Home > Research > Publications & Outputs > Hacker States
View graph of relations

Hacker States

Research output: Book/Report/ProceedingsBook

Published

Standard

Hacker States. / Follis, Luca; Fish, Adam Richard.

Cambridge, Mass. : MIT Press, 2020. 264 p. (The Information Society Series).

Research output: Book/Report/ProceedingsBook

Harvard

Follis, L & Fish, AR 2020, Hacker States. The Information Society Series, MIT Press, Cambridge, Mass.

APA

Follis, L., & Fish, A. R. (2020). Hacker States. (The Information Society Series). MIT Press.

Vancouver

Follis L, Fish AR. Hacker States. Cambridge, Mass.: MIT Press, 2020. 264 p. (The Information Society Series).

Author

Follis, Luca ; Fish, Adam Richard. / Hacker States. Cambridge, Mass. : MIT Press, 2020. 264 p. (The Information Society Series).

Bibtex

@book{a621cf83256345bfbf4bac7fcfaea21f,
title = "Hacker States",
abstract = "SummaryHow hackers and hacking moved from being a target of the state to a key resource for the expression and deployment of state power.In this book, Luca Follis and Adam Fish examine the entanglements between hackers and the state, showing how hackers and hacking moved from being a target of state law enforcement to a key resource for the expression and deployment of state power. Follis and Fish trace government efforts to control the power of the internet; the prosecution of hackers and leakers (including such well-known cases as Chelsea Manning, Edward Snowden, and Anonymous); and the eventual rehabilitation of hackers who undertake “ethical hacking” for the state. Analyzing the evolution of the state's relationship to hacking, they argue that state-sponsored hacking ultimately corrodes the rule of law and offers unchecked advantage to those in power, clearing the way for more authoritarian rule.Follis and Fish draw on a range of methodologies and disciplines, including ethnographic and digital archive methods from fields as diverse as anthropology, STS, and criminology. They propose a novel “boundary work” theoretical framework to articulate the relational approach to understanding state and hacker interactions advanced by the book. In the context of Russian bot armies, the rise of fake news, and algorithmic opacity, they describe the political impact of leaks and hacks, hacker partnerships with journalists in pursuit of transparency and accountability, the increasingly prominent use of extradition in hacking-related cases, and the privatization of hackers for hire.",
author = "Luca Follis and Fish, {Adam Richard}",
year = "2020",
month = may
day = "5",
language = "English",
isbn = "9780262043601",
series = "The Information Society Series",
publisher = "MIT Press",

}

RIS

TY - BOOK

T1 - Hacker States

AU - Follis, Luca

AU - Fish, Adam Richard

PY - 2020/5/5

Y1 - 2020/5/5

N2 - SummaryHow hackers and hacking moved from being a target of the state to a key resource for the expression and deployment of state power.In this book, Luca Follis and Adam Fish examine the entanglements between hackers and the state, showing how hackers and hacking moved from being a target of state law enforcement to a key resource for the expression and deployment of state power. Follis and Fish trace government efforts to control the power of the internet; the prosecution of hackers and leakers (including such well-known cases as Chelsea Manning, Edward Snowden, and Anonymous); and the eventual rehabilitation of hackers who undertake “ethical hacking” for the state. Analyzing the evolution of the state's relationship to hacking, they argue that state-sponsored hacking ultimately corrodes the rule of law and offers unchecked advantage to those in power, clearing the way for more authoritarian rule.Follis and Fish draw on a range of methodologies and disciplines, including ethnographic and digital archive methods from fields as diverse as anthropology, STS, and criminology. They propose a novel “boundary work” theoretical framework to articulate the relational approach to understanding state and hacker interactions advanced by the book. In the context of Russian bot armies, the rise of fake news, and algorithmic opacity, they describe the political impact of leaks and hacks, hacker partnerships with journalists in pursuit of transparency and accountability, the increasingly prominent use of extradition in hacking-related cases, and the privatization of hackers for hire.

AB - SummaryHow hackers and hacking moved from being a target of the state to a key resource for the expression and deployment of state power.In this book, Luca Follis and Adam Fish examine the entanglements between hackers and the state, showing how hackers and hacking moved from being a target of state law enforcement to a key resource for the expression and deployment of state power. Follis and Fish trace government efforts to control the power of the internet; the prosecution of hackers and leakers (including such well-known cases as Chelsea Manning, Edward Snowden, and Anonymous); and the eventual rehabilitation of hackers who undertake “ethical hacking” for the state. Analyzing the evolution of the state's relationship to hacking, they argue that state-sponsored hacking ultimately corrodes the rule of law and offers unchecked advantage to those in power, clearing the way for more authoritarian rule.Follis and Fish draw on a range of methodologies and disciplines, including ethnographic and digital archive methods from fields as diverse as anthropology, STS, and criminology. They propose a novel “boundary work” theoretical framework to articulate the relational approach to understanding state and hacker interactions advanced by the book. In the context of Russian bot armies, the rise of fake news, and algorithmic opacity, they describe the political impact of leaks and hacks, hacker partnerships with journalists in pursuit of transparency and accountability, the increasingly prominent use of extradition in hacking-related cases, and the privatization of hackers for hire.

M3 - Book

SN - 9780262043601

T3 - The Information Society Series

BT - Hacker States

PB - MIT Press

CY - Cambridge, Mass.

ER -