The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies. In our increasingly digital and connected world where hackers play a significant role in determining the structures, configurations and operations of the networked information society, this book delivers an interdisciplinary study of the practices, norms and values of hackers and how they conflict and correspond with the aims and aspirations of hacking-related laws. Describing and analyzing the legal and normative impact of hacking, as well as proposing new approaches to its regulation and governance, this book makes an essential contribution to understanding the socio-technical changes, and consequent legal challenges, faced by our contemporary connected society.
Socio-legal studies have had an ambivalent relationship with the 'legal' – one of its defining aspects, but at the same time one that the discipline has sought to transcend or even leave behind. While socio-legal studies benefit hugely from the insights, methods and theories of other social science and humanity disciplines, the contributions to Exploring the 'Legal' in Socio-Legal Studies illustrate the value of a focus on the 'legal'. The chapters in this book combine traditional legal materials and analyses with other ways of engaging empirically with the 'legal'. They illustrate the rich potential of the 'legal' as a site both for theoretical and methodological reflection and for case study analysis. Taken as a whole, this volume demonstrates that methodological discussion is most helpful when rooted in empirical cases, and that the best case studies also help us to develop our methodologies. Bringing methodology and empirical analysis together offers an opportunity to reflect on socio-legal studies and develop the discipline in productive new directions.
Do digital networks make a difference to the scope, scale and severity of social harm? Considering four distinct digital affordances for crime (access, concealment, evasion and incitement) this book asks whether they are simply new packaging for old problems, with no greater effect on society overall – or is cyberculture significantly escalating illegality? Matthew David gives fresh insights into online harms and behaviours in the fields of hate, obscenity, corruptions of citizenship and appropriation, offering a comprehensive and integrated approach for those both new and experienced in the field of cybercrime.
An important collection examining how socio-legal studies and empirical legal research can be integrated into the law curriculum, looking at both core qualifying subjects and stand-alone socio-legal modules, and considering theoretical and methodological approaches combined with practical examples.
This book is the first to explore what design can do for sociolegal research. It argues that designerly ways—mindsets that are practical, critical and imaginative, experimental processes and visible and tangible communication strategies—can be combined to generate potentially enabling ecosystems, and that within these ecosystems the abilities of a researcher to make meaningful contributions and to engage in meaningful research relations, both within our research community and in the wider world, can be enhanced. It is grounded in richly illustrated examples of sociolegal researchers working in design mode, including original individual and collaborative experiments involving a total of over 200 researchers and of experts from subfields such as social design, policy design and speculative design working on issues of sociolegal concern. It closes with an opening— a set of accessible sociolegal design briefs on which the impatient can make an immediate start. Written by an experienced sociolegal researcher with formal training in graphic design, the book is primarily focused on what the sociolegal research community can take from design, but it also offers lessons to designers, especially those who work with law.
This book addresses the use of biometrics – including fingerprint identification, DNA identification and facial recognition – in the criminal justice system: balancing the need to ensure society is protected from harms, such as crime and terrorism, while also preserving individual rights. It offers a comprehensive discussion of biometric identification that includes a consideration of: basic scientific principles, their historical development, the perspectives of political philosophy, critical security and surveillance studies; but especially the relevant law, policy and regulatory issues. Developments in key jurisdictions where the technology has been implemented, including the United Kingdom, United States, Europe and Australia, are examined. This includes case studies relating to the implementation of new technology, policy, legislation, court judgements, and where available, empirical evaluations of the use of biometrics in criminal justice systems. Examples from non-western areas of the world are also considered. Accessibly written, this book will be of interest to undergraduate, postgraduate and research students, academic researchers, as well as professionals in government, security, legal and private sectors.
How will governments and courts protect civil liberties in this new era of hacktivism? Ethical Hacking discusses the attendant moral and legal issues. The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments and the line of transparency moved by force. One need only read the motto “we open governments” on the Twitter page for Wikileaks to gain a sense of the sea change that has occurred. Ethical hacking is the non-violent use of a technology in pursuit of a cause—political or otherwise—which is often legally and morally ambiguous. Hacktivists believe in two general but spirited principles: respect for human rights and fundamental freedoms, including freedom of expression and personal privacy; and the responsibility of government to be open, transparent and fully accountable to the public. How courts and governments will deal with hacking attempts which operate in a grey zone of the law and where different ethical views collide remains to be seen. What is undisputed is that Ethical Hacking presents a fundamental discussion of key societal questions. A fundamental discussion of key societal questions. This book is published in English. - La première moitié du XXIe siècle sera sans doute reconnue comme l’époque où le piratage éthique a ouvert de force les gouvernements, déplaçant les limites de la transparence. La page twitter de Wikileaks enchâsse cet ethos à même sa devise, « we open governments », et sa volonté d’être omniprésent. En parallèle, les grandes sociétés de technologie comme Apple se font compétition pour produire des produits de plus en plus sécuritaires et à protéger les données de leurs clients, alors même que les gouvernements tentent de limiter et de décrypter ces nouvelles technologies d’encryption. Entre-temps, le marché des vulnérabilités en matière de sécurité augmente à mesure que les experts en sécurité informatique vendent des vulnérabilités de logiciels des grandes technologies, dont Apple et Google, contre des sommes allant de 10 000 à 1,5 million de dollars. L’activisme en sécurité est à la hausse. Le piratage éthique est l’utilisation non-violence d’une technologie quelconque en soutien d’une cause politique ou autre qui est souvent ambigue d’un point de vue juridique et moral. Le hacking éthique peut désigner les actes de vérification de pénétration professionnelle ou d’experts en sécurité informatique, de même que d’autres formes d’actions émergentes, comme l’hacktivisme et la désobéissance civile en ligne. L’hacktivisme est une forme de piratage éthique, mais également une forme de militantisme des droits civils à l’ère numérique. En principe, les adeptes du hacktivisme croient en deux grands principes : le respect des droits de la personne et les libertés fondamentales, y compris la liberté d’expression et à la vie privée, et la responsabilité des gouvernements d’être ouverts, transparents et pleinement redevables au public. En pratique, toutefois, les antécédents comme les agendas des hacktivistes sont fort diversifiés. Il n’est pas clair de quelle façon les tribunaux et les gouvernements traiteront des tentatives de piratage eu égard aux zones grises juridiques, aux approches éthiques conflictuelles, et compte tenu du fait qu’il n’existe actuellement, dans le monde, presque aucune exception aux provisions, en matière de cybercrime et de crime informatique, liées à la recherche sur la sécurité ou l’intérêt public. Il sera également difficile de déterminer le lien entre hacktivisme et droits civils. Ce livre est publié en anglais.
Inside the life of a hacker and cybercrime culture. Public discourse, from pop culture to political rhetoric, portrays hackers as deceptive, digital villains. But what do we actually know about them? In Hacked, Kevin F. Steinmetz explores what it means to be a hacker and the nuances of hacker culture. Through extensive interviews with hackers, observations of hacker communities, and analyses of hacker cultural products, Steinmetz demystifies the figure of the hacker and situates the practice of hacking within the larger political and economic structures of capitalism, crime, and control.This captivating book challenges many of the common narratives of hackers, suggesting that not all forms of hacking are criminal and, contrary to popular opinion, the broader hacker community actually plays a vital role in our information economy. Hacked thus explores how governments, corporations, and other institutions attempt to manage hacker culture through the creation of ideologies and laws that protect powerful economic interests. Not content to simply critique the situation, Steinmetz ends his work by providing actionable policy recommendations that aim to redirect the focus from the individual to corporations, governments, and broader social issues. A compelling study, Hacked helps us understand not just the figure of the hacker, but also digital crime and social control in our high-tech society.
How hackers and hacking moved from being a target of the state to a key resource for the expression and deployment of state power. In this book, Luca Follis and Adam Fish examine the entanglements between hackers and the state, showing how hackers and hacking moved from being a target of state law enforcement to a key resource for the expression and deployment of state power. Follis and Fish trace government efforts to control the power of the internet; the prosecution of hackers and leakers (including such well-known cases as Chelsea Manning, Edward Snowden, and Anonymous); and the eventual rehabilitation of hackers who undertake “ethical hacking” for the state. Analyzing the evolution of the state's relationship to hacking, they argue that state-sponsored hacking ultimately corrodes the rule of law and offers unchecked advantage to those in power, clearing the way for more authoritarian rule. Follis and Fish draw on a range of methodologies and disciplines, including ethnographic and digital archive methods from fields as diverse as anthropology, STS, and criminology. They propose a novel “boundary work” theoretical framework to articulate the relational approach to understanding state and hacker interactions advanced by the book. In the context of Russian bot armies, the rise of fake news, and algorithmic opacity, they describe the political impact of leaks and hacks, hacker partnerships with journalists in pursuit of transparency and accountability, the increasingly prominent use of extradition in hacking-related cases, and the privatization of hackers for hire.