A demonstrator being arrested in central London last Thursday during a protest against the British government's plans to raise university fees. While the unrest raged on, a group of "hacktivists" was busy targeting banks and credit-card companies in the wake of Julian Assange's arrest.
A demonstrator being arrested in central London last Thursday during a protest against the British government's plans to raise university fees. While the unrest raged on, a group of "hacktivists" was busy targeting banks and credit-card companies in the wake of Julian Assange's arrest.
A demonstrator being arrested in central London last Thursday during a protest against the British government's plans to raise university fees. While the unrest raged on, a group of "hacktivists" was busy targeting banks and credit-card companies in the wake of Julian Assange's arrest.
A demonstrator being arrested in central London last Thursday during a protest against the British government's plans to raise university fees. While the unrest raged on, a group of "hacktivists" was

'Hacktivists', erasing law and order online for a cause


Faisal Al Yafai
  • English
  • Arabic

London last week, in the days before a crucial vote on raising the cost of higher education and thousands of protesters are on the streets of the capital. They march in freezing temperatures, idealism and anger mixed together, surrounded by police. Occasionally, a small number turn violent. Viewed from buildings overlooking the protests, the scene looks like a small battleground.

Below ground another battle is brewing in server-bunkers and fibreoptic cables. A loose-knit collective of activists launch cyber-attacks on the websites of Mastercard and Visa, the online payment service Paypal and a Swiss bank. The websites of US politicians are targeted, as are those of Swedish lawyers. Their sites, spread on servers around the world, are flooded with fake requests to load pages, known as "distributed denial of service attacks" or DDoS. Under the strain of thousands of requests per second, the sites cannot cope - they freeze, flicker and then go offline.

DDoS attacks are most often used by hackers and criminals, but these activists - or "hacktivists", as they are inevitably nicknamed - invoke a higher cause. They are launching what they call retaliatory strikes against companies that have dissociated themselves from WikiLeaks.org, a whistle-blowing website now at the centre of a political storm for making public 250,000 US diplomatic cables. The hacktivists call it Operation Payback and their targets are linked either to the website or to its enigmatic founder, Julian Assange, currently on bail in the UK over accusations of sex crimes in Sweden. Credit-card companies that blocked donations to WikiLeaks, Assange's Swiss bank that dropped him as a client, US politicians that criticised him and his accuser's Swedish lawyers: all are targeted.

But by whom? The hackers bringing the business of multinational corporations to a standstill are anonymous, hidden in bedrooms and living rooms across the world, their activities obscured through technical wizardry so that they are rarely known even to each other. The damage caused to these websites was minimal - the attackers would later say they only attacked corporate sites, not payment infrastructure, as their way of expressing dissent - but the attacks affected the reputations and balance sheets of the companies.They are known to the media and themselves as Anonymous, but in fact these hundreds of individuals are not a group so much as a collective.

Anonymous grew out of a popular online message-board called 4chan and works as a chaotic and decentralised collective. On message-boards, individuals (who, in the past, did not have to use names and were merely identified as "Anonymous") argue, trade jokes and insults, share images and ideas, and, eventually, through the chaos of the conversation, targets are decided.

There are no leaders - some of the hackers are older, some teenagers, some experienced, some merely playing around. Indeed it makes more sense to see Anonymous as a swarm; coming together for one or two attacks, before dispersing.

This is the shadow war being fought online, the first information war, as one of Anonymous's supporters dubbed it. In fact, there are two parts of this shadow war, triggered by the media publication of the cables and the political reaction to them.

First, there is the role of individual states, particularly the US government. The US is currently exploring legal options against Assange and may yet issue warrants, though on what charges are unclear. At the same time, American politicians have put public pressure on companies to dissociate themselves from WikiLeaks. (It is noticeable that politicians have not gone after The New York Times, which is publishing the cables.) With worrying speed, many US companies have complied, although it is unclear what legal sanctions the government could use against them if they had not. Even the suggestion of going against US politicians seems to have spooked them.

The other side are the hackers themselves. It is in the nature of these attacks that no one can be sure what is happening or who is causing it.

Yet what makes the whole saga around WikiLeaks' release of American diplomatic cables so interesting is that it defies a conventional narrative.

Some of the leaks have been clearly in the public interest, others have not; Assange himself, at the centre of the saga, is an ambiguous protagonist; and while some of Assange's declared supporters have defended free speech, others have attacked innocent bystanders. This brave new world lacks clear heroes and villains.

But such attacks raise important questions about hacktivism and what these so-called cyber-warriors might do in the future. As much as hacktivists use the language of war or revenge, most seem motivated by idealistic ideas of free speech: in statements circulating on the social networking site Twitter, Anonymous have said they are supporting "those who are helping lead our world to freedom and democracy". But these DDoS attacks are illegal, in essence hardly any different from vandalising a company's premises. Financially, they could be worse, potentially costing millions.

In as much as it is possible to discern common patterns in the thinking of these hacktivists, collectively they hold extremely libertarian leanings, especially on information. They tend to be profoundly anti-copyright and anti-censorship, believing that all information, everywhere, always, ought to be free - free of charge and free to circulate.

Before their support for WikiLeaks, Anonymous were best known for orchestrating attacks on the Church of Scientology after it tried to remove from the internet an interview with the actor (and Scientology member) Tom Cruise. The collective has also launched attacks on the websites of companies attempting to stop online sharing of music.

But in other cases, bystanders have been attacked, unnecessarily. The two women in Sweden who have accused Assange of sex crimes have had their identities widely outed across the internet and their lawyers' website has been attacked. Neither of these attacks may have been carried out by Anonymous as a collective, but it is possible some of the individual members were involved. The women, in particular, have had their right to privacy and their legal rights severely compromised.

Hacktivism necessarily operates at the fringes of the law and where you stand on it depends on whether you see Anonymous, at least in this case, as activists protesting against multinational corporations that appear to be doing the bidding of a state, or if you see them as troublemakers and criminals attacking targets indiscriminately.

The publicity generated by the Anonymous attacks has focused attention on how quickly some US companies appeared to capitulate to the desires of politicians, even when those desires were not backed by legal requirements. Such actions, taken in the glare of publicity, set a dangerous precedent and raise questions over other US companies, such as Facebook or Google, that hold significant swathes of personal information.

Yet if there is a problem with companies that hold so much personal information being too compliant with the state, a similar question also arises over hacktivists gaining access to personal material. At a time when millions of people lead much of their lives online, with e-mail, banking information and even sensitive photos and documents being stored around the internet, what happens if groups like Anonymous can hack in and gain access to this information, or disrupt the networks to stop owners from gaining legitimate access?

Then there is the question of policing, of what lines of defence there are for ordinary people and what avenues of recourse. Attacks on corporations usually generate little sympathy among the general public, due to the perceived remoteness of these companies and the difficulty of understanding an online attack. Yet in legal terms, these are criminal acts, potentially disrupting payment systems or companies that people rely on. In such a context, to whom do you complain? The thin blue line of law and order is erased online.

The problem with a swarm like Anonymous is that, being leaderless, it is prone to a lack of discipline and a lack of coherent strategy. One Anonymous hacker told a newspaper that the group often splintered and attacked other members. As much as the collective has argued that its actions are conducted for a higher cause, the fact it is able to carry out these attacks leaves the door open for other, less noble hackers.

In London, police were on the streets to make sure protesters behaved and that the general public was not affected. Neither worked well: the swarming protesters were occasionally badly treated by the police and innocent people were corralled and detained. Yet the guards exist. In the online world, there is no protection. The Anonymous attacks were less of an information war than a skirmish, but they show the weaknesses of the system. The next cyber-warriors may not fight in the name of such noble causes.

Faisal al Yafai is an award-winning journalist and a Churchill Fellow for 2009/2010.

UAE currency: the story behind the money in your pockets
The specs

Engine: 4.0-litre V8 twin-turbocharged and three electric motors

Power: Combined output 920hp

Torque: 730Nm at 4,000-7,000rpm

Transmission: 8-speed dual-clutch automatic

Fuel consumption: 11.2L/100km

On sale: Now, deliveries expected later in 2025

Price: expected to start at Dh1,432,000

What the law says

Micro-retirement is not a recognised concept or employment status under Federal Decree Law No. 33 of 2021 on the Regulation of Labour Relations (as amended) (UAE Labour Law). As such, it reflects a voluntary work-life balance practice, rather than a recognised legal employment category, according to Dilini Loku, senior associate for law firm Gateley Middle East.

“Some companies may offer formal sabbatical policies or career break programmes; however, beyond such arrangements, there is no automatic right or statutory entitlement to extended breaks,” she explains.

“Any leave taken beyond statutory entitlements, such as annual leave, is typically regarded as unpaid leave in accordance with Article 33 of the UAE Labour Law. While employees may legally take unpaid leave, such requests are subject to the employer’s discretion and require approval.”

If an employee resigns to pursue micro-retirement, the employment contract is terminated, and the employer is under no legal obligation to rehire the employee in the future unless specific contractual agreements are in place (such as return-to-work arrangements), which are generally uncommon, Ms Loku adds.

Volvo ES90 Specs

Engine: Electric single motor (96kW), twin motor (106kW) and twin motor performance (106kW)

Power: 333hp, 449hp, 680hp

Torque: 480Nm, 670Nm, 870Nm

On sale: Later in 2025 or early 2026, depending on region

Price: Exact regional pricing TBA

Gran Gala del Calcio 2019 winners

Best Player: Cristiano Ronaldo (Juventus)
Best Coach: Gian Piero Gasperini (Atalanta)
Best Referee: Gianluca Rocchi
Best Goal: Fabio Quagliarella (Sampdoria vs Napoli)
Best Team: Atalanta​​​​​​​
Best XI: Samir Handanovic (Inter); Aleksandar Kolarov (Roma), Giorgio Chiellini (Juventus), Kalidou Koulibaly (Napoli), Joao Cancelo (Juventus*); Miralem Pjanic (Juventus), Josip Ilicic (Atalanta), Nicolo Barella (Cagliari*); Fabio Quagliarella (Sampdoria), Cristiano Ronaldo (Juventus), Duvan Zapata (Atalanta)
Serie B Best Young Player: Sandro Tonali (Brescia)
Best Women’s Goal: Thaisa (Milan vs Juventus)
Best Women’s Player: Manuela Giugliano (Milan)
Best Women’s XI: Laura Giuliani (Milan); Alia Guagni (Fiorentina), Sara Gama (Juventus), Cecilia Salvai (Juventus), Elisa Bartoli (Roma); Aurora Galli (Juventus), Manuela Giugliano (Roma), Valentina Cernoia (Juventus); Valentina Giacinti (Milan), Ilaria Mauro (Fiorentina), Barbara Bonansea (Juventus)

Signs%20of%20%20%20%20%20%20%20heat%20stroke
%3Cul%3E%0A%3Cli%3EThe%20loss%20of%20sodium%20chloride%20in%20our%20sweat%20can%20lead%20to%20confusion%20and%20an%20altered%20mental%20status%20and%20slurred%20speech%3C%2Fli%3E%0A%3Cli%3EBody%20temperature%20above%2039%C2%B0C%3C%2Fli%3E%0A%3Cli%3EHot%2C%20dry%20and%20red%20or%20damp%20skin%20can%20indicate%20heatstroke%3C%2Fli%3E%0A%3Cli%3EA%20faster%20pulse%20than%20usual%3C%2Fli%3E%0A%3Cli%3EDizziness%2C%20nausea%20and%20headaches%20are%20also%20signs%20of%20overheating%3C%2Fli%3E%0A%3Cli%3EIn%20extreme%20cases%2C%20victims%20can%20lose%20consciousness%20and%20require%20immediate%20medical%20attention%3C%2Fli%3E%0A%3C%2Ful%3E%0A

War

Director: Siddharth Anand

Cast: Hrithik Roshan, Tiger Shroff, Ashutosh Rana, Vaani Kapoor

Rating: Two out of five stars 

MATCH INFO

Uefa Champions League, semi-final result:

Liverpool 4-0 Barcelona

Liverpool win 4-3 on aggregate

Champions Legaue final: June 1, Madrid

Specs
Engine: Electric motor generating 54.2kWh (Cooper SE and Aceman SE), 64.6kW (Countryman All4 SE)
Power: 218hp (Cooper and Aceman), 313hp (Countryman)
Torque: 330Nm (Cooper and Aceman), 494Nm (Countryman)
On sale: Now
Price: From Dh158,000 (Cooper), Dh168,000 (Aceman), Dh190,000 (Countryman)
German intelligence warnings
  • 2002: "Hezbollah supporters feared becoming a target of security services because of the effects of [9/11] ... discussions on Hezbollah policy moved from mosques into smaller circles in private homes." Supporters in Germany: 800
  • 2013: "Financial and logistical support from Germany for Hezbollah in Lebanon supports the armed struggle against Israel ... Hezbollah supporters in Germany hold back from actions that would gain publicity." Supporters in Germany: 950
  • 2023: "It must be reckoned with that Hezbollah will continue to plan terrorist actions outside the Middle East against Israel or Israeli interests." Supporters in Germany: 1,250 

Source: Federal Office for the Protection of the Constitution

Israel Palestine on Swedish TV 1958-1989

Director: Goran Hugo Olsson

Rating: 5/5

Labour dispute

The insured employee may still file an ILOE claim even if a labour dispute is ongoing post termination, but the insurer may suspend or reject payment, until the courts resolve the dispute, especially if the reason for termination is contested. The outcome of the labour court proceedings can directly affect eligibility.


- Abdullah Ishnaneh, Partner, BSA Law 

Types of bank fraud

1) Phishing

Fraudsters send an unsolicited email that appears to be from a financial institution or online retailer. The hoax email requests that you provide sensitive information, often by clicking on to a link leading to a fake website.

2) Smishing

The SMS equivalent of phishing. Fraudsters falsify the telephone number through “text spoofing,” so that it appears to be a genuine text from the bank.

3) Vishing

The telephone equivalent of phishing and smishing. Fraudsters may pose as bank staff, police or government officials. They may persuade the consumer to transfer money or divulge personal information.

4) SIM swap

Fraudsters duplicate the SIM of your mobile number without your knowledge or authorisation, allowing them to conduct financial transactions with your bank.

5) Identity theft

Someone illegally obtains your confidential information, through various ways, such as theft of your wallet, bank and utility bill statements, computer intrusion and social networks.

6) Prize scams

Fraudsters claiming to be authorised representatives from well-known organisations (such as Etisalat, du, Dubai Shopping Festival, Expo2020, Lulu Hypermarket etc) contact victims to tell them they have won a cash prize and request them to share confidential banking details to transfer the prize money.

RESULTS

1.45pm: Maiden Dh75,000 1,400m
Winner: Dirilis Ertugrul, Fabrice Veron (jockey), Ismail Mohammed (trainer)
2.15pm: Handicap Dh90,000 1,400m
Winner: Kidd Malibu, Sandro Paiva, Musabah Al Muhairi
2.45pm: Maiden Dh75,000 1,000m
Winner: Raakezz, Tadhg O’Shea, Nicholas Bachalard
3.15pm: Handicap Dh105,000 1,200m
Winner: Au Couer, Sean Kirrane, Satish Seemar
3.45pm: Maiden Dh75,000 1,600m
Winner: Rayig, Pat Dobbs, Doug Watson
4.15pm: Handicap Dh105,000 1,600m
Winner: Chiefdom, Royston Ffrench, Salem bin Ghadayer
4.45pm: Handicap Dh80,000 1,800m
Winner: King’s Shadow, Richard Mullen, Satish Seemar

HOW TO WATCH

Facebook: TheNationalNews  

Twitter: @thenationalnews  

Instagram: @thenationalnews.com  

TikTok: @thenationalnews