Global Security and Intelligence Studies Volume 2, Issue 1, Fall 2016 | Page 33

Anonymous Versus ISIS: The Role of Non-state Actors in Self-defense combined with surveillance technology provided by Los Zetas’ stable of government, law enforcement, and military co-optees and collaborators, enabled the group to counter the threat presented by Anonymous. Known for its ruthlessness, the cartel responded by carrying out actions that would ensure the Anonymous threat would not present itself ever again. The hacktivists backed down because to follow through with their actions was not worth the potential cost in lives. Singer and Friedman (118-126) suggest that this particular incident make us think about cyber-war theory, especially the limits of state actors in dampening or preventing such conflict from escalating. Rexton Kan (41- 43) adds that cyber conflict presents a paradigm within the cyber-world and without the state. Both authors express concern about the evolving iteration of nontraditional actors in this far more asymmetric twenty-first century. For example, in 2007, the Department of Homeland Security (DHS) put together a team of “hired hackers” and conducted an experiment to destroy a large generator via cyber-attack (East et al 2009, 67–81). Four years later, the experiment, known as the “Aurora Generator Test”, was declassified and the impressive video footage released, showing how a cyber-attack could destroy a large diesel generator that was linked to a mock electricity grid. The attack, using a computer program to modify circuit breakers, was enough to see the generator self-destruct. Might the oil infrastructure that ISIS controls be vulnerable to such attacks—covert sabotage? And if the state, or state actors, for whatever reason be unable or unwilling to carry such activity, then might the likes of Anonymous be prepared to “step up to the plate?” In early February 2015, a Five-Country Ministerial Communique was released after a meeting of top government ministers from the “Five-Eyes” nations of the United States, Great Britain, Canada, Australia, and New Zealand (Five-Country Ministerial Communiqué 2015). The single emphasis of the Communique concerned the shared efforts necessary to counter the threat from violent extremism. Ministers identified the need to develop proactive strategies to address these groups and their “use of . . . internet and social media platforms” and stressed the importance of a “sustained and aggressive approach” to counter such challenges. 2 The Ministers suggested that opportunities to work with commercial companies might achieve this end. Could we add other non-state actors to this new twenty-first century coalition? History tells us that engagement like this has been done in the past and, in all likelihood, continues today. During the 1980s, as computers started to form connected networks, accessing such networks via clandestine means gave intelligence services an opportunity for further methods of penetration. An early example was the KGBsponsored German hackers who penetrated several hundred computer systems connected to the U.S. Military’s MILNET networks (Price 2014, 55). And it seems that state actors recruiting third-party experts or specialists in order to access, deny, and disrupt adversaries and national security threats have not changed. Investigations into the FBI’s use of one of Anonymous’ very own—Hector “Sabu” Monsegur, ultimately discovered that this informant and third-party hacker who had been working for the government since his arrest in 2011 was responsible for coordinating several hundred computer attacks and penetrations against Anonymous members themselves, as well 2 Five-Country Ministerial Communiqué, released February 6, 2015. 27