Logics and Legacy of Anonymous

  • E. Gabriella ColemanEmail author
Living reference work entry


Since 2010, digital direct action, including leaks, hacking and mass protest, has become a regular feature of political life on the Internet. This chapter considers the source, strengths, and weakness of this activity through an in-depth analysis of Anonymous, the protest ensemble that has been adept at magnifying issues, boosting existing – usually oppositional – movements and converting amorphous discontent into a tangible form. It has been remarkably effective, even though it lacks the human and financial resources to engage in long-term strategic thinking or planning. This chapter covers the different historical phases of Anonymous in order to examine its logic, the sources of its geopolitical power, and its legacy.


Anonymous Direct action Hackers Hacking 



The Power and Politics behind the Mask was first published by the Centre for International Governance Innovation as Paper No. 3 in the Internet Governance Paper Series, copyright 2013, by the Centre for International Governance Innovation, and then in Organized Chaos: Reimagining the Internet, edited by Mark Raymond and Gordon Smith, published by the Centre for International Governance Innovation in 2014. Published with permission.


  1. Anonymous (2007) Dear Fox News. YouTube video, 29 July 2007.
  2. Anonymous (2008) Message to Scientology. YouTube video, 21 Jan 2008.
  3. Arquilla J, Ronfeldt D (1996) The advent of netwar. RAND, Santa MonicaGoogle Scholar
  4. Bajak F (2014) Top South American hackers rattle Peru’s Cabinet.
  5. Bartlulz (2011) Linton Johnson – “The face of BART.”
  6. Beyer JL (2014) Expect us: online communities and political mobilization. Oxford University Press, New YorkCrossRefGoogle Scholar
  7. Burkart P (2014) Pirate politics: the new information policy contests. The MIT Press, Cambridge, MACrossRefGoogle Scholar
  8. Cheng J (2010) Anonymous targets Australian government over porn filters. Ars Technica.
  9. Christman T (2012) Tory Christman ex Scientologist and declared SP shares her experiences @ Dublin Offline. YouTube video, 15 Aug 2012.
  10. Coleman G (2017a) The public interest hack. Limn issue number eight: hacks, leaks, and breaches. Scholar
  11. Coleman G (2017b) From internet farming to weapons of the geek. Curr Anthropol 58(S15):S91–S102CrossRefGoogle Scholar
  12. Currier C, Marquis-Boire M (2014) Leaked files: German spy company helped Bahrain hack Arab Spring protesters. The intercept. Scholar
  13. Currier C, Marquis-Boire M (2015) Leaked documents show FBI, DEA and US Army buying Italian spyware. The intercept.
  14. Deseriis M (2015) Improper names: collective pseudonyms from the Luddites to Anonymous. University of Minnesota Press, MinneapolisCrossRefGoogle Scholar
  15. Fisher P (2015) Hack back! A DIY guide for those without the patience to wait for whistleblowers.
  16. Fox News (2009) 4Chan: the rude, raunchy underbelly of the Internet.,2933,512957,00.html
  17. Franceschi-Bicchierai L (2016a) A notorious hacker is trying to start a “hack back” political movement. Motherboard.
  18. Franceschi-Bicchierai L (2016b) Hacking team has lost its license to export spyware. Motherboard.
  19. Franceschi-Bicchierai L (2017) Italian prosecutor makes request to close hacking team investigation. Motherboard.
  20. Gallagher R (2013) Software that tracks people on social media created by defense firm. The Guardian.
  21. Gorman S (2012) Alert on hacker power play. The Wall Street Journal.
  22. Greenberg A (2013) This machine kills secrets: Julian Assange, the cypherpunks, and their fight to empower whistleblowers. Plume, New YorkGoogle Scholar
  23. Jacquet J (2015) Is shame necessary?: new uses for an old tool. Vintage Books, New YorkGoogle Scholar
  24. Jordan T, Taylor PA (2004) Hacktivism and cyberwars: rebels with a cause? Routledge, LondonGoogle Scholar
  25. Karatzogianni A (2015) Firebrand waves of digital activism 1994–2014 the rise and spread of Hacktivism and Cyberconflict. Palgrave Macmillan UK, LondonCrossRefGoogle Scholar
  26. Kelty C (2008) Two bits: the cultural significance of free software. Duke University Press, DurhamCrossRefGoogle Scholar
  27. Knuttila L (2011) User unknown: 4chan, anonymity and contingency. First Monday [Online] 16(10).
  28. LaNueve de Anonymous (2017) Hackeada la empresa Indra, responsable de la tecnología informática de las elecciones del 21-D.
  29. Maxigas (2012) Hacklabs and hackerspaces – tracing two genealogies. J Peer Prod (2).
  30. Nguyen T (2011) Anonymous hacktivists add Stuxnet code to their arsenal.
  31. officialERICA GARNER @es_snipes (2018)
  32. Phillips W (2015) This is why we can’t have nice things: mapping the relationship between online trolling and mainstream culture. Massachusetts Institute of Technology Press, Cambridge, MAGoogle Scholar
  33. Quinn B (2012) Anti-abortion activism escalating, warns clinic targeted by vigil. The Guardian.
  34. Ragan S (2011) Report: HBGary used as an object lesson by Anonymous.
  35. Sauter M (2015) The coming swarm. Bloomsbury, New YorkGoogle Scholar
  36. Schrock AR (2016) Civic hacking as data activism and advocacy: a history from publicity to open government data. New Media Soc 18(4):581–599CrossRefGoogle Scholar
  37. Scott J (1985) Weapons of the weak: everyday forms of peasant resistance. Yale University Press, New HavenGoogle Scholar
  38. Todd B (2008) Computers at the headquarters of the Obama and McCain campaigns were hacked CNN confirms. CNN.
  39. Tynes R (2017) When GhostSec goes hunting. Limn issue number eight: hacks, leaks, and breaches.
  40. Vlavo FA (2018) Performing digital activism: new aesthetics and discourses of resistance. Routledge, New YorkGoogle Scholar
  41. Zetter K (2014) Countdown to Zero Day: Stuxnet and the launch of the World’s first digital weapon. Random House Inc.Google Scholar

Copyright information

© Springer Science+Business Media B.V., part of Springer Nature 2018

Authors and Affiliations

  1. 1.McGill UniversityMontrealCanada

Personalised recommendations