6: Looking Back, Moving Forward

Author:
Restricted access
Rights and permissions Cite this chapter

It is not the aim of the ethical framework to inadvertently open the door to all private forms of political violence, nor is it to justify all hacking; the purpose is to highlight the space for hackers to operate as legitimate actors and to guide hacker activity by detailing what actions are justified toward what end. Following the detailing of the ethical framework in Chapters 1 and 2 and the application in Chapters 3, 4 and 5, there are two further tasks. One is to establish some critical mechanisms – both theoretical and practical – to stop abuse and to aid hackers in reaching ethically justified decisions. The second is to widen the perspective to examine what implications this work has on how society should respond and reconceptualize political hacking. This includes a reflection on how existing legal and social frameworks are reacting to political hacking most broadly in order to highlight how they can better reflect the central argument for an (un)ethical hacker, a reconceptualization of ‘security’, and the argument for a more open and engaged set of state actors.

  • Abbott, T. G., Lai, K. J.,Lieberman, M. R. and Price, E. C. (2007) ‘Browser based attacks on TOR’, Privacy Enhancing Technologies, 4776 (June): 18499.

    • Search Google Scholar
    • Export Citation
  • Ackerman, B. (2006) Before the Next Attack: Preserving Civil Liberties in the Age of Terrorism, New Haven, CT: Yale University Press.

  • Adams, J. (2013) ‘Decriminalizing hacktivism: finding space for free speech protests on the internet’, SSRN, 15 December. Available from: https://ssrn.com/abstract=2392945

    • Search Google Scholar
    • Export Citation
  • Agrawal, T., Henry, D. and Finkle, J. (2014) ‘JPMorgan hack exposed data of 83 million, among biggest breaches in history’, Reuters, 3 October. Available from: https://www.reuters.com/article/us-jpmorgan-cybersecurity-idUSKCN0HR23T20141003

    • Search Google Scholar
    • Export Citation
  • Alexander, L. (1976) ‘Self-defence and the killing of non-combatants: a reply to Fullinwider’, Philosophy and Public Affairs, 5(4): 40815.

    • Search Google Scholar
    • Export Citation
  • Alexopoulou, S. and Pavli, A. (2019) ‘“Beneath this mask there is more than flesh, beneath this mask there is an idea”: anonymous as the (super)heroes of the internet?’, International Journal for the Semiotics of Law, 34: 23764.

    • Search Google Scholar
    • Export Citation
  • Altman, I. (1976) ‘Privacy: a conceptual analysis’, Environment and Behaviour, 8(1): 7.

  • Alvarez, A. and Bachman, R. (2007) Violence: The Enduring Problem, London: Sage.

  • Ambinder, M. and Grady, D. (2013) Deep State: Inside the Government Secrecy Industry, Hoboken, NJ: John Wiley & Sons Inc.

  • Anderson, L. (2011) ‘Demystifying the Arab Spring: parsing the differences between Tunisia, Egypt, and Libya’, Foreign Affairs, 90(3): 27.

    • Search Google Scholar
    • Export Citation
  • Anderson, N. (2011) ‘How one man tracked down Anonymous – and paid a heavy price’, Ars Technica, 9 February. Available from: https://arstechnica.com/tech-policy/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price/

    • Search Google Scholar
    • Export Citation
  • Anonymous (2011) ‘AnonNews.org: everything Anonymous’. Available from: http://anonnews.org/press/item/199/

  • Aquinas, T. (2002) ‘From Summa Theologiae’, in C. Brown, T. Nardin and N. Rengger (eds), International Relations in Political Thought, Cambridge: Cambridge University Press, pp 21320.

    • Search Google Scholar
    • Export Citation
  • Arendt, H. (1979) The Origins of Totalitarianism, London: Harcourt, Brace & World.

  • Ars (2011) ‘Anonymous speaks: the inside story of the HBGary Hack’, ARSTechnica, 16 February. Available from: https://arstechnica.com/tech-policy/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack/

    • Search Google Scholar
    • Export Citation
  • Arthur, C. (2013) ‘LulzSec: what they did, who they were and how they were caught’, The Guardian, 16 May. Available from: https://www.theguardian.com/technology/2013/may/16/lulzsec-hacking-fbi-jail

    • Search Google Scholar
    • Export Citation
  • Atkin, Lord (1932) Donoghue v Stevenson, UKHL 100, 26 May.

  • Auty, C. (2004) ‘Political hacktivism: tool of the underdog or scourge of cyberspace?’, New Information Perspectives, 56(4): 21221.

    • Search Google Scholar
    • Export Citation
  • Avant, D. D. (2005) The Market for Force: The Consequences of Privatizing Security, Cambridge: Cambridge University Press.

  • Baber, H. E. (1987) ‘How bad is rape’, Hypatia, 2(2): 12538.

  • Baker, C. E. (1978) ‘Scope of the First Amendment freedom of speech’, UCLA Law Review, 25: 96490.

  • Baker, N. (2003) ‘National security versus civil liberties’, Presidential Studies Quarterly, 33(3): 54767.

  • Baldino, D. (2010) Democratic Oversight of Intelligence Services, Sydney: The Federation Press.

  • Bambauer, D. E. (2013) ‘Privacy versus security’, The Journal of Criminal Law and Criminology, 103(3): 66783.

  • Bamford, J. (2013) ‘NSA snooping was only the beginning. Meet the spy chief leading us into cyberwar’, Wired, 12 June. Available from: https://www.wired.com/2013/06/general-keith-alexander-cyberwar/

    • Search Google Scholar
    • Export Citation
  • Bandura, A. (1986) Social Foundations of Thought and Action: A Social Cognitive Theory, Englewood Cliffs, NJ: Prentice Hall.

  • Bandura, A. (1999) ‘Moral disengagement in the perpetration of inhumanities’, Personality and Social Psychology Review, 3(3): 193209.

    • Search Google Scholar
    • Export Citation
  • Bangkok Post (2015) ‘International hackers strike’, Bangkok Post, 22 October. Available from: http://www.bangkokpost.com/tech/local-news/739884/anonymous-steps-up-single-gateway-protest

    • Search Google Scholar
    • Export Citation
  • Bansal, A. and Arora, M. (2012) ‘Ethical hacking and social security’, Journal of Radix International Educational and Research Consortium, 1(11): 116.

    • Search Google Scholar
    • Export Citation
  • Barber, R. (2001) ‘Hackers profiled: who are they and what are their motivations?’, Computer Fraud and Security, 2(1): 1417.

  • Bauman, Z., Bigo, D., Esteves, P., Guild, E., Jabri, V., Lyon, D. et al (2014) ‘After Snowden: rethinking the impact of surveillance’, International Political Sociology, 8: 12144.

    • Search Google Scholar
    • Export Citation
  • BBC News (2007) ‘Estonia hit by ‘Moscow cyber war’, 17 May. Available from: http://news.bbc.co.uk/1/hi/world/europe/6665145.stm

  • BBC News (2011) ‘China hit-and-run driver sentenced to six years in jail’, 30 January. Available from: https://www.bbc.co.uk/news/world-asia-pacific-12317756

    • Search Google Scholar
    • Export Citation
  • BBC News (2012) ‘Chinese websites defaced in anonymous attack’, 5 April. Available from: http://www.bbc.co.uk/news/technology-17623939

    • Search Google Scholar
    • Export Citation
  • BBC News (2019) ‘Extinction Rebellion protests: what happened?’, 25 April. Available from: https://www.bbc.co.uk/news/uk-england-48051776

    • Search Google Scholar
    • Export Citation
  • Beaney, W. (1966) ‘The right to privacy and American law’, Law and Contemporary Problems, 31: 25371.

  • Bellaby, R. W. (2014) The Ethics of Intelligence: A New Framework, Abingdon: Routledge.

  • Bellaby, R. W. (2016) ‘Justifying cyber-intelligence?’, Journal of Military Ethics, 15(4): 299319.

  • Bellaby, R. W. (2018) ‘Extraordinary rendition: expanding the circle of blame in international politics’, The International Journal of Human Rights, 22(2): 574602.

    • Search Google Scholar
    • Export Citation
  • Bellaby, R. W. (2021) ‘An ethical framework for hacking operations’, Ethical and Theory Moral Practice, 24: 231–55.

  • Bellamy, A. J. (2006) Just Wars: From Cicero to Iraq, Cambridge and Malden, MA: Polity Press.

  • Benn, S. (1971) ‘Privacy, freedom and respect for persons’, in J. R. Pennock and J. W. Chapman (eds), Nomos XIII: Privacy, New York: Atherton Press, pp 1–26.

    • Search Google Scholar
    • Export Citation
  • Berlin, I. (1969) Four Essays on Liberty, Oxford: Oxford University Press.

  • Berman, M. N. (2011) ‘Two kinds of retributivism’, in R.A. Duff and S. Green (eds), Philosophical Foundations of Criminal Law, New York: Oxford University Press, pp 43357.

    • Search Google Scholar
    • Export Citation
  • Berman, M. N. (2013) ‘Rehabilitating retributivism’, Law and Philosophy, 32: 83108.

  • Beyer, J. L. (2014) Expect Us: Online Communities and Political Marginalisation, Oxford: Oxford University Press.

  • Beytagh, F. (1975) ‘Privacy and the free press: a contemporary conflict in values’, New York Law Forum, 20(3): 453514.

  • Blasi, V. (1977) ‘The checking value in first amendment theory’, American Bar Foundation Research Journal, 3: 521649.

  • Blomfield, A. (2007) ‘Estonia calls for NATO cyber-terrorism strategy’, The Telegraph, 18 May. Available from: https://www.telegraph.co.uk/news/worldnews/1551963/Estonia-calls-for-Nato-cyber-terrorism-strategy.html

    • Search Google Scholar
    • Export Citation
  • Bloustein, E. J. (1978) ‘Group privacy: the right to huddle’, in E. Bloustein (ed.), Individual and Group Privacy, New Brunswick, NJ: Transaction Books, pp 123–87.

    • Search Google Scholar
    • Export Citation
  • Bok, S. (1985) ‘Distrust, secrecy and the arms race’, Ethics, 95(3): 71227.

  • Bollinger, L. (1986) The Tolerant Society: Freedom of Speech and Extremist Speech in America, Oxford: Oxford University Press.

  • Bolsin, S., Pal, R., Wilmhurst, P. and Pena, M. (2011) ‘Whistleblowing and patient safety: the patient’s or the profession’s interests at stake?’, Journal of the Royal Society of Medicine, 104: 27882.

    • Search Google Scholar
    • Export Citation
  • Borsook, P. (2000) Cyberselfish: A Critical Romp through the Terribly Libertarian Culture of High Tech, New York: PublicAffairs.

  • Bouville, M. (2008) ‘Whistleblowing and morality’, Journal of Business Ethics, 81: 57985.

  • Bowie, N. (1982) Business Ethics, Englewood Cliffs, NJ: Prentice-Hall.

  • Boyle, J. (1997) Shamans, Software and Spleens: Law and the Construction of the Information Society, Cambridge, MA, and London: Harvard University Press.

    • Search Google Scholar
    • Export Citation
  • Braham, M. and van Hees, M. (2012) ‘An anatomy of moral responsibility’, Mind, 121(483): 60134.

  • Brandeis, L. and Warren, S. (1980) ‘The right to privacy’, The Harvard Law Review, 4(5): 193220.

  • Breckenridge, A. C. (1970) The Right to Privacy, Lincoln: University of Nebraska Press.

  • Brenkert, G. (2010) ‘Whistle-blowing, moral integrity, and organizational ethics’, in G. Brenkert and T. L. Beauchamp (eds), The Oxford Handbook of Business Ethics, New York: Oxford University Press, pp 563601.

    • Search Google Scholar
    • Export Citation
  • Breslin, V. andDooley, J. (2002) ‘Whistle blowing v. confidentiality: can circumstances mandate attorneys to expose their clients?’, Georgetown Journal of Legal Ethics, 15(4): 71940.

    • Search Google Scholar
    • Export Citation
  • Brison, S. J. (1998a) ‘The autonomy defence of free speech’, Ethics, 108(2): 31239.

  • Brison, S. J. (1998b) ‘Speech, harm, and the mind-body problem in First Amendment jurisprudence’, Legal Theory, 4(1): 3961.

  • Brocklebank, C. (2012) ‘Anonymous hack into Ugandan government websites in protest at their anti-LGBT policies’, Pink News, 15 August. Available from: https://www.pinknews.co.uk/2012/08/15/anonymous-hack-into-ugandan-government-websites-in-protest-at-their-anti-lgbt-policies/

    • Search Google Scholar
    • Export Citation
  • Brooking, E. T. (2015) ‘Anonymous vs. the Islamic State’, Foreign Policy. Available from: http://foreignpolicy.com/2015/11/13/anonymous-hackers-islamic-state-isis-chan-online-war/

    • Search Google Scholar
    • Export Citation
  • Brooks, N. (2004) The Protection of Classified Information: The Legal Framework, Washington, DC: Congressional Research Service.

  • Brownlee, K. (2012) Conscience and Conviction: The Case for Civil Disobedience, Oxford: Oxford University Press.

  • Brownlee, K. (2016) ‘The civil disobedience of Edward Snowden: a reply to William Scheuerman’, Philosophy and Social Criticism, 42(10): 96570.

    • Search Google Scholar
    • Export Citation
  • Bueza, M. (2016) ‘Is Comelec liable for website data leak?’, Rappler, 11 April. Available from: https://www.rappler.com/newsbreak/in-depth/127465-comelec-hackers-liability-website-hacking-data-leak

    • Search Google Scholar
    • Export Citation
  • Bufacchi, V. (2005) ‘Two concepts of violence’, Political Studies Review, 3(2): 193204.

  • Butler, J. (2004) Precarious Lives: The Powers of Mourning and Violence, London: Verso.

  • Cardwell, T. (2011) ‘Ethical hackers: putting on the white’, Network Security, July: 1–13.

  • Carr, I. and Lewis, D. (2010) ‘Combating corruption through employment law and whistleblower protection’, Industrial Law Journal, 39(1): 130.

    • Search Google Scholar
    • Export Citation
  • Carr, L. (1998) ‘Tomboy resistance and conformity: agency in social psychological gender theory’, Gender & Society, 12: 52853.

  • Casserly, M. (2015) ‘Who is Anonymous? A short history of hacktivism’, Tech Advisor, 18 November. Available from: https://www.techadvisor.com/feature/internet/what-is-hacktivism-short-history-anonymous-lulzsec-arab-spring-3414409/#ixzz2lt9LEheM

    • Search Google Scholar
    • Export Citation
  • Celikates, R. (2015) ‘Digital publics, digital contestation: a new structural transformation’, in R. Celikates, R. Kreide and T. Wesche (eds),Transformations of Democracy: Crisis, Protest and Legitimation, London: Rowman and Littlefield, pp 15976.

    • Search Google Scholar
    • Export Citation
  • Celikates, R. (2016) ‘Rethinking civil disobedience as a practice of contestation’, Constellations, 23(1): 3745.

  • Cha, A. and Nakashima, E. (2010) ‘Google China cyberattack part of spy campaign’, NBC News, 14 January. Available from: https://www.nbcnews.com/id/wbna34855470

    • Search Google Scholar
    • Export Citation
  • Chambers, S. (2004) ‘Behind closed doors: publicity, secrecy, and the quality of deliberation’, The Journal of Political Philosophy, 12(4): 389410.

    • Search Google Scholar
    • Export Citation
  • Cheung, A. S. Y. (2009) ‘China internet going wild: cyber-hunting versus privacy protection’, Computer Law and Security Review, 25: 27579.

    • Search Google Scholar
    • Export Citation
  • China.org.cn (2010) ‘Drunken driver arrested for fatal incident’, 26 October. Available from: http://www.china.org.cn/china/2010-10/26/content_21200529.htm

    • Search Google Scholar
    • Export Citation
  • Chirinos, C. (2022) ‘Anonymous takes revenge on Putin’s brutal Ukraine invasion by leaking personal data of 120,000 russian soldiers’, Fortune, 4 April. Available from: https://fortune.com/2022/04/04/anonymous-leaks-russian-soldier-data-ukraine-invasion/

    • Search Google Scholar
    • Export Citation
  • Christopher, R. (1998) ‘Self-defense and defense of others’, Philosophy and Public Affairs, 27(2): 12341.

  • Citron, D. K. (2014) Hate Crimes in Cyberspace, Cambridge, MA: Harvard University Press.

  • Clark, K. (2010) ‘“A new era of openness?” Disclosing intelligence to Congress under Obama’, Constitutional Commentary, 26: 31337.

    • Search Google Scholar
    • Export Citation
  • Clark, K. (2011) ‘Congress’s right to counsel intelligence oversight’, University of Illinois Law Review, 2011(3): 91560.

  • Clarke, R., Morell, M. J., Stone, G. R., Sunstein, C. R. and Swire, P. (2013) President’s Review Group on Intelligence and Communications Technologies, Liberty and Security in a Changing World. Available from: https://obamawhitehouse.archives.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf

    • Search Google Scholar
    • Export Citation
  • CNN Wire Staff (2011) ‘Hackers target San Francisco’s Rapid Transit System’, CNN, 16 August. Available from: http://edition.cnn.com/2011/US/08/14/california.transit.hack/index.html

    • Search Google Scholar
    • Export Citation
  • Coates, A. J. (1997) The Ethics of War, Manchester: Manchester University Press.

  • Cohen, C. (1970) ‘Defending civil disobedience’, The Monist, 54(4): 46987.

  • Cohen, J. (1993) ‘Freedom of expression’, Philosophy and Public Affairs, 22(3): 20763.

  • Coleman, G. (2011) ‘Hacker politics and publics’, Public Culture, 23(3): 51116.

  • Coleman, G. (2014) Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous, London: Verso.

  • Coleman, G. (2022) ‘The public interest hack’, Lima, 8. Available from: https://limn.it/articles/the-public-interest-hack/

  • Conway, M. (2003) ‘Hackers or terrorists? Why it doesn’t compute’, Computer Fraud and Security, 12: 1013.

  • Copp, D. (1991) ‘Responsibility for collective inaction’, Journal of Social Philosophy, 22(2): 7180.

  • Critical Art Ensemble (1996) Electronic Civil Disobedience and Other Unpopular Ideas, New York: Autonomedia.

  • Crosston, M. (2017) ‘The fight for cyber Thoreau: distinguishing virtual disobedience from digital destruction’, in M. Korstanje (ed.), Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities, Hershey, PA: IGI Global, pp 198219.

    • Search Google Scholar
    • Export Citation
  • Dalton, H. L. (1985) ‘Taking the right to appeal (more or less) seriously’, Yale Law Journal, 95(1): 62107.

  • Darby, J. (2016) ‘Political violence: an overview’, in M. Breen-Smyth (ed.), The Ashgate Research Companion to Political Violence, London: Routledge, pp 17–32.

    • Search Google Scholar
    • Export Citation
  • Davis, M. (1996) ‘Some paradoxes of whistleblowing’, Business & Professional Ethics Journal, 15(1): 319.

  • DeGeorge, R. (1981) ‘Ethical responsibilities of engineers in large organizations: the Pinto case’, Business & Professional Ethics Journal, 1(1): 114.

    • Search Google Scholar
    • Export Citation
  • DeGeorge, R. (1990) Business Ethics, Basingstoke: Palgrave MacMillan.

  • Della Porta, D. (1995) Social Movements, Political Violence, and the State: A Comparative Analysis of Italy and Germany, New York: Cambridge University Press.

    • Search Google Scholar
    • Export Citation
  • Delmas, C. (2018a) ‘Is hacktivism the new civil disobedience?’, Raisons Politiques, 69(1): 6381.

  • Delmas, C. (2018b) A Duty to Resist: When Disobedience Should be Uncivil ,Oxford: Oxford University Press.

  • Dempsey, J. X. and Flint, L. M. (2004) ‘Commercial data and national security’, The George Washington Law Review, 72: 1459502.

  • Denning, D. (1999) ‘Activism, hacktivism and cyber-terrorism: the internet as a tool for influencing foreign policy’, Global Problem Solving Information Technology and Tools, 10 December. Available from: https://nautilus.org/global-problem-solving/activism-hacktivism-and-cyberterrorism-the-internet-as-a-tool-for-influencing-foreign-policy-2/

    • Search Google Scholar
    • Export Citation
  • Denning, D. (2010) ‘Terror’s web: how the internet is transforming terrorism’, in Y. Jewkes and M. Yar (eds), Handbook of Internet Crime, Cullompton: Willan Publishing, pp 194213.

    • Search Google Scholar
    • Export Citation
  • Dewey, J. (1980) ‘Force, violence and law’ and ‘Force and coercion’, in J. A. Boydston (ed.), John Dewey, The Middle Works, 1899–1924, Volume 10: 1916–1917, Carbondale, IL: Southern Illinois University Press.

    • Search Google Scholar
    • Export Citation
  • Deyling, R. (1992) ‘Judicial deference and de novo review in litigation over national security information under the Freedom of Information Act’, Villanova Law Review, 37(1): 67112.

    • Search Google Scholar
    • Export Citation
  • Dittrich, D. and Himma, K. (2006) ‘Hackers, crackers and common criminals’, in H. Bidgoli (ed.), Handbook of Information Security: Information Warfare; Social Issues, Legal and International Issues; and Security Foundations, Vol.2, Hoboken, NJ: Wiley, pp 15471.

    • Search Google Scholar
    • Export Citation
  • Dorsen, N. and Shattuck, J. H. F. (1974) ‘Executive privilege, the Congress and the courts’, Ohio State Law Journal, 35(1): 140.

  • Douglas, D. M. (2016) ‘Doxxing: a conceptual analysis’, Ethics and Information Technology, 19: 199.

  • Dragu, T. (2011) ‘Is there a trade-off between security and liberty? Executive bias, privacy protections, and terrorism prevention’, American Political Science Review, 105(1): 6478.

    • Search Google Scholar
    • Export Citation
  • Duff, A. (2011) ‘Retrieving retributivism’, in M. White (ed.), Retributivism: Essays on Theory and Policy, Oxford: Oxford University Press.

    • Search Google Scholar
    • Export Citation
  • Dumsday, T. (2009) ‘On cheering Charles Bronson: the ethics of vigilantism’, The Southern Journal of Philosophy, 47(1): 4967.

  • Dunaway, W. (1996) ‘Incorporation as an interactive process: Cherokee resistance to expansion of the capitalist world-system, 1560–1763’, Sociological Inquiry, 66: 45570.

    • Search Google Scholar
    • Export Citation
  • Dunfee, T. W. and Maurer, V. G. (1992) ‘Corporate attorney whistle-blowing: devising a proper standard’, Business & Professional Ethics Journal, 11(3): 339.

    • Search Google Scholar
    • Export Citation
  • Dworkin, R. (1985) A Matter of Principle, Cambridge, MA: Harvard University Press.

  • Eckert, A. E. (2020) ‘The changing nature of legitimate authority in the just war tradition’, Journal of Military Ethics, 19(2): 8498.

    • Search Google Scholar
    • Export Citation
  • The Economist (2011) ‘Leaks must not poison diplomacy’, 27 January. Available from: http://www.economist.com/node/18010593

  • Edstein, R. A. (1992) ‘Property speech and the politics of distrust’, The Bill of Rights in the Welfare State: A Bicentennial Symposium, 59(1): 4189.

    • Search Google Scholar
    • Export Citation
  • Eleftheriou-Smith, L. (2015) ‘Anonymous calls for activists to help expose international paedophile networks with “Operation DeathEaters”’, The Independent, 23 January. Available from: https://www.independent.co.uk/news/uk/home-news/anonymous-calls-activists-help-expose-international-paedophile-networks-operation-deatheaters-9998350.html

    • Search Google Scholar
    • Export Citation
  • Elliott, C. (2013) ‘WikiLeaks and the public interest dilemma: a view from inside the media’, in B. Benedetta, A. Hintz and P. McCurdy (eds), Beyond Wikileaks: Implications for the Future of Communications, Journalism and Society, Basingstoke: Palgrave Macmillan, pp 7884.

    • Search Google Scholar
    • Export Citation
  • Emerson, T. I. (1964) ‘Freedom of association and freedom of expression’, The Yale Law Journal, 74(1): 164.

  • Emerson, T. I. (1970) The System of Freedom of Expression, New York: Vintage.

  • Emerson, T. I. (1976) ‘Legal foundations of the right to know’, Washington University Law Quarterly, 1: 124.

  • Emspak, J. (2011) ‘Update: Egyptian gov’t web sites under attack’, International Business Times, 26 January. Available from: http://www.ibtimes.com/articles/105329/20110126/update-egyptian-gov-t-web-sites-under-attack.htm

    • Search Google Scholar
    • Export Citation
  • Fabre, C. (2008) ‘Cosmopolitanism, just war tradition and legitimate authority’, International Affairs, 84(5): 96376.

  • Fabre, C. (2012) Cosmopolitan War, Oxford: Oxford University Press.

  • Fabre, C. (2018) Economic Statecraft: Human Rights, Sanctions, and Conditionality, Cambridge, MA: Harvard University Press.

  • Fairfield, P. (2005) Public/Private, London: Rowman & Littlefield Publishers .

  • Farsole, A., Kashikar, A. G. and Zunzunwala, A. (2010) ‘Ethical hacking’, International Journal of Computer Applications, 1(10): 1420.

    • Search Google Scholar
    • Export Citation
  • Farwell, J. and Rohozinski, R. (2011) ‘Stuxnet and the future of cyber war’, Survival: Global Politics and Strategy, 53(1): 245.

  • Fein, H. (2007) Human Rights and Wrongs: Slavery, Terror and Genocide ,Boulder, CO: Paradigm Publishers.

  • Feinberg, J. (1973) ‘The idea of a free man’, in J. F. Doyle (ed), Educational Judgments: Papers in the Philosophy of Education, London: Routledge, pp 14365.

    • Search Google Scholar
    • Export Citation
  • Feinberg, J. (1984) Moral Limits of the Criminal Law, Vol.1: Harm to Others, Oxford: Oxford University Press.

  • Finn, P. (2009) ‘GOP senators drop out of panel inquiry into CIA program’, The Washington Post, 26 September. Available from: http://www.washingtonpost.com/wp-dyn/content/article/2009/09/25/AR2009092503745.html

    • Search Google Scholar
    • Export Citation
  • Fitri, N. (2011) ‘Democracy discourses through the internet communication: understanding the hacktivism for the global changing’, Online Journal of Communication and Media Technologies, 1(2): 120.

    • Search Google Scholar
    • Export Citation
  • Fixdall, M. and Smith, D. (1998) ‘Humanitarian intervention and just war’, Mershon International Studies Review, 42(2): 283312.

  • Fleddermann, C. (1999) Engineering Ethics, Englewood Cliffs, NJ: Prentice Hall.

  • FLSnag (2011) ‘I am one Anonymous’, YouTube, 23 July. Available from: http://www.youtube.com/watch?v=aEcvaoDIKtU

  • Fluri, P. and Born, H. (2003) Parliamentary Oversight of the Security Sector: Principles Mechanisms and Practices, Geneva: DCAF.

  • Ford, Z. (2012) ‘Anonymous hacks Ugandan government in retaliation for anti-LGBT policies’, Think Progress, 14 August. Available from: https://thinkprogress.org/anonymous-hacks-ugandan-government-in-retaliation-for-anti-lgbt-policies-8d31d15aa874#.cbrcmbr9c

    • Search Google Scholar
    • Export Citation
  • Foucault, M. (1979) Discipline and Punish: The Birth of the Prison, Harmondsworth: Penguin.

  • Frankfurt, H. (1971) ‘Freedom of the will and the concept of the person’, Journal of Philosophy, 68(1): 520.

  • Fried, C. (1968) ‘Privacy: a moral analysis’, Yale Law Review, 77(1): 47593.

  • Fried, C. (1992) ‘The new First Amendment jurisprudence: a threat to liberty’, in G. R. Stone, R. A. Epstein and C. R. Sunstein (eds), The Bill of Rights in the Modern State, Chicago, IL: University of Chicago Press, pp 225–53.

    • Search Google Scholar
    • Export Citation
  • Fuchs, C. (2013) ‘The Anonymous movement in the context of liberalism and socialism’, Interface, 5(2): 34576.

  • Fuchs, M. (2006) ‘Judging secrets: the role courts should play in preventing unnecessary secrecy’, Administrative Law Review, 58(1): 13176.

    • Search Google Scholar
    • Export Citation
  • Gandy, O. (2003) ‘Data mining and surveillance in the post 9/11 environment’, in K. Bell and F. Webster (eds), The Intensification of Surveillance: Crime, Terrorism and Warfare in the Information Age, London and Sterling, VA: Pluto Press, pp 36384.

    • Search Google Scholar
    • Export Citation
  • Gerwehr, S. and Daly, S. (2006) ‘Al-Qaida: terrorist selection and recruitment’, in D. Kamien (ed.), The McGraw-Hill Homeland Security Handbook, New York: McGraw-Hill, pp 7389.

    • Search Google Scholar
    • Export Citation
  • Gewirth, A. (1978) Reason and Morality, Chicago, IL: University of Chicago Press.

  • Glave, J. (1998) ‘Crackers: we stole nuke data’, Wired, 3 June. Available from: https://www.wired.com/1998/06/crackers-we-stole-nuke-data/

    • Search Google Scholar
    • Export Citation
  • Goldschlag, D., Reed, M. and Syverson, P. (1999) ‘Onion routing for anonymous and private internet connections’, Communications of the ACM, 42(2): 3941.

    • Search Google Scholar
    • Export Citation
  • Golumbia, D. (2013) ‘Cyberlibertarianism: the extremist foundations of “digital freedom”’, Uncomputing. Available from: http://www.academia.edu/4429212/Cyberlibertarianism_The_Extremist_Foundations_of_Digital_Freedom

    • Search Google Scholar
    • Export Citation
  • Goode, L. (2015) ‘Anonymous and the political ethos of hacktivism’, Popular Communication: The International Journal of Media and Culture, 13(1): 7486.

    • Search Google Scholar
    • Export Citation
  • Gorman, S. (2012) ‘Alert on hacker power play: US official signals growing concern over anonymous group’s capabilities’, The Wall Street Journal, 21 February. Available from: https://www.wsj.com/articles/SB10001424052970204059804577229390105521090

    • Search Google Scholar
    • Export Citation
  • Gray, P. W. (2013) ‘Leaderless resistance, networked organisation, and ideological hegemony’, Terrorism and Political Violence, 25(5): 65571.

    • Search Google Scholar
    • Export Citation
  • Greenberg, A. (2012a) This Machine Kills Secrets: Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers, New York: Penguin Group.

    • Search Google Scholar
    • Export Citation
  • Greenberg, A. (2012b) ‘Anonymous hackers swat at Syrian government websites in reprisal for internet blackout’, Forbes, 30 November. Available from: http://www.forbes.com/sites/andygreenberg/2012/11/30/anonymous-hackers-swat-at-syrian-government-websites-in-reprisal-for-internet-blackout/#105975b4418f

    • Search Google Scholar
    • Export Citation
  • Greenwald, G. (2011) ‘The leaked campaign to attack Wikileaks and its supporters’, Salon.com, 11 February. Available from: https://www.salon.com/2011/02/11/campaigns_4/

    • Search Google Scholar
    • Export Citation
  • Greenwalt, K. (1989) ‘Free speech justifications’, Columbia Law Review, 89(1): 11955.

  • Gregg, N. (1993) ‘“Trying to put first things first”: negotiating subjectivities in a workplace organizing campaign’, in S. Fisher and K. Davis (eds), Negotiating at the Margins: The Gendered Discourses of Power and Resistance, New Brunswick, NJ: Rutgers University Press, pp 172–204.

    • Search Google Scholar
    • Export Citation
  • Griffin, A. (2016) ‘WhatsApp end-to-end encryption update might have made chat app illegal in India’, Independent, 8 April. Available from: http://www.independent.co.uk/life-style/gadgets-and-tech/news/whatsapp-end-to-end-encryption-update-might-have-made-chat-app-illegal-in-india-a6974921.html

    • Search Google Scholar
    • Export Citation
  • Griswold, E. N. (1989) ‘Secrets not worth keeping’, The Washington Post, 15 February. Available from: https://www.washingtonpost.com/archive/opinions/1989/02/15/secrets-not-worth-keeping/a115a154-4c6f-41fd-816a-112dd9908115/

    • Search Google Scholar
    • Export Citation
  • Grofman, B., Owen, G. and Feld, S. (1983) ‘Thirteen theorems in search of the truth’, Theory and Decision, 15: 26178.

  • Gross, H. (1971) ‘Privacy and autonomy’, in J. R. Pennock and J. W. Chapman (eds), Privacy: Nomos XIII, New York: Atherton Press, pp 16981.

    • Search Google Scholar
    • Export Citation
  • Habermas, J. (1996) Between Facts and Norms: Contributions to a Discourse Theory of Law and Democracy, Cambridge: Polity Press.

  • Halliday, J. (2011) ‘Anonymous hackers breach San Francisco BART transport website’, The Guardian, 15 August. Available from: https://www.theguardian.com/technology/2011/aug/15/anonymous-hackers-breach-bart-website

    • Search Google Scholar
    • Export Citation
  • Halliday, J. and Arthur, C. (2010) ‘Wikileaks: who are the hackers behind Operation Payback?’, The Guardian, 8 December. Available from: https://www.theguardian.com/media/2010/dec/08/anonymous-4chan-wikileaks-mastercard-paypal

    • Search Google Scholar
    • Export Citation
  • Hampson, N. (2012) ‘Hacktivism: a new breed of protest in a networked world’, Boston College International and Comparative Law Review, 35(2): 51142.

    • Search Google Scholar
    • Export Citation
  • Harding, L. and Leigh, D. (2011) ‘Wikileaks: how US political invective turned on “anti-American” Julian Assange’, The Guardian, 3 February. Available from: https://www.theguardian.com/world/2011/feb/03/wikileaks-julian-assange-us-reaction

    • Search Google Scholar
    • Export Citation
  • Harmon, A. (1999) ‘“Hacktivists” of all persuasions take their struggle to the web’, The New York Times, 31 October. Available from: http://www.nytimes.com/1998/10/31/world/hacktivists-of-all-persuasions-take-their-struggle-to-the-web.html

    • Search Google Scholar
    • Export Citation
  • Harris, C., Pritchard, M. S. and Rabins, M. J. (2005) Engineering Ethics: Concepts and Cases, Belmont, CA: Wadsworth.

  • Harris, D. (1999) ‘Driving while black and other traffic offences: the Supreme Court and pretextual traffic stops’, The Journal of Criminal Law and Criminology, 87: 54482.

    • Search Google Scholar
    • Export Citation
  • Harris, D. (2002) ‘Racial profiling revisited: “just common sense” in the fight against terror?’, Criminal Justice, 17: 3659.

    • Search Google Scholar
    • Export Citation
  • Hausman, D. and McPhereson, M. (1996) Economic Analysis and Moral Philosophy, Cambridge: Cambridge University Press.

  • Heinze, E. and Steel, B. J. (eds) (2009) Ethics, Authority, and War: Non-State Actors and the Just War Tradition, New York: Palgrave Macmillan.

    • Search Google Scholar
    • Export Citation
  • Hendler, J. (2013) ‘It’s time to reform the Computer Fraud and Abuse Act’, Scientific American, 16 August. Available from: https://www.scientificamerican.com/article/its-times-reform-computer-fraud-abuse-act/

    • Search Google Scholar
    • Export Citation
  • Herman, B. (1996) The Practice of Moral Judgement ,Cambridge, MA: Harvard University Press.

  • Hern, A. (2015) ‘Anonymous “at war” with Isis, hacktivist group confirms’, The Guardian, 17 December. Available from: https://www.theguardian.com/technology/2015/nov/17/anonymous-war-isis-hacktivist-group-confirms

    • Search Google Scholar
    • Export Citation
  • Hern, A. (2016) ‘Islamic State Twitter account gets a rainbow makeover from Anonymous’, The Guardian, 17 June. Available from: https://www.theguardian.com/technology/2016/jun/17/islamic-state-twitter-accounts-rainbow-makeover-anonymous-hackers

    • Search Google Scholar
    • Export Citation
  • Hersh, M. (2002) ‘Whistle-blowers: heroes or traitors? Individual and collective responsibility for ethical behaviour’, Annual Reviews in Control, 26: 24362.

    • Search Google Scholar
    • Export Citation
  • Higgins, P. (2013) ‘Critical fixes for the Computer Fraud and Abuse Act’, Electronic Frontier Foundation, 29 January. Available from: https://www.eff.org/deeplinks/2013/01/these-are-critical-fixes-computer-fraud-and-abuse-act

    • Search Google Scholar
    • Export Citation
  • Hill, E. (2011a) ‘Hackers hit Tunisian websites’, Al Jazeera, 3 January. Available from: https://www.aljazeera.com/news/2011/1/3/hackers-hit-tunisian-websites

    • Search Google Scholar
    • Export Citation
  • Hill, E. (2011b) ‘How “rebel” phone network evaded shutdown’, Al Jazeera, 23 April. Available from: http://www.aljazeera.com/indepth/features/2011/04/20114233530919767.html

    • Search Google Scholar
    • Export Citation
  • Himma, K. (2005) ‘Hacking as politically motivated digital civil disobedience: is hacktivism morally justified?’, SSRN, 5 September. Available from: https://ssrn.com/abstract=799545

    • Search Google Scholar
    • Export Citation
  • Himma, K. (2008) ‘Ethical issues involving computer security: hacking, hacktivism, and counterhacking’, in K. Himma and H. Tavani (eds), The Handbook of Information and Computer Ethics, Hoboken, NJ: Wiley.

    • Search Google Scholar
    • Export Citation
  • Hine, K. D. (1998) ‘Vigilantism revisited: an economic analysis of the law of extra-judicial self-help or why can’t Dick shoot Henry for stealing Jane’s truck’, American University Law Review, 47: 122155 .

    • Search Google Scholar
    • Export Citation
  • von Hirsch, A. (2000) ‘The ethics of public television surveillance’, in A. Hirsch, D. Garland and A. Wakefield (eds), Ethical and Social Perspectives on Situational Crime Prevention, Oxford: Hart Publishing, pp 5976.

    • Search Google Scholar
    • Export Citation
  • Hobbes, T. (1985) [1651] Leviathan, London: Penguin Classics.

  • Hoffman, W. M. (1984) ‘The Ford Pinto’, in W. Hoffman, and J. Moore (eds), Business Ethics: Readings and Cases in Corporate Morality, New York: Wiley, pp 24960.

    • Search Google Scholar
    • Export Citation
  • Hohfeld, W. N. (1913) ‘Some fundamental legal conceptions as applied in judicial reasoning’, Yale Law Journal, 23: 1659.

  • Hollander, J. A. and Einwohner, R. L. (2004) ‘Conceptualising resistance’, Sociological Forum, 19(4): 53354.

  • Holmes, O. (2012) ‘Anonymous declares internet war on Syria’, ABC News, 30 November. Available from: https://www.nbcnews.com/tech/tech-news/anonymous-declares-internet-war-syria-flna1c7350148

    • Search Google Scholar
    • Export Citation
  • Holt, T., Freilich, J. and Chermak, S. (2017) ‘Exploring the subculture of ideologically motivated cyber-attackers’, Journal of Contemporary Criminal Justice, 33(3): 21233.

    • Search Google Scholar
    • Export Citation
  • Horsey, H. R. (1994) ‘The duty of care component of the Delaware business judgment rule’, Delaware Journal of Corporate Law, 19(3): 97198.

    • Search Google Scholar
    • Export Citation
  • Huazhong, W. (2010) ‘Drunken driver boasts father is a police official’, China Daily, 7 November. Available from: http://www.chinadaily.com.cn/china/2010-10/20/content_11431705.htm

    • Search Google Scholar
    • Export Citation
  • Hunn, D. (2014) ‘How Anonymous hackers changed Ferguson, Mo., protests’, Government Technology, 13 August. Available from: https://www.govtech.com/public-safety/how-computer-hackers-changed-the-ferguson-protests.html

    • Search Google Scholar
    • Export Citation
  • Hunt, G. (1995) Whistleblowing in the Health Service: Accountability, Law and Professional Practice, London: Edward Arnold.

  • Information Warfare Monitor (2009) ‘Tracking Ghostnet: investigating a cyber espionage network’, 29 March. Available from: http://www.nartv.org/mirror/ghostnet.pdf

    • Search Google Scholar
    • Export Citation
  • Innes, J. (1996) Privacy, Intimacy and Isolation, Oxford: Oxford University Press.

  • Jackson, W. (2011) ‘BART website breach exposes divisions within hacktivist group’, GCN, 18 August. Available from: https://gcn.com/cybersecurity/2011/08/bart-website-breach-exposes-divisions-within-hacktivist-group/282337/

    • Search Google Scholar
    • Export Citation
  • Jackson, R. and Pisoiu, D. (2018) Contemporary Debates on Terrorism, Abingdon: Routledge.

  • Jackson, R., Jarvis, L., Gunning, J. and Breen-Smyth, M. (2011) Terrorism: A Critical Introduction, Basingstoke: Palgrave Macmillan.

  • Jensen, J. V. (1987) ‘Ethical tension points in whistleblowing’, Journal of Business Ethics, 9: 3218.

  • Jeter, L. (2003) Disconnected: Deceit and Betrayal at WorldCom, Hoboken, NJ: John Wiley and Sons.

  • Johnson, R. A. (2003) Whistleblowing: When It Works and Why, Boulder, CO: Lynne Rienner Publishers.

  • Johnston, L. (1996) ‘What is vigilantism?’, British Journal of Criminology, 36(2): 22036.

  • Jordan, T. (2014) Internet, Society and Culture Communicative Practices Before and After the Internet, London: Bloomsbury.

  • Jordan, T. and Taylor, P. A. (2004) Hackers and Cyberwars: Rebels with a Cause?, London: Routledge.

  • Jos, P. H., Tompkins, M. E. and Hays, S. W. (1989) ‘In praise of difficult people: a portrait of the committed whistleblower’, Public Administration Review, 49(6): 55261.

    • Search Google Scholar
    • Export Citation
  • Kang, J. (1998) ‘Information privacy in cyberspace transactions’, Stanford Law Review, 50(4): 1193294.

  • Kasachkoff, T. (1998) ‘Killing in self-defense: an unquestionable or problematic defense?’, Law and Philosophy, 17(5–6): 50931.

    • Search Google Scholar
    • Export Citation
  • Keefe, P. (2005) Chatter: Dispatches from the Secret World of Global Eavesdropping, New York: Random House.

  • Kennedy, R. (1997) Race Crime and the Law, New York: Pantheon.

  • King, J. (1998) ‘Information in cyberspace transactions’, Stanford Law Review, 50(4): 1193294.

  • Kizza, J. M. (2020) Guide to Computer Network Security, Berlin: Springer.

  • Klein, A. G. (2015) ‘Vigilante media: unveiling Anonymous and the hacktivist persona in the global press’, Communication Monographs, 82(3): 379401.

    • Search Google Scholar
    • Export Citation
  • Kleinig, J. (1976) ‘Good Samaritanism’, Philosophy and Public Affairs, 5(4): 382407.

  • Kono, D. (2006) ‘Optimal obfuscation: democracy and trade policy transparency’, American Political Science Review, 100: 36984.

  • Konvitz, M. R. (1966) ‘Privacy and the law: a philosophical prelude’, Law and Contemporary Problems, 31(2): 27280.

  • Krauth, A. (2012), ‘Anonymous in portmanteaupia’, Social Alternatives, 31(2): 2732.

  • Krebs on Security (2011) ‘HBGary Federal hacked by Anonymous’, Krebs on Security, 7 February. Available from: https://krebsonsecurity.com/2011/02/hbgary-federal-hacked-by-anonymous/

    • Search Google Scholar
    • Export Citation
  • Kumar, M. (2011) ‘Anonymous open letter to citizens of United States of America!’, The Hacker News, 24 March. Available from: https://thehackernews.com/2011/03/anonymous-open-letter-to-citizens-of.html

    • Search Google Scholar
    • Export Citation
  • Kutz, C. (2007) ‘Causeless complicity’, Criminal Law and Philosophy, 1(2): 289305.

  • Lackey, D. P. (1989) The Ethics of War and Peace, London: Prentice Hall International.

  • Lam, O. (2010) ‘China: my father is Li Gang!’ Global Voices, 22 October. Available from: https://globalvoices.org/2010/10/22/china-my-father-is-li-gang/

    • Search Google Scholar
    • Export Citation
  • Landler, M. and Markoff, J. (2007) ‘In Estonia, what may be the first war in cyberspace’, The New York Times, 28 May. Available from: https://www.nytimes.com/2007/05/28/business/worldbusiness/28iht-cyberwar.4.5901141.html

    • Search Google Scholar
    • Export Citation
  • Laufer, R. and Wolfe, M. (1977) ‘Privacy as a concept and social issue’, The Journal of Social Issues, 33(3): 2242.

  • Laugerud, S. (2021) ‘Narrating the harm of rape: how rape victims invoke different models of psychological trauma’, BioSocieties, 16: 2240.

    • Search Google Scholar
    • Export Citation
  • Lee, H. (2018) ‘A new societal self-defense theory of punishment: the rights-protection theory’, Philosophia, 46: 33753.

  • Lefkowitz, D. (2007) ‘On a moral right to civil disobedience’, Ethics, 117(2): 20233.

  • Leigh, D. and Harding, L. (2011) WikiLeaks: Inside Julian Assange’s War on Secrecy, London: Guardian Books.

  • Lenard, N. (2012) ‘Anonymous takes on Syrian government’, The Salon, 30 November. Available from: https://www.salon.com/2012/11/30/anonymous_takes_on_syrian_government/

    • Search Google Scholar
    • Export Citation
  • Lennerfors, T. (2007) ‘The transformation of transparency: on the act on public procurement and the right to appeal in the context of the war on corruption’, Journal of Business Ethics, 73(4): 38190.

    • Search Google Scholar
    • Export Citation
  • Lepora, C. and Goodin, R. (2013) On Complicity and Compromise, Oxford: Oxford University Press.

  • Lever, A. (2005) ‘Why racial profiling is hard to justify: a response to Risse and Zeckhauser’, Philosophy and Public Affairs, 33(1): 94110.

    • Search Google Scholar
    • Export Citation
  • Leverick, F. (2006) Killing in Self-Defence, Oxford: Oxford University Press.

  • Levy, S. (1984) Hackers: Heroes of the Computer Revolution, New York: Doubleday.

  • Lewis, D. (1989) ‘Mill and Milquetoast’, Australasian Journal of Philosophy, 67: 15271.

  • Lewis, J. (2002) ‘Assessing the rise of cyber terrorism, cyber war and other cyber threats’, Centre for Strategic and International Studies. Available from: https://csis-website-prod.s3.amazonaws.com/s3fs-public/legacy_files/files/media/csis/pubs/021101_risks_of_cyberterror.pdf

    • Search Google Scholar
    • Export Citation
  • Li, X. (2013) ‘Hacktivism and the First Amendment: drawing the line between cyber protests and crime’, Harvard Journal of Law & Technology, 7(1): 30130.

    • Search Google Scholar
    • Export Citation
  • Lindley, R. (1986) Autonomy, Basingstoke: Palgrave Macmillan.

  • List, C. and Goodin, R. E. (2001) ‘Epistemic democracy: generalizing the Condorcet jury theorem’, Journal of Political Philosophy, 9: 277306.

    • Search Google Scholar
    • Export Citation
  • List, C., Elsholtz, C. and Seeley T. D. (2009) ‘Independence and interdependence in collective decision making: an agent-based model of nest-site choice by honeybee swarms’, Philosophical Transactions of the Royal Society B, 364: 755–62.

    • Search Google Scholar
    • Export Citation
  • Littauer, D. (2013) ‘Anonymous hacks Nigeria’s government website over anti-gay bill’, LGBTQ Nation, 5 July. Available from: http://www.lgbtqnation.com/2013/07/anonymous-hacks-nigerias-government-website-over-anti-gay-bill/

    • Search Google Scholar
    • Export Citation
  • Little, C. B. and Sheffield, C. P. (1983) ‘Frontiers and criminal justice: English private prosecution societies and American vigilantism in the eighteenth and nineteenth centuries’, American Sociological Review, 48(6): 796808.

    • Search Google Scholar
    • Export Citation
  • Liu, A. (2004) The Laws of Cool: Knowledge Work and the Culture of Information, Chicago, IL: University of Chicago Press.

  • Locke, J. (1988)[1689] Two Treatises of Government, Cambridge: Cambridge University Press.

  • Lopez, K. J. (2010) ‘On this Sunday outrage’, National Review, 29 November. Available from: https://www.nationalreview.com/corner/sunday-outrage-kathryn-jean-lopez/

    • Search Google Scholar
    • Export Citation
  • Loveluck, B. (2020) ‘The many shades of digital vigilantism: a typology of online self-justice’, Global Crime, 21(3–4): 21341.

  • Lowes, D. E. (2006) The Anti-Capitalist Dictionary: Movements, Histories and Motivations, Halifax, Canada: Fernwood Publishing Ltd.

  • Lu, D. (2015) ‘When ethical hackers can’t compete’, The Atlantic, 8 December. Available from: https://www.theatlantic.com/technology/archive/2015/12/white-hat-ethical-hacking-cybersecurity/419355/

    • Search Google Scholar
    • Export Citation
  • Luban, D. (2005) ‘Liberalism, torture and the ticking bomb’, Virginia Law Review, 9(6): 142561.

  • Ludlow, P. (2013) ‘Aaron Swartz was right’, The Chronical of Higher Education, 25 February. Available from: https://www.chronicle.com/article/Aaron-Swartz-Was-Right/137425

    • Search Google Scholar
    • Export Citation
  • Lynch, W. and Kline, R. (2000) ‘Engineering practice and engineering ethics’, Science, Technology, & Human Values, 25(2): 195225.

    • Search Google Scholar
    • Export Citation
  • Lyon, D. (1994) The Electronic Eye: The Rise of Surveillance Society, Cambridge: Polity Press.

  • Mack, E. (1980) ‘Bad Samaritanism and causation of harm’, Philosophy and Public Affairs, 9(3): 23059.

  • Mahat, R. (2008) ‘A carrot for the lawyer: providing economic incentives for in-house lawyers in a Sarbanes-Oxley Regime’, The Georgetown Journal of Legal Ethics, 21(3): 91334.

    • Search Google Scholar
    • Export Citation
  • Manion, M. and Goodrum, A. (2000) ‘Terrorism or civil disobedience: towards a hacktivist ethic’, Computers and Society, 30(2): 1419.

    • Search Google Scholar
    • Export Citation
  • Mansfield-Devine, S. (2011a) ‘Hacktivism: assessing the damage’, Network Security, 8: 513.

  • Mansfield-Devine, S. (2011b) ‘Anonymous: serious threat or mere annoyance?’, Network Security, 11(1): 410.

  • Markel, D. (2011) ‘What might retributive justice be? An argument for the confrontational conception of retributivism’, in M. White (ed), Retributivism: Essays on Theory and Policy, Oxford: Oxford University Press, pp 4972.

    • Search Google Scholar
    • Export Citation
  • Martin, R. (1970) ‘Civil disobedience’, Ethics, 80(1): 12339.

  • Marx, G. (1998) ‘Ethics for the new surveillance’, The Information Society, 14(3): 17185.

  • Marx, G. (2004) ‘Some concepts that may be useful in understanding the myriad forms and contexts of surveillance’, Intelligence and National Security, 19(2): 234.

    • Search Google Scholar
    • Export Citation
  • Mazzetti, M. (2015) ‘CIA report found value of brutal interrogation was inflated’, The New York Times, 20 January. Available from: http://www.nytimes.com/2015/01/21/world/cia-report-found-value-of-brutal-interrogation-was-inflated.html?_r=1

    • Search Google Scholar
    • Export Citation
  • McAdam, D. (1982) Political Process and the Development of Black Insurgency ,Chicago, IL: University of Chicago Press.

  • McAfee and the Center for Strategic and International Studies (2013) The Economic Impact of Cybercrime and Cyber Espionage, July. Available from: http://csis.org/files/publication/60396rpt_cybercrime-cost_0713_ph4_0.pdf

    • Search Google Scholar
    • Export Citation
  • McArthur, R. (2001) ‘Reasonable expectations of privacy’, Ethics and Information Technology, 3: 1238.

  • McCahill, M. (1998) ‘Beyond Foucault: towards a contemporary theory of surveillance’, in C. Norris, J. Moran, and G. Armstrong (eds), Surveillance, Closed-Circuit Television and Social Control, Aldershot: Ashgate, pp 4165.

    • Search Google Scholar
    • Export Citation
  • McCormick, T. (2013) ‘Anthropology of an idea: hacktivism’, Foreign Policy, 200: 245.

  • McGlynn, J. and Richardson, B. K. (2014) ‘Private support, public alienation: whistle-blowers and the paradox of social support’, Western Journal of Communication, 78(2): 21337.

    • Search Google Scholar
    • Export Citation
  • McGoogan, C., Titcomb, J. and Krol, C. (2017) ‘What is WannaCry and how does ransomware work?’, The Telegraph, 18 May. Available from: http://www.telegraph.co.uk/technology/0/ransomware-does-work/

    • Search Google Scholar
    • Export Citation
  • McMahan, J. (1994) ‘Innocence, self-defence and killing in war’, The Journal of Political Philosophy, 2(1): 193221.

  • McMahan, J. (2006) ‘On the moral equality of combatants’, Journal of Political Philosophy, 14(4): 37793.

  • McPherson, R., Houmansadr, A. and Shmatikov, V. (2016) ‘Covertcast: using live streaming to evade internet censorship’, Proceedings on Privacy Enhancing Technologies, 3: 21225.

    • Search Google Scholar
    • Export Citation
  • McReynolds, P. (2015) ‘How to think about cyber conflict involving non-state actors’, Philosophy and Technology, 28: 42748.

  • Menn, J. (2019) Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World, New York: Public Affairs.

  • Merton, R. (1968) Social Theory and Social Structure, New York: Free Press.

  • metac0m (2003) ‘What is hacktivism 2.0’, The Hacktivist, December. Available from: http://edshare.soton.ac.uk/8762/2/whatishacktivism.pdf

    • Search Google Scholar
    • Export Citation
  • Metz, C. (2008) ‘Anonymous hacks Sarah Palin’s Yahoo! Account’, The Register, 17 September. Available from: http://www.theregister.co.uk/2008/09/17/anonymous_hacks_sarah_palin/

    • Search Google Scholar
    • Export Citation
  • Meyers, D. T. (1995) ‘Rights in collision: a non-punitive compensatory remedy for abusive speech’, Law and Philosophy, 14: 20343.

    • Search Google Scholar
    • Export Citation
  • Mill, J. S. (1968) On Liberty, in M. Cowling (ed.) Selected Writings of John Stuart Mill, New York: The New American Library, p 121.

  • Mill, J. S. (1991) On Liberty, ed. John Gray, Oxford: Oxford University Press.

  • Mill, J. S. (2005) On Liberty, New York: Cosimo.

  • Miller, A. (1971) The Assault on Privacy: Computers, Databanks and Dossiers, Michigan: University of Michigan Press.

  • Milone, M. G. (2002) ‘Hacktivism: securing the national infrastructure’, The Business Lawyer, 58(1): 383413.

  • Milton, J. (1968 [1644]) Areopagitica, New York: New York University Press.

  • Modighaini, A. and Rachel, F. (1995) ‘The role of interaction sequences and the timing of resistance in shaping obedience and defiance to authority’, Journal of Social Issues, 51: 10723.

    • Search Google Scholar
    • Export Citation
  • Monagham, H. P. (1977) ‘Of liberty and property’, Cornell Law Review, 62(1): 40444.

  • Monroe, A. and Malle, B. (2014) ‘Free will without metaphysics’, in A. R. Mele (ed.), Surrounding Free Will, New York: Oxford University Press, pp 2548.

    • Search Google Scholar
    • Export Citation
  • Montague, P. (1989) ‘The morality of self-defense: a reply of Wasserman’, Philosophy and Public Affairs, 18(1): 819.

  • Moore, A. (2011) ‘Privacy, security, and government surveillance: Wikileaks and the new accountability’, Public Affairs Quarterly, 25(2): 14156.

    • Search Google Scholar
    • Export Citation
  • Moore, M. (2010) Placing Blame: A Theory of Criminal Law, Oxford: Oxford University Press.

  • Morris, A. (1984) The Origins of the Civil Rights Movement, New York: Free Press.

  • Morris, K. (2013) ‘Anonymous has finally released the names of Rehtaeh Parsons’s alleged rapists’, Daily Dot, 24 July. Available from: http://www.dailydot.com/news/rehtaeh-parsons-rapists-names-identity-revealed-anonymous/

    • Search Google Scholar
    • Export Citation
  • Morrissey, D. (1997) Disclosure and Secrecy: Security Classification Executive Orders, Columbia: AEJMC.

  • Murphy, J. G. (2007) ‘Legal moralism and retribution revisited’, Criminal Law and Philosophy, 1: 520.

  • Murphy, S. (2011) ‘Agents provocateurs: hacktivists have noisily exposed the sorry state of internet security’, New Scientist, 10 September.

    • Search Google Scholar
    • Export Citation
  • Musil, S. (2012) ‘Anonymous declares war on Syrian government’, CNet, 29 November. Available from: https://www.cnet.com/tech/services-and-software/anonymous-declares-war-on-syrian-government-web-sites/

    • Search Google Scholar
    • Export Citation
  • Nagel, T. (1986) The View from Nowhere, Oxford: Oxford University Press.

  • Nagel, T. (1995) ‘Personal rights and public space’, Philosophy and Public Affairs, 24: 83107.

  • Naughton, J. (2000) A Brief History of the Future: Origins of the Internet, London: Phoenix.

  • Near, J. and Miceli, M. (1995) ‘Effective whistleblowing’, Academy of Management Review, 20(3): 679708.

  • The New York Times (2010) ‘A note to readers: the decision to punish diplomatic documents’, 28 November. Available from: https://www.nytimes.com/2010/11/29/world/29editornote.html

    • Search Google Scholar
    • Export Citation
  • Nobles, R. and Schiff, D. (2002) ‘The right to appeal and workable systems of justice’, The Modern Law Review, 65(5): 676701.

  • Norman, R. (1995) Ethics, Killing and War, Cambridge: Cambridge University Press.

  • Norton, Q. (2012) ‘How Anonymous picks targets, launches attacks, and takes powerful organizations down’, Wired, 3 July. Available from: https://www.wired.com/2012/07/ff-anonymous/

    • Search Google Scholar
    • Export Citation
  • Nozick, R. (1974) Anarchy, State, and Utopia, New York: Basic Books.

  • Nussbaum, M. (2000) Women and Human Development: The Capabilities Approach, Cambridge: Cambridge University Press.

  • Ochi, M. (2016) ‘Gravity threshold before the International Criminal Court: an overview of the court’s practice’, International Crimes Database Brief, 19 January: 1–16.

    • Search Google Scholar
    • Export Citation
  • Olson, P. (2011) ‘Anonymous hacks BART after cellphone blockade’, Forbes, 15 August. Available from: https://www.forbes.com/sites/parmyolson/2011/08/15/anonymous-hacks-bart-after-cellphone-blockade/

    • Search Google Scholar
    • Export Citation
  • O’Malley, G. (2013) ‘Hacktivism: cyber-activism or cyber-crime’, Trinity College Law Review, 16: 13760.

  • O’Neil, L. (2015) ‘Anonymous plans to “unhood” 1,000 Ku Klux Klan members online’, CBC News, 29 October. Available from: https://www.cbc.ca/news/trending/anonymous-plans-to-reveal-the-identities-of-1-000-kkk-members-1.3295523

    • Search Google Scholar
    • Export Citation
  • Ong, G. (2016) ‘IT grad, 23, arrested for Comelec website hack’, The Philippine Star, 22 April. Available from: http://www.philstar.com/headlines/2016/04/22/1575594/it-grad-23-arrested-comelec-website-hack

    • Search Google Scholar
    • Export Citation
  • Orend, B. (2006) The Morality of War, Calgary: Broadview Press.

  • Otsuka, M. (1994) ‘Killing the innocent in self-defense’, Philosophy and Public Affairs, 23(1): 7494.

  • Owen, T. (2015) Disruptive Power: The Crisis of the State in the Digital Age, Oxford: Oxford University Press.

  • Padmanabhan, S. (2012) ‘Hacking for Lulz1: employing expert hackers to combat cyber terrorism’, Vanderbilt Journal of Entertainment and Technology Law, 15(1): 191226.

    • Search Google Scholar
    • Export Citation
  • Paine, S. (2000) Endangered Spaces: Privacy, Law and the Home, CAMC Publications.

  • Pattison, J. (2018) The Alternatives to War: From Sanctions to Nonviolence ,Oxford: Oxford University Press.

  • Pedhazur, A. and Perliger, A. (2003) ‘The causes of vigilant political violence: the case of Jewish settlers’, Civil Wars, 6(3): 930.

    • Search Google Scholar
    • Export Citation
  • Perlroth, N. (2014) ‘Anonymous hackers’ efforts to identify Ferguson police officer create turmoil’, The New York Times, 14 August. Available from: https://www.nytimes.com/2014/08/15/us/ferguson-case-roils-collective-called-anonymous.html

    • Search Google Scholar
    • Export Citation
  • Pfaff, T. and Tiel, J. (2004) ‘The ethics of espionage’, The Journal of Military Ethics, 3(1): 115.

  • Phillips, R. (1984) War and Justice, Norman: University of Oklahoma Press.

  • Poeter, D. (2011) ‘Anonymous BART protest shuts down several underground stations’, PCMag, 16 August. Available from: https://uk.pcmag.com/news/111848/anonymous-bart-protest-shuts-down-several-underground-stations

    • Search Google Scholar
    • Export Citation
  • Pogge, T. (1991) ‘Coercion and violence’, in J. Brady and N. Garver (eds), Justice, Law and Violence, Philadelphia, PA: Temple University Press, pp 659.

    • Search Google Scholar
    • Export Citation
  • Polyviou, P. (1982) Search and Seizure: Constitutional and Common Law ,London: Duckworth.

  • Posner, G. (2017) ‘China’s secret cyberterrorism’ (updated), The Daily Beast, 14 July. Available from: http://www.thedailybeast.com/articles/2010/01/13/chinas-secret-cyber-terrorism.html

    • Search Google Scholar
    • Export Citation
  • Post, R. (1991) ‘Racist speech, democracy, and the First Amendment’, William and Mary Law Review, 32: 267327.

  • Post, R. (1993) ‘Managing deliberation: the quandary of democratic dialogue’, Ethics, 103: 65478.

  • Pozen, D. (2016) ‘Privacy-privacy tradeoffs’, The University of Chicago Law Review, 83(1): 22147.

  • Prasdas, A. and Prasad, P. (1998) ‘Everyday struggles at the workplace: the nature and implications of routine resistance in contemporary organizations’, Research in the Sociology of Organizations, 15: 22557.

    • Search Google Scholar
    • Export Citation
  • Profitt, N. J. (1996) ‘“Battered women” as “victims” and “survivors”: creating space for resistance’, Canadian Social Work Review/Revue Canadienne de Service Social, 13(1): 2338.

    • Search Google Scholar
    • Export Citation
  • Purshouse, J. (2019) ‘Paedophile hunters: how citizen-led policing is putting people’s lives at risk’, The Conversation, 22 January. Available at: https://theconversation.com/paedophile-hunters-how-citizenled-policing-is-putting-peoples-lives-at-risk-110006

    • Search Google Scholar
    • Export Citation
  • Raggi, R. (1977) ‘An independent right to freedom of association’, Harvard Civil Rights-Civil Liberties Law Review, 12(1): 130.

  • Rangarajan, L. N. (1998) ‘Diplomacy, states and secrecy in communications’, Diplomacy & Statecraft, 9(3): 1824.

  • Rawls, J. (1971) Theory of Justice, Cambridge, MA: Harvard University Press.

  • Rawls, J. (1977) Theory of Justice, Cambridge: Cambridge University Press.

  • Rawls, J. (2007) Lectures on the History of Political Philosophy, ed. Samuel Freeman, Cambridge, MA: Harvard University Press.

  • Rawls, J. (2009) ‘The justification of civil disobedience’, in A. Kavanagh and J. Oberdiek (eds), Arguing about Law, Abingdon: Routledge, pp 24453.

    • Search Google Scholar
    • Export Citation
  • Raz, J. (1986) The Morality of Freedom ,Oxford: Clarendon Press.

  • Razmetaeva, Y. (2014) ‘The right to resist and the right to rebellion’, Jurisprudence, 21(3): 75884.

  • Reed, M. G.,Syverson, P. and Goldschlag, D. (1998) ‘Anonymous connections and onion routing’, IEEE Journal on Selected Areas in Communications, 16(4): 48294.

    • Search Google Scholar
    • Export Citation
  • Reiman, J. H. (1976) ‘Privacy, intimacy, and personhood’, Philosophy and Public Affairs, 5(1): 2644.

  • Rescher, N. (1972) Welfare: The Social Issue in Philosophical Perspective ,Pittsburgh, PA: University of Pittsburgh Press.

  • Reynolds, P. (2015) ‘How to think about cyber conflicts involving non-state actors’, Philosophy and Technology, 28(3): 42748.

  • Richmond, S. (2011) ‘Millions of internet users hit by massive Sony PlayStation data theft’, The Telegraph, 26 April. Available from: https://www.telegraph.co.uk/technology/sony/8475728/Millions-of-internet-users-hit-by-massive-Sony-PlayStation-data-theft.html

    • Search Google Scholar
    • Export Citation
  • Robinson, M. (2000) ‘The construction and reinforcement of the myth of race crime’, Journal of Contemporary Criminal Justice, 16: 13356.

    • Search Google Scholar
    • Export Citation
  • Robinson, T. (1995) ‘Gentrification and grassroots resistance in San Francisco’s Tenderloin’, Urban Affairs Review, 30: 382513.

    • Search Google Scholar
    • Export Citation
  • Rogers, A. (2014) ‘What Anonymous is doing in Ferguson’, Time, 21 August. Available from: http://time.com/3148925/ferguson-michael-brown-anonymous/

    • Search Google Scholar
    • Export Citation
  • Rosenbaum, H. J. and Sederberg, P. C. (1974) ‘Vigilantism: an analysis of establishment violence’, Comparative Politics, 6(4): 54170.

    • Search Google Scholar
    • Export Citation
  • Rosenbaum, T. (2004) The Myth of Moral Justice, London: HarperCollins.

  • Rothschild, J. and Miethe, T. (1999) ‘Whistle-blower disclosures and management retaliation’, Work and Occupations, 26(1): 10728.

    • Search Google Scholar
    • Export Citation
  • RT.Com (2014) ‘#TangoDown: Anonymous close Cleveland City govt website over 12yo shooting death’, RT.com, 24 November. Available from: https://www.rt.com/usa/208255-anonymous-cleveland-police-shooting/

    • Search Google Scholar
    • Export Citation
  • Ruffin, O. (2001) ‘The hacktivismo declaration’, Cult of the Dead Cow, 4 July. Available from: https://www.digitalmanifesto.net/manifestos/197/

    • Search Google Scholar
    • Export Citation
  • Sachan, A. (2012) ‘Countering terrorism through dark web analysis’, Computing Communication & Networking Technologies ,Third International Conference.

    • Search Google Scholar
    • Export Citation
  • Sagar ,R. (2016) Secrets and Leaks: The Dilemma of State Secrecy ,Princeton, NJ: Princeton University Press.

  • Sanger, D. (2012) ‘Obama order sped up wave of cyberattacks against Iran’, The New York Times, 1 June. Available from: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html

    • Search Google Scholar
    • Export Citation
  • Sankowski, E. (1992) ‘Blame and autonomy’, American Philosophical Quarterly, 29(3): 2919.

  • Sauter, M. (2015) The Coming Swarm: DDoS Actions, Hacktivism, and Civil Disobedience on the Internet, New York: Bloomsbury.

  • Scanlon, T. (1972) ‘A theory of freedom of expression’, Philosophy and Public Affairs, 1: 20426.

  • Scanlon, T. (1979) ‘Freedom of expression and categories of expression’, University of Pittsburgh Law Review, 40: 51950.

  • Scanlon, T. M. and Daney, J. (2000) ‘Intention and permissibility’, Supplement to the Proceedings of the Aristotelian Society, 74(1): 30117.

    • Search Google Scholar
    • Export Citation
  • Schauer, F. (1993) ‘The phenomenology of speech and harm’, Ethics, 103: 63553.

  • Scheuerman, W. (2016) ‘Digital disobedience in the law’, New Political Science, 38(3): 299314.

  • Schneier, B. (2006) Beyond Fear: Thinking Sensibly about Security in an Uncertain World, Berlin: Springer.

  • Schwartz, B. (1961) ‘The Supreme Court: October 1959 term’, Michigan Law Review, 593: 40330.

  • Scott, J. (1985) Weapons of the Weak: Everyday Forms of Peasant Resistance, New Haven, CT: Yale University Press.

  • Serracino-Inglott, P. (2013) ‘Is it OK to be an Anonymous?’, Ethics & Global Politics, 6(1): 21744.

  • Shapiro, I. (2003) The Moral Foundations of Politics, New Haven, CT: Yale University Press.

  • Sheoran, P. and Singh, S. (2014) ‘Applications of ethical hackers’, International Journal of Enhanced Research in Science Technology & Engineering, 3(5): 11214.

    • Search Google Scholar
    • Export Citation
  • Shils, E. (1966) ‘Privacy: its constitution and vicissitudes’, Law and Contemporary Problems, 31(2): 281306.

  • Shirky, C. (2008) Here Comes Everybody, New York: Penguin Press.

  • Shotland, R. L. (1976) ‘Spontaneous vigilantes’, Society, 13(3): 302.

  • Silberstein, S. (2004) War of Worlds: Language, Politics and 9/11, London: Routledge.

  • Simitis, S. (1987) ‘Reviewing privacy in an information age’, University of Pennsylvania Law Review, 35(3): 70746.

  • Singer, P. (1972) ‘Famine, affluence, and morality’, Philosophy and Public Affairs, 7(2): 22943.

  • Singer, P. (2003) Corporate Warriors: The Rise of the Privatized Military Industry, Ithaca: Cornell University Press.

  • Slim, H. (2002) Killing Civilians: Methods, Madness and Morality in War, Basingstoke: Palgrave.

  • Smallridge, J., Wagner, P. and Crowl, J. (2016) ‘Understanding cyber-vigilantism: a conceptual framework’, Journal of Theoretical and Philosophical Criminology, 8(1): 5770.

    • Search Google Scholar
    • Export Citation
  • Smith, A. (1976) The Theory of Moral Sentiments, Oxford: Clarendon Press.

  • Smith, M. B. E. (1973) ‘Is there a prima facie obligation to obey the law?’, The Yale Law Review, 82(5): 95076.

  • Smith, P. (1990) ‘The duty to rescue and the slippery slope problem’, Social Theory and Practice, 16(1): 1941.

  • Solove, D. (2004) The Digital Person: Technology and Privacy in the Information Age, New York: New York University Press.

  • Solove, D. (2007a) ‘I’ve got nothing to hide and other misunderstandings of privacy’, San Diageo Law Review, 44: 74572.

  • Solove, D. (2007b) The Future of Reputation: Gossip, Rumor, and Privacy on the Internet, London: Yale University Press.

  • Sommer, P. and Brown, I. (2011) ‘Reducing systemic cybersecurity risk’, Organisation for Economic Cooperation and Development, 14 January. Available from: http://ssrn.com/abstract=1743384

    • Search Google Scholar
    • Export Citation
  • Staff, R. (2014) ‘JPMorgan hack exposed data of 83 million, among biggest breaches in history’, Reuters, 3 October. Available from: https://www.reuters.com/article/us-jpmorgan-cybersecurity-idUSKCN0HR23T20141003

    • Search Google Scholar
    • Export Citation
  • Steger, M. (2003) Judging Nonviolence: The Dispute between Realists and Idealists, London: Routledge.

  • Stephey, M. J. (2008) ‘Sarah Palin’s email hacked’, Time, 17 September. Available from: http://content.time.com/time/politics/article/0,8599,1842097,00.html

    • Search Google Scholar
    • Export Citation
  • Sterling, T. (2002) The Enron Scandal, New York: Nova Science Publishing.

  • Stiglitz, J. (1999) ‘On liberty, the right to know, and public discourse: the role of transparency in public life’, in M. J. Gibny (ed.), Globalising Rights: Oxford Amnesty Lecture 1999, pp 132.

    • Search Google Scholar
    • Export Citation
  • Stone, J. (2014) ‘Tamir rice shooting inspires anonymous hack on Cleveland websites’, International Business Times, 24 November. Available from: http://www.ibtimes.com/tamir-rice-shooting-inspires-anonymous-hack-cleveland-websites-1728681

    • Search Google Scholar
    • Export Citation
  • Stone, M. (2011) ‘Operation BART: Anonymous protests San Fran cell phone censorship’, Examiner.com, 14 August. Available from: http://www.examiner.com/anonymous-in-national/operation-bart-anonymous-protests-san-fran-cell-phone-censorship

    • Search Google Scholar
    • Export Citation
  • Strauss, D. (1991) ‘Persuasion, autonomy, and freedom of expression’, Columbia Law Review, 91: 3341.

  • Strossen, N. (1990) ‘Regulating racist speech on campus: a modest proposal?’, Duke Law Journal, 1990: 484572.

  • Sunstein, C. (2005) Laws of Fear: Beyond the Precautionary Principle, Cambridge: Cambridge University Press.

  • Tan, L. (2016) ‘Website claims: registered voters’ sensitive data easily searchable’, CNN Philippines, 21 April. Available from: http://cnnphilippines.com/news/2016/04/21/Comelec-hack-data-registered-Filipino-voters.html

    • Search Google Scholar
    • Export Citation
  • Tanczer, L. (2017) ‘The terrorist – hacker/hacktivist distinction: an investigation of self-identified hackers and hacktivists’, in M. Conway, L. Jarvis, O. Lehane, S. Macdonald and L. Nouri (eds), Terrorists’ Use of the Internet, Amsterdam: IOS Press, pp 7792.

    • Search Google Scholar
    • Export Citation
  • Taylor, P. and Harris, J. (2006) ‘Hacktivism’, in H. Bidgoli (ed.), Handbook of Information Security: Information Warfare; Social Issues, Legal and International Issues; and Security Foundations, Vol.2, Hoboken, NJ: Wiley, pp 17282.

    • Search Google Scholar
    • Export Citation
  • Thomas, D. (2002) Hacker Culture ,Minneapolis: University of Minnesota Press.

  • Thompson, D. F. (1999) ‘Democratic secrecy’, Political Science Quarterly, 114(2): 18193.

  • Thompson, P. B. (2001) ‘Privacy, secrecy and security’, Ethics and Information Technology, 3: 1319.

  • Thomson, J. J. (1975) ‘The right to privacy’, Philosophy and Public Affairs, 4(4): 295314.

  • Thomson, J. J. (1986) Rights, Restitution and Risk: Essays in Moral Theory, Cambridge, MA: Harvard University Press.

  • Thomson, J. J. (1991) ‘Self-defence’, Philosophy and Public Affairs, 20(4): 283310.

  • Thorsen, E., Sreedharan, C. and Allan, S. (2013) ‘WikiLeaks and whistle-blowing: the framing of Bradley Manning’, in B. Brevini, A. Hintz and P. McCurdy (eds), Beyond Wikileaks: Implications for the Future of Communications, Journalism and Society, Basingstoke: Palgrave Macmillan, pp 10122.

    • Search Google Scholar
    • Export Citation
  • Tidy, J. (2022) ‘Anonymous: how hackers are trying to undermine Putin’, BBC News, 20 March. Available from https://www.bbc.co.uk/news/technology-60784526

    • Search Google Scholar
    • Export Citation
  • TOR (nd) ‘What protections does TOR provide?’. Available from: https://www.torproject.org/docs/faq.html.en#WhatProtectionsDoesTorProvide

    • Search Google Scholar
    • Export Citation
  • TOR (2015) ‘Learning more about the GFW’s active probing system’, The TOR Project, 14 September. Available from: https://blog.torproject.org/category/tags/china

    • Search Google Scholar
    • Export Citation
  • Traynor, I. (2007) ‘Russia accused of unleashing cyberwar to disable Estonia’, The Guardian, 17 May. Available from: http://www.guardian.co.uk/world/2007/may/17/topstories3.russia

    • Search Google Scholar
    • Export Citation
  • Trottier, D. (2017) ‘Digital vigilantism as weaponisation of visibility’, Philosophy and Technology, 30: 5572.

  • Tuma, S. E. (2011) ‘What does CFAA mean and why should I care: a primer on the Computer Fraud and Abuse Act for civil litigators’, South Carolina Law Review, 63(1): 14290.

    • Search Google Scholar
    • Export Citation
  • UNESCO (2015) Keystones to Foster Inclusive Knowledge Societies: Access to Information and Knowledge, Freedom of Expression, Privacy, and Ethics on a Global Internet, Paris: UNESCO Publishing. Available from: http://unesdoc.unesco.org/images/0023/002325/232563e.pdf

    • Search Google Scholar
    • Export Citation
  • US Senate Select Committee (2014) Committee Study of the Central Intelligence Agency’s Detention and Interrogation Program. Available from: http://fas.org/irp/congress/2014_rpt/ssci-rdi.pdf

    • Search Google Scholar
    • Export Citation
  • Utterback, J. (2013) ‘Cases of hacktivism’, Hacktivism 101, 28 May. Available from: https://joymargret89.wordpress.com/2013/05/28/cases-of-hacktivism/

    • Search Google Scholar
    • Export Citation
  • Vamosi, R. (2008) ‘Anonymous hackers take on the Church of Scientology’, CNET, 25 January. Available from: https://www.cnet.com/news/anonymous-hackers-take-on-the-church-of-scientology/

    • Search Google Scholar
    • Export Citation
  • Wagenseil, P. (2011) ‘Anonymous “hacktivists” attack Egyptian websites’, Security News Daily, 6 January. Available from: http://www.msnbc.msn.com/id/41280813/ns/technology_and_science-security/#.T3bs0r9SR7E

    • Search Google Scholar
    • Export Citation
  • Waldron, J. (2003) ‘Security and liberty: the image of balance’, Journal of Political Philosophy, 11(2): 191210.

  • Walzer, M. (2000) Just and Unjust Wars: A Moral Argument with Historical Arguments, New York: Basic Books.

  • Wang, F., Zeng, D., Hendler, J. A., Zhang, Q., Feng, Z., Gao, Y. et al (2010) ‘A study of the Human Flesh search engine: crowd-powered expansion of online knowledge’, Computer, 43(8): 4553.

    • Search Google Scholar
    • Export Citation
  • Waqas (2014) ‘Anonymous shuts down city of Cleveland website’, HackRead, 26 November. Available from: https://www.hackread.com/anonymous-shuts-city-cleveland-website/

    • Search Google Scholar
    • Export Citation
  • Wasserman, D. (1987) ‘Justifying self-defense’, Philosophy and Public Affairs, 164(4): 35678.

  • Weaver, W. and Pallitto, R. (2005) ‘State secrets and executive powers’, Political Science Quarterly, 120(1): 85112.

  • Webb, M. (2021) Coding Democracy: How Hackers Are Disrupting Power, Surveillance Authoritarianism, Cambridge, MA: MIT Press.

  • Weinstein, M. A. (1971) ‘The uses of privacy in the good life’, in J. R. Pennock and J. W. Chapman (eds), Privacy: Nomos XIII, New York: Atherton Press, pp 88104.

    • Search Google Scholar
    • Export Citation
  • Wells, C. (2004) ‘National security and the Freedom of Information Act’, Administrative Law Review, 56(4): 1195222.

  • Westin, A. (1967) Privacy and Freedom, London: Bodley Head.

  • Whelan, J. M. (1991) ‘Charity and the duty to rescue’, Social Theory and Practice, 17(3): 44156.

  • Wiemann, G. (2004) ‘Cyberterrorism: how real is the threat?United States Institute for Peace, 119: 212.

  • Williams, G. (2003) ‘Blame and responsibility’, Ethical Thought and Moral Practice, 6: 42745.

  • Williams, J. (2008) ‘Space, scale and just war: meeting the challenge of humanitarian intervention and trans-national terrorism’, Review of International Studies, 34(4): 581600.

    • Search Google Scholar
    • Export Citation
  • Wilmot, S. (2000) ‘Nurses and whistleblowing: the ethical issues’, Philosophical and Ethical Issues, 32(5): 10517.

  • Wong, J. C. (2016) ‘Activists lose criminal case on climate change defense – but judge praises effort’, The Guardian, 15 January. Available from: https://www.theguardian.com/environment/2016/jan/15/delta-5-seattle-washington-climate-change-court-defense

    • Search Google Scholar
    • Export Citation
  • Woodcock, B. (2011) ‘Overview of the Egyptian internet shutdown’, Packet Clearing House, February. Available from: https://privacywonk.net/download/Egypt-PCH-Overview.pdf

    • Search Google Scholar
    • Export Citation
  • Wray, S. (1999) ‘On electronic civil disobedience’, Peace Review, 11(1): 10711.

  • Xu, B. and Shaoting, J. (2008) ‘Human flesh engine: an internet lynching?’, Xinhua News, July 4. Available from: http://news.xinhuanet.com/english/2008-07/04/content_8491087.htm

    • Search Google Scholar
    • Export Citation
  • Zedner, L. (2007) ‘Pre-crime and post criminology’, Theoretical Criminology, 11(2): 26181.

  • Zelizer, B. and Allan, S. (2010) Keywords in News and Journalism Studies, Maidenhead and New York: Open University Press.

  • Zetter, K. (2008) ‘Palin E-mail hacker says it was easy’, Wired, 18 September. Available from: https://www.wired.com/2008/09/palin-e-mail-ha/

    • Search Google Scholar
    • Export Citation
  • Zimring, F. (2003) The Contradictions of American Capital Punishment, Oxford: Oxford University Press.

Content Metrics

May 2022 onwards Past Year Past 30 Days
Abstract Views 447 290 11
Full Text Views 8 0 0
PDF Downloads 2 0 0

Altmetrics