Hacktivism and the Future of Political Participation. A thesis presented by. Alexandra Whitney Samuel

Similar documents
Chapter 1. Introduction: Into the world of hacktivism

Chapter 3. Collective action among virtual selves: How interaction and identity shape hacktivist participation

Fluctuating Transnationalism

NATIONALISM AND THE RULE OF LAW

The Origins of the First World War

American Government & Civics - Course Practices and Skills

National Society of Black Engineers - Region III NSBE Professionals Operating Guidelines

Hacking: Rights, Hacktivism, and Counterhacking

GRADUATE CLASSES. Oskooii # 9616 F PM

Why Elections Fail. Cambridge University Press Why Elections Fail Pippa Norris Frontmatter More information

Research Thesis. Megan Fountain. The Ohio State University December 2017

ACADEMIC POSITION Yale University Postdoctoral Fellow - MacMillan Center Lecturer - Department of Political Science

Ethics of Hacktivism

grand strategy in theory and practice

Radical Democracy and the Internet

ACADEMIC POSITIONS McGill University SSHRC Postdoctoral Fellow Department of Political Science

Essays in the Development, Methodology and Policy. Prescriptions of Neoclassical Distribution Theory

The Politics of Collective Violence

Reclaiming the Rights of the Hobbesian Subject

Party Polarization: A Longitudinal Analysis of the Gender Gap in Candidate Preference

DINA BISHARA. Ten Hoor Hall, 340 Box Phone:

Introduction to the Symposium

Japanese Moratorium on the Death Penalty

AMERICAN STUDIES (AMST)

Transnational Radical Party (TRP) FILLING THE "DEMOCRATIC DIGITAL DIVIDE"

THE HISTORY OF THE NEBRASKA TAX EQUITY AND EDUCATIONAL OPPORTUNITIES SUPPORT ACT. Michael S. Dulaney A DISSERTATION. Presented to the Faculty of

Cambridge University Press Victory in War: Foundations of Modern Strategy William C. Martel Frontmatter More information

Publications 2017 The Glory of Anonymous (Work in progress)

LAURA THAUT VINSON. Lewis & Clark College. Department of International Affairs

Conference Outline: Final Draft Oct 29 th, 2004

ARTICLE I: TITLE The name of the organization shall be the Campus Activities Board (hereafter referred to as CAB).

Symbolism, rationality and myth in organizational control systems: an ethnographic case study of PBS Jakarta Indonesia

THE BRITISH COMPARATIVE LITERATURE ASSOCIATION CONSTITUTION

TRANSFORMING THINK TANKS INTO POLICY HUBS : THE CREATION OF RESEARCH POLICY NETWORKS

SECURING TRANSNATIONAL OIL: ENERGY TRANSIT STATES IN THE MALACCA STRAIT

Grounding Transnational American Studies in European and American Contexts

Asian Studies in the Age of Globalization

LOGO PROJECT. Roma-Net Inclusion of Roma Communities

Graduate School of International Studies Phone: Seoul National University 1 Gwanak-ro, Gwanak-gu, Seoul Republic of Korea

Game Studies Division International Communication Association Bylaws

Barnard College New York, NY Term Assistant Professor, Department of Political Science, July 2017

Carolyn L. Hsu, Ph D. Associate Professor of Sociology Chair, Department of Sociology and Anthropology Colgate University

Comparative and International Education Society. Awards: An Interim Report. Joel Samoff

The Right of Self-Determination of Peoples The Domestication of an Illusion

We the People: The Citizen and the Constitution

NEW ZEALAND MIGRANTS TO AUSTRALIA: SOCIAL CONSTRUCTION OF MIGRANT IDENTITY ALISON E. GREEN. Ph.D. THESIS FACULTY OF HUMANITIES AND SOCIAL SCIENCES

DOCTORAL DISSERTATION

APPROACHES TO RISK FRAMEWORKS FOR EMERGING TECHNOLOGIES) PALO ALTO, CA, MARCH 13, 2014

SPIRIT Constitution (Revised April 2011)

Contributions to Management Science

A RADICAL ALTERNATIVE? A RE-EVALUATION OF CHANTAL MOUFFE S RADICAL DEMOCRATIC APPROACH

A THEORY OF JUSTICE. Revised Edition JOHN RAWLS

Why Evaluating Estimative Accuracy is Feasible and Desirable with Richard Zeckhauser, forthcoming in Intelligence and National Security

Political Traditions and UK Politics

PPA 210: Political Environment of Policy Making Spring, 2019 OVERVIEW

What Did the 1990s Welfare Reform Accomplish? By Rebecca Blank. Comments by Hilary Hoynes, UC Davis. June 14, 2004

Terrorism Within Comparative International Context

Karen Long Jusko. Encina Hall West, Room 441, 616 Serra St., Stanford CA (650)

Democracy and Trust. Cambridge University Press Democracy and Trust Edited by Mark E. Warren Frontmatter More information

A Correlation of Prentice Hall World History Survey Edition 2014 To the New York State Social Studies Framework Grade 10

Problems in Contemporary Democratic Theory

The 2 nd Communication Management Forum 2017 international conference

VILLAGE OF CASNOVIA FREEDOM OF INFORMATION ACT PROCEDURES AND GUIDELINES (THE PROCEDURES ) I. INTRODUCTION

AREAS OF SPECIALIZATION Political sociology, methods & statistics, gender, and mass communications

IS - International Studies

I. Preamble. Patent Policy Page 1 of 13

SOUTHERN ASSOCIATION FOR COLLEGE STUDENT AFFAIRS BY-LAWS. Approved: September 2017

Carla B. Abdo-Katsipis. Wesleyan University, Middletown, CT. College of Social Studies Phone:

GRADE 3. The student demonstrates an understanding of. Therefore, the student is able to

ARTICLE I Name: Institute for Gender, Race, Sexuality, and Social Justice Research Graduate Association (GRSJ GA)

The Rise of Global Corporate Social Responsibility

Strategic Plan. APPAM Committee on Institutional Representatives. April Strategic Planning Subcommittee:

Summer School In Law & Economics 2017

Social Studies Power, Active Citizenship, and Change. Outcome 12

Constitution for the Carnegie Mellon University Role-Playing Games Association

CONSTITUTION OF THE INTERNATIONAL COUNCIL FOR PHILOSOPHICAL INQUIRY WITH CHILDREN

Agnieszka Pawlak. Determinants of entrepreneurial intentions of young people a comparative study of Poland and Finland

The Golden Pen Chapter Of The National English Honor Society

CULTURE MACHINE REVIEWS JANUARY 2014

Karen Long Jusko. September 12, 2018

LJMU Research Online

DEVELOPING OR PREVENTATIVE ECONOMIC GLOBALIZATION FOR THE ECONOMY OF THE REGION WITH SPECIAL EMPHASIS ON THE ECONOMY OF KOSOVO

The Emergence of Humanitarian Intervention

Political Science Graduate Program Class Schedule Spring 2014

Ethics in the age of Informatics, Big Data and AI

Mending Walls. A volume in International Social Studies Forum Richard A. Diem and Jeff Passe, Series Editors

Partisan Political Activity Rules for Further Restricted DoD Civilians

BYLAWS OF THE WISCONSIN LAW REVIEW

DEMOCRACY AND THE COMMON GOOD D A W S O N C O L L E G E / 1 1 / 1 3 B Y R O B E R T R O Y

The Republic of Austria and the Republic of Serbia (hereinafter referred as the two Sides ),

Christopher S. Warshaw

Nature of Policy Process Encourages Economic Underdevelopment in Africa

ACADEMIC APPOINTMENTS

Curriculum Vita. Mark A. Smith

CONSTITUTION OF THE WISCONSIN LAW REVIEW

Lisa M. George, PhD CURRENT

Still Anonymous: Guilt by association and the official story in New York Times coverage of Anonymous

Theories of Social Justice

An Act of Parliament Dated November 15, 1995 on the State Language of the Slovak Republic. as amended June 30, 2009

GOVT-GOVERNMENT (GOVT)

Transcription:

A thesis presented by Alexandra Whitney Samuel to the Department of Government in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the subject of Political Science Harvard University Cambridge, Massachusetts September 2004

2004, Alexandra Whitney Samuel All rights reserved.

iii Thesis Advisor: Prof. Sidney Verba Abstract This dissertation looks at the phenomenon of hacktivism: the marriage of political activism and computer hacking. It defines hacktivism as the nonviolent use of illegal or legally ambiguous digital tools in pursuit of political ends. These tools include web site defacements, redirects, denial-of-service attacks, information theft, web site parodies, virtual sit-ins, virtual sabotage, and software development. The dissertation uses data from fifty-one interviews in conjunction with additional primary and secondary source material. This data is used to construct a taxonomy of hacktivism, and to apply the taxonomy to three core issues in political participation. Chapter 2 presents a taxonomy of hacktivism defined by variation in hacktivist origins (in the hacker-programmer or artist-activist worlds) and orientations (transgressive or outlaw). The dissertation identifies three distinct types of hacktivism: political cracking, which consists of illegal actions like web site defacements and redirects; performative hacktivism, which consists of legally nebulous actions like virtual sit-ins and web site parodies; and political coding, which consists of political software development. The taxonomy illuminates several key questions in political participation, each examined in a different chapter. Chapter 3 focuses on the role of identity incentives in shaping political participation, and finds a strong correlation between hacktivist origins and the type of hacktivism engaged in. Chapter 4 looks at political coders strategy of

iv policy circumvention, which focuses on nullifying rather than changing a targeted law or policy. The success of this strategy depends on political entrepreneurs, low costs of failure, and high political costs of repression. Chapter 5 examines deliberative democrats suggestion that the Internet may constitute a new public sphere, friendly to democratic discourse. It suggests that variation in how hacktivists handle speech rights and anonymity challenges proceduralist visions of deliberative democracy. After reflecting on the themes that unite the dissertation, the conclusion reflects on how the post 9/11 political climate has heightened the pressure to erroneously treat hacktivism as cyberterrorism. The author hopes that the rising fortunes of political coding, which is increasingly legitimated by both governments and businesses, will ensure a continued space for hacktivism within the repertoire of political contention.

v Acknowledgements I owe a tremendous debt of gratitude to the many people who made this dissertation possible. The list begins with my very patient and supportive committee, chaired by Prof. Sidney Verba of Harvard University, and including Prof. Torben Iversen (also of Harvard) and Prof. Richard Johnston of the University of British Columbia. All three of them embraced my somewhat unusual topic with remarkable enthusiasm, and helped me shape it into a research project that could speak to political science scholars as well as Internet researchers. For his great persistence and generous comments I must also thank Prof. Peter Hall of Harvard University, whose early guidance helped me find my way to a feasible area for research. Prof. Peter Shane of Carnegie Mellon University helped shape the paper on hacktivism and deliberation that became the basis for Chapter 5 of the dissertation, and was an extremely helpful and patient editor in the course of preparing that research for publication. Prof. Chip Hauss of George Mason University helped me to find an approach to hacktivism that speaks to the larger community of citizen engagement scholarship, and offered comments on the various pieces of the dissertation that made their way into our joint research. Anthony Williams, now of the London School of Economics, was the first person to introduce me to hacktivism during our collaboration on the Governance in the Digital Economy research program. Institutional support for the dissertation was provided by the National Science Foundation, whose graduate research fellowship supported my early research into the Internet and politics. The German Academic Exchange Service (DAAD) provided

vi funding for my field research in Germany and the Netherlands, and Harvard s Center for European Studies provided earlier support for the language training that made this research possible. The Political Science Department at the University of British Columbia offered me an institutional home while I completed my dissertation on the opposite side of the continent from the department at Harvard, and provided a terrific opportunity for me to develop my work on Internet politics as a lecturer in its department. For their longstanding personal support of this project I must thank two people in particular: my husband, Rob Cottingham, and my mother, Deborah Hobson. Both of them extended themselves on every personal and financial front so that I could complete the dissertation, and both of them provided very practical support for its completion through their assistance with proofreading and (in Rob s case) web development. Finally and perhaps above all, I must thank the more than fifty men and women who very generously agreed to be interviewed for this dissertation. Their cooperation not only made the dissertation possible, but also made it hugely enjoyable, since my interactions with this group were the highlight of the entire dissertation process. The people who fall into the varied universe that I term hacktivism are an exceptionally intelligent, engaging, and dedicated bunch. It was a privilege to meet, IRC or correspond with each of them, and I only hope that my dissertation can in some way capture their remarkable contribution to politics in the digital age.

vii Table of Contents Abstract... iii Acknowledgements...v Table of Tables...ix Table of Figures...x Chapter 1 Introduction: Into the world of hacktivism...1 The phenomenon of hacktivism...7 Hacktivism and political participation...17 Investigating hacktivism: literature and methodology...22 Chapter 2 A Taxonomy of Hacktivism...36 Introduction...36 Hacktivist origins...39 The world of hacker-programmers: a very brief history of hacking...39 The world of artist-activists: an introduction to the postmodern left...44 Hacktivist orientations and types of hacktivism...48 Political cracking: an introduction...51 Performative hacktivism: an introduction...71 Political coding: an introduction...85 Transgressive hacktivism: the commonalities of political coders and performative hacktivists...97 Conclusion...100 Chapter 3 Collective action among virtual selves:...102 Introduction...102 Understanding social incentives...110 Selective incentives and political participation...110 Revising the model of selective incentives: incorporating identity...115 Social incentives for participation: testing the hypotheses...122 Identity, interaction and the phenomenon of hacktivism...122 Identity incentives: the results...134 Conclusion...146

viii Chapter 4 Hacktivism and State Autonomy: The Transnational Politics of Policy Circumvention...148 Introduction...148 Transnational politics and policy change...153 Transnational politics and policy circumvention...156 Repertoires of contention and cultural framings...160 Resource mobilization and mobilizing structures...161 Political opportunity structures...162 Policy circumvention: the case of DeCSS...165 Policy circumvention: the case of Hacktivismo...183 Conclusion...195 Chapter 5 Hacktivism and the Future of Democratic Discourse...200 Introduction...200 Envisioning digital deliberation...201 The problem of free speech...205 The problem of anonymity...214 Conclusion...223 Chapter 6 Conclusion: The Future of Hacktivism...227 Introduction...227 Hacktivism and theory building...228 Identity and collective political action...228 Policy circumvention and policy change...230 Deliberative democracy, free speech, and anonymity...234 Hacktivism: reviewing the evidence...237 Illuminating the taxonomy...237 Hacktivism as civil disobedience...239 The future of hacktivism...242

ix Table of Tables Table 1: Different activist repertoires: some examples...6 Table 2: A chronology of hacktivist incidents by issue area...16 Table 3: Interview subjects by country of residence...31 Table 4: The dissertation in crosstabs...35 Table 5. Types of hacktivism by hacktivist origins and orientation...36 Table 6. Characteristics of hacktivist orientations (transgressive vs. outlaw)...37 Table 7: Types of hacktivism, summarized by characteristics...101 Table 8. Types vs. forms of hacktivism...123 Table 9. Relationship between background and type of hacktivism...136 Table 10: Policy circumvention vs. law-breaking...158

x Table of Figures Figure 1. The boundaries of hacktivism....4 Figure 2. Stills from WFD Flash Movie "truth9.swf"...60 Figure 3. Screen capture of February 2001 web site defacement by WFD (part 1)....61 Figure 4. Screen capture of February 2001 web site defacement by WFD (part 2)....62 Figure 5. WFD site defacement, December 2000...65 Figure 6. WFD attacks by month and top level domain...66 Figure 7. WFD site defacement, January 2001...68 Figure 8. Ricardo Dominguez in performance...80 Figure 9. The Floodnet Interface...84 Figure 10. An example of the cdc's distinctive visual identity...89 Figure 11. The Hacktivismo logo...92 Figure 12. A demonstration of Camera/Shy....95 Figure 13: etoys share price...149