Bibliography
Total Page:16
File Type:pdf, Size:1020Kb
Bibliography Table of Cases European Court of Human Rights Appleby v United Kingdom (2003) 37 EHRR 38 Gorzelik and others v Poland (2005) 40 EHRR KU v Finland (2008) ECtHR 2872/02 Germany OberlandesGericht Frankfurt am Main v Thomas Vogel (No. 1 Ss 319/05) United Kingdom City of London v Samede & Ors [2012] EWHC 34 QB DPP v Lennon [2006] All ER (D) 147 R v Jones (Margaret) [2005] QB 259 © The Author(s) 2018 227 V. Karagiannopoulos, Living With Hacktivism, Palgrave Studies in Cybercrime and Cybersecurity, https://doi.org/10.1007/978-3-319-71758-6 228 Bibliography R v Bow Street Magistrates Court and Allison (A.P.) Ex Parte Government of the United States of America [1999] All ER (D) 972 R v Weatherhead, Rhodes, Gibson and Burchall, Southwark Crown Court, 24 January 2013 R v G and Another [2003] UKHL 50 R v Howe [1987] 1 AC 417 R v Ponting [1985] Crim LR 318 R v Saibene and others [2010] Lewes Crown Court United States Amalgamated Food Employees Union Local 590 v Logan Valley Plaza, Inc., 391 U.S. 308 (1968) America Online, Inc. v IMS et al. 24 F.Supp.2d 548 (E.D.Va. 1998) America Online v National Health Care Discount, Inc., 121 F. Supp. 2d 1255 (N.D. Iowa 2000) Chicago v Streeter, No. 85-108644 (Cir. Court, Cook County, Ill. 1985) Citizens United v Federal Election Commission 558 U.S. 310 (2010) Cyber Promotions, Inc. v America Online, Inc., 948 F. Supp. 436 (E.D. Pa. 1996) EF Cultural Travel BV v Explorica, Inc., 274 F.3d 577 (1st Cir. 2001) EF Cultural Travel BV, et al. v. Zefer Corporation, 318 F.3d 58 (1st Cir., January 28, 2003) Hudgens v. NLRB 424 U.S. 507, 96 S. Ct. 1029, 47 L. Ed. 2d 196, 1976 U.S Hogan v. Twp. of Haddon, 278 F. App’x 98, 102 (3d Cir. 2008) Illinois v Jarka, No. 002170 (Cir. Court Ill. 1985), reprinted in 42 GUILD PRAC. 108–10 (1985) International Airport Centers, Llc v Citrin, 440 F.3d 418 (7th Cir. 2006) LVRC Holdings v Brekka, 518 F.3d 1127 (9th Cir. 2009) Massachusetts v Carter, No. 8745-JC-0091A (Dist. Court, Hampshire County, Mass. 1987) People of the State of New York v Gray, 150 Misc. 2d 852 (N.Y. Co. 1991) Register.com, Inc. v Verio, Inc., 126 F.Supp. 2d 238, 255 (S.D.N.Y. 2000) State v Allen, 917 P.2d 848 (Kan. 1996) Storage Centers, Inc. v Safeguard Self Storage, Inc., 119 F.Supp. 2d 1121 (Dist. Court, Washington D.C. 2000) Sutliffe v. Epping Sch. Dist., 584 F.3d 314, 333–34 (1st Cir. 2009) United States v Aguilar, 883 F.2d 662, 693 (9th Cir. 1989) Bibliography 229 United States v American Library Association, 539 U.S. 194 (2003) United States v Auernheimer, Criminal No.: 2:11-cr-470 (SDW) (Dist. Court, New Jersey 2013) United States v Berrigan, 283 F. Supp. 336 (Dist. Court, Maryland, 1968) United States v Booker, 543 U.S. 220 (2005) United States v Cassidy, 616 F.2d 101 (4th Cir. 1979) United States v Crandon, 173 F.3d 124 (3rd Cir. 1999) United States v Czubinski, 106 F. 3d 1069 (1st Cir. 1997) United States v Dorrell, 758 F.2d 427 (9th Cir. 1985) United States v Guzner, No. 2:09-cr-00087 (Dist. Court, New Jersey 2009) United States v Heckman, 592 F.3d 400 (3rd Cir. 2010) United States v Holm, 326 F.3d 872 (7th Cir. 2003) United States v Kroncke, 459 F.2d 697 (8th Cir. 1972) United States v Marley, 549 F.2d 561 (8th Cir. 1977) United States v Maxwell, 254 F.3d 21 (1st Cir. 2001) United States v May, 622 F.2d 1000 (9th Cir. 1980), cert denied, 449 U.S. 984 (1980) United States v Mettenbrink, Case 2:09-cr-01149-GAF (Dist. Court, California 2010) United States v Middleton, 231 F.3d 1207 (9th Cir. 2000) United States v Mitnick, 145 F.3d 1342 (9th Cir. 1998) United States v Morris, 928 F.2d 504 (2nd Cir. 1991) United States v Nosal, 676 F.3d 854 (9th Cir. 2012) United States v. Nosal, 828 F.3d 865 (9th Cir. 2016), reh’g denied and amended by 2016 WL 7190670 (9th Cir. Dec. 8, 2016) United States v Phillips, 477 F.3d 215 (5th Cir. 2007) United States v Russell, 600 F.3d 631 (D.C. Cir. 2010) United States v Schoon, 22 Ill.971 F.2d 193 (9th Cir. 1991) United States v Sofsky, 287 F.3d 122 (2nd Cir. 2002) United States v Walser, 275 F.3d 981 (10th Cir. 2001) United States v White, 244 F.3d 1199 (10th Cir. 2001) Vargas v. City of Salinas, 205 P.3d 207, 215 n.8 (Cal. 2009) Vermont v Keller, No. 1372-4-84 (Dist. Court, Vt. 1984) Vermont v McCann, No. 2857-7-86 (Dist. Court, Vt. 1987), reprinted in 44 GUILD PRAC. 101 (1987) Ward v Rock Against Racism, 491 U.S. 781 (1989) 230 Bibliography Table of Legislation International Treaties, Conventions and Other Documents Council of Europe, The European Convention for the Protection for Human Rights and Fundamental Freedoms (Rome, 1950) Council of Europe, Convention on Cybercrime (ETS no.185, Budapest, 2001) Directive 2000/31/EC of the European Parliament and of the Council on cer- tain legal aspects of information society services, in particular electronic com- merce, in the Internal Market, OJ EL 178 Directive 2002/21/EC of the European Parliament and of the Council on a common regulatory framework for electronic communications networks and services (Framework Directive) OJ L 108 Directive 2002/58/EC of the European Parliament and of the Council concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) OJ L 201 EU Council Framework Decision 2005/222/JHA of 24 February 2005 on attacks against information systems, OJ L 69 Strafgesetzbuch (German Criminal Code) United Kingdom Anti-Terrorism, Crime and Security Act of 2001 (c. 24) Coroners and Justice Act 2009 (c.25) Computer Misuse Act 1990 (c.18) Criminal Justice Act 2003 (c.44) Criminal Law Act 1977 (c.45) Digital Economy Act 2010 (c.24) Electronic Commerce (EC Directive) Regulations of 2002, No. 2013 Human Rights Act 1998 (c.42) Magistrates’ Courts Act 1980 (c.43) Bibliography 231 Police and Justice Act 2006 (c.48) Prevention of Terrorism Act 2005 (c.2) Public Order Act 1986 (c.8) Terrorism Act 2000 (c.11) Terrorism Act 2006 (c.11) The Terrorism Act 2000 (Remedial) Order 2011, No.631 United States Acts of Terrorism Transcending National Boundaries, 18 U.S.C. Part I Chapter 113B, Section 2332b Animal Enterprise Terrorism Act, 18 U.S.C. Part I, Chapter 3, Section 43 Application of Guidelines in Imposing a Sentence, 18 U.S.C. Chapter 227 Subchapter A. Section 3553(b) Fraud and Related Activity in Connection with Access Devices, 18 U.S.C. Part I, Chapter 47 Section 1029 Fraud and Related Activity in Connection with Computers, 18 U.S.C. Part I, Chapter 47 Section 1030 Homeland Security Act of 2002, 116 Stat. 2135, Homicide, 18 U.S.C. Chapter 51, Section 1111 Identity Theft Enforcement and Restitution Act 2008, Title II, 122 Stat. 3560 Intelligence Reform and Terrorism Prevention Act of 2004, 118 Stat. 3638 Manslaughter, 18 U.S.C. Chapter 51, Section 1112 Model Penal Code (American Law Institute, 1968) United States Constitution, Amendment I – Freedom of Religion, Press, Expression Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 – USAPA) 115 Stat. 272 232 Bibliography Secondary Sources Anonymous Works and Arithmetic Names ———, ‘Immunizing the Internet, Or: How I Learned to Stop Worrying and Love the Worm’ (2006) 119 Harvard Law Review 2442 0100101110101101.org, ‘Copies’ (0100101110101101.org, 1999–2000) http://0100101110101101.org/copies/, accessed 31 July 2017 ———, ‘The K Thing: Story of an Infamous Online Performance’ (01001011 10101101.org, 2001) http://0100101110101101.org/the-k-thing, accessed 31 July 2017 ———, ‘0100101110101101.Org Projects’ (0100101110101101.org, 2011) http://www.0100101110101101.org/projects.html, accessed 31 July 2017 ———, ‘Contagious Paranoia 0100101110101101.org Spreads a New Computer Virus’ (0100101110101101.org, 2011) http://0100101110101101. org/biennale-py/, accessed 31 July 2017 2600 Magazine, ‘Press Release – 2600 Magazine Condemns Denial of Service Attacks’ (2600 Magazine, 10 December 2010) https://dear2600.wordpress. com/2010/12/10/press-release-2600-magazine-condemns-denial-of-service- attacks/, accessed 16 October 2017 4chan http://www.4chan.org/, accessed 25 June 2017 A Aas K F, Globalization & Crime (Sage, London 2007) Abbas M, ‘Economic Crisis Could Widen Inequality – Report’ (Reuters, 10 October 2010) http://uk.reuters.com/article/idUKTRE6992CY20101010, accessed 24 October 2017 Adler F, ‘Socioeconomic Factors Influencing Jury Verdicts’ (1973) 3 New York University Review of Law and Social Change 1 Adler J, The Urgings of Conscience: A Theory of Punishment (Temple University Press, Philadelphia 1992) Agamben G, Means without End: Notes on Politics (University of Minnesota Press, Minneapolis 2000) Akester P, ‘Copyright and the P2P Challenge’ (2005) 27 European Intellectual Property Review 576 Bibliography 233 Alexander L, ‘Lesser Evils: A Closer Look at the Paradigmatic Justification’ (2005) 24 Law and Philosophy 611 Alexander L, Kessler K F, and Morse S J, Crime and Culpability: A Theory of Criminal Law (Cambridge University Press, Cambridge 2009) All Party Internet Group (APIG), ‘Revision of the Computer Misuse Act’: Report on an Inquiry by the All Party Internet Group (2004) http://www.cullen- international.com/cullen/multi/national/uk/laws/cmareport.pdf, accessed 14 August 2013 Allan G, ‘Responding to Cybercrime: A Delicate Blend of the Orthodox and the Alternative’ (2005) New Zealand Law Review 149 Allnutt L, ‘Old-School Hacker Oxblood Ruffin Discusses Anonymous and the Future of Hacktivism’ (Tangled Web, 08 June 2011) http://www.rferl.org/ content/hacker_oxblood_ruffin_discusses_anonymous_and_the_future_of_ hacktivism/24228166.html, accessed 20 September 2011 Alschuler A, ‘Implementing the Criminal Defendant’s Right to Trial: Alternatives to the Plea Bargaining System’ (1983) 50 University of Chicago Law Review 931 Alton S R, ‘In the Wake of Thoreau: Four Modern Legal Philosophers and the Theory of Non-Violent Civil Disobedience’ (1993) 24 Loyola University Law Journal 39 Amnesty International, ‘Undermining Freedom of Expression in China: The Role of Yahoo!, Microsoft and Google’ (Amnesty International, 2006) https://www.