References
- Acohido, B. (2016, August 9). Despite changing landscape, VC investment in cybersecurity still strong Thirdcertainty.com. Retrieved, from http://thirdcertainty.com/featured-story/despite-changing-landscape-vc-investment-in-cybersecurity-still-strong/#
- Andersson Schwarz, J., & Burkart, P. (2015). Piracy and social change. Popular Communication: The International Journal of Media and Culture, 13(1), 1–5. doi:10.1080/15405702.2015.990329
- Auchard, E., & Menn, J. (2015, July 6). Surveillance software maker Hacking Team gets taste of its own medicine. Reuters. Retrieved from http://www.reuters.com/article/us-cybersecurity-hacking-team-idUSKCN0PG16720150706
- Bates, J. (2014). The strategic importance of information policy for the contemporary neoliberal state: The case of Open Government Data in the United Kingdom. Government Information Quarterly, 31, 388–395. doi:10.1016/j.giq.2014.02.009
- Batey, A. (2011, November 20). The spies behind your screen. The Sunday Telegraph, Section 7, pp. 15–17.
- Batey, A. (2015, September 8). Stolen emails provide cyberwarfare lessons. Aviation Week and Space Technology. Retrieved from http://aviationweek.com/defense/stolen-emails-provide-cyberwarfare-lesson
- Bauman, Z., & Lyon, D. (2012). Liquid surveillance: A conversation. New York, NY: Polity Press.
- Bennett, C. (2015, July 21). Cyber industry assails anti-hacking regulations. The Hill, p. 13.
- Brewster, T. (2013, February 28). RSA 2013: Hacking Team defends its surveillance software. Techweek. Retrieved from http://www.techweekeurope.com.uk/workspace/rsa-2013-hacking-team-surveillance-uae-morocco-tor-project-109101
- Burkart, P., & McCourt, T. (2006). Digital music wars: Ownership and control of the Celestial Jukebox. Lanham, MD: Rowman & Littlefield.
- Burkart, P., & Schwarz, J. A. (2013). Post-privacy and ideology: A question of doxa and praxis. In M. Christensen & A. Jansson (Eds.), Media, surveillance and identity: A social perspective (pp. 218–238). New York, NY: Peter Lang.
- Burns, C. (1998, October 19). Locking down NT networks; Third-party developers have rushed in to plug NT security holes. Network World, p. 30.
- Chandrasekaran, R. (1998, March 17). The guardians of computer security. Washington Post, p. F12.
- Citizenlab. (2015, March 30). FinFisher lawsuit to be heard in Pakistan’s Lahore High Court. Retrieved from https://citizenlab.org/2015/03/finfisher-lawsuit-to-be-heard-in-pakistans-lahore-high-court/#comment-273976
- Coleman, G. (2013). Coding for freedom: The ethics and aesthetics of hacking. Princeton, NJ: Princeton University Press.
- Council of Europe. (2001, November. 23). Convention on cybercrime. European Treaty Series No. 185. Retrieved from http://www.coe.int/en/web/conventions/full-list/-/conventions/rms/0900001680081561
- Currier, C., & Marquis-Boire, M. (2014, October 30). Secret manuals show the spyware sold to despots and cops worldwide. Theintercept.com. Retrieved from https://theintercept.com/2014/10/30/hacking-team/
- Cyber security markets. (2015). Marketsandmarkets.com. http://www.marketsandmarkets.com/PressReleases/cyber-security.asp
- DiDio, L. (1998, March 30). Major hacks raise hackles, spur defenders. Computerworld, p. 49.
- Fidler, D. (2013, March 20). Insights 17(20) [ American Society of International Law]. Retrieved from https://www.asil.org/sites/default/files/insight130320.pdf
- Fox-Brewster, T. (2015, July 9). WikiLeaks release: Hacking Team says it sold spyware to FSB, Russia’s secret police. Forbes.com. Retrieved from http://www.forbes.com/sites/thomasbrewster/2015/07/09/WikiLeaks-hacking-team-fsb-sales/#2b81f8a75557
- Fox-Brewster, T. (2016, April 16). Hacking Team in trouble again—Loses license to sell malware outside Europe. Forbes.com. Retrieved from http://www.forbes.com/forbes/welcome/?toURL=http://www.forbes.com/sites/thomasbrewster/2016/04/06/hacking-team-loses-sales-license/
- Gallagher, R. (2011, November 1). Governments turn to hacking techniques for surveillance of citizens. Guardian.com. Retrieved from https://www.theguardian.com/technology/2011/nov/01/governments-hacking-techniques-surveillance
- Gandy, O. H., Jr. (1993). The panoptic sort: A political economy of personal information. Boulder, CO: Westview Press.
- Gibbs, S. (2015, July 21). Hacking team: Police investigate employees over inside job claims. The Guardian. Retrieved from https://www.theguardian.com/technology/2015/jul/20/hacking-team-police-investigate-employees-inside-job-claims
- Gilbert, D. (2013, March 13). Hacking Team and the murky world of state-sponsored spying. International Business Times. Retrieved from http://www.ibtimes.co.uk/hacking-team-murky-world-state-sponsored-spying-445507
- Goodin, D. (2015, July 6). Massive leak reveals Hacking Team’s most private moments in messy detail. Arstechnica. Retrieved from http://arstechnica.com/security/2015/07/massive-leak-reveals-hacking-teams-most-private-moments-in-messy-detail/
- Goyett, J. (2015, July 8). For this group of Ethiopian journalists, the Hacking Team revelations are personal. PRI.org. Retrieved from http://www.pri.org/stories/2015-07-08/these-ethiopian-journalists-exile-hacking-team-revelations-are-personal
- Greene, T. (2015, December 2). Biggest data breaches of 2015. Network World. Retrieved from http://www.networkworld.com/article/3011103/security/biggest-data-breaches-of-2015.html
- Greenwald, G. (2014). No place to hide: Edward Snowden, the NSA, and the US surveillance state. New York, NY: Picador.
- Greenwald, G. (2016, November 4). Three new scandals show how pervasive and dangerous mass surveillance is in the West, vindicating Snowden. Theintercept.com. Retrieved from https://theintercept.com/2016/11/04/three-new-scandals-show-how-pervasive-and-dangerous-mass-surveillance-is-in-the-west-vindicating-snowden/
- Halbert, D. (2016). Intellectual property theft and national security: Agendas and assumptions. The Information Society, 32(4), 256–268. doi:10.1080/01972243.2016.1177762
- Hern, A. (2015a, July 7). Hacking Team hacked: Firm sold spying tools to repressive regimes, documents claim. The Guardian. Retrieved from https://www.theguardian.com/technology/2015/jul/06/hacking-team-hacked-firm-sold-spying-tools-to-repressive-regimes-documents-claim
- Hern, A. (2015b, July 11). Hacking Team hack casts spotlight on murky world of state surveillance. The Guardian. Retrieved from https://www.theguardian.com/technology/2015/jul/11/hacking-team-hack-state-surveillance-human-rights
- Jordan, T., & Taylor, P. A. (2004). Hacktivism and cyberwars: Rebels with a cause? New York, NY: Psychology Press.
- Kushner, D. (2016, May/June). Fear this man: David Vincenzetti built a spyware empire. Is the Italian mogul a code breaker or an arms dealer? Foreign Policy, 218, 28–37.
- Landau, S. (2013). Surveillance or security: The risks posed by new wiretapping technologies. Cambridge, MA: The MIT Press.
- Lapsley, P. (2013). Exploding the phone. New York, NY: Grove Press.
- Lee, K. B., & Lim, J. I. (2016). The reality and response of cyber threats to critical infrastructure: A case study of the cyber-terror attack on the Korea Hydro & Nuclear Power Co., Ltd. KSII Transactions on Internet and Information Systems, 10(2), 857–880.
- Lemos, R. (2015a, July 20). Leak shows that Hacking Team targeted cryptocurrency. Eweek.com. Retrieved from http://www.eweek.com/security/leak-shows-that-hacking-team-targeted-cryptocurrency.html
- Lemos, R. (2015b, August 1). Hacking Team leak could lead to policies curtailing security research. Eweek.com. Retrieved from http://www.eweek.com/security/hacking-team-leak-could-lead-to-policies-curtailing-security-research.html
- Levy, S. (1984). Hackers: Heroes of the computer revolution. New York, NY: Doubleday.
- Marczak, B., & Scott-Railton, J. (2016). The million dollar dissident: NSO group’s iPhone zero-days used against a UAE human rights defender. Retrieved from https://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/
- MarketsandMarkets. (n.d.). Cyber security market worth 202.36 billion USD by 2021. Retrieved from http://www.marketsandmarkets.com/PressReleases/cyber-security.asp
- Markoff, J. (2005). What the dormouse said: How the sixties counterculture shaped the personal computer. New York, NY: Viking.
- Marx, G. T. (2015). Surveillance studies. In International Encyclopedia of the Social & Behavioral Sciences. (2nd Ed. 23, pp. 733–741). Amsterdam, the Netherlands: Elsevier.
- McIntosh, N. (2000, March 9). Could you pass the tiger test? Their mission is all too possible: To rip your security system to shreds. The Guardian, p. 12.
- Mergent. (2016, April). North America IT & technology sectors. White paper. Fort Mill, SC: Author.
- Morgan, S. (2016, March 9). Worldwide cybersecurity spending increasing to $170 billion by 2020. Forbes. Retrieved from http://www.forbes.com/sites/stevemorgan/2016/03/09/worldwide-cybersecurity-spending-increasing-to-170-billion-by-2020/amp
- Moroney, M. (2014, December 18). Computer security industry adds state agencies to global malware blacklist. The Irish Times, p. 6.
- Mosco, V. (1989). The Pay-Per Society: Computers and communication in the information age. Toronto, ON: Ablex.
- Mosco, V. (1996). The political economy of communication: Rethinking and renewal. New York, NY: Sage.
- Mosco, V. (2015). To the cloud: Big data in a turbulent world. New York, NY: Routledge.
- Murphy, P. D. (2015). Voice, visibility, and recognition: Vertical and horizontal trajectories of human rights and social justice media. Popular Communication: The International Journal of Media and Culture, 13(2), 101–104. doi:10.1080/15405702.2015.1021471
- Nakashima, E., & Soltani, A. (2014, October 8). The ethics of Hacking 101. The Washington Post, p. A2.
- National Association of Insurance Commissioners [NAIC]. (2016, June 30). Early NAIC analysis sheds light on cybersecurity insurance data. Retrieved from http://www.naic.org/Releases/2016_docs/cybersecurity_insurance_data_analysis.htm
- Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79(1), 119–158.
- Noglobalwarrants.org. (n.d.). Stop the changes to rule 41. Retrieved from https://noglobalwarrants.org/
- Paletta, D., Yadron, D., & Valentino-Devries, J. (2015, October 12). Cyberwar ignites new arms race—Countries amass digital weapons, reconfigure militaries to meet threat. The Wall Street Journal, A1.
- Perlroth, N. (2016a, May 30). Intimidating dissidents with spyware. New York Times, p. B1.
- Perlroth, N. (2016b, June 13). To head off digital attacks, a security start-up is spying on hackers. New York Times, p. B5.
- Perlroth, N. (2016c, September 3). Phone spying is made easy. Choose a plan. New York Times, p. A1.
- Plus Media Solutions. (2014, June 24). Eyes on you: Experts reveal police hacking methods. Salon. http://www.salon.com/2014/06/24/eyes_on_you_experts_reveal_police_hacking_methods/
- Risen, J. (2000, June 8). Ex-Soviet spy takes on internet mission in U.S., using old skills. The New York Times, p. 14.
- Risen, J. (2015, November 1). A Syrian case reflects a battle on tech exports. New York Times, p. 1.
- Sankin, A. (2015, July 9). Forget Hacking Team—Many other companies sell surveillance tech to repressive regimes. Dailydot. Retrieved from http://www.dailydot.com/layer8/hacking-team-competitors/
- Schiller, D. (2014). Digital depression: Information technology and economic crisis. Champaign, IL: University of Illinois Press.
- Silver, V. (2012, October 18). When cyber tools become weapons. The Ottawa Citizen, p. B12.
- Smith, M. (2015,July 12). Leaked emails show Florida police interested in buying Hacking Team surveillance tech. Network World. Retrieved from http://www.networkworld.com/article/2947392/microsoft-subnet/leaked-emails-show-florida-police-interested-in-buying-hacking-team-surveillance-tech.html
- Sterling, B. (1992). The hacker crackdown: Law and disorder on the electronic frontier. Self-published noncommercial reprint. Retrieved from http://www.mit.edu/hacker/hacker.html
- Timberg, C. (2014, February 13). Spyware lets regimes target U.S.-based journalists. Washington Post, p. A1.
- Tsyrklevich, V. (2015, July 22). Hacking Team: A zero-day market case study. Retrieved from https://tsyrklevich.net/2015/07/22/hacking-team-0day-market/
- Tuma, S. E. (2011, September 1). “What does CFAA mean and why should I care?”—A primer on the Computer Fraud and Abuse Act for Civil Litigators. South Carolina Law Review, 63(1), 141–189.
- Turner, F. (2006). From counterculture to cyberculture: Stewart Brand, the Whole Earth Network, and the rise of digital utopianism. Chicago, IL: University of Chicago Press.
- Turow, J. (2012). The daily you: How the new advertising industry is defining your identity and your worth. New Haven, CT: Yale University Press.
- Uchill, J. (2015, September 29). European Parliament member presses to change spyware export rules. The Christian Science Monitor. Retreived from http://www.csmonitor.com/World/Passcode/2015/0929/European-Parliament-member-presses-to-change-spyware-export-rules
- WikiLeaks. (2015, July 8). 0-days. Retrieved from WikiLeaks.org/hackingteam/emails/emailid/335050
- Williams, C. (2011, November 24). Apple iTunes flaw “allowed government spying for 3 years.” Daily Telegraph. Retrieved from http://www.telegraph.co.uk/technology/apple/8912714/Apple-iTunes-flaw-allowed-government-spying-for-3-years.html
- Williams, D. (2016, September 30). Cyber defence collaboration to be the space race of our generation. ITWire. Retrieved from http://www.itwire.com/enterprise-solutions/75026-cyber-defence-collaboration-to-be-the-space-race-of-our-generation.html
- Wingfield, N. (2002, March 11). It takes a hacker. The Wall Street Journal. Retrieved from http://www.wsj.com/articles/SB1015790823535042600
- Worrall, J. J. (2013, May 9). Surveillance software puts European companies in eye of spyware storm. Irish Times, p. 6.