This paper seeks to reflect on the role of groups of individuals with remarkable technical skills and a particular vision of the internet and society often called “activist hackers” or “hacktivists”, especially the collective identified as “Anonymous” in several of the successful collective actions that the world has been experiencing since second half of the XX century to the present day from the perspective of some of the main collective action theories.
The origins of the “hacker” persona and the community
Not a single historical period has involved such a great number of changes in the human way of experiencing our life and relationships as the one between the beginning of the 20th century until today. The boom in those so-called “new technologies”, especially the ones related to electronics and telecommunications, has had a deep impact on our societies, and we are still analyzing their consequencies today.
Until the first half of the 20th century, principally due to the high costs associated with workshop materials and equipment, as well as training, the techology field was somehow restrictued to trained individuals who carried out their activities professionally in private workshops managed by themselves or (more commonly) by some capitalist owner or partner. This fact greatly limited the possible exploitation of the creativity that’s inherent to the human being in relation to technology, since those individuals with higher inventive capacity where limited either by the difficulty of access to education or by the high cost of those tools and materials.
Faraday’s discovery of semiconductor materials in 1923 started to change the game as it allowed the development of electronic technologies, which along with the successive improvements in production and distribution technologies that happened throughout the first half of the 20th century largely solved the problem related to the access to materials.
Large educational institutions in the US such as the Stanford university of the MIT played a big rol in this phenomenon, promoting the creation of laboratories and research groups in electronic and telecom. technologies that are still contributing and offering relevant research every now and then. Precisely, many communities of individuals who were passionate about electronic technologies emerged around those centers whose objective was none other than to explore the limits of a set of technologies that was starting to change the world, not for a professional or commercial interest but rather for pure intellectual curiosity . In most of the cases, those individuals, usually students or young professionals strongly influenced by the counter-culture of the decade in the sixties and seventies, started to call themselves “hackers” and focused their activities around their universities, workshops or laboratories, carrying out small technical projects, even fun “sabotages” on campus as “jokes” by violating some kind of technical restrictions on electronic devices or presenting curios technical innovations built at low cost. In any case, the final goal of the “hackers” back then wasn’t about economic benefit but rather to be able to feel free by expressing theirselves in an artistic way through technology, ultimately obtaining reputation and status within their community.
As more advances broke into the tech sector, especially when the first communication networks were implemented, hacker communities proliferated throughout the world, mostly in the United States and Europe on first, starting to be less and less dependent from specific companies and universities they began to organize themselves in informal groups of friends or even registered associations. Thus, the actions carried out by its members evolved with the context, with the massive implementation of automatic telephone systems and the first national communication networks, the radius of their action was expanded making any institution, company or electronic system a potential target of the curiosity and prank of a hacker. Perhaps one of the most relevant and popular hacker on this early stage was the computer engineer John Thomas Drapper, whose great curiosity along with his advanced knowledge of telephony led him to violate the security of the American telephone network in a very creative way. By performing a small modification to a whistle included as gifrt in cereal packages he was able to set up the administrator mode on the network and act limitless inside. This fact made him become a recognized and admired figure among the rest of the curious minds the “hacker community”, being nicknamed as “Captain Crunch” since then (for the famous cereal brand). His actions did not go unnoticed and in 1972 he was brought to justice accused of telephone fraud, when he was interviewed he stated that he had done no harm to anyone and that what he did was exclusively to satisfy his intellectual curiosity. Due to his actions and the ethics he manifested, “Captain Crunch” is considered as one of the founders of the so-called “hacker culture” or perhaps “hacker ethics”, which would have a strong influence on all kinds of communities created after as well as related “cyber activist” movements througout the 20th century till today.
The ultimate leap from the laboratory to society happened simultaneously in Europe and the united states in the early 80’s. In Europe, perhaps due to cultural influence, the leap was directly made towards politics and activism, with the foundation in 1981 of the “chaos computer club” frequently abbreviated as “CCC” as a group of hackers and journalists dedicated to the study of security in computer and telecommunications systems as well as the study of the relationship between those systems and society itself. That happened within the Berlin newspaper “die tageszeitung”, linked to the German “eco/environmentalist-left”. The CCC is still active and very relevant today as they set up the “Chaos computer conference” every year during winter, they deal with many topics such as counter-surveillance, privacy, computer security and sociology among others.
In the US, the leap was made to years later and this time it was more linked to the popular american culture. With the premiere of the movie “War Games” where a young “hacker” manages to get access to the American system of control of the nuclear arsenal from the comfort of his home thereby generating all sorts of international geopolitical conflicts with the USSR. With “War Games” thousands of people, especially restless young people with access to computers and telephone systems, began to fantasize about the impact of technology on the world and the dangers related to computer (in)security, along with the figure of experts such as the aforementioned “Captain Crunch”, prosecuted for revealing security fflaws in important computer systems, led to the creation of a new figure the “hacker” as a modern romantic hero a figure that is still very present in our collective imaginary.
The growing interest in “hacking” led large numbers of people to embark on a particular adventure, the search for knowledge, formally in high schools and universities, but especially in a more informal or “underground” way through groups of users or networks such as the “bulletin board system” or BBS built on top of the phone network. These last systems offered, for the first t ime in history, enormous facilities for access to information, especially in a new “dark” topic such as cybersecuritty, there was no longer any need for particular contants or a previous network of friends, nor being a member of a particular community or being enrolled on a university, only a personal computer with network access and a few indications easily obtained in computer magazines were necessary.
With BBS, virtual hacker communities appear for the first time, originated entirely inside the network itself by individuals with similar interests, some of those, such as the notorious “Legion of Doom”, became “informal formal” groups structured in a more or less hierarchical way with clear goals. The main objectives pursued by the group were always related to the intellectual curiosity of its members: generating and sharing educational technical material and accessing third party computer systems for fun, violating their security as a challenge, thus demonstrating the technical expertise of the members (of LoD). Almost all of their actions included unauthorized access to third-party computer systems sometimes belonging to large telephone corps, government entities or banks, however , the actions wer elimited solely and exclusively to access, no harm was done on any system and the members who tried to harm or get personal benefit from their actions were kicked out of the “legion”. Although grroups like LoD lacked a formal ideology behind his actions, it can be seen that they were (again) influenced by elements of the american counterculture of the time, such as a desire to break with past generations and the established system this time in the form of technological monopolies, closed knowledge system and such, rejection of war and authoritarism or support for civil rights. 
The constant exposure to the network as well as repeated interactions between members of various online hacker communities made ground for a new subculture of its own, influected by the aforementioned countercultural elements and characterized with a “cyberpunk” aesthetic along with a particular tech jargon originated mainly inside internet sites. 
The hacker manifesto
The crystallization of this “hacker” subculture came with the foundation of the digital magazine (e-zine) called “phrack” where in 1986 the so-called “hacker manifesto” was published by The Mentor 
The manifesto, written by the “hacker” known as “The mentor” shorty after his arrest for computer fraud, collected the keys to a new cultural phenomenon, cultural even ideological framework in which more and more individuals throughout the world felt identified
_This is our world now… the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn’t run by profiteering gluttons, and you call us criminals. We explore… and you call us criminals. We seek after knowledge… and you call us criminals. We exist without skin color, without nationality, without religious bias… and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it’s for our own good, yet we’re the criminals.
Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike._
We can get some insigghts from the manifesto, three key points can be drawn that would set the stones for the development of various hacker organizations from then until now:
- The fight against power structures such as large corporations or an “oppressive state”
- Tolerance among the members of the community (technical skill as status, not race, color, class etc)
- The definition of the movement without borders and without specific (solid) power structures
The statement did not go unnoticed among the hacker community, because in the end, it left their main ideas written, phenomenons that were (more than evident) already happening such as a turn towards left and libertarian movements sometimes even related to anarchism.
The new communities and grroups of hackers that emerged later on were quickly fed on this ideology; in fact, it was quite common to see the manifesto flying around in different forums and sites and perhaps sometimes papers that were a bit related to politics being published as well along with technical ones by hackers. This new ideological framework now prevailing among most communities favored the emergence of a very particula rprofile, still present (and relevant) nowadays: the activist hacker or “hacktivist”. With computer systems present and incresing in many areas hosting information of all kinds, “hacking” techniques applied to cybersecurity could potentially become a powerful instrument at the service of an ideological cause, effective means to a chieve real political actions.
Many hacker groups that emerged from 1986 throughout the world, influenced by this new ideological framework, dedicated much of their activity to cyber activism or “hacker activism”. Many of these new groups focused their activity on publishing digital magazines where they shared material related to hacking techniques, information on restricted software or reverse engineering projects, anti censorship techniques or even anty-system protest manuals and manifests. A very clear example on these groups is found in “international subversive” group and magazine, responsible for the publication of various anty-system related publications, as well as the breach of the security of various dod servers. The group was led by a young hacker called Julian Assange, who a few years later would launch the “WikiLeaks” project. Another clear example was the American group “The cult of the dead cow” or CDC that somehow coined the term “hacktivism” in the late nineties referring to this new type of activism done online. With CDC, hacker communities took another step forward, went from carrying out actions with clear goals defined by the group itself, mainly focused on the network alone to support ongoing actions “in the physical world” even working outside their borders, working “in network” with other virtual and physical groups. This fact could be seen when CDC decided to provide support to the chinese dissident group known as “the Hong Kong blondes” through attacks on Chinese government servers and the production of specific anti-censorship manuals adapted to the Chinese context or the remote training in information encryption techniques and personal security to those individuals less focused on computer hacking. Later on, the CDC would repeat this same scheme, this time supporting Iranian dissidents.  
The internet’s own culture, from hackers to masses
In the 90s, internet arrives to thousands of homes worldwide and that was a huge revolution since it opened a new wide range of possibilities related to communication and generation of virtual communities for the first time in history to a large number of individuals, who where now no longer required to assume the high cost of acquiring knowledge / skill to connect to the network and enjoy it.
Despite the fact that the “hacker” phenomenon was still ongoing and continued to grow in activity powered by this new set of technologies, now the new communications network was hosting content and communities of all kinds, from user forums related to music or painting, networks for scientific research exchange, news sites and so, any user with a minimum knowledge and interest could now connect and access a wide range of digital content from home or from the university. The internet became especially popular among young people in the mid nineties, as they were used to deal with new technologies from their childhood they began to use the network to communicate with each other (with their close friends and family) as well as to connect with new people from other places with whom shared common interests in forums and chat sites. It should be noted that these young people, who may or may not have a technical background and interesting hacking, accessed the internet to satisfy a “mainly” social need, to connect with knowledge and above all to connect with each other.
As internet grew, several “multi-content” sites emerged from this trend, focused on the free exchange of all kinds of content and opinion by their users. One of the first was the Japanese “digital board” known as “2chan” or 2CH created by Hiroyuki Nishimura in 1999. The site was similar to a BBS and was very simple to work with, when accessing the site several categories were listed, some quite specific as “political debate” or “anime” and others very generic something we can call “offtopic” where all kinds of content were accepted. By accessing some of those, the visitor could see a list of the latest messages posted there by the rest of the visitors, who could be identified by a specific user or anonymously
The meme sub-culture
2CH got big popularity among the Japanese youth, yet was virtually unknown in the west. In 2003 a NYC student and active internet user named Christopher Pool aka “moot” founded the English-speaking “chan” portal 4chan.org or 4chan (still active today) based on 2CHs “electronic bulletin board” system.
Users of this new site did not necessarily belong to hacker groups as this wasn’t the sites main goal, however they inherited many of their cultural traits also shared with “the gamming community” such as the usage of nicks and aliases, their particular sense of humor, love for the internet and the view of internet as a public/common good, respect for the status or specific expressions such as XD, LOL, ROFL
4chan got big success among the youth of western societies, mainly due to its big ease of user and a particular system of content distribution, novet at the time. As with 2ch the site presented a general content structure by categories. In 4chan categories such as /b where the home of the “offtopic”. When publishing and presenting the content, the system allowed to publish text and image/video very easily, publications could be made by a nicknamed user or anonymously the later being the default option. Users identified anonymously were given the name anonymous by default. 4chan gave a novel revolutionary approach to the concept of internet forums, implementig its policy of anonymity by default since most of users began to prefer using this identification metehod, thus prioritizing the message and not the user itself.
The true novel contribution to online communities presented by the 4chan system though came with its own publication selection system. Since the space on the main pages of each category was limited, 4chan implemented a very particular system for content selection: When a new post(thread) was generated, it would be placed immediately and without many filters on the main page, allowing other users to view it and show their interest in it by interactions, if the post did not arouse any interest it would be relegated to the last pages to die there, however as it generated more and more interactions it would ensure its presence on the main pages, allowing it to have even even more interactions. So the most successful posts spent entire months on their respective main pages, thus facilitating this their viewing by new users who would in turn feedback the circuit. This particular system along with the anonymity offered by the site, basically allowed the community itself to generate representative “ideas”, “concepts” or “memes” that would last over time.
In the early days of this new site (as well as in other sites of similar characteristics), the system was used to share humorous content, as funny content always tends to spark people interest. This type of content turned out to be very popular on the site, on the main pages, especially in the general /b category you could (and even today) see numerous comical/satirical images referring to some cultural or current political / social event, those images are now called memes. 
The site itself became very popular, appearing to be endowed with a “life of its own” as most of its users were by default identified by “anonymous”. Precisely the anonymity by default as well as the large number of users coming and going to the platform greatly facilitated new incorporations thus increasing the social capital of the community 
The rise of “trolling”
4chan continued to evolve during 2006. The first collective action that arose entirely from this community took place that year. In those years, all kinds of mediatic and public persons began to proliferate on the internet as they used the net to share ideological and cultural content on all political colors, including all kinds of extremism. One of those cases was the Hal Turner’s radio show, which was a radio programused for spreading white-supremacist content in America.
On 4chan those days, in the /b category it was quite common to see some satirical content (memes and such) making fun of all kinds of ideologies, especially those located at the extremes, with the Hal Turner show the 4chan community took a new steap forward. The action began on the /b board with several publications making fun of the radio program, with liks to the program, funny images and so. Those generated great interest (thus then being on the frontpage) and some anonymously identified users began to encourage the rest of the “group” to “intervene” on the program, making anonymous calls with the goal of annoying Hal, causing him to lose the nerve. Thus, some of the most “community engaged” users motivated by those posts began calling the show on a regural basis trying to boycot it with all sorts of jokes. Instead of skipping those calls, Hal got them and argued with the pranksters, thus entering the game even attacking the 4chan community, as you may guess, ths only served to feed back the action, further encouraging the community, thus creating a “snowball effect” adding more and more users to the action. The action got great success and ended up giving rise to a new term used today (it was not the only trolling action identified as that though), “trolling” or set of actions mainly on the internet aimed at boycotting an individual or rganization for prank purposes using all kinds of jokes and tricks. In the action done on Hal Turner, it was also possible to begin to appreciate some link between the “internet culture” adopted by 4chan users and the “hacker community” that already existed on the internet since its origins, seeing how some of the users of 4chan with a technical background, participants also from communities or hacker forums carried out small cyber-attacks on the site of the radio program with the aim of collapsing their systems, thus taking down the broadcast.
The boycott on Hal Turner’s program had a “positive” effect on the new community that had emerged in 4chan, as it was identified as a successful action by their members, who had “worked” together to take on a target on the network, other users from other communities were able to realize the existence of 4chan and its “effects” and potential on the internet. Another effect was that in some way the adoption of ideological aspects previously originated in the “hacker ideology” by this community was reaffirmed, aspects such as the defense of freedom of expression, the use of the internet as a tool for change / protest or the rejection of totalitarianism became a hallmark of this new community. Those old-new values also made room for starting the creation of a “framework” of collective identity in which members of “chan”, certain anti-system profiles, “trolls”, groups of “hackers” or even activists of various ideologies who could share certain common values like anarcho-capitalists, anarchists or ecologists to give examples. And finally, the last of the interesting effects that can be seen, which would become especially relevant from now on, was that of reducing the cost of participation in the given action, since the “protest” attack could be carried out comfortably from home, without require great technical knowledge or great effort.
“Chanology” from the virtual world to the physical
During its beginnings and even these days 4chan was frequently used to post and comment on all kinds of content that appeared on the internet. The convergence in the same platform of users with all sorts of technical skills, some of them with let’s say “a great dedication to the community” and a bit of free time, allowed all kinds of content that was difficult to obtain on other sites to be posted on the platform. In 2008, an internal video owned by the Church of Scientology was leaked to the internet, this was quickly detected by 4chan users and the video was referenced on the platform, sparking big interes by “/ b” users, which led to be enhanced on your cover. In the video, the user could see the actor Tom Cruise talking about how his religion had changed his life, now literally having the power to save the world or something like that. As expected in such a situation, it took very little time for 4chan users to fill the site with all kinds of “memes” and humorous content about it, crossing that content the 4chan border and also spreading it through other forums and private chats, in the form of comments. on news sites or through messaging applications between people who had nothing to do with the platform. Due in large part to the “popularity of video” the Church of Scientology denounced platforms such as “Youtube” where the video was hosted for copyright infringement causing the video to be deleted from the internet. This fact enraged the users in “/ b” in 4chan, who at that time began to use the term “Anonymous” derived from the anonymous user by default to endow themselves with a collective identity.
Due to this, one of the users, anonymously identifying themselves as “Anonymous” made a call for action to the rest of the users, this time in a general way (a call to the internet), not only to the 4chan community to boycott the activities of the Church of Scientology on the Internet and in real world using all possible means. A public demonstration on their headquarters was also set up and called on many sites, being one of the first real life events (demonstration) originated entirely on the internet .
The creation of Anonymous
The call to action was presented along with a video, where a synthetic voice threatened the leaders of Scientology saying Anonymous will destroy their computer systems and boycott their operations in retaliation for their “meanness” and their “lack of ethical values”, the video ended with the well-known declaration: “knowledge is free, we are anonymous, we are legion, we do not forget, we do not forgive”, hinting at its ideology as well as declaring that “Anonymous” was not a closed individual or organization but rather a broad and decentralized collective with an interest in fighting censorship and control over the internet. The action on 4chan was called “Project chanology”. A few days after the publication of the first video, online protest actions began, in the form of angry comments, aggressive phone calls, all sorts of pranks including small acts of electronic sabotage by “hackers”. Some of the members who identified with the community published a second video this time encouraging users to participate in a physical protest in front of several of the organization’s physical headquarters in the United States and the UK. This second call to action was successful on 4chan, however many of the participants who showed interest in attending were concerned (perhaps due to the fear of being “the only ones” to attend the event) about the possible consequences they could suffer. On the other side of the story, we had the Church of Scientology, known for its aggressiveness and its great legal infrastructure. Some of the participants of the site presented the idea of attending the events with their faces covered, and it was then that the idea of wearing a mask was to protect their identity was presented. The “Guy Fawkes” mask got popularity in the subversive and popular film “V for Vendetta”. The idea was widely popularized and on January 10, 2008, numerous protests took place across the United States and Europe in the vicinity of Scientology church centers, where protesters wore “Guy Fawkes” masks now also know as “anonymous masks” and chanted related slogans. with the jargon “hacker” and the 4chan community.
The protests were quite successful overall. And were a good way to consolidate and create new ties between a community that was meeting face to face for the first time. The press, on their side, covered the story, arousing great interest in this new group of activists and “hackers” that emerged on the Internet known as “Anonymous” among society.
At that time, the values and collective identity associated with “Anonymous” had crossed the borders of 4chan to spread through other internet sites and communities, as well as through the new “social networks” (youtube, twitter or Facebook) and had even crossed the digital frontier to set ground for actions in the “physical world”. 4chan ceased to be the HQ of “Anonymous” to become just another social network. After “Project chanology” the collective “Anonymous” that had been in some way validated and now fed with a significant number new of members coming from the “hacker scene” grew up by planning actions in other areas, always related to their ideological basis. Those actions along with actions of “trolling” such as pranks, graffiti or phone calls with “hacktivist” actions such as email leaks or “defacing” (editing the main page of some websites), also called denial of service attacks which consisted of actions aimed to block internet access to certain computer systems through technical procedures (such as sending large number of site requests, like pressing F5 “refresh” many many times). The actions presented and took by “Anonymous” were then commonly defined as operations or “ops”, adopting some military nomenclature/style as a joke, the group thus sought to identify itself as “the internet army”, due to having emerged on the internet and its fight for the defense of information freedom  .
The economic crisis, the rise of “hacktivism” and DDoS attacks
The next years represented the beginning of various phenomena in which we are still immersed or those from which we continue to suffer consequences. The collapse of the financial corporation “Leman Brothers” in 2008 helped start a serious financial crisis that affected most of the big world economies in a serious way, which led to unemployment and poverty with the consequent civil unrest all around the world, especially on the west. Global protest movements such as the 15m / 15o / OccupyWallStreet or even the Arab Spring flourished and expanded rapidly, in part, due to the massive use of new social networks and internet technology in general.
The “Anonymous” collective, which was already experiencing great growth in terms of popularity, participants and technical improvement, played a very important role in facilitating technical means and communication systems for real protests, such as facilitating the development of safe un censored communication networks in protests, offering training in event management on social networks or providing training in techniques to avoid censorship in especially Arab countries, as other communities and structured groups of “activist hackers” have done in the past.
The next and last leap forward, in which we are currently inmmersed in relation to the “hacktivist” actions of the Anonymous collective came with the launch of the well-known portal “WikiLeaks” by the well-known “hacker” Julian Assange along with the leak in Thousands of files by Manning’s related to espionage activities by the American government in 2010 (later Snowden in 2013).
After Manning’s massive leaks of secret cables, several of the Western governments, as well as large corporations, began taking retaliatory action against “WikiLeaks.” The states pushed the telecom operators to block access to the portal and entities such as Visa or Paypal canceled their services with “WikiLeaks”, which posed a problem for the portal since these services were used to receive donations. These events angered the “Anonymous” collective because they interpreted that this time the internet and their rights were the target, the internet was being attacked, the actions perpetrated by large financial platforms and governments represented the antithesis of everything that “Anonymous” identified with. . The recent socio-economic conditions and the status of global protest helped part of the non-technical population not linked to any specific internet forum or to the “hacker” community to show great support on the internet for the “Anonymous” collective, identifying them (anonymous) as some kind of “modern superheroes” who protected the internet and collective freedoms using methods / skills far beyond the reach of the average citizen, part of society began to identify “hacktivism” as a necessary tool for social change in today’s societies.
2010 and 2011 were years of great activity among the “Anonymous” collective, the operations “Payback”, “Avenge Assange” and “Bradical” were proposed on online communities through Twitter accounts, 4chan posts and other forums or videos on youtube. Those operations allowed bringing “hacktivism” closer to a large mass of population with little tech knowledge, by launching the so-called “distributed denial of service attacks” against systems and websites.
This type of attack consisted on collapsing a service on the internet such as a website by sending many connection requests by many users at the same time, the same as a public demonstration but online. Before those events, some groups and communities of “hackers” had already launched denial of service attacks, however, these were almost always given by technical users who used some type of more or less advanced technique or software. For to the presented ops, “hackers” associated with “Anonymous” developed and implemented simple tools such as the so-called “LOIC” software that allowed any user without any technical skill to easily take part in denial of service attacks along with other users at the same time. Those attacks were usually proposed in video and online posts and were coordinated through messaging apps, chat channels on IRC systems or through posts on Twitter and Facebook. Along with the messages very easy to read instructions appeared related to how to download and open those programs. The “cyber protests” in the form of a denial of service attack attracted a large number of users, as the cost of participation was really low compared to the tangible benefit (you could quickly see how the website portals stopped working)so contribution was easily possible.
This fact moved (or rather extended) the protests from the street back to cyber space, turning distributed denial of service attacks into true online protests. The aforementioned operations were highly successful, as the high volume of traffic generated by thousands of “protesters” collapsed the computer systems of sites like Paypal for several hours, several days, and led to the loss of significant amounts of money to these companies.
The actions carried out by “Anonymous” currently have their echo and the collective, or rather individuals who identify with the collective, are still active at present, carried out operations as a protest in favor of freedom of expression and freedoms civilians in places as distant as Catalonia (#opcatalunya from the referendum) or in Lebanon (#oplebanon) or perhaps in the recent events happened in the USA due to the killing of George Floyd.
Who is Anonymous?
Anonymous is not a group that has a particular HQ in a secret bunker. Anonymous is a phenomena that eventually emerges from the internet. Anonymous is any hacker or internet activist that wants to use the name for sending a message while remaining “protected”. Some of the “members of anonymous” don’t have anything with the concept anymore and live totally different lives, but the concept still goes on.
You are anonymous
Causes anda key concepts on the “Anonymous” success
The Internet and other networks prior to it are presented as tools that greatly improve and accelerate the generation of communities, communities both located entirely within the network and physically.
By inspecting the actions took by hacker identified individuals documented here, we can easily understand that the american counterculture and pro freedom and civil rights movements as well as some “antifa” movements played a big role on the origins of internet and internet hacker communities, allowing the conception of “internet as a common good” that needs to be protected among many concerned users.
This vision of the internet was gradually transferred as some kind of “inheritance” to the new communities, both those related to “hacking” and others that had objectives more related to social life. This fact contributed to the creation of a collective identity by unifying users with different profiles and ideological bases in the idea of defending freedom of expression and access to free information on the internet.
New social networks like 4chan, due to a structure that favored the identification of content of interest among anonymous users, enhanced this sense of collective identity and facilitated the mobilization of users from the virtual to the physical world, which in turn favored the creation and maintenance of great social capital among these new communities. Despite the anonymity among users, it could be seen how at least part of the hacker communities had an active presence in these new communities.
With the arrival of massive protests around the world after the 2008 economic crisis, the relationship between various online communities, groups of “hackers” and groups of protesters on the street became evident. Members identified with the newly created “hacktivist” collective “Anonymous” attended the physical demonstrations and non-“hackers” protesters identified with the collective supporting their actions online. Starting in 2010, coinciding with major protests in the main world capitals, members of the “Anonymous” collective pushed for collective denial of service attacks against certain websites. These attacks had a high success rate partly due to the very low cost of participation, the ease of appreciating the results and the ideological reasons associated with the actions themselves, fueled by a global climate of protest.
The actions carried out by the “Anonymous” collective did not go unnoticed and served as a start for many other similar actions that are still appreciated today.   
**To be updated.
-  https://www.cs.utah.edu/~elb/folklore/afs-paper/node3.html
-  unknown(LoD). (1990). The History of The Legion Of Doom. Obtenido de phrack.org: http://phrack.org/issues/31/5.html
-  Jenny Preece, D. M.-K. (2003). History of online communities . Thousand Oaks: Sage Publications, 1023-1027.
-  TheMentor. (1986). The hacker manifesto . Obtenido de phrack.org: http://phrack.org/issues/7/3.html
-  Lunceford, B. (2009). Building Hacker Collective Identity One Text Phile at a Time: Reading Phrack. Media History Monographs, University of South Alabama, 11:2.
-  Granger, S. (1994). THE HACKER ETHIC. Proceedings of the conference on Ethics in the computer age, 7-9.
-  von Busch, O. a. (2006). The Making of a Hacker Culture.Abstract Hacktivism: The Making of a Hacker Culture. Open Mute.
-  Tom Postmes, S. B. (2002 ). Collective Action in the Age of the Internet: Mass Communication and Online Mobilization. Social Science Computer Review, 20, 290–301.
-  Michael Scott Bernstein, A. M.-H. (2011). 4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community. Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media.
-  McDonald, K. (2015). From Indymedia to Anonymous: rethinking action and identity in digital cultures. Information, Communication and Society, 968-982 .
-  Tom Postmes, S. B. (2002 ). Collective Action in the Age of the Internet: Mass Communication and Online Mobilization. Social Science Computer Review, 20, 290–301.
-  McArthur, J. (2008 ). Digital Subculture: A Geek Meaning of Style. Journal of Communication Inquiry,, 58–70.
-  Underwood, P. C. (2009). New Directions in Networked Activism and Online Social Movement Mobilization: The Case of Anonymous and Project Chanology. https://etd.ohiolink.edu/.  (Mejíacitar, 2012)
-  Milan, S. (s.f.). WikiLeaks, Anonymous, and the Exercise of Individuality: Protesting in the Cloud. En S. Milan, Beyond WikiLeaks (págs. 191-208). Springer.
-  Beyer, J. L. (2014). The Emergence of a Freedom of Information Movement: Anonymous, WikiLeaks, the Pirate Party, and Iceland. Journal of Computer-Mediated Communication, Volume 19, 141–154.
-  (AHN, 2003
-  Snow, D. (1988 ). Ideology, Frame Resonance and Participant Mobilization. International social movement research, 197-217.
-  David A. Snow, E. B. (1986). Frame Alignment Processes, Micromobilization, and Movement Participation. American Sociological Review, 464-481.