About | HeinOnline Law Journal Library | HeinOnline Law Journal Library | HeinOnline

23 J. Juv. L. 52 (2002-2003)
Hacking: Juveniles and Undeterred Recreational Cybercrime

handle is hein.journals/jjuvl23 and id is 56 raw text is: HACKING:
JUVENILES AND UNDETERRED
RECREATIONAL CYBERCRIME
I. INTRODUCTION
DNS spoofing, packet sniffers, port scanning, hacktivism, viruses,
worms, denial of service attacks. Sound familiar? Probably only if
you are a hacker, or a computer security expert. The world is wired.
Computers, connected to one another in one form or another, affect
our lives on a daily basis. This Note will examine the elusive (and
notorious) group of persons whom society refers to as hackers, and
the laws that pertain to them.
Hacking is not a new phenomenon.' As long as there have been
computers, there have likely been computer hackers in one form or
another. Many technically savvy people in today's world appear to be
juveniles, who have grown up with computers. A contemporary defi-
nition of a hacker would be, a person who enjoys learning about
ways to break into computer systems and networks.2 Computer liter-
acy is fast becoming a requirement in today's world. Parents normally
encourage computer use by their children, and schools teach com-
puter proficiency. Use of computers by young people is largely en-
couraged, but many minors go beyond computer games and
educational programs; they begin hacking. Hacking is not normally
done with malice, or scienter.3 Most hackers are curious; they wish to
gain access to unauthorized places, and to see what they are not sup-
posed to see.4 People who access a computer to steal or cause damage
within the system are unaffectionatally referred to as crackers.5
Whether the juvenile is coined a hacker or cracker, the problem is
that these juveniles are committing very serious computer crimes and
inflicting chaos and destruction on our public and private computer
systems. These illegal acts can even take place on computers located
in the juvenile's bedroom while mom and dad innocently watch
1. Robert Trigaux, The Underbelly of Cyberspace, ST. PETERSBURG TIMES, June 14,
1998, at 1H.
2. Bill Husted, Learn About Hacking So You Can Avoid Being Hacked, CHICAGO
TRIBUNE, March 8, 1999, at 4.
3. Id.
4. Trigaux, supra note 1, at 1H.
5. Id.

What Is HeinOnline?

HeinOnline is a subscription-based resource containing thousands of academic and legal journals from inception; complete coverage of government documents such as U.S. Statutes at Large, U.S. Code, Federal Register, Code of Federal Regulations, U.S. Reports, and much more. Documents are image-based, fully searchable PDFs with the authority of print combined with the accessibility of a user-friendly and powerful database. For more information, request a quote or trial for your organization below.



Short-term subscription options include 24 hours, 48 hours, or 1 week to HeinOnline.

Contact us for annual subscription options:

Already a HeinOnline Subscriber?

profiles profiles most