Cyber Warriors in the Middle East - Syrian E-Army.pdf
(
485 KB
)
Pobierz
Public
Relations
Review
40
(2014)
420–428
Contents
lists
available
at
ScienceDirect
Public
Relations
Review
Cyber
warriors
in
the
Middle
East:
The
case
of
the
Syrian
Electronic
Army
Ahmed
K.
Al-Rawi
Department
of
Media
&
Communication,
School
of
History,
Culture,
&
Communication,
Erasmus
University,
Rotterdam,
The
Netherlands
a
r
t
i
c
l
e
i
n
f
o
a
b
s
t
r
a
c
t
Article
history:
Received
29
January
2014
Received
in
revised
form
19
March
2014
Accepted
19
April
2014
This
paper
investigates
the
online
hacking
group,
the
Syrian
Electronic
Army
(SEA),
and
examines
its
goals.
The
study
argues
that
it
is
not
a
hacktivist
group
but
is
made
up
of
cyber
warriors
who
are
closely
connected
to
the
Syrian
government
in
order
to
serve
two
main
goals:
serving
as
a
public
relations
tool
for
the
Syrian
government
to
draw
the
world’s
attention
to
the
official
Syrian
version
of
events
taking
place
in
the
country
and
countering
the
impact
of
Syrian
oppositional
groups.
The
study
investigates
the
online
reaction
to
SEA
by
analyzing
the
comments
posted
on
its
YouTube
videos
in
order
to
better
understand
the
group’s
aims
and
strategies
and
the
public
perception.
©
2014
Elsevier
Inc.
All
rights
reserved.
Keywords:
Syrian
Electronic
Army
(SEA)
Cyber
War
Hacktivism
Syria
Middle
East
Political
public
relations
“Our
grandfathers
liberated
Syria
from
colonialism
and
we,
the
Syrian
Electronic
Army,
will
protect
Syria
from
the
return
of
colonialism
–
Homeland
.
.
.
Honor
.
.
.
Loyalty”,
YouTuber:
samisami70835
1.
Introduction:
the
Syrian
Electronic
Army
(SEA)
Established
around
May
2011,
SEA
is
hacking
group
that
claims
to
be
independent
from
the
Syrian
government
of
Bashar
Assad.
Its
old
website
(
syrian-es.org/
)
is
not
functioning
anymore
due
to
US
web
service
restrictions
(
Scharr,
2013
).
The
Syrian
Computer
Society,
which
was
established
by
Bashar
al-Assad’s
brother
Bassel
in
1989
and
was
headed
later
by
Bashar
himself
before
becoming
president,
hosted
and
registered
SEA’s
websites
which
indirectly
show
SEA’s
government
affiliation
(
Scharr,
2013
).
On
Instagram
page
(
instagram.com/official
sea/
),
the
first
image
that
SEA
has
had
was
that
for
Bashar
Assad,
stating:
‘Every
year
and
you’re
the
nation’s
leader’
(as
of
9
December
2013),
yet
on
its
Twitter
page,
1
SEA
describes
itself
as
follows:
“We
are
not
an
official
side
and
do
not
belong
to
a
political
party.
We
are
Syrian
youths
who
responded
to
the
call
of
duty
after
our
homeland,
Syria,
was
subjected
to
cyber
attacks.
We
decided
to
respond
actively
under
the
name
of
Syrian
Electronic
Army
SEA’
(
The
Syrian
Electronic
Army,
2013
).
It
seems
that
the
Syrian
government
felt
an
urgent
need
to
counter
the
various
cyber
attacks
against
its
websites,
so
it
supported
SEA.
Aside
from
the
hacking
operations
conducted
by
Anonymous,
which
is
one
of
the
well-known
hacktivist
groups
in
the
world
that
supported
free
speech
with
the
release
of
the
Wikileaks
cables
and
backed
other
popular
protests
like
Occupy
Wall
Street,
as
explained
below,
other
attacks
included
the
email
leaks
by
Syrian
opposition
activists
who
disclosed
the
emails
of
Bashar
Assad
and
his
close
aides
and
family
members
which
were
E-mail
addresses:
alrawi@eshcc.eur.nl
,
ahmed@aalrawi.com
1
SEA
has
had
484
tweets
and
10,183
followers
as
of
6
January
2014.
The
first
tweet
was
sent
on
31
July
2013.
http://dx.doi.org/10.1016/j.pubrev.2014.04.005
0363-8111/©
2014
Elsevier
Inc.
All
rights
reserved.
A.K.
Al-Rawi
/
Public
Relations
Review
40
(2014)
420–428
421
published
by
The
Guardian
(
Booth
&
Mahmood,
2012
).
Basically,
it
is
impossible
for
SEA
to
operate
inside
the
government
controlled
areas
without
the
direct
knowledge
of
and
direction
from
the
totalitarian
government
of
Syria.
Currently,
SEA’s
new
website
(
sea.sy/index/en
)
is
operated
from
Russia
which
can
be
confirmed
by
the
public
email
used
which
ends
with
.ru.
In
June
2011,
Bashar
al-Assad
praised
some
of
his
supporters
and
highlighted
the
hacking
operations
of
SEA,
which
he
said
“has
been
a
real
army
in
virtual
reality”
(
Scharr,
2013
).
According
to
its
website,
SEA
attributes
its
existence
to
the
anti-Assad
stance
taken
by
many
Arab
and
Western
media
channels.
SEA
claims
that
these
channels
“started
to
support
terrorists
groups
that
killed
civilians
and
members
of
the
Syr-
ian
Arab
Army
as
well
as
destroying
private
and
public
properties.
These
media
outlets
functioned
as
an
umbrella
for
these
groups
to
continue
their
acts
by
ignoring
the
coverage
of
terrorism
in
Syria
and
accusing
the
Arab
Syrian
Army
to
be
behind
everything
.
.
.
.”
(
The
Syrian
Electronic
Army,
n.d.
).
It
seems
that
SEA’s
Facebook
page
has
been
routinely
and
continuously
removed
by
Facebook
administrators
(
The
Syrian
Electronic
Army,
2013c
).
On
its
252
Facebook
page
(
facebook.com/SEA.252
)
2
that
has
been
removed
during
the
time
this
study
was
conducted,
SEA
wrote
in
the
“About”
sec-
tion,
three
words
to
describe
the
group:
‘Homeland
.
.
.
Honor
.
.
.
Loyalty’
which
is
the
same
slogan
used
by
Assad’s
Syrian
Arab
Army.
By
closely
examining
the
253rd
Facebook
page
(
facebook.com/SEA.253
)
that
was
created
on
10
December
10,
2013
and
removed
shortly
afterwards,
one
could
notice
that
the
page
was
heavily
moderated
by
its
creators
and
it
only
contained
instructions
on
where
to
attack
Syrian
oppositional
groups
or
report
abuse
or
hate
speech
to
Facebook
administrators
in
order
to
shut
them
down.
Another
Facebook
page
was
created
and
was
called
‘The
SEA
Fourth
Division’
on
5
December
2013
which
has
had
over
2546
likes
in
less
than
five
days
(
facebook.com/SEA.P.252
)
and
was
shortly
removed
as
well.
One
comment
that
was
posted
on
10
December
2013
mentioned
that
the
Facebook
page
was
being
reported
as
one
that
violated
Facebook
guidelines;
the
person
running
the
page
instructed
his
followers
to
like
or
comment
on
some
of
its
posts
to
avoid
shutting
it
down,
stating:
“Please
don’t
let
me
down,
Shabiha”.
The
term
Shabiha
is
used
for
the
militia
members
that
are
affiliated
with
Bashar
Assad’s
regime.
Other
instructions
were
directed
at
hacking
Facebook
pages
or
reporting
abuse
in
relation
to
Facebook
pages
that
opposed
Assad
such
as
Al-Yarmouk
Camp
(
facebook.com/NewsOfYarmouk?fref=ts
)
and
Imam
Dhahabi
Divisions
(
facebook.com/kalidbrkat.ahmad.1
).
Later,
SEA
announced
on
its
website
that
its
260th
Facebook
page
was
created:
They
have
been
hurt
by
the
blows
of
the
SEA,
so
they
fought
us
with
everything
that
they
have
and
shut
down
our
Facebook
page
hundreds
of
times.
Now,
learn
and
let
your
masters
learn,
too.
We
swear
that
if
you
shut
us
down
millions
of
times,
you
will
neither
affect
our
determination
nor
perseverance.
This
is
our
arena
and
you
know
this
well.
Wait
for
us
for
you
who
boast
of
freedom
of
speech.
We
do
not
need
any
funding
from
any
side
because
there
is
only
a
need
to
have
a
computer
and
an
Internet
connection
The
Syrian
Electronic
Army
(n.d.)
Since
it
has
been
involved
in
a
conflict
for
over
three
years,
the
Syrian
government
uses
SEA
as
one
if
its
public
relations
tools
and
cyberspace
is
just
another
battlefield.
In
the
following
section,
an
elaboration
of
the
concept
of
cyber
war
is
given.
2.
Cyber
war
Information
warfare
or
cyber
war
is
defined
as
‘aggressive
operations
in
cyberspace,
against
military
targets,
against
a
State
or
its
society’
(
Ventre,
2011,
p.
ix
).
Many
governments
around
the
globe
are
concerned
about
their
cyber
security
and
ability
to
(counter)-attack
other
adversaries.
For
example,
Wikileaks
cables
revealed
that
the
US
government
was
pre-
occupied
with
the
growing
cyber
technologies
and
capabilities
of
some
countries
like
China
since
Japan,
its
close
ally,
was
far
behind
in
the
cyber
war
race
(
Wikileaks,
2009
).
The
US
government
had
also
discussion
and
some
kind
of
cooperation
on
cyber
security
with
the
Indian
government
(
Wikileaks,
2004
).
This
kind
of
concern
is
related
to
many
governments’
needs
to
obtain
information
that
has
security,
economic,
and
political
significance
as
well
as
to
protect
vital
technology-
related
sectors
from
potential
cyber-attacks
which
seem
to
be
a
regular
occurrence.
For
example,
the
Algerian
government
introduced
a
new
cybercrime
bill
in
May
2008
after
reports
stating
that
government
websites
received
about
4000
hacking
attempts
per
month
(
International
Telecommunication
Union,
2012,
p.
32
).
Some
of
the
declassified
documents
of
the
US
National
Security
Agency
show
that
the
US
government
planned
to
target
“adversaries
computers”
since
the
year
1997.
This
was
known
as
“Computer
Network
Attack”
(CNA)
which
referred
to
“‘operations
to
disrupt,
deny,
degrade
or
destroy’
information
in
target
computers
or
networks,
‘or
the
computers
and
networks
themselves”’
(
Richelson,
2013,
paragraph
4
).
In
many
cases,
cyber
war
is
envisioned
to
be
part
of
and
an
extension
of
a
classical
war.
For
instance,
several
hacking
attempts
were
made
against
official
Iraqi
websites
before
the
beginning
of
the
2003
war
which
resulted
in
defacing
them
and
posting
anti-Baathist
messages
by
hackers
from
the
USA
(
Al-Rawi
Ahmed,
2012,
p.
24
&
p.
51
).
The
war
also
led
to
various
reactions
including
the
hacking
of
nearly
20,000
websites
between
mid-March
and
mid-April
2003
that
were
either
for
or
against
the
war
on
Iraq
(
Rojas,
2003
).
It
is
believed
that
some
hacking
attempts
against
government-run
websites
are
either
supported,
indirectly
encouraged,
or
at
least
tolerated
by
some
governments.
For
example,
an
FBI
informant
once
instructed
some
US
hackers
like
Jeremy
Hammond
to
attack
certain
targets
in
countries
that
were
supposed
to
be
allies
with
the
US
like
Turkey,
Iraq
and
Brazil
(
Cameron,
2013
).
2
The
Facebook
page
was
created
on
May
12,
2013
and
has
had
2779
likes.
422
A.K.
Al-Rawi
/
Public
Relations
Review
40
(2014)
420–428
According
to
the
former
secretary
of
State,
Hillary
Clinton,
the
US
government
hacked
into
websites
run
by
al-Qaida’s
affiliates
in
Yemen
and
changed
advertisements
that
bragged
about
killing
Americans
into
pro-American
advertisements
(
Hughes,
2012
).
In
May
2007,
a
cyber
war
was
initiated
in
Iraq
to
fight
Iraqi
insurgents.
According
to
Bob
Gourley,
the
chief
technology
officer
for
the
US
Defense
Intelligence
Agency,
technology
experts
conducted
“reconnaissance
on
foreign
countries
without
exchanging
salvos
of
destructive
computer
commands”
(
Harris,
2009
).
Yet,
Iraqi
insurgents
themselves
were
believed
to
have
hacked
the
US
Predator
drone
video
feed
in
order
to
disclose
the
kind
of
footage
captured
(
Spillius,
2009
),
while
other
sympathizers
with
the
Iraqi
insurgency
stepped
up
their
war
against
US
websites
as
a
reaction
against
the
US
invasion
of
Iraq.
For
instance,
the
leader
of
the
Tarek
Bia
Ziad
Group,
who
is
believed
to
be
a
Libyan
hacker,
managed
to
design
a
virus
that
infected
many
computers
in
the
USA
and
the
hacker
attributed
his
action
to
his
support
for
the
Iraqi
insurgency
(
Heussner,
2010
).
Another
recent
example
of
cyber
war
is
between
Iran
on
the
one
hand
and
the
USA
and
Israel
on
the
other
hand
in
relation
to
the
controversial
Iranian
nuclear
energy
program.
It
is
believed
that
the
USA
in
coordination
with
Israel
were
allegedly
involved
in
designing
a
malware,
which
is
a
malicious
software,
called
MiniFlame
whose
aim
is
to
steal
information
from
specific
targets
in
Iran
as
well
as
Lebanon
in
which
Hezbollah
operates.
This
malware
has
the
ability
to
“remotely
take
screenshots
of
infected
computers,
record
audio
conversations
that
took
place
in
the
same
room
as
the
computer,
intercept
keyboard
inputs
and
wipe
data
on
command”
(
Ferran,
2012
).
Interestingly,
the
Flame
virus
that
was
created
by
the
US
and
Israel
was
also
found
in
Bahrain,
Saudi
Arabia,
Qatar,
and
the
UAE
that
are
supposed
to
be
close
allies
with
the
US
(
Flangan,
2012
).
Further,
the
US
and
Israeli
governments
were
allegedly
involved
in
designing
Stuxnet
0.5
back
in
2005
to
attack
Iran’s
Natanz
enrichment
facility
(
Arthur,
2013
)
which
was
followed
by
creating
the
Stuxnet
worm
that
successfully
disrupted
and
delayed
the
work
of
an
Iranian
nuclear
facility
(
The
Guardian,
2013;
Valeriano
&
Maness,
2012
).
As
a
reaction,
Iran
allegedly
cyber
attacked
several
Persian
Gulf
oil
and
gas
companies
in
Saudi
Arabia
and
Qatar,
according
to
US
sources
(
Baldor,
2012
).
The
latest
revelations
by
the
former
NSA’s
contractor,
Edward
Snowden,
showed
that
the
US
government
allocated
a
$652
million
budget
for
conducting
231
offensive
cyber-operations
worldwide
back
in
2011
(
Gellman
&
Nakashima,
2011
).
Teams
from
the
FBI,
the
CIA
and
the
Cyber
Command,
the
US
military
cyber
operations,
worked
with
the
Remote
Operations
Center
(ROC)
to
plan,
administer,
and
supervise
the
work
of
“cyberwarriors”
whose
job
was
to
“infiltrate
and
disrupt
foreign
computer
networks”
in
countries
like
Iran,
North
Korea,
China
and
Russia
(
Gellman
&
Nakashima,
2011
).
Other
tasks
included
“locating
suspected
terrorists
‘in
Afghanistan,
Pakistan,
Yemen,
Iraq,
Somalia,
and
other
extremist
safe
havens”’
(
Gellman
&
Nakashima,
2011
).
Snowden’s
revelations
revealed
numerous
attempts
to
hack
websites
and
computer
networks
in
Europe
and
the
Middle
East
including
Al
Jazeera
TV
channel’s
internal
communications
during
George
Bush’s
second
term
(
Al
Jazeera,
2013
).
In
brief,
several
governments
believe
that
obtaining
sensitive
online
information
from
other
countries
and
countering
cyber
attacks
are
of
vital
importance
to
their
national
security
and
Assad’s
government
is
certainly
one
of
them.
3.
Hacktivism
&
the
Arab
World
The
word
hacktivism
is
a
combination
of
the
words
‘hacker’
and
‘activist’
and
was
first
coined
by
D.E.
Denning
who
makes
a
distinction
between
cyberterrorism
and
hacktivism.
Denning
states
that
cyberterrorism
refers
to
“the
convergence
of
cyberspace
and
terrorism.
It
covers
politically
motivated
hacking
operations
intended
to
cause
grave
harm
such
as
loss
of
life
or
severe
economic
damage.
An
example
would
be
penetrating
an
air
traffic
control
system
and
causing
two
planes
to
collide”
(
Denning,
2001,
p.
241
).
On
the
other
hand,
hacktivism,
refers
to
“operations
that
use
hacking
techniques
against
a
target’s
Internet
site
with
the
intent
of
disrupting
normal
operations
but
not
causing
serious
damage.
Examples
are
web
sit-ins
and
virtual
blockades,
automated
email
bombs,
web
hacks,
computer
break-ins,
and
computer
viruses
and
worms”
(
Denning,
2001,
p.
241
).
In
fact,
it
is
difficult
to
distinguish
between
the
two
types
of
activities.
The
US
government,
for
example,
regards
Anonymous
as
an
illegal
online
organization.
According
to
the
US
government,
Anonymous
is
made
up
of
“not-for-profit”
cyber
criminals
(
Snow,
2011
)
though
the
group
is
regarded
by
many
as
a
hacktivist
one.
Weimann
confirms
that
the
line
between
the
concepts
of
cyberterrorism
and
hacktivism
is
blurry
as
it
is
difficult
to
define
the
action
of
hacktivists
attacking
“national
infrastructure,
such
as
electric
power
networks
and
emergency
services”
(
Weimann,
2005,
p.
137
).
Weimann
does
acknowledge
that
cyberterrorism
is
done
if
some
“nation
states”
are
involved
in
hacking
acts
(
Weimann,
2005,
p.
141
)
and
based
on
Denning’s
classical
definitions,
the
Stuxnet
worm
can
be
regarded
as
an
act
of
cyberterrorism
since
its
aim
was
to
“cause
grave
harm
such
as
loss
of
life
or
severe
economic
damage”.
One
of
Anonymous
famous
operations
was
called
Syria
–
Fighting
for
Freedom
that
resulted
in
hacking
the
Syrian
Customs
website
(
customs.gov.sy
)
(
Anonymous,
2013
).
The
Syrian
Electronic
Army
reacted
with
hacking
a
Dutch
website
affiliated
with
Anonymous
and
posted
a
video
to
announce
it,
stating:
“Our
integrity
is
equivalent
to
the
integrity
of
our
territory.
If
you
approached
us
even
a
little
bit
then
you
should
await
your
complete
annihilation”
(
YouTube,
2012a
).
One
commentator
on
this
video,
MrKilian555,
said:
‘You
will
pay.
Believe
me.
Expect
us!’
(
YouTube,
2012a
).
As
a
reaction,
Anonymous
initiated
operation
#OpSyria
that
allegedly
succeeded
in
exposing
the
names
of
five
members
of
the
SEA
including,
some
of
whom
live
in
Romania
and
Russia
and
its
leader
who
is
known
as
Deeb
(
Murphy,
2013
).
It
is
believed
that
Anonymous
has
many
members
from
the
Arab
world.
When
the
organization
launched
its
#OpIsrael
attack
in
November
2012,
it
managed
to
affect
about
600
Israeli
sites
and
released
personal
information
that
belonged
to
high-ranking
Israeli
officials
(
The
Wire,
2013
).
In
a
newspaper
interview
with
an
Algerian
member
of
Anonymous,
he
revealed
a
combination
of
nationalistic
and
religious
motives
behind
the
attack
on
Israeli
websites.
The
Algerian
hacker
claimed
that
their
mission
was
to
‘wipe
Israel
from
the
map
of
cyberspace’
in
2013
and
that
“details
of
over
20,000
Facebook
and
5000
A.K.
Al-Rawi
/
Public
Relations
Review
40
(2014)
420–428
423
Twitter
accounts
and
about
30,000
Israeli
Bank
accounts
were
released
to
the
public”
in
#OpIsrael
operation
(
Budihan,
2013
).
In
the
following
section,
the
theoretical
framework
is
introduced.
In
this
study,
I
argue
that
SEA
is
not
a
hacktivist
group
that
defends
or
fights
for
some
causes
but
is
a
community
of
cyber
warriors
who
are
defined
as
people
“posses[ing]
the
characteristic
of
being
sponsored
by
states
and
being
subject
to
the
oversight
of
their
governments”
(
Baldi,
Gelbstein
&
Kurbalija,
2003,
p.
18
).
The
Syrian
government
uses
SEA
as
a
public
relations
tool
to
serve
its
own
interests,
while
the
organization’s
continuous
denial
of
its
strong
connection
to
Assad’s
regime
has
three
main
advantages.
First,
if
SEA
fails
in
its
activities
such
as
having
its
website
hacked,
no
one
can
announce
victory
over
the
Syrian
government
but
over
a
small
hacking
Syrian
group.
Second,
this
kind
of
vague
link
between
the
two
“gives
the
Syrian
government
some
protection
from
the
legal
and
political
consequences
of
SEA’s
attacks”
(
Fire
Eye,
2013
).
Finally,
keeping
the
link
to
the
Syrian
regime
ambiguous
helps
SEA’s
organization
in
getting
more
recruits
of
the
type
of
“script
kiddies”
or
“Thrill
Seekers”
who
seek
fame
and
do
not
want
to
be
associated
with
Assad’s
government
but
are
excited
to
be
part
of
a
‘small’
organization
that
is
sometimes
able
to
attract
the
world’s
attention.
It
is
important
to
note
that
SEA
is
not
only
made
up
of
a
group
of
cyber
warriors
who
are
supported
by
and
affiliated
to
the
Syrian
government,
but
is
also
aided
by
what
is
called
as
“patriotic
hackers”
(
Fire
Eye,
2013
)
and
“Thrill
Seekers
(or
“cyberjoyriders”)”
(Weimann,
2006,
p.
41).
In
fact,
SEA
is
a
highly
organized
group
despite
the
fact
that
it
claims
to
work
independently
and
with
no
clear
organization.
There
is
a
well-defined
leadership
and
hierarchy
unlike
the
case
of
Anonymous
which
is
made
up
of
loosely
connected
networks
of
hackers
from
all
over
the
world.
For
example,
the
TV
channel,
Al-Mayadeen,
interviewed
the
leader
of
SEA
on
26
September
2013
(
YouTube,
2013c
).
The
head
of
SEA,
who
is
a
young
Syrian
man
living
in
Damascus,
framed
his
group
as
hacktivists
who
are
defending
a
cause,
stating:
“We
have
Syrian
members
who
live
outside
the
country
in
case
the
Internet
connection
is
shut
down.
As
an
organization,
we
are
proud
to
be
on
the
same
[FBI
terrorist]
list
with
that
of
the
armed
wing
of
Hezbollah”
(
YouTube,
2013c
).
This
is
also
confirmed
by
Anonymous.
When
it
initiated
its
#OpSyria
operation,
Anonymous
hackers
managed
to
disclose
the
identity
of
some
SEA’s
members
living
in
Romania
and
Russia
and
its
leader
who
is
nicknamed
Deeb
(means
wolf
in
Arabic)
(
Murphy,
2013
).
Finally,
the
pro-Syrian
TV
channel,
Dunya,
interviewed
on
23
May
2011
a
young
Syrian
man
called
Tareq
who
claimed
to
be
the
head
of
SEA
and
revealed
that
the
group
consists
of
hackers
living
inside
the
country
and
others
in
the
Diaspora.
Tareq
emphasized
that
some
Syrians
living
abroad
are
helping
with
translating
the
organization’s
messages
in
different
languages
(
YouTube,
2011b
).
Due
to
this
hierarchical
management,
I
argue
that
SEA
is
an
organization
that
clearly
exhibits
public
relations
features
serving
the
Syrian
government
for
two
main
reasons.
First,
PR
practitioners
“must
ensure
their
efforts
support
and
contribute
to
the
overall
organizational
goals
and
values”.
SEA
members
are
performing
these
services
for
the
Assad
government
since
they
adhere
to
the
same
ideological
beliefs
and
show
great
support
for
its
political
system.
Second,
those
practitioners
must
show
“confidence
of
top
management
in
order
to
recommend
needed
adjustments
to
organizational
policies
and
procedures”
(
Freitang
&
Stokes,
2009,
p.
5
).
Again,
SEA
members
largely
act
in
this
manner
as
the
hierarchical
structure
is
well
established
and
respected.
In
relation
to
its
direct
connection
to
the
Syrian
government,
Reporters
without
Borders
identified
several
countries
that
it
called
‘Enemies
of
the
Internet’
including
Syria
that
uses
the
Syrian
Electronic
Army
as
an
official
intelligence
tool.
SEA
is
known
to
use
malwares
to
collect
information
on
oppositional
groups
(
Reporters
without
Borders,
2013
).
These
malware
programs
and
Trojan
applications
include
“Blackshades,
DarkComet,
Fynloski,
Rbot,
Xtreme
RAT
and
Zapchast”
and
have
“key
logging,
document
and
data
stealing,
and
audio
eavesdropping
capabilities”
(
Fire
Eye,
2013
).
For
example,
SEA
published
the
names
of
11,000
names
and
passwords
of
opposition
members
in
July
2012
(
Reporters
without
Borders,
2013,
p.
33
)
and
such
information
is
sent
to
a
“computer
address
lying
within
Syrian
government-controlled
Internet
protocol
(IP)
space
for
intelligence
collection
and
review”
(
Fire
Eye,
2013
).
Also,
SEA
hacked
and
stole
valuable
information
from
Truecaller,
Tango,
and
Viber
which
are
all
free
Internet
messaging
and
telephone
services
that
are
widely
used
by
Syrian
opposition
members
(
Fire
Eye,
2013
).
It
is
important
to
note
that
most
of
SEA’s
attacks
are
directed
against
the
social
media
channels
of
traditional
media
outlets
and
as
well
as
against
Syrian
oppositional
websites
and
Facebook
pages.
This
means
that
SEA
is
one
of
Assad’s
international
media
and
propaganda
tools
because
after
the
beginning
of
the
rebellion
it
has
become
difficult
for
the
Syrian
government
to
express
its
views
to
the
world.
There
are
numerous
examples
of
SEA’s
hacking
operations
that
were
mostly
directed
against
Qatar,
Saudi
Arabia,
USA,
and
the
UK
due
to
their
political
opposition
to
Assad’s
regime.
These
attacks
included
hacking
Al-Jazeera
mobile
and
sending
false
mobile
texts
claiming
that
the
Prince
of
Qatar
was
subjected
to
an
assassination
attempt
(
Associated
Press,
2012
).
SEA
also
hacked
the
Facebook
and
Twitter
accounts
of
Qatar
Foundation
in
February
28,
2013
and
posted
messages
indicating
that
Qatar
supports
terrorism
(
YouTube,
2013b
).
Tens
of
other
media
outlets
like
the
Washington
Post,
the
New
York
Times,
and
The
Onion
or
their
Twitter
accounts
that
belonged
to
the
Associated
Press,
NPR
and
Reuters
were
hacked
by
SEA.
On
the
Associated
Press
Twitter
account,
SEA
once
wrote
that
the
White
House
was
bombed
and
that
Obama
got
injured
which
made
the
stock
market
drop
(
Fire
Eye,
2013;
Memmot,
2013;
Scharr,
2013
).
Further,
one
of
the
Twitter
accounts
that
belong
to
BBC
Weather
was
hacked
by
SEA
that
posted
some
sarcastic
messages
like
“Earthquake
warning
for
Qatar:
Hamad
Bin
Khalifah
about
to
exit
vehicle”
to
ridicule
his
former
obesity
or
“Hazardous
for
warning
for
North
Syria:
Erdogan
orders
terrorists
to
launch
chemical
weapons
at
civilian
areas”
(
Deans,
Plunkett,
&
Halliday,
2013
).
Other
SEA
hacking
operations
included
distributed
denial
of
service
(DDoS),
phishing,
and
domain
name
system
(DNS)
attacks
with
the
case
of
the
New
York
Times
(
Scharr,
2013
).
SEA’s
phenomenon
prompted
similar
reactions
from
other
countries
that
are
close
to
Bashar
Assad’s
regime
such
as
Algeria.
For
example,
the
“Algerian
Electronic
Army”
appeared
in
2013.
On
its
Facebook
page,
a
slogan
similar
to
that
used
424
A.K.
Al-Rawi
/
Public
Relations
Review
40
(2014)
420–428
by
SEA
is
posted:
‘Loyalty
.
.
.
.Sacrifice
.
.
.
Commitment’
(
The
Algerian
Electronic
Army,
2013
).
Another
hacking
group
was
created
in
2013
called
the
“Tunisian
Cyber
Army”
(TCA)
(
The
Tunisian
Cyber
Army,
2013
).
3
4.
Theoretical
framework
The
theory
used
in
this
study
is
situated
within
the
field
of
online
political
public
relations,
but
it
is
important
first
to
discuss
the
basic
concept
of
public
relations
that
is
relevant
to
this
study.
In
their
typology
of
public
relations,
James
E.
Grunig
and
Todd
Hunt
(1984)
introduced
four
public
relations
models
including
the
press
agentry
and
the
two-way
asymmetric
communications.
The
former
is
a
one-way
communication
wherein
“no
dialog
with
the
intended
audience
is
required
and
the
main
objective
is
to
put
forward
particular
view
of
the
world
through
the
media
and
other
channels”
(
Edwards,
2009,
p.
150
).
This
can
be
connected
to
the
Syrian
Electronic
Army’s
main
method
of
addressing
the
public
which
is
through
its
website
which
does
not
contain
any
comments
section.
On
the
other
hand,
the
aim
of
the
two-way
asymmetric
communications
is
to
“generate
agreement
between
the
organization
and
its
publics
by
bringing
them
around
to
the
organisation’s
way
of
thinking.
Feedback
from
publics
is
used
to
adapt
communications
strategies
to
be
more
persuasive,
not
to
alter
the
organsation’s
position”
(
Edwards,
2009,
p.
150
).
This
is
similar
to
propaganda
as
the
organization’s
goal
is
“to
change
only
its
target
public”
(
Sha,
2007,
p.
8
)
rather
than
itself
which
can
be
seen
in
SEA’s
use
of
its
Twitter
account,
YouTube
channels,
and
Facebook
pages
wherein
feedback
from
the
public
is
sent
but
there
are
no
changes
in
SEA’s
strategies.
In
relation
to
political
public
relations,
the
concept
refers
to
“the
management
process
by
which
an
organization
or
individual
actor
for
political
purposes,
through
purposeful
communication
and
action,
seeks
to
influence
and
to
establish,
build,
and
maintain
beneficial
relationships
and
reputations
with
its
key
publics
to
help
support
its
mission
and
achieve
its
goals”
(
Stromback
&
Kiousis,
2011,
p.
8
).
In
the
case
of
SEA,
I
argue
that
it
is
used
as
a
political
public
relations
tool
because
it
helps
the
Assad
regime
in
achieving
some
of
its
goals
like
building
relationships
and
enhancing
its
reputation
inside
and
outside
Syria,
which
are
some
of
the
main
functions
of
public
relations
(
Carroll
&
McCombs,
2003
).
In
his
discussion
of
the
image
cultivation
concept,
Kunczik
limits
the
goals
of
nation-state
public
relations
efforts
to
“improving
the
country’s
image
abroad”
(
Kunczik,
2003,
p.
400
),
yet
in
the
case
of
SEA,
the
national
Syrian
public
is
also
a
main
target.
This
also
corresponds
with
Sriramesh
and
Vercic’s
assertion
that
public
relations
does
have
an
influence
in
“maintaining
a
particular
political
system”
(2003,
p.
5).
Theories
on
political
public
relations
are
rather
new
though
the
practice
is
as
old
as
history
(
Stromback
&
Kiousis,
2011
).
There
is
also
a
clear
overlap
and
convergence
in
the
concepts
with
many
other
terms
like
public
diplomacy
(
Signitzer
&
Coombs,
1992
).
Copeland
and
Potter
assert
that
public
diplomacy
is
increasingly
reliant
on
communication
and
information
technologies
because
they
are
regarded
as
a
“strategic
asset
that
will
play
a
more
definitive
role
in
determining
the
outcome
of
conflicts”
(
Copeland
&
Potter,
2008,
p.
279
).
In
fact,
mediated
communication
in
public
relations
is
regarded
as
“tactical
in
nature”
and
is
one
of
the
three
strategies
used
in
public
relations
aside
from
interpersonal
communication
and
social
activities
(
Sha,
2007,
p.
9
).
Another
overlap
that
exists
is
between
political
public
relations
and
propaganda
as
early
PR
theorists
like
Bernays,
Lippman,
and
Lasswell
admitted
that
persuasion
and
consequently
propaganda
are
among
the
core
elements
of
public
relations
(
Fawkes,
2009,
p.
256
).
For
example,
the
father
of
public
relations,
Bernays
,
once
wrote
that
public
relations
is
built
on
three
elements:
“informing
people,
persuading
people,
or
integrating
people
with
people”
(1952,
p.
12).
In
fact,
public
relations
functions
at
different
levels
including
what
is
termed
as
the
“ideological
PR”
which
is
usually
run
by
a
state
government
such
as
the
case
of
the
Consultancy
Bell
Pottinger
company
that
won
2.3
million
Pounds
to
promote
democracy
in
Iraq
(
L’Etang,
2008,
p.
19
).
This
can
be
linked
to
SEA
whose
objective
is
to
serve
as
an
ideological
PR
for
the
Syrian
government.
Another
dimension
that
is
unique
to
this
study
is
that
SEA
uses
online
public
relations
which
“involves
the
use
of
Internet
technologies
to
manage
communications
and
to
establish
and
maintain
mutually
beneficial
relationship
between
an
orga-
nization
and
its
key
publics
(
Hallahan,
2004,
p.
587
).
The
traditional
applications
of
online
public
relations
include
research,
dissemination
of
information,
queries,
crisis
response,
discussion
and
debate,
and
relationship
building.
As
indicated
above,
the
latter
is
regarded
as
an
“ultimate
purpose”
because
it
assists
in
enhancing
“positive
reputations
(as
a
prerequisite
to
establishing
positive
relationships)”
(
Hallahan,
2004,
p.
591
).
One
of
the
main
reasons
behind
the
use
of
online
and
digital
methods
is
that
they
have
“the
potential
for
developing”
public
relations
with
the
publics
“on
a
larger
basis”
(
Lordan,
2001;
Sweetser,
2011,
p.
309
).
As
SEA
uses
cyber
technologies,
its
goal
is
to
assist
in
Syrian
government
in
its
ongoing
conflict
by
broadening
the
potential
support
as
much
as
possible.
This
study
aims
at
answering
the
following
research
questions:
RQ1:
What
kind
of
online
rhetoric
and
sentiments
are
predominantly
used
by
the
online
public?
RQ2:
What
is
the
tone
of
the
online
reaction
toward
the
videos
posted
by
SEA
on
its
three
YouTube
channels?
5.
Method
&
results
For
the
purpose
of
this
study,
a
webometric
tool
was
used
to
mine
the
comments
taken
from
three
YouTube
channels
(
Thelwall,
2009
):
‘syrianes0
′
,
‘syrianes1
′
,
and
‘SEAOfficialChannel’.
These
three
channels
belong
to
SEA
since
its
Facebook
3
On
its
Twitter
page,
TCA
has
44
followers
with
a
first
tweet
on
23
June
2013.
Plik z chomika:
rc51
Inne pliki z tego folderu:
Gaza Natural Gas - Why Israel Kills for It.zip
(28398 KB)
WikiLeaks Australian Suppression Order.pdf
(313 KB)
US-NSA Pays Israel $500,000 in 2004.pdf
(152 KB)
US-Estonian Cyber Partnership Agreement.pdf
(121 KB)
US-CERT Backoff Point-of-Sale Malware.pdf
(24 KB)
Inne foldery tego chomika:
- NOWE, 2015-01
- NOWE, 2015-02
- NOWE, 2015-03
- NOWE, 2015-04
- NOWE, 2015-05
Zgłoś jeśli
naruszono regulamin