Resources for Students Wishing to Specialize in "Darknet" Digital Text Research
        If you are specifically interested in issues of textual legitimacy, political power, and resistance, and if you are not easily disturbed by potentiall violent, disturbing, or dangerous content, visit some "darknet" portals by clicking on these linksNote--some pornography and other content you might object to may be found on these sites, together with the expected political activism and high-end hacking tools.  Caveat lector.  Also consider what kind of libertarian media mélange this type of "library" might represent.  

They have existed before, for instance in 1600s London at "Paul's Walk," the street before St. Paul's Cathedral, where the "Paul's Walkers" recited dangerous political satires and exchanged useful political and economic secrets.   Popup bookstores at Paul's took the form of people walking the street with stacks of printed broadsheets and pamphlets, sometimes attached to the insides and outsides of their clothes.  These documents would have been dangerous for licensed booksellers to carry because they revealed government or business secrets, or satirized the powerful.)

In addition to the Darknet's function as a marketplace for socially taboo/illegal products (drugs, weapons, slaves, child pornography), it also enables illegal hackers to exchange tools, sell the products of hacks (e.g., data), and boast about their "exploits."  The following articles are now rather dated but will serve as an introduction to the vocabulary and recent history of hacking:

Zuley Clarke, Hames Clawson, Maria Cordell.  "A Brief History of Hacking . . . "  LCC6316: Historical Approaches to Digital Media.  2003.  Available online:  http://steel.lcc.gatech.edu/~mcordell/lcc6316/Hacker%20Group%20Project%20FINAL.pdf

David M. Hafele, "Three Shades of Ethical Hacking: Black, White and Gray."  GSEC Practical Assignment, Version 1.4b, Option 1.  SANS Institute.  February 23, 2004.

Larisa April Long, "Profiling Hackers."  GIAC GEC Gold Certification.  SANS Institute.  January 26, 2012.

Elizabeth Rowe's law review article, below, is an example of a recent increase in attention being paid by the legal community to the ways hackers affect business practices in the legitimate economy.   She discusses ways to combat "Remote Access Tools" (RATS) by employing active online countermeasures in ways that do not invoke the notion of "cyber war."  (For more on cyberwar, see Richard A. Clarke's 2010 book of that title or his more recent interviews and articles on the topic.)

Elizabeth A. Rowe, "RATS, TRAPS, and Trade Secrets."  Boston College Law Review, 2016.  

The Jargon File Ver. 4.7.7: A compendium of hacking slang, hacker culture and anecdotes from the first century of programming.