Advertisement

Hacking and Digital Dissidence Activities

  • Giovanni Ziccardi
Chapter
Part of the Law, Governance and Technology Series book series (LGTS, volume 7)

Abstract

This Chapter deals with hacking activities under several points of view. The first part is dedicated to describe the history of the hacker, then the analysis try to understand hackers’ role in modern technological society, their activities, and their relationship with the world of digital dissidence. The themes that are outlined are the relationship between hacking and cybercrime, the Do-It-Yourself approach, and the evolution of the hacker ethic. The last portion of the Chapter describes the threats to several hackers (especially cease-and-desist letters) during their research activities for the circumventing of security systems. Attention is also dedicated to the action of hacking the electronic electoral system, and to the security issues related to electronic voting machines in the world.

Keywords

Legal Action Free Speech Digital World Audio Watermark Security Flaw 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Barlow, John Perry. 2000. Censorship 2000. http://www.isoc.org/oti/articles/1000/barlow.html. Accessed 14 November 2011.
  2. Castells, Manuel, Mireia Fernández-Ardèvol, Jack Qiu Linchuan, and Araba Sey. 2007. Mobile communication and society. Cambridge/London: MIT Press.Google Scholar
  3. Craver, Scott A., Min Wu, Bede Liu, Adam Stubblefield, Ben Swartzlander, Dan S. Wallach, Drew Dean, and Edward F. Felten. 2001. Reading between the lines: Lessons from the SDMI challenge. http://www.usenix.org/events/sec01/craver.pdf. Accessed 23 Oct 2011.
  4. Crosby, Scott, Ian Goldberg, Robert Johnson, Dawn Song, and David Wagner. 2001. A cryptanalysis of the high-bandwidth digital content protection system. http://www.cypherpunks.ca/∼iang/pubs/hdcp-drm01.pdf. Accessed 23 Oct 2011.
  5. Dahlberg, Leif. 2011. Pirates, partisans, and politico-juridical space. Law and Literature 23(2): 262–281.CrossRefGoogle Scholar
  6. Doctorow, C. 2012. Internet freedom activists arrested/detained after Internet freedom conferences. http://boingboing.net/2012/06/09/internet-freedom-activists-arr.html. Accessed 10 June 2012.
  7. EFF Report. 2010. Unintended consequences: Twelve years under the DMCA. https://www.eff.org/wp/unintended-consequences-under-dmca. Accessed 23 Oct 2011.
  8. Eschenfelder, Kristin R., Anuj C. Desai, Ian Alderman, S.Joanna Sin, and Shen Yi. 2005. The limits of DeCSS posting: A comparison of internet posting of DVD circumvention devices in the European Union and China. Journal of Information Science 31(4): 317–331.CrossRefGoogle Scholar
  9. Eunjung Cha, Ariana. 2001. To attacks’ toll add a programmer’s grief. http://www.washingtonpost.com/ac2/wp-dyn/A1234-2001Sep20. Accessed 23 Oct 2011.
  10. Feldman, Ariel J., J. Alex Halderman, and Edward W. Felten. 2007. Security analysis of the Diebold AccuVote-TS voting machine. https://jhalderm.com/pub/papers/ts-evt07-init.pdf. Accessed 4 Nov 2011.
  11. Ferguson, Niels. 2001. Censorship in action: Why I don’t publish my HDCP results. http://catless.ncl.ac.uk/Risks/21.61.html
  12. Godwin, Mike. 1998. Cyber rights: Defending free speech in the digital world.Google Scholar
  13. Halderman, Alex J. 2003. Analysis of the MediaMax CD3 copy-prevention system. https://jhalderm.com/pub/cd3/. Accessed 23 Oct 2011.
  14. Halderman, Alex J., and Felten, Edward W. 2006. Lessons from the Sony CD DRM episode. https://jhalderm.com/pub/papers/rootkit-sec06.pdf. Accessed 23 Oct 2011.
  15. Huang, Andrew “bunnie”. 2002. Keeping secrets in hardware: The Microsoft XBoxTM case study. http://web.mit.edu/bunnie/www/proj/anatak/AIM-2002-008.pdf. Accessed 23 Oct 2011.
  16. Juris, Jeffrey S. 2005. The new digital media and activist networking within anti-corporate globalization movements. The Annals of the American Academy of Political and Social Science 597: 189–208.CrossRefGoogle Scholar
  17. Kohno, Tadayoshi, Adam Stubblefield, Aviel D. Rubin, and Dan S. Wallach. 2004. Analysis of an electronic voting system. http://avirubin.com/vote.pdf. Accessed 7 Nov 2011.
  18. Ku, Vicky. 2005. A critique of the digital millenium Copyright Act’s exemption on encryption research: Is the exemption too narrow? http://www.yjolt.org/files/ku-7-YJOLT-465.pdf. Accessed 16 Oct 2011.
  19. Leitsinger, M. 2012. App records, reports controversial police ‘stop and frisk’ practice. http://usnews.msnbc.msn.com/_news/2012/06/08/12124572-app-records-reports-controversial-police-stop-and-frisk-practice. Accessed 11 June 2012.
  20. Lessig, Lawrence. 2009. Remix: Making art and commerce thrive in the hybrid economy. New York: Penguin Press.Google Scholar
  21. Lieberman, D. 2012. NYCLU releases “Stop and Frisk Watch” phone app to fight back against NYPD stops. http://www.nyclu.org/news/nyclu-releases-stop-and-frisk-watch-phone-app-fight-back-against-nypd-stops. Accessed 11 June 2012.
  22. McLure, Helen. 2000. The wild, wild web: The mythic American West and the electronic frontier. The Western Historical Quarterly 31(4): 457–476.CrossRefGoogle Scholar
  23. Miard, Fabien. 2009. Mobile phones as a tool for civil resistance. Case studies from Serbia and Belarus. http://www.digiactive.org/wp-content/uploads/research3_miard.pdf. Accessed 22 Oct 2011.
  24. Peckham, Michael. 1998. New dimensions of social movement/countermovement interaction: The case of scientology and its internet critics. The Canadian Journal of Sociology 23(4): 317–347.CrossRefGoogle Scholar
  25. Samuelson, Pamela. 2001. Anticircumvention rules: Threat to science. Science 293(5537): 2028–2031.CrossRefGoogle Scholar
  26. Schneier, Bruce. 2001. A security technologist’s view. Bruce Schneier discusses the Sklyarov case and the DMCA. http://www.cfdr.eu.org/files/schneier_flyer.pdf. Accessed 23 Oct 2011.
  27. Schneier, Bruce. 2008. Schneier on security. Indianapolis: Wiley.Google Scholar
  28. Tolbert, Caroline J., and Ramona S. McNeal. 2003. Unraveling the effects of the internet on political participation? Political Research Quarterly 56(2): 175–185.Google Scholar
  29. Wolchok, Scott, Eric Wustrow, J. Alex Halderman, Hari K. Prasad, Arun Kankipati, Sai Krishna Sakhamuri, Vasavya Yagati, and Rop Gonggrijp. 2010. Security analysis of India’s electronic voting machines. https://jhalderm.com/pub/papers/evm-ccs10.pdf. Accessed 4 Nov 2010.
  30. Wu, Min, Scott A. Craver, Edward W. Felten, and Bede Liu. 2002. Analysis of attacks on SDMI audio watermarks. http://www.ece.umd.edu/∼minwu/public_paper/icassp01_sdmi.pdf. Accessed 23 Oct 2011.
  31. Yen, Alfred C. 2003. What federal gun control can teach us about the DMCA’s anti-trafficking provisions. http://www.chicagoip.com/yenarticle.pdf. Accessed 23 Oct 2011.
  32. Zavestoski, Stephen, Stuart Shulman, and David Schlosberg. 2006. Democracy and the environment on the internet: Electronic citizen participation in regulatory rulemaking. Science, Technology, & Human Values 31(4): 383–408.CrossRefGoogle Scholar
  33. Zimmerman, Matt. 2007. Testifier before the house subcommittee on elections. http://www.gpo.gov/fdsys/pkg/CHRG-110hhrg35805/pdf/CHRG-110hhrg35805.pdf Accessed 5 Nov 2011.
  34. Zimmermann, Philip. 1995. Author’s preface to the book: “PGP Source Code and Internals”. http://www.philzimmermann.com/EN/essays/index.html. Accessed 23 Oct 2011.
  35. Zimmermann, Philip. 2001. No regrets about developing PGP. http://www.philzimmermann.com/EN/essays/index.html. Accessed 23 Oct 2011.

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  1. 1.Department “Cesare Beccaria” Faculty of LawUniversity of MilanMilanoItaly

Personalised recommendations