{"id":1636,"date":"2016-11-30T10:41:40","date_gmt":"2016-11-30T15:41:40","guid":{"rendered":"https:\/\/intergentes.com\/fr\/hacktivism-online-illegality\/"},"modified":"2016-11-30T10:41:40","modified_gmt":"2016-11-30T15:41:40","slug":"hacktivism-online-illegality","status":"publish","type":"post","link":"https:\/\/intergentes.com\/fr\/hacktivism-online-illegality\/","title":{"rendered":"Hacktivism and Online (Il)legality"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div class=\"nolwrap\">[vc_row][vc_column][vc_column_text]\n<h6>Photo:\u00a0<a href=\"https:\/\/www.flickr.com\/photos\/thales\/5591815439\/in\/photolist-9w8vV2-9Zv2Cj-cSG4j3-qvAwH2-5Ura2y-7P4WpN-dxVce2-cpz7AC-aahx51-Ay3Jei-iq7MR3-b2ReJF-5LkuqN-a36z79-oAdsKM-o3c1RE-cQgK2N-dkTBYf-4jbJhy-4PjDDq-oWSGaH-oBnGyH-7pedPK-pAUdDN-qRU9rb-4SmTST-4xyTCd-3hRD5g-7CYBPS-diisrf-dBHAUy-f4eBag-iu33RQ-BBPpxC-pWdjcf-f4tGiG-pombw4-avJTSK-7nGwWa-dVC3R7-8WuVnU-9KpcY5-dQJfCb-zrZXgZ-9aSmfp-6KTRqG-osb2c5-7JvjxV-8VjjU6-9ATp7i\" target=\"_blank\">Meanwhile&#8230;<\/a> by <a href=\"https:\/\/www.flickr.com\/photos\/thales\/\" target=\"_blank\">Thales<\/a><\/h6>\n[\/vc_column_text][mk_divider style=\u00a0\u00bbpadding_space\u00a0\u00bb margin_top=\u00a0\u00bb7&Prime; margin_bottom=\u00a0\u00bb0&Prime;][\/vc_column][\/vc_row][vc_row][vc_column width=\u00a0\u00bb2\/3&Prime; css=\u00a0\u00bb.vc_custom_1447024828222{padding-right: 30px !important;}\u00a0\u00bb][vc_column_text]<iframe loading=\"lazy\" src=\"https:\/\/w.soundcloud.com\/player\/?url=https%3A\/\/api.soundcloud.com\/tracks\/294758205&amp;color=00aabb&amp;auto_play=false&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&amp;show_artwork=false&amp;buying=false\" width=\"100%\" height=\"166\" frameborder=\"no\" scrolling=\"no\"><\/iframe><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">In the first podcast produced by Inter Gentes, we look at the phenomenon of hacktivism and its relationship to the legal norms surrounding computer use. <!--more Listen -->We use the actions of Anonymous against Daesh in response to the November 2015 attacks in Paris as a springboard, inviting anthropologist Gabriella Coleman to discuss the history and nature of Anonymous, its relationship to legal frameworks, and what its future as a movement might look like. We then speak with Lex Gill, <\/span><span style=\"font-weight: 400;\">co-author of \u00ab\u00a0Towards digital constitutionalism? Mapping attempts to craft an Internet Bill of Rights,\u00a0\u00bb a working paper of the Berkman Klein Center, who illuminates for us some of the currents, issues, and potentials in the crafting of norms in relation to internet use.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">This podcast was written, researched, and produced by Annette Angell, Amanda Ghahremani, and Tobin Lippold, with music by Tobin Lippold.<\/span><\/p>\n<p>Further resources:<\/p>\n<p><span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.versobooks.com\/books\/2027-hacker-hoaxer-whistleblower-spy\" target=\"_blank\"><em>Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous<\/em>, by Gabriella Coleman<\/a><\/span><\/p>\n<p><span style=\"text-decoration: underline;\"><a href=\"https:\/\/cyber.harvard.edu\/node\/99209\" target=\"_blank\">\u00ab\u00a0Towards Digital Constitutionalism? Mapping Attempts to Craft an Internet Bill of Rights,\u00a0\u00bb by Lex Gill, Dennis Redeker, and Urs Gasser<\/a><\/span><\/p>\n<p><span style=\"text-decoration: underline;\"><a href=\"http:\/\/www.mirror.co.uk\/news\/world-news\/anonymous-declares-war-islamic-state-6839030\" target=\"_blank\">Anonymous declares war on Islamic State after Paris attacks in chilling video: &lsquo;We will hunt you down&rsquo;<\/a><\/span><\/p>\n<p><span style=\"text-decoration: underline;\"><a href=\"http:\/\/www.ibtimes.com\/anonymous-hacking-isis-warns-collaborating-us-government-deeply-stupid-2226066\" target=\"_blank\">Anonymous Is Hacking ISIS, But Warns Collaborating With US Government Is &lsquo;Deeply Stupid&rsquo;<\/a><\/span><\/p>\n<p><span style=\"text-decoration: underline;\"><a href=\"http:\/\/www.businessinsider.com\/lulzsec-hacker-mustafa-al-bassam-has-joined-a-security-company-2016-3\" target=\"_blank\">LulzSec hacker Mustafa Al-Bassam has joined a payments company to work on blockchain<\/a><\/span><\/p>\n<p><span style=\"text-decoration: underline;\"><a href=\"http:\/\/s.telegraph.co.uk\/graphics\/projects\/hacker-lauri-love-extradition\/\" target=\"_blank\">The full story of Lauri Love&rsquo;s fight against extradition<\/a><\/span>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; css=\u00a0\u00bb.vc_custom_1447025172619{padding-top: 35px !important;padding-right: 35px !important;padding-bottom: 35px !important;padding-left: 35px !important;background: #eae5e1 url(https:\/\/intergentes.com\/wp-content\/uploads\/2015\/11\/ricepaper_v3.png?id=691) !important;}\u00a0\u00bb][vc_column_text]\n<h2 style=\"text-align: center;\">Guest Bios<\/h2>\n<p style=\"text-align: center;\"><a href=\"https:\/\/intergentes.com\/wp-content\/uploads\/2016\/11\/15837092652_7213ae9276_o.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1595 \" src=\"https:\/\/intergentes.com\/wp-content\/uploads\/2016\/11\/15837092652_7213ae9276_o-200x300.jpg\" alt=\"\" width=\"218\" height=\"327\" \/><\/a><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Gabriella (Biella) Coleman holds the Wolfe Chair in Scientific and Technological Literacy <\/span><a href=\"http:\/\/www.mcgill.ca\/ahcs\/people-contacts\/faculty\/gabriella-coleman\"><span style=\"font-weight: 400;\">at McGill University.<\/span><\/a><span style=\"font-weight: 400;\"> Trained as an anthropologist, her scholarship explores the intersection of the <\/span><a href=\"http:\/\/culturedigitally.org\/wp-content\/uploads\/2016\/07\/Coleman-2016-Hacker-Digital-Keywords-Peters-ed.pdf\"><span style=\"font-weight: 400;\">cultures of hacking and politics<\/span><\/a><span style=\"font-weight: 400;\">, with a focus on the sociopolitical implications of the free software movement and the digital protest ensemble Anonymous.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">She has authored two books, <\/span><a href=\"http:\/\/www.amazon.com\/Coding-Freedom-Ethics-Aesthetics-Hacking\/dp\/0691144613\/ref=sr_1_1?ie=UTF8&amp;qid=1419086140&amp;sr=8-1&amp;keywords=Coding+Freedom\"><span style=\"font-weight: 400;\">Coding Freedom: The Ethics and Aesthetics of Hacking<\/span><\/a><span style=\"font-weight: 400;\"> (Princeton University Press, 2012) and <\/span><a href=\"http:\/\/www.versobooks.com\/books\/1749-hacker-hoaxer-whistleblower-spy\"><span style=\"font-weight: 400;\">Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous<\/span><\/a><span style=\"font-weight: 400;\"> (Verso, 2014), which was named to <\/span><a href=\"https:\/\/www.kirkusreviews.com\/lists\/best-current-affairs-books-2014\/hacker-hoaxer-whistleblower-spy\/\"><span style=\"font-weight: 400;\">Kirkus Reviews\u2019Best Books of 2014<\/span><\/a><span style=\"font-weight: 400;\"> and was awarded the <\/span><a href=\"http:\/\/blog.castac.org\/2015\/10\/2015-forsythe\/\"><span style=\"font-weight: 400;\">Diana Forsythe Prize by the American Anthropological Association<\/span><\/a><span style=\"font-weight: 400;\">. Her work has been featured in numerous scholarly journals and edited volumes. Committed to public ethnography, she routinely presents her work to <\/span><a href=\"http:\/\/livestream.com\/internetsociety\/hopeconf\/videos\/130645379\"><span style=\"font-weight: 400;\">diverse audiences<\/span><\/a><span style=\"font-weight: 400;\">, teaches undergraduate and graduate courses, and has written for popular media outlets, including the New York Times, Slate, Wired, MIT Technology Review, Huffington Post, and the Atlantic. She sits on the board of <\/span><a href=\"https:\/\/equalit.ie\/\"><span style=\"font-weight: 400;\">Equalitie<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/www.torproject.org\/\"><span style=\"font-weight: 400;\">The Tor Project<\/span><\/a><span style=\"font-weight: 400;\">, and <\/span><a href=\"https:\/\/www.ncwit.org\/alliances\/ssab\"><span style=\"font-weight: 400;\">the Social Science Advisory Board of the National Center for Women and Information Technology.<\/span><\/a><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/intergentes.com\/wp-content\/uploads\/2016\/11\/lgill-biopic.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1598 \" src=\"https:\/\/intergentes.com\/wp-content\/uploads\/2016\/11\/lgill-biopic-300x298.png\" alt=\"\" width=\"221\" height=\"219\" \/><\/a><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Lex Gill was the 2017 Google Policy Fellow at the Canadian Internet Policy and Public Interest Clinic (CIPPIC), where her work focused on digital freedom of expression, intermediary liability, and invasive police surveillance technologies (notably including IMSI Catchers\/cell-site simulators). She is also a former affiliate to the Berkman Klein Center, where she produced research on Internet governance, blockchain technology, and civil liberties in the digital sphere. Lex is a co-author to a Berkman working paper entitled \u00ab\u00a0Towards digital constitutionalism? Mapping attempts to craft an Internet Bill of Rights.\u00a0\u00bb<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">She is currently a researcher for the Canadian Civil Liberties Association&rsquo;s Privacy, Technology, and Surveillance Project. In that role, she supports the organization&rsquo;s efforts to map institutions, practices, and civil liberties impacts of state surveillance in Canada. Her recent academic work has focused on the constitutional problems raised by compelled decryption in the United States and Canada as well as the role of metaphor in the law&rsquo;s understanding of new technologies. Lex is based in Montr\u00e9al and is set to graduate from the B.C.L. \/ LL.B. program at McGill University&rsquo;s Faculty of Law in Spring 2017.<\/span><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row]\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text] Photo:\u00a0Meanwhile&#8230; by Thales [\/vc_column_text][mk_divider style=\u00a0\u00bbpadding_space\u00a0\u00bb margin_top=\u00a0\u00bb7&Prime; margin_bottom=\u00a0\u00bb0&Prime;][\/vc_column][\/vc_row][vc_row][vc_column width=\u00a0\u00bb2\/3&Prime; css=\u00a0\u00bb.vc_custom_1447024828222{padding-right: 30px !important;}\u00a0\u00bb][vc_column_text] In the first podcast produced by Inter Gentes, we look at the phenomenon of hacktivism and its relationship to the legal norms surrounding computer use.<\/p>\n","protected":false},"author":3,"featured_media":1574,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[95],"tags":[],"class_list":["post-1636","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-podcast-fr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hacktivism and Online (Il)legality - Inter Gentes<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/intergentes.com\/fr\/hacktivism-online-illegality\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacktivism and Online (Il)legality - Inter Gentes\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][vc_column_text] Photo:\u00a0Meanwhile&#8230; by Thales [\/vc_column_text][mk_divider style=\u00a0\u00bbpadding_space\u00a0\u00bb margin_top=\u00a0\u00bb7&Prime; margin_bottom=\u00a0\u00bb0&Prime;][\/vc_column][\/vc_row][vc_row][vc_column width=\u00a0\u00bb2\/3&Prime; css=\u00a0\u00bb.vc_custom_1447024828222{padding-right: 30px !important;}\u00a0\u00bb][vc_column_text] In the first podcast produced by Inter Gentes, we look at the phenomenon of hacktivism and its relationship to the legal norms surrounding computer use.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/intergentes.com\/fr\/hacktivism-online-illegality\/\" \/>\n<meta property=\"og:site_name\" content=\"Inter Gentes\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-30T15:41:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/intergentes.com\/wp-content\/uploads\/2016\/11\/5591815439_5f54a723b7_o-1024x1024.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/intergentes.com\\\/fr\\\/hacktivism-online-illegality\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/intergentes.com\\\/fr\\\/hacktivism-online-illegality\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Hacktivism and Online (Il)legality\",\"datePublished\":\"2016-11-30T15:41:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/intergentes.com\\\/fr\\\/hacktivism-online-illegality\\\/\"},\"wordCount\":685,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/intergentes.com\\\/fr\\\/hacktivism-online-illegality\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/intergentes.com\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/5591815439_5f54a723b7_o.jpg\",\"articleSection\":[\"Podcast\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/intergentes.com\\\/fr\\\/hacktivism-online-illegality\\\/\",\"url\":\"https:\\\/\\\/intergentes.com\\\/fr\\\/hacktivism-online-illegality\\\/\",\"name\":\"Hacktivism and Online (Il)legality - Inter Gentes\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/intergentes.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/intergentes.com\\\/fr\\\/hacktivism-online-illegality\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/intergentes.com\\\/fr\\\/hacktivism-online-illegality\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/intergentes.com\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/5591815439_5f54a723b7_o.jpg\",\"datePublished\":\"2016-11-30T15:41:40+00:00\",\"author\":{\"@id\":\"\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/intergentes.com\\\/fr\\\/hacktivism-online-illegality\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/intergentes.com\\\/fr\\\/hacktivism-online-illegality\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/intergentes.com\\\/fr\\\/hacktivism-online-illegality\\\/#primaryimage\",\"url\":\"https:\\\/\\\/intergentes.com\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/5591815439_5f54a723b7_o.jpg\",\"contentUrl\":\"https:\\\/\\\/intergentes.com\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/5591815439_5f54a723b7_o.jpg\",\"width\":2648,\"height\":1765},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/intergentes.com\\\/fr\\\/hacktivism-online-illegality\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/intergentes.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacktivism and Online (Il)legality\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/intergentes.com\\\/#website\",\"url\":\"https:\\\/\\\/intergentes.com\\\/\",\"name\":\"Inter Gentes\",\"description\":\"The McGill Journal of International Law &amp; Legal Pluralism\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/intergentes.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\\\/\\\/intergentes.com\\\/fr\\\/author\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacktivism and Online (Il)legality - Inter Gentes","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/intergentes.com\/fr\/hacktivism-online-illegality\/","og_locale":"fr_FR","og_type":"article","og_title":"Hacktivism and Online (Il)legality - Inter Gentes","og_description":"[vc_row][vc_column][vc_column_text] Photo:\u00a0Meanwhile&#8230; by Thales [\/vc_column_text][mk_divider style=\u00a0\u00bbpadding_space\u00a0\u00bb margin_top=\u00a0\u00bb7&Prime; margin_bottom=\u00a0\u00bb0&Prime;][\/vc_column][\/vc_row][vc_row][vc_column width=\u00a0\u00bb2\/3&Prime; css=\u00a0\u00bb.vc_custom_1447024828222{padding-right: 30px !important;}\u00a0\u00bb][vc_column_text] In the first podcast produced by Inter Gentes, we look at the phenomenon of hacktivism and its relationship to the legal norms surrounding computer use.","og_url":"https:\/\/intergentes.com\/fr\/hacktivism-online-illegality\/","og_site_name":"Inter Gentes","article_published_time":"2016-11-30T15:41:40+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/intergentes.com\/wp-content\/uploads\/2016\/11\/5591815439_5f54a723b7_o-1024x1024.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/intergentes.com\/fr\/hacktivism-online-illegality\/#article","isPartOf":{"@id":"https:\/\/intergentes.com\/fr\/hacktivism-online-illegality\/"},"author":{"name":"","@id":""},"headline":"Hacktivism and Online (Il)legality","datePublished":"2016-11-30T15:41:40+00:00","mainEntityOfPage":{"@id":"https:\/\/intergentes.com\/fr\/hacktivism-online-illegality\/"},"wordCount":685,"commentCount":0,"image":{"@id":"https:\/\/intergentes.com\/fr\/hacktivism-online-illegality\/#primaryimage"},"thumbnailUrl":"https:\/\/intergentes.com\/wp-content\/uploads\/2016\/11\/5591815439_5f54a723b7_o.jpg","articleSection":["Podcast"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/intergentes.com\/fr\/hacktivism-online-illegality\/","url":"https:\/\/intergentes.com\/fr\/hacktivism-online-illegality\/","name":"Hacktivism and Online (Il)legality - Inter Gentes","isPartOf":{"@id":"https:\/\/intergentes.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/intergentes.com\/fr\/hacktivism-online-illegality\/#primaryimage"},"image":{"@id":"https:\/\/intergentes.com\/fr\/hacktivism-online-illegality\/#primaryimage"},"thumbnailUrl":"https:\/\/intergentes.com\/wp-content\/uploads\/2016\/11\/5591815439_5f54a723b7_o.jpg","datePublished":"2016-11-30T15:41:40+00:00","author":{"@id":""},"breadcrumb":{"@id":"https:\/\/intergentes.com\/fr\/hacktivism-online-illegality\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/intergentes.com\/fr\/hacktivism-online-illegality\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/intergentes.com\/fr\/hacktivism-online-illegality\/#primaryimage","url":"https:\/\/intergentes.com\/wp-content\/uploads\/2016\/11\/5591815439_5f54a723b7_o.jpg","contentUrl":"https:\/\/intergentes.com\/wp-content\/uploads\/2016\/11\/5591815439_5f54a723b7_o.jpg","width":2648,"height":1765},{"@type":"BreadcrumbList","@id":"https:\/\/intergentes.com\/fr\/hacktivism-online-illegality\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/intergentes.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Hacktivism and Online (Il)legality"}]},{"@type":"WebSite","@id":"https:\/\/intergentes.com\/#website","url":"https:\/\/intergentes.com\/","name":"Inter Gentes","description":"The McGill Journal of International Law &amp; Legal Pluralism","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/intergentes.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"","url":"https:\/\/intergentes.com\/fr\/author\/"}]}},"_links":{"self":[{"href":"https:\/\/intergentes.com\/fr\/wp-json\/wp\/v2\/posts\/1636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/intergentes.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/intergentes.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/intergentes.com\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/intergentes.com\/fr\/wp-json\/wp\/v2\/comments?post=1636"}],"version-history":[{"count":0,"href":"https:\/\/intergentes.com\/fr\/wp-json\/wp\/v2\/posts\/1636\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/intergentes.com\/fr\/wp-json\/wp\/v2\/media\/1574"}],"wp:attachment":[{"href":"https:\/\/intergentes.com\/fr\/wp-json\/wp\/v2\/media?parent=1636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/intergentes.com\/fr\/wp-json\/wp\/v2\/categories?post=1636"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/intergentes.com\/fr\/wp-json\/wp\/v2\/tags?post=1636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}