000 | 03463nam a2200481 i 4500 | ||
---|---|---|---|
001 | 9072251 | ||
003 | IEEE | ||
005 | 20220712204952.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 200505s2020 mau ob 001 eng d | ||
020 |
_a9780262357258 _qelectronic bk. |
||
020 |
_z0262357259 _qelectronic bk. |
||
020 | _z9780262043601 | ||
035 | _a(CaBNVSL)mat09072251 | ||
035 | _a(IDAMS)0b0000648c95d19c | ||
040 |
_aCaBNVSL _beng _erda _cCaBNVSL _dCaBNVSL |
||
050 | 4 |
_aHV6773 _b.F65 2020eb |
|
082 | 0 | 4 |
_a364.16/8 _223 |
100 | 1 |
_aFollis, Luca, _eauthor. _925929 |
|
245 | 1 | 0 |
_aHacker states / _cLuca Follis, Adam Fish. |
264 | 1 |
_aCambridge : _bThe MIT Press, _c[2020] |
|
264 | 2 |
_a[Piscataqay, New Jersey] : _bIEEE Xplore, _c[2020] |
|
300 | _a1 PDF (264 pages). | ||
336 |
_atext _2rdacontent |
||
337 |
_aelectronic _2isbdmedia |
||
338 |
_aonline resource _2rdacarrier |
||
490 | 1 | _aInformation Society Series | |
505 | 0 | _aIntro -- Contents -- Acknowledgments -- 1 Hacker States -- 2 Hacking the State Boundary -- 3 When to Hack -- 4 Prosecuting a Hacker -- 5 Hacking for Profit -- 6 High Breach Societies -- Notes -- References -- Index | |
506 | _aRestricted to subscribers or individual electronic text purchasers. | ||
520 | _aHow hackers and hacking moved from being a target of the state to a key resource for the expression and deployment of state power. In this book, Luca Follis and Adam Fish examine the entanglements between hackers and the state, showing how hackers and hacking moved from being a target of state law enforcement to a key resource for the expression and deployment of state power. Follis and Fish trace government efforts to control the power of the internet; the prosecution of hackers and leakers (including such well-known cases as Chelsea Manning, Edward Snowden, and Anonymous); and the eventual rehabilitation of hackers who undertake "ethical hacking" for the state. Analyzing the evolution of the state's relationship to hacking, they argue that state-sponsored hacking ultimately corrodes the rule of law and offers unchecked advantage to those in power, clearing the way for more authoritarian rule. Follis and Fish draw on a range of methodologies and disciplines, including ethnographic and digital archive methods from fields as diverse as anthropology, STS, and criminology. They propose a novel "boundary work" theoretical framework to articulate the relational approach to understanding state and hacker interactions advanced by the book. In the context of Russian bot armies, the rise of fake news and algorithmic opacity, they describe the political impact of leaks and hacks, partnerships with journalists in pursuit of transparency and accountability, the increasingly prominent use of extradition in hacking-related cases, and the privatization of hackers for hire. | ||
530 | _aAlso available in print. | ||
538 | _aMode of access: World Wide Web | ||
650 | 0 |
_aHacktivism. _923897 |
|
650 | 0 |
_aCyberspace _xPolitical aspects. _923564 |
|
655 | 4 |
_aElectronic books. _93294 |
|
700 | 1 |
_aFish, Adam _c(Senior lecturer in Sociology), _eauthor. _925930 |
|
710 | 2 |
_aIEEE Xplore (Online Service), _edistributor. _925931 |
|
710 | 2 |
_aMIT Press, _epublisher. _925932 |
|
830 | 0 |
_aInformation society series. _923902 |
|
856 | 4 | 2 |
_3Abstract with links to resource _uhttps://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=9072251 |
942 | _cEBK | ||
999 |
_c73645 _d73645 |