• Abbott, T. G., Lai, K. J.,Lieberman, M. R. and Price, E. C. (2007) ‘Browser based attacks on TOR’, Privacy Enhancing Technologies, 4776 (June): 18499.

    • Search Google Scholar
    • Export Citation
  • Ackerman, B. (2006) Before the Next Attack: Preserving Civil Liberties in the Age of Terrorism, New Haven, CT: Yale University Press.

  • Adams, J. (2013) ‘Decriminalizing hacktivism: finding space for free speech protests on the internet’, SSRN, 15 December. Available from: https://ssrn.com/abstract=2392945

    • Search Google Scholar
    • Export Citation
  • Agrawal, T., Henry, D. and Finkle, J. (2014) ‘JPMorgan hack exposed data of 83 million, among biggest breaches in history’, Reuters, 3 October. Available from: https://www.reuters.com/article/us-jpmorgan-cybersecurity-idUSKCN0HR23T20141003

    • Search Google Scholar
    • Export Citation
  • Alexander, L. (1976) ‘Self-defence and the killing of non-combatants: a reply to Fullinwider’, Philosophy and Public Affairs, 5(4): 40815.

    • Search Google Scholar
    • Export Citation
  • Alexopoulou, S. and Pavli, A. (2019) ‘“Beneath this mask there is more than flesh, beneath this mask there is an idea”: anonymous as the (super)heroes of the internet?’, International Journal for the Semiotics of Law, 34: 23764.

    • Search Google Scholar
    • Export Citation
  • Altman, I. (1976) ‘Privacy: a conceptual analysis’, Environment and Behaviour, 8(1): 7.

  • Alvarez, A. and Bachman, R. (2007) Violence: The Enduring Problem, London: Sage.

  • Ambinder, M. and Grady, D. (2013) Deep State: Inside the Government Secrecy Industry, Hoboken, NJ: John Wiley & Sons Inc.

  • Anderson, L. (2011) ‘Demystifying the Arab Spring: parsing the differences between Tunisia, Egypt, and Libya’, Foreign Affairs, 90(3): 27.

    • Search Google Scholar
    • Export Citation
  • Anderson, N. (2011) ‘How one man tracked down Anonymous – and paid a heavy price’, Ars Technica, 9 February. Available from: https://arstechnica.com/tech-policy/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price/

    • Search Google Scholar
    • Export Citation
  • Anonymous (2011) ‘AnonNews.org: everything Anonymous’. Available from: http://anonnews.org/press/item/199/

  • Aquinas, T. (2002) ‘From Summa Theologiae’, in C. Brown, T. Nardin and N. Rengger (eds), International Relations in Political Thought, Cambridge: Cambridge University Press, pp 21320.

    • Search Google Scholar
    • Export Citation
  • Arendt, H. (1979) The Origins of Totalitarianism, London: Harcourt, Brace & World.

  • Ars (2011) ‘Anonymous speaks: the inside story of the HBGary Hack’, ARSTechnica, 16 February. Available from: https://arstechnica.com/tech-policy/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack/

    • Search Google Scholar
    • Export Citation
  • Arthur, C. (2013) ‘LulzSec: what they did, who they were and how they were caught’, The Guardian, 16 May. Available from: https://www.theguardian.com/technology/2013/may/16/lulzsec-hacking-fbi-jail

    • Search Google Scholar
    • Export Citation
  • Atkin, Lord (1932) Donoghue v Stevenson, UKHL 100, 26 May.

  • Auty, C. (2004) ‘Political hacktivism: tool of the underdog or scourge of cyberspace?’, New Information Perspectives, 56(4): 21221.

    • Search Google Scholar
    • Export Citation
  • Avant, D. D. (2005) The Market for Force: The Consequences of Privatizing Security, Cambridge: Cambridge University Press.

  • Baber, H. E. (1987) ‘How bad is rape’, Hypatia, 2(2): 12538.

  • Baker, C. E. (1978) ‘Scope of the First Amendment freedom of speech’, UCLA Law Review, 25: 96490.

  • Baker, N. (2003) ‘National security versus civil liberties’, Presidential Studies Quarterly, 33(3): 54767.

  • Baldino, D. (2010) Democratic Oversight of Intelligence Services, Sydney: The Federation Press.

  • Bambauer, D. E. (2013) ‘Privacy versus security’, The Journal of Criminal Law and Criminology, 103(3): 66783.

  • Bamford, J. (2013) ‘NSA snooping was only the beginning. Meet the spy chief leading us into cyberwar’, Wired, 12 June. Available from: https://www.wired.com/2013/06/general-keith-alexander-cyberwar/

    • Search Google Scholar
    • Export Citation
  • Bandura, A. (1986) Social Foundations of Thought and Action: A Social Cognitive Theory, Englewood Cliffs, NJ: Prentice Hall.

  • Bandura, A. (1999) ‘Moral disengagement in the perpetration of inhumanities’, Personality and Social Psychology Review, 3(3): 193209.

    • Search Google Scholar
    • Export Citation
  • Bangkok Post (2015) ‘International hackers strike’, Bangkok Post, 22 October. Available from: http://www.bangkokpost.com/tech/local-news/739884/anonymous-steps-up-single-gateway-protest

    • Search Google Scholar
    • Export Citation
  • Bansal, A. and Arora, M. (2012) ‘Ethical hacking and social security’, Journal of Radix International Educational and Research Consortium, 1(11): 116.

    • Search Google Scholar
    • Export Citation
  • Barber, R. (2001) ‘Hackers profiled: who are they and what are their motivations?’, Computer Fraud and Security, 2(1): 1417.

  • Bauman, Z., Bigo, D., Esteves, P., Guild, E., Jabri, V., Lyon, D. et al (2014) ‘After Snowden: rethinking the impact of surveillance’, International Political Sociology, 8: 12144.

    • Search Google Scholar
    • Export Citation
  • BBC News (2007) ‘Estonia hit by ‘Moscow cyber war’, 17 May. Available from: http://news.bbc.co.uk/1/hi/world/europe/6665145.stm

  • BBC News (2011) ‘China hit-and-run driver sentenced to six years in jail’, 30 January. Available from: https://www.bbc.co.uk/news/world-asia-pacific-12317756

    • Search Google Scholar
    • Export Citation
  • BBC News (2012) ‘Chinese websites defaced in anonymous attack’, 5 April. Available from: http://www.bbc.co.uk/news/technology-17623939

    • Search Google Scholar
    • Export Citation
  • BBC News (2019) ‘Extinction Rebellion protests: what happened?’, 25 April. Available from: https://www.bbc.co.uk/news/uk-england-48051776

    • Search Google Scholar
    • Export Citation
  • Beaney, W. (1966) ‘The right to privacy and American law’, Law and Contemporary Problems, 31: 25371.

  • Bellaby, R. W. (2014) The Ethics of Intelligence: A New Framework, Abingdon: Routledge.

  • Bellaby, R. W. (2016) ‘Justifying cyber-intelligence?’, Journal of Military Ethics, 15(4): 299319.

  • Bellaby, R. W. (2018) ‘Extraordinary rendition: expanding the circle of blame in international politics’, The International Journal of Human Rights, 22(2): 574602.

    • Search Google Scholar
    • Export Citation
  • Bellaby, R. W. (2021) ‘An ethical framework for hacking operations’, Ethical and Theory Moral Practice, 24: 231–55.

  • Bellamy, A. J. (2006) Just Wars: From Cicero to Iraq, Cambridge and Malden, MA: Polity Press.

  • Benn, S. (1971) ‘Privacy, freedom and respect for persons’, in J. R. Pennock and J. W. Chapman (eds), Nomos XIII: Privacy, New York: Atherton Press, pp 1–26.

    • Search Google Scholar
    • Export Citation
  • Berlin, I. (1969) Four Essays on Liberty, Oxford: Oxford University Press.

  • Berman, M. N. (2011) ‘Two kinds of retributivism’, in R.A. Duff and S. Green (eds), Philosophical Foundations of Criminal Law, New York: Oxford University Press, pp 43357.

    • Search Google Scholar
    • Export Citation
  • Berman, M. N. (2013) ‘Rehabilitating retributivism’, Law and Philosophy, 32: 83108.

  • Beyer, J. L. (2014) Expect Us: Online Communities and Political Marginalisation, Oxford: Oxford University Press.

  • Beytagh, F. (1975) ‘Privacy and the free press: a contemporary conflict in values’, New York Law Forum, 20(3): 453514.

  • Blasi, V. (1977) ‘The checking value in first amendment theory’, American Bar Foundation Research Journal, 3: 521649.

  • Blomfield, A. (2007) ‘Estonia calls for NATO cyber-terrorism strategy’, The Telegraph, 18 May. Available from: https://www.telegraph.co.uk/news/worldnews/1551963/Estonia-calls-for-Nato-cyber-terrorism-strategy.html

    • Search Google Scholar
    • Export Citation
  • Bloustein, E. J. (1978) ‘Group privacy: the right to huddle’, in E. Bloustein (ed.), Individual and Group Privacy, New Brunswick, NJ: Transaction Books, pp 123–87.

    • Search Google Scholar
    • Export Citation
  • Bok, S. (1985) ‘Distrust, secrecy and the arms race’, Ethics, 95(3): 71227.

  • Bollinger, L. (1986) The Tolerant Society: Freedom of Speech and Extremist Speech in America, Oxford: Oxford University Press.

  • Bolsin, S., Pal, R., Wilmhurst, P. and Pena, M. (2011) ‘Whistleblowing and patient safety: the patient’s or the profession’s interests at stake?’, Journal of the Royal Society of Medicine, 104: 27882.

    • Search Google Scholar
    • Export Citation
  • Borsook, P. (2000) Cyberselfish: A Critical Romp through the Terribly Libertarian Culture of High Tech, New York: PublicAffairs.

  • Bouville, M. (2008) ‘Whistleblowing and morality’, Journal of Business Ethics, 81: 57985.

  • Bowie, N. (1982) Business Ethics, Englewood Cliffs, NJ: Prentice-Hall.

  • Boyle, J. (1997) Shamans, Software and Spleens: Law and the Construction of the Information Society, Cambridge, MA, and London: Harvard University Press.

    • Search Google Scholar
    • Export Citation
  • Braham, M. and van Hees, M. (2012) ‘An anatomy of moral responsibility’, Mind, 121(483): 60134.

  • Brandeis, L. and Warren, S. (1980) ‘The right to privacy’, The Harvard Law Review, 4(5): 193220.

  • Breckenridge, A. C. (1970) The Right to Privacy, Lincoln: University of Nebraska Press.

  • Brenkert, G. (2010) ‘Whistle-blowing, moral integrity, and organizational ethics’, in G. Brenkert and T. L. Beauchamp (eds), The Oxford Handbook of Business Ethics, New York: Oxford University Press, pp 563601.

    • Search Google Scholar
    • Export Citation
  • Breslin, V. andDooley, J. (2002) ‘Whistle blowing v. confidentiality: can circumstances mandate attorneys to expose their clients?’, Georgetown Journal of Legal Ethics, 15(4): 71940.

    • Search Google Scholar
    • Export Citation
  • Brison, S. J. (1998a) ‘The autonomy defence of free speech’, Ethics, 108(2): 31239.

  • Brison, S. J. (1998b) ‘Speech, harm, and the mind-body problem in First Amendment jurisprudence’, Legal Theory, 4(1): 3961.

  • Brocklebank, C. (2012) ‘Anonymous hack into Ugandan government websites in protest at their anti-LGBT policies’, Pink News, 15 August. Available from: https://www.pinknews.co.uk/2012/08/15/anonymous-hack-into-ugandan-government-websites-in-protest-at-their-anti-lgbt-policies/

    • Search Google Scholar
    • Export Citation
  • Brooking, E. T. (2015) ‘Anonymous vs. the Islamic State’, Foreign Policy. Available from: http://foreignpolicy.com/2015/11/13/anonymous-hackers-islamic-state-isis-chan-online-war/

    • Search Google Scholar
    • Export Citation
  • Brooks, N. (2004) The Protection of Classified Information: The Legal Framework, Washington, DC: Congressional Research Service.

  • Brownlee, K. (2012) Conscience and Conviction: The Case for Civil Disobedience, Oxford: Oxford University Press.

  • Brownlee, K. (2016) ‘The civil disobedience of Edward Snowden: a reply to William Scheuerman’, Philosophy and Social Criticism, 42(10): 96570.

    • Search Google Scholar
    • Export Citation
  • Bueza, M. (2016) ‘Is Comelec liable for website data leak?’, Rappler, 11 April. Available from: https://www.rappler.com/newsbreak/in-depth/127465-comelec-hackers-liability-website-hacking-data-leak

    • Search Google Scholar
    • Export Citation
  • Bufacchi, V. (2005) ‘Two concepts of violence’, Political Studies Review, 3(2): 193204.

  • Butler, J. (2004) Precarious Lives: The Powers of Mourning and Violence, London: Verso.

  • Cardwell, T. (2011) ‘Ethical hackers: putting on the white’, Network Security, July: 1–13.

  • Carr, I. and Lewis, D. (2010) ‘Combating corruption through employment law and whistleblower protection’, Industrial Law Journal, 39(1): 130.

    • Search Google Scholar
    • Export Citation
  • Carr, L. (1998) ‘Tomboy resistance and conformity: agency in social psychological gender theory’, Gender & Society, 12: 52853.

  • Casserly, M. (2015) ‘Who is Anonymous? A short history of hacktivism’, Tech Advisor, 18 November. Available from: https://www.techadvisor.com/feature/internet/what-is-hacktivism-short-history-anonymous-lulzsec-arab-spring-3414409/#ixzz2lt9LEheM

    • Search Google Scholar
    • Export Citation
  • Celikates, R. (2015) ‘Digital publics, digital contestation: a new structural transformation’, in R. Celikates, R. Kreide and T. Wesche (eds),Transformations of Democracy: Crisis, Protest and Legitimation, London: Rowman and Littlefield, pp 15976.

    • Search Google Scholar
    • Export Citation
  • Celikates, R. (2016) ‘Rethinking civil disobedience as a practice of contestation’, Constellations, 23(1): 3745.

  • Cha, A. and Nakashima, E. (2010) ‘Google China cyberattack part of spy campaign’, NBC News, 14 January. Available from: https://www.nbcnews.com/id/wbna34855470

    • Search Google Scholar
    • Export Citation
  • Chambers, S. (2004) ‘Behind closed doors: publicity, secrecy, and the quality of deliberation’, The Journal of Political Philosophy, 12(4): 389410.

    • Search Google Scholar
    • Export Citation
  • Cheung, A. S. Y. (2009) ‘China internet going wild: cyber-hunting versus privacy protection’, Computer Law and Security Review, 25: 27579.

    • Search Google Scholar
    • Export Citation
  • China.org.cn (2010) ‘Drunken driver arrested for fatal incident’, 26 October. Available from: http://www.china.org.cn/china/2010-10/26/content_21200529.htm

    • Search Google Scholar
    • Export Citation
  • Chirinos, C. (2022) ‘Anonymous takes revenge on Putin’s brutal Ukraine invasion by leaking personal data of 120,000 russian soldiers’, Fortune, 4 April. Available from: https://fortune.com/2022/04/04/anonymous-leaks-russian-soldier-data-ukraine-invasion/

    • Search Google Scholar
    • Export Citation
  • Christopher, R. (1998) ‘Self-defense and defense of others’, Philosophy and Public Affairs, 27(2): 12341.

  • Citron, D. K. (2014) Hate Crimes in Cyberspace, Cambridge, MA: Harvard University Press.

  • Clark, K. (2010) ‘“A new era of openness?” Disclosing intelligence to Congress under Obama’, Constitutional Commentary, 26: 31337.

    • Search Google Scholar
    • Export Citation
  • Clark, K. (2011) ‘Congress’s right to counsel intelligence oversight’, University of Illinois Law Review, 2011(3): 91560.

  • Clarke, R., Morell, M. J., Stone, G. R., Sunstein, C. R. and Swire, P. (2013) President’s Review Group on Intelligence and Communications Technologies, Liberty and Security in a Changing World. Available from: https://obamawhitehouse.archives.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf

    • Search Google Scholar
    • Export Citation
  • CNN Wire Staff (2011) ‘Hackers target San Francisco’s Rapid Transit System’, CNN, 16 August. Available from: http://edition.cnn.com/2011/US/08/14/california.transit.hack/index.html

    • Search Google Scholar
    • Export Citation
  • Coates, A. J. (1997) The Ethics of War, Manchester: Manchester University Press.

  • Cohen, C. (1970) ‘Defending civil disobedience’, The Monist, 54(4): 46987.

  • Cohen, J. (1993) ‘Freedom of expression’, Philosophy and Public Affairs, 22(3): 20763.

  • Coleman, G. (2011) ‘Hacker politics and publics’, Public Culture, 23(3): 51116.

  • Coleman, G. (2014) Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous, London: Verso.

  • Coleman, G. (2022) ‘The public interest hack’, Lima, 8. Available from: https://limn.it/articles/the-public-interest-hack/

  • Conway, M. (2003) ‘Hackers or terrorists? Why it doesn’t compute’, Computer Fraud and Security, 12: 1013.

  • Copp, D. (1991) ‘Responsibility for collective inaction’, Journal of Social Philosophy, 22(2): 7180.

  • Critical Art Ensemble (1996) Electronic Civil Disobedience and Other Unpopular Ideas, New York: Autonomedia.

  • Crosston, M. (2017) ‘The fight for cyber Thoreau: distinguishing virtual disobedience from digital destruction’, in M. Korstanje (ed.), Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities, Hershey, PA: IGI Global, pp 198219.

    • Search Google Scholar
    • Export Citation
  • Dalton, H. L. (1985) ‘Taking the right to appeal (more or less) seriously’, Yale Law Journal, 95(1): 62107.

  • Darby, J. (2016) ‘Political violence: an overview’, in M. Breen-Smyth (ed.), The Ashgate Research Companion to Political Violence, London: Routledge, pp 17–32.

    • Search Google Scholar
    • Export Citation
  • Davis, M. (1996) ‘Some paradoxes of whistleblowing’, Business & Professional Ethics Journal, 15(1): 319.

  • DeGeorge, R. (1981) ‘Ethical responsibilities of engineers in large organizations: the Pinto case’, Business & Professional Ethics Journal, 1(1): 114.

    • Search Google Scholar
    • Export Citation
  • DeGeorge, R. (1990) Business Ethics, Basingstoke: Palgrave MacMillan.

  • Della Porta, D. (1995) Social Movements, Political Violence, and the State: A Comparative Analysis of Italy and Germany, New York: Cambridge University Press.

    • Search Google Scholar
    • Export Citation
  • Delmas, C. (2018a) ‘Is hacktivism the new civil disobedience?’, Raisons Politiques, 69(1): 6381.

  • Delmas, C. (2018b) A Duty to Resist: When Disobedience Should be Uncivil ,Oxford: Oxford University Press.

  • Dempsey, J. X. and Flint, L. M. (2004) ‘Commercial data and national security’, The George Washington Law Review, 72: 1459502.

  • Denning, D. (1999) ‘Activism, hacktivism and cyber-terrorism: the internet as a tool for influencing foreign policy’, Global Problem Solving Information Technology and Tools, 10 December. Available from: https://nautilus.org/global-problem-solving/activism-hacktivism-and-cyberterrorism-the-internet-as-a-tool-for-influencing-foreign-policy-2/

    • Search Google Scholar
    • Export Citation
  • Denning, D. (2010) ‘Terror’s web: how the internet is transforming terrorism’, in Y. Jewkes and M. Yar (eds), Handbook of Internet Crime, Cullompton: Willan Publishing, pp 194213.

    • Search Google Scholar
    • Export Citation
  • Dewey, J. (1980) ‘Force, violence and law’ and ‘Force and coercion’, in J. A. Boydston (ed.), John Dewey, The Middle Works, 1899–1924, Volume 10: 1916–1917, Carbondale, IL: Southern Illinois University Press.

    • Search Google Scholar
    • Export Citation
  • Deyling, R. (1992) ‘Judicial deference and de novo review in litigation over national security information under the Freedom of Information Act’, Villanova Law Review, 37(1): 67112.

    • Search Google Scholar
    • Export Citation
  • Dittrich, D. and Himma, K. (2006) ‘Hackers, crackers and common criminals’, in H. Bidgoli (ed.), Handbook of Information Security: Information Warfare; Social Issues, Legal and International Issues; and Security Foundations, Vol.2, Hoboken, NJ: Wiley, pp 15471.

    • Search Google Scholar
    • Export Citation
  • Dorsen, N. and Shattuck, J. H. F. (1974) ‘Executive privilege, the Congress and the courts’, Ohio State Law Journal, 35(1): 140.

  • Douglas, D. M. (2016) ‘Doxxing: a conceptual analysis’, Ethics and Information Technology, 19: 199.

  • Dragu, T. (2011) ‘Is there a trade-off between security and liberty? Executive bias, privacy protections, and terrorism prevention’, American Political Science Review, 105(1): 6478.

    • Search Google Scholar
    • Export Citation
  • Duff, A. (2011) ‘Retrieving retributivism’, in M. White (ed.), Retributivism: Essays on Theory and Policy, Oxford: Oxford University Press.

    • Search Google Scholar
    • Export Citation
  • Dumsday, T. (2009) ‘On cheering Charles Bronson: the ethics of vigilantism’, The Southern Journal of Philosophy, 47(1): 4967.

  • Dunaway, W. (1996) ‘Incorporation as an interactive process: Cherokee resistance to expansion of the capitalist world-system, 1560–1763’, Sociological Inquiry, 66: 45570.

    • Search Google Scholar
    • Export Citation
  • Dunfee, T. W. and Maurer, V. G. (1992) ‘Corporate attorney whistle-blowing: devising a proper standard’, Business & Professional Ethics Journal, 11(3): 339.

    • Search Google Scholar
    • Export Citation
  • Dworkin, R. (1985) A Matter of Principle, Cambridge, MA: Harvard University Press.

  • Eckert, A. E. (2020) ‘The changing nature of legitimate authority in the just war tradition’, Journal of Military Ethics, 19(2): 8498.

    • Search Google Scholar
    • Export Citation
  • The Economist (2011) ‘Leaks must not poison diplomacy’, 27 January. Available from: http://www.economist.com/node/18010593

  • Edstein, R. A. (1992) ‘Property speech and the politics of distrust’, The Bill of Rights in the Welfare State: A Bicentennial Symposium, 59(1): 4189.

    • Search Google Scholar
    • Export Citation
  • Eleftheriou-Smith, L. (2015) ‘Anonymous calls for activists to help expose international paedophile networks with “Operation DeathEaters”’, The Independent, 23 January. Available from: https://www.independent.co.uk/news/uk/home-news/anonymous-calls-activists-help-expose-international-paedophile-networks-operation-deatheaters-9998350.html

    • Search Google Scholar
    • Export Citation
  • Elliott, C. (2013) ‘WikiLeaks and the public interest dilemma: a view from inside the media’, in B. Benedetta, A. Hintz and P. McCurdy (eds), Beyond Wikileaks: Implications for the Future of Communications, Journalism and Society, Basingstoke: Palgrave Macmillan, pp 7884.

    • Search Google Scholar
    • Export Citation
  • Emerson, T. I. (1964) ‘Freedom of association and freedom of expression’, The Yale Law Journal, 74(1): 164.

  • Emerson, T. I. (1970) The System of Freedom of Expression, New York: Vintage.

  • Emerson, T. I. (1976) ‘Legal foundations of the right to know’, Washington University Law Quarterly, 1: 124.

  • Emspak, J. (2011) ‘Update: Egyptian gov’t web sites under attack’, International Business Times, 26 January. Available from: http://www.ibtimes.com/articles/105329/20110126/update-egyptian-gov-t-web-sites-under-attack.htm

    • Search Google Scholar
    • Export Citation
  • Fabre, C. (2008) ‘Cosmopolitanism, just war tradition and legitimate authority’, International Affairs, 84(5): 96376.

  • Fabre, C. (2012) Cosmopolitan War, Oxford: Oxford University Press.

  • Fabre, C. (2018) Economic Statecraft: Human Rights, Sanctions, and Conditionality, Cambridge, MA: Harvard University Press.

  • Fairfield, P. (2005) Public/Private, London: Rowman & Littlefield Publishers .

  • Farsole, A., Kashikar, A. G. and Zunzunwala, A. (2010) ‘Ethical hacking’, International Journal of Computer Applications, 1(10): 1420.

    • Search Google Scholar
    • Export Citation
  • Farwell, J. and Rohozinski, R. (2011) ‘Stuxnet and the future of cyber war’, Survival: Global Politics and Strategy, 53(1): 245.

  • Fein, H. (2007) Human Rights and Wrongs: Slavery, Terror and Genocide ,Boulder, CO: Paradigm Publishers.

  • Feinberg, J. (1973) ‘The idea of a free man’, in J. F. Doyle (ed), Educational Judgments: Papers in the Philosophy of Education, London: Routledge, pp 14365.

    • Search Google Scholar
    • Export Citation
  • Feinberg, J. (1984) Moral Limits of the Criminal Law, Vol.1: Harm to Others, Oxford: Oxford University Press.

  • Finn, P. (2009) ‘GOP senators drop out of panel inquiry into CIA program’, The Washington Post, 26 September. Available from: http://www.washingtonpost.com/wp-dyn/content/article/2009/09/25/AR2009092503745.html

    • Search Google Scholar
    • Export Citation
  • Fitri, N. (2011) ‘Democracy discourses through the internet communication: understanding the hacktivism for the global changing’, Online Journal of Communication and Media Technologies, 1(2): 120.

    • Search Google Scholar
    • Export Citation
  • Fixdall, M. and Smith, D. (1998) ‘Humanitarian intervention and just war’, Mershon International Studies Review, 42(2): 283312.

  • Fleddermann, C. (1999) Engineering Ethics, Englewood Cliffs, NJ: Prentice Hall.

  • FLSnag (2011) ‘I am one Anonymous’, YouTube, 23 July. Available from: http://www.youtube.com/watch?v=aEcvaoDIKtU

  • Fluri, P. and Born, H. (2003) Parliamentary Oversight of the Security Sector: Principles Mechanisms and Practices, Geneva: DCAF.

  • Ford, Z. (2012) ‘Anonymous hacks Ugandan government in retaliation for anti-LGBT policies’, Think Progress, 14 August. Available from: https://thinkprogress.org/anonymous-hacks-ugandan-government-in-retaliation-for-anti-lgbt-policies-8d31d15aa874#.cbrcmbr9c

    • Search Google Scholar
    • Export Citation
  • Foucault, M. (1979) Discipline and Punish: The Birth of the Prison, Harmondsworth: Penguin.

  • Frankfurt, H. (1971) ‘Freedom of the will and the concept of the person’, Journal of Philosophy, 68(1): 520.

  • Fried, C. (1968) ‘Privacy: a moral analysis’, Yale Law Review, 77(1): 47593.

  • Fried, C. (1992) ‘The new First Amendment jurisprudence: a threat to liberty’, in G. R. Stone, R. A. Epstein and C. R. Sunstein (eds), The Bill of Rights in the Modern State, Chicago, IL: University of Chicago Press, pp 225–53.

    • Search Google Scholar
    • Export Citation
  • Fuchs, C. (2013) ‘The Anonymous movement in the context of liberalism and socialism’, Interface, 5(2): 34576.

  • Fuchs, M. (2006) ‘Judging secrets: the role courts should play in preventing unnecessary secrecy’, Administrative Law Review, 58(1): 13176.

    • Search Google Scholar
    • Export Citation
  • Gandy, O. (2003) ‘Data mining and surveillance in the post 9/11 environment’, in K. Bell and F. Webster (eds), The Intensification of Surveillance: Crime, Terrorism and Warfare in the Information Age, London and Sterling, VA: Pluto Press, pp 36384.

    • Search Google Scholar
    • Export Citation
  • Gerwehr, S. and Daly, S. (2006) ‘Al-Qaida: terrorist selection and recruitment’, in D. Kamien (ed.), The McGraw-Hill Homeland Security Handbook, New York: McGraw-Hill, pp 7389.

    • Search Google Scholar
    • Export Citation
  • Gewirth, A. (1978) Reason and Morality, Chicago, IL: University of Chicago Press.

  • Glave, J. (1998) ‘Crackers: we stole nuke data’, Wired, 3 June. Available from: https://www.wired.com/1998/06/crackers-we-stole-nuke-data/

    • Search Google Scholar
    • Export Citation
  • Goldschlag, D., Reed, M. and Syverson, P. (1999) ‘Onion routing for anonymous and private internet connections’, Communications of the ACM, 42(2): 3941.

    • Search Google Scholar
    • Export Citation
  • Golumbia, D. (2013) ‘Cyberlibertarianism: the extremist foundations of “digital freedom”’, Uncomputing. Available from: http://www.academia.edu/4429212/Cyberlibertarianism_The_Extremist_Foundations_of_Digital_Freedom

    • Search Google Scholar
    • Export Citation
  • Goode, L. (2015) ‘Anonymous and the political ethos of hacktivism’, Popular Communication: The International Journal of Media and Culture, 13(1): 7486.

    • Search Google Scholar
    • Export Citation
  • Gorman, S. (2012) ‘Alert on hacker power play: US official signals growing concern over anonymous group’s capabilities’, The Wall Street Journal, 21 February. Available from: https://www.wsj.com/articles/SB10001424052970204059804577229390105521090

    • Search Google Scholar
    • Export Citation
  • Gray, P. W. (2013) ‘Leaderless resistance, networked organisation, and ideological hegemony’, Terrorism and Political Violence, 25(5): 65571.

    • Search Google Scholar
    • Export Citation
  • Greenberg, A. (2012a) This Machine Kills Secrets: Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers, New York: Penguin Group.

    • Search Google Scholar
    • Export Citation
  • Greenberg, A. (2012b) ‘Anonymous hackers swat at Syrian government websites in reprisal for internet blackout’, Forbes, 30 November. Available from: http://www.forbes.com/sites/andygreenberg/2012/11/30/anonymous-hackers-swat-at-syrian-government-websites-in-reprisal-for-internet-blackout/#105975b4418f

    • Search Google Scholar
    • Export Citation
  • Greenwald, G. (2011) ‘The leaked campaign to attack Wikileaks and its supporters’, Salon.com, 11 February. Available from: https://www.salon.com/2011/02/11/campaigns_4/

    • Search Google Scholar
    • Export Citation
  • Greenwalt, K. (1989) ‘Free speech justifications’, Columbia Law Review, 89(1): 11955.

  • Gregg, N. (1993) ‘“Trying to put first things first”: negotiating subjectivities in a workplace organizing campaign’, in S. Fisher and K. Davis (eds), Negotiating at the Margins: The Gendered Discourses of Power and Resistance, New Brunswick, NJ: Rutgers University Press, pp 172–204.

    • Search Google Scholar
    • Export Citation
  • Griffin, A. (2016) ‘WhatsApp end-to-end encryption update might have made chat app illegal in India’, Independent, 8 April. Available from: http://www.independent.co.uk/life-style/gadgets-and-tech/news/whatsapp-end-to-end-encryption-update-might-have-made-chat-app-illegal-in-india-a6974921.html

    • Search Google Scholar
    • Export Citation
  • Griswold, E. N. (1989) ‘Secrets not worth keeping’, The Washington Post, 15 February. Available from: https://www.washingtonpost.com/archive/opinions/1989/02/15/secrets-not-worth-keeping/a115a154-4c6f-41fd-816a-112dd9908115/

    • Search Google Scholar
    • Export Citation
  • Grofman, B., Owen, G. and Feld, S. (1983) ‘Thirteen theorems in search of the truth’, Theory and Decision, 15: 26178.

  • Gross, H. (1971) ‘Privacy and autonomy’, in J. R. Pennock and J. W. Chapman (eds), Privacy: Nomos XIII, New York: Atherton Press, pp 16981.

    • Search Google Scholar
    • Export Citation
  • Habermas, J. (1996) Between Facts and Norms: Contributions to a Discourse Theory of Law and Democracy, Cambridge: Polity Press.

  • Halliday, J. (2011) ‘Anonymous hackers breach San Francisco BART transport website’, The Guardian, 15 August. Available from: https://www.theguardian.com/technology/2011/aug/15/anonymous-hackers-breach-bart-website

    • Search Google Scholar
    • Export Citation
  • Halliday, J. and Arthur, C. (2010) ‘Wikileaks: who are the hackers behind Operation Payback?’, The Guardian, 8 December. Available from: https://www.theguardian.com/media/2010/dec/08/anonymous-4chan-wikileaks-mastercard-paypal

    • Search Google Scholar
    • Export Citation
  • Hampson, N. (2012) ‘Hacktivism: a new breed of protest in a networked world’, Boston College International and Comparative Law Review, 35(2): 51142.

    • Search Google Scholar
    • Export Citation
  • Harding, L. and Leigh, D. (2011) ‘Wikileaks: how US political invective turned on “anti-American” Julian Assange’, The Guardian, 3 February. Available from: https://www.theguardian.com/world/2011/feb/03/wikileaks-julian-assange-us-reaction

    • Search Google Scholar
    • Export Citation
  • Harmon, A. (1999) ‘“Hacktivists” of all persuasions take their struggle to the web’, The New York Times, 31 October. Available from: http://www.nytimes.com/1998/10/31/world/hacktivists-of-all-persuasions-take-their-struggle-to-the-web.html

    • Search Google Scholar
    • Export Citation
  • Harris, C., Pritchard, M. S. and Rabins, M. J. (2005) Engineering Ethics: Concepts and Cases, Belmont, CA: Wadsworth.

  • Harris, D. (1999) ‘Driving while black and other traffic offences: the Supreme Court and pretextual traffic stops’, The Journal of Criminal Law and Criminology, 87: 54482.

    • Search Google Scholar
    • Export Citation
  • Harris, D. (2002) ‘Racial profiling revisited: “just common sense” in the fight against terror?’, Criminal Justice, 17: 3659.

    • Search Google Scholar
    • Export Citation
  • Hausman, D. and McPhereson, M. (1996) Economic Analysis and Moral Philosophy, Cambridge: Cambridge University Press.

  • Heinze, E. and Steel, B. J. (eds) (2009) Ethics, Authority, and War: Non-State Actors and the Just War Tradition, New York: Palgrave Macmillan.

    • Search Google Scholar
    • Export Citation
  • Hendler, J. (2013) ‘It’s time to reform the Computer Fraud and Abuse Act’, Scientific American, 16 August. Available from: https://www.scientificamerican.com/article/its-times-reform-computer-fraud-abuse-act/

    • Search Google Scholar
    • Export Citation
  • Herman, B. (1996) The Practice of Moral Judgement ,Cambridge, MA: Harvard University Press.

  • Hern, A. (2015) ‘Anonymous “at war” with Isis, hacktivist group confirms’, The Guardian, 17 December. Available from: https://www.theguardian.com/technology/2015/nov/17/anonymous-war-isis-hacktivist-group-confirms

    • Search Google Scholar
    • Export Citation
  • Hern, A. (2016) ‘Islamic State Twitter account gets a rainbow makeover from Anonymous’, The Guardian, 17 June. Available from: https://www.theguardian.com/technology/2016/jun/17/islamic-state-twitter-accounts-rainbow-makeover-anonymous-hackers

    • Search Google Scholar
    • Export Citation
  • Hersh, M. (2002) ‘Whistle-blowers: heroes or traitors? Individual and collective responsibility for ethical behaviour’, Annual Reviews in Control, 26: 24362.

    • Search Google Scholar
    • Export Citation
  • Higgins, P. (2013) ‘Critical fixes for the Computer Fraud and Abuse Act’, Electronic Frontier Foundation, 29 January. Available from: https://www.eff.org/deeplinks/2013/01/these-are-critical-fixes-computer-fraud-and-abuse-act

    • Search Google Scholar
    • Export Citation
  • Hill, E. (2011a) ‘Hackers hit Tunisian websites’, Al Jazeera, 3 January. Available from: https://www.aljazeera.com/news/2011/1/3/hackers-hit-tunisian-websites

    • Search Google Scholar
    • Export Citation
  • Hill, E. (2011b) ‘How “rebel” phone network evaded shutdown’, Al Jazeera, 23 April. Available from: http://www.aljazeera.com/indepth/features/2011/04/20114233530919767.html

    • Search Google Scholar
    • Export Citation
  • Himma, K. (2005) ‘Hacking as politically motivated digital civil disobedience: is hacktivism morally justified?’, SSRN, 5 September. Available from: https://ssrn.com/abstract=799545

    • Search Google Scholar
    • Export Citation
  • Himma, K. (2008) ‘Ethical issues involving computer security: hacking, hacktivism, and counterhacking’, in K. Himma and H. Tavani (eds), The Handbook of Information and Computer Ethics, Hoboken, NJ: Wiley.

    • Search Google Scholar
    • Export Citation
  • Hine, K. D. (1998) ‘Vigilantism revisited: an economic analysis of the law of extra-judicial self-help or why can’t Dick shoot Henry for stealing Jane’s truck’, American University Law Review, 47: 122155 .

    • Search Google Scholar
    • Export Citation
  • von Hirsch, A. (2000) ‘The ethics of public television surveillance’, in A. Hirsch, D. Garland and A. Wakefield (eds), Ethical and Social Perspectives on Situational Crime Prevention, Oxford: Hart Publishing, pp 5976.

    • Search Google Scholar
    • Export Citation
  • Hobbes, T. (1985) [1651] Leviathan, London: Penguin Classics.

  • Hoffman, W. M. (1984) ‘The Ford Pinto’, in W. Hoffman, and J. Moore (eds), Business Ethics: Readings and Cases in Corporate Morality, New York: Wiley, pp 24960.

    • Search Google Scholar
    • Export Citation
  • Hohfeld, W. N. (1913) ‘Some fundamental legal conceptions as applied in judicial reasoning’, Yale Law Journal, 23: 1659.

  • Hollander, J. A. and Einwohner, R. L. (2004) ‘Conceptualising resistance’, Sociological Forum, 19(4): 53354.

  • Holmes, O. (2012) ‘Anonymous declares internet war on Syria’, ABC News, 30 November. Available from: https://www.nbcnews.com/tech/tech-news/anonymous-declares-internet-war-syria-flna1c7350148

    • Search Google Scholar
    • Export Citation
  • Holt, T., Freilich, J. and Chermak, S. (2017) ‘Exploring the subculture of ideologically motivated cyber-attackers’, Journal of Contemporary Criminal Justice, 33(3): 21233.

    • Search Google Scholar
    • Export Citation
  • Horsey, H. R. (1994) ‘The duty of care component of the Delaware business judgment rule’, Delaware Journal of Corporate Law, 19(3): 97198.

    • Search Google Scholar
    • Export Citation
  • Huazhong, W. (2010) ‘Drunken driver boasts father is a police official’, China Daily, 7 November. Available from: http://www.chinadaily.com.cn/china/2010-10/20/content_11431705.htm

    • Search Google Scholar
    • Export Citation
  • Hunn, D. (2014) ‘How Anonymous hackers changed Ferguson, Mo., protests’, Government Technology, 13 August. Available from: https://www.govtech.com/public-safety/how-computer-hackers-changed-the-ferguson-protests.html

    • Search Google Scholar
    • Export Citation
  • Hunt, G. (1995) Whistleblowing in the Health Service: Accountability, Law and Professional Practice, London: Edward Arnold.

  • Information Warfare Monitor (2009) ‘Tracking Ghostnet: investigating a cyber espionage network’, 29 March. Available from: http://www.nartv.org/mirror/ghostnet.pdf

    • Search Google Scholar
    • Export Citation
  • Innes, J. (1996) Privacy, Intimacy and Isolation, Oxford: Oxford University Press.

  • Jackson, W. (2011) ‘BART website breach exposes divisions within hacktivist group’, GCN, 18 August. Available from: https://gcn.com/cybersecurity/2011/08/bart-website-breach-exposes-divisions-within-hacktivist-group/282337/

    • Search Google Scholar
    • Export Citation
  • Jackson, R. and Pisoiu, D. (2018) Contemporary Debates on Terrorism, Abingdon: Routledge.

  • Jackson, R., Jarvis, L., Gunning, J. and Breen-Smyth, M. (2011) Terrorism: A Critical Introduction, Basingstoke: Palgrave Macmillan.

  • Jensen, J. V. (1987) ‘Ethical tension points in whistleblowing’, Journal of Business Ethics, 9: 3218.

  • Jeter, L. (2003) Disconnected: Deceit and Betrayal at WorldCom, Hoboken, NJ: John Wiley and Sons.

  • Johnson, R. A. (2003) Whistleblowing: When It Works and Why, Boulder, CO: Lynne Rienner Publishers.

  • Johnston, L. (1996) ‘What is vigilantism?’, British Journal of Criminology, 36(2): 22036.

  • Jordan, T. (2014) Internet, Society and Culture Communicative Practices Before and After the Internet, London: Bloomsbury.

  • Jordan, T. and Taylor, P. A. (2004) Hackers and Cyberwars: Rebels with a Cause?, London: Routledge.

  • Jos, P. H., Tompkins, M. E. and Hays, S. W. (1989) ‘In praise of difficult people: a portrait of the committed whistleblower’, Public Administration Review, 49(6): 55261.

    • Search Google Scholar
    • Export Citation
  • Kang, J. (1998) ‘Information privacy in cyberspace transactions’, Stanford Law Review, 50(4): 1193294.

  • Kasachkoff, T. (1998) ‘Killing in self-defense: an unquestionable or problematic defense?’, Law and Philosophy, 17(5–6): 50931.

    • Search Google Scholar
    • Export Citation
  • Keefe, P. (2005) Chatter: Dispatches from the Secret World of Global Eavesdropping, New York: Random House.

  • Kennedy, R. (1997) Race Crime and the Law, New York: Pantheon.

  • King, J. (1998) ‘Information in cyberspace transactions’, Stanford Law Review, 50(4): 1193294.

  • Kizza, J. M. (2020) Guide to Computer Network Security, Berlin: Springer.

  • Klein, A. G. (2015) ‘Vigilante media: unveiling Anonymous and the hacktivist persona in the global press’, Communication Monographs, 82(3): 379401.

    • Search Google Scholar
    • Export Citation
  • Kleinig, J. (1976) ‘Good Samaritanism’, Philosophy and Public Affairs, 5(4): 382407.

  • Kono, D. (2006) ‘Optimal obfuscation: democracy and trade policy transparency’, American Political Science Review, 100: 36984.

  • Konvitz, M. R. (1966) ‘Privacy and the law: a philosophical prelude’, Law and Contemporary Problems, 31(2): 27280.

  • Krauth, A. (2012), ‘Anonymous in portmanteaupia’, Social Alternatives, 31(2): 2732.

  • Krebs on Security (2011) ‘HBGary Federal hacked by Anonymous’, Krebs on Security, 7 February. Available from: https://krebsonsecurity.com/2011/02/hbgary-federal-hacked-by-anonymous/

    • Search Google Scholar
    • Export Citation
  • Kumar, M. (2011) ‘Anonymous open letter to citizens of United States of America!’, The Hacker News, 24 March. Available from: https://thehackernews.com/2011/03/anonymous-open-letter-to-citizens-of.html

    • Search Google Scholar
    • Export Citation
  • Kutz, C. (2007) ‘Causeless complicity’, Criminal Law and Philosophy, 1(2): 289305.

  • Lackey, D. P. (1989) The Ethics of War and Peace, London: Prentice Hall International.

  • Lam, O. (2010) ‘China: my father is Li Gang!’ Global Voices, 22 October. Available from: https://globalvoices.org/2010/10/22/china-my-father-is-li-gang/

    • Search Google Scholar
    • Export Citation
  • Landler, M. and Markoff, J. (2007) ‘In Estonia, what may be the first war in cyberspace’, The New York Times, 28 May. Available from: https://www.nytimes.com/2007/05/28/business/worldbusiness/28iht-cyberwar.4.5901141.html

    • Search Google Scholar
    • Export Citation
  • Laufer, R. and Wolfe, M. (1977) ‘Privacy as a concept and social issue’, The Journal of Social Issues, 33(3): 2242.

  • Laugerud, S. (2021) ‘Narrating the harm of rape: how rape victims invoke different models of psychological trauma’, BioSocieties, 16: 2240.

    • Search Google Scholar
    • Export Citation
  • Lee, H. (2018) ‘A new societal self-defense theory of punishment: the rights-protection theory’, Philosophia, 46: 33753.

  • Lefkowitz, D. (2007) ‘On a moral right to civil disobedience’, Ethics, 117(2): 20233.

  • Leigh, D. and Harding, L. (2011) WikiLeaks: Inside Julian Assange’s War on Secrecy, London: Guardian Books.

  • Lenard, N. (2012) ‘Anonymous takes on Syrian government’, The Salon, 30 November. Available from: https://www.salon.com/2012/11/30/anonymous_takes_on_syrian_government/

    • Search Google Scholar
    • Export Citation
  • Lennerfors, T. (2007) ‘The transformation of transparency: on the act on public procurement and the right to appeal in the context of the war on corruption’, Journal of Business Ethics, 73(4): 38190.

    • Search Google Scholar
    • Export Citation
  • Lepora, C. and Goodin, R. (2013) On Complicity and Compromise, Oxford: Oxford University Press.

  • Lever, A. (2005) ‘Why racial profiling is hard to justify: a response to Risse and Zeckhauser’, Philosophy and Public Affairs, 33(1): 94110.

    • Search Google Scholar
    • Export Citation
  • Leverick, F. (2006) Killing in Self-Defence, Oxford: Oxford University Press.

  • Levy, S. (1984) Hackers: Heroes of the Computer Revolution, New York: Doubleday.

  • Lewis, D. (1989) ‘Mill and Milquetoast’, Australasian Journal of Philosophy, 67: 15271.

  • Lewis, J. (2002) ‘Assessing the rise of cyber terrorism, cyber war and other cyber threats’, Centre for Strategic and International Studies. Available from: https://csis-website-prod.s3.amazonaws.com/s3fs-public/legacy_files/files/media/csis/pubs/021101_risks_of_cyberterror.pdf

    • Search Google Scholar
    • Export Citation
  • Li, X. (2013) ‘Hacktivism and the First Amendment: drawing the line between cyber protests and crime’, Harvard Journal of Law & Technology, 7(1): 30130.

    • Search Google Scholar
    • Export Citation
  • Lindley, R. (1986) Autonomy, Basingstoke: Palgrave Macmillan.

  • List, C. and Goodin, R. E. (2001) ‘Epistemic democracy: generalizing the Condorcet jury theorem’, Journal of Political Philosophy, 9: 277306.

    • Search Google Scholar
    • Export Citation
  • List, C., Elsholtz, C. and Seeley T. D. (2009) ‘Independence and interdependence in collective decision making: an agent-based model of nest-site choice by honeybee swarms’, Philosophical Transactions of the Royal Society B, 364: 755–62.

    • Search Google Scholar
    • Export Citation
  • Littauer, D. (2013) ‘Anonymous hacks Nigeria’s government website over anti-gay bill’, LGBTQ Nation, 5 July. Available from: http://www.lgbtqnation.com/2013/07/anonymous-hacks-nigerias-government-website-over-anti-gay-bill/

    • Search Google Scholar
    • Export Citation
  • Little, C. B. and Sheffield, C. P. (1983) ‘Frontiers and criminal justice: English private prosecution societies and American vigilantism in the eighteenth and nineteenth centuries’, American Sociological Review, 48(6): 796808.

    • Search Google Scholar
    • Export Citation
  • Liu, A. (2004) The Laws of Cool: Knowledge Work and the Culture of Information, Chicago, IL: University of Chicago Press.

  • Locke, J. (1988)[1689] Two Treatises of Government, Cambridge: Cambridge University Press.

  • Lopez, K. J. (2010) ‘On this Sunday outrage’, National Review, 29 November. Available from: https://www.nationalreview.com/corner/sunday-outrage-kathryn-jean-lopez/

    • Search Google Scholar
    • Export Citation
  • Loveluck, B. (2020) ‘The many shades of digital vigilantism: a typology of online self-justice’, Global Crime, 21(3–4): 21341.

  • Lowes, D. E. (2006) The Anti-Capitalist Dictionary: Movements, Histories and Motivations, Halifax, Canada: Fernwood Publishing Ltd.

  • Lu, D. (2015) ‘When ethical hackers can’t compete’, The Atlantic, 8 December. Available from: https://www.theatlantic.com/technology/archive/2015/12/white-hat-ethical-hacking-cybersecurity/419355/

    • Search Google Scholar
    • Export Citation
  • Luban, D. (2005) ‘Liberalism, torture and the ticking bomb’, Virginia Law Review, 9(6): 142561.

  • Ludlow, P. (2013) ‘Aaron Swartz was right’, The Chronical of Higher Education, 25 February. Available from: https://www.chronicle.com/article/Aaron-Swartz-Was-Right/137425

    • Search Google Scholar
    • Export Citation
  • Lynch, W. and Kline, R. (2000) ‘Engineering practice and engineering ethics’, Science, Technology, & Human Values, 25(2): 195225.

    • Search Google Scholar
    • Export Citation
  • Lyon, D. (1994) The Electronic Eye: The Rise of Surveillance Society, Cambridge: Polity Press.

  • Mack, E. (1980) ‘Bad Samaritanism and causation of harm’, Philosophy and Public Affairs, 9(3): 23059.

  • Mahat, R. (2008) ‘A carrot for the lawyer: providing economic incentives for in-house lawyers in a Sarbanes-Oxley Regime’, The Georgetown Journal of Legal Ethics, 21(3): 91334.

    • Search Google Scholar
    • Export Citation
  • Manion, M. and Goodrum, A. (2000) ‘Terrorism or civil disobedience: towards a hacktivist ethic’, Computers and Society, 30(2): 1419.

    • Search Google Scholar
    • Export Citation
  • Mansfield-Devine, S. (2011a) ‘Hacktivism: assessing the damage’, Network Security, 8: 513.

  • Mansfield-Devine, S. (2011b) ‘Anonymous: serious threat or mere annoyance?’, Network Security, 11(1): 410.

  • Markel, D. (2011) ‘What might retributive justice be? An argument for the confrontational conception of retributivism’, in M. White (ed), Retributivism: Essays on Theory and Policy, Oxford: Oxford University Press, pp 4972.

    • Search Google Scholar
    • Export Citation
  • Martin, R. (1970) ‘Civil disobedience’, Ethics, 80(1): 12339.

  • Marx, G. (1998) ‘Ethics for the new surveillance’, The Information Society, 14(3): 17185.

  • Marx, G. (2004) ‘Some concepts that may be useful in understanding the myriad forms and contexts of surveillance’, Intelligence and National Security, 19(2): 234.

    • Search Google Scholar
    • Export Citation
  • Mazzetti, M. (2015) ‘CIA report found value of brutal interrogation was inflated’, The New York Times, 20 January. Available from: http://www.nytimes.com/2015/01/21/world/cia-report-found-value-of-brutal-interrogation-was-inflated.html?_r=1

    • Search Google Scholar
    • Export Citation
  • McAdam, D. (1982) Political Process and the Development of Black Insurgency ,Chicago, IL: University of Chicago Press.

  • McAfee and the Center for Strategic and International Studies (2013) The Economic Impact of Cybercrime and Cyber Espionage, July. Available from: http://csis.org/files/publication/60396rpt_cybercrime-cost_0713_ph4_0.pdf

    • Search Google Scholar
    • Export Citation
  • McArthur, R. (2001) ‘Reasonable expectations of privacy’, Ethics and Information Technology, 3: 1238.

  • McCahill, M. (1998) ‘Beyond Foucault: towards a contemporary theory of surveillance’, in C. Norris, J. Moran, and G. Armstrong (eds), Surveillance, Closed-Circuit Television and Social Control, Aldershot: Ashgate, pp 4165.

    • Search Google Scholar
    • Export Citation
  • McCormick, T. (2013) ‘Anthropology of an idea: hacktivism’, Foreign Policy, 200: 245.

  • McGlynn, J. and Richardson, B. K. (2014) ‘Private support, public alienation: whistle-blowers and the paradox of social support’, Western Journal of Communication, 78(2): 21337.

    • Search Google Scholar
    • Export Citation
  • McGoogan, C., Titcomb, J. and Krol, C. (2017) ‘What is WannaCry and how does ransomware work?’, The Telegraph, 18 May. Available from: http://www.telegraph.co.uk/technology/0/ransomware-does-work/

    • Search Google Scholar
    • Export Citation
  • McMahan, J. (1994) ‘Innocence, self-defence and killing in war’, The Journal of Political Philosophy, 2(1): 193221.

  • McMahan, J. (2006) ‘On the moral equality of combatants’, Journal of Political Philosophy, 14(4): 37793.

  • McPherson, R., Houmansadr, A. and Shmatikov, V. (2016) ‘Covertcast: using live streaming to evade internet censorship’, Proceedings on Privacy Enhancing Technologies, 3: 21225.

    • Search Google Scholar
    • Export Citation
  • McReynolds, P. (2015) ‘How to think about cyber conflict involving non-state actors’, Philosophy and Technology, 28: 42748.

  • Menn, J. (2019) Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World, New York: Public Affairs.

  • Merton, R. (1968) Social Theory and Social Structure, New York: Free Press.

  • metac0m (2003) ‘What is hacktivism 2.0’, The Hacktivist, December. Available from: http://edshare.soton.ac.uk/8762/2/whatishacktivism.pdf

    • Search Google Scholar
    • Export Citation
  • Metz, C. (2008) ‘Anonymous hacks Sarah Palin’s Yahoo! Account’, The Register, 17 September. Available from: http://www.theregister.co.uk/2008/09/17/anonymous_hacks_sarah_palin/

    • Search Google Scholar
    • Export Citation
  • Meyers, D. T. (1995) ‘Rights in collision: a non-punitive compensatory remedy for abusive speech’, Law and Philosophy, 14: 20343.

    • Search Google Scholar
    • Export Citation
  • Mill, J. S. (1968) On Liberty, in M. Cowling (ed.) Selected Writings of John Stuart Mill, New York: The New American Library, p 121.

  • Mill, J. S. (1991) On Liberty, ed. John Gray, Oxford: Oxford University Press.

  • Mill, J. S. (2005) On Liberty, New York: Cosimo.

  • Miller, A. (1971) The Assault on Privacy: Computers, Databanks and Dossiers, Michigan: University of Michigan Press.

  • Milone, M. G. (2002) ‘Hacktivism: securing the national infrastructure’, The Business Lawyer, 58(1): 383413.

  • Milton, J. (1968 [1644]) Areopagitica, New York: New York University Press.

  • Modighaini, A. and Rachel, F. (1995) ‘The role of interaction sequences and the timing of resistance in shaping obedience and defiance to authority’, Journal of Social Issues, 51: 10723.

    • Search Google Scholar
    • Export Citation
  • Monagham, H. P. (1977) ‘Of liberty and property’, Cornell Law Review, 62(1): 40444.

  • Monroe, A. and Malle, B. (2014) ‘Free will without metaphysics’, in A. R. Mele (ed.), Surrounding Free Will, New York: Oxford University Press, pp 2548.

    • Search Google Scholar
    • Export Citation
  • Montague, P. (1989) ‘The morality of self-defense: a reply of Wasserman’, Philosophy and Public Affairs, 18(1): 819.

  • Moore, A. (2011) ‘Privacy, security, and government surveillance: Wikileaks and the new accountability’, Public Affairs Quarterly, 25(2): 14156.

    • Search Google Scholar
    • Export Citation
  • Moore, M. (2010) Placing Blame: A Theory of Criminal Law, Oxford: Oxford University Press.

  • Morris, A. (1984) The Origins of the Civil Rights Movement, New York: Free Press.

  • Morris, K. (2013) ‘Anonymous has finally released the names of Rehtaeh Parsons’s alleged rapists’, Daily Dot, 24 July. Available from: http://www.dailydot.com/news/rehtaeh-parsons-rapists-names-identity-revealed-anonymous/

    • Search Google Scholar
    • Export Citation
  • Morrissey, D. (1997) Disclosure and Secrecy: Security Classification Executive Orders, Columbia: AEJMC.

  • Murphy, J. G. (2007) ‘Legal moralism and retribution revisited’, Criminal Law and Philosophy, 1: 520.

  • Murphy, S. (2011) ‘Agents provocateurs: hacktivists have noisily exposed the sorry state of internet security’, New Scientist, 10 September.

    • Search Google Scholar
    • Export Citation
  • Musil, S. (2012) ‘Anonymous declares war on Syrian government’, CNet, 29 November. Available from: https://www.cnet.com/tech/services-and-software/anonymous-declares-war-on-syrian-government-web-sites/

    • Search Google Scholar
    • Export Citation
  • Nagel, T. (1986) The View from Nowhere, Oxford: Oxford University Press.

  • Nagel, T. (1995) ‘Personal rights and public space’, Philosophy and Public Affairs, 24: 83107.

  • Naughton, J. (2000) A Brief History of the Future: Origins of the Internet, London: Phoenix.

  • Near, J. and Miceli, M. (1995) ‘Effective whistleblowing’, Academy of Management Review, 20(3): 679708.

  • The New York Times (2010) ‘A note to readers: the decision to punish diplomatic documents’, 28 November. Available from: https://www.nytimes.com/2010/11/29/world/29editornote.html

    • Search Google Scholar
    • Export Citation
  • Nobles, R. and Schiff, D. (2002) ‘The right to appeal and workable systems of justice’, The Modern Law Review, 65(5): 676701.

  • Norman, R. (1995) Ethics, Killing and War, Cambridge: Cambridge University Press.

  • Norton, Q. (2012) ‘How Anonymous picks targets, launches attacks, and takes powerful organizations down’, Wired, 3 July. Available from: https://www.wired.com/2012/07/ff-anonymous/

    • Search Google Scholar
    • Export Citation
  • Nozick, R. (1974) Anarchy, State, and Utopia, New York: Basic Books.

  • Nussbaum, M. (2000) Women and Human Development: The Capabilities Approach, Cambridge: Cambridge University Press.

  • Ochi, M. (2016) ‘Gravity threshold before the International Criminal Court: an overview of the court’s practice’, International Crimes Database Brief, 19 January: 1–16.

    • Search Google Scholar
    • Export Citation
  • Olson, P. (2011) ‘Anonymous hacks BART after cellphone blockade’, Forbes, 15 August. Available from: https://www.forbes.com/sites/parmyolson/2011/08/15/anonymous-hacks-bart-after-cellphone-blockade/

    • Search Google Scholar
    • Export Citation
  • O’Malley, G. (2013) ‘Hacktivism: cyber-activism or cyber-crime’, Trinity College Law Review, 16: 13760.

  • O’Neil, L. (2015) ‘Anonymous plans to “unhood” 1,000 Ku Klux Klan members online’, CBC News, 29 October. Available from: https://www.cbc.ca/news/trending/anonymous-plans-to-reveal-the-identities-of-1-000-kkk-members-1.3295523

    • Search Google Scholar
    • Export Citation
  • Ong, G. (2016) ‘IT grad, 23, arrested for Comelec website hack’, The Philippine Star, 22 April. Available from: http://www.philstar.com/headlines/2016/04/22/1575594/it-grad-23-arrested-comelec-website-hack

    • Search Google Scholar
    • Export Citation
  • Orend, B. (2006) The Morality of War, Calgary: Broadview Press.

  • Otsuka, M. (1994) ‘Killing the innocent in self-defense’, Philosophy and Public Affairs, 23(1): 7494.

  • Owen, T. (2015) Disruptive Power: The Crisis of the State in the Digital Age, Oxford: Oxford University Press.

  • Padmanabhan, S. (2012) ‘Hacking for Lulz1: employing expert hackers to combat cyber terrorism’, Vanderbilt Journal of Entertainment and Technology Law, 15(1): 191226.

    • Search Google Scholar
    • Export Citation
  • Paine, S. (2000) Endangered Spaces: Privacy, Law and the Home, CAMC Publications.

  • Pattison, J. (2018) The Alternatives to War: From Sanctions to Nonviolence ,Oxford: Oxford University Press.

  • Pedhazur, A. and Perliger, A. (2003) ‘The causes of vigilant political violence: the case of Jewish settlers’, Civil Wars, 6(3): 930.

    • Search Google Scholar
    • Export Citation
  • Perlroth, N. (2014) ‘Anonymous hackers’ efforts to identify Ferguson police officer create turmoil’, The New York Times, 14 August. Available from: https://www.nytimes.com/2014/08/15/us/ferguson-case-roils-collective-called-anonymous.html

    • Search Google Scholar
    • Export Citation
  • Pfaff, T. and Tiel, J. (2004) ‘The ethics of espionage’, The Journal of Military Ethics, 3(1): 115.

  • Phillips, R. (1984) War and Justice, Norman: University of Oklahoma Press.

  • Poeter, D. (2011) ‘Anonymous BART protest shuts down several underground stations’, PCMag, 16 August. Available from: https://uk.pcmag.com/news/111848/anonymous-bart-protest-shuts-down-several-underground-stations

    • Search Google Scholar
    • Export Citation
  • Pogge, T. (1991) ‘Coercion and violence’, in J. Brady and N. Garver (eds), Justice, Law and Violence, Philadelphia, PA: Temple University Press, pp 659.

    • Search Google Scholar
    • Export Citation
  • Polyviou, P. (1982) Search and Seizure: Constitutional and Common Law ,London: Duckworth.

  • Posner, G. (2017) ‘China’s secret cyberterrorism’ (updated), The Daily Beast, 14 July. Available from: http://www.thedailybeast.com/articles/2010/01/13/chinas-secret-cyber-terrorism.html

    • Search Google Scholar
    • Export Citation
  • Post, R. (1991) ‘Racist speech, democracy, and the First Amendment’, William and Mary Law Review, 32: 267327.

  • Post, R. (1993) ‘Managing deliberation: the quandary of democratic dialogue’, Ethics, 103: 65478.

  • Pozen, D. (2016) ‘Privacy-privacy tradeoffs’, The University of Chicago Law Review, 83(1): 22147.

  • Prasdas, A. and Prasad, P. (1998) ‘Everyday struggles at the workplace: the nature and implications of routine resistance in contemporary organizations’, Research in the Sociology of Organizations, 15: 22557.

    • Search Google Scholar
    • Export Citation
  • Profitt, N. J. (1996) ‘“Battered women” as “victims” and “survivors”: creating space for resistance’, Canadian Social Work Review/Revue Canadienne de Service Social, 13(1): 2338.

    • Search Google Scholar
    • Export Citation
  • Purshouse, J. (2019) ‘Paedophile hunters: how citizen-led policing is putting people’s lives at risk’, The Conversation, 22 January. Available at: https://theconversation.com/paedophile-hunters-how-citizenled-policing-is-putting-peoples-lives-at-risk-110006

    • Search Google Scholar
    • Export Citation
  • Raggi, R. (1977) ‘An independent right to freedom of association’, Harvard Civil Rights-Civil Liberties Law Review, 12(1): 130.

  • Rangarajan, L. N. (1998) ‘Diplomacy, states and secrecy in communications’, Diplomacy & Statecraft, 9(3): 1824.

  • Rawls, J. (1971) Theory of Justice, Cambridge, MA: Harvard University Press.

  • Rawls, J. (1977) Theory of Justice, Cambridge: Cambridge University Press.

  • Rawls, J. (2007) Lectures on the History of Political Philosophy, ed. Samuel Freeman, Cambridge, MA: Harvard University Press.

  • Rawls, J. (2009) ‘The justification of civil disobedience’, in A. Kavanagh and J. Oberdiek (eds), Arguing about Law, Abingdon: Routledge, pp 24453.

    • Search Google Scholar
    • Export Citation
  • Raz, J. (1986) The Morality of Freedom ,Oxford: Clarendon Press.

  • Razmetaeva, Y. (2014) ‘The right to resist and the right to rebellion’, Jurisprudence, 21(3): 75884.

  • Reed, M. G.,Syverson, P. and Goldschlag, D. (1998) ‘Anonymous connections and onion routing’, IEEE Journal on Selected Areas in Communications, 16(4): 48294.

    • Search Google Scholar
    • Export Citation
  • Reiman, J. H. (1976) ‘Privacy, intimacy, and personhood’, Philosophy and Public Affairs, 5(1): 2644.

  • Rescher, N. (1972) Welfare: The Social Issue in Philosophical Perspective ,Pittsburgh, PA: University of Pittsburgh Press.

  • Reynolds, P. (2015) ‘How to think about cyber conflicts involving non-state actors’, Philosophy and Technology, 28(3): 42748.

  • Richmond, S. (2011) ‘Millions of internet users hit by massive Sony PlayStation data theft’, The Telegraph, 26 April. Available from: https://www.telegraph.co.uk/technology/sony/8475728/Millions-of-internet-users-hit-by-massive-Sony-PlayStation-data-theft.html

    • Search Google Scholar
    • Export Citation
  • Robinson, M. (2000) ‘The construction and reinforcement of the myth of race crime’, Journal of Contemporary Criminal Justice, 16: 13356.

    • Search Google Scholar
    • Export Citation
  • Robinson, T. (1995) ‘Gentrification and grassroots resistance in San Francisco’s Tenderloin’, Urban Affairs Review, 30: 382513.

    • Search Google Scholar
    • Export Citation
  • Rogers, A. (2014) ‘What Anonymous is doing in Ferguson’, Time, 21 August. Available from: http://time.com/3148925/ferguson-michael-brown-anonymous/

    • Search Google Scholar
    • Export Citation
  • Rosenbaum, H. J. and Sederberg, P. C. (1974) ‘Vigilantism: an analysis of establishment violence’, Comparative Politics, 6(4): 54170.

    • Search Google Scholar
    • Export Citation
  • Rosenbaum, T. (2004) The Myth of Moral Justice, London: HarperCollins.

  • Rothschild, J. and Miethe, T. (1999) ‘Whistle-blower disclosures and management retaliation’, Work and Occupations, 26(1): 10728.

    • Search Google Scholar
    • Export Citation
  • RT.Com (2014) ‘#TangoDown: Anonymous close Cleveland City govt website over 12yo shooting death’, RT.com, 24 November. Available from: https://www.rt.com/usa/208255-anonymous-cleveland-police-shooting/

    • Search Google Scholar
    • Export Citation
  • Ruffin, O. (2001) ‘The hacktivismo declaration’, Cult of the Dead Cow, 4 July. Available from: https://www.digitalmanifesto.net/manifestos/197/

    • Search Google Scholar
    • Export Citation
  • Sachan, A. (2012) ‘Countering terrorism through dark web analysis’, Computing Communication & Networking Technologies ,Third International Conference.

    • Search Google Scholar
    • Export Citation
  • Sagar ,R. (2016) Secrets and Leaks: The Dilemma of State Secrecy ,Princeton, NJ: Princeton University Press.

  • Sanger, D. (2012) ‘Obama order sped up wave of cyberattacks against Iran’, The New York Times, 1 June. Available from: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html

    • Search Google Scholar
    • Export Citation
  • Sankowski, E. (1992) ‘Blame and autonomy’, American Philosophical Quarterly, 29(3): 2919.

  • Sauter, M. (2015) The Coming Swarm: DDoS Actions, Hacktivism, and Civil Disobedience on the Internet, New York: Bloomsbury.

  • Scanlon, T. (1972) ‘A theory of freedom of expression’, Philosophy and Public Affairs, 1: 20426.

  • Scanlon, T. (1979) ‘Freedom of expression and categories of expression’, University of Pittsburgh Law Review, 40: 51950.

  • Scanlon, T. M. and Daney, J. (2000) ‘Intention and permissibility’, Supplement to the Proceedings of the Aristotelian Society, 74(1): 30117.

    • Search Google Scholar
    • Export Citation
  • Schauer, F. (1993) ‘The phenomenology of speech and harm’, Ethics, 103: 63553.

  • Scheuerman, W. (2016) ‘Digital disobedience in the law’, New Political Science, 38(3): 299314.

  • Schneier, B. (2006) Beyond Fear: Thinking Sensibly about Security in an Uncertain World, Berlin: Springer.

  • Schwartz, B. (1961) ‘The Supreme Court: October 1959 term’, Michigan Law Review, 593: 40330.

  • Scott, J. (1985) Weapons of the Weak: Everyday Forms of Peasant Resistance, New Haven, CT: Yale University Press.

  • Serracino-Inglott, P. (2013) ‘Is it OK to be an Anonymous?’, Ethics & Global Politics, 6(1): 21744.

  • Shapiro, I. (2003) The Moral Foundations of Politics, New Haven, CT: Yale University Press.

  • Sheoran, P. and Singh, S. (2014) ‘Applications of ethical hackers’, International Journal of Enhanced Research in Science Technology & Engineering, 3(5): 11214.

    • Search Google Scholar
    • Export Citation
  • Shils, E. (1966) ‘Privacy: its constitution and vicissitudes’, Law and Contemporary Problems, 31(2): 281306.

  • Shirky, C. (2008) Here Comes Everybody, New York: Penguin Press.

  • Shotland, R. L. (1976) ‘Spontaneous vigilantes’, Society, 13(3): 302.

  • Silberstein, S. (2004) War of Worlds: Language, Politics and 9/11, London: Routledge.

  • Simitis, S. (1987) ‘Reviewing privacy in an information age’, University of Pennsylvania Law Review, 35(3): 70746.

  • Singer, P. (1972) ‘Famine, affluence, and morality’, Philosophy and Public Affairs, 7(2): 22943.

  • Singer, P. (2003) Corporate Warriors: The Rise of the Privatized Military Industry, Ithaca: Cornell University Press.

  • Slim, H. (2002) Killing Civilians: Methods, Madness and Morality in War, Basingstoke: Palgrave.

  • Smallridge, J., Wagner, P. and Crowl, J. (2016) ‘Understanding cyber-vigilantism: a conceptual framework’, Journal of Theoretical and Philosophical Criminology, 8(1): 5770.

    • Search Google Scholar
    • Export Citation
  • Smith, A. (1976) The Theory of Moral Sentiments, Oxford: Clarendon Press.

  • Smith, M. B. E. (1973) ‘Is there a prima facie obligation to obey the law?’, The Yale Law Review, 82(5): 95076.

  • Smith, P. (1990) ‘The duty to rescue and the slippery slope problem’, Social Theory and Practice, 16(1): 1941.

  • Solove, D. (2004) The Digital Person: Technology and Privacy in the Information Age, New York: New York University Press.

  • Solove, D. (2007a) ‘I’ve got nothing to hide and other misunderstandings of privacy’, San Diageo Law Review, 44: 74572.

  • Solove, D. (2007b) The Future of Reputation: Gossip, Rumor, and Privacy on the Internet, London: Yale University Press.

  • Sommer, P. and Brown, I. (2011) ‘Reducing systemic cybersecurity risk’, Organisation for Economic Cooperation and Development, 14 January. Available from: http://ssrn.com/abstract=1743384

    • Search Google Scholar
    • Export Citation
  • Staff, R. (2014) ‘JPMorgan hack exposed data of 83 million, among biggest breaches in history’, Reuters, 3 October. Available from: https://www.reuters.com/article/us-jpmorgan-cybersecurity-idUSKCN0HR23T20141003

    • Search Google Scholar
    • Export Citation
  • Steger, M. (2003) Judging Nonviolence: The Dispute between Realists and Idealists, London: Routledge.

  • Stephey, M. J. (2008) ‘Sarah Palin’s email hacked’, Time, 17 September. Available from: http://content.time.com/time/politics/article/0,8599,1842097,00.html

    • Search Google Scholar
    • Export Citation
  • Sterling, T. (2002) The Enron Scandal, New York: Nova Science Publishing.

  • Stiglitz, J. (1999) ‘On liberty, the right to know, and public discourse: the role of transparency in public life’, in M. J. Gibny (ed.), Globalising Rights: Oxford Amnesty Lecture 1999, pp 132.

    • Search Google Scholar
    • Export Citation
  • Stone, J. (2014) ‘Tamir rice shooting inspires anonymous hack on Cleveland websites’, International Business Times, 24 November. Available from: http://www.ibtimes.com/tamir-rice-shooting-inspires-anonymous-hack-cleveland-websites-1728681

    • Search Google Scholar
    • Export Citation
  • Stone, M. (2011) ‘Operation BART: Anonymous protests San Fran cell phone censorship’, Examiner.com, 14 August. Available from: http://www.examiner.com/anonymous-in-national/operation-bart-anonymous-protests-san-fran-cell-phone-censorship

    • Search Google Scholar
    • Export Citation
  • Strauss, D. (1991) ‘Persuasion, autonomy, and freedom of expression’, Columbia Law Review, 91: 3341.

  • Strossen, N. (1990) ‘Regulating racist speech on campus: a modest proposal?’, Duke Law Journal, 1990: 484572.

  • Sunstein, C. (2005) Laws of Fear: Beyond the Precautionary Principle, Cambridge: Cambridge University Press.

  • Tan, L. (2016) ‘Website claims: registered voters’ sensitive data easily searchable’, CNN Philippines, 21 April. Available from: http://cnnphilippines.com/news/2016/04/21/Comelec-hack-data-registered-Filipino-voters.html

    • Search Google Scholar
    • Export Citation
  • Tanczer, L. (2017) ‘The terrorist – hacker/hacktivist distinction: an investigation of self-identified hackers and hacktivists’, in M. Conway, L. Jarvis, O. Lehane, S. Macdonald and L. Nouri (eds), Terrorists’ Use of the Internet, Amsterdam: IOS Press, pp 7792.

    • Search Google Scholar
    • Export Citation
  • Taylor, P. and Harris, J. (2006) ‘Hacktivism’, in H. Bidgoli (ed.), Handbook of Information Security: Information Warfare; Social Issues, Legal and International Issues; and Security Foundations, Vol.2, Hoboken, NJ: Wiley, pp 17282.

    • Search Google Scholar
    • Export Citation
  • Thomas, D. (2002) Hacker Culture ,Minneapolis: University of Minnesota Press.

  • Thompson, D. F. (1999) ‘Democratic secrecy’, Political Science Quarterly, 114(2): 18193.

  • Thompson, P. B. (2001) ‘Privacy, secrecy and security’, Ethics and Information Technology, 3: 1319.

  • Thomson, J. J. (1975) ‘The right to privacy’, Philosophy and Public Affairs, 4(4): 295314.

  • Thomson, J. J. (1986) Rights, Restitution and Risk: Essays in Moral Theory, Cambridge, MA: Harvard University Press.

  • Thomson, J. J. (1991) ‘Self-defence’, Philosophy and Public Affairs, 20(4): 283310.

  • Thorsen, E., Sreedharan, C. and Allan, S. (2013) ‘WikiLeaks and whistle-blowing: the framing of Bradley Manning’, in B. Brevini, A. Hintz and P. McCurdy (eds), Beyond Wikileaks: Implications for the Future of Communications, Journalism and Society, Basingstoke: Palgrave Macmillan, pp 10122.

    • Search Google Scholar
    • Export Citation
  • Tidy, J. (2022) ‘Anonymous: how hackers are trying to undermine Putin’, BBC News, 20 March. Available from https://www.bbc.co.uk/news/technology-60784526

    • Search Google Scholar
    • Export Citation
  • TOR (nd) ‘What protections does TOR provide?’. Available from: https://www.torproject.org/docs/faq.html.en#WhatProtectionsDoesTorProvide

    • Search Google Scholar
    • Export Citation
  • TOR (2015) ‘Learning more about the GFW’s active probing system’, The TOR Project, 14 September. Available from: https://blog.torproject.org/category/tags/china

    • Search Google Scholar
    • Export Citation
  • Traynor, I. (2007) ‘Russia accused of unleashing cyberwar to disable Estonia’, The Guardian, 17 May. Available from: http://www.guardian.co.uk/world/2007/may/17/topstories3.russia

    • Search Google Scholar
    • Export Citation
  • Trottier, D. (2017) ‘Digital vigilantism as weaponisation of visibility’, Philosophy and Technology, 30: 5572.

  • Tuma, S. E. (2011) ‘What does CFAA mean and why should I care: a primer on the Computer Fraud and Abuse Act for civil litigators’, South Carolina Law Review, 63(1): 14290.

    • Search Google Scholar
    • Export Citation
  • UNESCO (2015) Keystones to Foster Inclusive Knowledge Societies: Access to Information and Knowledge, Freedom of Expression, Privacy, and Ethics on a Global Internet, Paris: UNESCO Publishing. Available from: http://unesdoc.unesco.org/images/0023/002325/232563e.pdf

    • Search Google Scholar
    • Export Citation
  • US Senate Select Committee (2014) Committee Study of the Central Intelligence Agency’s Detention and Interrogation Program. Available from: http://fas.org/irp/congress/2014_rpt/ssci-rdi.pdf

    • Search Google Scholar
    • Export Citation
  • Utterback, J. (2013) ‘Cases of hacktivism’, Hacktivism 101, 28 May. Available from: https://joymargret89.wordpress.com/2013/05/28/cases-of-hacktivism/

    • Search Google Scholar
    • Export Citation
  • Vamosi, R. (2008) ‘Anonymous hackers take on the Church of Scientology’, CNET, 25 January. Available from: https://www.cnet.com/news/anonymous-hackers-take-on-the-church-of-scientology/

    • Search Google Scholar
    • Export Citation
  • Wagenseil, P. (2011) ‘Anonymous “hacktivists” attack Egyptian websites’, Security News Daily, 6 January. Available from: http://www.msnbc.msn.com/id/41280813/ns/technology_and_science-security/#.T3bs0r9SR7E

    • Search Google Scholar
    • Export Citation
  • Waldron, J. (2003) ‘Security and liberty: the image of balance’, Journal of Political Philosophy, 11(2): 191210.

  • Walzer, M. (2000) Just and Unjust Wars: A Moral Argument with Historical Arguments, New York: Basic Books.

  • Wang, F., Zeng, D., Hendler, J. A., Zhang, Q., Feng, Z., Gao, Y. et al (2010) ‘A study of the Human Flesh search engine: crowd-powered expansion of online knowledge’, Computer, 43(8): 4553.

    • Search Google Scholar
    • Export Citation
  • Waqas (2014) ‘Anonymous shuts down city of Cleveland website’, HackRead, 26 November. Available from: https://www.hackread.com/anonymous-shuts-city-cleveland-website/

    • Search Google Scholar
    • Export Citation
  • Wasserman, D. (1987) ‘Justifying self-defense’, Philosophy and Public Affairs, 164(4): 35678.

  • Weaver, W. and Pallitto, R. (2005) ‘State secrets and executive powers’, Political Science Quarterly, 120(1): 85112.

  • Webb, M. (2021) Coding Democracy: How Hackers Are Disrupting Power, Surveillance Authoritarianism, Cambridge, MA: MIT Press.

  • Weinstein, M. A. (1971) ‘The uses of privacy in the good life’, in J. R. Pennock and J. W. Chapman (eds), Privacy: Nomos XIII, New York: Atherton Press, pp 88104.

    • Search Google Scholar
    • Export Citation
  • Wells, C. (2004) ‘National security and the Freedom of Information Act’, Administrative Law Review, 56(4): 1195222.

  • Westin, A. (1967) Privacy and Freedom, London: Bodley Head.

  • Whelan, J. M. (1991) ‘Charity and the duty to rescue’, Social Theory and Practice, 17(3): 44156.

  • Wiemann, G. (2004) ‘Cyberterrorism: how real is the threat?United States Institute for Peace, 119: 212.

  • Williams, G. (2003) ‘Blame and responsibility’, Ethical Thought and Moral Practice, 6: 42745.

  • Williams, J. (2008) ‘Space, scale and just war: meeting the challenge of humanitarian intervention and trans-national terrorism’, Review of International Studies, 34(4): 581600.

    • Search Google Scholar
    • Export Citation
  • Wilmot, S. (2000) ‘Nurses and whistleblowing: the ethical issues’, Philosophical and Ethical Issues, 32(5): 10517.

  • Wong, J. C. (2016) ‘Activists lose criminal case on climate change defense – but judge praises effort’, The Guardian, 15 January. Available from: https://www.theguardian.com/environment/2016/jan/15/delta-5-seattle-washington-climate-change-court-defense

    • Search Google Scholar
    • Export Citation
  • Woodcock, B. (2011) ‘Overview of the Egyptian internet shutdown’, Packet Clearing House, February. Available from: https://privacywonk.net/download/Egypt-PCH-Overview.pdf

    • Search Google Scholar
    • Export Citation
  • Wray, S. (1999) ‘On electronic civil disobedience’, Peace Review, 11(1): 10711.

  • Xu, B. and Shaoting, J. (2008) ‘Human flesh engine: an internet lynching?’, Xinhua News, July 4. Available from: http://news.xinhuanet.com/english/2008-07/04/content_8491087.htm

    • Search Google Scholar
    • Export Citation
  • Zedner, L. (2007) ‘Pre-crime and post criminology’, Theoretical Criminology, 11(2): 26181.

  • Zelizer, B. and Allan, S. (2010) Keywords in News and Journalism Studies, Maidenhead and New York: Open University Press.

  • Zetter, K. (2008) ‘Palin E-mail hacker says it was easy’, Wired, 18 September. Available from: https://www.wired.com/2008/09/palin-e-mail-ha/

    • Search Google Scholar
    • Export Citation
  • Zimring, F. (2003) The Contradictions of American Capital Punishment, Oxford: Oxford University Press.