HACKING HACKERS Mcmaster UNIVERSITY LIBRARY HACKING HACKERS

Total Page:16

File Type:pdf, Size:1020Kb

HACKING HACKERS Mcmaster UNIVERSITY LIBRARY HACKING HACKERS HACKING HACKERS McMASTER UNIVERSITY LIBRARY HACKING HACKERS: ETHNOGRAPHIC INSIGHTS INTO THE HACKER SUBCULTURE­ DEFINITION, IDEOLOGY AND ARGOT By STEVEN WILLIAM KLEINKNECHT, B.A. A Thesis Submitted to the School of Graduate Studies in Pmiial Fulfillment of the Requirements for the Degree Master of Arts McMaster University © Copyright by Steven William Kleinknecht, July 2003 MASTER OF ARTS (2003) McMaster University (Sociology) Hamilton, Ontario TITLE: Hacking Hackers: Etlmographic Insights into the Hacker Subculture­ Definition, Ideology and Argot AUTHOR: Steven W. Kleinknecht, B.A (University of Waterloo) SUPERVISOR: Professor William Shaffir NUMBER OF PAGES: vii, 191 ii ABSTRACT While media presentation of hackers and other members of the "computer underground" tend to be pejorative, such representations are often based solely on the viewpoints of "outsiders." As such, society is presented with an image of the hacker subculture that fails to examine the meanings hackers attribute to their activities. Employing symbolic interactionist theory and taking an ethnographic approach to understand the experiences and activities of hackers, this thesis has sought to examine and analyse various characteristics of the hacker subculture. Information pertaining to how hackers define themselves and their activities, the principles underlying the hacker ideology and the distinctive elements of the hacker language constituted the main focus of this thesis. Fifteen semi-structured interviews were conducted with self-defined hackers and fieldwork was undertaken to collect data on and off the Internet during hacker meetings and interactions, and from hacker news groups, web sites, and subcultural pUblications. Findings from this thesis reveal that the hacker subculture is quite complex and is socially constmcted through small-group interactions in various local subcultures that, while dissimilar in some respects, identify with characteristics of the transnational hacker subculture. Along with the application of role labels, adopting the hacker ideology and argot serve as identifying traits, which are used to situate different subcategories of hackers within the subculture in terms oftheir status, skill and the perceived ethics of their activities. Condemning "inaccurate" media portrayals of their subculture, imputing labels to others within the subculture to differentiate between "good" and "bad" hackers, invoking the hacker ideology as a vocabulary of motive, and linking their perspective to outsiders viewed favourably by the public, all serve as ways ofmanaging the stigma attached to hackers' deviant public identity. A number of other theoretical and substantive findings, as well as recol1.}mendations for future research, are presented. 111 ACKNOWLEDGEMENTS I would like to thank: My Advisor, Dr. William Shaffir for his constant advice and guidance. My Committee Members, Dr. Dorothy Pawluch and Dr. Charlene Miall for their time, comments and encouragement. The participants, without whom this research project would not be possible. Thank you for letting me be a part of your community, for sharing your stories, explanations and insights. Thank you for your openness. Most of all, thank you for all the time YOli spent meeting and talking with me about your passion, hacking. Amanda MacGillivary for being so understanding and for supporting me through everything from my initial thoughts to the final submission. Thank you for sparking my creativity and motivating me. Robert, Laurie and Ryan Kleinknecht, for teaching me to believe that anything is possible. Dr. Dan Antonowicz and Dr. Roberta Russell for sharing their scholarly wisdom and experiences. This work is dedicated to: Grandma Stevens and Aunt La for their love and insp irati on. iv T ABLE OF CONTENTS CHAPTER ONE: INTRODUCTION ............................................................................................. 1 GUIDING QUESTIONS .......................................................................................................... 2 LITERATURE REVIEW: A HISTORICAL LOOK AT THE SOCIAL CONSTRUCTION OF THE HACKER .................................................................................... 3 DEFINING THE COMPUTER HACKER: A HISTORICAL OVERVIEW ................... .4 THE SOCIAL CONSTRUCTION OF HACKERS AS DEVIANTS ................................ 7 t~~ TOWARDS A STATEMENT ON THE HACKER SUBCULTURE .................................... 14 CHAPTER TWO: THEORY ........................................................................................................ 18 SYMBOLIC INTERACTIONISM ......................................................................................... 18 INTERACTIONISM ONLINE ........................................................................................ 22 CONCEPTUALIZING SUBCULTURE FROM AN INTERACTIONIST PERSPECTIVE .......................... , ................................ '" .................................................. 24 CULTURE FORMATION: THE SUBCULTURAL MOSAIC ............................... 25 THE PROCESSUAL NATURE OF SUBCULTURE .............................................. 28 SUBCULTURAL VARIANTS ................................................................................ 31 Cff~_RACTER1STICS OF SUBCULTURE ............................................................. 32 CHAPTER THREE: METHOD .................................................................................................... 35 ETHNOGRAPHIC INQUIRY ............................................................................................... 35 INTERACTIONISM AND ETHNOGRAPHY ............................................................... 36 DEALING WITH PRECONCEPTIONS ........................................................................ 37 LOCATING INFORMANTS AND DECIDING UPON THE RESEARCH SETTING ............................................................................... , .......... 41 NEGOTIATING PRESENCE AND SELF-PRESENTATION IN THE FIELD ........... .47 COLLECTING DATA ONLINE .................................................................................... 59 DISCUSSION .................................................................................................................. 62 CHAPTER FOUR: TOWARDS A DEFINITION OF HACKER: HACKER AS A CONTESTED TERM ........................................................................................ 65 - ;~. HACKERS VS. THE MEDIA: CHALLENGING MEDIA DEFINITIONS OF "HACKER" ............................................................................................ 68 ~ CONTESTED INSIDER DEFINITIONS OF "HACKER" ................................................... 73 HACKERS AND CRACKERS ....................................................................................... 76 HATS: WHITE, BLACK AND GREy ........................................................................... 81 v DISCUSSION ................................................... '" ................................................................... 86 CHAPTER FNE: THE HACKER IDEOLOGY .......................................................................... 91. CONCEPTUALIZING IDEOLOGY ..................................................................................... 91 THE HACKER SPIRIT ................................................................................................... 93 THE HACKER SPIRIT: THE PURSUIT OF KNOWLEDGE ................................ 95 PRINCIPLE #1: HIGHER UNDERSTANDING REQUIRES AN UNORTHODOX APPROACH ......................................................................... 97 PRINCIPLE #2: HACKING INVOLVES HARD WORK ................................ 98 PRINCIPLE #3: HACKING REQUIRES A "LEARN FOR YOURSELF" APPROACH - LEARN BY DOING ........................................ 100 PRINCIPLE #4: SHARE YOUR KNOWLEDGE AND INFORMATION WITH OTHERS .................................................................. 102 PRINCIPLE #5: YOU'RE EVALUATED BASED ON WHAT YOU KNOW AND YOUR DESIRE TO LEARN .................................................... 106 PRINCIPLE #6: MISTRUST AUTHORITY ................................................... 108 PRINCIPLE #7: ALL INFORMATION SHOULD BE FREE ........................ 114 DISCUSSION ....................................................................................................................... 118 CHAPTER SIX: HACKER ARGOT .......................................................................................... 126 CONCEPTUALIZING ARGOT .......................................................................................... 126 THE HACKER LANGUAGE: TECHSPEAK AND JARGON .......................................... 130 TECHSPEAK ..................................................................................... , .......................... 134 JARGON ........................................................................................................................ 138 NETSPEAK AND THE CONVENTIONS OF ONLINE TALK ........................... 139 L3375P34K ............................................................................................................. 147 ROLE LABELS ...................................................................................................... 155 DISCUSSION ....................................................................................................................... 158 CHAPTER SEVEN: CONCLUSION ......................................................................................... 163 SUMMARy .........................................................................................................................
Recommended publications
  • Users As Co-Designers of Software-Based Media: the Co-Construction of Internet Relay Chat
    Users as Co-Designers of Software-Based Media: The Co-Construction of Internet Relay Chat Guillaume Latzko-Toth Université Laval AbsTrAcT While it has become commonplace to present users as co-creators or “produsers” of digital media, their participation is generally considered in terms of content production. The case of Internet Relay Chat (IRC) shows that users can be fully involved in the design process, a co-construction in the sense of Science and Technology Studies (STS): a collective, simultaneous, and mutual construction of actors and artifacts. A case study of the early de - velopment of two IRC networks sheds light on that process and shows that “ordinary users” managed to invite themselves as co-designers of the socio-technical device. The article con - cludes by suggesting that IRC openness to user agency is not an intrinsic property of software- based media and has more to do with its architecture and governance structure. Keywords Digital media; Communication technology; Co-construction; Design process; Ordinary user résumé Il est devenu banal de présenter l’usager comme cocréateur ou « produtilisateur » des médias numériques, mais sa participation est généralement envisagée comme une production de contenus. Le cas d’IRC (Internet Relay Chat) montre que les usagers des médias à support logiciel peuvent s’engager pleinement dans le processus de conception, une co-construction au sens des Science and Technology Studies : une construction collective, simultanée et mutuelle des acteurs et des artefacts. Une étude de cas portant sur le développement de deux réseaux IRC éclaire ce processus et montre que les « usagers ordinaires » sont parvenus à s’inviter comme co-concepteurs du dispositif.
    [Show full text]
  • Coleman-Coding-Freedom.Pdf
    Coding Freedom !" Coding Freedom THE ETHICS AND AESTHETICS OF HACKING !" E. GABRIELLA COLEMAN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright © 2013 by Princeton University Press Creative Commons Attribution- NonCommercial- NoDerivs CC BY- NC- ND Requests for permission to modify material from this work should be sent to Permissions, Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TW press.princeton.edu All Rights Reserved At the time of writing of this book, the references to Internet Web sites (URLs) were accurate. Neither the author nor Princeton University Press is responsible for URLs that may have expired or changed since the manuscript was prepared. Library of Congress Cataloging-in-Publication Data Coleman, E. Gabriella, 1973– Coding freedom : the ethics and aesthetics of hacking / E. Gabriella Coleman. p. cm. Includes bibliographical references and index. ISBN 978-0-691-14460-3 (hbk. : alk. paper)—ISBN 978-0-691-14461-0 (pbk. : alk. paper) 1. Computer hackers. 2. Computer programmers. 3. Computer programming—Moral and ethical aspects. 4. Computer programming—Social aspects. 5. Intellectual freedom. I. Title. HD8039.D37C65 2012 174’.90051--dc23 2012031422 British Library Cataloging- in- Publication Data is available This book has been composed in Sabon Printed on acid- free paper. ∞ Printed in the United States of America 1 3 5 7 9 10 8 6 4 2 This book is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE !" We must be free not because we claim freedom, but because we practice it.
    [Show full text]
  • Jargon File, Version 4.0.0, 24 Jul 1996
    JARGON FILE, VERSION 4.0.0, 24 JUL 1996 This is the Jargon File, a comprehensive compendium of hacker slang illuminating many aspects of hackish tradition, folklore, and humor. This document (the Jargon File) is in the public domain, to be freely used, shared, and modified. There are (by intention) no legal restraints on what you can do with it, but there are traditions about its proper use to which many hackers are quite strongly attached. Please extend the courtesy of proper citation when you quote the File, ideally with a version number, as it will change and grow over time. (Examples of appropriate citation form: "Jargon File 4.0.0" or "The on-line hacker Jargon File, version 4.0.0, 24 JUL 1996".) The Jargon File is a common heritage of the hacker culture. Over the years a number of individuals have volunteered considerable time to maintaining the File and been recognized by the net at large as editors of it. Editorial responsibilities include: to collate contributions and suggestions from others; to seek out corroborating information; to cross-reference related entries; to keep the file in a consistent format; and to announce and distribute updated versions periodically. Current volunteer editors include: Eric Raymond [email protected] Although there is no requirement that you do so, it is considered good form to check with an editor before quoting the File in a published work or commercial product. We may have additional information that would be helpful to you and can assist you in framing your quote to reflect not only the letter of the File but its spirit as well.
    [Show full text]
  • HACKING INTO COMPUTER SYSTEMS a Beginners Guide
    HACKING INTO COMPUTER SYSTEMS A Beginners Guide Guides of the Beginner's Series: So you want to be a harmless hacker? Hacking Windows 95! Hacking into Windows 95 (and a little bit of NT lore)! Hacking from Windows 3.x, 95 and NT How to Get a *Good* Shell Account, Part 1 How to Get a *Good* Shell Account, Part 2 How to use the Web to look up information on hacking. Computer hacking. Where did it begin and how did it grow? GUIDE TO (mostly) HARMLESS HACKING Beginners' Series #1 So you want to be a harmless hacker? "You mean you can hack without breaking the law?" That was the voice of a high school freshman. He had me on the phone because his father had just taken away his computer. His offense? Cracking into my Internet account. The boy had hoped to impress me with how "kewl" he was. But before I realized he had gotten in, a sysadmin at my ISP had spotted the kid's harmless explorations and had alerted the parents. Now the boy wanted my help in getting back on line. I told the kid that I sympathized with his father. What if the sysadmin and I had been major grouches? This kid could have wound up in juvenile detention. Now I don't agree with putting harmless hackers in jail, and I would never have testified against him. But that's what some people do to folks who go snooping in other people's computer accounts -- even when the culprit does no harm.
    [Show full text]
  • While IRC Is Easy to Get Into and Many People Are Happy to Use It Without
    < Day Day Up > • Table of Contents • Index • Reviews • Reader Reviews • Errata • Academic • Top Ten Tricks and Tips for New IRC Users IRC Hacks By Paul Mutton Publisher: O'Reilly Pub Date: July 2004 ISBN: 0-596-00687-X Pages: 432 While IRC is easy to get into and many people are happy to use it without being aware of what's happening under the hood, there are those who hunger for more knowledge, and this book is for them. IRC Hacks is a collection of tips and tools that cover just about everything needed to become a true IRC master, featuring contributions from some of the most renowned IRC hackers, many of whom collaborated on IRC, grouping together to form the channel #irchacks on the freenode IRC network (irc.freenode.net). < Day Day Up > < Day Day Up > • Table of Contents • Index • Reviews • Reader Reviews • Errata • Academic • Top Ten Tricks and Tips for New IRC Users IRC Hacks By Paul Mutton Publisher: O'Reilly Pub Date: July 2004 ISBN: 0-596-00687-X Pages: 432 Copyright Foreword Credits About the Author Contributors Acknowledgments Preface Why IRC Hacks? How to Use This Book How This Book Is Organized Conventions Used in this Book Using Code Examples How to Contact Us Got a Hack? Chapter 1. Connecting to IRC Introduction: Hacks #1-4 Hack 1. IRC from Windows Hack 2. IRC from Linux Hack 3. IRC from Mac OS X Hack 4. IRC with ChatZilla Chapter 2. Using IRC Introduction: Hacks #5-11 Hack 5. The IRC Model Hack 6. Common Terms, Abbreviations, and Phrases Hack 7.
    [Show full text]
  • Internet Slang - Wikipedia, the Free Encyclopedia
    Internet slang - Wikipedia, the free encyclopedia Internet slang From Wikipedia, the free encyclopedia. (Redirected from BTW) Internet slang is slang that have been developed and used by users of the Internet. Many of these terms originated for saving keystrokes and are often written in lower case. Internet slang is, by its nature, difficult to interpret, especially in chatrooms or on instant messaging, because much of it is quickly input, and many assume, falsely, their audience knows their body language. For instance; a LOL may be taken as genuine laughter or sarcasm, or as "whatever, stay away from me." So, for the sake of accurate and easily understandable communication, it is best to be as explicit as possible and make an effort to get your point across. Emoticons such as :) can also be used to clarify emotional intent in internet messages. Conversely, they can add to the confusion, for example the :-P emoticon which can indicate both (positive) joking and (negative) sarcasm; or simply when used in excess. Also, chat acronyms or chaq (pronounced "chalk") were initially developed by users of pre- Internet bulletin board systems, and have since been adopted by users of text-messaging wireless telephones. A handful (e.g. ASAP, PO'ed) far pre-date computers. The three-letter acronym (TLA) is the most popular type of abbreviation in computing and telecom terminology and slang. Contents http://en.wikipedia.org/wiki/BTW (1 of 18)11/15/2004 11:51:12 AM Internet slang - Wikipedia, the free encyclopedia 1 Abbreviations and acronyms 1.1 Characters 1.2 Numbers 1.3 A 1.4 B 1.5 C 1.6 D 1.7 E 1.8 F 1.9 G 1.10 H 1.11 I 1.12 J 1.13 K 1.14 L 1.15 M 1.16 N 1.17 O 1.18 P 1.19 Q 1.20 R 1.21 S 1.22 T 1.23 U 1.24 V 1.25 W 1.26 X 1.27 Y 2 Concepts 3 Effects on language http://en.wikipedia.org/wiki/BTW (2 of 18)11/15/2004 11:51:12 AM Internet slang - Wikipedia, the free encyclopedia 4 See also 5 External links Abbreviations and acronyms Characters Internet abbreviations are evolving and changing all the time.
    [Show full text]
  • Internet... the Final Frontier. an Ethnographic Account. Exploring
    A Service of Leibniz-Informationszentrum econstor Wirtschaft Leibniz Information Centre Make Your Publications Visible. zbw for Economics Helmers, Sabine; Hoffmann, Ute; Hofmann, Jeanette Working Paper Internet... the final frontier: an ethnographic account: exploring the cultural space of the Net from the inside WZB Discussion Paper, No. FS II 00-101 Provided in Cooperation with: WZB Berlin Social Science Center Suggested Citation: Helmers, Sabine; Hoffmann, Ute; Hofmann, Jeanette (2000) : Internet... the final frontier: an ethnographic account: exploring the cultural space of the Net from the inside, WZB Discussion Paper, No. FS II 00-101, Wissenschaftszentrum Berlin für Sozialforschung (WZB), Berlin This Version is available at: http://hdl.handle.net/10419/49787 Standard-Nutzungsbedingungen: Terms of use: Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Documents in EconStor may be saved and copied for your Zwecken und zum Privatgebrauch gespeichert und kopiert werden. personal and scholarly purposes. Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle You are not to copy documents for public or commercial Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich purposes, to exhibit the documents publicly, to make them machen, vertreiben oder anderweitig nutzen. publicly available on the internet, or to distribute or otherwise use the documents in public. Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, If the documents
    [Show full text]