File #2497: "2018_Book_LivingWithHacktivism.pdf"
Text
1|Preface|7
1|Acknowledgements|15
1|Contents|16
1|List of Abbreviations|17
1|1: Introduction: The Birth of Cyberspace and the Development of Hacktivism|19
2|1 Life in the Networked Societies|19
2|2 Information: The New Currency of Power|21
2|3 The Birth of Hacktivism|24
2|4 Conclusion|28
1|2: The Two Eras of Hacktivism|32
2|1 Introduction|32
2|2 The First Era of Hacktivism and the Birth of Electronic Civil Disobedience|34
3|2.1 The Virtual Demonstrators|34
3|2.2 The Artivists|38
3|2.3 The Information Purists|39
2|3 The Second Era of Hacktivism|42
3|3.1 The Birth and Politicisation of Anonymous|42
3|3.2 Tactics and Operations|45
3|3.3 Hacktivism Beyond Anonymous|48
2|4 Conclusion|50
1|3: Looking into the Positive and Negative Aspects of Hacktivism|59
2|1 Introduction|59
2|2 The Links Between Hacktivism and Freedom of Expression|60
2|3 The Links Between CD and Hacktivism|63
3|3.1 Definitions and Initial Clarifications|63
3|3.2 The Value of CD and the Analogy of Hacktivism|65
2|4 The Positive and Negative Aspects of Hacktivism Through Its Link to CD|71
3|4.1 Conscientious, Yet Political|71
3|4.2 Non-violence and Virtual Harms|75
3|4.3 Efficiency and the Conflict of Speech|81
3|4.4 CD as a Last Resort|86
3|4.5 Taking Responsibility Versus Anonymity|89
2|5 Conclusion|93
1|4: Contemporary Norms and Law and Hacktivism|107
2|1 Introduction|107
2|2 The Normative Framework and Its Impact on Hacktivism|108
3|2.1 Focusing on ‘Command and Control’|108
3|2.2 Fear of Risk and Security Discourses|109
3|2.3 The Deviant ‘Other’ and Hacktivists|112
3|2.4 The Influence of the Media, Experts, and Security Firms|113
2|3 Cybercrime Laws and Their Application on Hacktivism|116
3|3.1 The Making of Cybercrime Laws|116
3|3.2 The Applicable Unauthorised Access Offences|117
3|3.3 The Dominating Provision of Computer Damage/Impairment|119
3|3.4 The Further Criminalisation of Inchoate Offences and Jurisdictional Expansion|126
3|3.5 The Complexities of Establishing Lack of Authorisation|127
3|3.6 Hacking, Hacktivism, and Cyberterrorism Laws|134
3|3.7 Expansion of Law and Lack of Consistency|138
2|4 Conclusion|139
1|5: Enforcing Crime Control and Hacktivism|159
2|1 Introduction|159
2|2 Prosecutors and Hacktivism|160
3|2.1 The Multifaceted Role of Prosecutors|160
3|2.2 The Importance of Plea Bargaining|162
2|3 The Role of Courts in Regulating Hacktivism|165
3|3.1 The General Power of the Judiciary and the Role of Sentencing Guidelines|165
3|3.2 The Influence of Judicial Culture|168
3|3.3 The Role of the Jury|170
2|4 Private Actors, Law Enforcement, and Hacktivism|172
3|4.1 Private Corporations and Collaboration with the Authorities|172
3|4.2 Private Regulators and Hacktivist Speech|175
2|5 Conclusion|178
1|6: Moving from Conflict to Symbiosis|191
2|1 Introduction|191
2|2 The Need for a More Holistic Understanding|192
3|2.1 Understanding the Legitimacy Deficit|192
3|2.2 Balancing Multi-actor Regulation and the Need for Symbiosis|193
2|3 Building Symbiosis from Within the Criminal Justice System|198
3|3.1 Informed Processes in the Criminal Justice System|199
3|3.2 Reconsidering the Focus on Damage and Loss|200
3|3.3 Offering Safe Harbour for Cooperative Behaviour|201
3|3.4 Promoting Technology-Based and Community-Focused Penalties|204
2|4 Moving Beyond the Criminal Justice System|207
3|4.1 Facilitating Spaces and Processes of Dialogue|207
3|4.2 Counter-notices and Pop-up Protests|211
3|4.3 The Prospect of Technological Countermeasures|213
2|5 The Role of Hacktivists|215
3|5.1 Hacktivists as Communities and Self-regulation|215
3|5.2 Establishing Tactical Standards|218
3|5.3 Identifying Deviants and Imposing Sanctions|220
2|6 Conclusion|225
1|7: Final Conclusions|238
1|Bibliography|242
2|Table of Cases|242
3|European Court of Human Rights|242
3|Germany|242
3|United Kingdom|242
3|United States|243
2|Table of Legislation|245
3|International Treaties, Conventions and Other Documents|245
3|United Kingdom|245
3|United States|246
2|Secondary Sources|247
3|Anonymous Works and Arithmetic Names|247
2|A|247
2|B|249
2|C|253
2|D|256
2|E|258
2|F|259
2|G|260
2|H|262
2|I|264
2|J|264
2|K|265
2|L|267
2|M|270
2|N|272
2|O|272
2|P|273
2|Q|274
2|R|274
2|S|276
2|T|279
2|U|280
2|V|281
2|W|282
2|Y|284
2|Z|284
1|Index|286
1|Acknowledgements|15
1|Contents|16
1|List of Abbreviations|17
1|1: Introduction: The Birth of Cyberspace and the Development of Hacktivism|19
2|1 Life in the Networked Societies|19
2|2 Information: The New Currency of Power|21
2|3 The Birth of Hacktivism|24
2|4 Conclusion|28
1|2: The Two Eras of Hacktivism|32
2|1 Introduction|32
2|2 The First Era of Hacktivism and the Birth of Electronic Civil Disobedience|34
3|2.1 The Virtual Demonstrators|34
3|2.2 The Artivists|38
3|2.3 The Information Purists|39
2|3 The Second Era of Hacktivism|42
3|3.1 The Birth and Politicisation of Anonymous|42
3|3.2 Tactics and Operations|45
3|3.3 Hacktivism Beyond Anonymous|48
2|4 Conclusion|50
1|3: Looking into the Positive and Negative Aspects of Hacktivism|59
2|1 Introduction|59
2|2 The Links Between Hacktivism and Freedom of Expression|60
2|3 The Links Between CD and Hacktivism|63
3|3.1 Definitions and Initial Clarifications|63
3|3.2 The Value of CD and the Analogy of Hacktivism|65
2|4 The Positive and Negative Aspects of Hacktivism Through Its Link to CD|71
3|4.1 Conscientious, Yet Political|71
3|4.2 Non-violence and Virtual Harms|75
3|4.3 Efficiency and the Conflict of Speech|81
3|4.4 CD as a Last Resort|86
3|4.5 Taking Responsibility Versus Anonymity|89
2|5 Conclusion|93
1|4: Contemporary Norms and Law and Hacktivism|107
2|1 Introduction|107
2|2 The Normative Framework and Its Impact on Hacktivism|108
3|2.1 Focusing on ‘Command and Control’|108
3|2.2 Fear of Risk and Security Discourses|109
3|2.3 The Deviant ‘Other’ and Hacktivists|112
3|2.4 The Influence of the Media, Experts, and Security Firms|113
2|3 Cybercrime Laws and Their Application on Hacktivism|116
3|3.1 The Making of Cybercrime Laws|116
3|3.2 The Applicable Unauthorised Access Offences|117
3|3.3 The Dominating Provision of Computer Damage/Impairment|119
3|3.4 The Further Criminalisation of Inchoate Offences and Jurisdictional Expansion|126
3|3.5 The Complexities of Establishing Lack of Authorisation|127
3|3.6 Hacking, Hacktivism, and Cyberterrorism Laws|134
3|3.7 Expansion of Law and Lack of Consistency|138
2|4 Conclusion|139
1|5: Enforcing Crime Control and Hacktivism|159
2|1 Introduction|159
2|2 Prosecutors and Hacktivism|160
3|2.1 The Multifaceted Role of Prosecutors|160
3|2.2 The Importance of Plea Bargaining|162
2|3 The Role of Courts in Regulating Hacktivism|165
3|3.1 The General Power of the Judiciary and the Role of Sentencing Guidelines|165
3|3.2 The Influence of Judicial Culture|168
3|3.3 The Role of the Jury|170
2|4 Private Actors, Law Enforcement, and Hacktivism|172
3|4.1 Private Corporations and Collaboration with the Authorities|172
3|4.2 Private Regulators and Hacktivist Speech|175
2|5 Conclusion|178
1|6: Moving from Conflict to Symbiosis|191
2|1 Introduction|191
2|2 The Need for a More Holistic Understanding|192
3|2.1 Understanding the Legitimacy Deficit|192
3|2.2 Balancing Multi-actor Regulation and the Need for Symbiosis|193
2|3 Building Symbiosis from Within the Criminal Justice System|198
3|3.1 Informed Processes in the Criminal Justice System|199
3|3.2 Reconsidering the Focus on Damage and Loss|200
3|3.3 Offering Safe Harbour for Cooperative Behaviour|201
3|3.4 Promoting Technology-Based and Community-Focused Penalties|204
2|4 Moving Beyond the Criminal Justice System|207
3|4.1 Facilitating Spaces and Processes of Dialogue|207
3|4.2 Counter-notices and Pop-up Protests|211
3|4.3 The Prospect of Technological Countermeasures|213
2|5 The Role of Hacktivists|215
3|5.1 Hacktivists as Communities and Self-regulation|215
3|5.2 Establishing Tactical Standards|218
3|5.3 Identifying Deviants and Imposing Sanctions|220
2|6 Conclusion|225
1|7: Final Conclusions|238
1|Bibliography|242
2|Table of Cases|242
3|European Court of Human Rights|242
3|Germany|242
3|United Kingdom|242
3|United States|243
2|Table of Legislation|245
3|International Treaties, Conventions and Other Documents|245
3|United Kingdom|245
3|United States|246
2|Secondary Sources|247
3|Anonymous Works and Arithmetic Names|247
2|A|247
2|B|249
2|C|253
2|D|256
2|E|258
2|F|259
2|G|260
2|H|262
2|I|264
2|J|264
2|K|265
2|L|267
2|M|270
2|N|272
2|O|272
2|P|273
2|Q|274
2|R|274
2|S|276
2|T|279
2|U|280
2|V|281
2|W|282
2|Y|284
2|Z|284
1|Index|286