000 03463nam a2200481 i 4500
001 9072251
003 IEEE
005 20220712204952.0
006 m o d
007 cr |n|||||||||
008 200505s2020 mau ob 001 eng d
020 _a9780262357258
_qelectronic bk.
020 _z0262357259
_qelectronic bk.
020 _z9780262043601
035 _a(CaBNVSL)mat09072251
035 _a(IDAMS)0b0000648c95d19c
040 _aCaBNVSL
_beng
_erda
_cCaBNVSL
_dCaBNVSL
050 4 _aHV6773
_b.F65 2020eb
082 0 4 _a364.16/8
_223
100 1 _aFollis, Luca,
_eauthor.
_925929
245 1 0 _aHacker states /
_cLuca Follis, Adam Fish.
264 1 _aCambridge :
_bThe MIT Press,
_c[2020]
264 2 _a[Piscataqay, New Jersey] :
_bIEEE Xplore,
_c[2020]
300 _a1 PDF (264 pages).
336 _atext
_2rdacontent
337 _aelectronic
_2isbdmedia
338 _aonline resource
_2rdacarrier
490 1 _aInformation Society Series
505 0 _aIntro -- Contents -- Acknowledgments -- 1 Hacker States -- 2 Hacking the State Boundary -- 3 When to Hack -- 4 Prosecuting a Hacker -- 5 Hacking for Profit -- 6 High Breach Societies -- Notes -- References -- Index
506 _aRestricted to subscribers or individual electronic text purchasers.
520 _aHow hackers and hacking moved from being a target of the state to a key resource for the expression and deployment of state power. In this book, Luca Follis and Adam Fish examine the entanglements between hackers and the state, showing how hackers and hacking moved from being a target of state law enforcement to a key resource for the expression and deployment of state power. Follis and Fish trace government efforts to control the power of the internet; the prosecution of hackers and leakers (including such well-known cases as Chelsea Manning, Edward Snowden, and Anonymous); and the eventual rehabilitation of hackers who undertake "ethical hacking" for the state. Analyzing the evolution of the state's relationship to hacking, they argue that state-sponsored hacking ultimately corrodes the rule of law and offers unchecked advantage to those in power, clearing the way for more authoritarian rule. Follis and Fish draw on a range of methodologies and disciplines, including ethnographic and digital archive methods from fields as diverse as anthropology, STS, and criminology. They propose a novel "boundary work" theoretical framework to articulate the relational approach to understanding state and hacker interactions advanced by the book. In the context of Russian bot armies, the rise of fake news and algorithmic opacity, they describe the political impact of leaks and hacks, partnerships with journalists in pursuit of transparency and accountability, the increasingly prominent use of extradition in hacking-related cases, and the privatization of hackers for hire.
530 _aAlso available in print.
538 _aMode of access: World Wide Web
650 0 _aHacktivism.
_923897
650 0 _aCyberspace
_xPolitical aspects.
_923564
655 4 _aElectronic books.
_93294
700 1 _aFish, Adam
_c(Senior lecturer in Sociology),
_eauthor.
_925930
710 2 _aIEEE Xplore (Online Service),
_edistributor.
_925931
710 2 _aMIT Press,
_epublisher.
_925932
830 0 _aInformation society series.
_923902
856 4 2 _3Abstract with links to resource
_uhttps://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=9072251
942 _cEBK
999 _c73645
_d73645