This chapter expands the debate from informational rights to look at non-cyber, non-information related threats, including when the state and its representatives fail to, first, provide and enact good laws equally and fairly, including the failure to apply fair processes, equal treatment, misapplying laws, and lacking the ability and political will to enforce the good laws; or second, when the state develops unjustifiably harmful laws, policies, procedures or institutional cultures. It will argue that in both instances, given the failure of the state and the subsequent threat these failures represent, hackers can use political violence to defend people from harm, though the type of response must be matched to the threat posed. This chapter will look at police brutality; the failure of due and fair process; the development of laws that seek to directly discriminate and foster hatred and violence against members of the LGBTQ+ community; and the locating and unmasking of online paedophiles.
Abbott, T. G., Lai, K. J.,Lieberman, M. R. and Price, E. C. (2007) ‘Browser based attacks on TOR’, Privacy Enhancing Technologies, 4776 (June): 184–99.
Ackerman, B. (2006) Before the Next Attack: Preserving Civil Liberties in the Age of Terrorism, New Haven, CT: Yale University Press.
Adams, J. (2013) ‘Decriminalizing hacktivism: finding space for free speech protests on the internet’, SSRN, 15 December. Available from: https://ssrn.com/abstract=2392945
Agrawal, T., Henry, D. and Finkle, J. (2014) ‘JPMorgan hack exposed data of 83 million, among biggest breaches in history’, Reuters, 3 October. Available from: https://www.reuters.com/article/us-jpmorgan-cybersecurity-idUSKCN0HR23T20141003
Alexander, L. (1976) ‘Self-defence and the killing of non-combatants: a reply to Fullinwider’, Philosophy and Public Affairs, 5(4): 408–15.
Alexopoulou, S. and Pavli, A. (2019) ‘“Beneath this mask there is more than flesh, beneath this mask there is an idea”: anonymous as the (super)heroes of the internet?’, International Journal for the Semiotics of Law, 34: 237–64.
Altman, I. (1976) ‘Privacy: a conceptual analysis’, Environment and Behaviour, 8(1): 7.
Alvarez, A. and Bachman, R. (2007) Violence: The Enduring Problem, London: Sage.
Ambinder, M. and Grady, D. (2013) Deep State: Inside the Government Secrecy Industry, Hoboken, NJ: John Wiley & Sons Inc.
Anderson, L. (2011) ‘Demystifying the Arab Spring: parsing the differences between Tunisia, Egypt, and Libya’, Foreign Affairs, 90(3): 2–7.
Anderson, N. (2011) ‘How one man tracked down Anonymous – and paid a heavy price’, Ars Technica, 9 February. Available from: https://arstechnica.com/tech-policy/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price/
Anonymous (2011) ‘AnonNews.org: everything Anonymous’. Available from: http://anonnews.org/press/item/199/
Aquinas, T. (2002) ‘From Summa Theologiae’, in C. Brown, T. Nardin and N. Rengger (eds), International Relations in Political Thought, Cambridge: Cambridge University Press, pp 213–20.
Arendt, H. (1979) The Origins of Totalitarianism, London: Harcourt, Brace & World.
Ars (2011) ‘Anonymous speaks: the inside story of the HBGary Hack’, ARSTechnica, 16 February. Available from: https://arstechnica.com/tech-policy/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack/
Arthur, C. (2013) ‘LulzSec: what they did, who they were and how they were caught’, The Guardian, 16 May. Available from: https://www.theguardian.com/technology/2013/may/16/lulzsec-hacking-fbi-jail
Atkin, Lord (1932) Donoghue v Stevenson, UKHL 100, 26 May.
Auty, C. (2004) ‘Political hacktivism: tool of the underdog or scourge of cyberspace?’, New Information Perspectives, 56(4): 212–21.
Avant, D. D. (2005) The Market for Force: The Consequences of Privatizing Security, Cambridge: Cambridge University Press.
Baber, H. E. (1987) ‘How bad is rape’, Hypatia, 2(2): 125–38.
Baker, C. E. (1978) ‘Scope of the First Amendment freedom of speech’, UCLA Law Review, 25: 964–90.
Baker, N. (2003) ‘National security versus civil liberties’, Presidential Studies Quarterly, 33(3): 547– 67.
Baldino, D. (2010) Democratic Oversight of Intelligence Services, Sydney: The Federation Press.
Bambauer, D. E. (2013) ‘Privacy versus security’, The Journal of Criminal Law and Criminology, 103(3): 667–83.
Bamford, J. (2013) ‘NSA snooping was only the beginning. Meet the spy chief leading us into cyberwar’, Wired, 12 June. Available from: https://www.wired.com/2013/06/general-keith-alexander-cyberwar/
Bandura, A. (1986) Social Foundations of Thought and Action: A Social Cognitive Theory, Englewood Cliffs, NJ: Prentice Hall.
Bandura, A. (1999) ‘Moral disengagement in the perpetration of inhumanities’, Personality and Social Psychology Review, 3(3): 193–209.
Bangkok Post (2015) ‘International hackers strike’, Bangkok Post, 22 October. Available from: http://www.bangkokpost.com/tech/local-news/739884/anonymous-steps-up-single-gateway-protest
Bansal, A. and Arora, M. (2012) ‘Ethical hacking and social security’, Journal of Radix International Educational and Research Consortium, 1(11): 1–16.
Barber, R. (2001) ‘Hackers profiled: who are they and what are their motivations?’, Computer Fraud and Security, 2(1): 14–17.
Bauman, Z., Bigo, D., Esteves, P., Guild, E., Jabri, V., Lyon, D. et al (2014) ‘After Snowden: rethinking the impact of surveillance’, International Political Sociology, 8: 121–44.
BBC News (2007) ‘Estonia hit by ‘Moscow cyber war’, 17 May. Available from: http://news.bbc.co.uk/1/hi/world/europe/6665145.stm
BBC News (2011) ‘China hit-and-run driver sentenced to six years in jail’, 30 January. Available from: https://www.bbc.co.uk/news/world-asia-pacific-12317756
BBC News (2012) ‘Chinese websites defaced in anonymous attack’, 5 April. Available from: http://www.bbc.co.uk/news/technology-17623939
BBC News (2019) ‘Extinction Rebellion protests: what happened?’, 25 April. Available from: https://www.bbc.co.uk/news/uk-england-48051776
Beaney, W. (1966) ‘The right to privacy and American law’, Law and Contemporary Problems, 31: 253–71.
Bellaby, R. W. (2014) The Ethics of Intelligence: A New Framework, Abingdon: Routledge.
Bellaby, R. W. (2016) ‘Justifying cyber-intelligence?’, Journal of Military Ethics, 15(4): 299–319.
Bellaby, R. W. (2018) ‘Extraordinary rendition: expanding the circle of blame in international politics’, The International Journal of Human Rights, 22(2): 574–602.
Bellaby, R. W. (2021) ‘An ethical framework for hacking operations’, Ethical and Theory Moral Practice, 24: 231–55.
Bellamy, A. J. (2006) Just Wars: From Cicero to Iraq, Cambridge and Malden, MA: Polity Press.
Benn, S. (1971) ‘Privacy, freedom and respect for persons’, in J. R. Pennock and J. W. Chapman (eds), Nomos XIII: Privacy, New York: Atherton Press, pp 1–26.
Berlin, I. (1969) Four Essays on Liberty, Oxford: Oxford University Press.
Berman, M. N. (2011) ‘Two kinds of retributivism’, in R.A. Duff and S. Green (eds), Philosophical Foundations of Criminal Law, New York: Oxford University Press, pp 433–57.
Berman, M. N. (2013) ‘Rehabilitating retributivism’, Law and Philosophy, 32: 83–108.
Beyer, J. L. (2014) Expect Us: Online Communities and Political Marginalisation, Oxford: Oxford University Press.
Beytagh, F. (1975) ‘Privacy and the free press: a contemporary conflict in values’, New York Law Forum, 20(3): 453–514.
Blasi, V. (1977) ‘The checking value in first amendment theory’, American Bar Foundation Research Journal, 3: 521–649.
Blomfield, A. (2007) ‘Estonia calls for NATO cyber-terrorism strategy’, The Telegraph, 18 May. Available from: https://www.telegraph.co.uk/news/worldnews/1551963/Estonia-calls-for-Nato-cyber-terrorism-strategy.html
Bloustein, E. J. (1978) ‘Group privacy: the right to huddle’, in E. Bloustein (ed.), Individual and Group Privacy, New Brunswick, NJ: Transaction Books, pp 123–87.
Bok, S. (1985) ‘Distrust, secrecy and the arms race’, Ethics, 95(3): 712–27.
Bollinger, L. (1986) The Tolerant Society: Freedom of Speech and Extremist Speech in America, Oxford: Oxford University Press.
Bolsin, S., Pal, R., Wilmhurst, P. and Pena, M. (2011) ‘Whistleblowing and patient safety: the patient’s or the profession’s interests at stake?’, Journal of the Royal Society of Medicine, 104: 278–82.
Borsook, P. (2000) Cyberselfish: A Critical Romp through the Terribly Libertarian Culture of High Tech, New York: PublicAffairs.
Bouville, M. (2008) ‘Whistleblowing and morality’, Journal of Business Ethics, 81: 579–85.
Bowie, N. (1982) Business Ethics, Englewood Cliffs, NJ: Prentice-Hall.
Boyle, J. (1997) Shamans, Software and Spleens: Law and the Construction of the Information Society, Cambridge, MA, and London: Harvard University Press.
Braham, M. and van Hees, M. (2012) ‘An anatomy of moral responsibility’, Mind, 121(483): 601–34.
Brandeis, L. and Warren, S. (1980) ‘The right to privacy’, The Harvard Law Review, 4(5): 193–220.
Breckenridge, A. C. (1970) The Right to Privacy, Lincoln: University of Nebraska Press.
Brenkert, G. (2010) ‘Whistle-blowing, moral integrity, and organizational ethics’, in G. Brenkert and T. L. Beauchamp (eds), The Oxford Handbook of Business Ethics, New York: Oxford University Press, pp 563–601.
Breslin, V. andDooley, J. (2002) ‘Whistle blowing v. confidentiality: can circumstances mandate attorneys to expose their clients?’, Georgetown Journal of Legal Ethics, 15(4): 719–40.
Brison, S. J. (1998a) ‘The autonomy defence of free speech’, Ethics, 108(2): 312–39.
Brison, S. J. (1998b) ‘Speech, harm, and the mind-body problem in First Amendment jurisprudence’, Legal Theory, 4(1): 39–61.
Brocklebank, C. (2012) ‘Anonymous hack into Ugandan government websites in protest at their anti-LGBT policies’, Pink News, 15 August. Available from: https://www.pinknews.co.uk/2012/08/15/anonymous-hack-into-ugandan-government-websites-in-protest-at-their-anti-lgbt-policies/
Brooking, E. T. (2015) ‘Anonymous vs. the Islamic State’, Foreign Policy. Available from: http://foreignpolicy.com/2015/11/13/anonymous-hackers-islamic-state-isis-chan-online-war/
Brooks, N. (2004) The Protection of Classified Information: The Legal Framework, Washington, DC: Congressional Research Service.
Brownlee, K. (2012) Conscience and Conviction: The Case for Civil Disobedience, Oxford: Oxford University Press.
Brownlee, K. (2016) ‘The civil disobedience of Edward Snowden: a reply to William Scheuerman’, Philosophy and Social Criticism, 42(10): 965–70.
Bueza, M. (2016) ‘Is Comelec liable for website data leak?’, Rappler, 11 April. Available from: https://www.rappler.com/newsbreak/in-depth/127465-comelec-hackers-liability-website-hacking-data-leak
Bufacchi, V. (2005) ‘Two concepts of violence’, Political Studies Review, 3(2): 193–204.
Butler, J. (2004) Precarious Lives: The Powers of Mourning and Violence, London: Verso.
Cardwell, T. (2011) ‘Ethical hackers: putting on the white’, Network Security, July: 1–13.
Carr, I. and Lewis, D. (2010) ‘Combating corruption through employment law and whistleblower protection’, Industrial Law Journal, 39(1): 1–30.
Carr, L. (1998) ‘Tomboy resistance and conformity: agency in social psychological gender theory’, Gender & Society, 12: 528–53.
Casserly, M. (2015) ‘Who is Anonymous? A short history of hacktivism’, Tech Advisor, 18 November. Available from: https://www.techadvisor.com/feature/internet/what-is-hacktivism-short-history-anonymous-lulzsec-arab-spring-3414409/#ixzz2lt9LEheM
Celikates, R. (2015) ‘Digital publics, digital contestation: a new structural transformation’, in R. Celikates, R. Kreide and T. Wesche (eds),Transformations of Democracy: Crisis, Protest and Legitimation, London: Rowman and Littlefield, pp 159–76.
Celikates, R. (2016) ‘Rethinking civil disobedience as a practice of contestation’, Constellations, 23(1): 37–45.
Cha, A. and Nakashima, E. (2010) ‘Google China cyberattack part of spy campaign’, NBC News, 14 January. Available from: https://www.nbcnews.com/id/wbna34855470
Chambers, S. (2004) ‘Behind closed doors: publicity, secrecy, and the quality of deliberation’, The Journal of Political Philosophy, 12(4): 389–410.
Cheung, A. S. Y. (2009) ‘China internet going wild: cyber-hunting versus privacy protection’, Computer Law and Security Review, 25: 275–79.
China.org.cn (2010) ‘Drunken driver arrested for fatal incident’, 26 October. Available from: http://www.china.org.cn/china/2010-10/26/content_21200529.htm
Chirinos, C. (2022) ‘Anonymous takes revenge on Putin’s brutal Ukraine invasion by leaking personal data of 120,000 russian soldiers’, Fortune, 4 April. Available from: https://fortune.com/2022/04/04/anonymous-leaks-russian-soldier-data-ukraine-invasion/
Christopher, R. (1998) ‘Self-defense and defense of others’, Philosophy and Public Affairs, 27(2): 123–41.
Citron, D. K. (2014) Hate Crimes in Cyberspace, Cambridge, MA: Harvard University Press.
Clark, K. (2010) ‘“A new era of openness?” Disclosing intelligence to Congress under Obama’, Constitutional Commentary, 26: 313–37.
Clark, K. (2011) ‘Congress’s right to counsel intelligence oversight’, University of Illinois Law Review, 2011(3): 915–60.
Clarke, R., Morell, M. J., Stone, G. R., Sunstein, C. R. and Swire, P. (2013) President’s Review Group on Intelligence and Communications Technologies, Liberty and Security in a Changing World. Available from: https://obamawhitehouse.archives.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf
CNN Wire Staff (2011) ‘Hackers target San Francisco’s Rapid Transit System’, CNN, 16 August. Available from: http://edition.cnn.com/2011/US/08/14/california.transit.hack/index.html
Coates, A. J. (1997) The Ethics of War, Manchester: Manchester University Press.
Cohen, C. (1970) ‘Defending civil disobedience’, The Monist, 54(4): 469–87.
Cohen, J. (1993) ‘Freedom of expression’, Philosophy and Public Affairs, 22(3): 207–63.
Coleman, G. (2011) ‘Hacker politics and publics’, Public Culture, 23(3): 511–16.
Coleman, G. (2014) Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous, London: Verso.
Coleman, G. (2022) ‘The public interest hack’, Lima, 8. Available from: https://limn.it/articles/the-public-interest-hack/
Conway, M. (2003) ‘Hackers or terrorists? Why it doesn’t compute’, Computer Fraud and Security, 12: 10–13.
Copp, D. (1991) ‘Responsibility for collective inaction’, Journal of Social Philosophy, 22(2): 71–80.
Critical Art Ensemble (1996) Electronic Civil Disobedience and Other Unpopular Ideas, New York: Autonomedia.
Crosston, M. (2017) ‘The fight for cyber Thoreau: distinguishing virtual disobedience from digital destruction’, in M. Korstanje (ed.), Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities, Hershey, PA: IGI Global, pp 198–219.
Dalton, H. L. (1985) ‘Taking the right to appeal (more or less) seriously’, Yale Law Journal, 95(1): 62–107.
Darby, J. (2016) ‘Political violence: an overview’, in M. Breen-Smyth (ed.), The Ashgate Research Companion to Political Violence, London: Routledge, pp 17–32.
Davis, M. (1996) ‘Some paradoxes of whistleblowing’, Business & Professional Ethics Journal, 15(1): 3–19.
DeGeorge, R. (1981) ‘Ethical responsibilities of engineers in large organizations: the Pinto case’, Business & Professional Ethics Journal, 1(1): 1–14.
DeGeorge, R. (1990) Business Ethics, Basingstoke: Palgrave MacMillan.
Della Porta, D. (1995) Social Movements, Political Violence, and the State: A Comparative Analysis of Italy and Germany, New York: Cambridge University Press.
Delmas, C. (2018a) ‘Is hacktivism the new civil disobedience?’, Raisons Politiques, 69(1): 63–81.
Delmas, C. (2018b) A Duty to Resist: When Disobedience Should be Uncivil ,Oxford: Oxford University Press.
Dempsey, J. X. and Flint, L. M. (2004) ‘Commercial data and national security’, The George Washington Law Review, 72: 1459–502.
Denning, D. (1999) ‘Activism, hacktivism and cyber-terrorism: the internet as a tool for influencing foreign policy’, Global Problem Solving Information Technology and Tools, 10 December. Available from: https://nautilus.org/global-problem-solving/activism-hacktivism-and-cyberterrorism-the-internet-as-a-tool-for-influencing-foreign-policy-2/
Denning, D. (2010) ‘Terror’s web: how the internet is transforming terrorism’, in Y. Jewkes and M. Yar (eds), Handbook of Internet Crime, Cullompton: Willan Publishing, pp 194–213.
Dewey, J. (1980) ‘Force, violence and law’ and ‘Force and coercion’, in J. A. Boydston (ed.), John Dewey, The Middle Works, 1899–1924, Volume 10: 1916–1917, Carbondale, IL: Southern Illinois University Press.
Deyling, R. (1992) ‘Judicial deference and de novo review in litigation over national security information under the Freedom of Information Act’, Villanova Law Review, 37(1): 67–112.
Dittrich, D. and Himma, K. (2006) ‘Hackers, crackers and common criminals’, in H. Bidgoli (ed.), Handbook of Information Security: Information Warfare; Social Issues, Legal and International Issues; and Security Foundations, Vol.2, Hoboken, NJ: Wiley, pp 154–71.
Dorsen, N. and Shattuck, J. H. F. (1974) ‘Executive privilege, the Congress and the courts’, Ohio State Law Journal, 35(1): 1–40.
Douglas, D. M. (2016) ‘Doxxing: a conceptual analysis’, Ethics and Information Technology, 19: 199.
Dragu, T. (2011) ‘Is there a trade-off between security and liberty? Executive bias, privacy protections, and terrorism prevention’, American Political Science Review, 105(1): 64–78.
Duff, A. (2011) ‘Retrieving retributivism’, in M. White (ed.), Retributivism: Essays on Theory and Policy, Oxford: Oxford University Press.
Dumsday, T. (2009) ‘On cheering Charles Bronson: the ethics of vigilantism’, The Southern Journal of Philosophy, 47(1): 49–67.
Dunaway, W. (1996) ‘Incorporation as an interactive process: Cherokee resistance to expansion of the capitalist world-system, 1560–1763’, Sociological Inquiry, 66: 455–70.
Dunfee, T. W. and Maurer, V. G. (1992) ‘Corporate attorney whistle-blowing: devising a proper standard’, Business & Professional Ethics Journal, 11(3): 3–39.
Dworkin, R. (1985) A Matter of Principle, Cambridge, MA: Harvard University Press.
Eckert, A. E. (2020) ‘The changing nature of legitimate authority in the just war tradition’, Journal of Military Ethics, 19(2): 84–98.
The Economist (2011) ‘Leaks must not poison diplomacy’, 27 January. Available from: http://www.economist.com/node/18010593
Edstein, R. A. (1992) ‘Property speech and the politics of distrust’, The Bill of Rights in the Welfare State: A Bicentennial Symposium, 59(1): 41–89.
Eleftheriou-Smith, L. (2015) ‘Anonymous calls for activists to help expose international paedophile networks with “Operation DeathEaters”’, The Independent, 23 January. Available from: https://www.independent.co.uk/news/uk/home-news/anonymous-calls-activists-help-expose-international-paedophile-networks-operation-deatheaters-9998350.html
Elliott, C. (2013) ‘WikiLeaks and the public interest dilemma: a view from inside the media’, in B. Benedetta, A. Hintz and P. McCurdy (eds), Beyond Wikileaks: Implications for the Future of Communications, Journalism and Society, Basingstoke: Palgrave Macmillan, pp 78–84.
Emerson, T. I. (1964) ‘Freedom of association and freedom of expression’, The Yale Law Journal, 74(1): 1–64.
Emerson, T. I. (1970) The System of Freedom of Expression, New York: Vintage.
Emerson, T. I. (1976) ‘Legal foundations of the right to know’, Washington University Law Quarterly, 1: 1–24.
Emspak, J. (2011) ‘Update: Egyptian gov’t web sites under attack’, International Business Times, 26 January. Available from: http://www.ibtimes.com/articles/105329/20110126/update-egyptian-gov-t-web-sites-under-attack.htm
Fabre, C. (2008) ‘Cosmopolitanism, just war tradition and legitimate authority’, International Affairs, 84(5): 963–76.
Fabre, C. (2012) Cosmopolitan War, Oxford: Oxford University Press.
Fabre, C. (2018) Economic Statecraft: Human Rights, Sanctions, and Conditionality, Cambridge, MA: Harvard University Press.
Fairfield, P. (2005) Public/Private, London: Rowman & Littlefield Publishers .
Farsole, A., Kashikar, A. G. and Zunzunwala, A. (2010) ‘Ethical hacking’, International Journal of Computer Applications, 1(10): 14–20.
Farwell, J. and Rohozinski, R. (2011) ‘Stuxnet and the future of cyber war’, Survival: Global Politics and Strategy, 53(1): 24–5.
Fein, H. (2007) Human Rights and Wrongs: Slavery, Terror and Genocide ,Boulder, CO: Paradigm Publishers.
Feinberg, J. (1973) ‘The idea of a free man’, in J. F. Doyle (ed), Educational Judgments: Papers in the Philosophy of Education, London: Routledge, pp 143–65.
Feinberg, J. (1984) Moral Limits of the Criminal Law, Vol.1: Harm to Others, Oxford: Oxford University Press.
Finn, P. (2009) ‘GOP senators drop out of panel inquiry into CIA program’, The Washington Post, 26 September. Available from: http://www.washingtonpost.com/wp-dyn/content/article/2009/09/25/AR2009092503745.html
Fitri, N. (2011) ‘Democracy discourses through the internet communication: understanding the hacktivism for the global changing’, Online Journal of Communication and Media Technologies, 1(2): 1–20.
Fixdall, M. and Smith, D. (1998) ‘Humanitarian intervention and just war’, Mershon International Studies Review, 42(2): 283–312.
Fleddermann, C. (1999) Engineering Ethics, Englewood Cliffs, NJ: Prentice Hall.
FLSnag (2011) ‘I am one Anonymous’, YouTube, 23 July. Available from: http://www.youtube.com/watch?v=aEcvaoDIKtU
Fluri, P. and Born, H. (2003) Parliamentary Oversight of the Security Sector: Principles Mechanisms and Practices, Geneva: DCAF.
Ford, Z. (2012) ‘Anonymous hacks Ugandan government in retaliation for anti-LGBT policies’, Think Progress, 14 August. Available from: https://thinkprogress.org/anonymous-hacks-ugandan-government-in-retaliation-for-anti-lgbt-policies-8d31d15aa874#.cbrcmbr9c
Foucault, M. (1979) Discipline and Punish: The Birth of the Prison, Harmondsworth: Penguin.
Frankfurt, H. (1971) ‘Freedom of the will and the concept of the person’, Journal of Philosophy, 68(1): 5–20.
Fried, C. (1968) ‘Privacy: a moral analysis’, Yale Law Review, 77(1): 475–93.
Fried, C. (1992) ‘The new First Amendment jurisprudence: a threat to liberty’, in G. R. Stone, R. A. Epstein and C. R. Sunstein (eds), The Bill of Rights in the Modern State, Chicago, IL: University of Chicago Press, pp 225–53.
Fuchs, C. (2013) ‘The Anonymous movement in the context of liberalism and socialism’, Interface, 5(2): 345–76.
Fuchs, M. (2006) ‘Judging secrets: the role courts should play in preventing unnecessary secrecy’, Administrative Law Review, 58(1): 131–76.
Gandy, O. (2003) ‘Data mining and surveillance in the post 9/11 environment’, in K. Bell and F. Webster (eds), The Intensification of Surveillance: Crime, Terrorism and Warfare in the Information Age, London and Sterling, VA: Pluto Press, pp 363–84.
Gerwehr, S. and Daly, S. (2006) ‘Al-Qaida: terrorist selection and recruitment’, in D. Kamien (ed.), The McGraw-Hill Homeland Security Handbook, New York: McGraw-Hill, pp 73–89.
Gewirth, A. (1978) Reason and Morality, Chicago, IL: University of Chicago Press.
Glave, J. (1998) ‘Crackers: we stole nuke data’, Wired, 3 June. Available from: https://www.wired.com/1998/06/crackers-we-stole-nuke-data/
Goldschlag, D., Reed, M. and Syverson, P. (1999) ‘Onion routing for anonymous and private internet connections’, Communications of the ACM, 42(2): 39–41.
Golumbia, D. (2013) ‘Cyberlibertarianism: the extremist foundations of “digital freedom”’, Uncomputing. Available from: http://www.academia.edu/4429212/Cyberlibertarianism_The_Extremist_Foundations_of_Digital_Freedom
Goode, L. (2015) ‘Anonymous and the political ethos of hacktivism’, Popular Communication: The International Journal of Media and Culture, 13(1): 74–86.
Gorman, S. (2012) ‘Alert on hacker power play: US official signals growing concern over anonymous group’s capabilities’, The Wall Street Journal, 21 February. Available from: https://www.wsj.com/articles/SB10001424052970204059804577229390105521090
Gray, P. W. (2013) ‘Leaderless resistance, networked organisation, and ideological hegemony’, Terrorism and Political Violence, 25(5): 655–71.
Greenberg, A. (2012a) This Machine Kills Secrets: Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers, New York: Penguin Group.
Greenberg, A. (2012b) ‘Anonymous hackers swat at Syrian government websites in reprisal for internet blackout’, Forbes, 30 November. Available from: http://www.forbes.com/sites/andygreenberg/2012/11/30/anonymous-hackers-swat-at-syrian-government-websites-in-reprisal-for-internet-blackout/#105975b4418f
Greenwald, G. (2011) ‘The leaked campaign to attack Wikileaks and its supporters’, Salon.com, 11 February. Available from: https://www.salon.com/2011/02/11/campaigns_4/
Greenwalt, K. (1989) ‘Free speech justifications’, Columbia Law Review, 89(1): 119–55.
Gregg, N. (1993) ‘“Trying to put first things first”: negotiating subjectivities in a workplace organizing campaign’, in S. Fisher and K. Davis (eds), Negotiating at the Margins: The Gendered Discourses of Power and Resistance, New Brunswick, NJ: Rutgers University Press, pp 172–204.
Griffin, A. (2016) ‘WhatsApp end-to-end encryption update might have made chat app illegal in India’, Independent, 8 April. Available from: http://www.independent.co.uk/life-style/gadgets-and-tech/news/whatsapp-end-to-end-encryption-update-might-have-made-chat-app-illegal-in-india-a6974921.html
Griswold, E. N. (1989) ‘Secrets not worth keeping’, The Washington Post, 15 February. Available from: https://www.washingtonpost.com/archive/opinions/1989/02/15/secrets-not-worth-keeping/a115a154-4c6f-41fd-816a-112dd9908115/
Grofman, B., Owen, G. and Feld, S. (1983) ‘Thirteen theorems in search of the truth’, Theory and Decision, 15: 261–78.
Gross, H. (1971) ‘Privacy and autonomy’, in J. R. Pennock and J. W. Chapman (eds), Privacy: Nomos XIII, New York: Atherton Press, pp 169–81.
Habermas, J. (1996) Between Facts and Norms: Contributions to a Discourse Theory of Law and Democracy, Cambridge: Polity Press.
Halliday, J. (2011) ‘Anonymous hackers breach San Francisco BART transport website’, The Guardian, 15 August. Available from: https://www.theguardian.com/technology/2011/aug/15/anonymous-hackers-breach-bart-website
Halliday, J. and Arthur, C. (2010) ‘Wikileaks: who are the hackers behind Operation Payback?’, The Guardian, 8 December. Available from: https://www.theguardian.com/media/2010/dec/08/anonymous-4chan-wikileaks-mastercard-paypal
Hampson, N. (2012) ‘Hacktivism: a new breed of protest in a networked world’, Boston College International and Comparative Law Review, 35(2): 511–42.
Harding, L. and Leigh, D. (2011) ‘Wikileaks: how US political invective turned on “anti-American” Julian Assange’, The Guardian, 3 February. Available from: https://www.theguardian.com/world/2011/feb/03/wikileaks-julian-assange-us-reaction
Harmon, A. (1999) ‘“Hacktivists” of all persuasions take their struggle to the web’, The New York Times, 31 October. Available from: http://www.nytimes.com/1998/10/31/world/hacktivists-of-all-persuasions-take-their-struggle-to-the-web.html
Harris, C., Pritchard, M. S. and Rabins, M. J. (2005) Engineering Ethics: Concepts and Cases, Belmont, CA: Wadsworth.
Harris, D. (1999) ‘Driving while black and other traffic offences: the Supreme Court and pretextual traffic stops’, The Journal of Criminal Law and Criminology, 87: 544–82.
Harris, D. (2002) ‘Racial profiling revisited: “just common sense” in the fight against terror?’, Criminal Justice, 17: 36–59.
Hausman, D. and McPhereson, M. (1996) Economic Analysis and Moral Philosophy, Cambridge: Cambridge University Press.
Heinze, E. and Steel, B. J. (eds) (2009) Ethics, Authority, and War: Non-State Actors and the Just War Tradition, New York: Palgrave Macmillan.
Hendler, J. (2013) ‘It’s time to reform the Computer Fraud and Abuse Act’, Scientific American, 16 August. Available from: https://www.scientificamerican.com/article/its-times-reform-computer-fraud-abuse-act/
Herman, B. (1996) The Practice of Moral Judgement ,Cambridge, MA: Harvard University Press.
Hern, A. (2015) ‘Anonymous “at war” with Isis, hacktivist group confirms’, The Guardian, 17 December. Available from: https://www.theguardian.com/technology/2015/nov/17/anonymous-war-isis-hacktivist-group-confirms
Hern, A. (2016) ‘Islamic State Twitter account gets a rainbow makeover from Anonymous’, The Guardian, 17 June. Available from: https://www.theguardian.com/technology/2016/jun/17/islamic-state-twitter-accounts-rainbow-makeover-anonymous-hackers
Hersh, M. (2002) ‘Whistle-blowers: heroes or traitors? Individual and collective responsibility for ethical behaviour’, Annual Reviews in Control, 26: 243–62.
Higgins, P. (2013) ‘Critical fixes for the Computer Fraud and Abuse Act’, Electronic Frontier Foundation, 29 January. Available from: https://www.eff.org/deeplinks/2013/01/these-are-critical-fixes-computer-fraud-and-abuse-act
Hill, E. (2011a) ‘Hackers hit Tunisian websites’, Al Jazeera, 3 January. Available from: https://www.aljazeera.com/news/2011/1/3/hackers-hit-tunisian-websites
Hill, E. (2011b) ‘How “rebel” phone network evaded shutdown’, Al Jazeera, 23 April. Available from: http://www.aljazeera.com/indepth/features/2011/04/20114233530919767.html
Himma, K. (2005) ‘Hacking as politically motivated digital civil disobedience: is hacktivism morally justified?’, SSRN, 5 September. Available from: https://ssrn.com/abstract=799545
Himma, K. (2008) ‘Ethical issues involving computer security: hacking, hacktivism, and counterhacking’, in K. Himma and H. Tavani (eds), The Handbook of Information and Computer Ethics, Hoboken, NJ: Wiley.
Hine, K. D. (1998) ‘Vigilantism revisited: an economic analysis of the law of extra-judicial self-help or why can’t Dick shoot Henry for stealing Jane’s truck’, American University Law Review, 47: 1221–55 .
von Hirsch, A. (2000) ‘The ethics of public television surveillance’, in A. Hirsch, D. Garland and A. Wakefield (eds), Ethical and Social Perspectives on Situational Crime Prevention, Oxford: Hart Publishing, pp 59–76.
Hobbes, T. (1985) [1651] Leviathan, London: Penguin Classics.
Hoffman, W. M. (1984) ‘The Ford Pinto’, in W. Hoffman, and J. Moore (eds), Business Ethics: Readings and Cases in Corporate Morality, New York: Wiley, pp 249–60.
Hohfeld, W. N. (1913) ‘Some fundamental legal conceptions as applied in judicial reasoning’, Yale Law Journal, 23: 16–59.
Hollander, J. A. and Einwohner, R. L. (2004) ‘Conceptualising resistance’, Sociological Forum, 19(4): 533–54.
Holmes, O. (2012) ‘Anonymous declares internet war on Syria’, ABC News, 30 November. Available from: https://www.nbcnews.com/tech/tech-news/anonymous-declares-internet-war-syria-flna1c7350148
Holt, T., Freilich, J. and Chermak, S. (2017) ‘Exploring the subculture of ideologically motivated cyber-attackers’, Journal of Contemporary Criminal Justice, 33(3): 212–33.
Horsey, H. R. (1994) ‘The duty of care component of the Delaware business judgment rule’, Delaware Journal of Corporate Law, 19(3): 971–98.
Huazhong, W. (2010) ‘Drunken driver boasts father is a police official’, China Daily, 7 November. Available from: http://www.chinadaily.com.cn/china/2010-10/20/content_11431705.htm
Hunn, D. (2014) ‘How Anonymous hackers changed Ferguson, Mo., protests’, Government Technology, 13 August. Available from: https://www.govtech.com/public-safety/how-computer-hackers-changed-the-ferguson-protests.html
Hunt, G. (1995) Whistleblowing in the Health Service: Accountability, Law and Professional Practice, London: Edward Arnold.
Information Warfare Monitor (2009) ‘Tracking Ghostnet: investigating a cyber espionage network’, 29 March. Available from: http://www.nartv.org/mirror/ghostnet.pdf
Innes, J. (1996) Privacy, Intimacy and Isolation, Oxford: Oxford University Press.
Jackson, W. (2011) ‘BART website breach exposes divisions within hacktivist group’, GCN, 18 August. Available from: https://gcn.com/cybersecurity/2011/08/bart-website-breach-exposes-divisions-within-hacktivist-group/282337/
Jackson, R. and Pisoiu, D. (2018) Contemporary Debates on Terrorism, Abingdon: Routledge.
Jackson, R., Jarvis, L., Gunning, J. and Breen-Smyth, M. (2011) Terrorism: A Critical Introduction, Basingstoke: Palgrave Macmillan.
Jensen, J. V. (1987) ‘Ethical tension points in whistleblowing’, Journal of Business Ethics, 9: 321–8.
Jeter, L. (2003) Disconnected: Deceit and Betrayal at WorldCom, Hoboken, NJ: John Wiley and Sons.
Johnson, R. A. (2003) Whistleblowing: When It Works and Why, Boulder, CO: Lynne Rienner Publishers.
Johnston, L. (1996) ‘What is vigilantism?’, British Journal of Criminology, 36(2): 220–36.
Jordan, T. (2014) Internet, Society and Culture Communicative Practices Before and After the Internet, London: Bloomsbury.
Jordan, T. and Taylor, P. A. (2004) Hackers and Cyberwars: Rebels with a Cause?, London: Routledge.
Jos, P. H., Tompkins, M. E. and Hays, S. W. (1989) ‘In praise of difficult people: a portrait of the committed whistleblower’, Public Administration Review, 49(6): 552–61.
Kang, J. (1998) ‘Information privacy in cyberspace transactions’, Stanford Law Review, 50(4): 1193–294.
Kasachkoff, T. (1998) ‘Killing in self-defense: an unquestionable or problematic defense?’, Law and Philosophy, 17(5–6): 509–31.
Keefe, P. (2005) Chatter: Dispatches from the Secret World of Global Eavesdropping, New York: Random House.
Kennedy, R. (1997) Race Crime and the Law, New York: Pantheon.
King, J. (1998) ‘Information in cyberspace transactions’, Stanford Law Review, 50(4): 1193–294.
Kizza, J. M. (2020) Guide to Computer Network Security, Berlin: Springer.
Klein, A. G. (2015) ‘Vigilante media: unveiling Anonymous and the hacktivist persona in the global press’, Communication Monographs, 82(3): 379–401.
Kleinig, J. (1976) ‘Good Samaritanism’, Philosophy and Public Affairs, 5(4): 382–407.
Kono, D. (2006) ‘Optimal obfuscation: democracy and trade policy transparency’, American Political Science Review, 100: 369–84.
Konvitz, M. R. (1966) ‘Privacy and the law: a philosophical prelude’, Law and Contemporary Problems, 31(2): 272–80.
Krauth, A. (2012), ‘Anonymous in portmanteaupia’, Social Alternatives, 31(2): 27–32.
Krebs on Security (2011) ‘HBGary Federal hacked by Anonymous’, Krebs on Security, 7 February. Available from: https://krebsonsecurity.com/2011/02/hbgary-federal-hacked-by-anonymous/
Kumar, M. (2011) ‘Anonymous open letter to citizens of United States of America!’, The Hacker News, 24 March. Available from: https://thehackernews.com/2011/03/anonymous-open-letter-to-citizens-of.html
Kutz, C. (2007) ‘Causeless complicity’, Criminal Law and Philosophy, 1(2): 289–305.
Lackey, D. P. (1989) The Ethics of War and Peace, London: Prentice Hall International.
Lam, O. (2010) ‘China: my father is Li Gang!’ Global Voices, 22 October. Available from: https://globalvoices.org/2010/10/22/china-my-father-is-li-gang/
Landler, M. and Markoff, J. (2007) ‘In Estonia, what may be the first war in cyberspace’, The New York Times, 28 May. Available from: https://www.nytimes.com/2007/05/28/business/worldbusiness/28iht-cyberwar.4.5901141.html
Laufer, R. and Wolfe, M. (1977) ‘Privacy as a concept and social issue’, The Journal of Social Issues, 33(3): 22–42.
Laugerud, S. (2021) ‘Narrating the harm of rape: how rape victims invoke different models of psychological trauma’, BioSocieties, 16: 22–40.
Lee, H. (2018) ‘A new societal self-defense theory of punishment: the rights-protection theory’, Philosophia, 46: 337–53.
Lefkowitz, D. (2007) ‘On a moral right to civil disobedience’, Ethics, 117(2): 202–33.
Leigh, D. and Harding, L. (2011) WikiLeaks: Inside Julian Assange’s War on Secrecy, London: Guardian Books.
Lenard, N. (2012) ‘Anonymous takes on Syrian government’, The Salon, 30 November. Available from: https://www.salon.com/2012/11/30/anonymous_takes_on_syrian_government/
Lennerfors, T. (2007) ‘The transformation of transparency: on the act on public procurement and the right to appeal in the context of the war on corruption’, Journal of Business Ethics, 73(4): 381–90.
Lepora, C. and Goodin, R. (2013) On Complicity and Compromise, Oxford: Oxford University Press.
Lever, A. (2005) ‘Why racial profiling is hard to justify: a response to Risse and Zeckhauser’, Philosophy and Public Affairs, 33(1): 94–110.
Leverick, F. (2006) Killing in Self-Defence, Oxford: Oxford University Press.
Levy, S. (1984) Hackers: Heroes of the Computer Revolution, New York: Doubleday.
Lewis, D. (1989) ‘Mill and Milquetoast’, Australasian Journal of Philosophy, 67: 152–71.
Lewis, J. (2002) ‘Assessing the rise of cyber terrorism, cyber war and other cyber threats’, Centre for Strategic and International Studies. Available from: https://csis-website-prod.s3.amazonaws.com/s3fs-public/legacy_files/files/media/csis/pubs/021101_risks_of_cyberterror.pdf
Li, X. (2013) ‘Hacktivism and the First Amendment: drawing the line between cyber protests and crime’, Harvard Journal of Law & Technology, 7(1): 301–30.
Lindley, R. (1986) Autonomy, Basingstoke: Palgrave Macmillan.
List, C. and Goodin, R. E. (2001) ‘Epistemic democracy: generalizing the Condorcet jury theorem’, Journal of Political Philosophy, 9: 277–306.
List, C., Elsholtz, C. and Seeley T. D. (2009) ‘Independence and interdependence in collective decision making: an agent-based model of nest-site choice by honeybee swarms’, Philosophical Transactions of the Royal Society B, 364: 755–62.
Littauer, D. (2013) ‘Anonymous hacks Nigeria’s government website over anti-gay bill’, LGBTQ Nation, 5 July. Available from: http://www.lgbtqnation.com/2013/07/anonymous-hacks-nigerias-government-website-over-anti-gay-bill/
Little, C. B. and Sheffield, C. P. (1983) ‘Frontiers and criminal justice: English private prosecution societies and American vigilantism in the eighteenth and nineteenth centuries’, American Sociological Review, 48(6): 796–808.
Liu, A. (2004) The Laws of Cool: Knowledge Work and the Culture of Information, Chicago, IL: University of Chicago Press.
Locke, J. (1988)[1689] Two Treatises of Government, Cambridge: Cambridge University Press.
Lopez, K. J. (2010) ‘On this Sunday outrage’, National Review, 29 November. Available from: https://www.nationalreview.com/corner/sunday-outrage-kathryn-jean-lopez/
Loveluck, B. (2020) ‘The many shades of digital vigilantism: a typology of online self-justice’, Global Crime, 21(3–4): 213–41.
Lowes, D. E. (2006) The Anti-Capitalist Dictionary: Movements, Histories and Motivations, Halifax, Canada: Fernwood Publishing Ltd.
Lu, D. (2015) ‘When ethical hackers can’t compete’, The Atlantic, 8 December. Available from: https://www.theatlantic.com/technology/archive/2015/12/white-hat-ethical-hacking-cybersecurity/419355/
Luban, D. (2005) ‘Liberalism, torture and the ticking bomb’, Virginia Law Review, 9(6): 1425–61.
Ludlow, P. (2013) ‘Aaron Swartz was right’, The Chronical of Higher Education, 25 February. Available from: https://www.chronicle.com/article/Aaron-Swartz-Was-Right/137425
Lynch, W. and Kline, R. (2000) ‘Engineering practice and engineering ethics’, Science, Technology, & Human Values, 25(2): 195–225.
Lyon, D. (1994) The Electronic Eye: The Rise of Surveillance Society, Cambridge: Polity Press.
Mack, E. (1980) ‘Bad Samaritanism and causation of harm’, Philosophy and Public Affairs, 9(3): 230–59.
Mahat, R. (2008) ‘A carrot for the lawyer: providing economic incentives for in-house lawyers in a Sarbanes-Oxley Regime’, The Georgetown Journal of Legal Ethics, 21(3): 913–34.
Manion, M. and Goodrum, A. (2000) ‘Terrorism or civil disobedience: towards a hacktivist ethic’, Computers and Society, 30(2): 14–19.
Mansfield-Devine, S. (2011a) ‘Hacktivism: assessing the damage’, Network Security, 8: 5–13.
Mansfield-Devine, S. (2011b) ‘Anonymous: serious threat or mere annoyance?’, Network Security, 11(1): 4–10.
Markel, D. (2011) ‘What might retributive justice be? An argument for the confrontational conception of retributivism’, in M. White (ed), Retributivism: Essays on Theory and Policy, Oxford: Oxford University Press, pp 49–72.
Martin, R. (1970) ‘Civil disobedience’, Ethics, 80(1): 123–39.
Marx, G. (1998) ‘Ethics for the new surveillance’, The Information Society, 14(3): 171–85.
Marx, G. (2004) ‘Some concepts that may be useful in understanding the myriad forms and contexts of surveillance’, Intelligence and National Security, 19(2): 234.
Mazzetti, M. (2015) ‘CIA report found value of brutal interrogation was inflated’, The New York Times, 20 January. Available from: http://www.nytimes.com/2015/01/21/world/cia-report-found-value-of-brutal-interrogation-was-inflated.html?_r=1
McAdam, D. (1982) Political Process and the Development of Black Insurgency ,Chicago, IL: University of Chicago Press.
McAfee and the Center for Strategic and International Studies (2013) The Economic Impact of Cybercrime and Cyber Espionage, July. Available from: http://csis.org/files/publication/60396rpt_cybercrime-cost_0713_ph4_0.pdf
McArthur, R. (2001) ‘Reasonable expectations of privacy’, Ethics and Information Technology, 3: 123–8.
McCahill, M. (1998) ‘Beyond Foucault: towards a contemporary theory of surveillance’, in C. Norris, J. Moran, and G. Armstrong (eds), Surveillance, Closed-Circuit Television and Social Control, Aldershot: Ashgate, pp 41–65.
McCormick, T. (2013) ‘Anthropology of an idea: hacktivism’, Foreign Policy, 200: 24–5.
McGlynn, J. and Richardson, B. K. (2014) ‘Private support, public alienation: whistle-blowers and the paradox of social support’, Western Journal of Communication, 78(2): 213–37.
McGoogan, C., Titcomb, J. and Krol, C. (2017) ‘What is WannaCry and how does ransomware work?’, The Telegraph, 18 May. Available from: http://www.telegraph.co.uk/technology/0/ransomware-does-work/
McMahan, J. (1994) ‘Innocence, self-defence and killing in war’, The Journal of Political Philosophy, 2(1): 193–221.
McMahan, J. (2006) ‘On the moral equality of combatants’, Journal of Political Philosophy, 14(4): 377–93.
McPherson, R., Houmansadr, A. and Shmatikov, V. (2016) ‘Covertcast: using live streaming to evade internet censorship’, Proceedings on Privacy Enhancing Technologies, 3: 212–25.
McReynolds, P. (2015) ‘How to think about cyber conflict involving non-state actors’, Philosophy and Technology, 28: 427–48.
Menn, J. (2019) Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World, New York: Public Affairs.
Merton, R. (1968) Social Theory and Social Structure, New York: Free Press.
metac0m (2003) ‘What is hacktivism 2.0’, The Hacktivist, December. Available from: http://edshare.soton.ac.uk/8762/2/whatishacktivism.pdf
Metz, C. (2008) ‘Anonymous hacks Sarah Palin’s Yahoo! Account’, The Register, 17 September. Available from: http://www.theregister.co.uk/2008/09/17/anonymous_hacks_sarah_palin/
Meyers, D. T. (1995) ‘Rights in collision: a non-punitive compensatory remedy for abusive speech’, Law and Philosophy, 14: 203–43.
Mill, J. S. (1968) On Liberty, in M. Cowling (ed.) Selected Writings of John Stuart Mill, New York: The New American Library, p 121.
Mill, J. S. (1991) On Liberty, ed. John Gray, Oxford: Oxford University Press.
Mill, J. S. (2005) On Liberty, New York: Cosimo.
Miller, A. (1971) The Assault on Privacy: Computers, Databanks and Dossiers, Michigan: University of Michigan Press.
Milone, M. G. (2002) ‘Hacktivism: securing the national infrastructure’, The Business Lawyer, 58(1): 383–413.
Milton, J. (1968 [1644]) Areopagitica, New York: New York University Press.
Modighaini, A. and Rachel, F. (1995) ‘The role of interaction sequences and the timing of resistance in shaping obedience and defiance to authority’, Journal of Social Issues, 51: 107–23.
Monagham, H. P. (1977) ‘Of liberty and property’, Cornell Law Review, 62(1): 404–44.
Monroe, A. and Malle, B. (2014) ‘Free will without metaphysics’, in A. R. Mele (ed.), Surrounding Free Will, New York: Oxford University Press, pp 25–48.
Montague, P. (1989) ‘The morality of self-defense: a reply of Wasserman’, Philosophy and Public Affairs, 18(1): 81–9.
Moore, A. (2011) ‘Privacy, security, and government surveillance: Wikileaks and the new accountability’, Public Affairs Quarterly, 25(2): 141–56.
Moore, M. (2010) Placing Blame: A Theory of Criminal Law, Oxford: Oxford University Press.
Morris, A. (1984) The Origins of the Civil Rights Movement, New York: Free Press.
Morris, K. (2013) ‘Anonymous has finally released the names of Rehtaeh Parsons’s alleged rapists’, Daily Dot, 24 July. Available from: http://www.dailydot.com/news/rehtaeh-parsons-rapists-names-identity-revealed-anonymous/
Morrissey, D. (1997) Disclosure and Secrecy: Security Classification Executive Orders, Columbia: AEJMC.
Murphy, J. G. (2007) ‘Legal moralism and retribution revisited’, Criminal Law and Philosophy, 1: 5–20.
Murphy, S. (2011) ‘Agents provocateurs: hacktivists have noisily exposed the sorry state of internet security’, New Scientist, 10 September.
Musil, S. (2012) ‘Anonymous declares war on Syrian government’, CNet, 29 November. Available from: https://www.cnet.com/tech/services-and-software/anonymous-declares-war-on-syrian-government-web-sites/
Nagel, T. (1986) The View from Nowhere, Oxford: Oxford University Press.
Nagel, T. (1995) ‘Personal rights and public space’, Philosophy and Public Affairs, 24: 83–107.
Naughton, J. (2000) A Brief History of the Future: Origins of the Internet, London: Phoenix.
Near, J. and Miceli, M. (1995) ‘Effective whistleblowing’, Academy of Management Review, 20(3): 679–708.
The New York Times (2010) ‘A note to readers: the decision to punish diplomatic documents’, 28 November. Available from: https://www.nytimes.com/2010/11/29/world/29editornote.html
Nobles, R. and Schiff, D. (2002) ‘The right to appeal and workable systems of justice’, The Modern Law Review, 65(5): 676–701.
Norman, R. (1995) Ethics, Killing and War, Cambridge: Cambridge University Press.
Norton, Q. (2012) ‘How Anonymous picks targets, launches attacks, and takes powerful organizations down’, Wired, 3 July. Available from: https://www.wired.com/2012/07/ff-anonymous/
Nozick, R. (1974) Anarchy, State, and Utopia, New York: Basic Books.
Nussbaum, M. (2000) Women and Human Development: The Capabilities Approach, Cambridge: Cambridge University Press.
Ochi, M. (2016) ‘Gravity threshold before the International Criminal Court: an overview of the court’s practice’, International Crimes Database Brief, 19 January: 1–16.
Olson, P. (2011) ‘Anonymous hacks BART after cellphone blockade’, Forbes, 15 August. Available from: https://www.forbes.com/sites/parmyolson/2011/08/15/anonymous-hacks-bart-after-cellphone-blockade/
O’Malley, G. (2013) ‘Hacktivism: cyber-activism or cyber-crime’, Trinity College Law Review, 16: 137–60.
O’Neil, L. (2015) ‘Anonymous plans to “unhood” 1,000 Ku Klux Klan members online’, CBC News, 29 October. Available from: https://www.cbc.ca/news/trending/anonymous-plans-to-reveal-the-identities-of-1-000-kkk-members-1.3295523
Ong, G. (2016) ‘IT grad, 23, arrested for Comelec website hack’, The Philippine Star, 22 April. Available from: http://www.philstar.com/headlines/2016/04/22/1575594/it-grad-23-arrested-comelec-website-hack
Orend, B. (2006) The Morality of War, Calgary: Broadview Press.
Otsuka, M. (1994) ‘Killing the innocent in self-defense’, Philosophy and Public Affairs, 23(1): 74–94.
Owen, T. (2015) Disruptive Power: The Crisis of the State in the Digital Age, Oxford: Oxford University Press.
Padmanabhan, S. (2012) ‘Hacking for Lulz1: employing expert hackers to combat cyber terrorism’, Vanderbilt Journal of Entertainment and Technology Law, 15(1): 191–226.
Paine, S. (2000) Endangered Spaces: Privacy, Law and the Home, CAMC Publications.
Pattison, J. (2018) The Alternatives to War: From Sanctions to Nonviolence ,Oxford: Oxford University Press.
Pedhazur, A. and Perliger, A. (2003) ‘The causes of vigilant political violence: the case of Jewish settlers’, Civil Wars, 6(3): 9–30.