Juvenile Discourse

Crackers are criticized for their unethical hacking, but in fact the practices of both crackers and hackers are often juvenile. This reduces their potential for political resistance. There are differences between hackers and crackers that help hackers maintain their status and which they try to use to protect themselves from prosecution. Crackers and people striving to join the hacker elite have developed an alternative sub-culture. One method inexperienced people use to get into elite circles is to employ a hacker dialect. However, hackers resist attempts by crackers to bridge the boundary, because they need to have scapegoats to maintain their position.

Status and Conflict (White vs. Black Hats)

Status is very important in the computer underground and experienced hackers want to guard theirs’ against the newcomers. Hacker turnover is very rapid because of the short frame in which typical people will hack, and the high rate of technological change. Many people will only hack for several years, until they get busted, retire, or go to college, and thus there is always a relatively large influx of newcomers. As shown above in the Phrack interviews, some of the nostalgic discourse which is mentioned in more detail below comes to play within the hacking community, as the older hackers revere the "good old days," which may be as recent as the late eighties or early nineties.

‘Elite’ is actually used more outside of hacker circles, but it still exists within the hacker community as a way of identifying who has the highest status. If you are elite then you would have access to private BBSes (which often required recommendations before they would give you a username), or to a special sub-board on a BBS which was otherwise hidden, to a private FTP site (with "special" files), and to chat sessions. Distinguishing between the "elite" and "lamers" also allowed hackers a measure of protection against undercover law enforcement by limiting the people they would discuss hacking techniques, and more critically specific exploits, with to fellow hackers. But it was primarily used as a status boundary.


Index
Introduction
Theoretical Framework
Methodology
Hacking History
Phone Hacking
What is Hacking?
Juvenile Discourse, Black Hats, and White Hats
Hacker Language
Juvenility and Carding
Problems with the White Hat Hacking Discourse
Nostalgic Discourse
Problems with the Nostalgic Discourse
Law Enforcement and Computer Security Discourse
The Legal Discourse
Problems with the Law Enforcement Discourse
Media Discourse
Technopower
Hackers as Resistance (illegal and legal)
Limitations to Resistance
Conclusion
Works Cited