REFERENCES
- aestetix . 2011 . “Who is Anonymous?” 2600: The Hacker Quarterly 28 : 15 – 16 .
- area_51 . 2002 . “CBDTPA: Another Privacy Concern.” 2600: The Hacker Quarterly 19 : 54 – 55 .
- Barbrook , Richard and Andy Cameron . 2001 . “California Ideology.” Pp. 363 – 388 in Crypto Anarchy, Cyberstates, and Pirate Utopias , edited by P. Ludlow . Cambridge , MA : MIT Press .
- Bowne , Sam. 2011 . “Wear a White Hat.” 2600: The Hacker Quarterly 28 : 55 .
- Brown , James. 2008. “From Friday to Sunday: The Hacker Ethic and Shifting Notions of Labour, Leisure, and Intellectual Property.” Leisure Studies 27:395–409.
- BY3M@N . 2010 . “Phun with FOIA.” 2600: The Hacker Quarterly 27 : 54 .
- cbsm2009 . 2009, Summer . “Why the ‘No-Fly List’ is a Fraud.” 2600: The Hacker Quarterly 26 : 12 .
- Charmaz , Kathy. 2002 . “Qualitative Interviewing and Grounded Theory Analysis.” Pp. 675 – 694 in Handbook of Interview Research: Context & Method , edited by Jaber F. Gubrium and James A. Holstein . Thousand Oaks , CA : Sage .
- ——— . 2006 . Constructing Grounded Theory: A Practical Guide Through Qualitative Analysis . Thousand Oaks , CA : Sage Publications .
- Cole , David and Jules Lobel . 2007 . Less Safe, Less Free: Why America is Losing the War on Terror . New York : The New Press .
- Coleman , Gabriella. 2010 . “The Hacker Conference: A Ritual Condensation and Celebration of a Lifeworld.” Anthropological Quarterly 83 : 47 – 72 .
- ——— . 2012 . “Phreakers, Hackers, and Trolls and the Politics of Transgression and Spectacle.” Pp. 99 – 119 in The Social Media Reader , edited by M. Mandiberg . New York : NYU Press .
- Coleman , Gabriella and Alex Golub . 2008 . “Hacker Practice: Moral Genres and the Cultural Articulation of Liberalism.” Anthropological Theory 8 : 255 – 277 .
- Dafermos , George and Johan Söderberg . 2009 . “The Hacker Movement as a Continuation of Labour Struggle.” Capital & Class 33 : 53 – 73 .
- Dragorn . 2010 . “Transmissions.” 2600: The Hacker Quarterly 27 : 52 – 53 .
- Dr. Apocalypse and Matt Fillhart . 2006 . “Information's Imprisonment.” 2600: The Hacker Quarterly 23 : 52 – 53 .
- Eberhard , Martin. 2008 . “Hacker Perspective.” 2600: The Hacker Quarterly 25 : 26 – 28 .
- Franks , Bradley. 2003 . “The Nature of Unnaturalness in Religious Representations: Negation and Concept Combination.” Journal of Cognition & Culture 3 : 41 – 68 .
- Friere , P. 1968/2006 . Pedagogy of the Oppressed . New York : The Continuum International Publishing Group .
- Furnell , Steven. 2010 . “Hackers, Viruses and Malicious Software.” Pp. 173 – 193 in Handbook of Internet Crime , edited by Y. Jewkes and M. Yar . Portland , OR : Willan Publishing .
- Goldstein , Emmanuel. 2002 . “Fair Use and Abuse.” 2600: The Hacker Quarterly 19 : 4 – 5 .
- ——— . 2003a . “Disrespecting the Law.” 2600: The Hacker Quarterly 20 : 4 – 5 .
- ——— . 2003b . “Paranoia vs. Sanity.” 2600: The Hacker Quarterly 20 : 4 – 5 .
- ——— . 2004 . “Stick Around.” 2600: The Hacker Quarterly 21 : 4 – 5 .
- ——— . 2008 . “The Whole World's Watching.” 2600: The Hacker Quarterly 25 : 4 – 5 .
- Halbert , Debora. 1997 . “Discourses of Danger and the Computer Hacker.” The Information Society 13 : 361 – 374 .
- Higgins , George. 2010 . Cybercrime: An Introduction to an Emerging Phenomenon . New York : McGraw Hill Higher Education .
- Hollinger , Richard. 1991 . “Hackers: Computer Heroes or Electronic Highwaymen?” Computers & Society 21 : 6 – 17 .
- Holt , Tom. 2009 . “Examining the Role of Technology in the Formation of Deviant Subcultures.” Social Science Computer Review 28 : 466 – 481 .
- Hurd , Piyter. 2012 . “Insurgent Technology: In WikiLeaks' Wake.” 2600: The Hacker Quarterly 29 : 58 – 59 .
- Jordan , Tim and Paul Taylor . 1998 . “A Sociology of Hackers.” The Sociological Review 46 : 757 – 780 .
- Lackoff , George and Mark Johnson . 1980 . Metaphors We Live By . Chicago , IL : University of Chicago Press .
- Leigh , David. and Luke Harding . 2011 . WikiLeaks: Inside Julian Assange's War on Secrecy . New York : Public Affairs .
- Leviathan . 2011 . “Kill Switch.” 2600: The Hacker Quarterly 28 : 57 – 60 .
- Levy , Stephen. 1984 . Hackers: Heroes of the Computer Revolution . New York : Penguin Group Inc .
- McKenzie , Jon. 1999 . “!nt3rh4ckt!v!ty.” Style 33 : 283 – 299 .
- Meikle , Graham. 2002 . Future Active: Media Activism and the Internet . New York : Routledge .
- Mitnick , Kevin and William Simon . 2002 . The Art of Deception: Controlling the Human Element of Security . Hoboken , NJ : Wiley .
- ——— . 2011 . Ghost in the Wires: My Adventures as the World's Most Wanted Hacker . New York : Little, Brown and Company .
- Nichols , Randall , Daniel Ryan , and Julie Ryan . 2000 . Defending your Digital Assets Against Hackers, Crackers, Spies, and Thieves . New York : McGraw-Hill .
- Nissenbaum , Helen. 2004 . “Hackers and the Contested Ontology of Cyberspace.” New Media & Society 6 : 195 – 217 .
- Olson , Parmy. 2012 . We are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency . New York : Little, Brown and Company .
- OSIN. 2007. “Power Trip.” 2600: The Hacker Quarterly 24:6–8.
- Pat , D. 2011 . “Anonymity and the Internet in Canada.” 2600: The Hacker Quarterly 28 : 54 .
- Phocks . 2003 . “A Glimpse at the Future of Computing.” 2600: The Hacker Quarterly 20 : 54 – 55 .
- The Prophet . 2002 . “A New Era of Telecommunications Surveillance.” 2600: The Hacker Quarterly 19 : 23 – 25 .
- ——— . 2010 . “Telecom Informer.” 2600: The Hacker Quarterly 27 : 13 – 14 .
- Samson , Alain. 2004 . “Contradictions in Counter-Intuitive Beliefs and Naïve Dialecticism.” Journal of Cognition & Culture 4 : 373 – 390 .
- Skibell , Reid. 2002 . “The Myth of the Computer Hacker.” Information, Communication & Society 5 : 336 – 356 .
- Squealing Sheep . 2006 . “The Price of Convenience: Our Identities.” 2600: The Hacker Quarterly 23 : 29 – 30 .
- Squire , Bill. 2007 . “Hacker Perspective.” 2600: The Hacker Quarterly 24 : 26 – 29 .
- Stallman , Richard. 2002 . Free Software Free Society: Selected Essays of Richard M. Stallman . Boston , MA : Free Software Foundation, Inc .
- Steinmetz , Kevin. 2012 . “WikiLeaks and Realpolitik.” Journal of Theoretical and Philosophical Criminology 4 : 14 – 52 .
- Strauss , Anselm and Juliet Corbin . 1998 . Basics of Qualitative Research: Grounded Theory Procedures and Techniques. , 2nd ed. Thousand Oaks , CA : Sage Publications, Inc .
- Tant , Ed. 2004 , June . “An Ocean of Resistance: An Interview with Howard Zinn.” Zmagazine . Retrieved August 17, 2012 from (http://www.zcommunications.org/an-ocean-of-resistance-by-ed-tant#) .
- Taylor , Paul. 2005 . “From Hackers to Hacktivists: Speed Bumps on the Global Superhighway?” New Media & Society 7 : 625 – 646 .
- Thomas , Jim. 2005 . “The Moral Ambiguity of Social Control in Cyberspace: A Retro-Assessment of the ‘Golden Age’ of Hacking.” New Media & Society 7 : 599 – 624 .
- Thompson , Samuel. 2006 . “Helping the Hacker? Library Information, Security, and Social Engineering.” Information Technology and Libraries 25 : 22 2– 225 .
- Tokachu . 2006 . “The Not-So-Great Firewall of China.” 2600: The Hacker Quarterly 23 : 58 – 60 .
- Toni-Sama . 2007 . “VoIP Cellphones: The Call of the Future.” 2600: The Hacker Quarterly 24 : 48 – 49 .
- Turgeman-Goldschmidt , Orly. 2005 . “Hackers' Accounts: Hacking as a Social Entertainment.” Social Science Computer Review 23 : 8 – 23 .
- ——— . 2011 . “Identity Construction Among Hackers.” Pp. 31 – 51 in Cyber Criminology: Exploring Internet Crimes and Criminal Behavior , edited by K. Jaishankar . Boca Raton , FL : CRC Press .
- Van Laer , Jeroen and Van Aelst Peter . 2010 . “Cyber-Protest and Civil Society: The Internet and Action Repertoires in Social Movements.” Pp. 230 – 254 in Handbook of Internet Crime , edited by Y. Jewkes and M. Yar . Portland , OR : Willan Publishing, Inc .
- Vold , George , Thomas Bernard , and Jeffrey Snipes . 2002 . Theoretical Criminology. , 5th ed. New York : Oxford University Press .
- Warnick , Bryan. 2004 . “Technological Metaphors and Moral Education: The Hacker Ethic and the Computational Experience.” Studies in Philosophy and Education 23 : 265 – 281 .
- WillPC . 2007 . “Darknets.” 2600: The Hacker Quarterly 24 : 15 .
- Woo , Hyung-jin , Yeora Kim , and Joseph Dominick . 2004 . “Hackers: Militants or Merry Pranksters? A Content Analysis of Defaced Web Pages.” Media Psychology 6 : 63 – 82 .
- Xen . 2006 , Spring . “United Kingdom: The State of Surveillance.” 2600: The Hacker Quarterly 23 : 11 – 13 .