Anonymous (group)

This article is about a group of activists. For other uses, see Anonymous (disambiguation).


An emblem commonly associated with Anonymous. The "man without a head" represents leaderless organization and anonymity.[1]

Individuals appearing in public as Anonymous, wearing Guy Fawkes masks
Formation c.2004
Region served
Decentralized affinity group

Anonymous is a loosely associated international network of activist and hacktivist entities. A website nominally associated with the group describes it as "an Internet gathering" with "a very loose and decentralized command structure that operates on ideas rather than directives".[2] The group became known for a series of well-publicized publicity stunts and distributed denial-of-service (DDoS) attacks on government, religious, and corporate websites.[3]

Anonymous originated in 2003 on the imageboard 4chan, representing the concept of many online and offline community users simultaneously existing as an anarchic, digitized global brain.[4][5][6] Anonymous members (known as "Anons") can be distinguished in public by the wearing of Guy Fawkes masks in the style portrayed in the graphic novel and film V for Vendetta.[7]

In its early form, the concept was adopted by a decentralized online community acting anonymously in a coordinated manner, usually toward a loosely self-agreed goal, and primarily focused on entertainment, or "lulz". Beginning with 2008's Project Chanology—a series of protests, pranks, and hacks targeting the Church of Scientology—the Anonymous collective became increasingly associated with collaborative hacktivism on a number of issues internationally. Individuals claiming to align themselves with Anonymous undertook protests and other actions (including direct action) in retaliation against copyright-focused campaigns by motion picture and recording industry trade associations. Later targets of Anonymous hacktivism included government agencies of the U.S., Israel, Tunisia, Uganda, and others; the Islamic State of Iraq and the Levant; child pornography sites; copyright protection agencies; the Westboro Baptist Church; and corporations such as PayPal, MasterCard, Visa, and Sony. Anons have publicly supported WikiLeaks and the Occupy movement. Related groups LulzSec and Operation AntiSec carried out cyberattacks on U.S. government agencies, media, video game companies, military contractors, military personnel, and police officers, resulting in the attention of law enforcement to the groups' activities. Some actions by members of the group have been described as being anti-Zionist. It has threatened to cyber-attack Israel and engaged in the "#OpIsrael" cyber-attacks of Israeli websites on Yom HaShoah (Holocaust Remembrance Day) in 2013.[8]

Dozens of people have been arrested for involvement in Anonymous cyberattacks, in countries including the U.S., UK, Australia, the Netherlands, Spain, India and Turkey. Evaluations of the group's actions and effectiveness vary widely. Supporters have called the group "freedom fighters"[9] and digital Robin Hoods[10] while critics have described them as "a cyber lynch-mob"[11] or "cyber terrorists".[12] In 2012, Time called Anonymous one of the "100 most influential people" in the world.[13]


Anonymous has no strictly defined philosophy, and internal dissent is a regular feature of the group.[2] A website associated with the group describes it as "an Internet gathering" with "a very loose and decentralized command structure that operates on ideas rather than directives".[2] Gabriella Coleman writes of the group, "In some ways, it may be impossible to gauge the intent and motive of thousands of participants, many of who don't even bother to leave a trace of their thoughts, motivations, and reactions. Among those that do, opinions vary considerably."[14]

Broadly speaking, Anons oppose Internet censorship and control, and the majority of their actions target governments, organizations, and corporations that they accuse of censorship. Anons were early supporters of the global Occupy movement and the Arab Spring.[15] Since 2008, a frequent subject of disagreement within Anonymous is whether members should focus on pranking and entertainment or more serious (and, in some cases, political) activism.[16]

We [Anonymous] just happen to be a group of people on the Internet who need—just kind of an outlet to do as we wish, that we wouldn't be able to do in regular society. ...That's more or less the point of it. Do as you wish. ... There's a common phrase: 'we are doing it for the lulz.'
Trent Peacock. Search Engine: The face of Anonymous, February 7, 2008.[17]

Because Anonymous has no leadership, no action can be attributed to the membership as a whole. Parmy Olson and others have criticized media coverage that presents the group as well-organized or homogeneous; Olson writes, "There was no single leader pulling the levers, but a few organizational minds that sometimes pooled together to start planning a stunt."[18] Some members protest using legal means, while others employ illegal measures such as DDoS attacks and hacking.[19] Membership is open to anyone who wishes to state they are a member of the collective;[20] British journalist Carole Cadwalladr of The Observer compared the group's decentralized structure to that of al-Qaeda: "If you believe in Anonymous, and call yourself Anonymous, you are Anonymous."[21] Olson, who formerly described Anonymous as a "brand", stated in 2012 that she now characterized it as a "movement" rather than a group: "anyone can be part of it. It is a crowd of people, a nebulous crowd of people, working together and doing things together for various purposes."[22]

The group's few rules include not disclosing one's identity, not talking about the group, and not attacking media.[23] Members commonly use the tagline "We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us."[24] Brian Kelly writes that three of the group's key characteristics are "(1) an unrelenting moral stance on issues and rights, regardless of direct provocation; (2) a physical presence that accompanies online hacking activity; and (3) a distinctive brand."[25]

Journalists have commented that Anonymous' secrecy, fabrications, and media awareness pose an unusual challenge for reporting on the group's actions and motivations.[26][27] Quinn Norton of Wired writes that "Anons lie when they have no reason to lie. They weave vast fabrications as a form of performance. Then they tell the truth at unexpected and unfortunate times, sometimes destroying themselves in the process. They are unpredictable."[26] Norton states that the difficulties in reporting on the group cause most writers, including herself, to focus on the "small groups of hackers who stole the limelight from a legion, defied their values, and crashed violently into the law" rather than "Anonymous’s sea of voices, all experimenting with new ways of being in the world".[26]


4chan raids (2003–2007)

Main article: 4chan
KTTV Fox 11 investigative report on Anonymous. The report focused on what were then contemporary instances of Internet bullying by Anonymous.[28]

The name Anonymous itself is inspired by the perceived anonymity under which users post images and comments on the Internet. Usage of the term Anonymous in the sense of a shared identity began on imageboards, particularly the /b/ board of 4chan, dedicated to random content. A tag of Anonymous is assigned to visitors who leave comments without identifying the originator of the posted content. Users of imageboards sometimes jokingly acted as if Anonymous was a single individual. The concept of the Anonymous entity advanced in 2004 when an administrator on the 4chan image board activated a "Forced_Anon" protocol that signed all posts as Anonymous.[29] As the popularity of imageboards increased, the idea of Anonymous as a collective of unnamed individuals became an Internet meme.[30]

Users of 4chan's /b/ board would occasionally join into mass pranks or raids. In a raid on July 12, 2006, for example, large numbers of 4chan readers invaded the Finnish social networking site Habbo Hotel with identical avatars; the avatars blocked regular Habbo members from accessing the digital hotel's pool, stating it was "closed due to fail and AIDS".[31] Future LulzSec member Topiary became involved with the site at this time, inviting large audiences to listen to his prank phone calls via Skype.[32][lower-alpha 1] Due to the growing traffic on 4chan's boards, users soon began to plot pranks offline using Internet Relay Chat (IRC).[34] These raids resulted in the first mainstream press story on Anonymous, a report by Fox station KTTV in Los Angeles, California in the U.S. The report called the group "hackers on steroids", "domestic terrorists", and an "Internet hate machine".[28][35]

Encyclopedia Dramatica (2004–present)

Encyclopedia Dramatica was founded in 2004 by Sherrod DiGrippo, initially as a means of documenting gossip related to livejournal, but it quickly was adopted as a major platform by Anonymous for satirical and other purposes.[36] The not safe for work site celebrates a subversive "trolling culture", and documents Internet memes, culture, and events, such as mass pranks, trolling events, "raids", large-scale failures of Internet security, and criticism of Internet communities that are accused of self-censorship in order to gain prestige or positive coverage from traditional and established media outlets. Journalist Julian Dibbell described Encyclopædia Dramatica as the site "where the vast parallel universe of Anonymous in-jokes, catchphrases, and obsessions is lovingly annotated, and you will discover an elaborate trolling culture: Flamingly racist and misogynist content lurks throughout, all of it calculated to offend."[36] The site also played a role in the anti-Scientology campaign of Project Chanology.[37]

On April 14, 2011, the original URL of the site was redirected to a new website named Oh Internet that bore little resemblance to Encyclopedia Dramatica. Parts of the ED community harshly criticized the changes.[38] In response, Anonymous launched "Operation Save ED" to rescue and restore the site's content.[39] The Web Ecology Project made a downloadable archive of former Encyclopedia Dramatica content.[40][41] The site's reincarnation was initially hosted at on servers owned by Ryan Cleary, who later was arrested in relation to attacks by LulzSec against Sony.

Project Chanology (2008)

Main article: Project Chanology
"Message to Scientology", January 21, 2008

Anonymous first became associated with hacktivism[lower-alpha 2] in 2008 following a series of actions against the Church of Scientology known as Project Chanology. On January 15, 2008, the gossip blog Gawker posted a video in which celebrity Scientologist Tom Cruise praised the religion;[42] and the Church responded with a cease-and-desist letter for violation of copyright.[43] 4chan users organized a raid against the Church in retaliation, prank-calling its hotline, sending black faxes designed to waste ink cartridges, and launching DDoS attacks against its websites.[44][45]

The DDoS attacks were at first carried out with the Gigaloader and JMeter applications. Within a few days, these were supplanted by the Low Orbit Ion Cannon (LOIC), a network stress-testing application allowing users to flood a server with TCP or UDP packets. The LOIC soon became a signature weapon in the Anonymous arsenal; however, it would also lead to a number of arrests of less experienced Anons who failed to conceal their IP addresses.[46] Some operators in Anonymous IRC channels incorrectly told or lied to new volunteers that using the LOIC carried no legal risk.[47][48]

Protesters outside a Scientology center on February 10, 2008

During the DDoS attacks, a group of Anons uploaded a YouTube video in which a robotic voice speaks on behalf of Anonymous, telling the "leaders of Scientology" that "For the good of your followers, for the good of mankind—for the laughs—we shall expel you from the Internet."[49][50] Within ten days, the video had attracted hundreds of thousands of views.[50]

On February 10, thousands of Anonymous joined simultaneous protests at Church of Scientology facilities around the world.[51] Many protesters wore the stylized Guy Fawkes masks popularized by the graphic novel and film V for Vendetta, in which an anarchist revolutionary battles a totalitarian government; the masks soon became a popular symbol for Anonymous.[52] In-person protests against the Church continued throughout the year, including "Operation Party Hard" on March 15 and "Operation Reconnect" on April 12.[53][54][55] However, by mid-year, they were drawing far fewer protesters, and many of the organizers in IRC channels had begun to drift away from the project.[56]

Operation Payback (2010)

By the start of 2009, Scientologists had stopped engaging with protesters and had improved online security, and actions against the group had largely ceased. A period of infighting followed between the politically engaged members (called "moralfags" in the parlance of 4chan) and those seeking to provoke for entertainment (trolls).[57] By September 2010, the group had received little publicity for a year and faced a corresponding drop in member interest; its raids diminished greatly in size and moved largely off of IRC channels, organizing again from the chan boards, particularly /b/.[58]

In September 2010, however, Anons became aware of Aiplex Software, an Indian software company that contracted with film studios to launch DDoS attacks on websites used by copyright infringers, such as The Pirate Bay.[59][58] Coordinating through IRC, Anons launched a DDoS attack on September 17 that shut down Aiplex's website for a day. Primarily using LOIC, the group then targeted the Recording Industry Association of America (RIAA) and the Motion Picture Association of America (MPAA), successfully bringing down both sites.[60] On September 19, future LulzSec member Mustafa Al-Bassam (known as "Tflow") and other Anons hacked the website of Copyright Alliance, an anti-infringement group, and posted the name of the operation: "Payback Is A Bitch", or "Operation Payback" for short.[61] Anons also issued a press release, stating:

Anonymous is tired of corporate interests controlling the internet and silencing the people’s rights to spread information, but more importantly, the right to SHARE with one another. The RIAA and the MPAA feign to aid the artists and their cause; yet they do no such thing. In their eyes is not hope, only dollar signs. Anonymous will not stand this any longer.[62]

As IRC network operators were beginning to shut down networks involved in DDoS attacks, Anons organized a group of servers to host an independent IRC network, titled AnonOps.[63] Operation Payback's targets rapidly expanded to include the British law firm ACS:Law,[64] the Australian Federation Against Copyright Theft,[65] the British nightclub Ministry of Sound,[66] the Spanish copyright society Sociedad General de Autores y Editores,[67] the U.S. Copyright Office,[68] and the website of Gene Simmons of Kiss.[69] By October 7, 2010, total downtime for all websites attacked during Operation Payback was 537.55 hours.[69]

In November 2010, the organization WikiLeaks began releasing hundreds of thousands of leaked U.S. diplomatic cables. In the face of legal threats against the organization by the U.S. government, booted WikiLeaks from its servers, and PayPal, MasterCard, and Visa cut off service to the organization.[70] Operation Payback then expanded to include "Operation Avenge Assange", and Anons issued a press release declaring PayPal a target.[71] Launching DDoS attacks with the LOIC, Anons quickly brought down the websites of the PayPal blog; PostFinance, a Swiss financial company denying service to WikiLeaks; EveryDNS, a web-hosting company that had also denied service; and the website of U.S. Senator Joe Lieberman, who had supported the push to cut off services.[72]

On December 8, Anons launched an attack against PayPal's main site. According to Topiary, who was in the command channel during the attack, the LOIC proved ineffective, and Anons were forced to rely on the botnets of two hackers for the attack, marshaling hijacked computers for a concentrated assault.[73] Security researcher Sean-Paul Correll also reported that the "zombie computers" of involuntary botnets had provided 90% of the attack.[74] Topiary states that he and other Anons then "lied a bit to the press to give it that sense of abundance", exaggerating the role of the grassroots membership. However, this account was disputed.[75]

The attacks brought down for an hour on December 8 and another brief period on December 9.[76] Anonymous also disrupted the sites for Visa and MasterCard on December 8.[77] Anons had announced an intention to bring down as well, but failed to do so, allegedly because of infighting with the hackers who controlled the botnets.[78] PayPal estimated the damage to have cost the company US$5.5 million. It later provided the IP addresses of 1,000 of its attackers to the FBI, leading to at least 14 arrests.[79] On Thursday, December 5, 2013, 13 of the PayPal 14 pleaded guilty to taking part in the attacks.[80]


A member holding an Anonymous flier at Occupy Wall Street, a protest that the group actively supported, September 17, 2011

In the years following Operation Payback, targets of Anonymous protests, hacks, and DDoS attacks continued to diversify. Beginning in January 2011, Anons took a number of actions known initially as Operation Tunisia in support of Arab Spring movements. Tflow created a script that Tunisians could use to protect their web browsers from government surveillance, while fellow future LulzSec member Hector Xavier Monsegur (alias "Sabu") and others allegedly hijacked servers from a London web-hosting company to launch a DDoS attack on Tunisian government websites, taking them offline. Sabu also used a Tunisian volunteer's computer to hack the website of Prime Minister Mohamed Ghannouchi, replacing it with a message from Anonymous.[81] Anons also helped Tunisian dissidents share videos online about the uprising.[82] In Operation Egypt, Anons collaborated with the activist group Telecomix to help dissidents access government-censored websites.[82] Sabu and Topiary went on to participate in attacks on government websites in Bahrain, Egypt, Libya, Jordan, and Zimbabwe.[83]

Tflow, Sabu, Topiary, and Ryan Ackroyd (known as "Kayla") collaborated in February 2011 on a cyber-attack against Aaron Barr, CEO of the computer security firm HBGary Federal, in retaliation for his research on Anonymous and his threat to expose members of the group. Using a SQL injection weakness, the four hacked the HBGary site, used Barr's captured password to vandalize his Twitter feed with racist messages, and released an enormous cache of HBGary's e-mails in a torrent file on Pirate Bay.[84] The e-mails stated that Barr and HBGary had proposed to Bank of America a plan to discredit WikiLeaks in retaliation for a planned leak of Bank of America documents,[85] and the leak caused substantial public relations harm to the firm as well as leading one U.S. congressman to call for a congressional investigation.[86] Barr resigned as CEO before the end of the month.[87]

Several attacks by Anons have targeted organizations accused of homophobia. In February 2011, an open letter was published on threatening the Westboro Baptist Church, an organization based in Kansas in the U.S. known for picketing funerals with signs reading "God Hates Fags".[88] During a live radio current affairs program in which Topiary debated church member Shirley Phelps-Roper, Anons hacked one of the organization's websites.[89] After the church announced its intentions in December 2012 to picket the funerals of the Sandy Hook Elementary School shooting victims, Anons published the names, phone numbers, and e-mail and home addresses of church members and brought down with a DDoS attack.[90] Hacktivists also circulated petitions to have the church's tax-exempt status investigated.[91] In August 2012, Anons hacked the site of Ugandan Prime Minister Amama Mbabazi in retaliation for the Parliament of Uganda's consideration of an anti-homosexuality law permitting capital punishment.[92]

In April 2011, Anons launched a series of attacks against Sony in retaliation for trying to stop hacks of the PlayStation 3 game console. More than 100 million Sony accounts were compromised, and the Sony services Qriocity and PlayStation Network were taken down for a month apiece by cyberattacks.[93]

Anonymous protestors at the Brussels Stock Exchange, Belgium, January 2012

When the Occupy Wall Street protests began in New York City in September 2011, Anons were early participants and helped spread the movement to other cities such as Boston.[15] In October, some Anons attacked the website of the New York Stock Exchange while other Anons publicly opposed the action via Twitter.[94] Some Anons also helped organize an Occupy protest outside the London Stock Exchange on May 1, 2012.[95]

Anons launched Operation Darknet in October 2011, targeting websites hosting child pornography. In particular, the group hacked a child pornography site called "Lolita City" hosted by Freedom Hosting, releasing 1,589 usernames from the site. Anons also said that they had disabled forty image-swapping pedophile websites that employed the anonymity network Tor.[96] In 2012, Anons leaked the names of users of a suspected child pornography site in OpDarknetV2.[97] Anonymous launched the #OpPedoChat campaign on Twitter in 2012 as a continuation of Operation Darknet. In attempt to eliminate child pornography from the internet, the group posted the emails and IP addresses of suspected pedophiles on the online forum PasteBin.[98][99]

In 2011, the Koch Industries website was attacked following their attack upon union members, resulting in their website being made inaccessible for 15 minutes. In 2013, one member, a 38-year-old truck driver, pleaded guilty when accused of participating in the attack for a period of one minute, and received a sentence of two years federal probation, and ordered to pay $183,000 restitution, the amount Koch stated they paid a consultancy organisation, despite this being only a denial of service attack.[100]

On January 19, 2012, the U.S. Department of Justice shut down the file-sharing site Megaupload on allegations of copyright infringement. Anons responded with a wave of DDoS attacks on U.S. government and copyright organizations, shutting down the sites for the RIAA, MPAA, Broadcast Music, Inc., and the FBI.[101]

In 2012, Anonymous launched Operation Anti-Bully: Operation Hunt Hunter in retaliation to Hunter Moore's revenge porn site, "Is Anyone Up?" Anonymous crashed Moore's servers and publicized much of his personal information online, including his social security number. The organization also published the personal information of Andrew Myers, the proprietor of "Is Anyone Back", a copycat site of Mr. Moore's "Is Anyone Up?"[102]

In response to Operation Pillar of Defense, a November 2012 Israeli military operation in the Gaza Strip, Anons took down hundreds of Israeli websites with DDoS attacks.[103] Anons pledged another "massive cyberassault" against Israel in April 2013 in retaliation for its actions in Gaza, promising to "wipe Israel off the map of the Internet".[104] However, its DDoS attacks caused only temporary disruptions, leading cyberwarfare experts to suggest that the group had been unable to recruit or hire botnet operators for the attack.[105][106]


Million Mask March

Main article: Million Mask March

On 5 November 2013, Anonymous protesters gathered around the world for the Million Mask March. Demonstrations were held in 400 cities around the world to coincide with Guy Fawkes Night.[107]


Operation Oklahoma was a Mutual Aid effort responding to the 2013 flash floods and wind storms in the United States.

Operation Safe Winter

Operation Safe Winter was an effort to raise awareness about homelessness through the collection, collation, and redistribution of resources. This program began on 7 November 2013[108] after an online call to action from Anonymous UK. Three missions using a charity framework were suggested in the original global spawning a variety of direct actions from used clothing drives to pitch in community potlucks feeding events in the UK, U.S. and Turkey.[109]

The #OpSafeWinter call to action quickly spread through the Mutual Aid communities like Occupy Wall Street[110] and its offshoot groups like the open-source-based OccuWeather.[111] With the addition of the long-term mutual aid communities of New York City and online hacktivists in the U.S., it took on an additional three suggested missions.[112] Encouraging participation from the general public, this Operation has raised questions of privacy and the changing nature of the Anonymous community's use of monikers. The project to support those living on the streets while causing division in its own online network has been able to partner with many efforts and organizations not traditionally associated with Anonymous or online activists.

Shooting of Michael Brown

In the wake of the fatal police shooting of unarmed African-American Michael Brown, "Operation Ferguson"—a hacktivist organization that claimed to be associated with Anonymous—organized cyberprotests against police, setting up a website and a Twitter account to do so.[113] The group promised that if any protesters were harassed or harmed, they would attack the city's servers and computers, taking them offline.[113] City officials said that e-mail systems were targeted and phones died, while the Internet crashed at the City Hall.[113][114] Prior to August 15, members of Anonymous corresponding with Mother Jones said that they were working on confirming the identity of the undisclosed police officer who shot Brown and would release his name as soon as they did.[115] On August 14, Anonymous posted on its Twitter feed what it claimed was the name of the officer involved in the shooting.[116][117] However, police said the identity released by Anonymous was incorrect.[118] Twitter subsequently suspended the Anonymous account from its service.[119]

It was reported on 19 November 2014 that Anonymous had declared cyber war on the Ku Klux Klan (KKK) the previous week, after the KKK had made death threats following the Ferguson riots. They hacked the KKK's Twitter account, attacked servers hosting KKK sites, and started to release the personal details of members.[120]

Shooting of Tamir Rice

On November 24, 2014, Anonymous shut down the Cleveland city website and posted a video after Tamir Rice, a twelve-year-old boy armed only with a BB gun, was shot to death by a police officer in a Cleveland park.[121] Anonymous also used BeenVerified to uncover phone number and address of a policeman involved in the shooting.[122]

Charlie Hebdo shootings

In January 2015, Anonymous released a video and a statement via Twitter condemning the attack on Charlie Hebdo, in which 12 people, including eight journalists, were fatally shot. The video, claiming that it is "a message for al-Qaeda, the Islamic State and other terrorists", was uploaded to the group's Belgian account.[123] The announcement stated that "We, Anonymous around the world, have decided to declare war on you, the terrorists" and promises to avenge the killings by "shut[ting] down your accounts on all social networks."[124] On January 12, they brought down a website that was suspected to belong to one of these groups.[125] Critics of the action warned that taking down extremists' websites would make them harder to monitor.[126]

Anti-Islamic "Reclaim Australia" rally

Anonymous opposed Anti-Islamic Reclaim Australia rallies and described it as "an extreme right-wing group inciting religious hatred." It also promised to organize counter-rallies on April 4, 2015.[127]

Operation CyberPrivacy

On June 17, 2015, Anonymous claimed responsibility for a Denial of Service attack against Canadian government websites in protest of the passage of bill C-51—an anti-terror legislation that grants additional powers to Canadian intelligence agencies.[128] The attack temporarily affected the websites of several federal agencies.

Operation KKK

On 28 October 2015, Anonymous announced that it would reveal the names of up to 1,000 members of the Ku Klux Klan and other affiliated groups, stating in a press release, "You are terrorists that hide your identities beneath sheets and infiltrate society on every level. The privacy of the Ku Klux Klan no longer exists in cyberspace."[129] On November 2, a list of 57 phone numbers and 23 email addresses (that allegedly belong to KKK members) was reportedly published and received media attention.[130] However, a tweet from the "@Operation_KKK" Twitter account the same day denied it had released that information: "#ICYMI #OpKKK was in no way involved with today's release of information that incorrectly outed several politicians." [131][132][133] The group stated it plans to reveal the names on November 5.


Since 2013, Saudi Arabian hacktivists have been targeting government websites protesting the actions of the regime.[134] These actions have seen attacks supported by the possibly Iranian backed Yemen Cyber Army.[135]


In 2015, an offshoot of Anonymous self-described as Ghost Security or GhostSec started targeting Islamic State-affiliated websites and social media handles.[136][137][138]


In November 2015, Anonymous announced a major, sustained operation[139] against ISIS following the November 2015 Paris attacks, declaring, "Anonymous from all over the world will hunt you down. You should know that we will find you and we will not let you go."[140][141] ISIS responded on Telegram by calling them "idiots", and asking "What they gonna to [sic] hack?"[142][143] By the next day, however, Anonymous claimed to have taken down 3,824 pro-ISIS Twitter accounts, and by the third, more than 5,000,[144] and to have doxxed recruiters.[145] A week later, Anonymous increased their claim to 20,000 accounts and released a list of the accounts.[146][147] The list included the Twitter accounts of Barack Obama, Hillary Clinton, The New York Times and BBC News. The BBC reported that most of the accounts on the list appeared to be still active.[148] A spokesman for Twitter told The Daily Dot that the company is not using the lists of accounts being reported by Anonymous, as they have been found to be “wildly inaccurate” and include accounts used by academics and journalists.[149]


In 2015, a group that claims affiliation with Anonymous group, calling themselves as AnonSec, claimed to have hacked and gathered almost 276 GB of data from NASA servers including NASA flight and radar logs and videos, and also multiple documents related to ongoing research.[150] AnonSec group also claimed gaining access of a Global Hawk Drone of NASA, and released some video footage purportedly from the drone's cameras. A part of the data was released by AnonSec on Pastebin service, as an Anon Zine.[151] NASA has denied the hack, asserting that the control of the drones were never compromised, but has acknowledged that the photos released along with the content are real photographs of its employees, but that most of these data are already available in the public domain.[152]

#BoycottThailand: Thailand Jail Hack

The Blink Hacker Group, associating themselves with the Anonymous group, claimed to have hacked the Thailand prison websites and servers.[153] The compromised data has been shared online, with the group claiming that they give the data back to Thailand Justice and the citizens of Thailand as well. The hack was done in response to news from Thailand about the mistreatment of prisoners in Thailand.[154]

Case Donald Trump

In March 2016, Anonymous was reported to have declared war on Donald Trump.[155] However, the "Anonymous Official" YouTube channel released a video denouncing #OpTrump as an operation that "goes against everything Anonymous stands for" in reference to censorship and added "we are for everyone letting their voices be heard, even, if the person at a monster."[156]

South African Corruption

A group calling themselves Anonymous Africa launched a number of DDoS attacks on websites associated with the controversial South African Gupta family in mid-June 2016. Gupta-owned companies targeted included the websites of Oakbay Investments, The New Age, and ANN7. The websites of the South African Broadcasting Corporation and a political parties Economic Freedom Fighters and Zimbabwe's Zanu-PF were also attacked for “nationalist socialist rhetoric and politicising racism.”[157]

Related groups


Main article: LulzSec

In May 2011, the small group of Anons behind the HBGary Federal hack—including Tflow, Topiary, Sabu, and Kayla—formed the hacker group "Lulz Security", commonly abbreviated "LulzSec". The group's first attack was against, leaking several passwords, LinkedIn profiles, and the names of 73,000 X Factor contestants. In May 2011, members of Lulz Security gained international attention for hacking into the American Public Broadcasting Service (PBS) website. They stole user data and posted a fake story on the site that claimed that rappers Tupac Shakur and Biggie Smalls were still alive and living in New Zealand.[158] LulzSec stated that some of its hacks, including its attack on PBS, were motivated by a desire to defend WikiLeaks and its informant Chelsea Manning.[159]

In June 2011, members of the group claimed responsibility for an attack against Sony Pictures that took data that included "names, passwords, e-mail addresses, home addresses and dates of birth for thousands of people."[160] In early June, LulzSec hacked into and stole user information from the pornography website They obtained and published around 26,000 e-mail addresses and passwords.[161] On June 14, 2011, LulzSec took down four websites by request of fans as part of their "Titanic Take-down Tuesday". These websites were Minecraft, League of Legends, The Escapist, and IT security company FinFisher.[162] They also attacked the login servers of the multiplayer online game EVE Online, which also disabled the game's front-facing website, and the League of Legends login servers. Most of the takedowns were performed with DDoS attacks.[163]

LulzSec also hacked a variety of government-affiliated sites, such as chapter sites of InfraGard, a non-profit organization affiliated with the FBI.[164] The group leaked some of InfraGard member e-mails and a database of local users.[165] On June 13, LulzSec released the e-mails and passwords of a number of users of, the website of the U.S. Senate.[166] On June 15, LulzSec launched an attack on, the public website of the U.S. Central Intelligence Agency, taking the website offline for several hours with a distributed denial-of-service attack.[167] On December 2, an offshoot of LulzSec calling itself LulzSec Portugal attacked several sites related to the government of Portugal. The websites for the Bank of Portugal, the Assembly of the Republic, and the Ministry of Economy, Innovation and Development all became unavailable for a few hours.[168]

On June 26, 2011, the core LulzSec group announced it had reached the end of its "50 days of lulz" and was ceasing operations.[169] Sabu, however, had already been secretly arrested on June 7 and then released to work as an FBI informant. His cooperation led to the arrests of Ryan Cleary, James Jeffery, and others.[170] Tflow was arrested on July 19, 2011,[171] Topiary was arrested on July 27,[172] and Kayla was arrested on March 6, 2012.[173] Topiary, Kayla, Tflow, and Cleary pleaded guilty in April 2013 and were scheduled to be sentenced in May 2013.[174] In April 2013, Australian police arrested Cody Kretsinger, whom they alleged to be self-described LulzSec leader Aush0k.[175]


Main article: Operation AntiSec

Beginning in June 2011, hackers from Anonymous and LulzSec collaborated on a series of cyber attacks known as "Operation AntiSec". On June 23, in retaliation for the passage of the immigration enforcement bill Arizona SB 1070, LulzSec released a cache of documents from the Arizona Department of Public Safety, including the personal information and home addresses of many law enforcement officers.[176] On June 22, LulzSecBrazil took down the websites of the Government of Brazil and the President of Brazil.[177][178] Later data dumps included the names, addresses, phone numbers, Internet passwords, and Social Security numbers of police officers in Arizona,[179] Missouri,[180] and Alabama.[181] Antisec members also stole police officer credit card information to make donations to various causes.[182]

On July 18, LulzSec hacked into and vandalized the website of British newspaper The Sun in response to a phone-hacking scandal.[183][184] Other targets of AntiSec actions have included FBI contractor ManTech International,[185] computer security firm Vanguard Defense Industries,[186] and defense contractor Booz Allen Hamilton, releasing 90,000 military e-mail accounts and their passwords from the latter.[187]

In December 2011, AntiSec member "sup_g" (alleged by the U.S. government to be Jeremy Hammond) and others hacked Stratfor, a U.S.-based intelligence company, vandalizing its web page and publishing 30,000 credit card numbers from its databases.[188] AntiSec later released millions of the group's e-mails to Wikileaks.[189]

Arrests and trials

Since 2009, dozens of people have been arrested for involvement in Anonymous cyberattacks, in countries including the U.S., UK, Australia, the Netherlands, Spain, and Turkey.[190] Anons generally protest these prosecutions and describe these individuals as martyrs to the movement.[191] The July 2011 arrest of LulzSec member Topiary became a particular rallying point, leading to a widespread "Free Topiary" movement.[192]

The first person to be sent to jail for participation in an Anonymous DDoS attack was Dmitriy Guzner, an American 19-year-old. He pleaded guilty to "unauthorized impairment of a protected computer" in November 2009 and was sentenced to 366 days in U.S. federal prison.[193][194]

On June 13, 2011, officials in Turkey arrested 32 individuals that were allegedly involved in DDoS attacks on Turkish government websites. These members of Anonymous were captured in different cities of Turkey including Istanbul and Ankara. According to PC Magazine, these individuals were arrested after they attacked these websites as a response to the Turkish government demand to ISPs to implement a system of filters that many have perceived as censorship.[195][196]

Chris Doyon (alias "Commander X"), a self-described leader of Anonymous, was arrested in September 2011 for a cyberattack on the website of Santa Cruz County, California.[197][198] He jumped bail in February 2012 and fled across the border into Canada.[198]

On September 2012, journalist and Anonymous associate Barrett Brown, known for speaking to media on behalf of the group, was arrested hours after posting a video that appeared to threaten FBI agents with physical violence. Brown was subsequently charged with 17 offenses, including publishing personal credit card information from the Stratfor hack.[199]

Operation Avenge Assange

Several law enforcement agencies took action after Anonymous' Operation Avenge Assange.[200] In January 2011, the British police arrested five male suspects between the ages of 15 and 26 with suspicion of participating in Anonymous DDoS attacks.[201] During July 19–20, 2011, as many as 20 or more arrests were made of suspected Anonymous hackers in the US, UK, and Netherlands. According to the statements of U.S. officials, suspects' homes were raided and suspects were arrested in Alabama, Arizona, California, Colorado, Washington DC, Florida, Massachusetts, Nevada, New Mexico, and Ohio. Additionally, a 16-year-old boy was held by the police in south London on suspicion of breaching the Computer Misuse Act 1990, and four were held in the Netherlands.[202][203][204][205]

AnonOps admin Christopher Weatherhead (alias "Nerdo"), a 22-year-old who had reportedly been intimately involved in organising DDoS attacks during "Operation Payback",[206] was convicted by a UK court on one count of conspiracy to impair the operation of computers in December 2012. He was sentenced to 18 months' imprisonment. Ashley Rhodes, Peter Gibson, and another male had already pleaded guilty to the same charge for actions between August 2010 and January 2011.[206][207]


Evaluations of Anonymous' actions and effectiveness vary widely. In a widely shared post, blogger Patrick Gray wrote that private security firms "secretly love" the group for the way in which it publicises cyber security threats.[208] Anonymous is sometimes stated to have changed the nature of protesting,[10][11] and in 2012, Time called it one of the "100 most influential people" in the world.[13]

In 2012, Public Radio International reported that the U.S. National Security Agency considered Anonymous a potential national security threat and had warned the president that it could develop the capability to disable parts of the U.S. power grid.[209] In contrast, CNN reported in the same year that "security industry experts generally don't consider Anonymous a major player in the world of cybercrime" due the group's reliance on DDoS attacks that briefly disabled websites rather than the more serious damage possible through hacking. One security consultant compared the group to "a jewelry thief that drives through a window, steal jewels, and rather than keep them, waves them around and tosses them out to a crowd ... They're very noisy, low-grade crimes."[94] In its 2013 Threats Predictions report, McAfee wrote that the technical sophistication of Anonymous was in decline and that it was losing supporters due to "too many uncoordinated and unclear operations".[210]

Graham Cluley, a security expert for Sophos, argued that Anonymous' actions against child porn websites hosted on a darknet could be counterproductive, commenting that while their intentions may be good, the removal of illegal websites and sharing networks should be performed by the authorities, rather than Internet vigilantes.[211] Some commentators also argued that the DDoS attacks by Anonymous following the January 2012 Stop Online Piracy Act protests had proved counterproductive. Molly Wood of CNET wrote that "[i]f the SOPA/PIPA protests were the Web's moment of inspiring, non-violent, hand-holding civil disobedience, #OpMegaUpload feels like the unsettling wave of car-burning hooligans that sweep in and incite the riot portion of the play."[212] Dwight Silverman of the Houston Chronicle concurred, stating that "Anonymous' actions hurt the movement to kill SOPA/PIPA by highlighting online lawlessness."[213] The Oxford Internet Institute's Joss Wright wrote that "In one sense the actions of Anonymous are themselves, anonymously and unaccountably, censoring websites in response to positions with which they disagree."[214]

Gabriella Coleman has compared the group to the trickster archetype[215] and said that "they dramatize the importance of anonymity and privacy in an era when both are rapidly eroding. Given that vast databases track us, given the vast explosion of surveillance, there's something enchanting, mesmerizing and at a minimum thought-provoking about Anonymous' interventions".[216] When asked what good Anonymous had done for the world, Parmy Olson replied:

In some cases, yes, I think it has in terms of some of the stuff they did in the Middle East supporting the pro-democracy demonstrators. But a lot of bad things too, unnecessarily harassing people – I would class that as a bad thing. DDOSing the CIA website, stealing customer data and posting it online just for shits and giggles is not a good thing.[22]

Quinn Norton of Wired wrote of the group in 2011:

I will confess up front that I love Anonymous, but not because I think they're the heroes. Like Alan Moore's character V who inspired Anonymous to adopt the Guy Fawkes mask as an icon and fashion item, you're never quite sure if Anonymous is the hero or antihero. The trickster is attracted to change and the need for change, and that's where Anonymous goes. But they are not your personal army – that's Rule 44 – yes, there are rules. And when they do something, it never goes quite as planned. The internet has no neat endings.[215]

Furthermore, Landers assessed the following in 2008:

Anonymous is the first internet-based super-consciousness. Anonymous is a group, in the sense that a flock of birds is a group. How do you know they’re a group? Because they’re travelling in the same direction. At any given moment, more birds could join, leave, peel off in another direction entirely.[217]

Media Portrayal

Sam Esmail, the creator of the USA Network show Mr. Robot (TV series), said in an interview with Motherboard that he was inspired by Anonymous when creating the hacktivist drama.[218] Furthermore, Wired calls the "Omegas", a fictitious hacker group in the show, "a clear reference to the Anonymous offshoot known as LulzSec."[219] A member of Anonymous called Mr. Robot "the most accurate portrayal of security and hacking culture ever to grace the screen."[220]

See also



  1. Topiary was later revealed to be Jake Davis, a teenager living in the Shetland Islands of Scotland.[33]
  2. A portmanteau of "hacking" and "activism"


  1. "Gabriella Coleman on Anonymous". Brian Lehrer Live. Vimeo. February 9, 2011. Retrieved March 24, 2011.
  2. 1 2 3 Kelly 2012, p. 1678.
  3. "10 Things Everyone Should Know About Anonymous". Anonews. Retrieved February 2016. Check date values in: |access-date= (help)
  5. Landers, Chris (April 2, 2008). "Serious Business: Anonymous Takes On Scientology (and Doesn't Afraid of Anything)". Baltimore City Paper. Archived from the original on June 8, 2008. Retrieved July 3, 2008.
  6. Oltsik, Jon (December 3, 2013). "Edward Snowden Beyond Data Security". Network World. Retrieved December 4, 2013.
  7. Waites, Rosie (October 20, 2011). "V for Vendetta masks: Who". BBC News. Retrieved October 20, 2011.
  8. Michael Peck (April 8, 2013). "Why Did Anonymous Have to Attack Israel on Holocaust Memorial Day?". Forbes.
  9. Krupnick, Matt (August 15, 2011). "Freedom fighters or vandals? No consensus on Anonymous". Oakland Tribune. Retrieved July 10, 2013.
  10. 1 2 Carter, Adam (March 15, 2013). "From Anonymous to shuttered websites, the evolution of online protest". CBC News. Archived from the original on May 6, 2013. Retrieved May 6, 2013.
  11. 1 2 Coleman, Gabriella (April 6, 2011). "Anonymous: From the Lulz to Collective Action". Archived from the original on May 5, 2013. Retrieved May 5, 2013.
  12. Rawlinson, Kevin; Peachey, Paul (April 13, 2012). "Hackers step up war on security services". The Independent.   via HighBeam Research (subscription required) . Retrieved May 5, 2013.
  13. 1 2 Gellman, Barton (April 18, 2012). "The 100 Most Influential People In The World". Time.
  14. Coleman, Gabriella (December 10, 2010). "What It's Like to Participate in Anonymous' Actions". The Atlantic. Archived from the original on May 2, 2013. Retrieved May 2, 2013.
  15. 1 2 Kelly 2012, p. 1682.
  16. Olson 2012, p. 92.
  17. Brown, Jesse (February 7, 2008). "Community Organization with Digital Tools: The face of Anonymous". MediaShift Idea Lab: Reinventing Community News for the Digital Age. PBS. Archived from the original on Feb 11, 2008. Retrieved March 3, 2008.
  18. Olson 2012, pp. 58–59.
  19. Olson 2012, p. x.
  20. Kelly 2012, p. 1679.
  21. Cadwalladr, Carole (September 8, 2012). "Anonymous: behind the masks of the cyber insurgents". The Guardian. Archived from the original on May 2, 2013. Retrieved May 2, 2013.
  22. 1 2 Allnut, Luke (June 8, 2012). "Parmy Olson On Anonymous: 'A Growing Phenomenon That We Don't Yet Understand'". Radio Free Europe/Radio Liberty. Archived from the original on May 2, 2013. Retrieved May 2, 2013.
  23. Olson 2012, p. 7.
  24. Morris, Adam (April 30, 2013). "Julian Assange: The Internet threatens civilization". Salon. Archived from the original on May 2, 2013. Retrieved May 2, 2013.
  25. Kelly 2012, p. 1680.
  26. 1 2 3 Norton, Quinn (June 13, 2012). "In Flawed, Epic Anonymous Book, the Abyss Gazes Back". Wired. Archived from the original on May 2, 2013. Retrieved May 2, 2013.
  27. Olson 2012, pp. 122–23.
  28. 1 2 Shuman, Phil (July 26, 2007). "FOX 11 Investigates: 'Anonymous'". MyFOX Los Angeles. KTTV (Fox). Archived from the original on May 22, 2008.
  29. Olson 2012, p. 28.
  30. Whipple, Tom (June 20, 2008). "Scientology: the Anonymous protesters.". The Times. UK. Archived from the original on September 5, 2008.
  31. Olson 2012, p. 49.
  32. Olson 2012, p. 48.
  33. "Two-year term for Shetland hacker". The Herald.   via HighBeam Research (subscription required) . May 17, 2013. Retrieved June 27, 2013.
  34. Olson 2012, pp. 50–52.
  35. Olson 2012, pp. 57–58.
  36. 1 2 Dibbell, Julian (September 21, 2009), The Assclown Offensive: How to Enrage the Church of Scientology, Wired Magazine, retrieved November 27, 2009
  37. Dibbell, Julian (2008-07-11), "Sympathy for the Griefer: MOOrape, Lulz Cubes, and Other Lessons From the First 2 Decades of Online Sociopathy", GLS Conference 4.0, Madison, Wisconsin: Games, Learning and Society Group, retrieved November 7, 2008 Project Chanology "mention" begins approximately 27:45 minutes into the presentation.
  38. Popkin, Helen A.S. (April 18, 2011). "Notorious NSFW website cleans up its act". Digital Life on MSNBC. Retrieved April 19, 2011.
  39. Everything Anonymous. (2013-04-20). Retrieved on 2013-08-12.
  40. Leavitt, Alex (2011-04-15). "Archiving Internet Subculture: Encyclopedia Dramatica". Web Ecology Project. Retrieved 2011-09-29.
  41. Stryker, Cole (2011). Epic Win for Anonymous: How 4chan's Army Conquered the Web. New York, New York: Overlook Press. p. 155. ISBN 1-59020-738-6. Retrieved 2011-09-29.
  42. "Cruise bio hits stores as video clip of actor praising Scientology makes it way to Internet". The Washington Post.   via HighBeam Research (subscription required) . Associated Press. January 15, 2008. Retrieved May 2, 2013.
  43. Tucker, Neely (January 18, 2008). "Tom Cruise's Scary Movie; In Church Promo, the Scientologist Is Hard to Suppress". Washington Post.   via HighBeam Research (subscription required) . Retrieved May 2, 2013.
  44. Olson 2012, pp. 63–65.
  45. "Fair game; Scientology". The Economist.   via HighBeam Research (subscription required) . February 2, 2008. Retrieved May 2, 2013.
  46. Olson 2012, pp. 71–72, 122, 124, 126–29.
  47. Olson 2012, p. 206.
  48. Norton, Quinn (December 30, 2011). "Anonymous 101 Part Deux: Morals Triumph Over Lulz". Wired. Archived from the original on May 5, 2013. Retrieved May 5, 2013.
  49. Olson 2012, pp. 71–72.
  50. 1 2 George-Cosh, David (January 25, 2008). "Online group declares war on Scientology". National Post. Archived from the original on January 28, 2008. Retrieved January 25, 2008.
  51. "Scientology faces wave of cyber attacks". Cape Times.   via HighBeam Research (subscription required) . March 4, 2008. Retrieved May 2, 2013.
  52. Olson 2012, p. 82–3.
  53. DeSio, John (May 6, 2008). "Queens Anonymous Member Gets a Letter from Scientologists". The Village Voice. Archived from the original on May 2, 2013. Retrieved May 2, 2013.
  54. Ramadge, Andrew (March 20, 2008). "Scientology site gets a facelift after protests". Archived from the original on May 2, 2013. Retrieved May 2, 2013.
  55. Howarth, Mark (June 1, 2008). "Anger as police ban placards branding Scientology a cult". Sunday Herald.   via HighBeam Research (subscription required) . Retrieved May 2, 2013.
  56. Olson 2012, p. 85.
  57. Olson 2012, p. 93–94.
  58. 1 2 Olson 2012, p. 102.
  59. "Activists target recording industry websites". BBC News. September 20, 2010. Retrieved October 27, 2010.
  60. Olson 2012, p. 103.
  61. Olson 2012, p. 104.
  62. Tsotsis, Alexia (September 19, 2010). "RIAA Goes Offline, Joins MPAA As Latest Victim Of Successful DDoS Attacks". TechCrunch. Archived from the original on May 3, 2013. Retrieved 3 May 2013.
  63. Olson 2012, p. 105.
  64. Williams, Chris (September 22, 2010). "Piracy threats lawyer mocks 4chan DDoS attack". The Register. Retrieved October 22, 2010.
  65. Winterford, Brett (September 28, 2010). "Operation Payback directs DDoS attack at AFACT". iTnews. Retrieved December 23, 2010.
  66. Leydon, John (October 4, 2010). "Ministry of Sound floored by Anonymous". The Register. Retrieved October 22, 2010.
  67. Leyden, John (October 7, 2010). "Spanish entertainment industry feels wrath of Anonymous". The Register. Retrieved January 6, 2011.
  68. Sandoval, Greg (November 9, 2010). "FBI probes 4chan's 'Anonymous' DDoS attacks". Retrieved December 23, 2010.
  69. 1 2 Corrons, Luis (September 17, 2010). "4chan Users Organize Surgical Strike Against MPAA". Pandalabs Security. Retrieved October 22, 2010.
  70. "Anonymous hacktivists say Wikileaks war to continue". BBC News. December 9, 2010. Archived from the original on May 3, 2013. Retrieved May 3, 2013.
  71. Olson 2012, p. 110.
  72. Olson 2012, pp. 110–11.
  73. Olson 2012, pp. 115–18.
  74. Olson 2012, p. 117.
  75. Maslin, Janet (May 31, 2012). "The Secret Lives of Dangerous Hackers". The New York Times. Archived from the original on May 3, 2013. Retrieved May 3, 2013.
  76. Olson 2012, pp. 117–19.
  77. Addley, Esther; Halliday, Josh (December 8, 2012). "WikiLeaks supporters disrupt Visa and MasterCard sites in 'Operation Payback'". The Guardian. Archived from the original on May 3, 2013. Retrieved May 3, 2013.
  78. Olson 2012, p. 178.
  79. Olson 2012, pp. 122, 129.
  80. Steven Musil (December 8, 2013). "Anonymous hackers plead guilty to 2010 PayPal cyberattack". Cnet.
  81. Olson 2012, pp. 141–45.
  82. 1 2 Ryan, Yasmine (May 19, 2011). "Anonymous and the Arab uprisings". Al Jazeera. Archived from the original on May 5, 2013. Retrieved May 5, 2013.
  83. Olson 2012, p. 148.
  84. Olson 2012, pp. 10–24.
  85. Olson 2012, p. 200.
  86. Olson 2012, pp. 161, 164.
  87. Olson 2012, p. 164.
  88. Olson 2012, pp. 176–77.
  89. Olson 2012, pp. 178–88.
  90. "Anonymous vows to 'destroy' Westboro Baptist Church over Sandy Hook picket plans". The Raw Story. December 17, 2012. Archived from the original on May 5, 2013. Retrieved May 5, 2013.
  91. "Hacktivists strike Westboro Baptist Church over Newtown tragedy". RT. December 17, 2012. Archived from the original on May 5, 2013. Retrieved May 5, 2013.
  92. "Uganda prime minister hacked 'over gay rights'". BBC News. August 16, 2012. Archived from the original on May 5, 2013. Retrieved May 5, 2013.
  93. "Sony caught up in cyber war with indignant hackers: ; Company with security once considered 'robust' now dealing with constant breaches". Charleston Daily Mail.   via HighBeam Research (subscription required) . Associated Press. May 30, 2011. Retrieved May 5, 2013.
  94. 1 2 Goldman, David (January 20, 2012). "Hacker group Anonymous is a nuisance, not a threat". CNN. Archived from the original on May 5, 2013. Retrieved May 5, 2013.
  95. Malik, Shiv (May 1, 2012). "Occupy movement takes over parts of London Stock Exchange". The Guardian. Archived from the original on May 5, 2013. Retrieved May 5, 2013.
  96. Hernandez, Vittorio (October 5, 2012). "93-Year-Old Australian Faces Pedophilia Charges in Thailand". International Business Times. Archived from the original on May 5, 2013. Retrieved May 5, 2013.
  97. Liebowitz, Matt (May 15, 2012). "Anonymous Attacks Suspected Pedophiles Again". NBC News. Archived from the original on May 5, 2013. Retrieved May 5, 2013.
  98. "Anonymous Targets Pedophiles Via #OpPedoChat Campaign". PCMAG. Retrieved 2016-10-28.
  99. Steadman, Ian. "Anonymous launches #OpPedoChat, targets paedophiles". WIRED UK. Retrieved 2016-10-28.
  100. Plumlee, Rick (2013-12-02). "Wis. truck driver given 2 years probation for cyberattack on Koch Industries | Wichita Eagle". Retrieved 2014-01-07.
  101. "Internet strikes back: Anonymous' Operation Megaupload explained". RT. January 20, 2012. Archived from the original on May 5, 2013. Retrieved May 5, 2013.
  102. Roy, Jessica (2012-12-04). "Anonymous Hunts Revenge Porn Purveyor Hunter Moore". Betabeat. Retrieved 2014-01-07.
  103. Chan, Casey (November 16, 2012). "Anonymous Targets Israel by Taking Down Hundreds of Websites and Leaking Emails and Passwords". Gizmodo. Archived from the original on May 5, 2013. Retrieved May 5, 2013.
  104. Kershner, Isabel (April 7, 2013). "Israel Says It Repelled Most Attacks on Its Web Sites by Pro-Palestinian Hackers". The New York Times. Archived from the original on May 5, 2013. Retrieved May 5, 2013.
  105. Gonsalves, Antone (May 3, 2013). "Experts hope for another failure in next Anonymous attack". CSO Online. Archived from the original on May 5, 2013. Retrieved May 5, 2013.
  106. Messmer, Ellen (May 5, 2013). "Anonymous cyberattack on Israel finds disputed impact". ComputerWorld. Archived from the original on May 5, 2013. Retrieved May 5, 2013.
  107. "Protesters gather around the world for Million Mask March". The Guardian. 5 November 2013. Retrieved 6 November 2013.
  108. "#OpSafeWinter: Anonymous fights homelessness worldwide". The Daily Dot.
  110. "Forum Post: #Anon #OpSafeWinter Call to Action & New York #D26 Assembly -". Occupy Solidarity Network.
  112. "#OpSafeWinter: Generosity Goes Viral". The Interdependence Project.
  113. 1 2 3 Bever, Lindsey (August 13, 2014). "Amid Ferguson protests, hacker collective Anonymous wages cyberwar". The Washington Post. Retrieved August 13, 2014.
  114. Hunn, David (August 13, 2014). "How computer hackers changed the Ferguson protests". St. Louis Post-Dispatch. Retrieved August 13, 2014.
  115. Harkinson, Josh (August 13, 2014). "Anonymous' "Op Ferguson" Says It Will ID the Officer Who Killed Michael Brown". Mother Jones. Retrieved August 13, 2014.
  116. Bosman, Julie; Shear, Michael D.; Williams, Timothy (August 14, 2014). "Obama Calls for Open Inquiry Into Police Shooting of Teenager in Ferguson, Mo". The New York Times. Retrieved August 14, 2014.
  117. "Anonymous Releases Alleged Name Of Officer They Say Fatally Shot Michael Brown". KMOX News Radio 1120. August 14, 2014. Retrieved August 14, 2014.
  118. Pagliery, Jose (August 14, 2014). "Ferguson police deny Anonymous' ID of alleged shooter". CNN Money. Retrieved August 14, 2014.
  119. Hunn, David. "Twitter suspends Anonymous account : News". St. Louis Post-Dispatch. Retrieved August 15, 2014.
  120. Jamie Bartlett. "Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous by Gabriella Coleman – review". the Guardian.
  121. Boroff, David (November 24, 2014). "Grieving dad, Anonymous lash out at Cleveland cops following shooting death of boy, 12, armed with BB gun". New York Daily News. Retrieved November 24, 2014.
  122. Danylko, Ryllie (November 26, 2014). "Anonymous begins looking into past of Timothy Loehmann, cop who fatally shot Tamir Rice". Retrieved February 15, 2014.
  123. "'Hacktivist' group Anonymous says it would avenge Charlie Hebdo attacks by shutting down jihadist websites". The Telegraph. 9 January 2015.
  124. "Anonymous declares war over Charlie Hebdo attack". CNN Money. 9 January 2015.
  125. Newsbeat (12 January 2015). "Hackers Anonymous 'disable extremist website'". BBC. Retrieved 16 January 2015.
  126. Newsbeat (9 January 2015). "Anonymous hackers 'declare war' on jihadists after France attacks". BBC. BBC News. Retrieved 16 January 2015.
  127. Anti-Islamic marches to be held across Australia slammed as ‘racist’, counter protests planned | 3 Apr, 2015
  128. Fekete, Jason (17 June 2015). "Government of Canada websites under attack, hacker groupAnonymous claims responsibility". The National Post. Retrieved 18 June 2015.
  129. "Anonymous intends to unveil names of up to 1,000 Ku Klux Klan members". FOX News. October 29, 2015.
  130. Grenoble, Ryan. "Anonymous Begins Revealing Information About Alleged Ku Klux Klan Members". Huffington Post. Retrieved November 3, 2015.
  131. "The Short List: Anonymous goes after KKK; VW in another emissions stink; 'Brangelina' open up". USA Today. November 2, 2015. Retrieved November 2, 2015.
  132. "". Twitter. November 2, 2015. Retrieved November 2, 2015. External link in |title= (help)
  133. "This account has NOT YET released any information.". Twitter. November 2, 2015. Retrieved November 2, 2015.
  134. "#OpSaudi : Anonymous launched cyber attack on Saudi Government site". 16 May 2013. Retrieved 22 August 2015.
  135. Frenkel, Sheera (24 June 2015). "Meet The Mysterious New Hacker Army Freaking Out The Middle East". Retrieved 22 August 2015.
  136. "Can Cyber Activists Chase ISIS off Twitter?". The Atlantic. Retrieved 2015-11-15.
  137. "Anonymous vs. the Islamic State". Foreign Policy. Retrieved 2015-11-15.
  138. "Ghost Security Hackers, Offshoot Of 'Anonymous,' Claim They Disrupted ISIS Attack By Intercepting Twitter Messages". International Business Times. Retrieved 2015-11-15.
  139. "Anonymous declares war on ISIS in YouTube video saying it will 'unite humanity'". Mail Online. November 16, 2015.
  140. "#OpParis: Anonymous takes down 5,500 ISIS Twitter accounts". RT English.
  141. "Anonymous 'declares war' on Islamic State".
  142. "ISIS Calls Anonymous 'Idiots' As Cyber War Heats Up – Fortune". Fortune.
  143. "ISIS calls Anonymous 'idiots,' offers tips to evade hackers". TheHill.
  144. Catalin Cimpanu (November 16, 2015). "One Day Later, Anonymous Already Takes Down 3,824 Pro-ISIS Twitter Accounts – UPDATE". softpedia.
  145. Andrew Griffin (November 19, 2015). "'Operation Isis': Anonymous activists begin leaking suspected extremist Twitter account information". The Independent.
  146. "Anonymous Has Now Taken Down 20,000 ISIS Twitter Accounts, Promises to Go On". softpedia. Retrieved 2015-11-21.
  147. "ISIS 20,000+ Twitter Accounts Down". Pastebin. Retrieved 11 November 2015.
  148. "Anonymous 'anti-Islamic State list' features Obama and BBC News". BBC News. Retrieved 26 November 2015.
  149. "Twitter: Anonymous's lists of alleged ISIS accounts are 'wildly inaccurate'". The Daily Dot. 20 November 2015. Retrieved 22 November 2015.
  150. "Anonymous release leaked NASA information". Anonews. Retrieved November 2015. Check date values in: |access-date= (help)
  151. "OpNasaDrones Zine #AnonSec". none. Retrieved January 2016. Check date values in: |access-date= (help)
  152. "NASA Brushes Off Claims One Of Its Drones Was Hacked". Forbes. February 2016. Retrieved February 2016. Check date values in: |access-date= (help)
  153. "Anonymous Leaks Databases for 100 Thai Prison Websites". Softpedia News. February 2016. Retrieved February 2016. Check date values in: |access-date= (help)
  154. "Koh Tao Murders: Lawyer Alleges Prison Mistreatment". Khaosod English. 26 January 2016. Retrieved February 2016. Check date values in: |access-date= (help)
  156. "Anonymous - Elucidating #OpISIS and #OpTrump". YouTube. Retrieved 31 March 2016.
  157. "EXCLUSIVE: Why Anonymous 'hacked' the SABC, Gupta websites". Fin24. Retrieved 2016-06-19.
  158. CNN Wire Staff. "Hackers pirate PBS website, post fake story about Tupac still alive". CNN. Retrieved June 3, 2011.
  159. Olson, Parmy (May 31, 2011). "Interview With PBS Hackers: We Did It For 'Lulz And Justice'". Forbes. Retrieved June 3, 2011.
  160. Pepitone, Julianne (June 2, 2011). "Group claims fresh hack of 1 million Sony accounts Money". CNN. Archived from the original on August 18, 2011. Retrieved June 3, 2012.
  161. Thomas, Keir (June 11, 2012). "Porn Site Users Beware: Hacker Group LulzSec May Have Posted Your Email Address". PC World. Archived from the original on June 11, 2012. Retrieved June 11, 2012.
  162. Bright, Peter (June 14, 2011). "Titanic Takeover Tuesday: LulzSec's busy day of hacking escapades". Ars Technica. Archived from the original on June 14, 2011. Retrieved June 14, 2011.
  163. Peckham, Matt (June 14, 2011). "LulzSec Knocks 'Minecraft,' 'EVE Online,' 'League Of Legends' and 'The Escapist' Offline". Time. New York City. Archived from the original on June 14, 2011. Retrieved June 14, 2011.
  164. Morse, Andrew; Sherr, Ian (June 6, 2011). "For Some Hackers, The Goal Is Just To Play A Prank". The Wall Street Journal. p. B1. Archived from the original on June 9, 2011. Retrieved June 6, 2011.
  165. "LulzSec claims to have hacked FBI-affiliated website". LA Times. Retrieved June 4, 2012.
  166. Ogg, Erica (June 13, 2012). "LulzSec targets videogame maker ZeniMax Media". CBS Interactive. Archived from the original on June 13, 2012. Retrieved June 13, 2011.
  167. "CIA website hacked; LulzSec takes credit (again)". Consumer Reports. June 16, 2012. Archived from the original on June 16, 2012. Retrieved June 16, 2011.
  168. "Hackers voltam a atacar sites portugueses". TVI 24 (in Portuguese). Televisão Independente. December 2, 2012. Archived from the original on December 3, 2011. Retrieved December 3, 2012.
  169. Weisenthal, Joe (June 25, 2011). "Notorious Hacker Group LulzSec Just Announced That It's Finished". Business Insider. Silicon Alley Insider. Archived from the original on June 25, 2011. Retrieved June 25, 2011.
  170. Thomson, Iain. "LulzSec sneak Sabu buys six more months of freedom." The Register. August 23, 2012.
  171. Kaplan, Jeremy (July 19, 2011). "Leading Member of LulzSec Hacker Squad Arrested in London". Fox News Channel. New York City. Archived from the original on July 20, 2011. Retrieved July 20, 2011.
  172. "Man arrested over computer hacking claims". BBC News. London. BBC. July 27, 2011. Archived from the original on July 27, 2011. Retrieved July 27, 2011.
  173. Winter, Jana (March 6, 2012). "Infamous international hacking group LulzSec brought down by own leader". Fox News Channel. New York City. Archived from the original on March 13, 2012. Retrieved March 13, 2012.
  174. "Kretsinger, Sony hacker Recursion, jailed for year". BBC News. April 19, 2013. Archived from the original on May 5, 2013. Retrieved May 5, 2013.
  175. Siegel, Matt (April 24, 2013). "Australia Arrests the Professed Head of LulzSec, Which Claims a C.I.A. Hacking". The New York Times. Archived from the original on May 6, 2013. Retrieved May 6, 2013.
  176. Tsotsis, Alexia (June 23, 2011). "LulzSec Releases Arizona Law Enforcement Data In Retaliation For Immigration Law". TechCrunch. Retrieved June 23, 2011.
  177. Emery, Daniel (June 22, 2011). "LulzSec hits Brazilian websites". BBC. Retrieved June 22, 2011.
  178. Clark, Jack (June 22, 2011). "LulzSec takes down Brazil government sites". CNet. Retrieved June 22, 2011.
  179. Albanesius, Chloe (June 29, 2011). "LulzBoat Sails On: Anonymous Dumps More Arizona Data". PC Magazine. Ziff Davis. Archived from the original on July 5, 2011. Retrieved July 5, 2011.
  180. Usigan, Ysolt (August 3, 2011). "Online security breach! Hackers leak social security numbers of cops in Missouri". CBS News. New York City. CBS. Archived from the original on August 5, 2011. Retrieved August 5, 2011.
  181. Kelly, Meghan (October 21, 2011). "Anonymous releases private police information in name of Occupy Wall Street". VentureBeat. Archived from the original on October 22, 2011. Retrieved October 22, 2011.
  182. Mills, Elinor (August 6, 2011). "AntiSec hackers post stolen police data as revenge for arrests". CNET. CBS Interactive. Archived from the original on August 6, 2011. Retrieved August 6, 2011.
  183. Gayomail, Chris (July 18, 2011). "LulzSec Hacks 'News of the World' and 'The Sun,' Plants Fake Murdoch Death Story". Time. New York City. Time Inc. Archived from the original on July 18, 2011. Retrieved July 18, 2011.
  184. Rovzar, Chris (July 18, 2011). "Website of Murdoch's Sun Hacked". New York Magazine. New York City. New York Media Holdings. Archived from the original on July 18, 2011. Retrieved July 18, 2011.
  185. Hachman, Mark (July 29, 2011). "Anonymous Publishes Internal Documents from Govt. Contractor ManTech". PC Magazine. Ziff Davis. Archived from the original on July 29, 2011. Retrieved July 29, 2011.
  186. Ragan, Steve (August 16, 2011). "Vanguard Defense Industries compromised by AntiSec". The Tech Herald. p. 1. Archived from the original on August 18, 2011. Retrieved August 18, 2011.
  187. Gerwirtz, David (July 11, 2011). "Military Meltdown Monday: 90,000 military email profiles released by AntiSec". ZDNet. CBS Interactive. Archived from the original on July 12, 2011. Retrieved July 12, 2011.
  188. Gallagher, Sean (March 6, 2012). "Inside the hacking of Stratfor: the FBI's case against Antisec member Anarchaos". Ars technica. Retrieved May 5, 2013.
  189. Ronson, Jon (May 3, 2013). "Security alert: notes from the frontline of the war in cyberspace". The Guardian. Archived from the original on May 5, 2013. Retrieved May 5, 2013.
  190. Olson 2012, p. 355.
  191. Olson 2012, p. 356.
  192. Munro, Alistair (June 26, 2012). "Scots hacker admits breaking into the CIA". The Scotsman.   via HighBeam Research (subscription required) . Retrieved May 5, 2013.
  193. "Verona man admits role in attack on Church of Scientology's websites". The Star-Ledger. November 16, 2009. Archived from the original on May 5, 2013. Retrieved May 5, 2013.
  194. Olson 2012, p. 89.
  195. Albanesius, Chloe (June 13, 2011). "Turkey Arrests 32 'Anonymous' Members & Opinion". Retrieved August 30, 2011.
  196. "Detienen en Turquía a 32 presuntos miembros de 'Anonymous' – Noticias de Europa – Mundo". Eltiempo.Com. Retrieved August 30, 2011.
  197. Elinor Mills (September 23, 2011). "Alleged 'Commander X' Anonymous hacker pleads not guilty". Cnet. Archived from the original on May 5, 2013. Retrieved May 5, 2013.
  198. 1 2 Nate Anderson (December 11, 2012). "Anon on the run: How Commander X jumped bail and fled to Canada". Ars Technica. Archived from the original on May 5, 2013. Retrieved May 5, 2013.
  199. Gallagher, Ryan (March 20, 2013). "How Barrett Brown went from Anonymous's PR to federal target". The Guardian. Archived from the original on May 5, 2013. Retrieved May 5, 2013.
  200. "Anonymous attacks PayPal in 'Operation Avenge Assange'". The Register. December 6, 2010.
  201. "UK police arrest WikiLeaks backers for cyber attacks". Reuters. January 27, 2011. Retrieved August 30, 2011.
  202. "Police arrest 'hackers' in US, UK, Netherlands". BBC. July 19, 2011. Archived from the original on July 28, 2011. Retrieved August 30, 2011.
  203. Greenberg, Andy (July 19, 2011). "Fourteen Anonymous Hackers Arrested For "Operation Avenge Assange," LulzSec Leader Claims He's Not Affected – Forbes". Forbes. Retrieved August 30, 2011.
  204. "'Anonymous' hackers arrested in US sweep". Herald Sun. Australia. July 20, 2011. Retrieved August 30, 2011.
  205. "16 Suspected 'Anonymous' Hackers Arrested In Nationwide Sweep". Fox News Channel. April 7, 2010. Archived from the original on July 29, 2011. Retrieved August 30, 2011.
  206. 1 2 Halliday, Josh (January 24, 2013). "Anonymous hackers jailed for cyber attacks". The Guardian. Retrieved April 30, 2013.
  207. Leyden, John (December 14, 2012). "UK cops: How we sniffed out convicted AnonOps admin 'Nerdo'". The Register. Archived from the original on April 19, 2013. Retrieved April 19, 2013.
  208. Olson 2012, pp. 309–310.
  209. "National Security Agency calls hacktivist group 'Anonymous' a threat to national security". Public Radio International. February 27, 2012. Archived from the original on May 5, 2013. Retrieved May 5, 2013.
  210. "2013 Threats Predictions" (PDF). McAfee. Archived (PDF) from the original on May 5, 2013. Retrieved May 5, 2013.
  211. Leyden, John (October 24, 2011). "Anonymous shuts down hidden child abuse hub". The Register. Retrieved January 25, 2012.
  212. Wood, Molly (January 19, 2012). "Anonymous goes nuclear; everybody loses?". CNET. Retrieved January 21, 2012.
  213. Jonsson, Patrik (January 21, 2012). "SOPA: Feds go after Megaupload as Congress reviews anti-piracy bills". The Christian Science Monitor. Archived from the original on January 23, 2012. Retrieved January 22, 2012.
  214. Kelion, Leo (January 20, 2012). "Hackers retaliate over Megaupload website shutdown". BBC News. Retrieved January 21, 2012.
  215. 1 2 Norton, Quinn (November 8, 2011). "Anonymous 101: Introduction to the Lulz". Wired. Archived from the original on May 5, 2013. Retrieved May 5, 2013.
  216. Walters, Helen (June 27, 2012). "Peeking behind the curtain at Anonymous: Gabriella Coleman at TEDGlobal 2012". TED. Archived from the original on May 5, 2013. Retrieved May 5, 2013.
  217. Caneppele, Stefano; Calderoni, Francesco. "420chan"&hl=en Organized Crime, Corruption and Crime Prevention. p. 235. ISBN 978-3-319-01839-3. Retrieved 28 March 2015.
  218. "The Creator of 'Mr. Robot' Explains Its Hacktivist and Cult Roots". Motherboard. Retrieved 2016-10-28.
  219. Zetter, Kim. "Mr. Robot Is the Best Hacking Show Yet—But It's Not Perfect". WIRED. Retrieved 2016-10-28.
  220. "Why USA Network's 'Mr. Robot' Is The Most Realistic Depiction Of Hacking On Television". International Business Times. 2015-07-22. Retrieved 2016-10-28.


External links

Activist websites used by Anonymous

News coverage

This article is issued from Wikipedia - version of the 11/20/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.