close
close

Fire for fire: How to use choptivists leaks, doxing and more

Authors:

(1) Filipo Sharevski, Depaul University;

(2) Benjamin Kessell, Depaul University.

Summary and introduction

2 Internet activism and social media

2.1 Hashtag -Aktivism

2.2 Hacktivism

3 Internet activism and misinformation

3.1 Basic feasting operations

3.2 Mainstream -Fehlinformation operations

4 Hacktivism and misinformation

4.1 Research questions and 4.2 sample

4.3 Methods and instrumentation

4.4 Profiles of the hacktivists

5 Conceptualization of misinformation and 5.1 Prerequisites for misinformation

5.2 Mental models of the misinformation

6 Active fight against misinformation and 6.1 and through

6.2 Anti-mission information “Ops”

7 misinformation development and 7.1 Countermissinformation tactics

7.2 Maline formation competence

7.3 Maline formation Hacktivism

8 discussion

8.1 Implications

8.2 Ethical considerations

8.3 Restrictions and 8.4 Future work

9 Conclusion and references

6 Active fight against misinformation

Literature on misinformation focuses on helping the social media user [68] Or “Debunking”, i.e. the users verifiable corrections of the falsehoods from credible sources to break the illusion of the truth [30, 93]. An algorithmic is also available for the mainstream social media platforms (the alternatives do not contain any misinformation as a problem [107]) This uses natural language processing, image analysis or metadata to recognize trolling and memes [50,51,122]. Platforms also have the option for the algorithmic “soft” moderation by covering either trolling and memes with warnings or attaching warnings [108, 125] and “hard” moderation when removing or suspending misinformer accounts [63]. None of these solutions, however troll businesses and Meme burners are effective. So we wanted to know what hacktivists had to suggest in the second research question instead.

6.1 leaks, doxing and deplat forming

The exposure of user accounts by social media platforms due to violation of your code of conduct is called “departure -forming”. [1]. In the context of hacktivism, it takes a border as hacktivists do investigative work that contains the delicacies and doxal, but are also confronted with the misinformers who, according to their subjective perspective, violate the vision of the democratic internet. For example, hacktivists have a massive API scrap of the old platform parler [94]Which in turn led to a massive account that is deplated on Twitter [15]. These activities spank operations to confront and uncover the Qanon configurators on social media (e.g. @Qanonanonymous [22]), under which some of our hacktivists play a direct role “Development of the Qanon infrastructure” [P2].

The decaying goals aim at political misinformation campaigns in which our hacktivists “Put together and leaked dossiers to people who spread hateful propaganda, and those who try to sow the seeds of violence” [P1] on social media. These operations were both targeted “Individual spreader, nation states and even companies with cloudy records” [P2]. Several mentioned their direct operations to uncover disinformation compared to that “Ukrainian conflict” [P5]To worth the work of the Ukrainian IT Army outfit to dispel the myth [23]. Hacktivists were hired “Doxing companies and government agencies in response to political interference in the US interior matters from places such as Russia, Iran and China” [P8]. Misinformation “Approved by the governments” Hackled in experiments to cover outstanding “Disinformation agents on social media such as Irina Tsukerman, for example” [P3].

Lecks and doxing were used equally for misinformation beyond the political meter (argumentation) and the external propaganda. One of the hacktivists devoted a lot of time to uncover cryptocurrency fraudsters on social media and elsewhere and to consider the feeling as “better than sex”, which they consider to be “better than sex” to consider them. [P5]. Another was focused on longing personal details about predators on social media that spread misinformation in order to cover their sexual harassment and cyberstalking towards women. “Open both their sock doll contains and their real names on Twitter” [P3]. Another has pushed back against criminal misinformation by doing “bullies, liars and fraudsters”, [P20] and one “Anti-Cancel culture in minors” Hacktivist noticed that they “Successfully decorated large participants in hate campaigns and stalking of minors” on social media [P5].

6.2 Anti-mission information “Ops”

The hacktivists in our sample have dealt with misinformation saturation ops “Fighting misinformation with further information.” One of the hacktivists stated that it is “Expected from the hacktivist community, to combat misinformation in this way” And noticed that “it is the only reason that they maintain a Twitter account”. [P3]. Another was lowered this attitude in which he found “It is frustrating to see misinformation from others and other creators, but that's the main reason why I continue to post on Tiktok.” [P17]. In the words of P2Present “There are more ideological aspects when I fight against disinformation.” to call the mission of the true hacktivists directly to become reflexive “Loud and determined” To speak to real information in response to those “General species box of the misinformation on the Internet” [P9].

Participation in Operation #nafo (North Atlantic Fellas Organization), which oppose the opposite Russian propaganda and disinformation in Ukraine through weapon memes [103]Our participants materialized a combination of saturation and doxing “Limit the ability of the misinformers to win fenders” [P1]. They expanded their work to counteract “Extremists and fascists and their toxic conspiracy theories” [P1] By disturbing their financing and making prominent supporters, loyal to the spirit of the hacktivist counterculture of the “Antifa” [131]. Similarly, one of the hacktivists announced that they “In the #opjane surgery contributed strongly” [P10]. #Opjane is the latest operation that Anonymous launched against Texas to issue the anti-abbreviation calculation 8 that allows it to “Abortion bounty” For everyone who will examine and report an abortion in the state of Texas [38]. Interestingly, Anonymous calls for the operation ”:”Combating misinformation with sufficient plausible and difficult to refute misinformation “ To create data that these bounty hunters gather as useless [5].

Leave a Comment