813
Views
4
CrossRef citations to date
0
Altmetric
Original Articles

“The Greatest Crime Syndicate since the Gambinos”: A Hacker Critique of Government, Law, and Law Enforcement

&
Pages 243-261 | Received 23 Jan 2013, Accepted 03 Jun 2013, Published online: 08 Nov 2013

REFERENCES

  • aestetix . 2011 . “Who is Anonymous?” 2600: The Hacker Quarterly 28 : 15 – 16 .
  • area_51 . 2002 . “CBDTPA: Another Privacy Concern.” 2600: The Hacker Quarterly 19 : 54 – 55 .
  • Barbrook , Richard and Andy Cameron . 2001 . “California Ideology.” Pp. 363 – 388 in Crypto Anarchy, Cyberstates, and Pirate Utopias , edited by P. Ludlow . Cambridge , MA : MIT Press .
  • Bowne , Sam. 2011 . “Wear a White Hat.” 2600: The Hacker Quarterly 28 : 55 .
  • Brown , James. 2008. “From Friday to Sunday: The Hacker Ethic and Shifting Notions of Labour, Leisure, and Intellectual Property.” Leisure Studies 27:395–409.
  • BY3M@N . 2010 . “Phun with FOIA.” 2600: The Hacker Quarterly 27 : 54 .
  • cbsm2009 . 2009, Summer . “Why the ‘No-Fly List’ is a Fraud.” 2600: The Hacker Quarterly 26 : 12 .
  • Charmaz , Kathy. 2002 . “Qualitative Interviewing and Grounded Theory Analysis.” Pp. 675 – 694 in Handbook of Interview Research: Context & Method , edited by Jaber F. Gubrium and James A. Holstein . Thousand Oaks , CA : Sage .
  • ——— . 2006 . Constructing Grounded Theory: A Practical Guide Through Qualitative Analysis . Thousand Oaks , CA : Sage Publications .
  • Cole , David and Jules Lobel . 2007 . Less Safe, Less Free: Why America is Losing the War on Terror . New York : The New Press .
  • Coleman , Gabriella. 2010 . “The Hacker Conference: A Ritual Condensation and Celebration of a Lifeworld.” Anthropological Quarterly 83 : 47 – 72 .
  • ——— . 2012 . “Phreakers, Hackers, and Trolls and the Politics of Transgression and Spectacle.” Pp. 99 – 119 in The Social Media Reader , edited by M. Mandiberg . New York : NYU Press .
  • Coleman , Gabriella and Alex Golub . 2008 . “Hacker Practice: Moral Genres and the Cultural Articulation of Liberalism.” Anthropological Theory 8 : 255 – 277 .
  • Dafermos , George and Johan Söderberg . 2009 . “The Hacker Movement as a Continuation of Labour Struggle.” Capital & Class 33 : 53 – 73 .
  • Dragorn . 2010 . “Transmissions.” 2600: The Hacker Quarterly 27 : 52 – 53 .
  • Dr. Apocalypse and Matt Fillhart . 2006 . “Information's Imprisonment.” 2600: The Hacker Quarterly 23 : 52 – 53 .
  • Eberhard , Martin. 2008 . “Hacker Perspective.” 2600: The Hacker Quarterly 25 : 26 – 28 .
  • Franks , Bradley. 2003 . “The Nature of Unnaturalness in Religious Representations: Negation and Concept Combination.” Journal of Cognition & Culture 3 : 41 – 68 .
  • Friere , P. 1968/2006 . Pedagogy of the Oppressed . New York : The Continuum International Publishing Group .
  • Furnell , Steven. 2010 . “Hackers, Viruses and Malicious Software.” Pp. 173 – 193 in Handbook of Internet Crime , edited by Y. Jewkes and M. Yar . Portland , OR : Willan Publishing .
  • Goldstein , Emmanuel. 2002 . “Fair Use and Abuse.” 2600: The Hacker Quarterly 19 : 4 – 5 .
  • ——— . 2003a . “Disrespecting the Law.” 2600: The Hacker Quarterly 20 : 4 – 5 .
  • ——— . 2003b . “Paranoia vs. Sanity.” 2600: The Hacker Quarterly 20 : 4 – 5 .
  • ——— . 2004 . “Stick Around.” 2600: The Hacker Quarterly 21 : 4 – 5 .
  • ——— . 2008 . “The Whole World's Watching.” 2600: The Hacker Quarterly 25 : 4 – 5 .
  • Halbert , Debora. 1997 . “Discourses of Danger and the Computer Hacker.” The Information Society 13 : 361 – 374 .
  • Higgins , George. 2010 . Cybercrime: An Introduction to an Emerging Phenomenon . New York : McGraw Hill Higher Education .
  • Hollinger , Richard. 1991 . “Hackers: Computer Heroes or Electronic Highwaymen?” Computers & Society 21 : 6 – 17 .
  • Holt , Tom. 2009 . “Examining the Role of Technology in the Formation of Deviant Subcultures.” Social Science Computer Review 28 : 466 – 481 .
  • Hurd , Piyter. 2012 . “Insurgent Technology: In WikiLeaks' Wake.” 2600: The Hacker Quarterly 29 : 58 – 59 .
  • Jordan , Tim and Paul Taylor . 1998 . “A Sociology of Hackers.” The Sociological Review 46 : 757 – 780 .
  • Lackoff , George and Mark Johnson . 1980 . Metaphors We Live By . Chicago , IL : University of Chicago Press .
  • Leigh , David. and Luke Harding . 2011 . WikiLeaks: Inside Julian Assange's War on Secrecy . New York : Public Affairs .
  • Leviathan . 2011 . “Kill Switch.” 2600: The Hacker Quarterly 28 : 57 – 60 .
  • Levy , Stephen. 1984 . Hackers: Heroes of the Computer Revolution . New York : Penguin Group Inc .
  • McKenzie , Jon. 1999 . “!nt3rh4ckt!v!ty.” Style 33 : 283 – 299 .
  • Meikle , Graham. 2002 . Future Active: Media Activism and the Internet . New York : Routledge .
  • Mitnick , Kevin and William Simon . 2002 . The Art of Deception: Controlling the Human Element of Security . Hoboken , NJ : Wiley .
  • ——— . 2011 . Ghost in the Wires: My Adventures as the World's Most Wanted Hacker . New York : Little, Brown and Company .
  • Nichols , Randall , Daniel Ryan , and Julie Ryan . 2000 . Defending your Digital Assets Against Hackers, Crackers, Spies, and Thieves . New York : McGraw-Hill .
  • Nissenbaum , Helen. 2004 . “Hackers and the Contested Ontology of Cyberspace.” New Media & Society 6 : 195 – 217 .
  • Olson , Parmy. 2012 . We are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency . New York : Little, Brown and Company .
  • OSIN. 2007. “Power Trip.” 2600: The Hacker Quarterly 24:6–8.
  • Pat , D. 2011 . “Anonymity and the Internet in Canada.” 2600: The Hacker Quarterly 28 : 54 .
  • Phocks . 2003 . “A Glimpse at the Future of Computing.” 2600: The Hacker Quarterly 20 : 54 – 55 .
  • The Prophet . 2002 . “A New Era of Telecommunications Surveillance.” 2600: The Hacker Quarterly 19 : 23 – 25 .
  • ——— . 2010 . “Telecom Informer.” 2600: The Hacker Quarterly 27 : 13 – 14 .
  • Samson , Alain. 2004 . “Contradictions in Counter-Intuitive Beliefs and Naïve Dialecticism.” Journal of Cognition & Culture 4 : 373 – 390 .
  • Skibell , Reid. 2002 . “The Myth of the Computer Hacker.” Information, Communication & Society 5 : 336 – 356 .
  • Squealing Sheep . 2006 . “The Price of Convenience: Our Identities.” 2600: The Hacker Quarterly 23 : 29 – 30 .
  • Squire , Bill. 2007 . “Hacker Perspective.” 2600: The Hacker Quarterly 24 : 26 – 29 .
  • Stallman , Richard. 2002 . Free Software Free Society: Selected Essays of Richard M. Stallman . Boston , MA : Free Software Foundation, Inc .
  • Steinmetz , Kevin. 2012 . “WikiLeaks and Realpolitik.” Journal of Theoretical and Philosophical Criminology 4 : 14 – 52 .
  • Strauss , Anselm and Juliet Corbin . 1998 . Basics of Qualitative Research: Grounded Theory Procedures and Techniques. , 2nd ed. Thousand Oaks , CA : Sage Publications, Inc .
  • Tant , Ed. 2004 , June . “An Ocean of Resistance: An Interview with Howard Zinn.” Zmagazine . Retrieved August 17, 2012 from (http://www.zcommunications.org/an-ocean-of-resistance-by-ed-tant#) .
  • Taylor , Paul. 2005 . “From Hackers to Hacktivists: Speed Bumps on the Global Superhighway?” New Media & Society 7 : 625 – 646 .
  • Thomas , Jim. 2005 . “The Moral Ambiguity of Social Control in Cyberspace: A Retro-Assessment of the ‘Golden Age’ of Hacking.” New Media & Society 7 : 599 – 624 .
  • Thompson , Samuel. 2006 . “Helping the Hacker? Library Information, Security, and Social Engineering.” Information Technology and Libraries 25 : 22 2– 225 .
  • Tokachu . 2006 . “The Not-So-Great Firewall of China.” 2600: The Hacker Quarterly 23 : 58 – 60 .
  • Toni-Sama . 2007 . “VoIP Cellphones: The Call of the Future.” 2600: The Hacker Quarterly 24 : 48 – 49 .
  • Turgeman-Goldschmidt , Orly. 2005 . “Hackers' Accounts: Hacking as a Social Entertainment.” Social Science Computer Review 23 : 8 – 23 .
  • ——— . 2011 . “Identity Construction Among Hackers.” Pp. 31 – 51 in Cyber Criminology: Exploring Internet Crimes and Criminal Behavior , edited by K. Jaishankar . Boca Raton , FL : CRC Press .
  • Van Laer , Jeroen and Van Aelst Peter . 2010 . “Cyber-Protest and Civil Society: The Internet and Action Repertoires in Social Movements.” Pp. 230 – 254 in Handbook of Internet Crime , edited by Y. Jewkes and M. Yar . Portland , OR : Willan Publishing, Inc .
  • Vold , George , Thomas Bernard , and Jeffrey Snipes . 2002 . Theoretical Criminology. , 5th ed. New York : Oxford University Press .
  • Warnick , Bryan. 2004 . “Technological Metaphors and Moral Education: The Hacker Ethic and the Computational Experience.” Studies in Philosophy and Education 23 : 265 – 281 .
  • WillPC . 2007 . “Darknets.” 2600: The Hacker Quarterly 24 : 15 .
  • Woo , Hyung-jin , Yeora Kim , and Joseph Dominick . 2004 . “Hackers: Militants or Merry Pranksters? A Content Analysis of Defaced Web Pages.” Media Psychology 6 : 63 – 82 .
  • Xen . 2006 , Spring . “United Kingdom: The State of Surveillance.” 2600: The Hacker Quarterly 23 : 11 – 13 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.