Please adjust the frame on the left to read the following story to avoid using the stroll bars at the bottom.

THE BAUDY WORLD OF THE BYTE BANDIT:

A POSTMODERNIST INTERPRETATION OF THE COMPUTER UNDERGROUND

Gordon Meyer and Jim Thomas
Department of Sociology
Northern Illinois University
DeKalb, IL 60115
(10 June, 1990)
 
 
 
          Forthcoming in In F.  Schmalleger (ed.),  Computers in Criminal
          Justice, Bristol (Ind.):  Wyndham Hall.   An earlier version of
          this paper was presented at  the American Society of Criminology
          annual meetings, Reno (November 9, 1989).   Authors are listed in
          alphabetical order.  Address correspondence to Jim Thomas.
          We are indebted  to the numerous anonymous  computer underground
          participants who provided  information.  Special acknowledgement
          goes to Hatchet Molly, Jedi, The Mentor,  Knight Lightning,  and
          Taran King.
 
 
 
 
                         THE BAUDY WORLD OF THE BYTE BANDIT:
             A POSTMODERNIST INTERPRETATION OF THE COMPUTER UNDERGROUND
               Hackers are "nothing more  than high-tech street gangs"
               (Federal Prosecutor, Chicago).
 
               Transgression is not immoral. Quite to the contrary, it
               reconciles the law with what it forbids; it is the dia-
               lectical game of good and evil (Baudrillard, 1987: 81).
               There ain't no sin and there ain't no virtue.  There's
               just stuff people do.   It's all part of the nice, but
               that's as far as any man got a right to say (Steinbeck,
               1939:31-32).
 
               The criminalization of "deviant acts" transforms and reduces
          broader social meanings to legal ones.  Once a category of behav-
          iors has become defined by statute as sanctionably deviant,  the
          behaviors so-defined assume  a new set of meanings  that may ob-
          scure ones  possessed by those  who engage in  such behaviors.
          "Computer deviants" provide one example.
               The proliferation of computer  technology has been accompa-
          nied by the growth of a computer underground (CU),  often mistak-
          enly labeled "hackers," that is  perceived as criminally deviant
          by the media, law enforcement officials, and researchers.   Draw-
          ing from ethnographic data,  we offer  a cultural rather than a
          criminological analysis of the underground by suggesting that the
          CU reflects an attempt to recast, re-appropriate, and reconstruct
          the power-knowledge relationship that  increasingly dominates the
 
                                        - 1 -
 
 
          ideology and actions of modern society.  Our data reveal the com-
          puter underground as  an invisible community with  a complex and
          interconnected cultural lifestyle, an inchoate anti-authoritarian
          political consciousness,  and dependent on norms of reciprocity,
          sophisticated socialization  rituals,  networks  of information
          sharing, and an explicit value system.   We interpret the CU cul-
          ture as a challenge to and parody of conventional culture,  as a
          playful attempt to reject the seriousness of technocracy,  and as
          an ironic substitution of rational  technological control of the
          present for an anarchic and playful future.
                        Stigmatizing the Computer Underground
               The computer underground refers to persons engaged in one or
          more of several activities, including pirating, anarchy, hacking,
          and phreaking[1].    Because computer  underground participants
          freely share information and often are involved collectively in a
          single incident,  media definitions invoke the generalized meta-
          phors of  "conspiracies" and "criminal rings,"  (e.g.,  Camper,
          1989;  Computer Hacker Ring, 1990;  Zablit, 1989), "modem macho"
          evil-doers (Bloombecker, 1988),  moral bankruptcy (E.  Schwartz,
          1988), "electronic trespassers" (Parker: 1983), "crazy kids dedi-
          cated to making mischief" (Sandza, 1984a:  17), "electronic van-
          dals" (Bequai:  1987), a new or global "threat" (Markoff, 1990a;
          Van,  1989),  saboteurs ("Computer Sabateur," 1988),  monsters
          (Stoll, 1989:  323), secret societies of criminals (WMAQ, 1990),
          "'malevolent, nasty, evil-doers' who 'fill the screens of amateur
          {computer} users with pornography'"  (Minister of Parliament Emma
 
                                        - 2 -
 
 
          Nicholson, cited in "Civil Liberties," 1990:  27), "varmints" and
          "bastards" (Stoll,  1989:  257),  and "high-tech street gangs"
          ("Hacker, 18," 1989).  Stoll (cited in J. Schwartz, 1990: 50) has
          even compared them to persons who  put razorblades in the sand at
          beaches, a bloody, but hardly accurate, analogy.   Most dramatic
          is Rosenblatt's (1990:  37) attempt to link hackers to pedophilia
          and "snuff films," a ploy clearly designed to inflame rather than
          educate.
               These images have prompted calls  for community and law en-
          forcement vigilance (Conly and McEwen, 1990:  2;  Conly,  1989;
          McEwen, 1989).   and for application of the Racketeer Influenced
          and Corrupt Organizations (RICO) Act to prosecute and control the
          "criminals" (Cooley, 1984),  which have created considerable con-
          cern for civil liberties (Markoff, 1990b;  J.  Schwartz, 1990).
          Such exaggerated discourse also fails  to distinguish between un-
          derground "hobbyists," who may infringe  on legal norms but have
          no intention of pillaging,  from  felonious predators,  who use
          technology to loot[2].   Such terminology creates a common stock
          of public knowledge that formats  interpretations of CU activity
          in ways pre-patterned as requiring  social control to protect the
          commonweal (e.g., Altheide, 1985).
               As Hollinger and Lanza-Kaduce (1988:  119), Kane (1989), and
          Pfuhl (1987) observed,  the stigmatization of hackers has emerged
          primarily through value-laden media depictions.   When in 1988 a
          Cornell University graduate student inadvertently infected an in-
          ternational computer network by  planting a self-reproducing "vi-
 
                                        - 3 -
 
 
          rus," or "rogue program," the news  media followed the story with
          considerable detail about  the dangers of computer  abuse (e.g.,
          Allman, 1990; Winter, 1988).  Five years earlier, in May of 1983,
          a group of hackers known as  "The 414's" received equal media at-
          tention when they  broke into the computer system  of the Sloan
          Kettering Cancer research center.   Between these dramatic and a-
          typical events, the media have dramatized the dangers of computer
          renegades,  and media anecdotes  presented during Congressional
          legislative debates  to curtail "computer abuse"  dramatized the
          "computer hacking problem" (Hollinger  and Lanza-Kaduce,  1988:
          107).   Although the accuracy and objectivity of the evidence has
          since been challenged (Hollinger and Lanza-Kaduce 1988: 105), the
          media continue to format CU activity  by suggesting that any com-
          puter-related felony can be attributed to hacking.  Additionally,
          media stories are taken from the accounts of police blotters, se-
          curity personnel, and apprehended hackers, each of whom have dif-
          ferent perspectives and definitions.   This creates a self-rein-
          forcing  imagery in  which  extreme  examples and  cursively
          circulated data are discretely adduced  to substantiate the claim
          of criminality by  those with a vested interest  in creating and
          maintaining such definitions.   For  example,  Conly and McEwen
          (1990)  list examples of law  enforcement jurisdictions in which
          special units to  fight "computer crime," very  broadly defined,
          have been created.  These broad  definitions serve to expand the
          scope of authority and resources of the units.   Nonetheless, de-
          spite criminalization,  there is little  evidence to support the
 
                                        - 4 -
 
 
          contention that computer hacking has been sufficiently abusive or
          pervasive to warrant zealous  prosecution (Michalowski and Pfuhl,
          forthcoming).
               As an antidote to the  conventional meanings of CU activity
          as simply one of deviance,  we shift the social meaning of CU be-
          havior from one of stigma to one of culture creation and meaning.
          Our work is tentative,  in part  because of the lack of previous
          substantive literature and in part  because of the complexity of
          the data, which indicate a multiplicity of subcultures within the
          CU.  This paper examines two distinct CU subcultures, phreaks and
          hackers,  and challenges the Manichean  view that hackers can be
          understood simply as profaners of a sacred moral and economic or-
          der.
                     The Computer Underground and Postmodernism
               The computer underground  is a culture of  persons who call
          computer bulletin board systems (BBSs,  or just "boards"),  and
          share the interests fostered by the BBS.   In conceptualizing the
          computer underground as a distinct culture, we draw from Geertz's
          (1973: 5) definition of culture as a system of meanings that give
          significance to shared  behaviors that must be  interpreted from
          the perspective of those engaged in them.  A culture provides not
          only the "systems of standards for perceiving, believing,  evalu-
          ating, and acting" (Goodenough,  1981:  110),  but includes the
          rules and symbols  of interpretation and discourse  for partici-
          pants:
               In crude relief,  culture can be understood as a set of
               solutions devised by a group of people to meet specific
               problems  posed by  situations  they  face in  com-
                                        - 5 -
 
 
               mon. . . This notion of culture as a living, historical
               product of group problem solving  allows an approach to
               cultural study that is applicable to any group, be it a
               society, a neighborhood, a family, a dance band,  or an
               organization and its segments  (Van Maanen and Barley,
               1985: 33).
               Creating and maintaining a culture requires continuous indi-
          vidual or group processes of  sustaining an identity through the
          coherence gained by a consistent aesthetic point of view, a moral
          conception of self,  and a lifestyle that expresses those concep-
          tions in one's immediate existence and tastes (Bell, 1976:  36).
          These behavioral expressions signify a variety of meanings,  and
          as signifiers they reflect a type of code that can be interpreted
          semiotically,  or as a sign system amenable to readings indepen-
          dent of either participants or of  those imposed by the super-or-
          dinate culture:
               All aspects of culture possess  a semiotic value,  and
               the most  taken-for-granted phenomena can  function as
               signs:   as elements in communication systems governed
               by semantic rules  and codes which are  not themselves
               directly apprehended in experience.   These signs are,
               then,  as opaque as the social relations which produce
               them and which they re-present (Hebdige, 1982: 13).
               It is this symbolic cultural ethos,   by which we mean the
          style, world view, and mood (Hebdige,  1979),  that reflects the
          postmodernist elements of the CU and separates it from modernism.
          Modernist culture  is characterized especially  by rationality,
          technological enhancement, deference to centralized control,  and
          mass communication.   The emergence  of computer technology has
          created dramatic changes in social communication, economic trans-
          actions, and information processing and sharing, while simultane-
          ously introducing new forms of surveillance, social control,  and
 
                                        - 6 -
 
 
          intrusions on privacy (Marx, 1988a: 208-211;  Marx and Reichman,
          1985).  This has contributed to a:
               . . .  richly confused and hugely verbal age, energized
               by a multitude of competing discourses,  the very pro-
               liferation and plasticity of  which increasingly deter-
               mine what we defensively refer  to as our reality (New-
               man, 1985: 15).
               By Postmodernism we mean a reaction against "cultural moder-
          nity" and a destruction of the  constraints of the present "maxi-
          mum security society" (Marx,  1988b)  that reflect an attempt to
          gain control of an alternative future. In the CU world, this con-
          stitutes a conscious resistance to the  domination of but not the
          fact of technological encroachment into  all realms of our social
          existence.  The CU represents a reaction against modernism by of-
          fering an ironic response to the primacy of a master technocratic
          language,  the incursion of computers into realms once considered
          private, the politics of techno-society,  and the sanctity of es-
          tablished civil and state authority.  Postmodernism is character-
          ized not so much by a single  definition as by a number of inter-
          related characteristics, including, but not limited to:
             1.  Dissent for dissent's sake (Lyotard, 1988).
             2.  The collapse of the  hierarchical distinction between mass
                 and popular culture (Featherstone, 1988: 203).
             3.  A stylistic promiscuity favoring  eclecticism and the mix-
                 ing of codes (Featherstone, 1988: 203).
             4.  Parody, pastiche, irony,  playfulness and the celebration
                 of the surface "depthlessness"  of culture (Featherstone,
                 1988: 203).
 
                                        - 7 -
 
 
             5.  The decline of the originality/genius of the artistic pro-
                 ducer and the assumption that  art can only be repetitious
                 (Featherstone 1988: 203).
             6.  The stripping  away of social and  perceptual coordinates
                 that let one "know where one is" (Latimer, 1984: 121).
             7.  A search for new ways  to make the unpresentable presenta-
                 ble, and break down the barriers that keep the profane out
                 of everyday life (Denzin, 1988: 471).
             8.  The introduction of new moves  into old games or inventing
                 new games  that are evaluated pragmatically  rather than
                 from some uniform stand point  of "truth" or philosophical
                 discourse (Callinicos, 1985: 86).
             9.  Emphasis on the  visual over the literary  (Lash,  1988:
                 314).
             10. Devaluation of formalism and  juxtaposition of signifiers
                 taken from the banalities of  everyday life (Lash,  1988:
                 314).
             11. Contesting of rationalist and/or  didactive views of cul-
                 ture (Lash, 1988: 314).
             12. Asking not what a cultural text  means,  but what it does
                 (Lash, 1988: 314).
             13. Operation through the spectator's immersion, the relative-
                 ly unmediated investment of his/her desire in the cultural
                 object (Lash, 1988: 314).
             14. Acknowledgement of the decenteredness  of modern life and
                 "plays with the apparent emptiness  of modern life as well
 
                                        - 8 -
 
 
                 as the lack of coherence  in modern symbol systems" (Man-
                 ning, 1989: 8).
               "Post-Modernism" in its positive  form constitutes an intel-
          lectual attack upon the atomized,   passive and indifferent mass
          culture which,  through the saturation of electronic technology,
          has reached its zenith in Post-War American (Newman,  1985:  5).
          It is this style of playful rebellion, irreverent subversion, and
          juxtaposition of fantasy with high-tech reality that impels us to
          interpret the computer underground as a postmodernist culture.
                                   Data and Method
               Obtaining data from any  underground culture requires tact.
          BBS operators protect  the privacy of users and  access to elite
          boards, or at least to their relevant security levels,  virtually
          always requires  completion of a preliminary  questionnaire,  a
          screening process, and occasional voice verification.   Research-
          ers generally do not themselves  violate laws or dominant norms,
          so they depend on their  informants for potentially "dirty infor-
          mation" (Thomas and Marquart, 1988).   Our own data are no excep-
          tion and derive from several sources.
               First,  the bulk  of our data come  from computer bulletin
          board systems.   BBSs are personal computers (PCs) that have been
          equipped with a  telephone modem and special  software that con-
          nects users to other PCs by  telephone.   After "logging in" by
          supplying a valid user name and  password,  the user can receive
          and leave messages to other users of the system.   These messages
          are rarely private and anyone calling the BBS can freely read and
 
                                        - 9 -
 
 
          respond to them.  There is usually the capacity to receive (down-
          load) or send (upload) text files ("G-philes")  or software pro-
          grams between the caller and host system.
               We logged the message section of CU BBSs to compile documen-
          tary evidence of  the issues deemed important  for discussion by
          participants.   Logs are "captured" (recorded using the computer
          buffer)  messages left on the board by users.   Calculating the
          quantity of logged data is  difficult because of formatting vari-
          ance,  but we estimate that our logs exceed 10,000 printed pages.
          The logs  cited here are verbatim  with the exception  of minor
          editing changes in format and extreme typographical errors.
               Identifying underground BBSs can be  difficult,  and to the
          uninitiated they may appear to be licit chat or shareware boards.
          For callers with sufficient access,  however,  there exist back-
          stage realms in  which "cracking" information is  exchanged and
          private text or  software files made available.    With current
          technology,  establishing a BBS  requires little initial skill.
          Most boards  are short-lived and  serve only local  or regional
          callers.   Because of the generally poor quality and amateur na-
          ture of these systems, we focused on national elite boards.   We
          considered a board "elite" if it met all of the following charac-
          teristics: At least one quarter of the users were registered out-
          side the state of the board  called;  the phone line were exclu-
          sively for  BBS use and  available 24  hours a day;   and the
          information and files/warez  were current "state of  the field."
          Elite CU members argue that there are less than ten "truly elite"
          p/hacker boards nationally.
                                       - 10 -
 
 
               We obtained the  names and numbers of BBSs  from the first
          boards we called, and used a snowball technique to supplement the
          list.   We obtained additional numbers from CU periodicals, and,
          as we became more familiar with the culture,  users also added to
          the list.   Our aggregate data include no less than 300 Bulletin
          board systems,  of which at least 50 attract phreaks and hackers,
          and voice or on-line interviews with  no less than 45 sysops (op-
          erators of BBS systems) and other active CU participants.
               A second data source included  open-ended voice and on-line
          interviews with hackers, phreaks and pirates.   The data include
          no less than 25 face-to-face, 25 telephone, and 60 on-line inter-
          views obtained as we became familiar with our informants.
               Third,  data acquisition included  as much participation as
          legally possible in CU activities[3].  This served to justify our
          presence in the culture and  provided information about the mun-
          dane activity of the CU.
               Finally,  we obtained back and current issues of the primary
          underground computerized magazines,  which are distributed on na-
          tional BBSs as text files.  These contain information relevant to
          the particular subculture,  and included PHRACK,  Activist Times
          Incorporated (ATI), P/Hun, 2600 Magazine, PIRATE, TAP, and Legion
          of Doom (LoD/H).   We also draw  data from national and interna-
          tional electronic mail (e-mail) systems on which an active infor-
          mation-sharing CU network has developed and spread.
               Assessing the validity and reliability  of data obtained in
          this manner creates special problems.   One is that of sampling.
          The number of boards,  their often ephemeral existence,  and the
                                       - 11 -
 
 
          problem of obtaining access all make conventional sampling impos-
          sible.   We focused on national boards and engaged in theoretical
          sampling (Glaser and Strauss, 1967: 45-77).  We consider our sam-
          ple representative, and accept Bordieu's observation that:
               If, following the canon dictated by orthodox methodolo-
               gy, you take a random sample, you mutilate the very ob-
               ject you have set out to construct.  If, in a study of
               the field of lawyers, for instance, you do not draw the
               President of the Supreme Court,  or if,  in an inquiry
               into the French intellectual field  of the 1950s,  you
               leave out Jean-Paul Sartre,  or Princeton University in
               a study of American academics, your field is destroyed,
               insofar as these personas or  institutions alone mark a
               crucial position--there are positions  in a field which
               command the whole structure  (Bordieu,  interviewed in
               Wacquant, 1989: 38).
               We judge our  sample of participants adequate  for several
          reasons.   First,  we presume that the members with whom we have
          had contact comprise the elite members of the culture,  as deter-
          mined by the nature of the  boards they were on,  references to
          them on national  boards,  the level of  expertise displayed in
          their messages, and their appearance in the "user lists" of elite
          boards.   We consider the BBSs to be "typical exemplars" because
          of their status in the culture, because of the level of sophisti-
          cation both of users and of message content,  and because of ref-
          erences to these boards as "elite" in CU periodicals.
                              The Computer Underground
               The computer underground is both a  life style and a social
          network.   As a lifestyle, it provides identity and roles, an op-
          erational ideology,  and guides daily routine.  As a social net-
          work,  it functions as a  communications channel between persons
          engaged in one of three basic activities:   Hacking,  phreaking,
 
                                       - 12 -
 
 
          and pirating[4].   Each subgroup possesses an explicit style that
          includes an ethic and "code  of honor," cohesive norms,  career
          paths,  and other characteristics that  typify a culture (Meyer,
          1989a, 1989b; Meyer and Thomas, 1989).
               Hebdige (1982:  113-117) used the concept of homology to de-
          scribe the structural unity that  binds participants and provides
          the "symbolic fit between the values  and life-styles of a group"
          and how it expresses or reinforces its focal concerns.   Homology
          refers to the affinity and similarities  members of a group share
          that give it the particular cultural identity.   These shared al-
          ternative values and actions connect CU members to each other and
          their culture,  and create a celebration of "otherness" from the
          broader culture.
          Hackers
                (Tune: "Put Another Nickel in")
                Put another password in,
                Bomb it out, and try again,
                Try to get past logging in,
                Were hacking, hacking, hacking.
                Try his first wife's maiden name,
                This is more than just a game,
                It's real fun, but just the same
                It's hacking, hacking, hacking.
                Sys-call, let's try sys-call.
                Remember, that great bug from Version 3,
                Of R S X, It's here!  Whoopee!
                Put another sys-call in,
                Run those passwords out and then,
                Dial back up, we're logging on,
                We're hacking, hacking, hacking.
                (The Hacker Anthem, by Chesire Catalyst)
               Hacking broadly refers to attempts to gain access to comput-
          ers to which one does not possess authorization.  The term "hack-
          ers" first came into use in the  early 1960's when it was applied
 
                                       - 13 -
 
 
          to a  group of pioneering  computer aficionados at  MIT (Levy,
          1984).   Through the 1970s,  a hacker was viewed as someone obs-
          essed with  understanding and mastering computer  systems (Levy
          1984). But, in the early 1980's, stimulated by the release of the
          movie "War Games"  and the much publicized arrest  of a "hacker
          gang" known as "The 414s",  hackers were seen as young whiz-kids
          capable of breaking into corporate  and government computer sys-
          tems (Landreth 1985:34).   The imprecise media definition and the
          lack of any clear understanding of what  it means to be a hacker
          results in the mis-application of the  label to all forms of com-
          puter malfeasance.
               Despite the inter-relationship between  phreaks and hackers,
          the label of "hacker" is generally  reserved for those engaged in
          computer system trespassing.   For CU participants,  hacking can
          mean either attempting to gain access  to a computer system,  or
          the more refined goals of exploring in,  experimenting with,  or
          testing a computer system.  In the first connotation, hacking re-
          quires skills to obtain valid  user accounts on computer systems
          that would otherwise be unavailable,   and the term connotes the
          repetitive nature of break-in attempts.  Once successful entry is
          made,  the illicit accounts are often shared among associates and
          described as being "freshly (or newly) hacked."
               The second  connotation refers  to someone  possessing the
          knowledge, ability,  and desire to fully explore a computer sys-
          tem.   For elite hackers,  the mere act of gaining entry is not
          enough to warrant the "hacker" label;  there must be a desire to
 
                                       - 14 -
 
 
          master and  skill to  use the  system after  access has  been
          achieved:
               It's Sunday night,  and I'm in  my room,  deep into a
               hack.   My eyes are on the monitor, and my hands are on
               the keyboard,  but my mind  is really on the operating
               system of a super-minicomputer a  thousand miles away -
               a super-mini with an operating systems that does a good
               job of tracking users, and that will show my activities
               in its user logs,  unless I  can outwit it in the few
               hours before  the Monday  morning staff  arrives for
               work.....Eighteen hours ago,  I managed to hack a pass-
               word for the PDP 11/44.  Now, I have only an hour or so
               left to alter the user logs.  If I don't the logs will
               lead the system operators to my secret account, and the
               hours of work  it took me to get this  account will be
               wasted (Landreth, 1985: 57-58).
               An elite hacker must experiment  with command structures and
          explore the many files available in  order to understand and ef-
          fectively use the  system.  This is sometimes  called "hacking
          around" or simply "hacking a system".  This distinction is neces-
          sary because not all trespassers are necessarily skilled at hack-
          ing out passwords,  and not all hackers retain interest in a sys-
          tem once  the challenge of  gaining entry has  been surmounted.
          Further, passwords and accounts are often traded,  allowing even
          an unskilled intruder to erroneously claim the title of "hacker."
               Our data indicate that, contrary to their media image, hack-
          ers avoid deliberately destroying data  or otherwise damaging the
          system.   Doing so would conflict with their instrumental goal of
          blending in with the average user  to conceal their presence and
          prevent the deletion of the account.   After spending what may be
          a substantial amount  of time obtaining a  high access  account,
          the hacker places a high priority  on not being discovered using
          it,  and hackers share considerable  contempt for media stories
 
                                       - 15 -
 
 
          that portray them  as "criminals."  The leading  CU periodicals
          (e.g., PHRACK, PIRATE)  and several CU "home boards" reprint and
          disseminate media stories, adding ironic commentary.  The percep-
          tion of media  distortion also provides grist  for message sec-
          tions:
               A1: I myself hate newspaper reporters who do stories on
               hackers, piraters, phreaks,  etc...because they always
               make us sound like these  incred.  {sic} smart people
               (which isn't too bad) who are the biggest threat to to-
               days community.  Shit...the  BEST hackers/phreaks/etc
               will tell you that they only  do it to gain information
               on those systems,  etc...(Freedom  - That's what they
               call it...right?)  (grin)
               A2: Good point...never met a "real p/h type yet who was
               into ripping off. To rip of a line from the Steve Good-
               man song (loosely),  the game's the thing.  Even those
               who allegedly fly the jolly rodger {pirates},  the true
               ones, don't do it for the rip-off, but,  like monopoly,
               to see if they can get Boardwalk and Park Place without
               losing any railroads.  Fun of the latter is to start on
               a board with a single good game or util {software util-
               ity} and see what it can be turned into,  so I'm told.
               Fuck the press (DS message log, 1989).
               One elite hacker,  a member of a loose-knit organization re-
          cently in the national news  when some participants were indicted
          for hacking,  responded to media distortions of the group by is-
          sueing an underground press release:
               My name is {deleted}, but to the computer world,  I am
               {deleted}.   I have been a member of the group known as
               Legion of Doom since its  creation,  and admittedly I
               have not been the most legitimate computer user around,
               but when people start hinting at my supposed Communist-
               backed actions,  and say that I am involved in a world-
               wide conspiracy to destroy the nation's computer and/or
               911 network,  I have to speak  up and hope that people
               will take what I have to say seriously. . . .
               People just can't seem to grasp  the fact that a group
               of 20 year old kids just  might know a little more than
               they do,  and rather than make  good use of us,  they
               would rather  just lock us  away and keep  on letting
               things pass by them.   I've said this before, you can't
                                       - 16 -
 
 
               stop burglars from robbing you when you leave the doors
               unlocked and merely bash them in the head with baseball
               bats when they walk in.   You  need to lock the door.
               But when you leave the doors open, but lock up the peo-
               ple who can  close them for you  another burglar will
               just walk right in ("EB," 1990).
               Although skirting the law, hackers possess an explicit ethic
          and their primary goal is  knowledge acquisition.   Levy (1984:
          26-36) identifies six "planks" of the original hacker ethic,  and
          these continue to guide modern hackers:
             1.  First,  access to computers should be unlimited and total:
                 "Always yield to the Hands-On Imperative!"
             2.  Second, all information should be free.
             3.  Third, mistrust authority and promote decentralization.
             4.  Fourth, hackers should be judged by their prowess as hack-
                 ers rather than by formal  organizational or other irrele-
                 vant criteria.
             5.  Fifth, one can create art and beauty on a computer.
             6.  Finally, computers can change lives for the better.
               PHRACK,  recognized as the  "official" p/hacker newsletter,
          expanded on this creed with a rationale that can be summarized in
          three principles ("Doctor Crash," 1986).   First, hackers reject
          the notion that "businesses" are the  only groups entitled to ac-
          cess and use of modern technology.   Second,  hacking is a major
          weapon in the fight against encroaching computer technology.  Fi-
          nally,  the high cost of equipment  is beyond the means of most
          hackers, which results in the perception that hacking and phreak-
          ing are the only recourse to  spreading computer literacy to the
          masses:
 
                                       - 17 -
 
 
               Hacking.  It is a full  time hobby,  taking countless
               hours per week to learn,  experiment,  and execute the
               art of penetrating multi-user computers:   Why do hack-
               ers spend a good portion of their time hacking?   Some
               might say it is scientific curiosity, others that it is
               for mental stimulation.   But the true roots of hacker
               motives run much deeper than that.  In this file I will
               describe the underlying motives  of the aware hackers,
               make known the connections between Hacking,  Phreaking,
               Carding, and Anarchy,  and make known the "techno-revo-
               lution" which  is laying seeds  in the mind  of every
               hacker.  . .  .If you need a tutorial on how to perform
               any of the above stated  methods {of hacking},  please
               read a {PHRACK} file on it.   And whatever you do, con-
               tinue the fight. Whether you know it or not, if you are
               a hacker, you are a revolutionary.  Don't worry, you're
               on the right side ("Doctor Crash," 1986).
               Computer software,  such as auto-dialers popularized in the
          film War Games,  provides a  means for inexperienced hackers to
          search out other computers.   Auto-dialers randomly dial numbers
          and save the "hits" for manual testing later.  Some users self-i-
          dentify has hackers simply on  the basis of successfully collect-
          ing computer numbers or passwords, but these users are considered
          "lamerz," because they do not possess sufficient knowledge to ob-
          tain access or move about in  the system once access is obtained.
          Lamerz are readily identified by their message content:
                 Sub ->numbers
                From -> (#538)
                To   ->all
                Date ->02/21/xx 06:10:00 PM
               Does anyone know any numbers for hotels, schools, busi-
               nesses,  etc..and passwords if you  do please leave a
               bulletin with the number and  the password and/or logon
               id.
                 Sub ->phun
                From -> (#138)
                To   ->all
                Date ->02/22/xx 12:21:00 AM
               Anyone out there  got some good 800 dial  up that are
               fairly safe to hack?  If so could ya leave me em in e-
                                       - 18 -
 
 
               mail or post em with  the formats.....any help would{be
               appreciated......
                                 thanx
                 Sub ->NUMBERS
                From -> (#538)
                To   ->ALL
                Date ->02/24/xx 03:12:00 PM
               Does anyone have any 1-800 numbers with id,  logon and
               passwords?
                 Sub ->Credit Card's for Codez
                From -> (#134)
                To   ->All
                Date ->01/26/xx 07:43:00 AM
               Tell ya what.   I will  exchange any amount of credit
               cards for a code or two.  You name the credit limit you
               want on the credit card and I will get it for you.   I
               do this cause I to janitorial  work at night INSIDE the
               bank when no one is there..... heheheheheh
                 Sub ->Codes..
                From -> (#660)
                To   ->All
                Date ->01/31/xx 01:29:00 AM
               Well,  instead of leaving codes,   could you leave us
               "uninformed" people with a few 800 dialups and formats?
               I don't need codes,  I just want dialups!   Is that so
               much to ask?   I would be willing to trade CC's {credit
               cards} for dialups.  Lemme know..
                 Sub ->0266 Codez
                From -> (#134)
                To   ->All
                Date ->01/31/xx 06:56:00 AM
               Anyone, What is the full dial up for 0266 codez?
               Such requests are considered amateurish, rarely generate the
          requested information,  and elicit  predictable "flamez" (severe
          criticism) or even potentially dangerous pseudo-assistance:
                 Sub ->Reply to: 0266 Codez
                From -> (#124)
                To   ->C-Poo
                Date ->01/31/xx 09:02:00 AM
 
                                       - 19 -
 
 
               Okay,   here's  the full  info,   Chris:    Dial
               1-900-(pause)-{xxx}-REAL.   When it  answers,   hit
               #*9876321233456534323545766764 Got it?   Okay, here's a
               800 number to try:  1-800-426-{xxxx}.   Give the opera-
               tor your zip,and fake it from there!   Enjoy, you hack-
               meister, you!
                Sub ->Reply to: 0266 Codez
                From -> (#448)
                To   -> #38
                Date ->01/31/xx 03:43:00 PM
               What the fuck kind of question  is that?  Are you that
               stupid?  what is the full dial up for an 0266?  Give me
               a break!  Call back when you learn not when you want to
               leech!
                 Sub ->CC-ING
                From -> (#393)
                To   -> #38
                Date ->02/05/xx 01:41:00 AM
               WHAT THE HELL ARE YOU?  PROBABLY A NARC, AREN'T YA!  NO
               ONE IN HIS RIGHT MIND ASKS FOR CARDS. (AND NARCS AREN'T
               IN THEIR RIGHT MINDS) AND GIVE OUT CARDS,  WHAT DO YOU
               THINK WE ARE, SHLONGS?!  PERSONALLY I GET MY OWN ON THE
               JOB,  PUMPING GAS  PAYS A  LOT MORE  THAN YOU THINK,
               THEREFORE I DON'T NEED ANY.  THINK ABOUT IT, IF YOU ARE
               A GOOD HACKER, WHICH I CAN SEE YOU'RE NOT, THEN YOU CAN
               HACK OUT YOUR OWN CODEZ.   PEOPLE WHO NEED CCS CAN CALL
               CC-VMBS.  I HAVE ONE,  BUT DON'T ASK FOR IT.   IF YOU
               DON'T KNOW  MY CC-VMB LINE  THEN YOU'RE NOT  TO WELL
               KNOWN.   A LOT OF KNOWN  HACKERS KNOW MY  CC-VMB LINE.
               WELL, IF YOU'RE A NARC, YOU'VE JUST BEEN FOUND OUT,  IF
               NOT YOU MIGHT WANT TO GET A JOB AS ONE CUZ YOU ACT JUST
               LIKE ONE {In BBS protocol,  upper case letters indicate
               emphasis, anger, or shouting}.
               Although hackers  freely acknowledge that  their activities
          may be occasionally illegal,  considerable emphasis is placed on
          limiting violations only to those  required to obtain access and
          learn a system,   and they display hostility  toward those who
          transgress beyond beyond these limits.   Most experienced CU mem-
          bers are suspicious of young novices who are often entranced with
          what they perceive to be the "romance" of hacking.  Elite hackers
 
                                       - 20 -
 
 
          complain continuously that  novices are at an  increased risk of
          apprehension and also can "trash"  accounts on which experienced
          hackers have gained and hidden their access.   Nonetheless,  ex-
          perienced hackers take pride in  their ethic of mentoring promis-
          ing newcomers, both through their BBSs and newsletters:
               As {my} reputation grew,  answering such requests [from
               novice hackers wanting help] became  a matter of pride.
               No matter how difficult the question happened to be,  I
               would sit at the terminal for five, ten,  twenty hours
               at a time, until I had the answer (Landreth, 1985: 16).
               The nation's top elite p/hacker  board was particularly nur-
          turing of promising novices before it voluntarily closed in early
          1990, and its sysop's handle means "teacher."  PHRACK,  begun in
          1985,  normally contained 10-12  educational articles (or "phi-
          les"),  most of which  provided explicit sophisticated technical
          information about computer networks  and telecommunications sys-
          tems[5].   Boundary  socialization occurs in message  bases and
          newsletters that  either discourage  such activity  or provide
          guidelines for concealing access once obtained:
               Welcome to the world of hacking!  We,  the people who
               live outside of the normal rules, and have been scorned
               and even arrested by those  from the 'civilized world',
               are becoming scarcer  every day.  This is  due to the
               greater fear of what a good hacker (skill wise, no mor-
               al judgements here) can do nowadays, thus causing anti-
               hacker sentiment in the masses.  Also, few hackers seem
               to actually know about the  computer systems they hack,
               or what equipment they will run  into on the front end,
               or what they  could do wrong on a system  to alert the
               'higher' authorities who monitor the system. This arti-
               cle is intended  to tell you about some  things not to
               do, even before you get on the system. We will tell you
               about the new wave of  front end security devices that
               are beginning to be used on computers.  We will attempt
               to instill in you a second identity,  to be brought up
               at time of  great need,  to pull you  out of trouble.
               (p/hacker newsletter, 1987).
 
                                       - 21 -
 
 
               Elite hacking requires highly sophisticated technical skills
          to enter the maze of protective barriers,  recognize the computer
          type, and move about at the highest system levels.   As a conse-
          quence, information sharing becomes the sine qua non of the hack-
          er culture.   "Main message" sections  are generally open to all
          users, but only general information, gossip,  and casual commen-
          tary is posted. Elite users, those with higher security privileg-
          es and access to the "backstage" regions,  share technical infor-
          mation and problems, of which the following is typical:
                   89Mar11
                   From ***** ** * ***>
               Help! Anyone familiar with a system that responds:
                 A2:       SELECT     :       DISPLAY:
               1=TRUNK,2=SXS;INPUT:3=TRUNK,4=SXS,5=DELETE;7=MSG    If you chose 1...  ENTER
               OLD#,(R=RETURN)
                 At this point I know you can enter 7 digits,  the 8th
               will give you an INVALID ENTRY type message.  Some num-
               bers don't work however.  (1,2,7,8 I know will)
                 Anybody?
                   89Mar10
                   From *********>
               I was hacking around on telenet (415 area code) and got
               a few things that I am stuck-o on if ya can help,  I'd
               be greatly happy.   First of all,   I got  one that is
               called RCC PALO ALTO and I can't figure it out.  Second
               (and this looks pretty fun)  is the ESPRIT COMMAIL  and
               I know that a user name is  SYSTEM because it asked for
               a password on ONLY that account (pretty obvious eh?)  a
               few primnet and  geonet nodes and a  bunch of TELENET
               ASYYNC to 3270 SERVICE.   It asks for TERMINAL TYPE, my
               LU NUMBER and on numbers  higher  than 0 and lower that
               22 it asks for a password.  Is it an outdial?  What are
               some common passwords?  then I got a sushi-primnet sys-
               tem.  And a dELUT system.   And at 206174 there is JUST
               a :  prompt.  help!  (P/h message log, 1988).
               Rebelliousness also permeates the hacker  culture and is re-
          flected in actions, messages, and symbolic identities.  Like oth-
 
                                       - 22 -
 
 
          er CU participants, hackers employ handles (aliases)  intended to
          display an aspect of one's personality and interests,  and a han-
          dle can often reveal whether its  owner is a "lamer" (an incompe-
          tent)  or sophisticated.   Hackers take  pride in their assumed
          names, and one of the greatest taboos is to use the handle of an-
          other or to use multiple handles.  Handles are borrowed liberally
          from the anti-heros of science fiction,  adventure fantasy,  and
          heavy metal rock lyrics,  particularly among younger users,  and
          from word plays on technology, nihilism,  and violence.   The CU
          handle reflects a stylistic identity  heavily influenced by meta-
          phors reflecting color (especially red and black),  supernatural
          power (e.g., "Ultimate Warrior, "Dragon Lord"), and chaos ("Death
          Stalker," "Black Avenger"), or ironic twists on technology,  fan-
          tasy, or symbols of mass culture (e.g., Epeios,  Phelix the Hack,
          Ellis Dea, Rambo Pacifist, Hitch Hacker).
               This anti-establishment ethos also  provides an ideological
          unity for collective  action.   Hackers have been  known to use
          their collective skills in retaliation  for acts against the cul-
          ture that the perceive as unfair by, for example, changing credit
          data or "revoking" driver's licenses (Sandza, 1984b;  "Yes,  you
          Sound very Sexy," 1989).   Following a bust of a national hacker
          group, the message section of the "home board" contained a lively
          debate on the desireability of  a retaliatory response,  and the
          moderates prevailed.   Influenced especially by such science fan-
          tasy as William Gibson's Neuromancer (1984),  John Brunner's The
          Shockwave Rider (1975), and cyber-punk, which is a fusion of ele-
 
                                       - 23 -
 
 
          ments of electronic communication technology  and the "punk" sub-
          culture,  the hacker ethic promotes resistance to the very forms
          that create it.   Suggestive of Frazer's (1922) The Golden Bough,
          power is challenged and supplanted  by rituals combining both de-
          struction and rejuvenation.   From this emerges a shared ethos of
          opposition against perceived Orwellian  domination by an informa-
          tion-controlling elite:
               (Hackers will) always be necessary,  especially in the
               technological oppression of the future.   Just imagine
               an information system that  systematically filters out
               certain obscene words.   Then it will move on to phras-
               es,  and then entire ideas will be replaced by comput-
               ers!   Anyway, there will always be people tripping out
               on paper and trying to keep it to themselves,  and it's
               up to us to at least loosen their grasp (P.A.  Message
               Log 1988).
          Another hacker summarized the  near-anarchist ethic characterized
          the CU style:
               Lookit, we're here as criminal hobbyists, peeping toms,
               and looters.   I am in it for the fun.   Not providing
               the public what it has a right to know,  or keeping big
               brother in check.  I couldn't care less.   I am sick of
               the old journalistic hackers  nonsense about or (oops!
               OUR)  computerized ego...I make  no attempt to justify
               what I am doing.  Because it doesn't matter. As long as
               we live in this goddamn welfare  state I might as well
               have some fun taking what isn't mine,  and I am better
               off than  those welfare-assholes  who justify  their
               stealing.   At least I am smart enough to know that the
               free lunch  can't go on  forever (U.U.   message log
               1988).
               In sum, the hacker style reflects well-defined goals, commu-
          nication networks, values, and an ethos of resistance to authori-
          ty.  Because hacking requires a  broader range of knowledge than
          does phreaking,  and because such knowledge can be acquired only
          through experience, hackers tend to be both older and more knowl-
 
                                       - 24 -
 
 
          edgeable than phreaks.   In addition, despite some overlap,  the
          goals of the two are somewhat dissimilar.  As a consequence, each
          group constitutes a separate analytic category.
          Phreaks.
               Running numbers is not only fun;  it's a moral impera-
               tive!  (Phreak credo).
               Phreaking broadly refers  to the practice of  using either
          technology or telephone credit card numbers (called "codez")  to
          avoid long distance charges.  Phreaking attained public visibili-
          ty with the  revelation of the exploits of  John "Cap'n Crunch"
          Draper, the "father of phreaking" (Rosenbaum,  1971).   Although
          phreaking and hacking each require different skills,  phreaks and
          hackers tend to associate on same boards.   Unlike hackers,  who
          attempt to master a computer system  and its command and security
          structure,  phreaks struggle to  master telecom (tele-communica-
          tions) technology:
               The phone system is the most interesting,  fascinating
               thing that I know of. There is so much to know.   Even
               phreaks have their own areas of knowledge.  There is so
               much to know that one phreak could know something fair-
               ly important and the next phreak not.  The next phreak
               might know  10 things that  the first  phreak doesn't
               though.  It all  depends upon where and  how they get
               their info.  I myself would like to work for the telco,
               doing something interesting, like programming a switch.
               Something that isn't slave  labor bullshit.  Something
               that you enjoy, but have to take risks in order to par-
               ticipate unless you are lucky  enough to work for Bell/
               AT&T/any telco.  To have legal access to telco things,
               manuals, etc. would be great (message log, 1988).
               Early phreaking methods  involved electro-mechanical devices
          that generated key tones or altered  phone line voltages to trick
          the mechanical  switches of the  phone company  into connecting
 
                                       - 25 -
 
 
          calls without charging, but the advent of computerized telephone-
          switching systems largely made these devices obsolete.   In order
          to continue their practice,  phreaks  have had to learn hacking
          skills in order to obtain  access to telephone company computers
          and software.
               Access to telecom information takes several forms,  and the
          possesion of numbers for "loops" and  "bridges," while lying in a
          grey area of law, further enhances the reputation and status of a
          phreak.   P/hackers can utilize "loop lines" to limit the number
          of eavesdroppers on their conversations.  Unlike bridges,  which
          connect an unlimited number of callers simultaneously,  loops are
          limited to just two people at a time[6].  A "bridge" is a techni-
          cal name for what is commonly known  as a "chat line" or "confer-
          ence system." Bridges are familiar to the  public as the pay-per-
          minute  group conversation  systems advertised  on late  night
          television.   Many bridge systems are owned by large corporations
          that maintain them for business use  during the day.   While the
          numbers to these systems are not public knowledge,  many of them
          have been discovered by phreaks who  then utilize the systems at
          night.   Phreaks are skilled at  arranging for a temporary, pri-
          vate bridge to  be created via ATT's  conference calling facili-
          ties.   This  provides a helpful information  sharing technique
          among a self-selected group of phreak/hackers:
               Bridges can be extremely  useful means of distributing
               information as long as the {phone} number is not known,
               and you don't have a  bunch of children online testing
               out their DTMF.   The last great discussion I partici-
               pated with over a bridge occurred about 2 months ago on
               an AT&T  Quorum where all  we did was  engineer 3/way
               {calls} and restrict ourselves  to purely technical in-
                                       - 26 -
 
 
               formation. We could have convinced the Quorum operators
               that we were  AT&T technicians had the  need occurred.
               Don't let the kids ruin all  the fun and convenience of
               bridges.   Lameness is one thing,  practicality is an-
               other (DC, message log, 1988).
               Phreaks recognize their precarious legal position,  but see
          no other way to "play the game:"
               Phreaking involves  having the  dedication to  commit
               yourself to learning  as much about the  phone system/
               network as possible.  Since most of this information is
               not made public,   phreaks have to resort  to legally
               questionable means  to obtain the knowledge  they want
               (TP2, message log, 1988).
               Little sympathy exists among experienced phreaks for "teleco
          ripoff."  "Carding," or the use  of fraudulent credit cards,  is
          anathema to phreaks,  and not only violates the phreaking ethic,
          but is simply not the goal of phreaking:
               Credit card  fraud truly gives  hacking a  bad name.
               Snooping  around a  VAX is  just electronic  voyeu-
               rism. . .carding a new modem is just flat out blue-col-
               lar crime.   It's just as bad as breaking into a house
               or kicking a puppy!   {This phreak} does everything he
               can (even up to turning off a number) to get credit in-
               formation taken off a BBS.  {This phreak} also tries to
               remove codes from BBSes.   He doesn't see code abuse in
               the same light as credit card fraud,  (although the law
               does),  but posted codes are  the quickest way to get
               your board busted, and your computer confiscated.  Peo-
               ple should just find a  local outdial to wherever they
               want to call  and use that.   If you  only make local
               calls from an outdial, it will never die, you will keep
               out of trouble,  and everyone  will be happy (PHRACK,
               3(28): Phile 2).
               Experienced phreaks  become easily angered at  novices and
          "lamerz" who engage in fraud or are interested only in "leeching"
          (obtaining something for nothing):
                Sub ->Carding
                From ->JB (#208)
                To   ->ALL
                Date ->02/10/xx 02:22:00 PM
 
                                       - 27 -
 
 
               What do you  people think about using  a parents card
               number for carding?   For instance,  if I had a friend
               order and receive via next day  air on my parents card,
               and receive it at my parents house while we were on va-
               cation.  Do you think that would work?   Cuz then, all
               that we have to do is to leave the note,  and have the
               bud pick up the packages,  and  when the bill came for
               over $1500, then we just say... 'Fuck you!   We were on
               vacation!   Look at  our airline tickets!' I  hope it
               does... Its such a great plan!
                Sub ->Reply to: Carding
                From -> (xxx)
                To   -> X
                Date ->02/11xx 03: 16:00 AM
               NO IT'S  NOT A GREAT  IDEA!   WHERE'S YOUR  SENSE OF
               RESPONSIBILITY TO  YOUR FAMILY?    ARE THEY  ALL IN
               AGREEMENT WITH YOU?   WOULD YOU WANT ANYONE TO USE YOUR
               PRIVATE STUFF  IN ILLEGAL (AND  IMMORAL)  ACTIVITIES
               WITHOUT YOUR KNOWLEDGE?   DIDJA  EVER HEAR ABOUT TRUST
               BETWEEN FAMILY MEMBERS?   IF YOU'RE GOING TO BE A THIEF
               (AND THAT'S NOT  NEAT LIKE JAMES BOND  IN THE MOVIES),
               TAKE THE RISKS ONLY UPON YOURSELF!
                Sub ->Carding
                From -> (#208)
                To   -> (#47)
                Date ->02/12/xx 11: 18:00 AM
               Why not?   We  have a law that says that  we have the
               right to refuse  payment to credit cards  if there are
               fraudulent charges.   All we do  and it is settled....
               what is so bad about it?  I'm going for it!
                 Sub ->Reply to: Carding
                From -> (xxx)
                To   ->J.B.
                Date ->02/13/xx 02:08:00 AM
               APPARENTLY YOU MISSED THE MAIN  POINTS I TRIED TO MAKE
               TO YOU . . .   YOU'RE  A THIEF AND A  LIAR,  AND ARE
               BETRAYING THE TRUST OF YOUR FAMILY AS WELL AS INVOLVING
               THEM IN YOUR RISK WITHOUT THEIR KNOWLEDGE.   THAT MEANS
               YOU ARE A  FAIRLY SCUMMY INDIVIDUAL IF  YOU GO THROUGH
               WITH IT!   NOW AS TO YOUR "DEFENCE" ABOUT $50 MAXIMUMS
               AND ERRONEOUS BILLINGS..  LAW MAKES A CLEAR DISTINCTION
               ABOUT THEFT BY  FRAUD (OF WHICH YOU  WOULD BE GUILTY).
               AND IN A LARGER SENSE,  YOUR  THEFT JUST MAKES IT MORE
               COSTLY FOR YOU  YOU AND EVERYBODY ELSE  TO GET CREDIT,
               AND DO BUSINESS WITH CREDIT CARDS.   YOU'RE GOING TO DO
               WHATEVER YOU DO ANYWAY.....DON'T  LOOK FOR ANY APPROVAL
               IN THIS DIRECTION.
                                       - 28 -
 
 
               Ironically,  experienced phreaks are  not only offended by
          such disregard of law,  but also feel that "rip-off artists" have
          no information to share and only increase the risk for the "tech-
          no-junkies."  Message boards reflect hostility toward apprehended
          "lamerz" with such  comments as "I hope they burn  him," or "the
          lamer probably narked  {turned informant} to the  pheds {law en-
          forcement agents}."  Experienced phreaks  also post continual re-
          minders that some actions, because of their illegality,  are sim-
          ply unacceptable:
               It should be pointed out  however,  that should any of
               you crack any WATS EXTENDER access codes and attempt to
               use them,  you are guilty  of Theft of communications
               services from the company who owns it, and Bell is very
               willing and able to help nail you!  WATS EXTENDERS can
               get you  in every bit as  much trouble as a  Blue Box
               should you be caught.
               Ex-phreaks,  especially those who are  no longer defined by
          law as juveniles,  often attempt to caution younger phreaks from
          pursuing phreaking:
               ZA1: One thing to consider, also, is that the phone co.
               knows where the  junction box is for all  of the lines
               that you are messing with and  if they get enough com-
               plaints about the bills, they may start to check things
               out (I hope your work is neat).  I would guess that the
               odds are probably against  this from happening though,
               because when  each of the  people call  to complain,
               they'll probably get a different  person from the oth-
               ers.   This means that someone at Ma Bell has to notice
               that all of  the complaints are coming  from the same
               area...I don't  think anybody there really  cares that
               much about their  job to really start  noticing things
               like that...anyway, enjoy!!!   My guess is that you're
               under-age.  Anyway, so if they catch you, they won't do
               anything to you anyway.
               ZB1:  Yeah I am a minor (17 years old) I just hope that
               they don't cause I would like to not have a criminal or
               juvenile record when I apply to college.  Also if they
               do come as I said in the  other message if there are no
               wires they can't prove shit. Also as I said I only hook
               up after 6 p.m.  The phone company doesn't service peo-
                                       - 29 -
 
 
               ple after 6 p.m.   Just recently (today) I hooked up to
               an empty line.    No wires were leading  from the two
               plugs to somebody  house but I got a  dial tone.  How
               great. Don't have to worry about billing somebody else.
               But I still  have to disconnect cause  the phone bills
               should be  coming to the  other people  pretty soon.
               HEHEHEHE
               ZX1: Be cool on that, especially if you're calling oth-
               er boards.   Easiest way for telecom security to catch
               you is match the number called to the time called, call
               the board,  look at users log or messages for hints of
               identity, then work from there.  If you do it too much
               to a pirate board,  they  can (and have successfully)
               pressured the sysop to reveal the identity under threat
               of prosecution.  They may or may not be able to always
               trace it back,  but remember:  Yesterday's phreaks are
               today's telecom security folk.   AND: IT'S NOT COOL TO
               PHREAK TO  A PIRATE  BOARD...draws attention  to that
               board and screws it up  for everybody.  So,  be cool
               phreaking....there's safer ways.
               ZC2:  Be cool, Wormburger.  They can use all sorts of
               stuff for evidence.  Here's what they'd do in Ill.  If
               they suspected you, they'd flag the phone lines,  send
               somebody out during the time you're on (or they suspect
               you're on) and nail you.  Don't want to squelch a bud-
               ding phreak,  but you're  really taking an unnecessary
               chance.   Most of  us have been doing  stuff for some
               time,  and just don't want to  see you get nailed for
               something. There's some good boards with tips on how to
               phreak, and if you want the numbers, let me know. We've
               survived to warn you because  we know the dangers.  If
               you don't know what ESS is, best do some quick research
               (P/h message log, 1988).
               In sum,  the attraction of phreaking and its attendant life-
          style appear to center on three fundamental characteristics:  The
          quest for knowledge,  the belief in a higher ideological purpose
          of opposition to potentially dangerous technological control, and
          the enjoyment of risk-taking.   In a sense, CU participants con-
          sciously create dissonance as a  means of creating social meaning
          in what is perceived as  an increasingly meaningless world (Milo-
          vanovic and Thomas, 1989).   Together,  phreaks and hackers have
 
                                       - 30 -
 
 
          created an overlapping culture that,  whatever the legality,  is
          seen by participants as a legitimate enterprise in the new "tech-
          no-society."
                                     Conclusion
               The transition to an  information-oriented society dependent
          on computer technology brings with  it new symbolic metaphors and
          behaviors.  Baudrillard (1987:  15)  observed that our private
          sphere now ceases to be the stage  where the drama of subjects at
          odds with their objects and with their image is played out,  and
          we no longer exist as playwrites or actors,  but as terminals of
          multiple networks.   The public space of the social arena is re-
          duced to the private space of  the computer desk,  which in turn
          creates a new semi-public, but restricted,  public realm to which
          dissonance seekers retreat.   To participate in the computer un-
          derground is to engage in what Baudrillard (1987:  15) describes
          as private telematics, in which individuals,  to extend Baudril-
          lard's fantasy metaphor,  are transported from their mundane com-
          puter system to the controls of a hypothetical machine,  isolated
          in a position of perfect  sovereignty,  at an infinite distance
          from the original universe.   There, identity is created through
          symbolic strategies and collective  beliefs (Bordieu,  cited in
          Wacquant, 1989: 35).
               We have argued  that the symbolic identity  of the computer
          underground creates a rich and  diverse culture comprised of jus-
          tifications, highly specialized skills,  information-sharing net-
          works, norms, status hierarchies, language, and unifying symbolic
 
                                       - 31 -
 
 
          meanings.   The stylistic elements of  CU identity and activity
          serve what Denzin (1988:  471) sees as the primary characteristic
          of postmodern behavior,  which is to  make fun of the past while
          keeping it alive and the search for  new ways to present the un-
          presentable in order  to break down the barriers  that keep the
          profane out of the everyday.
               The risks entailed by acting on  the fringes of legality and
          substituting definitions of acceptable  behavior with their own,
          the playful parodying of mass culture,  and the challenge to au-
          thority constitute an exploration of the limits of techno-culture
          while resisting the  legal meanings that would  control such ac-
          tions.   The celebration of anti-heros, re-enacted through forays
          into the world of computer  programs and software,  reflects the
          stylistic promiscuity,  eclecticism and code-mixing that typifies
          the postmodern experience (Featherstone, 1988: 202).  Rather than
          attempt to fit within modern culture and adapt to values and def-
          initions imposed on them,  CU  participants mediate it by mixing
          art, science, and resistance to create a culture with an alterna-
          tive meaning both to the dominant one and to those that observers
          would impose on them and on their enterprise.
               Pfuhl (1987) cogently argued that criminalization of comput-
          er abuse tends to polarize definitions of behavior.   As a conse-
          quence, To view the CU as simply another form of deviance,  or as
          little more than  "high-tech street gangs" obscures  the ironic,
          mythic, and subversive element,  the Nieztschean "will to power,"
          reflected in the attempt to  master technology while challenging
 
                                       - 32 -
 
 
          those forces that control it.   The "new society" spawned by com-
          puter technology is in its infancy, and, as Sennet (1970:  xvii)
          observed, the passage of societies through adolescence to maturi-
          ty requires acceptance of disorder and painful dislocation.
               Instead of embracing the dominant culture, the CU has creat-
          ed an irreducible cultural alternative, one that cannot be under-
          stood without locating its place  within the dialectic of social
          change.  Especially in counter-cultures, as Hebdige (1983: 3) ob-
          serves, "objects are made to mean and mean again," often ending:
             ..  .in the construction of a style, in a gesture of
               defiance or contempt, in a smile or a sneer.   It sig-
               nals a Refusal.  I would like to think that this Reusal
               is worth making,  that these  gestures have a meaning,
               that the smiles  and the sneers have  some subversive
               value. . .  (Hebdige, 1982: 3).
 
 
 
 
 
 
 
 
 
 
                                       - 33 -
 
 
                                      Footnotes
          [1] Participants in the computer underground engage in considera-
              ble word play that includes juxtaposition of letters. For ex-
              ample, commonly used words beginning with "f" are customarily
              spelled with a  "ph."  The CU spelling  conventions are re-
              tained throughout this paper.
          [2] Conly and McEwen (1990:  3) classify "software piracy" in the
              same category as theft of  computers and trade secrets,  and
              grossly confuse both the concept  and definition of computer
              crime by conflating any  illicit activity involving computers
              under a definition  so broad that embezzlement  and bulletin
              boards all fall within it.   However, the label of "computer
              criminal" should be reserved for those who manipulate comput-
              erized records in order to defraud or damage, a point implied
              by Bequai (1978: 4) and Parker (1983: 106).
          [3] One author has been active  in the computer underground since
              1984 and participated in Summercon-88 in St. Louis, a nation-
              al conference of elite hackers.   The other began researching
              p/hackers and pirates in 1988.   Both authors have had sysop
              experience with national CU boards.   As do virtually all CU
              participants, we used pseudonyms but, as we became more fully
              immersed in the culture,  our true identities were sometimes
              revealed.
          [4] Although we consider software pirates an integral part of the
              computer underground,  we have excluded them from this analy-
              sis both for parsimony and  because their actions are suffi-
              ciently different  to warrant separate analysis  (Thomas and
                                       - 34 -
 
 
              Meyer, 1990).   We also have excluded anarchist boards, which
              tend to be utilized by teenagers who use BBSs to exchange in-
              formation relating to social disruption, such as making home-
              made explosives, sabotaging equipment, and other less dramat-
              ic pranks. These boards are largely symbolic, and despite the
              name, are devoid of political intent.  However, our data sug-
              gest that many hackers began their careers because of the an-
              archist influence.
          [5] In January, 1990,  the co-editor of the magazine was indicted
              for allegedly  "transporting" stolen property  across state
              lines.   According to the Secret  Service agent in charge of
              the case in Atlanta  (personal communication),  the offender
              was apprehended for receiving copies  of E911 ("enhanced" 911
              emergency system)  documents by electronic mail,  but added
              that there was no evidence that those involved were motivated
              by, or received, material gain.
          [6] "Loop lines" are telephone company  test lines installed for
              two separate telephone numbers that connect only to each oth-
              er.  Each end has a separate phone number, and when each per-
              son calls one end, they are connected to each other automati-
              cally.  A loop consists of "Dual Tone Multi-Frequency," which
              is the touch tone sounds used  to dial phone numbers.  These
              test lines are discovered by  phreaks and hackers by program-
              ming their home computer to dial  numbers at random and "lis-
              ten" for the distinctive tone  that an answering loop makes,
              by asking sympathetic telephone company employees, or through
              information contained on internal company computers.
                                       - 35 -
 
 
 
                                    BIBLIOGRAPHY
          Allman, William F.  1990.  "Computer Hacking goes on Trial."
             U.S. News and World Report, January 22: 25.
          Altheide, David L.  1985.  Media Power.  Beverly Hills: SAGE.
          Baudrillard, Jean.  1987.  The Ecstasy of Communication.  New
             York: Semiotext(e).
          Bell, 1976.  The Cultural Contradictions of Capitalism.  New
             York: Basic Books.
          Bequai, August.  1987.  Technocrimes.  Lexington (Mass.):
             Lexington.
             1978.  Computer Crime.  Lexington (Mass.): Lexington.
          Bloombecker, Jay.  1988.  Interview, Hour Magazine.  NBC
             television, November 23.
          Bordieu, Pierre.  1989.  "Social Space and Symbolic Power."
             Sociological Theory, 7(Spring): 14-25.
          Brunner, John.  1989.  The Shockwave Rider.  New York:
             Ballantine.
          Callinicos, Alex.  1985.  "Posmodernism, Post-Structuralism,
             Post-Marxism?"  Theory, Culture and Society, 2(3): 85-101.
          Camper, John.  1989.  "Woman Indicted as Computer Hacker
             Mastermind."  Chicago Tribune, June 21: II-4.
          "Civil Liberties Hacked to Pieces: Jolyon Jenkins Refuses to
             Panic over Computer Crime."  New Statesman & Society, February
             9: 27.
          "Computer Expert's Son Cited as Virus Creator.' 1988.  Chicago
             Tribune, November 5: 1, 2.
          "Computer Hacker Ring with a Bay Area Link."  1990.  San
             Francisco Chronicle, May 9: A-30.
          "Computer Saboteur gets Probation."  1988.  Chicago Tribune, Oct.
             22: 4.
          Conly, Catherine H.  1989.  Organizing for Computer Crime
             Investigation and Prosecution.
                                       - 36 -
          Conly, Catherine H. and J. Thomas McEwen.  1990.  "Computer
             Crime."  NIJ Reports, 218(January/February): 2-7.
          Cooley, Ronald B.  1984.  "RICO: Modern Weaponry against Software
             Pirates."  Computer Law-Journal, 5(Fall): 143-162.
          Denzin, Norman K.  1988.  "Blue Velvet:  Postmodern
             Contradictions."  Theory, Culture and Society.  5(June):
             461-473.
          "Doctor Crash."  1986.  "The Techno-Revolution."  PHRACK, 1(6):
             Phile 3.
          "EB" {anonymous computerphile}.  1990.  PHRACK, 3(31): File 6.
          Featherstone, Mike.  1988.  "In Pursuit of the Postmodern: An
             Introduction."  Theory, Culture and Society, 2-3(June):
             195-215.
          Harper's Forum.  1990.  "Is Computer Hacking a Crime? A Debate
             from the Electronic Underground."  Harper's, 280(March):
             45-57.
          Frazer, James G.  1922.  The Golden Bough.  New York: MacMillan.
          Geertz, Clifford.  1973.  The Interpretion of Cultures.  New
             York: Basic Books.  1973.
          Gibson, William.  1984.  Neuromancer.  New York: Ace.
          Glaser, Barney G. and Anselm L. Strauss.  1967.  The Discovery of
             Grounded Theory:  Strategies for Qualitative Research.
             Chicago: Aldine.
          Goodenough, Ward.  1981.  Culture, Language, and Society.  Menlo
             Park (Calif.): Benjamin/Cummings.
          "Hacker, 18, Gets Prison for Fraud."  1989.  Chicago Tribune,
             February 15: III-1.
          Hebdige, Dick.  1982.  Subculture: The Meaning of Style.  New
             York: Metheun.
          Hollinger, Richard C. and Lonn Lanza-Kaduce.  1988.  "The Process
             of Criminalization: The Case of Computer Crime Laws."
             Criminology, 26(February): 101-126.
          Kane, Pamela.  1989.  V.I.R.U.S. Protection: Vital Information
             Resources under Siege.  New York: Bantam.
          Landreth, Bill.  1985.  Out of the Inner Circle: A Hacker's Guide
             to Computer Security.  Belleview (Wash.): Microsoft Press.
                                       - 37 -
          Lash, Scott.  1988.  "Discourse or Figure? Postmodernism as
             'Regime of Signification.'" Theory, Culture and Society,
             5(June):311-336.
          Latimer, Dan.  1984.  "Jameson on Post-Modernism."  New Left
             Review, 148(November/December): 116-128.
          Levy, Steven.  1984.  Hackers: Heroes of the Computer Revolution.
             Garden City: Doubleday.
          Lyotard, Jean-Francois.  1988.  The Postmodern Condition: A
             Report on Knowledge.  Minneapolis: University of Minnesota
             Press.
          Manning, Peter K.  (forthcoming).  "Strands in the Postmodernist
             Rope: Ethnographic Themes."  in N. Denzin (ed.), Studies in
             Symbolic Interaction (Vol. 13).  Greenwich (Conn.): JAI.
          Markoff, John.  1990a.  "3 Arrests Show Global Threat to
             Computers."  New York Times, April 4, A1, A11.
          -----.  1990b.  "Drive to Counter Computer Crime Aims at
             Invaders."  The New York Times, June 3: 1, 21.
          Marx, Gary T.  1988a.  Undercover: Police Surveillance in
             America.  Berkeley: University of California Press.
             1988b.  "The Maximum Security Society."  Deviance et
             Societe, 12(2): 147-166.
          Marx, Gary T., and Nancy Reichman.  1985.  "Routinizing the
             Discovery of Secrets: Computers as Informants."  Software Law
             Journal, 1(Fall): 95-121.
          McEwen, J. Thomas.  1989.  Dedicated Computer Crime Units.
             Washington D.C.: National Institute of Justice.
          Meyer, Gordon R.  1989a.  The Social Organization of the computer
             underground.  Unpublished Masters Thesis, Northern Illinois
             University.
          -----.  1989b.  "Hackers, Phreakers, and Pirates: The Semantics
             of the Computer Age."  Pp. 74-82 in P. Kane, V.I.R.U.S.
             Protection: Vital Information Resources under Siege.  New
             York: Bantam.
          Meyer, Gordon R. and Jim Thomas.  1989.  "Role Differentiation in
             the computer underground."  Paper presented at the Society for
             the Study of Social Problems annual meetings, Berkeley,
             August.
          Michalowski, Raymond J. and Erdwin H. Pfuhl.  1990 (forthcoming).
             "Technology, Property, and Law: The Case of Computer Crime."
             Contemporary Crisis.
                                       - 38 -
          Milovanovic, Dragan, and Jim Thomas.  1989.  "Overcoming the
             Absurd: Prisoner Litigation as Primitive Rebellion."  Social
             Problems 36(February): 48-60.
          Newman, Charles.  1985.  The Post-Modern Aura: The Act of Fiction
             in an age of Inflation.  Evanston (Ill.): Northwestern
             University Press.
          Parker, Donn B.  1983.  Fighting Computer Crime.  New York:
             Charles Scribner's Sons.
          Pfuhl, Erdwin H.  1987.  "Computer Abuse: Problems of
             Instrumental Control."  Deviant Behavior, 8(2): 113-130.
          Rosenbaum, Ron.  1971.  "Secrets of the Little Blue Box."
             Esquire, 76(October): 116-1125, 222-226.
          Rosenblatt, Kenneth.  1990.  "Deterring Computer Crime."
             Technology Review, 93(February/March): 34-40.
          Sandza, Richard.  1984a.  "The Night of the Hackers."  Newsweek,
             104(November 12): 17-18.
             1984b.  "Revenge of the Hackers."  Newsweek, 104(December
             10): 25.
          Schwartz, Eddie.  1988.  "Special on 'Computer Hacking.'" WGN
             Radio, Sept 27.
          Schwartz, John.  1990.  "The Hacker Dragnet: The Feds Put a Tail
             on Computer Crooks--and Sideswipe a few Innocent Bystanders."
             Newsweek, April 30: 50.
          Sennett, Richard.  1979.  The Uses of Disorder: Personal Identity
             and City Life.  New York: Vintage Books.
          Stoll, Clifford.  1989.  The Cuckoo's Egg: Tracking a Spy through
             the Maze of Computer Espionage.  New York: Doubleday.
          Thomas, Jim and James B. Marquart.  1988.  "Dirty Knowledge and
             Clean Conscience: The Dilemmas of Ethnographic Research."  Pp.
             81-96 in D. Maines and C. Couch (eds.), Information,
             Communication and Social Structure.  Springfield, Ill.:
             Charles C. Thomas.
          Thomas, Jim and Gordon R. Meyer.  (Forthcoming).  "(Witch)Hunting
             for the Computer Underground: Joe McCarthy in a Leisure Suit."
             The Criticial Criminologist.
          Tompkins, Joseph B., Jr., and Linda A. Mar.  1986.  "The 1984
             Federal Computer Crime Statute: A Partial Answer to a
             Pervasive Problem."  Computer-Law Journal, 6(Winter): 459-481.
                                       - 39 -
          Van, John.  1989.  "Oddballs no More, Hackers are now a Threat."
             Chicago Tribune, March 5, IV: 4.
          Van Maanen, John, and Stephen Barley.  1985.  "Cultural
             Organization: Fragments of a Theory."  Pp. 31-53 in P.J.
             Frost, et. al., (eds.), Organizational Culture. Beverly Hills:
             Sage.
          Wacquant, Loic J.D.  1989.  "Towards a Reflexive Sociology: A
             Workshop with Pierre Bordieu."  Sociological Theory,
             7(Spring): 26-63.
          Winter, Christine.  1988.  "Virus Infects Huge Computer Network."
             Chicago Tribune, November 4, 1, 18.
          "Yes, You Sound very Sexy, but I Really Need a Probation
             Officer."  1989.  Chicago Tribune, June 13, 10.
          WMAQ Evening News.  1990.  (Channel 5, Chicago), February 6.
          Zablit, Jocelyne.  1989.  "Fraud Sweep Nabs 2 Michigan Teens in
             Computer Ring."  Detroit Free Press, 25 May: 1, 18.
                                       - 40 -