Professional Documents
Culture Documents
Holt Copes 2010
Holt Copes 2010
200]
On: 03 October 2014, At: 09:41
Publisher: Routledge
Informa Ltd Registered in England and Wales Registered Number: 1072954
Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH,
UK
Deviant Behavior
Publication details, including instructions for
authors and subscription information:
http://www.tandfonline.com/loi/udbh20
Transferring Subcultural
Knowledge On-Line: Practices
and Beliefs of Persistent Digital
Pirates
a b
Thomas J. Holt & Heith Copes
a
Michigan State University , East Lansing, Michigan,
USA
b
University of Alabama at Birmingham ,
Birmingham, Alabama, USA
Published online: 25 Aug 2010.
To cite this article: Thomas J. Holt & Heith Copes (2010) Transferring Subcultural
Knowledge On-Line: Practices and Beliefs of Persistent Digital Pirates, Deviant
Behavior, 31:7, 625-654, DOI: 10.1080/01639620903231548
Taylor & Francis makes every effort to ensure the accuracy of all the
information (the “Content”) contained in the publications on our platform.
However, Taylor & Francis, our agents, and our licensors make no
representations or warranties whatsoever as to the accuracy, completeness,
or suitability for any purpose of the Content. Any opinions and views
expressed in this publication are the opinions and views of the authors, and
are not the views of or endorsed by Taylor & Francis. The accuracy of the
Content should not be relied upon and should be independently verified with
primary sources of information. Taylor and Francis shall not be liable for any
losses, actions, claims, proceedings, demands, costs, expenses, damages,
and other liabilities whatsoever or howsoever caused arising directly or
indirectly in connection with, in relation to or arising out of the use of the
Content.
This article may be used for research, teaching, and private study purposes.
Any substantial or systematic reproduction, redistribution, reselling, loan,
sub-licensing, systematic supply, or distribution in any form to anyone is
expressly forbidden. Terms & Conditions of access and use can be found at
http://www.tandfonline.com/page/terms-and-conditions
Downloaded by [80.28.255.200] at 09:41 03 October 2014
Deviant Behavior, 31: 625–654, 2010
Copyright # Taylor & Francis Group, LLC
ISSN: 0163-9625 print=1521-0456 online
DOI: 10.1080/01639620903231548
transferring subcultural
knowledge on-line: practices
and beliefs of persistent
digital pirates
Downloaded by [80.28.255.200] at 09:41 03 October 2014
Thomas J. Holt
Michigan State University, East Lansing,
Michigan, USA
Heith Copes
University of Alabama at Birmingham,
Birmingham, Alabama, USA
Criminal subcultures form around deviant
behaviors as a consequence of persistent
interactions with like-minded others who facilitate
the transmission of norms, values, and belief.
Although researchers have explored social
interactions in the real world, few have considered
how learning occurs through virtual interactions.
We address the role of on-line interactions in
spreading subcultural knowledge by interviewing
34 persistent digital pirates and performing a
non-participant ethnography of an on-line forum
devoted to piracy. Our results show that through
on-line interactions, pirates learn the norms and
values of digital piracy, including how to recognize
and avoid risks associated with pirating and how to
make sense of and justify their actions. They did
not see themselves as members of a piracy
subculture, however. These findings show that
625
626 T. J. Holt and H. Copes
ual activity and interests. They show that those with highly
technical skills often receive greater levels of respect among
members. These individuals are often referred to as ‘‘citi-
zens’’ because they enable the distribution of pirated materi-
als and work to benefit the larger community rather than
their own needs. At the bottom of this hierarchy are those
individuals who download or ‘‘leech’’ materials from a small
number of organized groups that create and distribute
pirated materials. Leeches simply take materials while pro-
viding little in return. Consequently, they are ridiculed by
‘‘respectable’’ pirates (Cooper and Harrison 2001).
Those who participate in deviant or criminal subcultures
typically face consequences and risks for being members
(e.g., Cohen 1955). Perhaps the greatest risk faced by indivi-
duals involved in piracy are threats from viruses or other
malicious software, attacks from other computer users, com-
puter crashes, and the removal of Internet connectivity by
local providers (Bachman 2007; Cooper and Harrison
2001; Furnell 2002; Taylor et al. 2006). Disputes between
pirates are common and range from individuals being
banned from downloading materials to their computers
being hacked and all content deleted (Cooper and Harrison
2001). As a consequence, digital pirates face a great deal
of risk from others while on-line, though there is very little
1
Although a small number of individuals make a profit from the sale of pirated goods
(see Taylor et al. 2006), the larger piracy subculture appears to be driven by sharing materi-
als freely. Thus, this study focuses on this portion of the culture, and explores the perception
of them in the context of piracy subculture.
630 T. J. Holt and H. Copes
2
See pages 10–11 for description of the use and functionality of torrent technology.
Digital Piracy 633
3
Peer-to-peer file sharing involves the use of software that enables any networked com-
puter using the same software to access and share data. This sort of program is popular
among pirates, as are torrent programs, which are described earlier in the article. Key-code
cracking involves hacking or otherwise subverting the protective program on a piece of digi-
tal media that is meant to hamper theft and piracy. These practices are generally common
and ensure that pirated materials continue to flow through a piracy subculture (Cooper and
Harrison 2001).
634 T. J. Holt and H. Copes
4
It is common among those who interact through computer platforms to abbreviate and
ignore rules of grammar. To aid readability we cleaned the participants’ responses while
trying to maintain the flow and rhythm of the conversation.
636 T. J. Holt and H. Copes
5
Forum members can create profiles that state from which they are posting. We include
the location of the poster as stated in their profile to show the international nature of
pirating.
Digital Piracy 639
I’ve seen enough to know who good resources are and when
someone is posting something fake, plus you can actually see
what types of files are in the torrent before you download.
There are minimal things newbs [inexperienced pirates]
wouldn’t recognize, but when you see it enough you just kind
of know. For example, torrent users can post comments about
the content or quality of the file, and note if it is infected.
you can usually tell if it’s legit or not.’’ Similarly, the number
of seeders is a good indication of the content of a file. In fact,
this information may be more important than the number of
comments. Posting in the same forum from above, Hüsker
explained the importance of comments:
that the pirates across the data sets shared their security tech-
niques with others on-line demonstrates the value of forums
and on-line interaction as an effective means to transmit
subcultural knowledge. As the forum user StillRolling
explained, ‘‘A sharing community is supposed to be a caring
one, and not an ‘I got what I want now screw you’ one.’’
6
Several of the pirates claimed that they downloaded for the thrill of collecting and
admitted that they did not listen to or watch all that they downloaded.
644 T. J. Holt and H. Copes
possibly have harmed those they stole from, but they neutra-
lized moral indignation by denying victim status to recording
artists, record and movie producers, and software develo-
pers. Pirates excused their crimes by saying that artists should
expect piracy because media is too expensive and often is
of low quality. Pirates defined their own actions as a form
of rightful retaliation or punishment for artists being self-
indulgent and producing low quality material. According
to Abe Lincoln, ‘‘Metallica got stupid and kicked off people
sharing their music from Napster. I was one of them. I no
longer support Metallica. They can fuck themselves, which
is what they think of me so it is alright.’’ Similar comments
were found in the forum data, as noted by an Italian member
who wrote:
CDs are becoming increasingly expensive loosing quality and
contents. You want over 20 Euros for a CD with 12 songs in
it? Are you kidding me? Even if I would, often in a CD there is
a good track, used as ‘‘trailer,’’ while the remaining tracks are
poor.
Pirates claimed that artists get paid far too much and that
they have no right to complain since downloading is not
what harms their income, but rather it is the artists’ expensive
habits. Konink summed it up by saying, ‘‘I mainly download
movies and I see everyday how someone in Hollywood is
complaining about how piracy could bring them down when
in actuality the $300 [U.S.] dinner they just had was
unnecessary or the limo rides (drive yourself?).’’ Pirates also
argued that record companies charge too much for their
Digital Piracy 647
from their friends or family, but were not told that what they
were doing was illegal. When explaining why they started
downloading, Mass Weasel and Elisa both made a nearly
identical statement, ‘‘I had no idea I was even pirating, I had
no idea.’’ These denials were only effective when the pirates
were young and naı̈ve. Each of these pirates acknowledged
that their interactions on Internet forums led to changes in
their understanding of the illegal nature of their activities.
CONCLUSIONS
Edwin Sutherland (1947) argued that the key intervening fac-
Downloaded by [80.28.255.200] at 09:41 03 October 2014
REFERENCES
Akers, Ronald L. 1998. Social Learning and Social Structure: A General
Theory of Crime and Deviance. Boston: Northeastern University Press.
Al-Rafee, Sulaiman and Timothy P. Cronan. 2006. ‘‘Digital Piracy:
Factors that Influence Attitude Toward Behavior.’’ Journal of Business
Ethics 63:237–259.
Bachman, Michael. 2007. ‘‘Lesson Spurned? Reactions of Online Music
Pirates to Legal Prosecutions by the RIAA.’’ International Journal of
Cyber Criminology 1:213–227.
Bainbridge, William S. 2000. ‘‘Religious Ethnography on the World
Wide Web.’’ Pp. 55–80. In Religion and the Social Order: Religion
on the Internet, edited by J. K. Hadden and D. E. Cowan.
Chiou, Jyh-Shen, Chien-yi Huang, and Hsin-hui Lee. 2005. ‘‘The Antece-
dents of Music Piracy: Attitudes and Intentions.’’ Journal of Business
Ethics 57:161–174.
Cohen, Albert K. 1955. Delinquent Boys: The Culture of the Gang.
New York: Free Press.
Cooper, Jon and Daniel M. Harrison. 2001. ‘‘The Social Organization of
Audio Piracy on the Internet.’’ Media, Culture, and Society 23:71–89.
Copes, Heith, Andy Hochstetler, and Patrick Williams. 2008. ‘‘We Wer-
en’t Like No Regular Dope Fiends: Negotiating Hustler and Crackhead
Identities.’’ Social Problems 55:254–270.
Denzin, Norman K. 1999. ‘‘Cybertalk and the Method of Instances.’’ Pp.
107–25. In Doing Internet Research: Critical Issues and Methods for
Examining the Net, edited by S. Jones. Thousand Oaks, CA: Sage.
DiMarco, Andrew D. and Heather DiMarco. 2003. ‘‘Investigating Cyber-
society: A Consideration of the Ethical and Practical Issues Surround-
ing Online Research in Chat Rooms.’’ Pp. 164–79. In Dot.cons:
Crime, Deviance, and Identity on the Internet, edited by Y. Jewkes.
Portland, OR: Willan Publishing.
652 T. J. Holt and H. Copes
McCarthy, Bill. 1996. ‘‘The Attitudes and Actions of Others: Tutelage and
Sutherland’s Theory of Differential Association.’’ British Journal of
Criminology 36:135–147.
Menchik, Daniel and Xiaoli Tian. 2008. ‘‘Putting Social Context Into
Text: The Semiotics of E-Mail Interaction.’’ American Journal of
Sociology 114:332–370.
Morris, Robert G. and George E. Higgins. 2009. ‘‘Neutralizing Potential
and Self-Reported Digital Piracy: A Multitheoretical Exploration among
College Undergraduates.’’ Criminal Justice Review 34:173–195.
Morselli, Carlo, Pierre Tremblay, and Bill McCarthy. 2006. ‘‘Mentors and
Criminal Achievement.’’ Criminology 44:17–43.
Quinn, James F. and Craig J. Forsyth. 2005. ‘‘Describing Sexual Behavior
in the Era of the Internet: A Typology for Empirical Research.’’ Deviant
Downloaded by [80.28.255.200] at 09:41 03 October 2014
Behavior 26:191–207.
Rosecrance, John. 1986. ‘‘The Stooper: A Professional Thief in the
Sutherland Manner.’’ Criminology 24:29–40.
Simms, Ronald R., Hsing K. Cheng, and Hildy Teegen. 1996. ‘‘Toward a
Profile of Student Software Pirates.’’ Journal of Business Ethics 15:
839–849.
Skinner, William F. and Anne M. Fream. 1997. ‘‘A Social Learning
Theory Analysis of Computer Crime among College Students.’’ Journal
of Research in Crime and Delinquency 34:495–518.
Steffensmeier, Darrell J. and Jeffery T. Ulmer. 2005. Confessions of a
Dying Thief: Understanding Criminal Careers and Illegal Enterprise.
New Brunswick, NJ: Aldine Transaction.
Sutherland, Edwin. 1937. The Professional Thief. Chicago: University of
Chicago Press.
———. 1947. Principles of Criminology. Philadelphia: Lippincott.
Sykes, Gresham and David Matza. 1957. ‘‘Techniques of Neutraliza-
tion: A Theory of Delinquency.’’ American Sociological Review
22:664–670.
Szor, Peter. 2005. The Art of Computer Virus Research and Defense.
Upper Saddle River, NJ: Addison Wesley.
Taylor, Robert W., Tory J. Caeti, D. Kall Loper, Eric J. Fritsch, and John
Liederbach. 2006. Digital Crime and Digital Terrorism. Upper Saddle
River, NJ: Pearson Prentice Hall.
Warr, Mark. 2002. Companions in Crime: The Social Aspects of Criminal
Conduct. New York: Cambridge University Press.
Williams, Patrick and Heith Copes. 2005. ‘‘How Edge are You? Con-
structing Authentic Identities and Subcultural Boundaries in a Straight-
edge Internet Forum.’’ Symbolic Interaction 28:67–89.
Wolfe, Scott, George Higgins, and Catherine Marcum. 2008. ‘‘Deter-
rence and Digital Piracy: A Preliminary Examination of the Role of
Viruses.’’ Social Science Computer Review 26:1–17.
654 T. J. Holt and H. Copes