Works Cited

CandyMan. Online definitions, http://www.mgmua.com/hackers/inventory/definitions.html.

Crash, Doctor. "The Techno-Revolution." Phrack, 1 (6), 1986.

Deane, Joel. "Has Back Orifice gone legit?" http://www.zdnet.com/pcweek/stories/news/0,4153,1015473,00.html, ZDNET: July 12, 1999.

Dibbel, Julian. "The Prisoner: Phiber Optik Goes Directly to Jail." Online Village Voice article, http://www.levity.com/julian/phiber.html, 1994.

"electrohippies website." http://www.greennet.org.uk/ehippies/, 1999.

"Falling Through the Net: Defining the Digital Divide." Online Report, http://www.ntia.doc.gov/ntiahome/fttn99/contents.html, 1999.

Gibson, William. Neuromancer. Electronic book, http://www.cyberpunkproject.org/idb/gibson_neuromancer.html, 1984.

Gilboa, Netta. Interview of Erik Bloodaxe. Online, http://www.eff.org/pub/Privacy/Security/Hacking_cracking_phreaking/Net_culture_and_hacking/Hackers/bloodaxe-goggans_94.interview, 1994.

Hafner, Katie and John Markoff. Cyberpunk: Outlaws and Hackers on the Computer Frontier. New York: Simon & Schuster, 1991.

"Human Development Report." Online report, http://www.undp.org/hdro/, 1999.

Jordan, Tim and Paul Taylor. "A Sociology of Hackers." The Sociological Review, 46 (4), 1998, 757-780.

"Lamer Speak." Online text file, http://www.fwi.uva.nl/~mes/jargon/l/Lamer-speak.html, 1996.

Levy, Steven. Hackers: Heroes of the Computer Revolution. Electronic book, ftp://sailor.gutenberg.org/pub/gutenberg/etext96/hckrs10.txt, 1984.

Mentor, The. "The Conscience of a Hacker." Phrack, 1 (7), 1986.

Phrack. Online electronic journal, http://www.phrack.com. Issues 1 – 55 : 1985-1999.

Meyer, Gordon R. "The Social Organization of The Computer Underground." Online Masters Thesis, http://www.eff.org/pub/Privacy/Security/Hacking_cracking_phreaking/Net_culture_and_hacking/Hackers/soc_org_of_comp_underground.paper, 1989.

Mizrach, Steve. "Old Hackers, New Hackers: What's the Difference?" Online essay, http://www.eff.org/pub/Privacy/Security/Hacking_cracking_phreaking/Net_culture_and_hacking/Hackers/old_and_new_hackers.article.

Online Congressional Testimony. http://eff.bilkent.edu.tr/pub/GII_NII/Commerce_online/Digital_money/Crypto_misc/Computer_security/markey_goldstein.testimony, 1993.

Raymond, Eric S. "A Brief History of Hackerdom." Online essay, http://www.tuxedo.org/~esr/writings/hacker-history/hacker-history.html, 1999.

Robin, Michael. "Technology For The Coming Millennium." Interview of Kirkpatrick Sale. Online, http://www.gn.apc.org/pmhp/dc/activism/saleludd.htm, 1996.

Sterling, Bruce. The Hacker Crackdown. Electronic book, ftp://uiarchive.cso.uiuc.edu/pub/etext/gutenberg/etext94/hack11a.txt, 1994.

Stoll, Clifford. "Stalking the wily hacker." Online journal article, http://www.eff.org/pub/Privacy/Security/Hacking_cracking_phreaking/Net_culture_and_hacking/Hackers/stalking_the_wily_hacker.article, 1984.

Trigaux, Robert. "A history of hacking." St. Petersburg Times Online, http://www.sptimes.com/Hackers/history.hacking.html, 1998.

Van Slambrouck, Paul. "Cyber threats: How serious?" Christian Science Monitor, 03/09/98, p. 1.

 


Index
Introduction
Theoretical Framework
Methodology
Hacking History
Phone Hacking
What is Hacking?
Juvenile Discourse, Black Hats, and White Hats
Hacker Language
Juvenility and Carding
Problems with the White Hat Hacking Discourse
Nostalgic Discourse
Problems with the Nostalgic Discourse
Law Enforcement and Computer Security Discourse
The Legal Discourse
Problems with the Law Enforcement Discourse
Media Discourse
Technopower
Hackers as Resistance (illegal and legal)
Limitations to Resistance
Conclusion
Works Cited