Hacktivism: the Perfect Recruitment Tool for Terrorist Organizations
The Art of Intrusion
by hacker and security researcher Kevin Mitnicktells the story of two boys who were taken advantage of by a man known as Khalid theTerrorist. Two young hackers, known as ne0h and Comrade, were approached in ahacker hangout on Internet Relay Chat (IRC) by a man who challenged the boys tobreak into government and defense computers. After all, being able to hack into thosesystems was considered a holy grail. The terrorist used two simple tactics, one of whichwill work on most hackers. Rather than threatening the boys, Khalid challenged their skills and made them feel that they had to prove they could hack into these systems. Helater used bribery as well. The information given to Khalid by ne0h and Comrade issuspected to be some of the information that was used to plan the Taliban hijacking of Indian Airlines flight IC-814. The boys did not truly realize they were aiding a terroristuntil after the fact (Mitnick & Simon, 2005). So, as you see, it would not be so far fetched that a terrorist group such as Hamas would use Anonymous/LulzSec as a frontto recruit support or to entice young hackers to commit acts that would promote aterrorist cause.
Criminological Theories That Explain the Hacker’s Potential For Recruitment
Looking back to criminology, the effectiveness of using social media and a“hacktivist” movement to recruit supporters or perhaps operatives makes sense.Individuals commit digital crimes for many different reasons. Although not all hackersare criminals, criminological theories perhaps best explain the factors that contribute toa hacker’s vulnerabilities and, in turn, the potential ways in which an organized crime