication patterns on social media. Big Data, 4636–4641.
- Bardeau, F., et Danet, N. (2011). Anonymous: Pirates informatiques ou altermondialistes numériques? : Peuvent-ils changer le monde ? Éditions FYP.
- Bégin-Caouette, O., et Jones, G. A. (2014). Student organizations in Canada and Quebec’s ‘Maple Spring.’ Studies in Higher Education, 39(3), 412–425. https://doi.org/10.1080/03075079.2014.896178
- Beraldo, D. (2022). Unfolding #Anonymous on Twitter: The networks behind the mask. First Monday, 27(1), n.p. https://dx.doi.org/10.5210/fm.v27i1.11723
- Bergeron, A., Delle Donne, J., et Fortin, F. (2019). Une publication pour dénoncer, sans plus: description des activités des groupes Facebook s’identifiant au mouvement Anonymous au Canada. La criminologie de l’information : état des lieux et perspectives, 52(2), 35–62. http://doi.org/10.7202/1065855ar
- Bodó, B. (2014). Hacktivism 1-2-3: How privacy enhancing technologies change the face of Anonymous hacktivism. Internet Policy Review, 3(4), 1–13.
- Caldwell, T. (2015). Hacktivism goes hardcore. Network Security, 5, 12–17. https://doi.org/10.1016/S1353-4858(15)30039-8
- Campisi, F. (2019). From the streets to the tweets: Social network analysis of Canadian street gang members and their use of Twitter, Facebook and YouTube [Thèse de Maîtrise, L’université Queens]. https://www.proquest.com/docview/2371722209?pq-origsite=gscholar&fromopenview=true
- CBC News. (2012, 20 avril). Violent Montreal student protest nets 17 arrests [Nouvelles]. CBC. https://www.cbc.ca/news/canada/montreal/violent-montreal-student-protest-nets-17-arrests-1.1139959
- Chen, X., et Wang, H. (2019). Automated chat transcript analysis using topic modeling for library reference services. Proceedings of the Association for Information Science and Technology, 56, 368–371.
- Coleman, E. G. (2020). Logics and legacy of Anonymous. Dans J. Hunsinger, M. Allen, et M. Klastrup (éds.), Second international handbook of internet research. Springer.
- Coleman, G. (2014). Hacker, hoaxer, whistleblower, spy: The many faces of Anonymous. Verso.
- Daudens, F. (2012, 21 mai). Les Anonymous piratent plusieurs sites du gouvernement du Québec | Blogue des chroniques Sur le web | Radio-Canada.ca [Blog]. Radio Canada.ca. https://web.archive.org/web/20130822085752/http://blogues.radio-canada.ca/surleweb/2012/05/21/anonymous-operation-quebec/
- de la Hamaide, S. (2015, 14 novembre). Timeline of Paris attacks according to public prosecutor [Nouvelles]. Reuters. https://www.reuters.com/article/us-france-shooting-timeline-idUSKCN0T31BS20151114
- Décary-Hétu, D. (2014). Information exchange paths in IRC hacking chatrooms. Dans Crime and networks (pp. 218–230). Routledge.
- Décary-Hétu, D., et Leppänen, A. (2013). Criminals and signals: An assessment of criminal performance in the carding underworld. Security Journal, 29(3), 442–460.
- Dobusch, L., et Schoeneborn, D. (2015). Fluidity, identity, and organizationality: The communicative constitution of Anonymous. Journal of Management Studies, 52(8), 1005–1035. https://doi.org/10.1111/joms.12139
- Fortin, F., Campisi, F. C., et Néron, M.-È. (2022). Hacktivism from the inside: Collective identity, target selection and tactical use of media during the Québec maple spring protests. Rivista Di Criminologia, Vittimologia e Sicureza, 16(1), 35–56. https://doi.org/10.14664/rcvs/242
- Gagnon, A. (2018). Extending social learning theory to explain victimization among gang and ex-gang offenders. International Journal of Offender Therapy and Comparative Criminology, 62(13), 4124–4141. https://doi.org/10.1177/0306624X18763761
- George, J. J., et Leidner, D. E. (2019). From clicktivism to hacktivism: Understanding digital activism. Information and Organization, 29(3), 1–45. https://doi.org/10.1016/j.infoandorg.2019.04.001
- Géring, Z. (2021). Mixed methodological discourse analysis. Dans A. J. Onwuegbuzie et R. B. Johnson (éds.), The Routledge reviewer’s guide to mixed methods analysis (pp. 161–172). Routledge.
- Guiton, A. (2013). Pirates: au coeur de la resistance numérique. Éditions Au diable Vauvert.
- Gunkel, D. J. (2005). Editorial: Introduction to hacking and hacktivism. New Media & Society, 7(5), 595–597. https://doi.org/10.1177/1461444805056007
- Hollewell, G. F., et Longpré, N. (2022). Radicalization in the social media era: Understanding the relationship between self-radicalization and the Internet. International Journal of Offender Therapy and Comparative Criminology, 66(8), 896–913. https://doi.org/10.1177/0306624X211028771
- Jones, K., Nurse, J. R. C., et Li, S. (2020). Behind the mask: A computational study of Anonymous’ presence on Twitter. Proceedings of the Fourteenth International AAAI Conference on Web and Social Media (ICWSM 2020), 14, 327–338.
- Jul, C. (2013, 30 juillet). Hacktivism & Anonymous [Blog]. Calum Stuart. http://calumstuart.com/hacktivism-anonymous/
- Kelly, B. B. (2012). Investing in a centralized cybersecurity infrastructure: Why hacktivism can and should influence cybersecurity reform note. Boston University Law Review, 92(5), 1663–1712. https://heinonline.org/HOL/P?h=hein.journals/bulr92&i=1685
- Kenney, M. (2015). Cyber-terrorism in a Post-Stuxnet world. Orbis, 59, 111–128. https://doi.org/10.1016/j.orbis.2014.11.009
- Klein, A. G. (2015). Vigilante media: Unveiling Anonymous and the hacktivist persona in the global press. Communication Monographs, 82(3), 379–401.
- Laninga-Wijnen, L., et Veenstra, R. (2021). Peer similarity in adolescent social networks: Types of selection and influence, and factors contributing to openness to peer influence. Dans B. Halpern-Felsher (éd.), The encyclopedia of child and adolescent health (pp. 2–39). Elsevier.
- Laursen, B., et Veenstra, R. (2021). Toward understanding the functions of peer influence: A summary and synthesis of recent empirical research. Journal of Research on Adolescence, 31(4), 889–907. https://doi.org/10.1111/jora.12606
- Léger, M. J. (2019). Vanguardia: Socially engaged art and theory. Manchester University Press.
- Levesque, C. (2012, 20 mai). Grève étudiante: un vidéo d’Anonymous dénonce la loi 78 et lance l’opération Québec [Nouvelles]. HuffPost Québec. https://quebec.huffingtonpost.ca/2012/05/20/anonymous-operation-quebec_n_1531489.html
- Levin, R., Richardson, J., Warner, G., et Kerley, K. (2012). Explaining cybercrime through the lens of differential association theory, Hadidi44-2.php PayPal Case Study. eCrime Research Summit, 1–7. https://doi.org/10.1109/eCrime.2012.6489518
- Li, X. (2013). Hacktivism and the first amendment: Drawing the line between cyber protests and crime. Harvard Journal of Law & Technology, 27(1), 302–329. https://heinonline.org/HOL/Page?handle=hein.journals/hjlt27&div=10&g_sent=1&casa_token=lBHXqKfp3kAAAAAA:OEsXVx62wbMXVHDCOZihtTqFYcv5-Oj5AKSE_-14MUcnXxVf5lGKnerbMEpUi16eyagEq4wr&collection=journals
- Machado, M. B. (2015). Between control and hacker activism: The political actions of Anonymous Brazil. Historia, Ciencias, Saude--Manguinhos, 22, 1531–1549. http://dx.doi.org/10.1590/S0104-59702015000500002
- Mansfield-Devine, S. (2011). Anonymous: Serious threat or mere Annoyance? Network Security, 1, 4–10. https://doi.org/10.1016/S1353-4858(11)70004-6
- Marcum, C. D., Higgins, G. E., Ricketts, M. L., et Wolfe, S. E. (2014). Hacking in high school: Cybercrime perpetration by juveniles. Deviant Behavior, 35(7), 581–591. https://doi.org/10.1080/01639625.2013.867721
- McGovern, V., et Fortin, F. (2019). The Anonymous collective: Operations and gender differences. Women & Criminal Justice, 30(2), 1–15. https://doi.org/10.1080/08974454.2019.1582454
- Molloy, D., et Tidy, J. (2020, 1 juin). George Floyd: Anonymous hackers re-emerge amid US unrest. BBC News. https://www.bbc.com/news/technology-52879000
- Morris, R. (2011). Computer hacking and the techniques of neutralization: An empirical assessment. Dans Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications, IGI Global, 1–17. https://doi.org/10.4018/978-1-61692-805-6.ch001
- Morris, R. G., et Blackburn, A. G. (2009). Cracking the code: An empirical exploration of social learning theory and computer crime. Journal of Crime and Justice, 32(1), 1–34. https://doi.org/10.1080/0735648X.2009.9721260
- Morris, R. G., et Higgins, G. E. (2010). Criminological theory in the digital age: The case of social learning theory and digital piracy. Journal of Criminal Justice, 38(4), 470–480. https://doi.org/10.1016/j.jcrimjus.2010.04.016
- Morselli, C., Tremblay, P., et Mccarthy, B. (2006). Mentors and criminal achievement*. Criminology, 44(1), 17–43. https://doi.org/10.1111/j.1745-9125.2006.00041.x
- Olsen, P. (2012). We are Anonymous: Inside the hacker world of LulzSec, Anonymous, and the global cyber insurgency. Back Bay Books.
- Purtill, J. (2022, 24 février). Anonymous takes down Kremlin, Russian-controlled media site in cyber attacks [Nouvelles]. ABC News. https://www.abc.net.au/news/science/2022-02-25/hacker-collective-anonymous-declares-cyber-war-against-russia/100861160
- Raynauld, V., Lalancette, M., et Tourigny-Koné, S. (2016). Political protest 2.0: Social media and the 2012 student strike in the province of Quebec, Canada. French Politics, 14(1), 1–29. https://doi.org/10.1057/fp.2015.22
- Renzi, A. (2015). Info-capitalism and resistance: How information shapes social movements. Interface: A Journal for and about Social Movements, 7(2), 98–119.
- Schrock, A. R. (2016). Civic hacking as data activism and advocacy: A history from publicity to open government data. New Media & Society, 18(4), 581–599. https://doi.org/10.1177/1461444816629469
- Steinmetz, K. F. (2022). Hacking and hacktivism. Dans R. Atkinson et T. Ayres (éds.), Shades of Deviance: A Primer on Crime, Deviance and Social Harm (2e éditon.). Taylor & Francis.
- Sutherland, E. H., Cressey, D. R., et Luckenbill, D. F. (1992). Principles of criminology. Rowman & Littlefield Publishers.
- Warr, M., et Stafford, M. (1991). The influence of delinquent peers: What they think or what they do?*. Criminology, 29(4), 851–866. https://doi.org/10.1111/j.1745-9125.1991.tb01090.x

