Resources for Students Wishing to Specialize in "Darknet" Digital Text Research If you are specifically
interested in issues of textual legitimacy, political power, and resistance, and
if you are not easily disturbed by potentiall violent, disturbing, or dangerous
content, visit some "darknet" portals
by clicking on these links.
Note--some pornography and other content you might object
to may be found on these sites, together with the expected political
activism and high-end hacking tools. Caveat lector. Also
consider what kind of libertarian media mélange this type of "library"
They have existed
before, for instance in 1600s London at "Paul's Walk," the street before St. Paul's
Cathedral, where the "Paul's Walkers" recited dangerous political satires and
exchanged useful political and economic secrets. Popup
bookstores at Paul's took the form of people walking the street with stacks of
printed broadsheets and pamphlets, sometimes attached to the insides and
outsides of their clothes. These documents would have been dangerous for
licensed booksellers to carry because they revealed government or business
secrets, or satirized the powerful.)
addition to the Darknet's function as a marketplace for socially
taboo/illegal products (drugs, weapons, slaves, child pornography), it
also enables illegal hackers to exchange tools, sell the products of
hacks (e.g., data), and boast about their "exploits." The
following articles are now rather dated but will serve as an
introduction to the vocabulary and recent history of hacking:
Clarke, Hames Clawson, Maria Cordell. "A Brief History of Hacking
. . . " LCC6316: Historical Approaches to Digital Media.
2003. Available online: http://steel.lcc.gatech.edu/~mcordell/lcc6316/Hacker%20Group%20Project%20FINAL.pdfDavid
M. Hafele, "Three Shades of Ethical Hacking: Black, White and Gray."
GSEC Practical Assignment, Version 1.4b, Option 1. SANS
Institute. February 23, 2004.
Larisa April Long, "Profiling Hackers." GIAC GEC Gold Certification. SANS Institute. January 26, 2012.
Rowe's law review article, below, is an example of a recent increase in
attention being paid by the legal community to the ways hackers affect
business practices in the legitimate economy. She discusses ways
to combat "Remote Access Tools" (RATS) by employing active online
countermeasures in ways that do not
invoke the notion of "cyber war." (For more on cyberwar, see
Richard A. Clarke's 2010 book of that title or his more recent
interviews and articles on the topic.)
Elizabeth A. Rowe, "RATS, TRAPS, and Trade Secrets." Boston College Law Review, 2016.
The Jargon File Ver. 4.7.7: A compendium of hacking slang, hacker culture and anecdotes from the first century of programming.