References to footnotes show both the page number and the note number (5n2).

A

activism, hacking as 1112
actus reus (guilty act) 108
Afghan War Logs 85
Amazon 84
Amnesty International 65
AnonOps 8485
anonymity 48, 49, 68
Anonymous
Arab Spring 5354, 6265
Cleveland 101
collectives 47, 112
fighting ISIS 105106
hackers replicating state roles 35
HBGary Federal 88, 89
history of 1726
hive mind 8, 112
information leaks 73
manifesto 7, 1920, 60
Nigeria/Uganda 103104
online care packages 53, 63, 64, 6772
Operation Avenge Assange 7, 18, 73, 85
Operation BART 5n3, 99100, 101, 102103, 111112
Operation Darknet 5n7, 21, 104105
Operation DeathEaters 5n7, 21, 104105
Operation Egypt 5n6, 38n4, 54, 6364
Operation Ferguson 5n3, 21, 100
Operation Payback 67, 73, 8485
Operation Single Gateway 54
Operation Tunisia 5n6, 38n4, 54, 63, 71
origins 7, 1719
Palin, Sarah 87, 90, 111
structure 78, 4849
Syrian government attack 54
WikiLeaks 8485
anti-authoritarianism 17
anti-capitalism 17
anti-corporate protest 19, 38, 5960
anti-corruption 1920, 99
anti-establishment beliefs 7, 19, 20, 38
anti-nuclear protests 5n2, 9, 12, 17, 28
anti-piracy 67
Apple 68, 116
Arab Spring 5354, 6272
autonomy 4041, 51, 53, 5558, 7780
autonomous decision-making 4041, 56, 7778, 80
harm 24, 45
justification for hacking 1, 2, 23, 36, 4041, 44
political autonomy 5372
political violence 28

B

bad/evil laws 36, 9596, 104
Ben Ali, President 6263, 65
BitTorrent 60
blackouts 6364, 65, 102
blockages 12, 69
see also website shut-downs
Brown, Michael 21, 100
brute force cracking 68

C

cell phone service shut-downs 99, 101
censorship
Anonymous Manifesto 19
Arab Spring 54, 6263, 64
cell phone service shut-downs 100
China 28, 6768
Church of Scientology 18
DDoS as 66
government censorship 6869
Charlie Hebdo attacks 20, 105
civil disobedience 11, 1213, 27, 75
civil rights movements 29
Cleveland 21, 101
coercive power 13, 27, 41, 42, 94
see also violence
COINTELPRO 90
Coleman, G. 4, 5, 7, 10, 17, 18, 33, 49, 63, 66, 71, 80, 84, 87, 88, 90, 99, 100, 112, 114, 115, 116, 117
collectives 4, 49, 59, 112
Computer Fraud and Abuse Act (CFAA) 115117
Computer Misuse Act (1990) 115
corporate hackers 89
see also white hat/grey hat hackers
Critical Art Essembled 19
Cruise, Tom 18
Cult of the Dead Cow (cDc) 5n4, 11, 17, 62, 66
cyber-libertarianism 4, 20
cyber-panoptic gaze 41
cyber-rights 17, 19, 60, 6162
cyber-terrorism 5, 30, 33, 106, 113
cyberspace, conceptualisation 29

D

dark web 6768, 97, 104105
data-mining 43, 61
dataveillance 43, 61
degree of harm 2425, 4445, 50, 6667, 77
see also severity (of harm/damage)
deliberative democracy 48, 110, 114
Delmas, C. 11, 13, 14, 27, 29, 33, 66, 7576, 108, 109
democracy 13, 58, 60, 78, 110, 114
denial of service (DoS) 27
Denning, D. 2, 12, 27, 28, 33, 59
digital resistance/disobedience/activism 11, 33
digital rights 17, 19, 60, 6162
discrimination 47
distributed denial of service (DDoS) 8, 2728, 33, 55, 6566, 6772, 102
Arab Spring 5n6, 5354, 63, 70
as censorship 66
Cleveland 101
costs of hacking 117
damage to systems/networks 30, 6566, 70
level of political violence 6772
Operation BART 99100
Operation Payback 67
political hacking 2728
as political violence 33
and the right to information 55
on Scientology churches 18
WikiLeaks 84
Zippies 17
doxxing 2829, 33, 74
individual 74, 9092
institutional 74, 8790
duty of care 7577, 98, 103

E

Egypt 6364
see also Operation Egypt
Electrohippies 12
Electronic Disturbance Theatre 12, 19
electronic footprints 61
Electronic Frontier Foundation 19
email bombs 17, 28, 64
emails, accessing 8788, 90, 111
encryption 6768, 84
espionage 9, 75, 86
see also intelligence collection
Estonia 9
European Convention on Human Rights 101
Extinction Rebellion 115

F

Fabre, C. 10, 34, 38, 119
Feinberg, J. 910, 2223, 40, 41, 44, 45, 75
file-sharing 60
financial costs 46, 92, 113, 116117
FLSnag 19, 60
freedom of association 29, 42, 5562, 101
freedom of expression 10, 19, 29, 5562, 71, 101
freedom of information 17, 18, 19, 38, 5562, 65n1, 6772, 8687
French Data Network 64

G

Golden Shield Project (Great Firewall of China) 45n13, 6768
good laws 9499, 117
graffiti 12, 29
grey hat hackers 8

H

hacker ethic 1819
hacking
forms of 38
history 1726
hacktivism 1113, 2627, 30, 33
harm 910, 2226
duration of 25, 51
duty to prevent 7576, 98, 108, 117
harm-benefit calculations 46, 50, 66, 7172, 8283, 92, 98, 104, 106, 118
justification of 910
negligence 9798
political violence spectrum 2224
responsibility of hackers for 103
HBGary Federal 87, 8890
human flesh search engine 9092
human rights 11, 28, 34, 36, 3839, 95, 101

I

India 4, 28, 6768
Indonesia 28
information release/leaking 33, 7393, 100, 101103, 105
see also doxxing
intelligence collection 66, 69, 75, 79, 85
intelligence organizations 61, 76, 7879, 87, 120
invalid laws 36
see also bad/evil laws
Iran 9
Iraq 17, 84
Iraq War Logs 8586
ISIS 20, 105106

J

journalism 57, 8687, 88
JPMorgan Chase data breach 4
JSTOR 6, 114115
just criteria, application of 6572
just war 910, 3435, 108109
justification spectrum 4951, 101

L

last resort 110
laws
bad/evil 36, 9596, 104
to deal with hacking crimes 115116
good laws 9499, 117
leaks see information release/leaking
legitimate/illegitimate targets 10, 47, 8082
Levy, S. 4, 17, 18, 60
LGBTQ+ 21, 103104
libertarianism 20
liberty 40, 4142, 45, 57, 119
life 3839
LulzSec 23, 4, 54

M

malware 29, 33
Mastercard 18, 84
Megaupload 38n5
Milw0rm 28
miscarriages of justice 9798
misinformation 60, 78, 8586
MIT 17, 114115

N

NASA 5n2, 9, 17
national security
changing conceptions of 118120
state powers 6
whistleblowing 19, 60, 7475, 79, 85, 89
negligence 3637, 9798
Nigeria 21, 103104
non-violence
civil disobedience 1213, 27, 29
hacktivism 11, 27
Nussbaum, M. 910, 23, 40, 44

O

occupation movements 29, 49, 67
onion routing 68
online care packages 53, 63, 64, 6772
open-source data collection 82
Operation Aurora 9
Operation Avenge Assange 7, 18, 73, 85
Operation BART 5n3, 99100, 101, 102103, 111112
Operation Chanology 18
Operation Comelec 54
Operation Darknet 5n7, 21, 104105
Operation Darknet Relaunch 104105
Operation DeathEaters 5n7, 21, 104105
Operation Egypt 5n6, 38n4, 54, 6364
Operation Ferguson 5n3, 21, 100
Operation Ghostnet 9
Operation Megaupload 38n5
Operation Payback 67, 73, 8485
Operation Single Gateway 54
Operation Tunisia 5n6, 38n4, 54, 63, 71
oversight 20, 41, 4749, 56, 75, 102, 120

P

paedophile rings 5n7, 21, 104105
Palin, Sarah 87, 90, 111
PayPal 18, 8485
peer-to-peer platforms 60
Philippines 54
Phineas Phisher 10
phishing 63
piracy 19
Pirate Bay 60
police shootings 21, 99101, 102, 121
political agency 5658
political hacking 12, 38, 2630
distinction from cyber-terrorism 30
history of 1631
reshaping the approach 113122
political violence 2326
conclusions on 123125
decision making and bias 4749
hackers using 3337
justifications for 3736, 4951
spectrum of 2126, 6667, 7071, 124
state authority 3435
President’s Review Group on Intelligence and Communications Technologies 119120
privacy 40, 4243, 5051
bodily privacy 43
concentric circles of 50
as control 4243
corporate 8889
dataveillance and data-mining 61
doxxing 2829, 8790
information release/leaking 33, 7393, 100, 101103, 105
justifications for hacking 4243
privacy-security 119120
right to privacy 42n10, 62, 65n1, 6970, 8889, 124
privacy-plus 69
Project Chanology 18
proportionality 4647, 81, 8283, 106, 110, 124
public interest hacks 8082, 8790
publicity principle 110111
Putin, Vladimir 86

R

ransomware 4
Rawls, J. 12, 2223, 36, 60, 75, 95
reasonable force 117118
reasonable suspicion 82
reddit.com 49, 112
Reporters Without Borders Press Freedom index 63
resistance 66, 7576
retributive justice 95
right intention 10, 107110, 124
rights
autonomy 41
digital rights 17, 19, 60, 6162
human rights 11, 28, 34, 36, 3839, 95, 101
protest 101
self-defence 30
Ruffin, Oxblood 11, 62, 66
Russia 86

S

San Francisco 99
Sauter, M. 11, 33, 66
Scientology, Church of 18
secrecy 20, 60, 7879, 84, 85, 87, 110111
security industry 81, 87, 8890
self-defence 10, 14, 30, 3233, 3839, 4346, 4950, 81, 109110, 117118, 125
severity (of harm/damage) 2425, 51, 83, 92, 98, 113, 123124
see also degree of harm
Snowden, Edward 19, 73, 84, 119, 120
social contract 34
social media 59, 64, 88, 91, 106, 112
social shaming 9192, 93
state hacking 9
Strano Network 12
Stratfor 73, 87
structural violence 26
Stuxnet computer worm 9
surveillance 41, 43, 56, 60, 85, 120
surveillance companies 10, 64
surveillance-evading tools 63
Swartz, Aaron 6, 10, 114115
Syrian government attack 54, 64

T

Tech Model Railroad Club 17
telecom companies 20
Telecomix 10, 62, 63, 64, 70
Thailand 54
Thomson, J. J. 38, 43, 45, 69, 81, 108, 109
Titan Rain 9
TOR 63, 64, 6768
torrent websites 19
transparency 20, 41, 56, 60, 102, 121, 124
trolling 17, 18
Tunisia 6265
see also Operation Tunisia
Twitter 5, 100, 103, 105, 106

U

Uganda 21, 103104
Ukraine 4
uncivil disobedience 1314, 75
UNESCO 57
Universal Declaration and International Covenant on Civil and Political Rights 1966 (ICCPR) 65n1, 95
Universal Declaration of Human Rights 36

V

violence
cyber-terrorism 30
defined 2224
defined as honourable 79
political hacking 1, 13, 16, 2630
political violence spectrum 2126
self-defence 117
state monopoly on 1, 3, 122, 123
virtual sit-ins 12, 27, 2930
viruses 29, 33
Visa 18, 84

W

Wall Street protests 30
Walzer, M. 80, 81
WANK worm 5n2, 17
WannaCry 4
Warren, Chief Justice 58
Watergate 83
WauchulaGhost 105
website defacements 12, 28, 29, 69, 92, 105
website redirects 12
website shut-downs 6364, 100, 101103, 104, 105
see also distributed denial of service (DDoS)
website tracking data 61, 64
whistleblowing 19, 20, 60, 73, 7487, 116, 120122, 124
white hat/grey hat hackers 89
Wikileaks 7, 18, 20, 73, 8387, 88, 8990