Professional Documents
Culture Documents
Holt 2007
Holt 2007
Holt 2007
Deviant Behavior
Publication details, including instructions for
authors and subscription information:
http://www.tandfonline.com/loi/udbh20
subcultural evolution?
examining the influence of on-
and off-line experiences on
deviant subcultures
a
Thomas J. Holt
a
University of North Carolina at Charlotte,
Charlotte, North Carolina, USA
Published online: 16 Feb 2007.
To cite this article: Thomas J. Holt (2007) subcultural evolution? examining the
influence of on- and off-line experiences on deviant subcultures, Deviant Behavior,
28:2, 171-198, DOI: 10.1080/01639620601131065
Taylor & Francis makes every effort to ensure the accuracy of all the
information (the “Content”) contained in the publications on our platform.
However, Taylor & Francis, our agents, and our licensors make no
representations or warranties whatsoever as to the accuracy, completeness,
or suitability for any purpose of the Content. Any opinions and views
expressed in this publication are the opinions and views of the authors, and
are not the views of or endorsed by Taylor & Francis. The accuracy of the
Content should not be relied upon and should be independently verified with
primary sources of information. Taylor and Francis shall not be liable for any
losses, actions, claims, proceedings, demands, costs, expenses, damages,
and other liabilities whatsoever or howsoever caused arising directly or
indirectly in connection with, in relation to or arising out of the use of the
Content.
This article may be used for research, teaching, and private study purposes.
Any substantial or systematic reproduction, redistribution, reselling, loan,
sub-licensing, systematic supply, or distribution in any form to anyone is
expressly forbidden. Terms & Conditions of access and use can be found at
http://www.tandfonline.com/page/terms-and-conditions
Downloaded by [Moskow State Univ Bibliote] at 09:22 08 September 2013
Deviant Behavior, 28: 171198, 2007
Copyright # Taylor & Francis Group, LLC
ISSN: 0163-9625 print/1521-0456 online
DOI: 10.1080/01639620601131065
subcultural evolution?
examining the influence of
on- and off-line experiences
on deviant subcultures
Downloaded by [Moskow State Univ Bibliote] at 09:22 08 September 2013
Thomas J. Holt
University of North Carolina at Charlotte,
Charlotte, North Carolina, USA
Subcultural research gives significant insight into the
ways individuals learn to approve of and justify
involvement in crime and deviance. However, most
research examines subcultures in either cyberspace
or real-world social situations. Few have considered
how off-line and online experiences overlap and
influence subcultural values and norms. This study
addresses this issue by exploring the normative orders
of computer hacker subculture with multiple data
sets. The findings suggest that the norms and values of
hacker subculture cut across the digital divide to
shape relationships between hackers in virtual and
real situations. Implications for future research are
also discussed.
171
172 T. J. Holt
1 48 109 11 months
2 50 20 2 months
3 50 101 9 months
4 117 179 2 months
5 50 110 6 months
6 50 400 30 months
Downloaded by [Moskow State Univ Bibliote] at 09:22 08 September 2013
Interview method
Observational Data
The third data source consists of first-hand observations of
hackers and data collected at the 2004 Defcon, the largest
178 T. J. Holt
3
The author identified himself as a researcher at the outset of any conversation with indi-
viduals at Defcon. Although this introduced the potential for researcher contamination,
attendees did not appear to view the author with skepticism or refuse to speak. Rather,
they willingly gave their candid opinions on hacker subculture, suggesting the author
was able to gain some rapport with those in attendance.
4
Many of the materials given to Defcon attendees are made available online after the
convention ends. Downloadable content includes a .pdf copy of the program and some
of the presentation notes and materials, available at http://www.defcon.org/html/links/
defcon-media-archives.html#dc-12.
Subcultural Evolution? 179
FINDINGS
These methods are used to critically explore the normative
orders of hacker subculture on- and off-line. From this
analysis, the social world of computer hackers is shaped by
five normative orders including technology, knowledge,
180 T. J. Holt
Technology
Downloaded by [Moskow State Univ Bibliote] at 09:22 08 September 2013
Knowledge
Another important order identified in hacker subculture is
knowledge. Hackers across the data sets demonstrated that
hacker identity is built on a devotion to learn and understand
technology. As one forum poster suggested, ‘‘if you want to
be a hacker, then you should start to learn . . . hacking is
all about learning new stuff and exploring.’’ Forum users
and interviewed hackers stressed the notion of curiosity
and a desire to learn (see also Jordan and Taylor 1998;
Furnell 2002). For example, the interviewee MG defined a
182 T. J. Holt
with computers:
You do this long enough, with many different technical pro-
jects, and you begin to really learn a lot. . . . Once you learn
the logic and how to ‘‘think’’ like a computer or programmer
would, you can just guess at how things are working, based
on existing knowledge.
Similar comments were pervasive across the interview and
forum data. Developing a broad knowledge of systems, hard-
ware, programming, and networking was extremely impor-
tant to interviewed hackers because it influenced their
ability to hack. Hackers also learned these different elements
on their own through ‘‘trial and error,’’ and individual effort
(see also Schell et al. 2002). j.Rose emphasized this point,
stating that ‘‘trial and error . . . is the only effective way to
learn computing techniques.’’
Forum users echoed this sentiment as well, such as the
poster dBones who wrote, ‘‘you will become more knowl-
edgeable if you were to find out information by yourself
and then teach yourself that information.’’ At the same time,
forums served as repositories of information for hackers to
connect with, and ask questions of other hackers. As a result
the notion of learning on one’s own was addressed in a dif-
ferent fashion online. When an individual asked a question,
users would almost always respond by giving a Web link that
would help answer the question. Users would have to
actively open the link and read in order to find their answer.
These links provided specific information about an issue or
topic discussed in the string without repetition or wasted
time for the other posters. Tutorials were also provided, giv-
ing detailed explanations on topics from programming to the
use of hack tools. In some instances, users made actual pro-
grams available for download to help individuals learn.
Subcultural Evolution? 183
Commitment
The elements that compose the normative order knowledge
are also closely tied to the normative order commitment.
Commitment structured individual behavior on- and
off-line through continued study and practice of hacking
techniques. This order was evident across the data, including
the forums where posters indicated it took a tremendous
amount of time to learn to hack. The poster Ashy Larrie
suggested:
Downloaded by [Moskow State Univ Bibliote] at 09:22 08 September 2013
If you are just starting you might not have a clue what to
learn, or what you should know. As for me, I just started read-
ing texts for a long time . . . after awhile things become more
clear and you get the idea of what hacking is all about.
Although these comments echo elements of the order
knowledge, the poster makes very distinct statements about
the importance of commitment to learning. A commitment
to learning and understanding computers and technology
was needed to discover what topics they truly find interest-
ing. In addition, continuous changes and improvements in
technology compounded the length of time required to learn.
Thus, hackers must be committed to the continuous identifi-
cation and acquisition of new information. Mack Diesel
emphasized the importance of commitment, saying, ‘‘the
minute you feel you’ve learned everything is the minute
you’re out. There’s always something new to learn.’’ Hence,
hacker subculture placed tremendous value on constant
learning over time.
The order commitment also reflects the significant amount
of effort applied to learn the tradecraft of hacking. It was
apparent across the data that the time a person spent hacking
improved their skills. Dark Oz reflected on this, writing,
‘‘You do this long enough, with many technical projects,
and you begin to really learn a lot, and then it becomes
quicker to pick up more things faster then you did before.’’
Although this statement references the importance of learn-
ing, it clearly indicates the value of expending constant
and consistent effort in the process of learning.
In addition, a hacker’s commitment to learning affected
the quality of information they were given. This was most
evident in the forums, where posters who did not attempt
186 T. J. Holt
Law
The final normative order identified in this analysis is law.
This was reflected in discussions on the legality of hacking
and information sharing in the real world and in cyber-
space. Law emphasizes the influence of law in structuring
how hackers relate to individuals in and out of hacker sub-
culture. Hackers in the forums often discussed whether
some hacks or related activities were legal, and if they
should be performed. There was a split between hackers
who felt no illegal hacks were appropriate and those
who viewed hacking in any form as acceptable. Such com-
peting perspectives were addressed in the following
exchange. An individual asked for information on a pass-
word cracking tool and how to use it. Pilferer answered
the poster’s question and gave an admonition that was
quickly contradicted:
Pilferer: You do understand that using these password crack-
ers on machines which you don’t own or have no
permission to access is ILLEGAL?
190 T. J. Holt
whatever you want, but no one ever knows you were there.’’
Thus, hackers created boundaries within the subculture
based on the ability to hack, as well as their beliefs about
hacking.
In much the same way, law enforcement interest in hack-
ers and hacking influenced the way hackers related to others
in and out of the subculture. This was particularly evident at
Defcon because of their Spot the Fed Contest, which is
referred to as ‘‘the ever popular paranoia builder,’’ by asking,
‘‘Who IS that person next to you’’ (Defcon 2004). To play,
anyone who felt an attendee was a federal agent had to alert
one of the convention organizers that they had ‘‘spotted a
fed.’’ The potential ‘‘fed’’ was brought on stage before the
crowd and asked a series of questions about their life
and job. If the person was, in fact, a federal agent, both
the fed and the spotter received t-shirts to commemorate
the experience.
There were at least eight ‘‘spot the fed’’ moments during
the convention, and many referred to it as a Defcon tradition.
The game informed attendees about the presence of law
enforcement, and influenced the way individuals related to
one another during the convention. Attendees were much
more careful about discussing illegal activities or sharing
information in the open. Spot The Fed also created and rein-
forced boundaries between hackers and law enforcement.
Although the game was ‘‘all in good fun’’ and performed
in a tongue-in-cheek manner, attendees took second glances
at those who did not blend in with the crowd. Openly ques-
tioning individuals about their lives clearly indicated who
was a hacker and who was not. The answers provided by
federal agents gave hackers information about government
agencies and agents. Also, the public spectacle produced
from a ‘‘spotting’’ ensured attendees would recognize the
194 T. J. Holt
REFERENCES
Downloaded by [Moskow State Univ Bibliote] at 09:22 08 September 2013