top of page
Crystal Salt

Our ource 

1- https://abcnews.go.com/Technology/GadgetGuide/story?id=4194143

 

2- https://www.expressvpn.com/blog/brief-history-of-anonymous/

 

3- https://www.dazeddigital.com/artsandculture/article/16360/1/a-history-of-the-anonymous-mask

 

4- https://resources.infosecinstitute.com/topic/a-history-of-anonymous/

 

5- https://www.virginiabusinesslitigationlawyer.com/proving-unauthorized-access-to-private-data-under-the-sca/#:~:text=The%20SCA%20establishes%20a%20criminal,access%20to%20a%20wire%20or

6- https://ocw.mit.edu/courses/comparative-media-studies-writing/21w-784-becoming-digital-writing-about-media-change-fall-2009/units/mob-mentality-4chan-vs.-scientology/MIT21W_784F09_Anonymous_pr.pdf

 

7- https://www.findlaw.com/criminal/criminal-charges/hacking-laws-and-punishments.html

 

 

8- https://www.theguardian.com/world/2010/dec/31/anonymous-hackers-zimbabwe-wikileaks

 

 

9- https://www.hackread.com/anonymous-ddos-zimbabwe-government-sites/

 

10- https://www.theatlantic.com/technology/archive/2011/12/hacks-mattered-year-hack/333755/

 

11- https://www.nbcnews.com/id/wbna41280813

 

12- https://www.loc.gov/item/global-legal-monitor/2018-10-05/egypt-president-ratifies-anti-cybercrime-law/#:~:text=Under%20article%2020%2C%20individuals%20convicted,punishable%20under%20the%20new%20law.

 

13- https://globalvoices.org/2011/01/03/tunisia-anonymous-vs-ammar-who-wins-the-battle-of-censorship/

 

14- file:///Users/ibrahimbadawy/Downloads/Cybercrime_in_Tunisia_Tackling_Legal_Str.pdf

 

15- https://www.difesaesicurezza.com/en/cyber-en/sudan-anonymous-declares-war-on-the-military-junta/

 

 

16- https://iicybersecurity.wordpress.com/2015/08/21/anonymous-hacks-south-african-government-contractor-for-opmonsanto/

 

 

17- https://cybercrimesact.co.za/section-2-unlawful-access/

 

 

18- https://www.refworld.org/pdfid/4dad51bd0.pdf

 

19- https://www.nationsonline.org/oneworld/uganda.htm

 

20- https://summitcl.com/wp-content/uploads/2017/01/Challenges-of-Implementing-Cyber-laws-in-Uganda.pdf

 

21- https://www.coe.int/en/web/octopus/country-wiki-ap/-/asset_publisher/CmDb7M4RGb4Z/content/nigeria/pop_up?_101_INSTANCE_CmDb7M4RGb4Z_viewMode=print&_101_INSTANCE_CmDb7M4RGb4Z_languageId=en_GB

 

22- Exploring the use and the role of the Internet in Libya: A study of Tripoli University and Azzaway University students By Mohamed O. A. Gharssalla MA: Stendhal Grenoble 3, France 2003 BA: Sanaa University, Yemen 1997 November 2018 page 23

 

 

23- https://cms.law/en/int/expert-guides/cms-expert-guide-to-data-protection-and-cyber-security-laws/algeria#:~:text=As%20regard%20to%20the%20security,related%20to%20cybersecurity%20in%20Algeria.

 

24- https://www.nationsonline.org/oneworld/kenya.htm

https://www.hackread.com/anonymous-hacks-kenya-ministry-foreign-affairs/

bottom of page