Hacker Culture

Front Cover
U of Minnesota Press, 2003 - Computers - 266 pages
5 Reviews
A provocative look at the subculture that has shaped our changing attitudes toward the digital age--now in paperback! Douglas Thomas offers an in-depth history of this important and fascinating subculture, contrasting mainstream images of hackers with a detailed firsthand account of the computer underground. Thomas studies novels and films (Neuromancer, WarGames, Hackers, and The Matrix) and reveals contemporary views of hackers as technological wizards, high-tech pranksters, and virtual criminals. Thomas then examines the court cases of Kevin Mitnick and Chris Lamprecht to determine how hackers are defined as criminals. Thomas finds that popular hacker stereotypes express the public's anxieties about the information age far more than they do the reality of hacking.
  

What people are saying - Write a review

User ratings

5 stars
3
4 stars
1
3 stars
1
2 stars
0
1 star
0

Hacker culture

User Review  - Not Available - Book Verdict

Thomas (Univ. of Southern California; Cybercrime) traces the history and origin of hacker culture within mainstream society, the computer industry, and the media. In the first of the book's three ... Read full review

User Review - Flag as inappropriate

PROYECTO GENOCIDIO.
NARCOTRAFICO DE PRESIDENTES.
DENUNCIA EN EL PARLAMENTO VENEZOLANO.
MODELO BANCARIO PERFECTIBLE.
CHAVEZ PAY TO INTELIGENCY AGEN. DICIP CEBIN DIM TO KILL PEOPLE AN RADIATE PEOPLE.
CHAVEZ PAGA A AGENCIAS DE INTELIGENCIA PARA LE PRODUZACAN CANCER A VENEZOLANOS WWW.docs.google.com/open?id=0B7rdd1w6dkcSamZTX1ZNWWZmVkk
Kevin M. Sullivan
CHAVEZ PAY TO INTELIGENCY AGEN. DICIP CEBIN DIM TO KILL PEOPLE AN RADIATE PEOPLE.
CHAVEZ PAGA A AGENCIAS DE INTELIGENCIA PARA LE PRODUZACAN CANCER A VENEZOLANOS
WWW.docs.google.com/open?id=0B7rdd1w6dkcSamZTX1ZNWWZmVkk
Sintesis de Derecho Canonico: Metodo Sistematico Repertorio de Canones ...
http://books.google.co.ve/books?id=7VCBZ9H9H7MC&printsec=frontcover&dq=DERECHO+CANONICO&hl=es&sa=X&ei=pZLDUKL-LqnF0AHb0YBw#
CHAVEZ PAY TO INTELIGENCY AGEN. DICIP CEBIN DIM TO KILL PEOPLE AN RADIATE PEOPLE. PERFECTIBLE BANCK.
CHAVEZ PAGA A AGENCIAS DE INTELIGENCIA ESPAÑOLAS PARA QUE PRODUZACAN CANCER, VIOLACIONES Y ASESINATOS A VENEZOLANOS. BANCO PERFECTIBLE.
WWW.docs.google.com/open?id=0B7rdd1w6dkcSamZTX1ZNWWZmVkk
ROBOS CANONICO DEL REY ESPAÑA, ITALIA, ESPAÑA, SUIZA, INGLATERRA, ALEMANIA, CHINA JAPON Y COREA DEL NORTE.
WWW.docs.google.com/open?id=0B7rdd1w6dkcSamZTX1ZNWWZmVkk
CANONIC ROBS SPAINIAN KINGS, ITALY, SPAIN, SUISERLAND, ENGLAND, GERMANY, JAPAN, CINA, NORTH COREA .
CHAVEZ PAY TO RELIGIOUS INTELIGENCY AGEN. DICIP CEBIN DIM TO KILL PEOPLE AN RADIATE PEOPLE. PERFECTIBLE BANCK.CHAVEZ PAGA A AGENCIAS DE INTELIGENCIA ESPAÑOLAS PARA QUE PRODUZACAN CANCER, VIOLACIONES Y ASESINATOS A VENEZOLANOS. BANCO PERFECTIBLE.
CHAVEZ PAGA A AGENCIAS DE INTELIGENCIA ESPAÑOLAS PARA QUE PRODUZACAN CANCER, VIOLACIONES Y ASESINATOS A VENEZOLANOS. BANCO PERFECTIBLE.
A provocative look at the subculture that has shaped our changing attitudes toward the digital age--now in paperback! Douglas Thomas offers an in-depth history of this important and fascinating subculture, contrasting mainstream images of hackers with a detailed firsthand account of the computer underground. Thomas studies novels and films (Neuromancer, WarGames, Hackers, and The Matrix) and reveals contemporary views of hackers as technological wizards, high-tech pranksters, and virtual criminals. Thomas then examines the court cases of Kevin Mitnick and Chris Lamprecht to determine how hackers are defined as criminals. Thomas finds that popular hacker stereotypes express the public's anxieties about the information age far more than they do the reality of hacking.
WWW.docs.google.com/open?id=0B7rdd1w6dkcSamZTX1ZNWWZmVkk
Robos Canonico DEL REY DE ESPAÑA.
Kanonischen ROBS SPAINIAN KINGS.
Chavez INTELIGENCY AGEN ZAHLEN. DICIP Cebin DIM TO KILL Menschen eine RADIATE PEOPLE. Perfectible BANCK.CHAVEZ PAGA A Agencias DE Inteligencia españolas PARA QUE PRODUZACAN KREBS, ASESINATOS VIOLACIONES Y A Venezolanos. BANCO perfectible.
WWW.docs.google.com/open?Id=0B7rdd1w6dkcSamZTX1ZNWWZmVkk
Robos Canonico DEL REY DE ESPAÑA.
Kanonieke beroof SPAINIAN KINGS.
CHAVEZ aan INTELIGENCY AGEN. TO KILL DICIP CEBIN DIM mense 'n straal MENSE. PERFECTIBLE BANCK.CHAVEZ paga A agencias DE inteligencia españolas PARA QUE PRODUZACAN kanker, VIOLACIONES Y ASESINATOS A VENEZOLANOS. BANCO PERFECTIBLE.
WWW.docs.google.com/open?Id=0B7rdd1w6dkcSamZTX1ZNWWZmVkk
This is the most comprehensive, and most comprehensively chilling, study of modern torture yet written. Darius Rejali, one of the world's leading experts on torture, takes the reader from the late nineteenth century to the aftermath of Abu Ghraib, from slavery and the electric chair to electrotorture in American inner cities, and from French and British colonial prison cells and the Spanish-American War to the fields of Vietnam, the wars of the Middle East, and the new democracies of Latin America and Europe. As Rejali traces the development and
 

Related books

Contents

Hacking Culture
5
Hacking as the Performance of Technology Reading the Hacker Manifesto
47
Hacking in the 1990s
81
Hacking Representation
111
Representing Hacker Culture Reading Phrack
115
Not Hackers Subculture Style and Media Incorporation
141
Hacking Law
173
Technology and Punishment The Juridical Construction of the Hacker
177
Kevin Mitnick and Chris Lamprecht
220
Notes
239
Index
251
Copyright

Other editions - View all

Common terms and phrases

Popular passages

Page xii - Cyberspace. A consensual hallucination experienced daily by billions of legitimate operators, in every nation, by children being taught mathematical concepts.... A graphic representation of data abstracted from the banks of every computer in the human system. Unthinkable complexity. Lines of light ranged in the nonspace of the mind, clusters and constellations of data. Like city lights, receding.
Page xx - Let us give the term genealogy to the union of erudite knowledge and local memories which allows us to establish a historical knowledge of struggles and to make use of this knowledge tactically today.
Page xxii - This positive commitment shows in a number of ways, not the least of which is the release of that personal initiative and creativity which constitute the basis of a democratic climate.

References to this book

All Book Search results »

References from web pages

Douglas Thomas, Hacker Culture. Minneapolis, MN: University of ...
the overwhelmingly male nature of hacker culture, and most significantly gives a ... despite describing in detail hacker culture from its early origins in ...
www.ingentaconnect.com/ content/ sage/ nms/ 2003/ 00000005/ 00000004/ art00011

Hacker Culture
In Hacker Culture, Douglas Thomas provides an in-depth history of this important and fascinating subculture, contrasting mainstream images of hackers with a ...
www.upress.umn.edu/ Books/ T/ thomas_hacker.html

Grand Text Auto » The Lost Boys of Hacker Culture
This trend was around before the 2002 publication of Hacker Culture. Thomas took note of it, and discussed how hackers are caught between opposition to and ...
grandtextauto.org/ 2007/ 11/ 25/ the-lost-boys-of-hacker-culture/

Hacker Culture
In Hacker Culture, Douglas Gordon provides a rewarding account of what preceded and followed these developments, charting the evolution of cracking and ...
www.questia.com/ PM.qst?a=o& se=gglsc& d=5000656711

Douglas Thomas
In Hacker Culture, Douglas Thomas provides an in-depth history of this important and ... "Hacker Culture provides an indispensable insight into a history of ...
www-rcf.usc.edu/ ~douglast/

Hacker (computing) - Wikipedia, the free encyclopedia
In the this hacker culture, a computer hacker is a person who enjoys designing software and building programs with a sense for aesthetics and playful ...
en.wikipedia.org/ wiki/ Hacker_culture

Social Science Computer Review
Douglas Thomas begins Hacker Culture with a detailed introduction that discusses the. origins of “hacking” as a technological and cultural phenomenon. ...
ssc.sagepub.com/ cgi/ reprint/ 21/ 3/ 393.pdf

Hackers: The Ethics and Politics of Information Freedom and Privacy
Hacker Culture. Minneapolis: University of Minneapolis Press, 2002. .... “Representing Hacker Culture: Reading Phrack” in Hacker Culture. (2002) ...
healthhacker.org/ biella/ coleman-hacking.pdf

Chicago Journals - Isis
Although Thomas acknowledges the origins of hacker culture in university computer science departments in the 1960s and 1970s, he points to a number of ...
www.journals.uchicago.edu/ cgi-bin/ resolve?ISIS940415100

Reviews
traces the evolution of the old hacker culture of ... tions of hacker culture. Building on the work of ... hacker culture—from without as well as with- ...
ieeexplore.ieee.org/ iel5/ 85/ 30428/ 01401750.pdf

About the author (2003)

Douglas Thomas, PhD, is Assistant Professor in the Annenberg School for Communication, University of Southern California, where he teaches courses in Contemporary Critical Theory and Cultural Studies of Technology. His work has appeared in such journals as "Philosophy & Rhetoric," "Communication Theory," "The Quarterly Journal of Speech," and "The Journal of Nietzsche Studies,"

Bibliographic information