Hacks, Leaks, and Breaches

Issue Number Eight - Limn

Hardly a day passes without news of a major hack, leak, or breach; with the scale of computer use and reliance on digital forms of data, no sector of society is immune to these data dumps, infiltrations, and floods. From the surveillance of dissidents to the hacking of elections to the weaponization of memes, hacking is changing in character, and it is changing the world. In this issue we ask whether hacking and hacks have crossed a techno-political threshold: how are hacks, leaks and breaches transforming our world, creating new collectives, and changing our understanding of security and politics. How has the relationship of hacking and hackers to their own collectives, to governments, and to the tools and techniques been transformed recently? What does it mean to be a hacker these days, and how does it differ from engineering, from “cyber-security,” from information warfare or from hacktivism?


Coleman, E.G. and Kelty, C.M. (Eds., 2017). Hacks, Leaks, and Breaches. Limn, Issue Number Eight. www

Retour

Attention - Votre version d'Internet Explorer est vieille de 17 ans et peut ne pas vous offrir une expérience optimale sur le site du CICC. Veuillez mettre à jour votre ordinateur pour une expérience optimale. Nous vous recommandons Firefox ou Chrome, ou encore ChromeFrame si vous êtes dans un environnement corporatif ou académique dans lequel vous ne pouvez pas mettre à jour Internet Explorer.