2019
DOI: 10.17951/ms.2018.2.85-101
|View full text |Cite
|
Sign up to set email alerts
|

“Now you see me – now you don’t!” – Practices and purposes of hacking online surveillance

Abstract: <p>This paper describes how hacking can be the act of redefining what is seen and not seen in the context of online surveillance. Based on a qualitative interview study with 22 hackers, it discusses the many practices and purposes of ‘hacking online surveillance’, with a specific focus on the techniques of disappearing from view while continuing to be online. Not only do these techniques vary in style and the expertise involved, but they all fulfill multiple functions. They are more than just a coded sta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2
2

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…As an engagement with digital governance hacking tends to be either lauded or denounced as Gabriella Coleman and Alex Golub (2008) observe. Especially in legal discourses and national strategies for cybersecurity hacking is associated with criminal or illegal activity and is assessed in terms of informational and monetary loss (for a study of legal discourses see Kaufmann 2018). The notion of hacktivism (e.g.…”
Section: A Diverse Terrain Captured By Binaries and Hatsmentioning
confidence: 99%
“…As an engagement with digital governance hacking tends to be either lauded or denounced as Gabriella Coleman and Alex Golub (2008) observe. Especially in legal discourses and national strategies for cybersecurity hacking is associated with criminal or illegal activity and is assessed in terms of informational and monetary loss (for a study of legal discourses see Kaufmann 2018). The notion of hacktivism (e.g.…”
Section: A Diverse Terrain Captured By Binaries and Hatsmentioning
confidence: 99%
“…As an engagement with digital governance hacking tends to be either lauded or denounced as Gabriella Coleman and Alex Golub (2008) observe. Especially in legal discourses and national strategies for cybersecurity hacking is associated with criminal or illegal activity and is assessed in terms of informational and monetary loss (for a study of legal discourses see Kaufmann 2018). The notion of hacktivism (e.g.…”
Section: A Diverse Terrain Captured By Binaries and Hatsmentioning
confidence: 99%
“…Encryption software allows its users to conceal their identities and locations and therefore to hide from and become hard to reach for the outsiders. This is exemplified by the use of encryption technologies like The Onion Router ( Kaufmann, 2018b ; Tzanetakis et al, 2016 ). These techniques are associated with their own benefits and disadvantages – dependent on their purpose, which also adds an ideological level to the choice of technique ( Kaufmann, 2018b ).…”
Section: Conceptualizing Hard-to-reach Communities Onlinementioning
confidence: 99%
“…What stereotypically comes to mind when studying the hard-to-reach online are research subjects with illicit intentions, but also privacy advocates, activists, political refugees or simply those who enjoy playing with surveillance systems ( Kaufmann, 2018b ). Despite the fact that the reasons for disappearing online are this manifold, disappearance tends to be associated with hiding ( Tzanetakis, 2018 ) or with weak forms of protest as its users want to enjoy online services without contributing to their functioning ( Brunton and Nissenbaum, 2011 : online).…”
Section: Conceptualizing Hard-to-reach Communities Onlinementioning
confidence: 99%