References

(References to 2600: The Hacker Quarterly are located in their own section.)

Adler, Patricia A. 2003. “Wheeling and Dealing: An Ethnography of an Upper-Level Drug Dealing and Smuggling Community.” In The Cultural Study of Work, edited by Douglas Harper and Helene M. Lawson, 452–462. Lanham, MD: Rowman and Littlefield Publishers.

Adler, Patricia A., and Peter Adler. 1987. Membership Roles in Field Research. Beverly Hills, CA: Sage.

———. 1998. “Foreword: Moving Backward.” In Ethnography at the Edge: Crime, Deviance, and Field Research, edited by Jeff Ferrell and Mark S. Hamm, xii–xvi. Boston: Northeastern University Press.

Akers, Ronald L. 1973. Deviant Behavior: A Social Learning Approach. Belmont, CA: Wadsworth.

———. 1998. Social Learning and Social Structure: A General Theory of Crime and Deviance. Boston: Northeastern University Press.

Alphabet Investor Relations. 2016. Accessed April 4, 2016. https://abc.xyz/investor/.

Altheide, David L. 1987. “Ethnographic Content Analysis.” Qualitative Sociology 10: 65–77.

Anderson, Ross, Christ Barton, Ranier Böhme, Richard Clayton, Michel J. G. van Eeten, Michael Levi, Tyler Moore, and Stefan Savage. 2013. “Measuring the Cost of Cybercrime.” In The Economics of Information Security and Privacy, edited by Rainer Böhme, 265–300. New York: Springer.

Arrigo, Bruce A., and Christopher R. Williams. 2010. “Conflict Criminology: Developments, Directions, and Destinations Past and Present.” In Criminological Theory: Readings and Retrospectives, edited by Heith Copes and Volkan Topalli, 401–412. New York: McGraw-Hill.

Assange, Julian. 2011. “Julian Assange: ‘I Am—like All Hackers—a Little Bit Autistic.’” Independent, September 22. Accessed June 22, 2015. http://www.independent.co.uk.

Bachmann, Michael. 2010. “Deciphering the Hacker Underground: First Quantitative Insights.” In Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications, edited by Thomas J. Holt and Bernadette H. Schell, 105–126. Hershey, PA: IGI Global.

Barak, Gregg. 1988. “Newsmaking Criminology: Reflections on the Media, Intellectuals, and Crime.” Justice Quarterly 5: 565–587.

Barbrook, Richard, and Andy Cameron. 2001. “Californian Ideology.” In Crypto Anarchy, Cyberstates, and Pirate Utopias, edited by Peter Ludlow, 363–388. Cambridge, MA: MIT Press.

Barlow, John P. 2001. “A Declaration of the Independence of Cyberspace.” In Crypto Anarchy, Cyberstates, and Pirate Utopias, edited by Peter Ludlow, 28–30. Cambridge, MA: MIT Press.

Baudrillard, Jean. 1970. The Consumer Society: Myths and Structures. Thousand Oaks, CA: Sage.

Becker, Howard S. 1958. “Problems of Inference and Proof in Participant Observation.” American Sociological Review 23: 652–660.

———. 1963. Outsiders: Studies in the Sociology of Deviance. New York: Free Press.

———. 1966. “Introduction.” In The Jack-Roller: A Delinquent Boy’s Own Story, by Clifford R. Shaw, v–xviii. Chicago: University of Chicago Press.

Bell, Shannon E., and Richard York. 2010. “Community Economic Identity: The Coal Industry and Ideology Construction in West Virginia.” Rural Sociology 75: 111–143.

Berg, Bruce L. 2009. Qualitative Research Methods for the Social Sciences. 7th ed. Boston: Allyn and Bacon.

Berger, Peter L., and Thomas Luckman. 1966. The Social Construction of Reality: A Treatise in the Sociology of Knowledge. New York: Anchor Books.

Berk, Richard A., and Joseph M. Adams. 1970. “Establishing Rapport with Deviant Groups.” Social Problems 18: 102–117.

Bollier, David. 2003. Silent Theft: The Private Plunder of Our Common Wealth. New York: Routledge.

Bonger, Willem. 1916. Criminality and Economic Conditions. Boston: Little, Brown.

Bossler, Adam M., and George W. Burruss. 2010. “The General Theory of Crime and Computer Hacking: Low Self-Control Hackers?” In Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications, edited by Thomas J. Holt and Bernadette H. Schell, 38–67. Hershey, PA: IGI Global.

BoxOfficeMojo. 2016. Accessed April 4, 2016. http://BoxOfficeMojo.com.

Boylstein, Craig, and Scott R. Maggard. 2013. “Small-Scale Marijuana Growing: Deviant Careers as Serious Leisure.” Humbolt Journal of Social Relations 35: 52–70.

Brand, Steward, and Matt Herron. 1985. “‘Keep Designing’: How the Information Economy is Being Created and Shaped by the Hacker Ethic.” Whole Earth Review 46: 44–52.

Braverman, Harry. 1974. Labor and Monopoly Capital: The Degradation of Work in the Twentieth Century. New York: Monthly Review Press.

Brown, James J. 2008. “From Friday to Sunday: The Hacker Ethic and Shifting Notions of Labour, Leisure, and Intellectual Property.” Leisure Studies 27: 395–409.

Bulmer, Martin. 1982. “When is Disguise Justified? Alternatives to Covert Participant Observation.” Qualitative Sociology 5: 251–264.

Burgess, Robert L., and Ronald L. Akers. 1966. “A Differential Association-Reinforcement Theory of Criminal Behavior.” Social Problems 14: 128–147.

Burke, Ronald J., and Mary C. Mattis. 2007. Women and Minorities in Science, Technology, Engineering, and Mathematics: Upping the Numbers. Northampton, MA: Edward Elgar.

Business Software Alliance. 2014. The Compliance Gap: BSA Global Software Survey. Accessed June 22, 2015. http://globalstudy.bsa.org.

Calia, Michael. 2013. “Apple’s Market Share Grows.” Wall Street Journal, December 5. Accessed April 4, 2016. http://www.wsj.com.

Callahan, Mat. 2014. “Why Intellectual Property? Why Now?” Socialism and Democracy 28: 1–9.

Chambliss, William. 1975. “Toward a Political Economy of Crime.” Theory and Society 2: 149–170.

Charmaz, Kathy. 2002. “Qualitative Interviewing and Grounded Theory Analysis.” In Handbook of Interview Research: Context and Method, edited by Jaber F. Gubrium and James A. Holstein, 675–694. Thousand Oaks, CA: Sage.

———. 2006. Constructing Grounded Theory: A Practical Guide through Qualitative Analysis. Thousand Oaks, CA: Sage.

Churchill, David. 2015. “Security and Visions of the Criminal: Technology, Professional Criminality, and Social Change in Victorian and Edwardian Britain.” British Journal of Criminology: 1–20.

Christie, Nils. 2000. Crime Control as Industry: Towards Gulags, Western Style. 3rd ed. New York: Routledge.

———. 2004. A Suitable Amount of Crime. New York: Routledge.

Clarke, Adele E. 2005. Situational Analysis: Grounded Theory after the Postmodern Turn. Thousand Oaks, CA: Sage.

Cohen, Stanley. (1972) 2002. Folk Devils and Moral Panics. London: Routledge.

Cole, David, and Jules Lobel. 2007. Less Safe, Less Free: Why America is Losing the War on Terror. New York: New Press.

Coleman, E. Gabriella. 2010. “The Hacker Conference: A Ritual Condensation and Celebration of a Lifeworld.” Anthropological Quarterly 83: 47–72.

———. 2012. “Phreaks, Hackers, and Trolls: The Politics of Transgression and Spectacle.” In The Social Media Reader, edited by Michael Mandiberg, 99–119. New York: New York University Press.

———. 2013. Coding Freedom: The Ethics and Aesthetics of Hacking. Princeton, NJ: Princeton University Press.

———. 2014. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous. New York: Verso.

Coleman, E. Gabriella, and Alex Golub. 2008. “Hacker Practice: Moral Genres and the Cultural Articulation of Liberalism.” Anthropological Theory 8: 255–277.

Corbin, Juliet, and Anselm Strauss. 1990. “Grounded Theory Research: Procedures, Canons, and Evaluative Criteria.” Qualitative Sociology 13: 3–21.

Csikszentmihalyi, Mihaly. 1975. Beyond Boredom and Anxiety. San Francisco, CA: Jossey-Bass.

———. 1990. Flow: The Psychology of Optimal Experience. New York: Harper and Row.

Csikszentmihalyi, Mihaly, Sami Abuhamdeh, and Jeanne Nakamura. 2005. “Flow.” In Handbook of Competence and Motivation, edited by Andrew J. Elliot and Carol S. Dweek, 598–608. New York: Guilford Press.

Currie, Elliot. 2010. “Plain Left Realism: An Appreciation, and Some Thoughts for the Future.” Crime, Law, and Social Change 54: 111–124.

Dafermos, George, and Johan Söderberg. 2009. “The Hacker Movement as a Continuation of Labour Struggle.” Capital and Class 97: 53–73.

Décary-Hétu, David, Carlo Morselli, and Stéphane Leman-Langlois. 2012. “Welcome to the Scene: A Study of Social Organization and Recognition among Warez Hackers.” Journal of Research in Crime and Delinquency 49: 359–382.

DEF CON. 2016. “The DEF CON Story.” Accessed April 1, 2016. http://www.defcon.org/.

DeKeseredy, Walter. 2003. “Left Realism on Inner-City Violence.” In Controversies in Critical Criminology, edited by Martin D. Schwartz and Suzanne E. Hatty, 29–41. Cincinnati, OH: Anderson.

Dewey, Caitlin. 2014. “The Only Guide to Gamergate You Will Ever Need to Read.” Washington Post, October 14. Accessed June 22, 2015. http://www.washingtonpost.com.

Doctorow, Cory. 2008. ©ontent: Selected Essays on Technology, Creativity, Copyright, and the Future of the Future. San Francisco, CA: Tachyon.

Downing, Steven. 2011. “Retro Gaming Subculture and the Social Construction of a Piracy Ethic.” International Journal of Cyber Criminology 5: 750–772.

Durkheim, Émile. (1897) 2006. On Suicide. New York: Penguin.

Engels, Friedrich. 1958. The Condition of the Working Class in England. New York: Macmillan.

Epstein, S. R. 1998. “Craft Guilds, Apprenticeship, and Technological Change in Preindustrial Europe.” Journal of Economic History 58: 684–713.

Fagan, Jeffrey, and Richard B. Freeman. 1999. “Crime and Work.” Crime and Justice 25: 225–290.

Ferenstein, Gregory. 2013. “Hacker Faces More Jail Time than the Convicted Steubenville Rapists He Exposed.” TechCrunch, June 9. Accessed June 22, 2015. http://techcrunch.com.

Ferrell, Jeff. 1993. Crimes of Style: Urban Graffiti and the Politics of Criminality. Boston: Northeastern University Press.

———. 1998. “Criminological Verstehen: Inside the Immediacy of Crime.” In Ethnography at the Edge: Crime, Deviance, and Field Research, edited by Jeff Ferrell and Mark S. Hamm, 20–42. Boston: Northeastern University Press.

———. 2001. Tearing Down the Streets: Adventures in Urban Anarchy. New York: Palgrave.

———. 2004. “Boredom, Crime, and Criminology.” Theoretical Criminology 8: 287–302.

———. 2013. “Cultural Criminology and the Politics of Meaning.” Critical Criminology 21: 257–271.

Ferrell, Jeff, Keith Hayward, and Jock Young. 2008. Cultural Criminology: An Invitation. Thousand Oaks, CA: Sage.

Finlay, Linda. 2008. “A Dance between the Reduction and Reflexivity: Explicating the ‘Phenomenological Psychological Attitude.’” Journal of Phenomenological Psychology 39: 1–32.

Fleming, Peter. 2013. “‘Some Might Call It Work . . . But We Don’t’: Exploitation and the Emergence of Free Work Capitalism.” In Managing ‘Human Resources’ by Exploiting and Exploring People’s Potentials (Research in the Sociology of Organizations, Volume 37), edited by Mikael Holmqvist and André Spicer, 105–128. Bingley, UK: Emerald Group.

Foucault, Michel. 1972. “Discourse on Language.” In Archaeology of Knowledge, by Michel Foucault, 215–237. Scranton, PA: Tavistock Publications.

Frissell, Duncan. 2001. “Re: Denning’s Crypto Anarchy.” In Crypto Anarchy, Cyberstates, and Pirate Utopias, edited by Peter Ludlow, 105–114. Cambridge, MA: MIT Press.

Frost, Natasha A., and Nickie D. Phillips. 2011. “Talking Heads: Crime Reporting on Cable News.” Justice Quarterly 28: 87–112.

Fuchs, Christian. 2010. “Labor in Informational Capitalism and on the Internet.” Information Society 26: 179–196.

———. 2014. Digital Labour and Karl Marx. New York: Routledge.

Furnell, Steven. 2010. “Hackers, Viruses, and Malicious Software.” In Handbook of Internet Crime, edited by Yvonne Jewkes and Majid Yar, 173–193. Portland, OR: Willan.

Gagne, Patricia. 2004. “Getting In and Getting On: Entrée Strategies and the Importance of Trust and Rapport in Qualitative Research.” In Controversies in Criminal Justice Research, edited by Richard Tewksbury and Elizabeth Mustaine, 103–115. Cincinnati, OH: Anderson.

Gans, Herbert J. 2005. “Race as Class.” Contexts 4: 17–21.

Garnaeva, Maria, Victor Chebyshev, Denis Makrushin, Roman Unuchek, and Anton Ivanov. 2014. Kaspersky Security Bulletin 2014: Overall Statistics for 2014. Accessed June 22, 2015. http://cdn.securelist.com.

Garrett, Bradley. 2013. Explore Everything: Place-Hacking the City. New York: Verso.

Geis, Gilbert. 1995. “The Limits of Academic Tolerance: The Discontinuance of the School of Criminology at Berkeley.” In Punishment and Social Control: Essays in Honor of Sheldon L. Messinger, edited by Thomas G. Blomberg and Stanley Cohen, 277–304. New York: Aldine de Gruyter.

Glaser, Barney G., and Anselm L. Strauss. 1967. The Discovery of Grounded Theory: Strategies for Qualitative Research. Piscataway, NJ: Aldine.

Glenny, Misha. 2011. Darkmarket: Cyberthieves, Cybercops, and You. New York: Alfred A. Knopf.

Goffman, Erving. 1959. The Presentation of Self in Everyday Life. New York: Anchor Books.

Gold, Steve. 2011. “The Rebirth of Phreaking.” Network Security 2011: 15–17.

Goldman, David. 2012. “Anonymous in Disarray after Major Crackdown Snares Leaders.” CNN Money, March 6. Accessed April 4, 2016. http://money.cnn.com.

Gorman, Siobhan. 2012. “Alert on Hacker Power Play.” Wall Street Journal, February 21. Accessed June 22, 2015. http://www.wsj.com.

Gottfredson, Michael R., and Travis Hirschi. 1990. A General Theory of Crime. Stanford, CA: Stanford University Press.

Gramsci, Antonio. 1971. Selections from the Prison Notebooks. Translated by Quintin Hoare and Geoffrey Nowell Smith. New York: International Publishers.

Gustin, Sam. 2010. “U.S. Shutters 82 Sites in Crackdown on Downloads, Counterfeit Goods.” Wired, November 29. Accessed June 22, 2015. http://www.wired.com.

Habermas, Jurgen. 1973. Legitimation Crisis. Boston: Beacon.

Hagan, John. 1992. “The Poverty of a Classless Criminology: The American Society of Criminology 1991 Presidential Address.” Criminology 30: 1–19.

Halbert, Debora. 1997. “Discourses of Danger and the Computer Hacker.” Information Society 13: 361–374.

Hall, Stuart. 2001. “Foucault: Power, Knowledge and Discourse.” In Discourse Theory and Practice: A Reader, edited by Margaret Wetherell, Stephanie Taylor, and Simeon J. Yates, 72–81. Thousand Oaks, CA: Sage.

Hall, Stuart, Chas Critcher, Tony Jefferson, John Clarke, and Brian Roberts. 1978. Policing the Crisis: Mugging, the State, and Law and Order. London: Macmillan Press.

Hanover Research. 2015. The Emergence of Cybersecurity Law. Prepared for the Indiana University Maurer School of Law. Arlington, VA: Hanover Research. http://info.law.indiana.edu.

Hardt, Michael, and Antonio Negri. 2000. Empire. Cambridge, MA: Harvard University Press.

Harring, Sidney L. 1983. Policing a Class Society: The Experience of American Cities, 1865–1915. New Brunswick, NJ: Rutgers University Press.

Harvey, David. 2005. A Brief History of Neoliberalism. New York: Oxford University Press.

———. 2010. The Enigma of Capital and the Crises of Capitalism. New York: Oxford University Press.

———. 2014. Seventeen Contradictions and the End of Capitalism. New York: Oxford University Press.

Hayward, Keith. 2004. City Limits: Crime, Consumer Culture, and the Urban Experience. New York: Taylor and Francis.

Heap, James L. 1981. “Free-Phantasy, Language, and Sociology: A Criticism of the Methodist Theory of Essence.” Human Studies 4: 299–311.

Herrnstein, Richard J., and Charles Murray. 1996. The Bell Curve: Intelligence and Class Structure in American Life. New York: Free Press.

Hess, Aaron. 2009. “Resistance Up in Smoke: Analyzing the Limitations of Deliberation on YouTube.” Critical Studies in Media Communication 26: 411–434.

Higgins, George E. 2010. Cybercrime: An Introduction to an Emerging Phenomenon. New York: McGraw-Hill.

Himanen, Pekka. 2001. The Hacker Ethic: A Radical Approach to the Philosophy of Business. New York: Random House.

Hobsbawm, Eric J. 1965. Primitive Rebels: Studies in Archaic Forms of Social Movement in the Nineteenth and Twentieth Centuries. New York: W. W. Norton.

Hollinger, Richard C. 1991. “Hackers: Computer Heroes or Electronic Highwaymen?” Computers and Society 21: 6–17.

Holt, Thomas J. 2009. “Lone Hacks or Group Cracks: Examining the Social Organization of Computer Hackers.” In Crimes of the Internet, edited by Frank Schmalleger and Michael Pittaro, 336–355. Upper Saddle River, NJ: Pearson Education.

———. 2010a. “Becoming a Computer Hacker: Examining the Enculturation and Development of Computer Deviants.” In In Their Own Words: Criminals on Crime, An Anthology, edited by Paul Cromwell, 5th ed., 109–123. New York: Oxford University Press.

———. 2010b. “Examining the Role of Technology in the Formation of Deviant Subcultures.” Social Science Computer Review 28: 466–481.

Holt, Thomas J., Deborah Strumsky, Olga Smirnova, and Max Kilger. 2012. “Examining the Social Networks of Malware Writers and Hackers.” International Journal of Cyber Criminology 6: 891–903.

Hough, Mike. 2014. “Confessions of a Recovering ‘Administrative Criminologist’: Jock Young, Quantitative Research, and Policy Research.” Crime Media Culture 10: 215–226.

Hughes, Eric. 2001. “A Cypherpunk’s Manifesto.” In Crypto Anarchy, Cyberstates, and Pirate Utopias, edited by Peter Ludlow, 81–83. Cambridge, MA: MIT Press.

Huws, Ursula. 2014. Labor in the Global Digital Economy: The Cybertariat Comes of Age. New York: Monthly Review Press.

Ingersoll, Geoffrey. 2013. “Why Chinese Hacking is NOT an Act of War.” Business Insider, May 24. Accessed June 22, 2015. http://www.businessinsider.com.

Iozzio, Corrinne. 2008. “The 10 Most Mysterious Cyber Crimes.” PC Magazine, September 26. Accessed April 4, 2016. http://www.pcmag.com.

Johnson, John M. 2002. “In-Depth Interviewing.” In Handbook of Interview Research: Context and Method, edited by Jaber F. Gubrium and James A. Holstein, 103–119. Thousand Oaks, CA: Sage.

Jordan, Tim. 2001. “Language and Libertarianism: The Politics of Cyberculture and the Culture of Cyberpolitics.” Sociological Review 49: 1–17.

———. 2008. Hacking: Digital Media and Technological Determinism. Malden, MA: Polity Press.

Jordan, Tim, and Paul Taylor. 1998. “A Sociology of Hackers.” Sociological Review 46: 757–780.

———. 2004. Hacktivism and Cyberwars: Rebels with a Cause. New York: Routledge.

Kain, Erik. 2015. “The Top Ten Best-Selling Video Games of 2014.” Forbes, January 19. Accessed April 4, 2016. www.forbes.com.

Kappeler, Victor E. 2011. “Inventing Criminal Justice: Myth and Social Construction.” In Theorizing Criminal Justice: Eight Essential Orientations, 2nd ed., edited by Peter B. Kraska and John J. Brent, 185–194. Long Grove, IL: Waveland Press.

Kappeler, Victor E., and Gary W. Potter. 2005. The Mythology of Crime and Criminal Justice. 4th ed. Long Grove, IL: Waveland Press.

Katz, Jack. 1988. Seductions of Crime: Moral and Sensual Attractions in Doing Evil. New York: Basic Books.

Kidder, Tracy. 1981. The Soul of a New Machine. New York: Back Bay Books.

King, Harry, and William J. Chambliss. 1984. The Box-Man: A Professional Thief’s Journey. Hoboken, NJ: John Wiley and Sons.

Kirkpatrick, Graeme. 2002. “The Hacker Ethic and the Spirit of the Information Age.” Max Weber Studies 2: 163–185.

Ko, Ia, and Steward I. Donaldson. 2011. “Applied Positive Organizational Psychology: The State of the Science and Practice.” In Applied Positive Psychology: Improving Everyday Life, Health, Schools, Work, and Society, edited by Stewart I. Donaldson, Mihaly Csikszentmihalyi, and Jeanne Nakamura, 137–154. New York: Routledge.

Kubitschko, Sebastian. 2015. “Hackers’ Media Practices: Demonstrating and Articulating Expertise as Interlocking Arrangements.” Convergence: The International Journal of Research into New Media Technologies 21: 388–402.

Kücklich, Julian. 2005. “Precarious Playbour: Modders and the Digital Games Industry.” Fibreculture Journal 5. Accessed June 22, 2015. http://five.fibreculturejournal.org.

Lakoff, George, and Mark Johnson. 1980. Metaphors We Live By. Chicago: University of Chicago Press.

Laub, John H., and Robert J. Sampson. 1993. “Turning Points in the Life Course: Why Change Matters to the Study of Crime.” Criminology 31: 301–325.

Liebowitz, Matt. 2012. “Could Anonymous Really Knock Out the Power Grid?” NBCNews, Feburary 21. Accessed June 22, 2015. http://www.nbcnews.com.

Lea, John. 1992. “The Analysis of Crime.” In Rethinking Criminology: The Realist Debate, edited by Jock Young and Roger Matthews, 69–94. London: Sage.

———. 1999. “Social Crime Revisited.” Theoretical Criminology 3: 307–325.

———. 2014. “New Deviancy, Marxism and the Politics of Left Realism: Reflections on Jock Young’s Early Writings.” Theoretical Criminology 18: 432–440.

———. 2015. “Jock Young and the Development of Left Realist Criminology.” Critical Criminology 23: 165–177.

Lea, John, and Kevin Stenson. 2007. “Security, Sovereignty, and Non-State Governance ‘From Below.’” Canadian Journal of Law and Society 22: 9–27.

Lea, John, and Jock Young. 1984. What Is to Be Done about Law and Order? New York: Penguin.

Leigh, David, and Luke Harding. 2011. WikiLeaks: Inside Julian Assange’s War on Secrecy. New York: Public Affairs.

Leman-Langlois, Stéphane. 2013. Technocrime, Policing, and Surveillance. New York: Routledge.

Lessig, Lawrence. 2004. Free Culture: The Nature and Future of Creativity. New York: Penguin.

———. 2008. Remix: Making Art and Commerce Thrive in the Hybrid Economy. New York: Penguin.

———. 2012. “Remix: How Creativity is Being Strangled by the Law.” In The Social Media Reader, edited by Michael Mandiberg, 155–169. New York: New York University Press.

Letkemann, Peter. 1973. Crime as Work. Upper Saddle River, NJ: Prentice-Hall.

Levy, Steven. 1984. Hackers: Heroes of the Computer Revolution. New York: Penguin.

———. 2001. Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age. New York: Penguin.

Lilly, J. Robert, and Paul Knepper. 1993. “The Corrections-Commercial Complex.” Crime and Delinquency 39: 150–166.

Linebaugh, Peter. 2014. “Karl Marx, the Theft of Wood, and Working-Class Composition: A Contribution to the Current Debate.” Social Justice 40: 137–161.

Loader, Ian, and Richard Sparks. 2010. Public Criminology? New York: Routledge.

Losurdo, Domenico. 2014. Liberalism: A Counter-History. New York: Verso.

Lunney, Glynn S. 2001. “The Death of Copyright: Digital Technology, Private Copying, and the Digital Millennium Copyright Act.” Virginia Law Review 87: 813–920.

Lynch, Michael J. 1997. Radical Criminology. Brookfield, VT: Dartmouth.

———. 2015. “The Classlessness State of Criminology and Why Criminology without Class is Rather Meaningless.” Crime, Law, and Social Change 63: 65–90.

Lynch, Michael J., Raymond Michalowski, and Byron W. Groves. 2006. Primer in Radical Criminology: Critical Perspectives on Crime, Power, and Identity. 4th ed. Monsey, NY: Criminal Justice Press.

Magliocca, Gerard N. 2007. “Blackberries and Barnyards: Patent Trolls and the Perils of Innovation.” Notre Dame Law Review 82: 1809–1838.

Marcum, Catherine D., George E. Higgins, Melissa L. Ricketts, and Scott E. Wolfe. 2014. “Hacking in High School: Cybercrime Perpetration by Juveniles.” Deviant Behavior 35: 581–591.

Marx, Karl. 1842. “Debates on the Law on Thefts of Wood.” Rheinische Zeitung, 298. Accessed June 22, 2015. https://www.marxists.org.

———. (1844) 1959. Economic and Philosophic Manuscripts of 1844. Translated by Martin Milligan. Moscow: Progress Publishers. Accessed June 22, 2015. http://www.marxists.org.

———. (1867) 1967. Capital. Vol. 1. New York: International Publishers.

———. (1936) 1973. Grundrisse. New York: Penguin Putnam.

Marx, Karl, and Friedrich Engels. (1848) 2005. The Communist Manifesto. Minneapolis, MN: Filiquarian.

———. 1947. The German Ideology: Part One with Selections from Parts Two and Three and Supplementary Texts. Edited by C. J. Arthur. New York: International Publishers.

Matthews, Roger. 2014. Realist Criminology. London: Palgrave Macmillan.

May, Timothy C. 2001a. “Crypto Anarchy and Virtual Communities.” In Crypto Anarchy, Cyberstates, and Pirate Utopias, edited by Peter Ludlow, 65–79. Cambridge, MA: MIT Press.

———. 2001b. “The Crypto Anarchist Manifesto.” In Crypto Anarchy, Cyberstates, and Pirate Utopias, edited by Peter Ludlow, 61–63. Cambridge, MA: MIT Press.

McCarthy, Ciara. 2013. “Attack of the Baby-Monitor Hackers!” Slate, August 14. Accessed June 22, 2015. http://www.slate.com.

McConchie, Alan. 2015. “Hacker Cartography: Crowdsourced Geography, OpenStreetMap, and the Hacker Political Imaginary.” ACME: An International E-Journal for Critical Geographies 14: 874–898.

McGonigal, Jane. 2011. Reality Is Broken: Why Games Make Us Better and How They Can Change the World. New York: Penguin.

McGowan, Casey J. 2014. “The Relevance of Relevance: Section 215 of the USA PATRIOT Act and the NSA Metadata Collection Program.” Fordham Law Review 82: 2399–2442.

McGuire, Michael. 2010. “Online Surveillance and Personal Liberty.” In Handbook of Internet Crime, edited by Yvonne Jewkes and Majid Yar, 492–519. Portland, OR: Willan.

McKenzie, Jon. 1999. “!nt3rh4ckt!v!ty.” Style 33: 283–299.

McLeod, Kembrew. 2014. Pranksters: Making Mischief in the Modern World. New York: New York University Press.

McLuhan, Marshall. 1964. Understanding Media: The Extensions of Man. Cambridge, MA: MIT Press.

Meikle, Graham. 2002. Future Active: Media Activism and the Internet. New York: Routledge.

Michalowski, Raymond. 1985. Order, Law, and Crime. New York: McGraw-Hill.

Microsoft. 2016. “How Microsoft is Protecting Customer Data in the Cloud.” Accessed April 4, 2016. https://www.youtube.com.

Mills, C. Wright. 1940. “Situated Actions and Vocabularies of Motive.” American Sociological Review 5: 904–913.

———. 1951. White Collar: The American Middle Classes. New York: Oxford University Press.

———. 1959. The Sociological Imagination. New York: Oxford University Press.

Mills, Elinor. 2010. “Hacker ‘Mudge’ Gets DARPA Job.” CNET, February 10. Accessed June 22, 2015. http://www.cnet.com.

Mitnick, Kevin, and William L. Simon. 2002. The Art of Deception: Controlling the Human Element of Security. Hoboken, NJ: Wiley.

———. 2011. Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker. New York: Little, Brown.

Mlot, Stephanie. 2014. “Russian Site Streaming Live Feeds of Hacked Webcams.” PC Magazine, November 20. Accessed June 22, 2015. http://www.pcmag.com.

Moore, Alan. 1988. V for Vendetta. New York: Vertigo.

Morris, Robert G. 2010. “Computer Hacking and Techniques of Neutralization.” In Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications, edited by Thomas J. Holt and Bernadette H. Schell, 1–17. Hershey, PA: IGI Global.

Nakamura, Jeanne, and Mihaly Csikszentmihalyi. 2002. “The Concept of Flow.” In Handbook of Positive Psychology, edited by C. R. Snyder and Shane J. Lopez, 89–105. New York: Oxford University Press.

National Public Radio. 2015. “Cyberpsychologist: Online, ‘Every Contact Leaves a Trace.’” NPR, March 8. Accessed June 22, 2015. http://www.npr.org.

National Science Foundation. 2013. Women, Minorities, and Persons with Disabilities in Science and Engineering: 2013. Special Report NSF, 13–304. Arlington, VA: National Science Foundation.

Nichols, Randall K., Daniel J. Ryan, and Julie J. C. H. Ryan. 2000. Defending Your Digital Assets against Hackers, Crackers, Spies, and Thieves. New York: McGraw-Hill.

Nikitina, Svetlana. 2012. “Hackers as Tricksters of the Digital Age: Creativity in Hacker Culture.” Journal of Popular Culture 45: 133–152.

Nissenbaum, Helen. 2004. “Hackers and the Contested Ontology of Cyberspace.” New Media and Society 6: 195–217.

Obama, Barack. 2012. “Taking the Cyberattack Threat Seriously.” Wall Street Journal, July 19. Accessed June 22, 2015. http://online.wsj.com..

O’Connor, Erin. 2005. “Embodied Knowledge: The Experience of Meaning and the Struggle Towards Proficiency in Glassblowing.” Ethnography 6: 183–204.

OECD. 2016. “OECD Broadband Portal.” Accessed April 4, 2016. http://www.oecd.org.

Olson, Parmy. 2012. We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. New York: Little, Brown.

Palermo, James. 1978. “Apodictic Truth: Husserl’s Eidetic Reduction Versus Induction.” Notre Dame Journal of Formal Logic 19: 69–80.

Papadimitriou, Fivos. 2009. “A Nexus of Cyber-Geography and Cyber-Psychology: Topos/‘Notopia’ and Identity in Hacking.” Computers in Human Behavior 25: 1331–1334.

Pavlich, George. 2001. “Critical Genres and Radical Criminology in Britain.” British Journal of Criminology 41: 150–167.

Pepinsky, Hal, and Richard Quinney. 1991. Criminology as Peacemaking. Bloomington: Indiana University Press.

Perelman, Michael. 1998. Class Warfare in the Information Age. New York: St. Martin’s Press.

———. 2002. Steal This Idea: Intellectual Property Rights and the Corporate Confiscation of Creativity. New York: Palgrave Macmillan.

———. 2014. “The Political Economy of Intellectual Property.” Socialism and Democracy 28: 24–33.

Peterson, T. F. 2011. Nightwork: A History of Hacks and Pranks at MIT. Cambridge, MA: MIT Press.

Pfaffenberger, Bryan. 1988. “The Social Meaning of the Personal Computer: Or, Why the Personal Computer Revolution was No Revolution.” Anthropological Quarterly 61: 39–47.

Phillips, Nickie D., and Staci Strobl. 2013. Comic Book Crime: Truth, Justice, and the American Way. New York: New York University Press.

Platt, Tony, Jon Frappier, Gerda Ray, Richard Schauffler, Larry Trujillo, Lynn Cooper, Elliot Currie, and Sidney Harring. 1977. The Iron Fist and the Velvet Glove: An Analysis of the U.S. Police. 3rd ed. San Francisco: Crime and Social Justice Associates.

Polanyi, Karl. 1944. The Great Transformation: The Political and Economic Origins of Our Time. Boston: Beacon Press.

Postman, Neil. 1985. Amusing Ourselves to Death: Public Discourse in the Age of Show Business. New York: Penguin.

PricewaterhouseCoopers. 2014. IAB (Interactive Advertising Bureau) Internet Advertising Revenue Report. Accessed June 22, 2015. http://www.iab.net.

Quinney, Richard. 1977. Class, State, and Crime. New York: Longman.

Rand, Ayn. 1966. “Patents and Copyrights.” In Capitalism: The Unknown Ideal, 125–129. New York: New American Library.

Rawls, John. 1993. Political Liberalism. New York: Columbia University Press.

Raymond, Eric S. 1996. The New Hacker’s Dictionary. 3rd ed. Cambridge, MA: MIT Press.

———. 2016. The Jargon File. Accessed April 1, 2016. http://www.catb.org/.

Reay, Diane, Jacqueline Davies, Miriam David, and Stephen J. Ball. 2001. “Choices of Degree or Degrees of Choice? Class, ‘Race’ and the Higher Education Choice Process.” Sociology 35: 855–874.

Reiman, Jeffrey, and Paul Leighton. 2012. The Rich Get Richer and the Poor Get Prison: Ideology, Class, and Criminal Justice. 10th ed. Upper Saddle River, NJ: Pearson.

RIAA. 2015. “The Scope of the Problem.” Accessed December 4, 2015. https://www.riaa.com/.

Riley, Dylan J. 2011. “Hegemony, Democracy, and Passive Revolution in Gramsci’s Prison Notebooks.” California Italian Studies 2: 1–20.

Rius. 1976. Marx for Beginners. New York: Pantheon Books.

Rogers, Marcus, Natalie D. Smoak, and Jia Liu. 2006. “Self-Reported Deviant Computer Behavior: A Big-5, Moral Choice, and Manipulative Exploitative Behavior Analysis.” Deviant Behavior 27: 245–268.

Ross, Jeffrey I. 1998. Cutting the Edge: Current Perspectives in Radical/Critical Criminology and Criminal Justice. Westport, CT: Praeger.

Ruffin, Oxblood. 2004. “Hacktivism, From Here to There.” Accessed April 1, 2016. http://www.cultdeadcow.com/.

Sampson, Robert J., and John H. Laub. 1992. “Crime and Deviance in the Life Course.” Annual Review of Sociology 18: 63–84.

Sanders, Carrie B., and Lauren Eisler. 2015. “Engaging and Debating the Role of Public Criminology: An Introduction.” Radical Criminology: An Insurgent Journal 5: 9–16.

Schaefer, Brian P., and Kevin F. Steinmetz. 2014. “Cop-Watching and McLuhan’s Tetrad: The Limits of Video-Activism in the Internet Age.” Surveillance and Society 12: 502–515.

Schell, Bernadette H., John L. Dodge, and Steve S. Moutsatsos. 2002. The Hacking of America: Who’s Doing It, Why, and How. Westport, CT: Quorum Books.

Schell, Bernadette H., and Thomas J. Holt. 2010. “A Profile of the Demographics, Psychological Predispositions, and Social/Behavioral Patterns of Computer Hacker Insiders and Outsiders.” In Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications, edited by Thomas J. Holt and Bernadette H. Schell, 190–213. Hershey, PA: IGI Global.

Schell, Bernadette H., and June Melnychuk. 2010. “Female and Male Hacker Conference Attendees: Their Autism-Spectrum Quotient (AQ) Scores and Self-Reported Adulthood Experiences.” In Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications, edited by Thomas J. Holt and Bernadette H. Schell, 144–168. Hershey, PA: IGI Global.

Schneier, Bruce. 2006. “Quickest Patch Ever.” Wired, September 7. Accessed June 22, 2015. https://www.schneier.com.

Schwartz, Martin D., and Walter DeKeseredy. 2010. “The Current Health of Left Realist Theory.” Crime, Law, and Social Change 54: 107–110.

Sennett, Richard. 2006. The Culture of the New Capitalism. New Haven, CT: Yale University Press.

———. 2008. The Craftsman. New Haven, CT: Yale University Press.

Shelden, Randall G. 2008. Controlling the Dangerous Classes: A History of Criminal Justice in America. 2nd ed. Boston: Pearson Education.

Simon, Jonathan. 2014. “A Radical Need for Criminology.” Social Justice 40: 9–23.

Skibell, Reid. 2002. “The Myth of the Computer Hacker.” Information, Communication, and Society 5: 336–356.

———. 2003. “Cybercrime and Misdemeanors: A Reevaluation of the Computer Fraud and Abuse Act.” Berkeley Technology Law Journal 18: 909–944.

Smith, David, and Phil Evans. 1982. Marx’s Kapital for Beginners. New York: Pantheon Books.

Söderberg, Johan. 2002. “Copyleft vs. Copyright: A Marxist Critique.” First Monday 7(3). http://firstmonday.org.

———. 2008. Hacking Capitalism: The Free and Open Source Software Movement. New York: Routledge.

———. 2013. “Determining Social Change: The Role of Technological Determinism in the Collective Action Framing of Hackers.” New Media and Society 15: 1277–1293.

Spitzer, Steven. 1975. “Toward a Marxian Theory of Deviance.” Social Problems 22: 638–651.

Stallman, Richard. 2002. Free Software, Free Society: Selected Essays of Richard M. Stallman. Boston: Free Software Foundation.

Stein, David. 2014. “A Spectre is Haunting Law and Society: Revisiting Radical Criminology at UC Berkeley.” Social Justice 40: 72–84.

Steinmetz, Kevin F. 2015a. “Becoming a Hacker: Background Characteristics and Developmental Factors.” Journal of Qualitative Criminal Justice and Criminology 3: 31–60.

———. 2015b. “Craft(y)ness: An Ethnographic Study of Hacking.” British Journal of Criminology 55: 125–145.

Steinmetz, Kevin F., and Jurg Gerber. 2014. “‘The Greatest Crime Syndicate since the Gambinos’: A Hacker Critique of Government, Law, and Law Enforcement.” Deviant Behavior 35: 243–261.

———. 2015. “‘It Doesn’t Have to Be This Way’: Hacker Perspectives on Privacy.” Social Justice 41: 29–51.

Steinmetz, Kevin F., and Kenneth D. Tunnell. 2013. “Under the Pixilated Jolly Roger: A Study of On-Line Pirates.” Deviant Behavior 34: 53–67.

Sterling, Bruce. 1992. The Hacker Crackdown: Law and Disorder on the Electronic Frontier. New York: Bantam.

Strauss, Anselm L., and Juliet M. Corbin. 1998. Basics of Qualitative Research: Grounded Theory, Procedures, and Techniques. 2nd ed. Thousand Oaks, CA: Sage.

Sutherland, Edwin H. 1937. The Professional Thief. Chicago: University of Chicago Press.

Sutton, Paul. (Director). 2013. Prison through Tomorrow’s Eyes. United States: JustUs Productions.

Tanczer, Leonie M. 2015. “Hacktivism and the Male-Only Stereotype.” New Media and Society: 1–17.

Taylor, Paul A. 1999. Hackers: Crime in the Digital Sublime. New York: Routledge.

———. 2005. “From Hackers to Hacktivists: Speed Bumps on the Global Superhighway?” New Media and Society 7: 625–646.

The Mentor. 1986. “The Conscience of a Hacker.” Phrack 1(7): phile 3. http://phrack.org.

Thomas, Douglas. 2002. Hacker Culture. Minneapolis: University of Minnesota Press.

Thomas, Jim. 2005. “The Moral Ambiguity of Social Control in Cyberspace: A Retro-Assessment of the ‘Golden Age’ of Hacking.” New Media and Society 7: 599–624.

Tunnell, Kenneth D. 2006. Living Off Crime. 2nd ed. Lanham, MD: Rowman and Littlefield.

Tunnell, Kenneth D., Terry Cox, and Edward L. W. Green. 2011. Scholarship, Songwriting, and Social Justice: A Performance and Discussion. Paper presented at the International Crime, Media, and Popular Culture Studies conference, Terre Haute, Indiana, September 26–28.

Turgeman-Goldschmidt, Orly. 2005. “Hackers’ Accounts: Hacking as a Social Entertainment.” Social Science Computer Review 23: 8–23.

———. 2011. “Identity Construction among Hackers.” In Cyber Criminology: Exploring Internet Crimes and Criminal Behavior, edited by K. Jaishankar, 31–51. Boca Raton, FL: CRC Press.

Turk, Austin. 1969. Criminality and Legal Order. Chicago: Rand McNally.

———. 1976. “Law as a Weapon in Social Conflict.” Social Problems 23(3): 276–291.

Turkle, Sherry. 1984. The Second Self: Computers and the Human Spirit. New York: Simon and Schuster.

U.S. Census Bureau. 2016. “Monthly and Annual Retail Trade.” Accessed April 4, 2016. http://www.census.gov/retail/index.html.

Vaidhyanathan, Siva. 2012. “Open Source as Culture/Culture as Open Source.” In The Social Media Reader, edited by Michael Mandiberg, 24–31. New York: New York University Press.

Van Laer, Jeroen, and Peter Van Aelst. 2010. “Cyber-Protest and Civil Society: The Internet and Action Repertoires in Social Movements.” In Handbook of Internet Crime, edited by Yvonne Jewkes and Majid Yar, 230–254. Portland, OR: Willan.

Van Maanen, John. 2011. Tales of the Field: On Writing Ethnography. 2nd ed. Chicago: University of Chicago Press.

Voiskounsky, Alexander E., and Olga V. Smyslova. 2003. “Flow-Based Model of Computer Hackers’ Motivation.” Cyberpsychology and Behavior 6: 171–180.

Wacquant, Loïc. 2011. “From ‘Public Criminology’ to the Reflexive Sociology of Criminological Production and Consumption.” Review of Public Criminology, by Ian Loader and Richard Sparks. British Journal of Criminology 51: 438–448.

Wall, David S. 2007. Cybercrime: The Transformation of Crime in the Information Age. Malden, MA: Polity Press.

———. 2008. “Cybercrime, Media, and Insecurity: The Shaping of Public Perceptions of Cybercrime.” International Review of Law, Computers, and Technology 22: 45–63.

———. 2012. “The Devil Drives a Lada: The Social Construction of Hackers as Cybercriminals.” In Constructing Crime: Discourse and Cultural Representations of Crime and ‘Deviance’, edited by Christiana Gregoriou, 4–18. Basingstoke, UK: Palgrave MacMillan.

Wark, McKenzie. 2004. The Hacker Manifesto. Cambridge, MA: Harvard University Press.

Warnick, Bryan R. 2004. “Technological Metaphors and Moral Education: The Hacker Ethic and the Computational Experience.” Studies in Philosophy and Education 23: 265–281.

Weber, Max. (1905) 2002. The Protestant Ethic and the Spirit of Capitalism. New York: Penguin Books.

Weisheit, Ralph. 2008. “Making Methamphetamine.” Southern Rural Sociology 23: 78–107.

West, Candace, and Don H. Zimmerman. 1987. “Doing Gender.” Gender and Society 1: 125–151.

Willis, Paul. 1977. Learning to Labor: How Working Class Kids Get Working Class Jobs. New York: Columbia University Press.

Wilson, William J. 1987. The Truly Disadvantaged: The Inner City, the Underclass, and Public Policy. 2nd ed. Chicago: University of Chicago Press.

Woo, Hyung-jin, Yeora Kim, and Joseph Dominick. 2004. “Hackers: Militants or Merry Pranksters? A Content Analysis of Defaced Web Pages.” Media Psychology 6: 63–82.

Wozniak, Steve. 2006. iWoz. New York: W. W. Norton.

Wu, Tim. 2013. “Fixing the Worst Law in Technology.” New Yorker, March 18. http://www.newyorker.com.

Yar, Majid. 2005. “Computer Hacking: Just Another Case of Juvenile Delinquency?” Howard Journal of Criminal Justice 44: 387–399.

———. 2008a. “Computer Crime Control as Industry: Virtual Insecurity and the Market for Private Policing.” In Technologies of Insecurity: The Surveillance of Everyday Life, edited by Katja F. Aas, Helene O. Gundhus, and Heidi M. Lomell, 189–204. New York: Routledge-Cavendish.

———. 2008b. “The Rhetorics and Myths of Anti-Piracy Campaigns: Criminalization, Moral Pedagogy, and Capitalist Property Relations in the Classroom.” New Media and Society 10: 605–623.

———. 2013. Cybercrime and Society. 2nd ed. Thousand Oaks, CA: Sage.

———. 2014. The Cultural Imaginary of the Internet. New York: Palgrave Macmillan.

Young, Jock. 1979. “Left Idealism, Reformism, and Beyond: From New Criminology to Marxism.” In Capitalism and the Rule of Law: From Deviancy Theory to Marxism, edited by Bob Fine, Richard Kinsey, John Lea, Sol Picciotto, and Jock Young, 1–28. London: Hutchinson.

———. 1981. “Thinking Seriously About Crime: Some Models of Criminology.” In Crime and Society: Readings in History and Society, edited by Mike Fitzgerald, Gregor McLennan, and Jennie Pawson, 206–260. London: Routledge.

———. 1997. “Left Realism: The Basics.” In Thinking Critically about Crime, edited by Brian D. MacLean and Dragan Milovanovic, 28–36. Vancouver: Collective Press.

———. 2011a. “Moral Panics and the Transgressive Other.” Crime Media Culture 7: 245–258.

———. 2011b. The Criminological Imagination. Malden, MA: Polity Press.

Zetter, Kim. 2014. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. New York: Crown Publishers.

Ziegler, Margaret. 2008. “Pay No Attention to the Man behind the Curtain: The Government’s Increased Use of the State Secrets Privilege to Conceal Wrongdoing.” Berkeley Technology Law Journal 23: 691–721.

Zinn, Howard. 2005. A People’s History of the United States: 1492 to Present. New York: Harper Perennial.

Žižek, Slavoj. 1994. “The Spectre of Ideology.” In Mapping Ideology, edited by Slavoj Žižek, 1–33. New York: Verso.

———. 2009. First as Tragedy, Then as Farce. New York: Verso.

2600: The Hacker Quarterly Articles

Altman, Mitch. 2007. “The Hacker Perspective.” 2600: The Hacker Quarterly 24(2): 26–28.

Battaglia, Joseph. 2006. “Techno-Exegesis.” 2600: The Hacker Quarterly 23(3): 49–50.

Bowne, Sam. 2011. “Wear a White Hat.” 2600: The Hacker Quarterly 28(3): 55.

cbsm2009. 2009. “Why the ‘No-Fly List’ is a Fraud.” 2600: The Hacker Quarterly 26(2): 12.

Dr. Zoltan. 2008. “Hacking Music.” 2600: The Hacker Quarterly 25(3): 57.

Farr, Nick. 2008. “The Hacker Perspective.” 2600: The Hacker Quarterly 25(3): 26–28.

glutton. 2010. “Seven Things Hackers Did Right.” 2600: The Hacker Quarterly 27(3): 50.

Goldstein, Emmanuel. 2003a. “Disrespecting the Law.” 2600: The Hacker Quarterly 20(2): 4–5.

———. 2003b. “Paranoia vs. Sanity.” 2600: The Hacker Quarterly 20(4): 4–5.

———. 2005. “Questions.” 2600: The Hacker Quarterly 22(3): 4–5.

———. 2007. “The More Things Change . . .” 2600: The Hacker Quarterly 24(4): 4–5.

———. 2008. “The Whole World’s Watching.” 2600: The Hacker Quarterly 25(1), 4–5.

Gonggrijp, Rop. 2007. “Hacker Perspective.” 2600: The Hacker Quarterly 24(4): 26–28.

Hurd, Piyter. 2012. “Insurgent Technology: In WikiLeaks’ Wake.” 2600: The Hacker Quarterly 29(1): 58–59.

kaigeX. 2006. “Network Administrators: Why We Break Harsh Rules.” 2600: The Hacker Quarterly 23(2): 46–47.

Leviathan. 2011. “Kill Switch.” 2600: The Hacker Quarterly 28(3): 57–60.

Lifeguard. 2011. “What Is a Hacker?” 2600: The Hacker Quarterly 28(1): 16.

mirrorshades. 2005. “I Am Not a Hacker.” 2600: The Hacker Quarterly 22(3): 50.

MS-Luddite. 2008. “Penetration Testing the Red Team Way.” 2600: The Hacker Quarterly 25(3): 18–19.

Ninja_of_Comp. 2011. “Hacking Is in the Blood.” 2600: The Hacker Quarterly 28(4): 31.

Pat D. 2011. “Anonymity and the Internet in Canada.” 2600: The Hacker Quarterly 28(4): 54.

Phocks. 2003. “A Glimpse at the Future of Computing.” 2600: The Hacker Quarterly 20(1): 54–55.

Poacher. 2007. “Social Engineering and Pretexts.” 2600: The Hacker Quarterly 24(3): 11–12.

Prettis, Bre. 2009. “The Hacker Perspective.” 2600: The Hacker Quarterly 25(4): 26–28.

PriesT. 2008. “Trashing Gone Wrong in Switzerland.” 2600: The Hacker Quarterly 25(4): 30–31.

Sairys. 2004. “A Lesson on Trust.” 2600: The Hacker Quarterly 21(2): 45–47.

Squire, Bill. 2006. “The Hacker Perspective.” 2600: The Hacker Quarterly 24(1): 26–29.

ternarybit. 2012. “The Hacker Perspective.” 2600: The Hacker Quarterly 29(1): 26–28.

The Piano Guy. 2009. “Hacking Your Hospital Bed.” 2600: The Hacker Quarterly 26(3): 60.

The Prophet. 2002. “A New Era of Telecommunications Surveillance.” 2600: The Hacker Quarterly 19(2): 23–25.

———. 2007. “Telecom Informer.” 2600: The Hacker Quarterly 24(4): 13–14.

———. 2010. “Telecom Informer.” 2600: The Hacker Quarterly 27: 13–14.

Toni-Sama. 2007. “VoIP Cellphones: The Call of the Future.” 2600: The Hacker Quarterly 24(2): 48–49.

Torrone, Phillip. 2006. “The Hacker Perspective.” 2600: The Hacker Quarterly 23(4): 26–28.

Valnour. 2009. “Revenge Is a Dish Best Served Cold.” 2600: The Hacker Quarterly 26(4): 32.

WillPC. 2007. “Darknets.” 2600: The Hacker Quarterly 24(4): 15.

Xen. 2006. “United Kingdom: The State of Surveillance.” 2600: The Hacker Quarterly 23(1): 11–13.