IDG News Service - Hacker group Anonymous plans to promote an affiliated political party to attract people who share its civil liberties goals, but do not agree with its methods.
The move appears similar to those by many protest movements that floated legal organizations and parties to represent their case in political, social and legal forums. But the decentralized nature of Anonymous, which claims no central leaders or control structure, will likely make it difficult to get support from all members.
There's some evidence of that already.
Anonymous had earlier said in a video that it will stop hacks and DDoS (distributed denial of service) attacks, and will restructure the system from the inside. "Although these methods were effective in turning the media's attention to civil rights violations when our numbers were small, and we had limited options, we now have the numbers to make a difference legally," it said.
The video posted on July 4 on YouTube did not go down well with some group members. It also did not prevent Antisec, a movement led by Anonymous, from hacking and defacing websites in Turkey on Wednesday.
"This (party) is just another group that wants to support the goals of Anonymous. It isn't going to replace it," said Testudo Smith, a spokesman for the group behind the push to form a political party.
Smith said the group's mission at this point is to set up an advocacy group to provide Anonymous with legal channels with which it can fight for its goals of Internet freedom and civil rights. These legal channels are what Anonymous is most lacking at the moment, he added.
A website set up for the Anonymous Party of America sets out a broad agenda for a political party that is largely focused on U.S. politics, and will work towards transparency and accountability in government, individual rights, and common sense. It calls on "any Congressman or Senator that has any honor left, to resign from their corrupted parties and join our call for and end to the present system".
The group might find it difficult to gain legitimacy if other hackers, under the banner of Anonymous, continue to carry out attacks on the websites and networks of companies and organizations.
Smith admitted that getting all hackers to support his group's goals would be difficult.
"We have no control over Anonymous as a whole. There aren't any leaders, and it would be futile to attempt to control Anonymous," Smith said.
But should the political pressure group gain widespread support, the group has grander plans.
"Eventually, when we have enough support, and if we think that it is the best way to make a political impact, then we will register ourselves," Smith said. That's in the very long term though, he added.
Anonymous has been the target of police actions in some countries, including Turkey, Spain, Italy, and the U.K. It also found itself alienated from the mainstream population that supports Internet freedom and individual rights, but were not in favor of the group's methods.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Gartner Report: A Guide to Gartner's Enterprise Mobile Security Self-Assessment Gartner introduces a model and a Toolkit intended to help mobility and security IT leaders assess their enterprise mobility programs from a security...
- Gartner Report: Containing Mobile Security Risks With the 80/20 Rule IT planners can deliver better mobile protection with higher user satisfaction by segmenting users into risk groups before committing to specific management or...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts