Skip to main content

Hacking

  • Chapter
  • First Online:
  • 2346 Accesses

Abstract

With the rise in importance of the Internet in our lives came the opportunity for some to exploit this for their own gain. Hacking rose to prominence as the resources they targeted became more valued. Hackers sought opportunities to control sites and make a statement by attacking governments, businesses and organisations that they disagreed with. Other hackers did it for the financial gain and rewards. And yet another group hacked on behalf of government and defense to attack their enemies or learn their secrets.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Man despair problem null one binary code, pixabay, http://pixabay.com/en/man-despair-problem-null-one-65049/, 21 December 2012.

  2. 2.

    Fresh evidence made public to help Enfield hacker Gary McKinnon’s fight against extradition, http://www.enfieldindependent.co.uk/news/localnews/8923549.Lords_to_debate_fate_of_Enfield_hacker_Gary_McKinnon/, Accessed online 14 April 2011.

  3. 3.

    News of the World phone hacking: John Whittingdale seeks public enquiry, http://www.guardian.co.uk/media/2011/apr/13/news-of-the-world-phone-hacking, Accessed online 14 April 2011.

  4. 4.

    AusCERT, http://www.auscert.org.au/, Accessed online 14 April 2011.

  5. 5.

    A Declaration of Cyber-War, http://www.vanityfair.com/culture/features/2011/04/stuxnet-201104, Accessed online 14 April 2011.

  6. 6.

    Location, location: who’s watching you (and why)?, http://theconversation.edu.au/location-location-whos-watching-you-and-why-691, Accessed online 14 April 2011.

  7. 7.

    AnonymousMXPT, Flickr, http://www.flickr.com/photos/anonymousmxpt/8261353788/sizes/l/in/photostream/, Accessed online 21 December 2012.

  8. 8.

    Anonymous (group), Wikipedia, http://en.wikipedia.org/wiki/Anonymous_(group, Accessed online 28 October 2011.

  9. 9.

    Hacker group Anonymous’ new target: Child pornography websites, TheWeek, http://theweek.com/article/index/220708/hacker-group-anonymousnew-target-child-pornography-websites, Accessed online 28 October 2011.

  10. 10.

    Zombie computers, cyber security, phishing … what you need to know, http://theconversation.edu.au/zombie-computers-cyber-security-phishing-what-you-need-to-know-1671, Accessed online 28 October 2011.

  11. 11.

    #OpDarknet Major Release and Timeline, http://pastebin.com/T1LHnzEW, Accessed online 28 October 2011.

  12. 12.

    Anonymous, http://theconversation.edu.au/pages/anonymous, Accessed online 28 October 2011.

  13. 13.

    “To catch a Predator” Anonymous: The fight against child pornography Operation Darknet (#OpDarknet), http://www.youtube.com/watch?v=TcNimk1SJvA, Accessed online 28 October 2011.

  14. 14.

    Fear and Loathing in Las Vegas, http://en.wikipedia.org/wiki/Fear_and_Loathing_in_Las_Vegas, Accessed 8 August 2011.

  15. 15.

    DEF CON Hacking Conference, http://www.defcon.org/, Accessed 8 August 2011.

  16. 16.

    DEFCON, http://en.wikipedia.org/wiki/DEFCON, Accessed 8 August 2011.

  17. 17.

    Hackers break into Subaru Outback via text message, http://www.engadget.com/2011/08/04/hackers-break-into-subaru-outback-via-text-message/, Accessed 8 August 2011.

  18. 18.

    Hacking, cracking and the wild, wild web, http://theconversation.edu.au/hacking-cracking-and-the-wild-wild-web-738, Accessed 8 August 2011.

  19. 19.

    Man-in-the-middle attack, http://en.wikipedia.org/wiki/Man-in-the-middle_attack, Accessed 8 August 2011.

  20. 20.

    GSM, http://en.wikipedia.org/wiki/GSM, Accessed 8 August 2011.

  21. 21.

    Link no longer goes to specified page, https://www.isecpartners.com/storage/docs/presentations/iSEC_BH2011_War_Texting.pdf, Accessed 8 August 2011.

  22. 22.

    Black Hat: Insulin pumps can be hacked, http://www.scmagazine.com/black-hat-insulin-pumps-can-be-hacked/article/209106/, Accessed 8 August 2011.

  23. 23.

    Face-matching with Facebook profiles: How it was done, http://news.cnet.com/8301-31921_3-20088456-281/face-matching-with-facebook-profiles-how-it-was-done/, Accessed 8 August 2011.

  24. 24.

    Facial recognition technology, http://theconversation.edu.au/pages/facial-recognition-technology, Accessed 8 August 2011.

  25. 25.

    Facebook and facial recognition – you’ve been tagged http://theconversation.edu.au/facebook-and-facial-recognition-youve-been-tagged-1776, Accessed 8 August 2011.

  26. 26.

    Link no longer goes to specified page, http://www.blackhat.com/docs/webcast/usa11preview_chamales.pdf, Accessed 8 August 2011.

  27. 27.

    Crisis management: using Twitter and Facebook for the greater good, http://theconversation.edu.au/crisis-management-using-twitter-and-facebook-for-the-greater-good-2439, Accessed 8 August 2011.

  28. 28.

    Jeff Moss (hacker), http://en.wikipedia.org/wiki/Jeff_Moss_%28hacker%29, Accessed 8 August 2011.

  29. 29.

    DEF CON: The event that scares hackers, http://edition.cnn.com/2011/TECH/web/08/05/def.con.hackers/index.html?npt=NP1&on.cnn=1, Accessed 8 August 2011.

  30. 30.

    10 year old girl hacker CyFi reveal her first zero-day in Game at #DefCon 19, http://thehackernews.com/2011/08/10-year-old-girl-hacker-cyfi-reveal-her.html, Accessed 8 August 2011.

  31. 31.

    DEFCON Kids, http://www.defconkids.org/, Accessed 8 August 2011.

  32. 32.

    Zero Day Exploits - Holy Grail Of The Malicious Hacker, http://netsecurity.about.com/od/newsandeditorial1/a/aazeroday.htm, Accessed 8 August 2011.

  33. 33.

    Welcome to the National Security Agency, http://www.nsa.gov/, Accessed online 1 July 2013.

  34. 34.

    Zakaria, Tabassum, Defcon Hacker Convention: Government Cybersecurity Experts Looking To Recruit Top Hacking Brass In Las Vegas, http://www.huffingtonpost.com/2011/08/02/defcon-hacker-convention-government-cybersecurity_n_915853.html? Accessed online 1 July 2013.

  35. 35.

    Cyber security, http://theconversation.com/topics/cyber-security, Accessed online 1 July 2013.

  36. 36.

    DJ Pangburn, An Open Letter to Defcon Hackers: Don’t Sell Out to the NSA, http://www.deathandtaxesmag.com/127506/an-open-letter-to-defcon-hackers-dont-sell-out-to-the-nsa/, Accessed online 1 July 2013.

  37. 37.

    Wright, Craig S, Are Anonymous and LulzSec about to hack PayPal for WikiLeaks? http://theconversation.com/are-anonymous-and-lulzsec-about-to-hack-paypal-for-wikileaks-2582, Accessed online 1 July 2013.

  38. 38.

    Takahashi, Dean, Defcon panel: Anonymous is here. LulzSec is here. They’re everywhere, http://venturebeat.com/2011/08/06/defcon-panel-anonymous-is-here-lulzsec-is-here-theyre-everywhere/, Accessed online 1 July 2013.

  39. 39.

    Branch, Philip, LulzSec takes down CIA website in the name of fun, fun, fun, Accessed online 1 July 2013.

  40. 40.

    Wright, Craig S, World’s biggest-ever cyber attacks uncovered – and it’s only the beginning, http://theconversation.com/worlds-biggest-ever-cyber-attacks-uncovered-and-its-only-the-beginning-2677, Accessed online 1 July 2013.

  41. 41.

    An Interview With a Target of the FBI’s Anonymous Probe, http://gawker.com/5757995/an-interview-with-a-target-of-the-fbis-anonymous-probe, Accessed on 5 September 2011.

  42. 42.

    FBI Exposes The Terrifying Face Of “Anonymous”, http://www.thesmokinggun.com/documents/internet/fbi-exposes-terrifying-face-anonymous-748293, Accessed on 5 September 2011.

  43. 43.

    PayPal, https://www.paypal.com/au/webapps/mpp/home, Accessed on 5 September 2011.

  44. 44.

    Zombie computers, cyber security, phishing … what you need to know, http://theconversation.edu.au/zombie-computers-cyber-security-phishing-what-you-need-to-know-1671, Accessed on 5 September 2011.

  45. 45.

    Operation Payback: WikiLeaks Avenged by Hacktivists, http://www.pcworld.com/article/212701/operation_payback_wikileaks_avenged_by_hactivists.html, Accessed on 5 September 2011.

  46. 46.

    WikiLeaks Supporter ‘Operation Payback’ Targets PayPal, Amazon, http://www.pcmag.com/article2/0,2817,2374090,00.asp, Accessed on 5 September 2011.

  47. 47.

    Internet Relay Chat, http://en.wikipedia.org/wiki/Internet_Relay_Chat, Accessed on 5 September 2011.

  48. 48.

    An Interview With a Target of the FBI’s Anonymous Probe, http://gawker.com/5757995/an-interview-with-a-target-of-the-fbis-anonymous-probe, Accessed on 5 September 2011.

  49. 49.

    Consumer credit cashing, http://freemercedes.org/, Accessed on 5 September 2011.

  50. 50.

    UNLV student arrested by FBI for hacking in support of Wikileaks, http://www.unlvrebelyell.com/2011/07/25/unlv-student-arrested-by-fbi-for-hacking-in-support-of-wikileaks/, Accessed on 5 September 2011.

  51. 51.

    Jessica Zimmerman JMS’s Outstanding Graduate Student for November, http://journalism.unlv.edu/, Accessed on 5 September 2011.

  52. 52.

    Haefer asserts innocence, http://www.unlvrebelyell.com/2011/08/08/haefer-asserts-innocence/, Accessed on 5 September 2011.

  53. 53.

    The ethics of digital direct action, http://www.aljazeera.com/indepth/opinion/2011/08/20118308455825769.html, Accessed on 5 September 2011.

  54. 54.

    Gabriella Coleman, http://steinhardt.nyu.edu/faculty_bios/view/Gabriella_Coleman, Accessed on 5 September 2011.

  55. 55.

    FBI Tries To Send Message With Hacker Arrests, http://www.npr.org/2011/07/20/138555799/fbi-arrests-alleged-anonymous-hackers, Accessed on 5 September 2011.

  56. 56.

    FBI Tries To Send Message With Hacker Arrests, http://www.npr.org/2011/07/20/138555799/fbi-arrests-alleged-anonymous-hackers, Accessed on 5 September 2011.

  57. 57.

    FBI Exposes The Terrifying Face Of “Anonymous”, http://www.thesmokinggun.com/file/paypal-service-attack?page=0, Accessed on 5 September 2011.

  58. 58.

    Haefer asserts innocence, http://www.unlvrebelyell.com/2011/08/08/haefer-asserts-innocence/, Accessed on 5 September 2011.

  59. 59.

    Hacker claims he can exploit Windows Update, http://www.computerworld.com/s/article/9219876/Hacker_claims_he_can_exploit_Windows_Update?taxonomyId=89, Accessed on 12 September 2011.

  60. 60.

    Ich Sun Rising – The Story Of How SSL Certificate Authorities Died, http://diceylee.blogspot.com.au/2011/09/ich-sun-rising-story-of-how-ssl.html, Accessed on 12 September 2011.

  61. 61.

    Google, Yahoo, Skype targeted in attack linked to Iran, http://news.cnet.com/8301-31921_3-20046340-281.html?tag=mncol;txt, Accessed on 12 September 2011.

  62. 62.

    Comodo, http://www.comodo.com/, Accessed on 12 September 2011.

  63. 63.

    What is SSL and what are Certificates? http://tldp.org/HOWTO/SSL-Certificates-HOWTO/x64.html, Accessed on 12 September 2011.

  64. 64.

    Transport Layer Security, http://en.wikipedia.org/wiki/Secure_Sockets_Layer, Accessed on 12 September 2011.

  65. 65.

    Iranian hackers obtain fraudulent HTTPS certificates: How close to a Web security meltdown did we get? https://www.eff.org/deeplinks/2011/03/iranian-hackers-obtain-fraudulent-https, Accessed on 12 September 2011.

  66. 66.

    ComodoHacker’s Pastebin, http://pastebin.com/u/ComodoHacker, Accessed on 12 September 2011.

  67. 67.

    A Declaration of Cyber-War, http://www.vanityfair.com/culture/features/2011/04/stuxnet-201104, Accessed on 12 September 2011.

  68. 68.

    Comodo Report of Incident - Comodo detected and thwarted an intrusion on 26-MAR-2011, https://www.comodo.com/Comodo-Fraud-Incident-2011-03-23.html, Accessed on 12 September 2011.

  69. 69.

    Fox-IT, http://www.rijksoverheid.nl/bestanden/documenten-en-publicaties/rapporten/2011/09/05/diginotar-public-report-version-1/rapport-fox-it-operation-black-tulip-v1-0.pdf, Accessed on 12 September 2011.

  70. 70.

    Link no longer goes to specified page, http://www.diginotar.com/, Accessed on 12 September 2011.

  71. 71.

    Google users in Iran targeted in certificate scam, http://www.google.com/hostednews/afp/article/ALeqM5g4RgXPBowpoyZnscQ8o7-L4AlOpQ?docId=CNG.9e34c99182f5659a398b65217766ca17.21, Accessed on 12 September 2011.

  72. 72.

    Dutch Government Struggles to Deal With DigiNotar Hack, http://www.pcworld.com/article/239639/dutch_government_struggles_to_deal_with_diginotar_hack.html, Accessed on 12 September 2011.

  73. 73.

    Certificate authority, http://en.wikipedia.org/wiki/Certificate_authority, Accessed on 12 September 2011.

  74. 74.

    What is a software patch? http://www.oss-watch.ac.uk/resources/softwarepatch, Accessed on 12 September 2011.

  75. 75.

    Theregister.co.uk, Vodafone, Telegraph, Acer, National Geographic got hacked by Turkguvenligi, http://thehackernews.com/2011/09/theregistercouk-biggest-news-site-got.html#_, Accessed on 12 September 2011.

  76. 76.

    DNS hijacking, http://en.wikipedia.org/wiki/DNS_hijacking, Accessed on 12 September 2011.

  77. 77.

    How to protect from man-in-the-middle attacks, http://www.net-security.org/secworld.php?id=7087, Accessed on 12 September 2011.

  78. 78.

    What is Perspectives? http://perspectives-project.org/, Accessed on 12 September 2011.

  79. 79.

    Domain Name System Security Extensions, http://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions, Accessed on 12 September 2011.

  80. 80.

    DigiNotar SSL Breach, http://isc.sans.edu/diary/DigiNotar+SSL+Breach/11479, Accessed on 12 September 2011.

  81. 81.

    DNSSEC Takes Off in Wake of Root Zone Signing, http://www.circleid.com/posts/20110830_dnssec_takes_off_in_wake_of_root_zone_signing/, Accessed on 12 September 2011.

  82. 82.

    Member of Hacking Group LulzSec Arrested for June 2011 Intrusion of Sony Pictures Computer Systems, http://www.fbi.gov/losangeles/press-releases/2011/member-of-hacking-group-lulzsec-arrested-for-June-2011-intrusion-of-sony-pictures-computer-systems, Accessed on 5 October 2011.

  83. 83.

    LulzSec takes down CIA website in the name of fun, fun, fun, http://theconversation.edu.au/lulzsec-takes-down-cia-website-in-the-name-of-fun-fun-fun-1858, Accessed on 5 October 2011.

  84. 84.

    Cody Kretsinger, Arizona College Student, Charged In Sony Hacking Case, http://www.huffingtonpost.com/2011/09/23/cody-kretsinger-arizona-c_n_977490.html, Accessed on 5 October 2011.

  85. 85.

    Operation Payback brings you #OpSony, http://www.anonnews.org/?p=press&a=item&i=787, Accessed on 5 October 2011.

  86. 86.

    Are Anonymous hackers really on trial, or is FBI payback misdirected? http://theconversation.edu.au/are-anonymous-hackers-really-on-trial-or-is-fbi-payback-misdirected-3205, Accessed on 5 October 2011.

  87. 87.

    Hide My Ass! Free Proxy and Privacy Tools, http://hidemyass.com/, Accessed on 5 October 2011.

  88. 88.

    LulzSec IRC leak: the full record, http://www.guardian.co.uk/technology/2011/jun/24/lulzsec-irc-leak-the-full-record, Accessed on 5 October 2011.

  89. 89.

    Lulzsec fiasco, http://blog.hidemyass.com/2011/09/23/lulzsec-fiasco/, Accessed on 5 October 2011.

  90. 90.

    Second LulzSec hacker ‘Neuron’ could be tracked down via UK VPN, http://www.guardian.co.uk/technology/2011/sep/26/lulzsec-second-hacker?INTCMP=ILCNETTXT3487, Accessed on 5 October 2011.

  91. 91.

    Get instant updates on #hidemyass, https://twitter.com/search/realtime/%23hidemyass, Accessed on 5 October 2011.

  92. 92.

    Lulzsec fiasco, http://blog.hidemyass.com/2011/09/23/lulzsec-fiasco/, Accessed on 5 October 2011.

  93. 93.

    Virtual private network, http://en.wikipedia.org/wiki/Virtual_Private_Network, Accessed on 5 October 2011.

  94. 94.

    Important notice about security, https://airvpn.org/index.php?option=com_kunena&func=view&catid=2&id=891&Itemid=142#891, Accessed on 5 October 2011.

  95. 95.

    Bitcoin: a pirate’s booty or the new global currency? http://theconversation.edu.au/bitcoin-a-pirates-booty-or-the-new-global-currency-3130, Accessed on 5 October 2011.

  96. 96.

    Enjoy internet freedom and anonymity, https://www.privacyinternational.org/blog/enjoy-internet-freedom-and-anonymity-terms-and-conditions-apply, Accessed on 5 October 2011.

  97. 97.

    LulzSec private log, http://pastebin.com/QZXBCBYt, Accessed on 5 October 2011.

  98. 98.

    Tor Project: Anonymity Online https://www.torproject.org/, Accessed on 5 October 2011.

  99. 99.

    U.S. Naval Research Laboratory, http://www.nrl.navy.mil/, Accessed on 5 October 2011.

  100. 100.

    Electronic Frontier Foundation - Defending your rights in the digital world, https://www.eff.org/, Accessed on 5 October 2011.

  101. 101.

    Tor (anonymity network), http://en.wikipedia.org/wiki/Tor_%28anonymity_network%29, Accessed on 5 October 2011.

  102. 102.

    Snitches getting various stitches, http://pastebin.com/MBEsm5XQ, Accessed on 5 October 2011.

  103. 103.

    Freenet, https://freenetproject.org/, Accessed on 5 October 2011.

  104. 104.

    Anonymous: The secret group’s 5 biggest hacks, http://theweek.com/article/index/212846/anonymous-the-secret-groups-5-biggest-hacks, Accessed on 8 November 2011.

  105. 105.

    Link no longer goes to specified page, http://www.youtube.com/watch?v=bJORGO1Q2VY&feature=youtu.be, Accessed on 8 November 2011.

  106. 106.

    Operation: Paperstorm, http://oppaperstorm.wordpress.com/, Accessed on 8 November 2011.

  107. 107.

    AFP: Mexicans honor drug war victims on Day of the Dead, http://www.mexicoreporter.com/2011/11/02/afp-mexicans-honor-drug-war-victims-on-day-of-the-dead/, Accessed on 8 November 2011.

  108. 108.

    Mexico: Impunity and profits - Josh Rushing travels to the city dubbed the murder capital of the world. http://www.aljazeera.com/programmes/faultlines/2011/06/201161493451742709.html, Accessed on 8 November 2011.

  109. 109.

    Mexico drugs war: Inside Veracruz as conflict spreads deeper, http://www.bbc.co.uk/news/world-latin-america-15372946, Accessed on 8 November 2011.

  110. 110.

    Anonymous acts are a key feature of Mexico’s drug wars, http://www.guardian.co.uk/commentisfree/2011/nov/01/anonymity-mexico-drug-wars?INTCMP=ILCNETTXT3487, Accessed on 8 November 2011.

  111. 111.

    Dispatch: Anonymous’ Online Tactics Against Mexican Cartels, http://www.stratfor.com/analysis/20111101-dispatch-implications-online-tactics-against-mexican-cartels, Accessed on 8 November 2011.

  112. 112.

    Is Mexican cartel the next ‘Anonymous’ target? http://edition.cnn.com/2011/10/31/world/americas/mexico-anonymous-threat/?hpt=wo_c2, Accessed on 8 November 2011.

  113. 113.

    Mexico: Fear, Uncertainty and Doubt over Anonymous’ #OpCartel, http://globalvoicesonline.org/2011/10/31/mexico-fear-uncertainty-and-doubt-over-anonymous-opcartel/, Accessed on 8 November 2011.

  114. 114.

    Anonymous calls off outing of cartel after release of kidnapped member, http://arstechnica.com/tech-policy/2011/11/anonymous-calls-off-outing-of-narco-cartel-after-release-of-kidnapped-member/, Accessed on 8 November 2011.

  115. 115.

    OpCartel, a Name Emerges [Update], http://www.forbes.com/sites/seanlawson/2011/11/05/opcartel-a-name-emerges/, Accessed on 8 November 2011.

  116. 116.

    It Pays to Be the Face of Anonymous, http://gawker.com/5856604/it-pays-to-be-the-face-of-anonymous, Accessed on 8 November 2011.

  117. 117.

    Get instant updates on #OpCartel, https://twitter.com/search?q=%23OpCartel, Accessed on 8 November 2011.

  118. 118.

    Marines dismantle Los Zeta communications network in Veracruz, http://www.borderlandbeat.com/2011/09/marines-dismantle-los-zeta.html, Accessed on 8 November 2011.

  119. 119.

    Mexican Drug Cartels Now Menace Social Media, http://www.npr.org/2011/09/23/140745739/mexican-drug-cartels-now-menace-social-media, Accessed on 8 November 2011.

  120. 120.

    Zombie computers, cyber security, phishing … what you need to know, http://theconversation.edu.au/zombie-computers-cyber-security-phishing-what-you-need-to-know-1671, Accessed on 8 November 2011.

  121. 121.

    OpFaceBook, http://pastebin.com/nzaNLWfF, Accessed on 8 November 2011.

  122. 122.

    Anonymous Facebook Attack: Real or Fake? http://www.pcmag.com/article2/0,2817,2390805,00.asp, Accessed on 8 November 2011.

  123. 123.

    Operation Paperstorm starting Saturday December 18, 2010, http://www.operationprotest.com/operation-paperstorm-starting-dec-18-2010, Accessed on 8 November 2011.

  124. 124.

    Report: 230,000 Displaced by Mexico Drug War, http://www.foxnews.com/world/2011/03/25/report-230000-displaced-mexico-drug-war-1121351146/, Accessed on 8 November 2011.

  125. 125.

    Steam, http://store.steampowered.com/, Accessed online 15 November 2011.

  126. 126.

    Australian online commerce to hit $37billion by 2013, eCommerce Report, http://www.ecommercereport.com.au/?p=1952, Accessed online 15 November 2011.

  127. 127.

    Cisco: Global e-commerce to hit $1.4 trillion by 2015, Power Retail, http://www.powerretail.com.au/news/cisco-global-e-commerce-to-hit-1-4-trillion-by-2015/, Accessed online 15 November 2011.

  128. 128.

    Valve, http://www.valvesoftware.com/, Accessed online 15 November 2011.

  129. 129.

    Gabe Newell, Steam, http://forums.steampowered.com/forums/announcement.php?f=14, Accessed online 15 November 2011.

  130. 130.

    Credibility at risk in Sony hacking scandal, The Conversation, http://theconversation.edu.au/credibility-at-risk-in-sony-hacking-scandal-1038, Accessed online 15 November 2011.

  131. 131.

    Millions of e-commerce Sites Hacked to Serve Malware, PC Magazine, http://www.pcmag.com/article2/0,2817,2390677,00.asp#fbid=UMuHudFsSLB, Accessed online 15 November 2011.

  132. 132.

    Hacked security firm leaves Aussies vulnerable, Fairfax, http://www.smh.com.au/technology/security/hacked-security-firm-leaves-aussies-vulnerable-20110321-1c2i4.html, Accessed online 15 November 2011.

  133. 133.

    Second-level ISP, http://en.wikipedia.org/wiki/Second-level_ISP, Accessed online 15 November 2011.

  134. 134.

    Anonymous (group), http://en.wikipedia.org/wiki/Anonymous_%28group, Accessed on 15 February 2012.

  135. 135.

    Anonymous speaks: the inside story of the HBGary hack, http://arstechnica.com/tech-policy/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack/, Accessed on 15 February 2012.

  136. 136.

    Link no longer goes to specified page, http://occupythe99percent.com/2012/02/stratfor-intelligence-leaked-by-anonymous-reveals-spying-on-occupy-movement-and-deep-green-resistance/, Accessed on 15 February 2012.

  137. 137.

    Anonymous May Have Completely Destroyed Military Law Firm, http://www.gizmodo.com.au/2012/02/anonymous-may-have-completely-destroyed-military-law-firm/#more-512210, Accessed on 15 February 2012.

  138. 138.

    Bradley Manning, http://en.wikipedia.org/wiki/Bradley_Manning, Accessed on 15 February 2012.

  139. 139.

    WikiLeaks, http://en.wikipedia.org/wiki/Wikileaks, Accessed on 15 February 2012.

  140. 140.

    Analysis: Impact of Wikileaks’ US cable publications, http://www.bbc.co.uk/news/world-us-canada-11918573, Accessed on 15 February 2012.

  141. 141.

    WikiLeaks’ 16th minute, http://blogs.reuters.com/jackshafer/2012/01/18/wikileaks-16th-minute/, Accessed on 15 February 2012.

  142. 142.

    America should give Assange a medal, http://www.ft.com/cms/s/61f8fab0-06f3-11e0-8c29-00144feabdc0,Authorised=false.html?_i_location=http%3A%2F%2Fwww.ft.com%2Fcms%2Fs%2F0%2F61f8fab0-06f3-11e0-8c29-00144feabdc0.html&_i_referer=#axzz1m8IDUqqC, Accessed on 15 February 2012.

  143. 143.

    Anonymous speaks: the inside story of the HBGary hack, http://arstechnica.com/tech-policy/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack/, Accessed on 15 February 2012.

  144. 144.

    Cyberactivists warned of arrest, http://www.ft.com/intl/cms/s/87dc140e-3099-11e0-9de3-00144feabdc0,Authorised=false.html?_i_location=http%3A%2F%2Fwww.ft.com%2Fcms%2Fs%2F0%2F87dc140e-3099-11e0-9de3-00144feabdc0.html&_i_referer=#axzz1m8IDUqqC, Accessed on 15 February 2012.

  145. 145.

    HBGary Federal CEO Aaron Barr Steps Down, http://threatpost.com/en_us/blogs/hbgary-federal-ceo-aaron-barr-steps-down-022811, Accessed on 15 February 2012.

  146. 146.

    HBGary, http://en.wikipedia.org/wiki/Hb_gary, Accessed on 15 February 2012.

  147. 147.

    Anonymous attack on HBGary Federal didn’t ruin us, says HBGary CEO, http://www.networkworld.com/news/2011/120911-hbgary-anonymous-253924.html, Accessed on 15 February 2012.

  148. 148.

    HBGary’s Open Letter to Customers and the Defense Marketplace, http://www.infosecisland.com/blogview/13062-HBGarys-Open-Letter-to-Customers-and-the-Defense-Marketplace.html, Accessed on 15 February 2012.

  149. 149.

    Anonymous attack on HBGary Federal didn’t ruin us, says HBGary CEO, http://www.networkworld.com/news/2011/120911-hbgary-anonymous-253924.html, Accessed on 15 February 2012.

  150. 150.

    HBGary Federal CEO Aaron Barr Steps Down, http://threatpost.com/en_us/blogs/hbgary-federal-ceo-aaron-barr-steps-down-022811, Accessed on 15 February 2012.

  151. 151.

    Stratfor, http://www.stratfor.com/, Accessed on 15 February 2012.

  152. 152.

    http://imgur.com/QalSt, Accessed on 15 February 2012.

  153. 153.

    Hackers Will Be Disappointed in Stolen Emails, Says Stratfor CEO, http://www.msnbc.msn.com/id/45963111/ns/technology_and_science-security/t/hackers-will-be-disappointed-stolen-emails-says-stratfor-ceo/#.UL7apdd_U25, Accessed on 15 February 2012.

  154. 154.

    Stratfor Faces Lawsuit for Failing to Secure Customer Data, http://news.softpedia.com/news/Stratfor-Faces-Lawsuit-for-Failing-to-Secure-Customer-Data-251459.shtml, Accessed on 15 February 2012.

  155. 155.

    Stratfor Offers Customers Identity Theft Protection After Hack, http://www.forbes.com/sites/alexknapp/2011/12/30/stratfor-offers-customers-identity-theft-protection-after-hack/, Accessed on 15 February 2012.

  156. 156.

    Stratfor - Austin, TX - Publisher - Facebook, https://www.facebook.com/stratfor, Accessed on 15 February 2012.

  157. 157.

    Anonymous Leaks US Marine Corps Massacre Case, http://www.gizmodo.com.au/2012/02/anonymous-leaks-us-marine-corps-massacre-case/, Accessed on 15 February 2012.

  158. 158.

    Haditha killings, http://en.wikipedia.org/wiki/Haditha_killings, Accessed on 15 February 2012.

  159. 159.

    Anonymous reveals Haditha massacre emails, http://rt.com/usa/news/anonymous-time-wuterich-attorneys-463/, Accessed on 15 February 2012.

  160. 160.

    Bradley Manning, http://www.bradleymanning.org/learn-more/bradley-manning, Accessed on 15 February 2012.

  161. 161.

    Anonymous Leaks US Marine Corps Massacre Case, http://www.gizmodo.com.au/2012/02/anonymous-leaks-us-marine-corps-massacre-case/, Accessed on 15 February 2012.

  162. 162.

    Link no longer goes to specified page, http://cryptome.org/2012/01/wuterich/wuterich-politics.pdf, Accessed on 15 February 2012.

  163. 163.

    Anonymous May Have Completely Destroyed Military Law Firm, http://www.gizmodo.com.au/2012/02/anonymous-may-have-completely-destroyed-military-law-firm/#more-512210, Accessed on 15 February 2012.

  164. 164.

    Link no longer goes to specified page, http://theconversation.edu.au/www.puckettfaraj.com/, Accessed on 15 February 2012.

  165. 165.

    Anonymous hackers arrested across world, http://www.theaustralian.com.au/news/world/anonymous-hackers-arrested-across-world/story-e6frg6so-1226285008481, Accessed on 13 March 2012.

  166. 166.

    Anonymous, https://theconversation.edu.au/pages/anonymous, Accessed on 13 March 2012.

  167. 167.

    We Are Anonymous, We Are Legion, http://www.yalelawtech.org/anonymity-online-identity/we-are-anonymous-we-are-legion/, Accessed on 13 March 2012.

  168. 168.

    LulzSec Leader Sabu Unmasked, Aids FBI Hacker Sweep, http://www.informationweek.com/security/attacks/lulzsec-leader-sabu-unmasked-aids-fbi-ha/232602103, Accessed on 13 March 2012.

  169. 169.

    LulzSec, https://theconversation.edu.au/pages/lulzsec, Accessed on 13 March 2012.

  170. 170.

    Hacker Sabu Worked Nonstop As Government Informer, http://www.informationweek.com/security/vulnerabilities/hacker-sabu-worked-nonstop-as-government/232602334, Accessed on 13 March 2012.

  171. 171.

    EXCLUSIVE: Unmasking the world’s most wanted hacker, http://www.foxnews.com/tech/2012/03/06/exclusive-unmasking-worlds-most-wanted-hacker/?intcmp=related, Accessed on 13 March 2012.

  172. 172.

    Carl Jung, http://en.wikipedia.org/wiki/Carl_Jung, Accessed on 13 March 2012.

  173. 173.

    Masked Self: The Persona in Jungian Theory, http://directory.leadmaverick.com/Helping-Psychology/DallasFort-WorthArlington/TX/10/11154/index.aspx, Accessed on 13 March 2012.

  174. 174.

    Anonymousabu, https://twitter.com/search/anonymousabu, Accessed on 13 March 2012.

  175. 175.

    LulzSec arrests will do limited damage to hacktivist movement, https://theconversation.edu.au/lulzsec-arrests-will-do-limited-damage-to-hacktivist-movement-5753, Accessed on 13 March 2012.

  176. 176.

    Court documents shed light on extent of Anonymous and LulzSec activity, http://www.v3.co.uk/v3-uk/news/2157516/court-documents-shed-light-extent-anonymous-lulzsec-activity, Accessed on 13 March 2012.

  177. 177.

    Internet Relay Chat, http://en.wikipedia.org/wiki/Internet_Relay_Chat, Accessed on 13 March 2012.

  178. 178.

    AMA Request Sabu from LuLSec this would be amazing, http://www.reddit.com/r/IAmA/comments/kpfsp/ama_request_sabu_from_lulsec_this_would_be_amazing/, Accessed on 13 March 2012.

  179. 179.

    Hacker, Informant and Party Boy of the Projects, http://www.nytimes.com/2012/03/09/technology/hacker-informant-and-party-boy-of-the-projects.html?_r=1&, Accessed on 13 March 2012.

  180. 180.

    UNOFFICIAL ZERT PATCH CAUSES NYC PLANECRASH, http://seclists.org/fulldisclosure/2006/Oct/253, Accessed on 13 March 2012.

  181. 181.

    LulzSec Leader Was Snitch Who Helped Snag Fellow Hackers, http://www.wired.com/threatlevel/2012/03/lulzsec-snitch/, Accessed on 13 March 2012.

  182. 182.

    Anonymous Rocked by News That Top Hacker Snitched to Feds, http://www.wired.com/threatlevel/2012/03/anonymous-sabu-reaction/, Accessed on 13 March 2012.

  183. 183.

    Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground, http://www.amazon.com/Kingpin-Hacker-Billion-Dollar-Cybercrime-Underground/dp/0307588688, Accessed on 13 March 2012.

  184. 184.

    AMA Request Sabu from LuLSec this would be amazing, http://www.reddit.com/r/IAmA/comments/kpfsp/ama_request_sabu_from_lulsec_this_would_be_amazing/, Accessed on 13 March 2012.

  185. 185.

    Operations security, http://en.wikipedia.org/wiki/OPSEC, Accessed on 13 March 2012.

  186. 186.

    Fredericson B., Flickr, http://www.flickr.com/photos/xjrlokix/3932488768/, Accessed online 21 December 2012.

  187. 187.

    Anonymous, http://anonnews.org/, Accessed online 31 July 2012.

  188. 188.

    AAPT, http://www.aapt.com.au/, Accessed online 31 July 2012.

  189. 189.

    Connelley C., Anonymous hackers claim ISP user data stolen from AAPT, News Limited, 26 July 2012, http://www.news.com.au/technology/hacked-anonymous-steals-user-data-from-aussie-isp/story-e6frfro0-1226435629217, Accessed online 31 July 2012.

  190. 190.

    Connelley C., Anonymous hackers cripple Aussie government websites, News Limited, 25 July 2012, http://www.news.com.au/technology/anonymous-hackers-cripples-aussie-government-websites/story-e6frfro0-1226433788501. Accessed online 31 July 2012.

  191. 191.

    Internet Relay Chat, http://www.irc.org/, Accessed online 31 July 2012.

  192. 192.

    Ross N. and Main L., The ABC interviews Anonymous regarding AAPT hack, Australian Broadcasting Corporation, 26 July 2012, http://www.abc.net.au/technology/articles/2012/07/26/3554598.htm, Accessed online 31 July 2012.

  193. 193.

    Govt defends need to snoop on online and phone records, AAP, 12 July 2012, http://www.news.com.au/technology/govt-defends-need-to-keep-internet-data/story-e6frfro0-1226424390925, Accessed online 31 July 2012.

  194. 194.

    Parliamentary Joint Committee on Intelligence and Security, Australian Government, http://www.aph.gov.au/Parliamentary_Business/Committees/House_of_Representatives_Committees?url=pjcis/index.htm, Accessed online 31 July 2012.

  195. 195.

    Inquiry into potential reforms of National Security Legislation, Parliamentary Joint Committee on Intelligence and Security, Australian Government, http://www.aph.gov.au/Parliamentary_Business/Committees/House_of_Representatives_Committees?url=pjcis/nsl2012/index.htm, Accessed online 31 July 2012.

  196. 196.

    Skype, Microsoft, http://www.skype.com/, Accessed online 31 July 2012.

  197. 197.

    Slashdot, http://slashdot.org/, Accessed online 31 July 2012.

  198. 198.

    Microsoft makes Skype easier to monitor, Slashdot, 26 July 2012, http://yro.slashdot.org/story/12/07/26/2243206/microsoft-makes-skype-easier-to-monitor, Accessed online 31 July 2012.

  199. 199.

    People for Internet responsibility, http://www.pfir.org/, Accessed online 31 July 2012.

  200. 200.

    Timberg C. and Nakashima E., Skype makes chats and user data more available to police, Washington Post, 26 July 2012, http://www.washingtonpost.com/business/economy/skype-makes-chats-and-user-data-more-available-to-police/2012/07/25/gJQAobI39W_story.html?hpid=z1, Accessed online 31 July 2012.

  201. 201.

    Scragz, Flickr, http://www.flickr.com/photos/scragz/2340505105/, Accessed online 21 December 2012.

  202. 202.

    Telecommunications data retention, Wikipedia, http://en.wikipedia.org/wiki/Telecommunications_data_retention, Accessed online 31 July 2012.

  203. 203.

    Directive 2006/24/EC of the European Parliament and of the Council, European Union, 15 March 2006, http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2006:105:0054:0063:EN:PDF, Accessed online 31 July 2012.

  204. 204.

    Draft Communications Data Bill, UK Government, http://www.official-documents.gov.uk/document/cm83/8359/8359.pdf, Accessed online 31 July 2012.

  205. 205.

    Attorney General’s Department, Australian Government, http://www.ag.gov.au/Pages/default.aspx, Accessed online 31 July 2012.

  206. 206.

    Australian Security Intelligence Organisation, http://www.asio.gov.au/, Accessed online 31 July 2012.

  207. 207.

    Australian Secret Intelligence Service, Australian Government, http://www.asis.gov.au/, Accessed online 31 July 2012.

  208. 208.

    Defence Signals Directorate, Australian Government, http://www.dsd.gov.au/, Accessed online 31 July 2012.

  209. 209.

    Phair N., Last online of defence: why is ANZUS prepping for a cyber war?, The Conversation, 20 September 2011, https://theconversation.edu.au/last-online-of-defence-why-is-anzus-prepping-for-a-cyber-war-3418, Accessed online 31 July 2012.

  210. 210.

    Cullen S., Spy chief concerned by threat of cyber warfare, Australian Broadcasting Corporation, 19 July 2012, http://www.abc.net.au/news/2012-07-19/spy-service-reaches-pivotal-point/4141622, Accessed online 31 July 2012.

  211. 211.

    Cybercrime, Australian Federal Police, http://www.afp.gov.au/policing/cybercrime.aspx, Accessed online 31 July 2012.

  212. 212.

    Symantec, http://www.symantec.com/, Accessed online 31 July 2012.

  213. 213.

    Riley M. and Vance A., Inside the Chinese Boom in Corporate Espionage, Bloomberg, 15 March 2012, http://www.businessweek.com/articles/2012-03-14/inside-the-chinese-boom-in-corporate-espionage, Accessed online 31 July 2012.

  214. 214.

    Gregory M.A., SCAMwatch – a helping hand against online scammers, The Conversation, http://theconversation.edu.au/scamwatch-a-helping-hand-against-online-scammers-6842, 4 July 2012.

  215. 215.

    Gregory M.A., The internet is insecure – let’s build a better one, fast, The Conversation, http://theconversation.edu.au/the-internet-is-insecure-lets-build-a-better-one-fast-3977, 26 October 2011.

  216. 216.

    de Neef M., Zombie computers, cyber security, phishing … what you need to know, The Conversation, 3 June 2011, https://theconversation.edu.au/zombie-computers-cyber-security-phishing-what-you-need-to-know-1671, Accessed online 31 July 2012.

  217. 217.

    Ottawanonymous, Flickr, http://www.flickr.com/photos/24709063@N02/2435792032/, Accessed online 21 December 2012.

  218. 218.

    Australian Security Intelligence Organisation, Australian Government, http://www.asio.gov.au/, Accessed online 10 August 2012.

  219. 219.

    Defence Signals Directorate, Australian Government, http://www.dsd.gov.au/, Accessed online 10 August 2012.

  220. 220.

    OperationAustralia, Anonymous, https://twitter.com/Op_Australia/status/233718148367536128, Accessed online 10 August 2012.

  221. 221.

    Gregory M.A., Why is Anonymous hacking Australia?, The Conversation, 31 July 2012, https://theconversation.edu.au/why-is-anonymous-hacking-australia-8480, Accessed online 10 August 2012.

  222. 222.

    Inquiry into potential reforms of National Security Legislation, Joint Parliamentary Committee on Intelligence and Security, Australian Government, http://www.aph.gov.au/Parliamentary_Business/Committees/House_of_Representatives_Committees?url=pjcis/nsl2012/index.htm, Accessed online 10 August 2012.

  223. 223.

    Denial of Service attack, Wikipedia, http://en.wikipedia.org/wiki/Denial-of-service_attack, Accessed online 10 August 2012.

  224. 224.

    Connelly C., Anonymous hackers cripple Aussie government websites, News Limited, 25 July 2012, http://www.news.com.au/technology/anonymous-hackers-cripples-aussie-government-websites/story-e6frfro0-1226433788501, Accessed online 10 August 2012.

  225. 225.

    Australian Federal Police, http://www.afp.gov.au, Accessed online 10 August 2012.

  226. 226.

    Barwick H., Anonymous releases some AAPT data, CIO, 30 July 2012, http://www.cio.com.au/article/432044/anonymous_releases_some_aapt_data_/, Accessed online 10 August 2012.

  227. 227.

    Johnson K., ‘I want you’: Uncle Sam hiring criminal hackers, American Free Press, 4 July 2012, http://americanfreepress.net/?p=4863, Accessed online 10 August 2012.

  228. 228.

    Electronic Frontiers Australia, https://www.efa.org.au/, Accessed online 10 August 2012.

  229. 229.

    O’Keefe E. and Nakashima E., Cybersecurity bill fails in Senate, The Washington Post, 3 August 2012, http://www.washingtonpost.com/world/national-security/cybersecurity-bill-fails-in-senate/2012/08/02/gJQADNOOSX_story.html, Accessed online 10 August 2012.

  230. 230.

    Transport Layer Security, Wikipedia, http://en.wikipedia.org/wiki/Secure_Sockets_Layer, Accessed online 10 August 2012.

  231. 231.

    Simple Mail Transfer Protocol, Wikipedia, http://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocol, Accessed online 10 August 2012.

  232. 232.

    Gregory M.A., Why is Anonymous hacking Australia?, The Conversation, 31 July 2012, https://theconversation.edu.au/why-is-anonymous-hacking-australia-8480, Accessed online 10 August 2012.

  233. 233.

    Gregory M.A., Anonymous, child porn and the wild, wild web, The Conversation, 28 October 2011, http://theconversation.edu.au/anonymous-child-porn-and-the-wild-wild-web-4005, Accessed online 10 August 2012.

  234. 234.

    Gregory M.A., The internet is insecure – let’s build a better one, fast, The Conversation, 26 October 2011, http://theconversation.edu.au/the-internet-is-insecure-lets-build-a-better-one-fast-3977, Accessed online on 10 August 2012.

  235. 235.

    Subcircle, Flickr, http://www.flickr.com/photos/subcircle/500995147/, Accessed online 21 December 2012.

  236. 236.

    Australian Privacy Breach Notification, Australian Government, http://www.ag.gov.au/Consultationsreformsandreviews/Pages/Australian-Privacy-Breach-Notification.aspx, Accessed online on 19 October 2012.

  237. 237.

    Bita N., Australia Post in online privacy breach, News Limited, 19 October 2012, http://www.news.com.au/business/companies/australia-post-in-online-privacy-breach/story-fnda1bsz-1226498834454?sv=1684ecf6a51b387578fce1b3187fa84c&buffer_share=5b32d&utm_source=buffer, Accessed online on 19 October 2012.

  238. 238.

    Moses A., Telstra’s 734,000 account privacy blunder breached multiple laws: regulators, Fairfax Media, 29 June 2012, http://www.smh.com.au/it-pro/security-it/telstras-734000-account-privacy-blunder-breached-multiple-laws-regulators-20120629-2165z.html, Accessed online on 19 October 2012.

  239. 239.

    Cooper H., Defence under investigation over privacy breach, Australian Broadcasting Corporation, 6 March 2012, http://www.abc.net.au/news/2012-03-05/defence-under-investigation-over-privacy-breach/3870002, Accessed online on 19 October 2012.

  240. 240.

    Moses A., Paternity and drug test details leak online in privacy breach, Fairfax Media, 18 July 2011, http://www.smh.com.au/technology/security/paternity-and-drug-test-details-leak-online-in-privacy-breach-20110718-1hkyn.html, Accessed online on 19 October 2012.

  241. 241.

    New privacy protection on the cards, Attorney-General Department, Australian Government, 17 October 2012, http://www.attorneygeneral.gov.au/Media-releases/Pages/2012/Fourth%20Quarter/17October2012-Newprivacyprotectiononthecards.aspx, Accessed online on 19 October 2012.

  242. 242.

    Data breach notification, Office of the Australian Information Commissioner, Australian Government, April 2012, http://www.oaic.gov.au/publications/guidelines/privacy_guidance/data_breach_notification_guide_april2012.html, Accessed online on 19 October 2012.

  243. 243.

    Media release: Privacy Commissioner supports the release of mandatory data breach notification discussion paper, Office of the Australian Information Commissioner, Australian Government, 17 October 2012, http://www.oaic.gov.au/news/media_releases/media_release_121017_mdbn_paper.html, Accessed online on 19 October 2012.

  244. 244.

    Moses A., Thousands of privacy breaches going unreported, Fairfax Media, 27 July 2012, http://www.theage.com.au/technology/technology-news/thousands-of-privacy-breaches-going-unreported-20110727-1hzes.html, Accessed online on 19 October 2012.

  245. 245.

    Harrison D. and Grubb B., Roxon proposes compulsory reporting of online privacy breaches, Fairfax Media, 17 October 2012, http://www.smh.com.au/it-pro/security-it/roxon-proposes-compulsory-reporting-of-online-privacy-breaches-20121017-27qf0.html, Accessed online on 19 October 2012.

  246. 246.

    Grubb B., Infamous hacker’s grim warning for Australia, Fairfax Media, 9 August 2012, http://www.smh.com.au/it-pro/security-it/infamous-hackers-grim-warning-for-australia-20120801-23efy.html, Accessed online on 19 October 2012.

  247. 247.

    Colley A., Banks seek to hide privacy breaches from customers, News Limited, 19 October 2012, http://www.theaustralian.com.au/australian-it/government/banks-seek-to-hide-privacy-breaches-from-customers/story-fn4htb9o-1226498999294, Accessed online on 19 October 2012.

  248. 248.

    Media release: Privacy Commissioner supports the release of mandatory data breach notification discussion paper, Office of the Australian Information Commissioner, Australian Government, 17 October 2012, http://www.oaic.gov.au/news/media_releases/media_release_121017_mdbn_paper.html, Accessed online on 19 October 2012.

  249. 249.

    Intrusion detection system, Wikipedia, http://en.wikipedia.org/wiki/Intrusion_detection_system, Accessed online on 19 October 2012.

  250. 250.

    Moses A., PlayStation hack: 1.5M Aussie accounts exposed, Fairfax Media, 2 May 2011, http://www.smh.com.au/digital-life/games/playstation-hack-15m-aussie-accounts-exposed-20110502-1e3pc.html, Accessed online on 19 October 2012.

  251. 251.

    Hearn L., Privacy watchdog probes Google’s Wi-Fi data harvest, Fairfax Media, 19 May 2010, http://www.smh.com.au/technology/technology-news/privacy-watchdog-probes-googles-wifi-data-harvest-20100519-vckv.html, Accessed online on 19 October 2012.

  252. 252.

    Australian Privacy Breach Notification, Attorney-General Department, Australian Government, http://www.ag.gov.au/Consultationsreformsandreviews/Pages/Australian-Privacy-Breach-Notification.aspx, Accessed online on 19 October 2012.

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Gregory, M.A., Glance, D. (2013). Hacking. In: Security and the Networked Society. Springer, Cham. https://doi.org/10.1007/978-3-319-02390-8_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-02390-8_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-02389-2

  • Online ISBN: 978-3-319-02390-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics