• Complain

Follis Luca - Hacker States

Here you can read online Follis Luca - Hacker States full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Cambridge;MA, year: 2020, publisher: MIT Press, genre: Computer / Science. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover

Hacker States: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Hacker States" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

SummaryHow hackers and hacking moved from being a target of the state to a key resource for the expression and deployment of state power.In this book, Luca Follis and Adam Fish examine the entanglements between hackers and the state, showing how hackers and hacking moved from being a target of state law enforcement to a key resource for the expression and deployment of state power. Follis and Fish trace government efforts to control the power of the internet; the prosecution of hackers and leakers (including such well-known cases as Chelsea Manning, Edward Snowden, and Anonymous); and the eventual rehabilitation of hackers who undertake ethical hacking for the state. Analyzing the evolution of the states relationship to hacking, they argue that state-sponsored hacking ultimately corrodes the rule of law and offers unchecked advantage to those in power, clearing the way for more authoritarian rule.Follis and Fish draw on a range of methodologies and disciplines, including ethnographic and digital archive methods from fields as diverse as anthropology, STS, and criminology. They propose a novel boundary work theoretical framework to articulate the relational approach to understanding state and hacker interactions advanced by the book. In the context of Russian bot armies, the rise of fake news, and algorithmic opacity, they describe the political impact of leaks and hacks, hacker partnerships with journalists in pursuit of transparency and accountability, the increasingly prominent use of extradition in hacking-related cases, and the privatization of hackers for hire.

Follis Luca: author's other books


Who wrote Hacker States? Find out the surname, the name of the author of the book and a list of all author's works by series.

Hacker States — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Hacker States" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Hacker States The Information Society Series Laura DeNardis and Michael Zimmer - photo 1

Hacker States

The Information Society Series

Laura DeNardis and Michael Zimmer, Series Editors

Interfaces on Trial 2.0, Jonathan Band and Masanobu Katoh

Opening Standards: The Global Politics of Interoperability, Laura DeNardis, editor

The Reputation Society: How Online Opinions Are Reshaping the Offline World, Hassan Masum and Mark Tovey, editors

The Digital Rights Movement: The Role of Technology in Subverting Digital Copyright, Hector Postigo

Technologies of Choice? ICTs, Development, and the Capabilities Approach, Dorothea Kleine

Pirate Politics: The New Information Policy Contests, Patrick Burkart

After Access: The Mobile Internet and Inclusion in the Developing World, Jonathan Donner

The World Made Meme: Public Conversations and Participatory Media, Ryan Milner

The End of Ownership: Personal Property in the Digital Economy, Aaron Perzanowski and Jason Schultz

Digital Countercultures and the Struggle for Community, Jessica Lingel

Cyberbullying Policies of Social Media Companies: Toward Digital Dignity, Tijana Milosevic

Authors, Users, and Pirates: Copyright Law and Subjectivity, James Meese

Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P, Robert W. Gehl

Hacker States, Luca Follis and Adam Fish

Hacker States

Luca Follis and Adam Fish

The MIT Press

Cambridge, Massachusetts

London, England

2020 Massachusetts Institute of Technology

All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher.

Library of Congress Cataloging-in-Publication Data

Names: Follis, Luca, author. | Fish, Adam, author.

Title: Hacker states / Luca Follis and Adam Fish.

Description: Cambridge, MA : MIT Press, [2020] | Series: Information society series | Includes bibliographical references and index.

Identifiers: LCCN 2019019587 | ISBN 9780262043601 (hardcover : alk. paper)

Subjects: LCSH: Hacktivism. | Cyberspace--Political aspects.

Classification: LCC HV6773 .F65 2020 | DDC 364.16/8--dc23 LC record available at https://lccn.loc.gov/2019019587

Contents

A book begins with a collection of multiple lines of inquiry, dispersed ideas, and research trajectories that predate the research itself and seek to extend beyond it. When it is the product of collaborative work, the synthesis and clarification of ideas is perhaps more challenging but also significantly more stimulating, and I would like to thank my coauthor Adam Fish for being a thoughtful, imaginative interlocutor during the years we spent researching and writing this book. Throughout this process, I have drawn significant inspiration from the interdisciplinary spirit that animated my PhD years at the New School for Social Research in New York and the critical focus on the themes of democracy, crisis, and resistance that characterized my time there. The guidance, mentorship, and support of a theoretically agile and politically engaged group of scholarsAndrew Arato (to whom I owe a tremendous intellectual debt), Oz Frankel, Eiko Ikegami, Jeffrey Goldfarb, Elbieta Matynia, and Jos Casanovais reflected in many of the pages of this book.

In Lancaster and beyond, many colleagues generously gave their time and effort to comment on, discuss, and otherwise significantly improve various drafts of this book. In particular, I would like to thank Monika Buscher, Mark Lacy, Daniel Prince, Majid Yar, and Maxigas. Others helped provide the vibrant and collegial research environment that allowed this project to develop. Sue Penna, Corinne May-Chahal, Alisdair Gillespie, Sigrun Skogly, Catherine Easton, Sarah Kingston, Gary Potter, and Steven Wheatley deserve special thanks. Security Lancaster and the Faculty of Arts and Social Sciences at Lancaster University provided funding at various stages of this research and the law school facilitated a timely research sabbatical during which the final draft of this manuscript was completed. I would also like to extend our gratitude to our informants, in particular Lauri Love and Naomi Colvin, who gave us access to their timeunder incredibly stressful conditionsso that we could write this book. Our editor at the MIT Press, Gita Devi Manaktala, and four anonymous readers also contributed to making our manuscript better.

Finally, I would especially like to thank my parents Eugenia and Fabrizio Follis, who regularly provide a respite from the storm of academic commitments and are an unwavering source of support and encouragement, as well as Marco Follis, Anna Maria Notaro, Jolanta Zagrodzka, and Jerzy Szmagalski, whose enthusiasm, engagement, and warmth throughout the writing of this book kept me grounded. Above all this project would not have been possible without my travel partner in life, academia, and all else. I would like to thank Karolina Follis, whose encouragement, love, and boundless imagination powers our little family, as well as the restless and incandescent spirit of our two children, Benjamin and Matilda. When they smile, the worries of the world fade away.


Luca Follis


I would like to sincerely acknowledge the creative work of my coauthor Luca Follis. His dedication to grounded realism, steady discipline, and playful theorizing made this project possible. A community of fellow anthropology hackersChristopher Kelty, Gabriella Coleman, Maxigas, and Paula Bialskiinspired this research. I appreciated the opportunity to present drafts of this research at the Digital Social Research Unit, Ume University, Sweden; Disconnections Symposium, Uppsala University, Sweden; ZeMKI Centre for Media, Communication and Information Research, University of Bremen, Germany; and Hackademia: Empirical Studies in Computing Cultures, Lneburg Summer School for Digital Cultures, Leuphana University, Germany. I thank the ZeMKI Centre for Media, Communication, and Information Research for a 2018 fellowship that supported this research. My family, Robin, Io (Isis Viola Lune Moxie), and Jennifer Fish, made this and all work meaningful. I dedicate this work to Richard Lee Fish (19472018), a hacker in spirit.


Adam Fish

The smell of pinecones roasting on black basalt rock. Icy creeks replenishing free-flowing rivers, where salmon swim to peak-side spawning grounds. On a sandy beach, prints of bighorn sheep scatter away from an ambush by a mountain lion. Situated in central Idaho, between Montana and Oregon, this is the largest roadless area in the lower forty-eight United States. It is one of the only remaining intact ecosystems large enough to support ambulatory and predatory megafauna like wolverines, gray wolves, lynx, mountain lion, and likely grizzly bears. This wilderness is protected on the grounds that it sustains biological richness, allows scientists to observe ecological principles, inspires a freedom-seeking zeitgeist, reminds people of commonly shared responsibilities, and serves as a sacred space (Nash 1976). Authors from Henry David Thoreau to Edward Abbey have noted the dialectic between internal wildness and external wilderness that exists in the American psyche, a co-determining relationship between a peoples values and what a nation cherishes. An immense wilderness in Idaho might seem an unlikely place to begin a book about computer hacking. Yet the internetand the sprawling network of servers, computers, and other devices that constitute itforms its own kind of wilderness. Fin de sicle computer viruses, self-replicating worms, and other malware swim in the fiber-optic streams of this wild. As an untamed region far removed from the sandbox of computer laboratories and research facilities, the hacker wilderness is the space where security researchers, cybercriminals, and hacktivists meet and mesh. Thinking about the relationship between the nation-state and the wild offers important insights into todays fight for the cyber commons.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Hacker States»

Look at similar books to Hacker States. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Hacker States»

Discussion, reviews of the book Hacker States and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.