Large, politically orientated hacker collectives such as Anonymous have targeted a range of actors over a diverse set of issues, all without a consistent set of ethical principles to guide or evaluate their activity. The challenge is that these actions by hackers necessarily use harmful or damaging actions on people or systems as a direct means of furthering their political goals, outside official systems sanctioned by the political community. But this does not inherently dismiss their actions as unjustified. Rather, it will be argued here that such actions can be justified when used to protect people from harm as a form of self-defence. To make this argument, this chapter will create an ethical framework based on the argument that people have a core set of vital interests that need to be protected, including maintaining one’s physical and psychological integrity, autonomy, liberty and privacy. This need for protection creates a right to self-defence, including the right to defend others when they are threatened; and when there are no other actors – whether it is due to a lack of ability, political will or because the state is the source of the threat – there to offer that protection then political hackers can fill the void. It will also argue that the right to be defended from harm is more important than waiting for state actors to offer the protection, and so just because hackers are outside the state does not automatically discount them as ethical actors.
Abbott, T. G., Lai, K. J.,Lieberman, M. R. and Price, E. C. (2007) ‘Browser based attacks on TOR’, Privacy Enhancing Technologies, 4776 (June): 184–99.
Ackerman, B. (2006) Before the Next Attack: Preserving Civil Liberties in the Age of Terrorism, New Haven, CT: Yale University Press.
Adams, J. (2013) ‘Decriminalizing hacktivism: finding space for free speech protests on the internet’, SSRN, 15 December. Available from: https://ssrn.com/abstract=2392945
Agrawal, T., Henry, D. and Finkle, J. (2014) ‘JPMorgan hack exposed data of 83 million, among biggest breaches in history’, Reuters, 3 October. Available from: https://www.reuters.com/article/us-jpmorgan-cybersecurity-idUSKCN0HR23T20141003
Alexander, L. (1976) ‘Self-defence and the killing of non-combatants: a reply to Fullinwider’, Philosophy and Public Affairs, 5(4): 408–15.
Alexopoulou, S. and Pavli, A. (2019) ‘“Beneath this mask there is more than flesh, beneath this mask there is an idea”: anonymous as the (super)heroes of the internet?’, International Journal for the Semiotics of Law, 34: 237–64.
Altman, I. (1976) ‘Privacy: a conceptual analysis’, Environment and Behaviour, 8(1): 7.
Alvarez, A. and Bachman, R. (2007) Violence: The Enduring Problem, London: Sage.
Ambinder, M. and Grady, D. (2013) Deep State: Inside the Government Secrecy Industry, Hoboken, NJ: John Wiley & Sons Inc.
Anderson, L. (2011) ‘Demystifying the Arab Spring: parsing the differences between Tunisia, Egypt, and Libya’, Foreign Affairs, 90(3): 2–7.
Anderson, N. (2011) ‘How one man tracked down Anonymous – and paid a heavy price’, Ars Technica, 9 February. Available from: https://arstechnica.com/tech-policy/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price/
Anonymous (2011) ‘AnonNews.org: everything Anonymous’. Available from: http://anonnews.org/press/item/199/
Aquinas, T. (2002) ‘From Summa Theologiae’, in C. Brown, T. Nardin and N. Rengger (eds), International Relations in Political Thought, Cambridge: Cambridge University Press, pp 213–20.
Arendt, H. (1979) The Origins of Totalitarianism, London: Harcourt, Brace & World.
Ars (2011) ‘Anonymous speaks: the inside story of the HBGary Hack’, ARSTechnica, 16 February. Available from: https://arstechnica.com/tech-policy/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack/
Arthur, C. (2013) ‘LulzSec: what they did, who they were and how they were caught’, The Guardian, 16 May. Available from: https://www.theguardian.com/technology/2013/may/16/lulzsec-hacking-fbi-jail
Atkin, Lord (1932) Donoghue v Stevenson, UKHL 100, 26 May.
Auty, C. (2004) ‘Political hacktivism: tool of the underdog or scourge of cyberspace?’, New Information Perspectives, 56(4): 212–21.
Avant, D. D. (2005) The Market for Force: The Consequences of Privatizing Security, Cambridge: Cambridge University Press.
Baber, H. E. (1987) ‘How bad is rape’, Hypatia, 2(2): 125–38.
Baker, C. E. (1978) ‘Scope of the First Amendment freedom of speech’, UCLA Law Review, 25: 964–90.
Baker, N. (2003) ‘National security versus civil liberties’, Presidential Studies Quarterly, 33(3): 547– 67.
Baldino, D. (2010) Democratic Oversight of Intelligence Services, Sydney: The Federation Press.
Bambauer, D. E. (2013) ‘Privacy versus security’, The Journal of Criminal Law and Criminology, 103(3): 667–83.
Bamford, J. (2013) ‘NSA snooping was only the beginning. Meet the spy chief leading us into cyberwar’, Wired, 12 June. Available from: https://www.wired.com/2013/06/general-keith-alexander-cyberwar/
Bandura, A. (1986) Social Foundations of Thought and Action: A Social Cognitive Theory, Englewood Cliffs, NJ: Prentice Hall.
Bandura, A. (1999) ‘Moral disengagement in the perpetration of inhumanities’, Personality and Social Psychology Review, 3(3): 193–209.
Bangkok Post (2015) ‘International hackers strike’, Bangkok Post, 22 October. Available from: http://www.bangkokpost.com/tech/local-news/739884/anonymous-steps-up-single-gateway-protest
Bansal, A. and Arora, M. (2012) ‘Ethical hacking and social security’, Journal of Radix International Educational and Research Consortium, 1(11): 1–16.
Barber, R. (2001) ‘Hackers profiled: who are they and what are their motivations?’, Computer Fraud and Security, 2(1): 14–17.
Bauman, Z., Bigo, D., Esteves, P., Guild, E., Jabri, V., Lyon, D. et al (2014) ‘After Snowden: rethinking the impact of surveillance’, International Political Sociology, 8: 121–44.
BBC News (2007) ‘Estonia hit by ‘Moscow cyber war’, 17 May. Available from: http://news.bbc.co.uk/1/hi/world/europe/6665145.stm
BBC News (2011) ‘China hit-and-run driver sentenced to six years in jail’, 30 January. Available from: https://www.bbc.co.uk/news/world-asia-pacific-12317756
BBC News (2012) ‘Chinese websites defaced in anonymous attack’, 5 April. Available from: http://www.bbc.co.uk/news/technology-17623939
BBC News (2019) ‘Extinction Rebellion protests: what happened?’, 25 April. Available from: https://www.bbc.co.uk/news/uk-england-48051776
Beaney, W. (1966) ‘The right to privacy and American law’, Law and Contemporary Problems, 31: 253–71.
Bellaby, R. W. (2014) The Ethics of Intelligence: A New Framework, Abingdon: Routledge.
Bellaby, R. W. (2016) ‘Justifying cyber-intelligence?’, Journal of Military Ethics, 15(4): 299–319.
Bellaby, R. W. (2018) ‘Extraordinary rendition: expanding the circle of blame in international politics’, The International Journal of Human Rights, 22(2): 574–602.
Bellaby, R. W. (2021) ‘An ethical framework for hacking operations’, Ethical and Theory Moral Practice, 24: 231–55.
Bellamy, A. J. (2006) Just Wars: From Cicero to Iraq, Cambridge and Malden, MA: Polity Press.
Benn, S. (1971) ‘Privacy, freedom and respect for persons’, in J. R. Pennock and J. W. Chapman (eds), Nomos XIII: Privacy, New York: Atherton Press, pp 1–26.
Berlin, I. (1969) Four Essays on Liberty, Oxford: Oxford University Press.
Berman, M. N. (2011) ‘Two kinds of retributivism’, in R.A. Duff and S. Green (eds), Philosophical Foundations of Criminal Law, New York: Oxford University Press, pp 433–57.
Berman, M. N. (2013) ‘Rehabilitating retributivism’, Law and Philosophy, 32: 83–108.
Beyer, J. L. (2014) Expect Us: Online Communities and Political Marginalisation, Oxford: Oxford University Press.
Beytagh, F. (1975) ‘Privacy and the free press: a contemporary conflict in values’, New York Law Forum, 20(3): 453–514.
Blasi, V. (1977) ‘The checking value in first amendment theory’, American Bar Foundation Research Journal, 3: 521–649.
Blomfield, A. (2007) ‘Estonia calls for NATO cyber-terrorism strategy’, The Telegraph, 18 May. Available from: https://www.telegraph.co.uk/news/worldnews/1551963/Estonia-calls-for-Nato-cyber-terrorism-strategy.html
Bloustein, E. J. (1978) ‘Group privacy: the right to huddle’, in E. Bloustein (ed.), Individual and Group Privacy, New Brunswick, NJ: Transaction Books, pp 123–87.
Bok, S. (1985) ‘Distrust, secrecy and the arms race’, Ethics, 95(3): 712–27.
Bollinger, L. (1986) The Tolerant Society: Freedom of Speech and Extremist Speech in America, Oxford: Oxford University Press.
Bolsin, S., Pal, R., Wilmhurst, P. and Pena, M. (2011) ‘Whistleblowing and patient safety: the patient’s or the profession’s interests at stake?’, Journal of the Royal Society of Medicine, 104: 278–82.
Borsook, P. (2000) Cyberselfish: A Critical Romp through the Terribly Libertarian Culture of High Tech, New York: PublicAffairs.
Bouville, M. (2008) ‘Whistleblowing and morality’, Journal of Business Ethics, 81: 579–85.
Bowie, N. (1982) Business Ethics, Englewood Cliffs, NJ: Prentice-Hall.
Boyle, J. (1997) Shamans, Software and Spleens: Law and the Construction of the Information Society, Cambridge, MA, and London: Harvard University Press.
Braham, M. and van Hees, M. (2012) ‘An anatomy of moral responsibility’, Mind, 121(483): 601–34.
Brandeis, L. and Warren, S. (1980) ‘The right to privacy’, The Harvard Law Review, 4(5): 193–220.
Breckenridge, A. C. (1970) The Right to Privacy, Lincoln: University of Nebraska Press.
Brenkert, G. (2010) ‘Whistle-blowing, moral integrity, and organizational ethics’, in G. Brenkert and T. L. Beauchamp (eds), The Oxford Handbook of Business Ethics, New York: Oxford University Press, pp 563–601.
Breslin, V. andDooley, J. (2002) ‘Whistle blowing v. confidentiality: can circumstances mandate attorneys to expose their clients?’, Georgetown Journal of Legal Ethics, 15(4): 719–40.
Brison, S. J. (1998a) ‘The autonomy defence of free speech’, Ethics, 108(2): 312–39.
Brison, S. J. (1998b) ‘Speech, harm, and the mind-body problem in First Amendment jurisprudence’, Legal Theory, 4(1): 39–61.
Brocklebank, C. (2012) ‘Anonymous hack into Ugandan government websites in protest at their anti-LGBT policies’, Pink News, 15 August. Available from: https://www.pinknews.co.uk/2012/08/15/anonymous-hack-into-ugandan-government-websites-in-protest-at-their-anti-lgbt-policies/
Brooking, E. T. (2015) ‘Anonymous vs. the Islamic State’, Foreign Policy. Available from: http://foreignpolicy.com/2015/11/13/anonymous-hackers-islamic-state-isis-chan-online-war/
Brooks, N. (2004) The Protection of Classified Information: The Legal Framework, Washington, DC: Congressional Research Service.
Brownlee, K. (2012) Conscience and Conviction: The Case for Civil Disobedience, Oxford: Oxford University Press.
Brownlee, K. (2016) ‘The civil disobedience of Edward Snowden: a reply to William Scheuerman’, Philosophy and Social Criticism, 42(10): 965–70.
Bueza, M. (2016) ‘Is Comelec liable for website data leak?’, Rappler, 11 April. Available from: https://www.rappler.com/newsbreak/in-depth/127465-comelec-hackers-liability-website-hacking-data-leak
Bufacchi, V. (2005) ‘Two concepts of violence’, Political Studies Review, 3(2): 193–204.
Butler, J. (2004) Precarious Lives: The Powers of Mourning and Violence, London: Verso.
Cardwell, T. (2011) ‘Ethical hackers: putting on the white’, Network Security, July: 1–13.
Carr, I. and Lewis, D. (2010) ‘Combating corruption through employment law and whistleblower protection’, Industrial Law Journal, 39(1): 1–30.
Carr, L. (1998) ‘Tomboy resistance and conformity: agency in social psychological gender theory’, Gender & Society, 12: 528–53.
Casserly, M. (2015) ‘Who is Anonymous? A short history of hacktivism’, Tech Advisor, 18 November. Available from: https://www.techadvisor.com/feature/internet/what-is-hacktivism-short-history-anonymous-lulzsec-arab-spring-3414409/#ixzz2lt9LEheM
Celikates, R. (2015) ‘Digital publics, digital contestation: a new structural transformation’, in R. Celikates, R. Kreide and T. Wesche (eds),Transformations of Democracy: Crisis, Protest and Legitimation, London: Rowman and Littlefield, pp 159–76.
Celikates, R. (2016) ‘Rethinking civil disobedience as a practice of contestation’, Constellations, 23(1): 37–45.
Cha, A. and Nakashima, E. (2010) ‘Google China cyberattack part of spy campaign’, NBC News, 14 January. Available from: https://www.nbcnews.com/id/wbna34855470
Chambers, S. (2004) ‘Behind closed doors: publicity, secrecy, and the quality of deliberation’, The Journal of Political Philosophy, 12(4): 389–410.
Cheung, A. S. Y. (2009) ‘China internet going wild: cyber-hunting versus privacy protection’, Computer Law and Security Review, 25: 275–79.
China.org.cn (2010) ‘Drunken driver arrested for fatal incident’, 26 October. Available from: http://www.china.org.cn/china/2010-10/26/content_21200529.htm
Chirinos, C. (2022) ‘Anonymous takes revenge on Putin’s brutal Ukraine invasion by leaking personal data of 120,000 russian soldiers’, Fortune, 4 April. Available from: https://fortune.com/2022/04/04/anonymous-leaks-russian-soldier-data-ukraine-invasion/
Christopher, R. (1998) ‘Self-defense and defense of others’, Philosophy and Public Affairs, 27(2): 123–41.
Citron, D. K. (2014) Hate Crimes in Cyberspace, Cambridge, MA: Harvard University Press.
Clark, K. (2010) ‘“A new era of openness?” Disclosing intelligence to Congress under Obama’, Constitutional Commentary, 26: 313–37.
Clark, K. (2011) ‘Congress’s right to counsel intelligence oversight’, University of Illinois Law Review, 2011(3): 915–60.
Clarke, R., Morell, M. J., Stone, G. R., Sunstein, C. R. and Swire, P. (2013) President’s Review Group on Intelligence and Communications Technologies, Liberty and Security in a Changing World. Available from: https://obamawhitehouse.archives.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf
CNN Wire Staff (2011) ‘Hackers target San Francisco’s Rapid Transit System’, CNN, 16 August. Available from: http://edition.cnn.com/2011/US/08/14/california.transit.hack/index.html
Coates, A. J. (1997) The Ethics of War, Manchester: Manchester University Press.
Cohen, C. (1970) ‘Defending civil disobedience’, The Monist, 54(4): 469–87.
Cohen, J. (1993) ‘Freedom of expression’, Philosophy and Public Affairs, 22(3): 207–63.
Coleman, G. (2011) ‘Hacker politics and publics’, Public Culture, 23(3): 511–16.
Coleman, G. (2014) Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous, London: Verso.
Coleman, G. (2022) ‘The public interest hack’, Lima, 8. Available from: https://limn.it/articles/the-public-interest-hack/
Conway, M. (2003) ‘Hackers or terrorists? Why it doesn’t compute’, Computer Fraud and Security, 12: 10–13.
Copp, D. (1991) ‘Responsibility for collective inaction’, Journal of Social Philosophy, 22(2): 71–80.
Critical Art Ensemble (1996) Electronic Civil Disobedience and Other Unpopular Ideas, New York: Autonomedia.
Crosston, M. (2017) ‘The fight for cyber Thoreau: distinguishing virtual disobedience from digital destruction’, in M. Korstanje (ed.), Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities, Hershey, PA: IGI Global, pp 198–219.
Dalton, H. L. (1985) ‘Taking the right to appeal (more or less) seriously’, Yale Law Journal, 95(1): 62–107.
Darby, J. (2016) ‘Political violence: an overview’, in M. Breen-Smyth (ed.), The Ashgate Research Companion to Political Violence, London: Routledge, pp 17–32.
Davis, M. (1996) ‘Some paradoxes of whistleblowing’, Business & Professional Ethics Journal, 15(1): 3–19.
DeGeorge, R. (1981) ‘Ethical responsibilities of engineers in large organizations: the Pinto case’, Business & Professional Ethics Journal, 1(1): 1–14.
DeGeorge, R. (1990) Business Ethics, Basingstoke: Palgrave MacMillan.
Della Porta, D. (1995) Social Movements, Political Violence, and the State: A Comparative Analysis of Italy and Germany, New York: Cambridge University Press.
Delmas, C. (2018a) ‘Is hacktivism the new civil disobedience?’, Raisons Politiques, 69(1): 63–81.
Delmas, C. (2018b) A Duty to Resist: When Disobedience Should be Uncivil ,Oxford: Oxford University Press.
Dempsey, J. X. and Flint, L. M. (2004) ‘Commercial data and national security’, The George Washington Law Review, 72: 1459–502.
Denning, D. (1999) ‘Activism, hacktivism and cyber-terrorism: the internet as a tool for influencing foreign policy’, Global Problem Solving Information Technology and Tools, 10 December. Available from: https://nautilus.org/global-problem-solving/activism-hacktivism-and-cyberterrorism-the-internet-as-a-tool-for-influencing-foreign-policy-2/
Denning, D. (2010) ‘Terror’s web: how the internet is transforming terrorism’, in Y. Jewkes and M. Yar (eds), Handbook of Internet Crime, Cullompton: Willan Publishing, pp 194–213.
Dewey, J. (1980) ‘Force, violence and law’ and ‘Force and coercion’, in J. A. Boydston (ed.), John Dewey, The Middle Works, 1899–1924, Volume 10: 1916–1917, Carbondale, IL: Southern Illinois University Press.
Deyling, R. (1992) ‘Judicial deference and de novo review in litigation over national security information under the Freedom of Information Act’, Villanova Law Review, 37(1): 67–112.
Dittrich, D. and Himma, K. (2006) ‘Hackers, crackers and common criminals’, in H. Bidgoli (ed.), Handbook of Information Security: Information Warfare; Social Issues, Legal and International Issues; and Security Foundations, Vol.2, Hoboken, NJ: Wiley, pp 154–71.
Dorsen, N. and Shattuck, J. H. F. (1974) ‘Executive privilege, the Congress and the courts’, Ohio State Law Journal, 35(1): 1–40.
Douglas, D. M. (2016) ‘Doxxing: a conceptual analysis’, Ethics and Information Technology, 19: 199.
Dragu, T. (2011) ‘Is there a trade-off between security and liberty? Executive bias, privacy protections, and terrorism prevention’, American Political Science Review, 105(1): 64–78.
Duff, A. (2011) ‘Retrieving retributivism’, in M. White (ed.), Retributivism: Essays on Theory and Policy, Oxford: Oxford University Press.
Dumsday, T. (2009) ‘On cheering Charles Bronson: the ethics of vigilantism’, The Southern Journal of Philosophy, 47(1): 49–67.
Dunaway, W. (1996) ‘Incorporation as an interactive process: Cherokee resistance to expansion of the capitalist world-system, 1560–1763’, Sociological Inquiry, 66: 455–70.
Dunfee, T. W. and Maurer, V. G. (1992) ‘Corporate attorney whistle-blowing: devising a proper standard’, Business & Professional Ethics Journal, 11(3): 3–39.
Dworkin, R. (1985) A Matter of Principle, Cambridge, MA: Harvard University Press.
Eckert, A. E. (2020) ‘The changing nature of legitimate authority in the just war tradition’, Journal of Military Ethics, 19(2): 84–98.
The Economist (2011) ‘Leaks must not poison diplomacy’, 27 January. Available from: http://www.economist.com/node/18010593
Edstein, R. A. (1992) ‘Property speech and the politics of distrust’, The Bill of Rights in the Welfare State: A Bicentennial Symposium, 59(1): 41–89.
Eleftheriou-Smith, L. (2015) ‘Anonymous calls for activists to help expose international paedophile networks with “Operation DeathEaters”’, The Independent, 23 January. Available from: https://www.independent.co.uk/news/uk/home-news/anonymous-calls-activists-help-expose-international-paedophile-networks-operation-deatheaters-9998350.html
Elliott, C. (2013) ‘WikiLeaks and the public interest dilemma: a view from inside the media’, in B. Benedetta, A. Hintz and P. McCurdy (eds), Beyond Wikileaks: Implications for the Future of Communications, Journalism and Society, Basingstoke: Palgrave Macmillan, pp 78–84.
Emerson, T. I. (1964) ‘Freedom of association and freedom of expression’, The Yale Law Journal, 74(1): 1–64.
Emerson, T. I. (1970) The System of Freedom of Expression, New York: Vintage.
Emerson, T. I. (1976) ‘Legal foundations of the right to know’, Washington University Law Quarterly, 1: 1–24.
Emspak, J. (2011) ‘Update: Egyptian gov’t web sites under attack’, International Business Times, 26 January. Available from: http://www.ibtimes.com/articles/105329/20110126/update-egyptian-gov-t-web-sites-under-attack.htm
Fabre, C. (2008) ‘Cosmopolitanism, just war tradition and legitimate authority’, International Affairs, 84(5): 963–76.
Fabre, C. (2012) Cosmopolitan War, Oxford: Oxford University Press.
Fabre, C. (2018) Economic Statecraft: Human Rights, Sanctions, and Conditionality, Cambridge, MA: Harvard University Press.
Fairfield, P. (2005) Public/Private, London: Rowman & Littlefield Publishers .
Farsole, A., Kashikar, A. G. and Zunzunwala, A. (2010) ‘Ethical hacking’, International Journal of Computer Applications, 1(10): 14–20.
Farwell, J. and Rohozinski, R. (2011) ‘Stuxnet and the future of cyber war’, Survival: Global Politics and Strategy, 53(1): 24–5.
Fein, H. (2007) Human Rights and Wrongs: Slavery, Terror and Genocide ,Boulder, CO: Paradigm Publishers.
Feinberg, J. (1973) ‘The idea of a free man’, in J. F. Doyle (ed), Educational Judgments: Papers in the Philosophy of Education, London: Routledge, pp 143–65.
Feinberg, J. (1984) Moral Limits of the Criminal Law, Vol.1: Harm to Others, Oxford: Oxford University Press.
Finn, P. (2009) ‘GOP senators drop out of panel inquiry into CIA program’, The Washington Post, 26 September. Available from: http://www.washingtonpost.com/wp-dyn/content/article/2009/09/25/AR2009092503745.html
Fitri, N. (2011) ‘Democracy discourses through the internet communication: understanding the hacktivism for the global changing’, Online Journal of Communication and Media Technologies, 1(2): 1–20.
Fixdall, M. and Smith, D. (1998) ‘Humanitarian intervention and just war’, Mershon International Studies Review, 42(2): 283–312.
Fleddermann, C. (1999) Engineering Ethics, Englewood Cliffs, NJ: Prentice Hall.
FLSnag (2011) ‘I am one Anonymous’, YouTube, 23 July. Available from: http://www.youtube.com/watch?v=aEcvaoDIKtU
Fluri, P. and Born, H. (2003) Parliamentary Oversight of the Security Sector: Principles Mechanisms and Practices, Geneva: DCAF.
Ford, Z. (2012) ‘Anonymous hacks Ugandan government in retaliation for anti-LGBT policies’, Think Progress, 14 August. Available from: https://thinkprogress.org/anonymous-hacks-ugandan-government-in-retaliation-for-anti-lgbt-policies-8d31d15aa874#.cbrcmbr9c
Foucault, M. (1979) Discipline and Punish: The Birth of the Prison, Harmondsworth: Penguin.
Frankfurt, H. (1971) ‘Freedom of the will and the concept of the person’, Journal of Philosophy, 68(1): 5–20.
Fried, C. (1968) ‘Privacy: a moral analysis’, Yale Law Review, 77(1): 475–93.
Fried, C. (1992) ‘The new First Amendment jurisprudence: a threat to liberty’, in G. R. Stone, R. A. Epstein and C. R. Sunstein (eds), The Bill of Rights in the Modern State, Chicago, IL: University of Chicago Press, pp 225–53.
Fuchs, C. (2013) ‘The Anonymous movement in the context of liberalism and socialism’, Interface, 5(2): 345–76.
Fuchs, M. (2006) ‘Judging secrets: the role courts should play in preventing unnecessary secrecy’, Administrative Law Review, 58(1): 131–76.
Gandy, O. (2003) ‘Data mining and surveillance in the post 9/11 environment’, in K. Bell and F. Webster (eds), The Intensification of Surveillance: Crime, Terrorism and Warfare in the Information Age, London and Sterling, VA: Pluto Press, pp 363–84.
Gerwehr, S. and Daly, S. (2006) ‘Al-Qaida: terrorist selection and recruitment’, in D. Kamien (ed.), The McGraw-Hill Homeland Security Handbook, New York: McGraw-Hill, pp 73–89.
Gewirth, A. (1978) Reason and Morality, Chicago, IL: University of Chicago Press.
Glave, J. (1998) ‘Crackers: we stole nuke data’, Wired, 3 June. Available from: https://www.wired.com/1998/06/crackers-we-stole-nuke-data/
Goldschlag, D., Reed, M. and Syverson, P. (1999) ‘Onion routing for anonymous and private internet connections’, Communications of the ACM, 42(2): 39–41.
Golumbia, D. (2013) ‘Cyberlibertarianism: the extremist foundations of “digital freedom”’, Uncomputing. Available from: http://www.academia.edu/4429212/Cyberlibertarianism_The_Extremist_Foundations_of_Digital_Freedom
Goode, L. (2015) ‘Anonymous and the political ethos of hacktivism’, Popular Communication: The International Journal of Media and Culture, 13(1): 74–86.
Gorman, S. (2012) ‘Alert on hacker power play: US official signals growing concern over anonymous group’s capabilities’, The Wall Street Journal, 21 February. Available from: https://www.wsj.com/articles/SB10001424052970204059804577229390105521090
Gray, P. W. (2013) ‘Leaderless resistance, networked organisation, and ideological hegemony’, Terrorism and Political Violence, 25(5): 655–71.
Greenberg, A. (2012a) This Machine Kills Secrets: Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers, New York: Penguin Group.
Greenberg, A. (2012b) ‘Anonymous hackers swat at Syrian government websites in reprisal for internet blackout’, Forbes, 30 November. Available from: http://www.forbes.com/sites/andygreenberg/2012/11/30/anonymous-hackers-swat-at-syrian-government-websites-in-reprisal-for-internet-blackout/#105975b4418f
Greenwald, G. (2011) ‘The leaked campaign to attack Wikileaks and its supporters’, Salon.com, 11 February. Available from: https://www.salon.com/2011/02/11/campaigns_4/
Greenwalt, K. (1989) ‘Free speech justifications’, Columbia Law Review, 89(1): 119–55.
Gregg, N. (1993) ‘“Trying to put first things first”: negotiating subjectivities in a workplace organizing campaign’, in S. Fisher and K. Davis (eds), Negotiating at the Margins: The Gendered Discourses of Power and Resistance, New Brunswick, NJ: Rutgers University Press, pp 172–204.
Griffin, A. (2016) ‘WhatsApp end-to-end encryption update might have made chat app illegal in India’, Independent, 8 April. Available from: http://www.independent.co.uk/life-style/gadgets-and-tech/news/whatsapp-end-to-end-encryption-update-might-have-made-chat-app-illegal-in-india-a6974921.html
Griswold, E. N. (1989) ‘Secrets not worth keeping’, The Washington Post, 15 February. Available from: https://www.washingtonpost.com/archive/opinions/1989/02/15/secrets-not-worth-keeping/a115a154-4c6f-41fd-816a-112dd9908115/
Grofman, B., Owen, G. and Feld, S. (1983) ‘Thirteen theorems in search of the truth’, Theory and Decision, 15: 261–78.
Gross, H. (1971) ‘Privacy and autonomy’, in J. R. Pennock and J. W. Chapman (eds), Privacy: Nomos XIII, New York: Atherton Press, pp 169–81.
Habermas, J. (1996) Between Facts and Norms: Contributions to a Discourse Theory of Law and Democracy, Cambridge: Polity Press.
Halliday, J. (2011) ‘Anonymous hackers breach San Francisco BART transport website’, The Guardian, 15 August. Available from: https://www.theguardian.com/technology/2011/aug/15/anonymous-hackers-breach-bart-website
Halliday, J. and Arthur, C. (2010) ‘Wikileaks: who are the hackers behind Operation Payback?’, The Guardian, 8 December. Available from: https://www.theguardian.com/media/2010/dec/08/anonymous-4chan-wikileaks-mastercard-paypal
Hampson, N. (2012) ‘Hacktivism: a new breed of protest in a networked world’, Boston College International and Comparative Law Review, 35(2): 511–42.
Harding, L. and Leigh, D. (2011) ‘Wikileaks: how US political invective turned on “anti-American” Julian Assange’, The Guardian, 3 February. Available from: https://www.theguardian.com/world/2011/feb/03/wikileaks-julian-assange-us-reaction
Harmon, A. (1999) ‘“Hacktivists” of all persuasions take their struggle to the web’, The New York Times, 31 October. Available from: http://www.nytimes.com/1998/10/31/world/hacktivists-of-all-persuasions-take-their-struggle-to-the-web.html
Harris, C., Pritchard, M. S. and Rabins, M. J. (2005) Engineering Ethics: Concepts and Cases, Belmont, CA: Wadsworth.
Harris, D. (1999) ‘Driving while black and other traffic offences: the Supreme Court and pretextual traffic stops’, The Journal of Criminal Law and Criminology, 87: 544–82.
Harris, D. (2002) ‘Racial profiling revisited: “just common sense” in the fight against terror?’, Criminal Justice, 17: 36–59.
Hausman, D. and McPhereson, M. (1996) Economic Analysis and Moral Philosophy, Cambridge: Cambridge University Press.
Heinze, E. and Steel, B. J. (eds) (2009) Ethics, Authority, and War: Non-State Actors and the Just War Tradition, New York: Palgrave Macmillan.
Hendler, J. (2013) ‘It’s time to reform the Computer Fraud and Abuse Act’, Scientific American, 16 August. Available from: https://www.scientificamerican.com/article/its-times-reform-computer-fraud-abuse-act/
Herman, B. (1996) The Practice of Moral Judgement ,Cambridge, MA: Harvard University Press.
Hern, A. (2015) ‘Anonymous “at war” with Isis, hacktivist group confirms’, The Guardian, 17 December. Available from: https://www.theguardian.com/technology/2015/nov/17/anonymous-war-isis-hacktivist-group-confirms
Hern, A. (2016) ‘Islamic State Twitter account gets a rainbow makeover from Anonymous’, The Guardian, 17 June. Available from: https://www.theguardian.com/technology/2016/jun/17/islamic-state-twitter-accounts-rainbow-makeover-anonymous-hackers
Hersh, M. (2002) ‘Whistle-blowers: heroes or traitors? Individual and collective responsibility for ethical behaviour’, Annual Reviews in Control, 26: 243–62.
Higgins, P. (2013) ‘Critical fixes for the Computer Fraud and Abuse Act’, Electronic Frontier Foundation, 29 January. Available from: https://www.eff.org/deeplinks/2013/01/these-are-critical-fixes-computer-fraud-and-abuse-act
Hill, E. (2011a) ‘Hackers hit Tunisian websites’, Al Jazeera, 3 January. Available from: https://www.aljazeera.com/news/2011/1/3/hackers-hit-tunisian-websites
Hill, E. (2011b) ‘How “rebel” phone network evaded shutdown’, Al Jazeera, 23 April. Available from: http://www.aljazeera.com/indepth/features/2011/04/20114233530919767.html
Himma, K. (2005) ‘Hacking as politically motivated digital civil disobedience: is hacktivism morally justified?’, SSRN, 5 September. Available from: https://ssrn.com/abstract=799545
Himma, K. (2008) ‘Ethical issues involving computer security: hacking, hacktivism, and counterhacking’, in K. Himma and H. Tavani (eds), The Handbook of Information and Computer Ethics, Hoboken, NJ: Wiley.
Hine, K. D. (1998) ‘Vigilantism revisited: an economic analysis of the law of extra-judicial self-help or why can’t Dick shoot Henry for stealing Jane’s truck’, American University Law Review, 47: 1221–55 .
von Hirsch, A. (2000) ‘The ethics of public television surveillance’, in A. Hirsch, D. Garland and A. Wakefield (eds), Ethical and Social Perspectives on Situational Crime Prevention, Oxford: Hart Publishing, pp 59–76.
Hobbes, T. (1985) [1651] Leviathan, London: Penguin Classics.
Hoffman, W. M. (1984) ‘The Ford Pinto’, in W. Hoffman, and J. Moore (eds), Business Ethics: Readings and Cases in Corporate Morality, New York: Wiley, pp 249–60.
Hohfeld, W. N. (1913) ‘Some fundamental legal conceptions as applied in judicial reasoning’, Yale Law Journal, 23: 16–59.
Hollander, J. A. and Einwohner, R. L. (2004) ‘Conceptualising resistance’, Sociological Forum, 19(4): 533–54.
Holmes, O. (2012) ‘Anonymous declares internet war on Syria’, ABC News, 30 November. Available from: https://www.nbcnews.com/tech/tech-news/anonymous-declares-internet-war-syria-flna1c7350148
Holt, T., Freilich, J. and Chermak, S. (2017) ‘Exploring the subculture of ideologically motivated cyber-attackers’, Journal of Contemporary Criminal Justice, 33(3): 212–33.
Horsey, H. R. (1994) ‘The duty of care component of the Delaware business judgment rule’, Delaware Journal of Corporate Law, 19(3): 971–98.
Huazhong, W. (2010) ‘Drunken driver boasts father is a police official’, China Daily, 7 November. Available from: http://www.chinadaily.com.cn/china/2010-10/20/content_11431705.htm
Hunn, D. (2014) ‘How Anonymous hackers changed Ferguson, Mo., protests’, Government Technology, 13 August. Available from: https://www.govtech.com/public-safety/how-computer-hackers-changed-the-ferguson-protests.html
Hunt, G. (1995) Whistleblowing in the Health Service: Accountability, Law and Professional Practice, London: Edward Arnold.
Information Warfare Monitor (2009) ‘Tracking Ghostnet: investigating a cyber espionage network’, 29 March. Available from: http://www.nartv.org/mirror/ghostnet.pdf
Innes, J. (1996) Privacy, Intimacy and Isolation, Oxford: Oxford University Press.
Jackson, W. (2011) ‘BART website breach exposes divisions within hacktivist group’, GCN, 18 August. Available from: https://gcn.com/cybersecurity/2011/08/bart-website-breach-exposes-divisions-within-hacktivist-group/282337/
Jackson, R. and Pisoiu, D. (2018) Contemporary Debates on Terrorism, Abingdon: Routledge.
Jackson, R., Jarvis, L., Gunning, J. and Breen-Smyth, M. (2011) Terrorism: A Critical Introduction, Basingstoke: Palgrave Macmillan.
Jensen, J. V. (1987) ‘Ethical tension points in whistleblowing’, Journal of Business Ethics, 9: 321–8.
Jeter, L. (2003) Disconnected: Deceit and Betrayal at WorldCom, Hoboken, NJ: John Wiley and Sons.
Johnson, R. A. (2003) Whistleblowing: When It Works and Why, Boulder, CO: Lynne Rienner Publishers.
Johnston, L. (1996) ‘What is vigilantism?’, British Journal of Criminology, 36(2): 220–36.
Jordan, T. (2014) Internet, Society and Culture Communicative Practices Before and After the Internet, London: Bloomsbury.
Jordan, T. and Taylor, P. A. (2004) Hackers and Cyberwars: Rebels with a Cause?, London: Routledge.
Jos, P. H., Tompkins, M. E. and Hays, S. W. (1989) ‘In praise of difficult people: a portrait of the committed whistleblower’, Public Administration Review, 49(6): 552–61.
Kang, J. (1998) ‘Information privacy in cyberspace transactions’, Stanford Law Review, 50(4): 1193–294.
Kasachkoff, T. (1998) ‘Killing in self-defense: an unquestionable or problematic defense?’, Law and Philosophy, 17(5–6): 509–31.
Keefe, P. (2005) Chatter: Dispatches from the Secret World of Global Eavesdropping, New York: Random House.
Kennedy, R. (1997) Race Crime and the Law, New York: Pantheon.
King, J. (1998) ‘Information in cyberspace transactions’, Stanford Law Review, 50(4): 1193–294.
Kizza, J. M. (2020) Guide to Computer Network Security, Berlin: Springer.
Klein, A. G. (2015) ‘Vigilante media: unveiling Anonymous and the hacktivist persona in the global press’, Communication Monographs, 82(3): 379–401.
Kleinig, J. (1976) ‘Good Samaritanism’, Philosophy and Public Affairs, 5(4): 382–407.
Kono, D. (2006) ‘Optimal obfuscation: democracy and trade policy transparency’, American Political Science Review, 100: 369–84.
Konvitz, M. R. (1966) ‘Privacy and the law: a philosophical prelude’, Law and Contemporary Problems, 31(2): 272–80.
Krauth, A. (2012), ‘Anonymous in portmanteaupia’, Social Alternatives, 31(2): 27–32.
Krebs on Security (2011) ‘HBGary Federal hacked by Anonymous’, Krebs on Security, 7 February. Available from: https://krebsonsecurity.com/2011/02/hbgary-federal-hacked-by-anonymous/
Kumar, M. (2011) ‘Anonymous open letter to citizens of United States of America!’, The Hacker News, 24 March. Available from: https://thehackernews.com/2011/03/anonymous-open-letter-to-citizens-of.html
Kutz, C. (2007) ‘Causeless complicity’, Criminal Law and Philosophy, 1(2): 289–305.
Lackey, D. P. (1989) The Ethics of War and Peace, London: Prentice Hall International.
Lam, O. (2010) ‘China: my father is Li Gang!’ Global Voices, 22 October. Available from: https://globalvoices.org/2010/10/22/china-my-father-is-li-gang/
Landler, M. and Markoff, J. (2007) ‘In Estonia, what may be the first war in cyberspace’, The New York Times, 28 May. Available from: https://www.nytimes.com/2007/05/28/business/worldbusiness/28iht-cyberwar.4.5901141.html
Laufer, R. and Wolfe, M. (1977) ‘Privacy as a concept and social issue’, The Journal of Social Issues, 33(3): 22–42.
Laugerud, S. (2021) ‘Narrating the harm of rape: how rape victims invoke different models of psychological trauma’, BioSocieties, 16: 22–40.
Lee, H. (2018) ‘A new societal self-defense theory of punishment: the rights-protection theory’, Philosophia, 46: 337–53.
Lefkowitz, D. (2007) ‘On a moral right to civil disobedience’, Ethics, 117(2): 202–33.
Leigh, D. and Harding, L. (2011) WikiLeaks: Inside Julian Assange’s War on Secrecy, London: Guardian Books.
Lenard, N. (2012) ‘Anonymous takes on Syrian government’, The Salon, 30 November. Available from: https://www.salon.com/2012/11/30/anonymous_takes_on_syrian_government/
Lennerfors, T. (2007) ‘The transformation of transparency: on the act on public procurement and the right to appeal in the context of the war on corruption’, Journal of Business Ethics, 73(4): 381–90.
Lepora, C. and Goodin, R. (2013) On Complicity and Compromise, Oxford: Oxford University Press.
Lever, A. (2005) ‘Why racial profiling is hard to justify: a response to Risse and Zeckhauser’, Philosophy and Public Affairs, 33(1): 94–110.
Leverick, F. (2006) Killing in Self-Defence, Oxford: Oxford University Press.
Levy, S. (1984) Hackers: Heroes of the Computer Revolution, New York: Doubleday.
Lewis, D. (1989) ‘Mill and Milquetoast’, Australasian Journal of Philosophy, 67: 152–71.
Lewis, J. (2002) ‘Assessing the rise of cyber terrorism, cyber war and other cyber threats’, Centre for Strategic and International Studies. Available from: https://csis-website-prod.s3.amazonaws.com/s3fs-public/legacy_files/files/media/csis/pubs/021101_risks_of_cyberterror.pdf
Li, X. (2013) ‘Hacktivism and the First Amendment: drawing the line between cyber protests and crime’, Harvard Journal of Law & Technology, 7(1): 301–30.
Lindley, R. (1986) Autonomy, Basingstoke: Palgrave Macmillan.
List, C. and Goodin, R. E. (2001) ‘Epistemic democracy: generalizing the Condorcet jury theorem’, Journal of Political Philosophy, 9: 277–306.
List, C., Elsholtz, C. and Seeley T. D. (2009) ‘Independence and interdependence in collective decision making: an agent-based model of nest-site choice by honeybee swarms’, Philosophical Transactions of the Royal Society B, 364: 755–62.
Littauer, D. (2013) ‘Anonymous hacks Nigeria’s government website over anti-gay bill’, LGBTQ Nation, 5 July. Available from: http://www.lgbtqnation.com/2013/07/anonymous-hacks-nigerias-government-website-over-anti-gay-bill/
Little, C. B. and Sheffield, C. P. (1983) ‘Frontiers and criminal justice: English private prosecution societies and American vigilantism in the eighteenth and nineteenth centuries’, American Sociological Review, 48(6): 796–808.
Liu, A. (2004) The Laws of Cool: Knowledge Work and the Culture of Information, Chicago, IL: University of Chicago Press.
Locke, J. (1988)[1689] Two Treatises of Government, Cambridge: Cambridge University Press.
Lopez, K. J. (2010) ‘On this Sunday outrage’, National Review, 29 November. Available from: https://www.nationalreview.com/corner/sunday-outrage-kathryn-jean-lopez/
Loveluck, B. (2020) ‘The many shades of digital vigilantism: a typology of online self-justice’, Global Crime, 21(3–4): 213–41.
Lowes, D. E. (2006) The Anti-Capitalist Dictionary: Movements, Histories and Motivations, Halifax, Canada: Fernwood Publishing Ltd.
Lu, D. (2015) ‘When ethical hackers can’t compete’, The Atlantic, 8 December. Available from: https://www.theatlantic.com/technology/archive/2015/12/white-hat-ethical-hacking-cybersecurity/419355/
Luban, D. (2005) ‘Liberalism, torture and the ticking bomb’, Virginia Law Review, 9(6): 1425–61.
Ludlow, P. (2013) ‘Aaron Swartz was right’, The Chronical of Higher Education, 25 February. Available from: https://www.chronicle.com/article/Aaron-Swartz-Was-Right/137425
Lynch, W. and Kline, R. (2000) ‘Engineering practice and engineering ethics’, Science, Technology, & Human Values, 25(2): 195–225.
Lyon, D. (1994) The Electronic Eye: The Rise of Surveillance Society, Cambridge: Polity Press.
Mack, E. (1980) ‘Bad Samaritanism and causation of harm’, Philosophy and Public Affairs, 9(3): 230–59.
Mahat, R. (2008) ‘A carrot for the lawyer: providing economic incentives for in-house lawyers in a Sarbanes-Oxley Regime’, The Georgetown Journal of Legal Ethics, 21(3): 913–34.
Manion, M. and Goodrum, A. (2000) ‘Terrorism or civil disobedience: towards a hacktivist ethic’, Computers and Society, 30(2): 14–19.
Mansfield-Devine, S. (2011a) ‘Hacktivism: assessing the damage’, Network Security, 8: 5–13.
Mansfield-Devine, S. (2011b) ‘Anonymous: serious threat or mere annoyance?’, Network Security, 11(1): 4–10.
Markel, D. (2011) ‘What might retributive justice be? An argument for the confrontational conception of retributivism’, in M. White (ed), Retributivism: Essays on Theory and Policy, Oxford: Oxford University Press, pp 49–72.
Martin, R. (1970) ‘Civil disobedience’, Ethics, 80(1): 123–39.
Marx, G. (1998) ‘Ethics for the new surveillance’, The Information Society, 14(3): 171–85.
Marx, G. (2004) ‘Some concepts that may be useful in understanding the myriad forms and contexts of surveillance’, Intelligence and National Security, 19(2): 234.
Mazzetti, M. (2015) ‘CIA report found value of brutal interrogation was inflated’, The New York Times, 20 January. Available from: http://www.nytimes.com/2015/01/21/world/cia-report-found-value-of-brutal-interrogation-was-inflated.html?_r=1
McAdam, D. (1982) Political Process and the Development of Black Insurgency ,Chicago, IL: University of Chicago Press.
McAfee and the Center for Strategic and International Studies (2013) The Economic Impact of Cybercrime and Cyber Espionage, July. Available from: http://csis.org/files/publication/60396rpt_cybercrime-cost_0713_ph4_0.pdf
McArthur, R. (2001) ‘Reasonable expectations of privacy’, Ethics and Information Technology, 3: 123–8.
McCahill, M. (1998) ‘Beyond Foucault: towards a contemporary theory of surveillance’, in C. Norris, J. Moran, and G. Armstrong (eds), Surveillance, Closed-Circuit Television and Social Control, Aldershot: Ashgate, pp 41–65.
McCormick, T. (2013) ‘Anthropology of an idea: hacktivism’, Foreign Policy, 200: 24–5.
McGlynn, J. and Richardson, B. K. (2014) ‘Private support, public alienation: whistle-blowers and the paradox of social support’, Western Journal of Communication, 78(2): 213–37.
McGoogan, C., Titcomb, J. and Krol, C. (2017) ‘What is WannaCry and how does ransomware work?’, The Telegraph, 18 May. Available from: http://www.telegraph.co.uk/technology/0/ransomware-does-work/
McMahan, J. (1994) ‘Innocence, self-defence and killing in war’, The Journal of Political Philosophy, 2(1): 193–221.
McMahan, J. (2006) ‘On the moral equality of combatants’, Journal of Political Philosophy, 14(4): 377–93.
McPherson, R., Houmansadr, A. and Shmatikov, V. (2016) ‘Covertcast: using live streaming to evade internet censorship’, Proceedings on Privacy Enhancing Technologies, 3: 212–25.
McReynolds, P. (2015) ‘How to think about cyber conflict involving non-state actors’, Philosophy and Technology, 28: 427–48.
Menn, J. (2019) Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World, New York: Public Affairs.
Merton, R. (1968) Social Theory and Social Structure, New York: Free Press.
metac0m (2003) ‘What is hacktivism 2.0’, The Hacktivist, December. Available from: http://edshare.soton.ac.uk/8762/2/whatishacktivism.pdf
Metz, C. (2008) ‘Anonymous hacks Sarah Palin’s Yahoo! Account’, The Register, 17 September. Available from: http://www.theregister.co.uk/2008/09/17/anonymous_hacks_sarah_palin/
Meyers, D. T. (1995) ‘Rights in collision: a non-punitive compensatory remedy for abusive speech’, Law and Philosophy, 14: 203–43.
Mill, J. S. (1968) On Liberty, in M. Cowling (ed.) Selected Writings of John Stuart Mill, New York: The New American Library, p 121.
Mill, J. S. (1991) On Liberty, ed. John Gray, Oxford: Oxford University Press.
Mill, J. S. (2005) On Liberty, New York: Cosimo.
Miller, A. (1971) The Assault on Privacy: Computers, Databanks and Dossiers, Michigan: University of Michigan Press.
Milone, M. G. (2002) ‘Hacktivism: securing the national infrastructure’, The Business Lawyer, 58(1): 383–413.
Milton, J. (1968 [1644]) Areopagitica, New York: New York University Press.
Modighaini, A. and Rachel, F. (1995) ‘The role of interaction sequences and the timing of resistance in shaping obedience and defiance to authority’, Journal of Social Issues, 51: 107–23.
Monagham, H. P. (1977) ‘Of liberty and property’, Cornell Law Review, 62(1): 404–44.
Monroe, A. and Malle, B. (2014) ‘Free will without metaphysics’, in A. R. Mele (ed.), Surrounding Free Will, New York: Oxford University Press, pp 25–48.
Montague, P. (1989) ‘The morality of self-defense: a reply of Wasserman’, Philosophy and Public Affairs, 18(1): 81–9.
Moore, A. (2011) ‘Privacy, security, and government surveillance: Wikileaks and the new accountability’, Public Affairs Quarterly, 25(2): 141–56.
Moore, M. (2010) Placing Blame: A Theory of Criminal Law, Oxford: Oxford University Press.
Morris, A. (1984) The Origins of the Civil Rights Movement, New York: Free Press.
Morris, K. (2013) ‘Anonymous has finally released the names of Rehtaeh Parsons’s alleged rapists’, Daily Dot, 24 July. Available from: http://www.dailydot.com/news/rehtaeh-parsons-rapists-names-identity-revealed-anonymous/
Morrissey, D. (1997) Disclosure and Secrecy: Security Classification Executive Orders, Columbia: AEJMC.
Murphy, J. G. (2007) ‘Legal moralism and retribution revisited’, Criminal Law and Philosophy, 1: 5–20.
Murphy, S. (2011) ‘Agents provocateurs: hacktivists have noisily exposed the sorry state of internet security’, New Scientist, 10 September.
Musil, S. (2012) ‘Anonymous declares war on Syrian government’, CNet, 29 November. Available from: https://www.cnet.com/tech/services-and-software/anonymous-declares-war-on-syrian-government-web-sites/
Nagel, T. (1986) The View from Nowhere, Oxford: Oxford University Press.
Nagel, T. (1995) ‘Personal rights and public space’, Philosophy and Public Affairs, 24: 83–107.
Naughton, J. (2000) A Brief History of the Future: Origins of the Internet, London: Phoenix.
Near, J. and Miceli, M. (1995) ‘Effective whistleblowing’, Academy of Management Review, 20(3): 679–708.
The New York Times (2010) ‘A note to readers: the decision to punish diplomatic documents’, 28 November. Available from: https://www.nytimes.com/2010/11/29/world/29editornote.html
Nobles, R. and Schiff, D. (2002) ‘The right to appeal and workable systems of justice’, The Modern Law Review, 65(5): 676–701.
Norman, R. (1995) Ethics, Killing and War, Cambridge: Cambridge University Press.
Norton, Q. (2012) ‘How Anonymous picks targets, launches attacks, and takes powerful organizations down’, Wired, 3 July. Available from: https://www.wired.com/2012/07/ff-anonymous/
Nozick, R. (1974) Anarchy, State, and Utopia, New York: Basic Books.
Nussbaum, M. (2000) Women and Human Development: The Capabilities Approach, Cambridge: Cambridge University Press.
Ochi, M. (2016) ‘Gravity threshold before the International Criminal Court: an overview of the court’s practice’, International Crimes Database Brief, 19 January: 1–16.
Olson, P. (2011) ‘Anonymous hacks BART after cellphone blockade’, Forbes, 15 August. Available from: https://www.forbes.com/sites/parmyolson/2011/08/15/anonymous-hacks-bart-after-cellphone-blockade/
O’Malley, G. (2013) ‘Hacktivism: cyber-activism or cyber-crime’, Trinity College Law Review, 16: 137–60.
O’Neil, L. (2015) ‘Anonymous plans to “unhood” 1,000 Ku Klux Klan members online’, CBC News, 29 October. Available from: https://www.cbc.ca/news/trending/anonymous-plans-to-reveal-the-identities-of-1-000-kkk-members-1.3295523
Ong, G. (2016) ‘IT grad, 23, arrested for Comelec website hack’, The Philippine Star, 22 April. Available from: http://www.philstar.com/headlines/2016/04/22/1575594/it-grad-23-arrested-comelec-website-hack
Orend, B. (2006) The Morality of War, Calgary: Broadview Press.
Otsuka, M. (1994) ‘Killing the innocent in self-defense’, Philosophy and Public Affairs, 23(1): 74–94.
Owen, T. (2015) Disruptive Power: The Crisis of the State in the Digital Age, Oxford: Oxford University Press.
Padmanabhan, S. (2012) ‘Hacking for Lulz1: employing expert hackers to combat cyber terrorism’, Vanderbilt Journal of Entertainment and Technology Law, 15(1): 191–226.
Paine, S. (2000) Endangered Spaces: Privacy, Law and the Home, CAMC Publications.
Pattison, J. (2018) The Alternatives to War: From Sanctions to Nonviolence ,Oxford: Oxford University Press.
Pedhazur, A. and Perliger, A. (2003) ‘The causes of vigilant political violence: the case of Jewish settlers’, Civil Wars, 6(3): 9–30.
Perlroth, N. (2014) ‘Anonymous hackers’ efforts to identify Ferguson police officer create turmoil’, The New York Times, 14 August. Available from: https://www.nytimes.com/2014/08/15/us/ferguson-case-roils-collective-called-anonymous.html
Pfaff, T. and Tiel, J. (2004) ‘The ethics of espionage’, The Journal of Military Ethics, 3(1): 1–15.
Phillips, R. (1984) War and Justice, Norman: University of Oklahoma Press.
Poeter, D. (2011) ‘Anonymous BART protest shuts down several underground stations’, PCMag, 16 August. Available from: https://uk.pcmag.com/news/111848/anonymous-bart-protest-shuts-down-several-underground-stations
Pogge, T. (1991) ‘Coercion and violence’, in J. Brady and N. Garver (eds), Justice, Law and Violence, Philadelphia, PA: Temple University Press, pp 65–9.
Polyviou, P. (1982) Search and Seizure: Constitutional and Common Law ,London: Duckworth.
Posner, G. (2017) ‘China’s secret cyberterrorism’ (updated), The Daily Beast, 14 July. Available from: http://www.thedailybeast.com/articles/2010/01/13/chinas-secret-cyber-terrorism.html
Post, R. (1991) ‘Racist speech, democracy, and the First Amendment’, William and Mary Law Review, 32: 267–327.
Post, R. (1993) ‘Managing deliberation: the quandary of democratic dialogue’, Ethics, 103: 654–78.
Pozen, D. (2016) ‘Privacy-privacy tradeoffs’, The University of Chicago Law Review, 83(1): 221–47.
Prasdas, A. and Prasad, P. (1998) ‘Everyday struggles at the workplace: the nature and implications of routine resistance in contemporary organizations’, Research in the Sociology of Organizations, 15: 225–57.
Profitt, N. J. (1996) ‘“Battered women” as “victims” and “survivors”: creating space for resistance’, Canadian Social Work Review/Revue Canadienne de Service Social, 13(1): 23–38.
Purshouse, J. (2019) ‘Paedophile hunters: how citizen-led policing is putting people’s lives at risk’, The Conversation, 22 January. Available at: https://theconversation.com/paedophile-hunters-how-citizenled-policing-is-putting-peoples-lives-at-risk-110006
Raggi, R. (1977) ‘An independent right to freedom of association’, Harvard Civil Rights-Civil Liberties Law Review, 12(1): 1–30.
Rangarajan, L. N. (1998) ‘Diplomacy, states and secrecy in communications’, Diplomacy & Statecraft, 9(3): 18–24.
Rawls, J. (1971) Theory of Justice, Cambridge, MA: Harvard University Press.
Rawls, J. (1977) Theory of Justice, Cambridge: Cambridge University Press.
Rawls, J. (2007) Lectures on the History of Political Philosophy, ed. Samuel Freeman, Cambridge, MA: Harvard University Press.
Rawls, J. (2009) ‘The justification of civil disobedience’, in A. Kavanagh and J. Oberdiek (eds), Arguing about Law, Abingdon: Routledge, pp 244–53.
Raz, J. (1986) The Morality of Freedom ,Oxford: Clarendon Press.
Razmetaeva, Y. (2014) ‘The right to resist and the right to rebellion’, Jurisprudence, 21(3): 758–84.
Reed, M. G.,Syverson, P. and Goldschlag, D. (1998) ‘Anonymous connections and onion routing’, IEEE Journal on Selected Areas in Communications, 16(4): 482–94.
Reiman, J. H. (1976) ‘Privacy, intimacy, and personhood’, Philosophy and Public Affairs, 5(1): 26–44.
Rescher, N. (1972) Welfare: The Social Issue in Philosophical Perspective ,Pittsburgh, PA: University of Pittsburgh Press.
Reynolds, P. (2015) ‘How to think about cyber conflicts involving non-state actors’, Philosophy and Technology, 28(3): 427–48.
Richmond, S. (2011) ‘Millions of internet users hit by massive Sony PlayStation data theft’, The Telegraph, 26 April. Available from: https://www.telegraph.co.uk/technology/sony/8475728/Millions-of-internet-users-hit-by-massive-Sony-PlayStation-data-theft.html
Robinson, M. (2000) ‘The construction and reinforcement of the myth of race crime’, Journal of Contemporary Criminal Justice, 16: 133–56.
Robinson, T. (1995) ‘Gentrification and grassroots resistance in San Francisco’s Tenderloin’, Urban Affairs Review, 30: 382–513.
Rogers, A. (2014) ‘What Anonymous is doing in Ferguson’, Time, 21 August. Available from: http://time.com/3148925/ferguson-michael-brown-anonymous/
Rosenbaum, H. J. and Sederberg, P. C. (1974) ‘Vigilantism: an analysis of establishment violence’, Comparative Politics, 6(4): 541–70.
Rosenbaum, T. (2004) The Myth of Moral Justice, London: HarperCollins.
Rothschild, J. and Miethe, T. (1999) ‘Whistle-blower disclosures and management retaliation’, Work and Occupations, 26(1): 107–28.
RT.Com (2014) ‘#TangoDown: Anonymous close Cleveland City govt website over 12yo shooting death’, RT.com, 24 November. Available from: https://www.rt.com/usa/208255-anonymous-cleveland-police-shooting/
Ruffin, O. (2001) ‘The hacktivismo declaration’, Cult of the Dead Cow, 4 July. Available from: https://www.digitalmanifesto.net/manifestos/197/
Sachan, A. (2012) ‘Countering terrorism through dark web analysis’, Computing Communication & Networking Technologies ,Third International Conference.
Sagar ,R. (2016) Secrets and Leaks: The Dilemma of State Secrecy ,Princeton, NJ: Princeton University Press.
Sanger, D. (2012) ‘Obama order sped up wave of cyberattacks against Iran’, The New York Times, 1 June. Available from: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html
Sankowski, E. (1992) ‘Blame and autonomy’, American Philosophical Quarterly, 29(3): 291–9.
Sauter, M. (2015) The Coming Swarm: DDoS Actions, Hacktivism, and Civil Disobedience on the Internet, New York: Bloomsbury.
Scanlon, T. (1972) ‘A theory of freedom of expression’, Philosophy and Public Affairs, 1: 204–26.
Scanlon, T. (1979) ‘Freedom of expression and categories of expression’, University of Pittsburgh Law Review, 40: 519–50.
Scanlon, T. M. and Daney, J. (2000) ‘Intention and permissibility’, Supplement to the Proceedings of the Aristotelian Society, 74(1): 301–17.
Schauer, F. (1993) ‘The phenomenology of speech and harm’, Ethics, 103: 635–53.
Scheuerman, W. (2016) ‘Digital disobedience in the law’, New Political Science, 38(3): 299–314.
Schneier, B. (2006) Beyond Fear: Thinking Sensibly about Security in an Uncertain World, Berlin: Springer.
Schwartz, B. (1961) ‘The Supreme Court: October 1959 term’, Michigan Law Review, 593: 403–30.
Scott, J. (1985) Weapons of the Weak: Everyday Forms of Peasant Resistance, New Haven, CT: Yale University Press.
Serracino-Inglott, P. (2013) ‘Is it OK to be an Anonymous?’, Ethics & Global Politics, 6(1): 217–44.
Shapiro, I. (2003) The Moral Foundations of Politics, New Haven, CT: Yale University Press.
Sheoran, P. and Singh, S. (2014) ‘Applications of ethical hackers’, International Journal of Enhanced Research in Science Technology & Engineering, 3(5): 112–14.
Shils, E. (1966) ‘Privacy: its constitution and vicissitudes’, Law and Contemporary Problems, 31(2): 281–306.
Shirky, C. (2008) Here Comes Everybody, New York: Penguin Press.
Shotland, R. L. (1976) ‘Spontaneous vigilantes’, Society, 13(3): 30–2.
Silberstein, S. (2004) War of Worlds: Language, Politics and 9/11, London: Routledge.
Simitis, S. (1987) ‘Reviewing privacy in an information age’, University of Pennsylvania Law Review, 35(3): 707–46.
Singer, P. (1972) ‘Famine, affluence, and morality’, Philosophy and Public Affairs, 7(2): 229–43.
Singer, P. (2003) Corporate Warriors: The Rise of the Privatized Military Industry, Ithaca: Cornell University Press.
Slim, H. (2002) Killing Civilians: Methods, Madness and Morality in War, Basingstoke: Palgrave.
Smallridge, J., Wagner, P. and Crowl, J. (2016) ‘Understanding cyber-vigilantism: a conceptual framework’, Journal of Theoretical and Philosophical Criminology, 8(1): 57–70.
Smith, A. (1976) The Theory of Moral Sentiments, Oxford: Clarendon Press.
Smith, M. B. E. (1973) ‘Is there a prima facie obligation to obey the law?’, The Yale Law Review, 82(5): 950–76.
Smith, P. (1990) ‘The duty to rescue and the slippery slope problem’, Social Theory and Practice, 16(1): 19–41.
Solove, D. (2004) The Digital Person: Technology and Privacy in the Information Age, New York: New York University Press.
Solove, D. (2007a) ‘I’ve got nothing to hide and other misunderstandings of privacy’, San Diageo Law Review, 44: 745–72.
Solove, D. (2007b) The Future of Reputation: Gossip, Rumor, and Privacy on the Internet, London: Yale University Press.
Sommer, P. and Brown, I. (2011) ‘Reducing systemic cybersecurity risk’, Organisation for Economic Cooperation and Development, 14 January. Available from: http://ssrn.com/abstract=1743384
Staff, R. (2014) ‘JPMorgan hack exposed data of 83 million, among biggest breaches in history’, Reuters, 3 October. Available from: https://www.reuters.com/article/us-jpmorgan-cybersecurity-idUSKCN0HR23T20141003
Steger, M. (2003) Judging Nonviolence: The Dispute between Realists and Idealists, London: Routledge.
Stephey, M. J. (2008) ‘Sarah Palin’s email hacked’, Time, 17 September. Available from: http://content.time.com/time/politics/article/0,8599,1842097,00.html
Sterling, T. (2002) The Enron Scandal, New York: Nova Science Publishing.
Stiglitz, J. (1999) ‘On liberty, the right to know, and public discourse: the role of transparency in public life’, in M. J. Gibny (ed.), Globalising Rights: Oxford Amnesty Lecture 1999, pp 1–32.
Stone, J. (2014) ‘Tamir rice shooting inspires anonymous hack on Cleveland websites’, International Business Times, 24 November. Available from: http://www.ibtimes.com/tamir-rice-shooting-inspires-anonymous-hack-cleveland-websites-1728681
Stone, M. (2011) ‘Operation BART: Anonymous protests San Fran cell phone censorship’, Examiner.com, 14 August. Available from: http://www.examiner.com/anonymous-in-national/operation-bart-anonymous-protests-san-fran-cell-phone-censorship
Strauss, D. (1991) ‘Persuasion, autonomy, and freedom of expression’, Columbia Law Review, 91: 334–1.
Strossen, N. (1990) ‘Regulating racist speech on campus: a modest proposal?’, Duke Law Journal, 1990: 484–572.
Sunstein, C. (2005) Laws of Fear: Beyond the Precautionary Principle, Cambridge: Cambridge University Press.
Tan, L. (2016) ‘Website claims: registered voters’ sensitive data easily searchable’, CNN Philippines, 21 April. Available from: http://cnnphilippines.com/news/2016/04/21/Comelec-hack-data-registered-Filipino-voters.html
Tanczer, L. (2017) ‘The terrorist – hacker/hacktivist distinction: an investigation of self-identified hackers and hacktivists’, in M. Conway, L. Jarvis, O. Lehane, S. Macdonald and L. Nouri (eds), Terrorists’ Use of the Internet, Amsterdam: IOS Press, pp 77–92.
Taylor, P. and Harris, J. (2006) ‘Hacktivism’, in H. Bidgoli (ed.), Handbook of Information Security: Information Warfare; Social Issues, Legal and International Issues; and Security Foundations, Vol.2, Hoboken, NJ: Wiley, pp 172–82.
Thomas, D. (2002) Hacker Culture ,Minneapolis: University of Minnesota Press.
Thompson, D. F. (1999) ‘Democratic secrecy’, Political Science Quarterly, 114(2): 181–93.
Thompson, P. B. (2001) ‘Privacy, secrecy and security’, Ethics and Information Technology, 3: 13–19.
Thomson, J. J. (1975) ‘The right to privacy’, Philosophy and Public Affairs, 4(4): 295–314.
Thomson, J. J. (1986) Rights, Restitution and Risk: Essays in Moral Theory, Cambridge, MA: Harvard University Press.
Thomson, J. J. (1991) ‘Self-defence’, Philosophy and Public Affairs, 20(4): 283–310.
Thorsen, E., Sreedharan, C. and Allan, S. (2013) ‘WikiLeaks and whistle-blowing: the framing of Bradley Manning’, in B. Brevini, A. Hintz and P. McCurdy (eds), Beyond Wikileaks: Implications for the Future of Communications, Journalism and Society, Basingstoke: Palgrave Macmillan, pp 101–22.
Tidy, J. (2022) ‘Anonymous: how hackers are trying to undermine Putin’, BBC News, 20 March. Available from https://www.bbc.co.uk/news/technology-60784526
TOR (nd) ‘What protections does TOR provide?’. Available from: https://www.torproject.org/docs/faq.html.en#WhatProtectionsDoesTorProvide
TOR (2015) ‘Learning more about the GFW’s active probing system’, The TOR Project, 14 September. Available from: https://blog.torproject.org/category/tags/china
Traynor, I. (2007) ‘Russia accused of unleashing cyberwar to disable Estonia’, The Guardian, 17 May. Available from: http://www.guardian.co.uk/world/2007/may/17/topstories3.russia
Trottier, D. (2017) ‘Digital vigilantism as weaponisation of visibility’, Philosophy and Technology, 30: 55–72.
Tuma, S. E. (2011) ‘What does CFAA mean and why should I care: a primer on the Computer Fraud and Abuse Act for civil litigators’, South Carolina Law Review, 63(1): 142–90.
UNESCO (2015) Keystones to Foster Inclusive Knowledge Societies: Access to Information and Knowledge, Freedom of Expression, Privacy, and Ethics on a Global Internet, Paris: UNESCO Publishing. Available from: http://unesdoc.unesco.org/images/0023/002325/232563e.pdf
US Senate Select Committee (2014) Committee Study of the Central Intelligence Agency’s Detention and Interrogation Program. Available from: http://fas.org/irp/congress/2014_rpt/ssci-rdi.pdf
Utterback, J. (2013) ‘Cases of hacktivism’, Hacktivism 101, 28 May. Available from: https://joymargret89.wordpress.com/2013/05/28/cases-of-hacktivism/
Vamosi, R. (2008) ‘Anonymous hackers take on the Church of Scientology’, CNET, 25 January. Available from: https://www.cnet.com/news/anonymous-hackers-take-on-the-church-of-scientology/
Wagenseil, P. (2011) ‘Anonymous “hacktivists” attack Egyptian websites’, Security News Daily, 6 January. Available from: http://www.msnbc.msn.com/id/41280813/ns/technology_and_science-security/#.T3bs0r9SR7E
Waldron, J. (2003) ‘Security and liberty: the image of balance’, Journal of Political Philosophy, 11(2): 191–210.
Walzer, M. (2000) Just and Unjust Wars: A Moral Argument with Historical Arguments, New York: Basic Books.
Wang, F., Zeng, D., Hendler, J. A., Zhang, Q., Feng, Z., Gao, Y. et al (2010) ‘A study of the Human Flesh search engine: crowd-powered expansion of online knowledge’, Computer, 43(8): 45–53.
Waqas (2014) ‘Anonymous shuts down city of Cleveland website’, HackRead, 26 November. Available from: https://www.hackread.com/anonymous-shuts-city-cleveland-website/
Wasserman, D. (1987) ‘Justifying self-defense’, Philosophy and Public Affairs, 164(4): 356–78.
Weaver, W. and Pallitto, R. (2005) ‘State secrets and executive powers’, Political Science Quarterly, 120(1): 85–112.
Webb, M. (2021) Coding Democracy: How Hackers Are Disrupting Power, Surveillance Authoritarianism, Cambridge, MA: MIT Press.
Weinstein, M. A. (1971) ‘The uses of privacy in the good life’, in J. R. Pennock and J. W. Chapman (eds), Privacy: Nomos XIII, New York: Atherton Press, pp 88–104.
Wells, C. (2004) ‘National security and the Freedom of Information Act’, Administrative Law Review, 56(4): 1195–222.
Westin, A. (1967) Privacy and Freedom, London: Bodley Head.
Whelan, J. M. (1991) ‘Charity and the duty to rescue’, Social Theory and Practice, 17(3): 441–56.
Wiemann, G. (2004) ‘Cyberterrorism: how real is the threat?’ United States Institute for Peace, 119: 2–12.
Williams, G. (2003) ‘Blame and responsibility’, Ethical Thought and Moral Practice, 6: 427–45.
Williams, J. (2008) ‘Space, scale and just war: meeting the challenge of humanitarian intervention and trans-national terrorism’, Review of International Studies, 34(4): 581–600.
Wilmot, S. (2000) ‘Nurses and whistleblowing: the ethical issues’, Philosophical and Ethical Issues, 32(5): 1051–7.
Wong, J. C. (2016) ‘Activists lose criminal case on climate change defense – but judge praises effort’, The Guardian, 15 January. Available from: https://www.theguardian.com/environment/2016/jan/15/delta-5-seattle-washington-climate-change-court-defense
Woodcock, B. (2011) ‘Overview of the Egyptian internet shutdown’, Packet Clearing House, February. Available from: https://privacywonk.net/download/Egypt-PCH-Overview.pdf
Wray, S. (1999) ‘On electronic civil disobedience’, Peace Review, 11(1): 107–11.
Xu, B. and Shaoting, J. (2008) ‘Human flesh engine: an internet lynching?’, Xinhua News, July 4. Available from: http://news.xinhuanet.com/english/2008-07/04/content_8491087.htm
Zedner, L. (2007) ‘Pre-crime and post criminology’, Theoretical Criminology, 11(2): 261–81.
Zelizer, B. and Allan, S. (2010) Keywords in News and Journalism Studies, Maidenhead and New York: Open University Press.
Zetter, K. (2008) ‘Palin E-mail hacker says it was easy’, Wired, 18 September. Available from: https://www.wired.com/2008/09/palin-e-mail-ha/
Zimring, F. (2003) The Contradictions of American Capital Punishment, Oxford: Oxford University Press.
May 2022 onwards | Past Year | Past 30 Days | |
---|---|---|---|
Abstract Views | 1119 | 617 | 55 |
Full Text Views | 8 | 1 | 0 |
PDF Downloads | 6 | 0 | 0 |
Institutional librarians can find more information about free trials here