Hack-and-leak operations: intrusion and influence in the Gulf
James Shires
Journal of Cyber Policy, 2019, vol. 4, issue 2, 235-256
Abstract:
Events such as the leaking of hacked emails from the US Democratic National Committee before the 2016 presidential election sit between two paradigms of cybersecurity. The first paradigm focuses on intrusion (unauthorised access to networks), while the second concentrates on influence (the use of digital technologies to shift public debate). Analyses generally tackle one of these two aspects: cybersecurity specialists focus on intrusion, setting aside the complexities of the digital public sphere, while media scholars do the opposite, closely analysing flows of leaked information without considering how it was obtained. This article instead argues for conceptualising hack-and-leak operations (HLOs) as a distinct category, through a close analysis of a crucial HLO that has been overlooked by the cybersecurity literature: the release of documents from the Saudi Ministry of Foreign Affairs by the ‘Yemen Cyber Army’. It proposes a tripartite framework for understanding the impact of HLOs as mechanisms of delegitimization, based on their technical characteristics, social and political context and target audiences. The article suggests that the Yemen Cyber Army incident could have been an experiment for the same Russian actors who carried out the DNC operation, allowing them to hone their tactics prior to the US elections.
Date: 2019
References: Add references at CitEc
Citations:
Downloads: (external link)
http://hdl.handle.net/10.1080/23738871.2019.1636108 (text/html)
Access to full text is restricted to subscribers.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:taf:rcybxx:v:4:y:2019:i:2:p:235-256
Ordering information: This journal article can be ordered from
http://www.tandfonline.com/pricing/journal/rcyb20
DOI: 10.1080/23738871.2019.1636108
Access Statistics for this article
Journal of Cyber Policy is currently edited by Emily Taylor
More articles in Journal of Cyber Policy from Taylor & Francis Journals
Bibliographic data for series maintained by Chris Longhurst ().