Firebrand Waves of Digital Activism 1994-2014: the Rise and Spread of Hacktivism and Cyberconflict (Prepublication Copy) Athina Karatzogianni

Total Page:16

File Type:pdf, Size:1020Kb

Firebrand Waves of Digital Activism 1994-2014: the Rise and Spread of Hacktivism and Cyberconflict (Prepublication Copy) Athina Karatzogianni University of Leicester From the SelectedWorks of Athina Karatzogianni Fall September 1, 2015 Firebrand Waves of Digital Activism 1994-2014: The Rise and Spread of Hacktivism and Cyberconflict (Prepublication Copy) Athina Karatzogianni This work is licensed under a Creative Commons CC_BY-NC-SA International License. Available at: https://works.bepress.com/athina_karatzogianni/25/ [Please note: This document was the original manuscript submitted to Palgrave Macmillan in January 2015 and is shared here openly. The published book is copyedited, has alterations, amendments and corrections, and has undergone a standard production process, therefore is considerably different to this bepress document. The book Karatzogianni, A. (2015) Firebrand Waves of Digital Activism 1994-2014: The Rise and Spread of Hacktivism and Cyberconflict, Basingstoke: Palgrave Macmillan ISBN 978-1-137-31793-3 can be bought online on ebook or hard/paperback here: http://www.palgrave.com/la/book/9780230242463. If you choose to reference this document and not the published book, please reference appropriately by using the bepress link]. Firebrand Waves of Digital Activism 1994-2014: The Rise and Spread of Hacktivism and Cyberconflict Athina Karatzogianni Associate Perofessor Media and Communication University of Leicester E: [email protected] or [email protected] Preface and Acknowledgements Introduction: Four Phases of Digital Activism and Cyberconflict Chapter One: Origins and Rise of Digital Activism (1994-2007) 1.1 First Phase (1994-2001): The Origins of Digital Activism 1. 2 Second Phase (2001-2007): The Rise of Digital Activism Chapter Two: The Third Phase (2007-2010): Spread of Digital Activism 2.1 Russia-related Cyberconflicts 2.2. China-related Cyberconflicts Chapter Three: The Fourth Phase (2010-2014): Digital Activism Invades Mainstream Politics 3.1 WikiLeaks: Ideological and Organizational Tensions 3.2 WikiLeaks: Impact on communication and IR scholarship 3.3 The “Arab Spring” Uprisings 3.4 The Snowden Affair Chapter Four: The Future of Digital Activism and Its Study 4.1 Definition of Digital Activism and Cyberconflict as an Area of Study 4.2 The Agency Problematique 4.3 The Structure Problematique 4.4 The Affect Problematique Bibliography 1 Preface and Acknowledgements The research for this book was conducted between 2007 and 2014, in what was a period of intense encounters of the cyber with the global political arena: proliferation of sociopolitical activist networks; social-media enabled political protests and mobilizations leading to social or political change; increased resistance to surveillance and censorship of global communications, including leaks from government employees uncovering significant problems in the use of ICTs both by states and corporations. This book brings together my work specifically relevant to media movements and radical politics and the interaction between states and corporations with these movements. In engaging with this work, I have incurred many intellectual debts. Lasting thanks I would need to extend to all my colleagues at Hull and then Leicester, who often in corridors I stop, interrupt uninvited and talk to between writing sessions. My list of gratitude for stimulating intellectual exchanges over the years include Noel O’ Sullivan, Andrew Robinson, Michael Schandorf, Christiana Gregoriou, Gillian Youngs, Cony Beyer, Phoebe Moore, Bev Orton, Mike Brayshaw, Adi Kuntsman, Korina Patelis, Petros Ioannidis, Popi Aggeli, Ming-Yeh and Gary Rawnsley, George Michaelides, Christos Sideras, Eugenia Siapera, Anthimos Tsirigotis, Artur Alves, Michel Bauwens, Zizi Papacharissi, Geert Lovink, Gabriella Coleman, Martin Gak, Patricia Clough, Rafael-Cohen Almagor, Richard Aldrich, James Zborowski, Maria Karanika, Marie-Helene Bourcier, Mayra Rodrigues Gomes, Simon Willmetts, Peter Wilkin, James Connelly, David Lonsdale, Peter Young, Luke O’Sullivan, and Panagiota Tsatsou. Inevitably, I need to extend my gratitude for inspiring conversations also to my students. I have benefitted from material support from the EU FP 7 MIG@NET project http://www.mignetproject.eu/. I am grateful to this body for enabling me to travel widely for research, as I am to the University of Illinois at Chicago and the University of São Paulo for inviting me to visit and engage with staff and students. I am also grateful to the University of Hull, for allowing me research leave, and the University of Leicester for continuous support. Further, to mention the ESRC grant The Common Good: Ethics and Rights in Cyber Security [ERCS], which supported my research into the Snowden affair. I must also thank all the publishers and editors who have supported my work over the years and the editorial team for this book. And yet, no book on digital activism should omit thanks to online friends who are too numerous to mention! Lastly, this book is dedicated to my family in Greece, my son Sebastian and his dad, Tim Hawkins, who is still tolerant of my frequent absent-mindedness, travelling, and smashing of kitchenware. Leicester, January 2015. 2 Introduction: Four Phases of Digital Activism and Cyberconflict This book introduces four waves of upsurge in digital activism and cyberconflict. The rise of digital activism started in 1994, was transformed by the events of 9/11, culminated in 2011 with the Arab Spring uprisings, and entered a transformative phase of control, mainstreaming and cooptation since 2013 with the Snowden revelations. Digital activism is defined here as political participation, activities and protests organized in digital networks beyond representational politics. It refers to political conduct aiming for reform or revolution by non-state actors and new sociopolitical formations such as social movements, protest organizations, and individuals and groups from the civil society. The latter is defined as social actors outside government and corporate influence. Cyberconflict is defined as conflict in computer mediated environments and it involves an analysis of the interactions between actors engaged in digital activism to raise awareness for a specific cause, struggles against government and corporate actors, as well as conflict between governments, states and corporations. The rationale for these phases is solely based on political effects, rather than technological or developmental determinants. The first phase examined here are the years 1994 to 2001 and this is understood as the Origins of the two phenomena. With the invention of the World Wide Web in 1991 by Tim Berners Lee, the digitization of the 1980s meant that global production could be finally networked, and many-to-many broadcasting was no longer a far-fetched reality. The optimism of the early 1990s about how digitality would bring an economic, sociopolitical and cultural revolution ended at the last years of that decade with the dot.com bubble, which caused a rethink. Nevertheless, Consumers were able and thirsty to interact, create and participate in the creative process and this was changing the relationship between existing industries, technologies, audiences and markets. McLuhan’s global village (1989); De Sola Pool’s (1983) argument about the artificiality of media separation based on political economy not characteristics of the technologies; Rheingold’s (1994) first take on the power of virtual communities; and Jenkins’ (2006) convergence theory explaining the shifting of balance with the interwining of grassroots and corporate media and Castells’ (2000) network society effectively described the communication landscape of the 1990s. Activism during that period included examples, such as the alternative peer produced Linux operating system by Linus Torvalds in 1991 (the road was opened by Richard Stallman’s free software in the 1980s); the transfer of ethnoreligious conflicts online (i.e. 1999 Falungong in China, Shri Lanka, the Kosovo war and Israeli-Palestinian conflicts); the use of ICTs by social movements and protests, such as the Zapatista movement in Mexico in 1994 dropping guerrilla war in favor of cyber, the birth of Indymedia with the antiglobalization movement in Seattle in 1999, and the overthrow of Estrada with the use of mobile phones in 2001. Digital activism in all its facets was effectively born. The second phase proposed here is from 9/11 onwards to 2007. It starts from the end of 2001, because the Al Qaeda network’s attack on the twin towers in the U.S. had a profound impact on several areas of importance, such as news coverage (the internet’s audience skyrocketed and the media industry was transformed), as well as the political transformations taking place due to the event both at home in the U.S. and at 3 the global level – the war on terror, the crackdown on civil liberties, securitization and militainment aspects are a few of those transformations. The subsequent Afghanistan and Iraq war and the first impact of internet politics on the global public sphere deem 9/11 the start of a second phase in digital activism and cyberconflict. The major digital activism in this period involved the anti-Iraq war mobilizations, in which ICTs were used to accelerate the speed of the movement’s organization, while the Iraq war was deemed the first Internet war, because the digital revolution ensured that independent voices and new media actors were able to offer an alternative narrative and challenge the overall narrative of the war on terror. The Afghanistan and Iraq wars dominate digital activism and cyberconflicts of that period, with other notable examples the sociopolitical
Recommended publications
  • The BIG Picture Progress in Making Your Holiday More Sustainable: Responsible Tourism Report 2017-18
    1 The BIG picture Progress in making your holiday more sustainable: Responsible Tourism Report 2017-18 Crystal Creek Meadows Luxury Cottages & Spa Retreat Prepared by Christopher Warren Crystal Creek Meadows Cottages and Host’s Residence Responsible Tourism Report 2016/2017 2 About this report Every year for the past twelve years (2006/7) we have monitored our environmental, social and economic performance for continuous improvement so we can offer more sustainable holidays. If you are a guest you might find it interesting to see how previous guests have helped us achieve globally recognised high tourism standards If you are a tourism business you will find the report helpful to identify key impacts and methods to reduce consumption or improve positive effects of your operation If you work for government you will be able to identify the challenges and barriers preventing small businesses from improving their sustainability performance This report meets United Nations Sustainability Development Goal (12.6) to include sustainability information in company reporting. Each of our goals are linked to strategies and actions outlined in the following tables. Most tables show trends. The GREEN arrow indicates POSITIVE and RED arrow NEGATIVE trends. Crystal Creek Meadows Cottages and Host’s Residence Responsible Tourism Report 2016/2017 3 Meeting our Paris Agreement (2015) obligations Ban Ki-moon (UN Secretary General) achieving global agreement on cutting emissions, now to work! Goal to achieve Net Zero Emissions by 2050 192 Governments have committed to limit global temperatures by 2º C degrees. By the date of this agreement over 22,025 companies and 2,250 cities had already committed to lowering carbon.
    [Show full text]
  • RELX Group Teach-In
    RELX Group Teach-In Thursday, 9th November 2017 RELX Group Teach-In Thursday, 9th November 2017 Welcome Colin Tennant Head of Investor Relations, RELX Group Opening remarks My name is Colin Tennant. I am the Head of Investor Relations at RELX Group. I have three things to do today. First is to welcome everybody. So, welcome, everybody. Second is just a little bit of housekeeping. If the fire alarm does go off during this presentation, you'll be leaving the way you came in. There will be people with fluorescent jackets to help you find the exit. Hopefully, that won't happen. And the final thing I need to do is to introduce the host for today's presentation, Chet Burchett, the Chief Executive of Reed Exhibitions, who is going to lead you through all we are going to cover for today. So, Chet over to you. Overview of Reed Exhibitions Chet Burchett Chief Executive Officer, Reed Exhibitions My Background Thank you, Colin. Good afternoon. As Colin notes, I am, indeed, Chet Burchett. I have been Chief Executive for Reed Exhibitions since 2015. I have been with the company for almost 14 years. I joined in February 2004 as President of North America. I came over from Burson-Marsteller, one of the WPP's global public relations agencies, where I had been serving as Chief Executive for their US business. Then, my role expanded for Reed to President of the Americas when I took on responsibility for our South American business which, at the time, was a small operation in Argentina and a few shows in Brazil.
    [Show full text]
  • Contents - June 2019
    CONTENTS - JUNE 2019 Airport Talk ANA’s Revealed New Aviation Shopping 60 Airport CEO Speaks 55 Boeing 787-10 Avengers Assemble at KLIA Tapping Further Into the Affluent KLIA Ekspres Tickets Available and klia2! 63 61 Middle East Market 56 on Tripcarte.Asia ERAMAN Becomes Bigger, China Airlines New Livery for Better and Bolder 64 Aviation News 60th Anniversary 61 Firefly Celebrated Its Return to Air New Zealand Receives Aviation Interview Singapore via Seletar Airport 58 Global Award for Economy Interview with Jimmy Leong 62 KLM Charity Tulip Sale An Skycouch President of Malaysian Tourist Overwhelming Success 59 Air France Serves Exquisite Guides Council (MTGC) 66 62 Oman Air Revamped Mobile App 60 Cuisine by Michelin-Starred Chef AIRPORT TALK Under the Joint International Tourism Development Programme (JITDP) with Tourism Malaysia, I am happy to announce that we signed a joint tactical campaign at the recent Arabian Travel Market (ATM) 2019 with a new low-cost carrier, Air Arabia, which will be flying to KL International Airport (KLIA) on 1 July. As the ninth airline from the Middle East, this will further enhance our flagship airport’s position as the 12th busiest airport for international passengers, a recognition given to us by Airports Council International last year. Air Arabia’s direct service will not only improve KLIA’s connectivity but will also help to promote Malaysia as the preferred hub in this region. As we have highlighted at our 20th AGM, for us to achieve our Group’s focus areas in 2019, one of the strategic themes that we have identified is to be the Best-in-Class Hub.
    [Show full text]
  • Coleman-Coding-Freedom.Pdf
    Coding Freedom !" Coding Freedom THE ETHICS AND AESTHETICS OF HACKING !" E. GABRIELLA COLEMAN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright © 2013 by Princeton University Press Creative Commons Attribution- NonCommercial- NoDerivs CC BY- NC- ND Requests for permission to modify material from this work should be sent to Permissions, Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TW press.princeton.edu All Rights Reserved At the time of writing of this book, the references to Internet Web sites (URLs) were accurate. Neither the author nor Princeton University Press is responsible for URLs that may have expired or changed since the manuscript was prepared. Library of Congress Cataloging-in-Publication Data Coleman, E. Gabriella, 1973– Coding freedom : the ethics and aesthetics of hacking / E. Gabriella Coleman. p. cm. Includes bibliographical references and index. ISBN 978-0-691-14460-3 (hbk. : alk. paper)—ISBN 978-0-691-14461-0 (pbk. : alk. paper) 1. Computer hackers. 2. Computer programmers. 3. Computer programming—Moral and ethical aspects. 4. Computer programming—Social aspects. 5. Intellectual freedom. I. Title. HD8039.D37C65 2012 174’.90051--dc23 2012031422 British Library Cataloging- in- Publication Data is available This book has been composed in Sabon Printed on acid- free paper. ∞ Printed in the United States of America 1 3 5 7 9 10 8 6 4 2 This book is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE !" We must be free not because we claim freedom, but because we practice it.
    [Show full text]
  • Press Release Green Light for WTM Africa 2021 Live Hybrid Event in April
    PRESS RELEASE Green light for WTM Africa 2021 live/hybrid event in April First-of-its-kind hybrid event set for WTM Africa from 07-09 April 2021. Plan B will be to run WTM Africa as a fully virtual event on these dates. Cape Town, 17 November 2020 – WTM Africa will go ahead from 07-09 April 2021 in the format of a hybrid event, delivering a significant ROI for exhibitors and providing a much- needed platform for live and virtual connection between tourism industry stakeholders engaged in bringing business to Africa. Carol Weaving, MD Reed Exhibitions Africa, unpacked the decision taken following a robust study amongst exhibitors and buyers which indicated strong support for holding a live event in April 2021. This was followed by a virtual round table discussion with key stakeholders earlier today. “We are delighted to be able to inform our industry partners that we will be going ahead with WTM Africa as a hybrid event, incorporating the best characteristics of a live and virtual showcase of Africa. “Our sentiment survey revealed that 88% of buyers confirmed they wanted to attend WTM Africa in 2021 and within this, a further 96% confirmed they would travel provided the regulations allowed them to do so. I’m pleased to say our king buyers have also confirmed their attendance, so it’s full steam ahead as far we are concerned,” says Weaving. During the virtual discussion, the Reed Exhibitions South Africa team provided two scenarios for WTM Africa, both relevant to a hosting date of 07-09 April 2021.
    [Show full text]
  • Ontario Tourism Investment Attraction Research Study
    ONTARIO TOURISM INVESTMENT ATTRACTION RESEARCH STUDY February 2009 © Queen’s Printer for Ontario, 2009 Although copyright in the research papers is held by the Queen's Printer for Ontario, the papers were prepared by external companies and their conclusions do not necessarily represent the views of the Government of Ontario. The research papers were commissioned by the Ontario Ministry of Tourism for the Tourism Competitiveness Study and as such their conclusions are intended for this purpose only and shall not be relied-upon by third parties. ISBN 978-1-4249-8930-0 (PDF) Ontario Tourism Investment Attraction Research Study February 2009 TABLE OF CONTENTS 1. INTRODUCTION...............................................................................................1 1.1 Background ..................................................................................................... 1 1.2 Objectives of the Study .................................................................................... 1 1.3 Why the Focus on Increasing investment? ......................................................... 2 1.4 Underlying Assumptions and Definitions ............................................................ 2 2. THE TOURISM INVESTMENT ENVIRONMENT..................................................4 2.1 Trends Affecting Tourism Investment................................................................ 4 2.2 Tourism Investment Growth in Ontario.............................................................. 7 2.3 Concentration of Tourism Activity in
    [Show full text]
  • PRESS RELEASE Africa Travel Week Unveils 2021 Roadmap to Reignite
    PRESS RELEASE Africa Travel Week unveils 2021 roadmap to reignite travel and tourism in Africa • WTM Africa and suite of sister shows to run as a virtual event from 07-09 April 2021 with a live element from 01-03 September during Tourism Month. • The virtual and live events form part of a 365-day plan to offer a significant ROI for exhibitors and international buyers. Cape Town, 26 January 2021 – Africa Travel Week (ATW) has unveiled an audacious plan for its 2021 suite of shows, which includes several value-add opportunities, in addition to WTM Africa, which will run as a 100% virtual exhibition from 07-09 April 2021. “The plan for WTM Africa has always been about offering value beyond the show floor. This year, we’re focussing heavily on that, with a robust plan that offers significant ROI across 365 days, instead of three,” says Megan Oberholzer, Portfolio Director: Travel, Tourism and Creative Industries at Reed Exhibitions Africa. In addition to the virtual show in April, which consists of 1-to-1 meetings, content sessions and speed networking, ATW has lined up a collection of additional events throughout the year, which include: • Educational content webinars from May to August. • Africa Travel Week: Connect in the City Live from 1-3 September, including on-site experiences in the official Host City of Cape Town. • A series of virtual masterclasses from September to November. Said Oberholzer: “Our plan takes on a blended approach where travel trade professionals benefit from connecting with their industry peers at face-to-face meetings later on in the year.
    [Show full text]
  • WTM 2012 Sees 3% Visitor Increase 26 Nov 12 World Travel Market
    WTM 2012 Sees 3% Visitor Increase 26 Nov 12 World Travel Market 2012, the leading global event for the travel industry, experienced an overall accumulative 3% increase in visitors with each of the four days attracting more visitors than in 2011. Overall WTM 2012 attracted almost 29,000 travel trade visitors, reveals unaudited figures. The first day of WTM 2012 (Monday 5 November) was a resounding success with exhibitor invitation visitors up 5% on last year's event. The Monday of WTM is an exhibitor Invite-only day with the aim of allowing exhibitors to hold discussions and negotiations with those buyers that they want to conduct business with. The Monday morning Speed Networking session was a great success with a record number of both exhibitors (498) and WTM Meridian Club buyers (210) discussing business deals before the exhibition floor opened. Matt Cheevers Purchasing Director Voyage Prive said: "Speed networking is a perfect way to start World Travel Market. Almost everyone I talked to was relevant, and in this context it is possible to get down to the key points of interest. Making the initial contact at the speed networking makes the follow up easier and more targeted." The second day (Tuesday 6 November) experienced a 1% increase on the second day of last year's event. Tuesday is the busiest day of WTM as it is the first day the event is open to the whole industry following on from the exhibitor-invite only policy on the Monday. Wednesday November 7 saw a massive 9% visitor increase, compared to the equivalent day the previous year.
    [Show full text]
  • Dissecting the 'Hacker Manifesto'
    Dissecting the ‘Hacker Manifesto’ S.M.Furnell, P.Dowland and P.W.Sanders Network Research Group School of Electronic, Communication and Electrical Engineering University of Plymouth Plymouth United Kingdom e-mail : [email protected] Abstract Twelve years ago, a text was written within the hacking community which is widely referred to as the ‘Hacker Manifesto’. This text, and the opinions that it offers, have since been widely embraced by the hacker community and the document is referenced from numerous sites on the Internet. This paper sets out to examine the content of the Manifesto and considers the validity of many of the messages that it imparts. The Manifesto is considered to present an undoubtedly pro-hacker message, without acknowledging other perspectives or the wider implications of the activities that it is advocating. The paper explores some of these issues, examining both the consequences of the Manifesto’s dissemination and ways in which security professionals and society at large should respond. It is concluded that whilst the Manifesto obviously cannot bear the sole responsibility for promoting and encouraging hacker activity, it at best sends out an incomplete message that should be balanced with appropriate counter-argument. Keywords : Hackers, Computer Abuse, Information Society. Introduction The definition of the term ‘hacker’ has changed considerably over the last 30 years. In the 1960s, hackers were the dedicated software and hardware gurus, and the term largely referred to persons capable of implementing elegant / technically advanced solutions to technologically complex problems. In the 1990s, however, the moniker implies something rather different and is commonly used to refer to persons dedicated to entering systems by identifying and exploiting security weaknesses.
    [Show full text]
  • S K a L International World Con G R E
    S K A L I N T E R N A T I O N A L W O R L D C O N G R E S S incentives, business travel & meetings expo connect with the global meetings, events and incentives industry 15,500 9,750 78,400 No. 1 international industry meetings, events and pre-scheduled global market professionals incentives planners business meetings place for you representing over 150 including 4,000 highly between exhibitors and to generate serious countries qualified Hosted Buyers® Hosted Buyers business Connections mean everything. Connect with us at www.ibtmworld.com Organised by formerly The ibtm world® and ibtm events® trademarks are owned and protected by Elsevier Properties SA and Reed Exhibitions Limited uses such trademark under licence. Hosted Buyer® is a registered trademark of Reed Exhibitions Limited. Reed Travel Exhibitions® is a registered trademark of Reed Elsevier Group Plc. Skål Magazine | 3 MESSAGE PRESIDENT DEAR SKÅLLEAGUES, DEAR FRIENDS, The dates of the 76th Skål World Congress 2015 were announced last week and you will find the table of the Registration fees for the Congress on page 7 of this e-Magazine. The Congress website is now active at www.skalcongress.org. I look forward to seeing many of you in Torremolinos where you will also be able to visit our offices and meet the staff who are trying their best to serve you. I trust, the positive feedback I received during LATAM, NAASC and Asian Area Congresses, would also reflect positively on the Congress participation and we can all enjoy a great Congress with a very high participation.
    [Show full text]
  • Corporate Responsibility Report 2009 Summary Chief Executive’S Introduction Governance People and Community and People Customers
    Corporate Responsibility Report 2009 Summary Chief Executive’s introduction Governance People and community Customers I believe corporate responsibility is good for business and it is good for Reed Elsevier. It means employing the highest ethical standards in everything we do and helping society by using our unique expertise to progress science and improve global health, advance the rule of law and prevent crime, and broaden access to information. Health and safety Corporate responsibility involves providing our customers with exceptional service and leading information and tools that enable them to make critical decisions, enhance productivity, and improve outcomes. It also means treating our employees fairly and inspiring them to reach their full potential, while making a significant contribution to the communities where we live and work. It requires us to further best practice in our supply chain, and limit our impact on the environment, while spurring knowledge and debate through Supply chain our environmental publications and expertise. In the pages that follow, you can find our 2009 corporate responsibility objectives, our performance against them, and future plans. We highlight progress, such as reaching our goal to train 80% of staff in our Code of Ethics and Business Conduct and indicate where we must take greater action, like reducing energy consumption at our data centres. The report details our emphasis on stakeholder engagement, our aim to lead by example, and our Environment support for initiatives that advance good corporate behaviour like the UN Global Compact with its ten core principles in human rights, labour, the environment, and anti-bribery. Despite challenging economic conditions in our markets, our commitment to corporate responsibility has not waned.
    [Show full text]
  • An Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St
    University of Missouri, St. Louis IRL @ UMSL Dissertations UMSL Graduate Works 11-22-2005 Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St. Louis, [email protected] Follow this and additional works at: https://irl.umsl.edu/dissertation Part of the Criminology and Criminal Justice Commons Recommended Citation Holt, Thomas Jeffrey, "Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers" (2005). Dissertations. 616. https://irl.umsl.edu/dissertation/616 This Dissertation is brought to you for free and open access by the UMSL Graduate Works at IRL @ UMSL. It has been accepted for inclusion in Dissertations by an authorized administrator of IRL @ UMSL. For more information, please contact [email protected]. Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers by THOMAS J. HOLT M.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2003 B.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2000 A DISSERTATION Submitted to the Graduate School of the UNIVERSITY OF MISSOURI- ST. LOUIS In partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSOPHY in Criminology and Criminal Justice August, 2005 Advisory Committee Jody Miller, Ph. D. Chairperson Scott H. Decker, Ph. D. G. David Curry, Ph. D. Vicki Sauter, Ph. D. Copyright 2005 by Thomas Jeffrey Holt All Rights Reserved Holt, Thomas, 2005, UMSL, p. ii ABSTRACT This dissertation examines both the subculture and social organization practices of computer hackers. The concept of normative orders (Herbert, 1998: 347) is used to explore hacker subculture in different contexts.
    [Show full text]