CyberLeveling Logo
When Protest Crosses the Line

When Protest Crosses the Line: What a Recent Cyber Case in Spain Teaches Us

Feb 22, 2026

In February 2026, Spanish authorities announced the arrest of four individuals accused of carrying out distributed denial-of-service (DDoS) attacks against public institutions, political party websites, and government portals.

According to the Guardia Civil, the individuals were responsible for coordinating attacks that temporarily disrupted access to official online services. The investigation unfolded in two phases, with two suspects detained in 2025 and two more arrested in early 2026. Authorities also intervened in associated social media accounts and communication channels used to coordinate activity.

A DDoS attack does not usually involve stealing data. Instead, it overwhelms a website with traffic so legitimate users cannot access it. It is disruptive rather than extractive. Still illegal. Still capable of affecting real people, especially when public services are involved.

Public reporting has not disclosed the names of those arrested, which is common during ongoing legal proceedings.

That is what happened. But the more important question is why this happens at all.


When It Is a Nation-State, It Is Strategy

When foreign governments conduct cyber operations, the motive is typically geopolitical. State-sponsored activity is often designed to:

  • Test infrastructure resilience
  • Send political signals
  • Undermine trust in institutions
  • Influence public discourse
  • Gather intelligence

These operations are strategic. They are calculated, resourced, and tied to national objectives. That is one category of cyber activity.

When It Is Local, the Drivers Are Psychological and Social

In cases like this, the motivations are rarely strategic in the geopolitical sense. They are emotional, social, and identity-driven.

Moral Outrage

Events that trigger public anger can create a powerful emotional response. When people believe institutions have failed, especially during crises, anger can feel justified. If that anger evolves into moral certainty, something shifts internally. The reasoning becomes simple: if the system is wrong, breaking its rules feels acceptable.

Identity and Belonging

Online movements offer something deeply human: belonging. Being part of a group that claims to challenge power can feel empowering. It transforms frustration into collective action. Over time, the cause becomes part of personal identity.

The Online Disinhibition Effect

Anonymity changes behavior. Behind a screen, without face-to-face accountability, empathy decreases and boldness increases. Disrupting a website feels abstract. There is no visible harm. No direct confrontation. That psychological distance makes escalation easier.

The Reward Loop

Successfully disrupting a high-profile target can create recognition within a group. It can create excitement. It can create a sense of power. That emotional reinforcement can become its own motivation.


Social Media Is Not Neutral

Social platforms are not just spaces where these dynamics happen. They can actively amplify them. Foreign adversaries often use social media to spread divisive narratives, amplify emotionally charged content, and encourage distrust in institutions.

Media literacy is not just a personal skill. It is part of national resilience.

How Radicalization Develops

Radicalization rarely starts extreme. It is usually gradual, beginning with consuming increasingly one-sided content, joining closed online communities, and adopting "us versus them" language. Over time, nuance fades.

How to Avoid Falling Into That Trap

  • Protect Your Information Diet: Follow credible sources with different perspectives.
  • Be Careful With Emotional Triggers: If a post makes you instantly furious, pause and ask who benefits.
  • Watch for Dehumanization: Dehumanization is often the turning point that makes harmful action feel justified.
  • Separate Anger From Identity: It is healthy to care about issues; it is dangerous when opposition becomes your identity.
  • Maintain Real-World Anchors: Strong offline relationships reduce vulnerability to extreme online dynamics.
  • Channel Frustration Constructively: Civic participation, public debate, and research create durable impact.

The Bigger Takeaway

Foreign adversaries conduct cyber operations for strategic gain. Local radicalized actors act from anger, identity, and perceived moral justification. Both can cause disruption, but the solutions are different.

The real protection is not fear. It is awareness, resilience, and the discipline to pause before reacting in a world designed to provoke reaction.