Leetspeak

Leetspeak in United States

Leetspeak

Overview of Leetspeak in relation to cyber crime: [1] Historians of Leetspeak allege that it originated within bulletin board systems (BBS) in the mid-1980s. Having elite status on a BBS allowed a user to access file folders, games, and special chat rooms, which often included archives of pirated software, pornography, or text documents documenting topics such as how to construct explosives and manufacture illicit drugs. It is also thought that Leetspeak was developed to defeat text filters created by BBS or Internet Relay Chat (IRC) system operators of message boards to prevent discussion of forbidden topics such as cracking and hacking. Originally reserved for use by hackers, crackers, and eventually the more recent generation of so-called ”script kiddies,” Leet has entered the mainstream of MMORPGs and other forms of online gaming. It is often used to mock ”newbies” (written online as n00bs, nub, or b00ns), a new player or someone inexperienced to a game or Web site community. More obscure forms of Leet involve the use of symbols exclusively, and continue to be used for its original purpose of encrypted communication (Mitchell, 2006).

Resources

Notes and References

  1. By Neel Sampat

See Also

  • Types of Cybercrime
  • Cybercriminal

Further Reading

Computer Hope. (2008). Computer Hope help dictionary and advice. Computer Hope Web site: http://www.computerhope.com/jargon/game.htm; H2g2. (2002). An explanation of l33t speak. BBC’s Hitchhikers Guide to the Galaxy: The Unconventional Guide to the Internet. British Broadcasting Company Web site: http://www.bbc.co.uk/dna/h2g2/A787917; Mitchell, A. (2006, December 6). A Leet Primer. Technology News. ECT News Network, Inc. TechNewWorld Web site: http:// www.technewsworld.com/story/47607.html?welcome=1209958401; Rome, J.A. (2001, December 18). Relax we understand j00. Sigma Tau Delta, The International English Honor Society, Case Western Reserve University, Beta Beta Chapter, Sigma Tau Delta Web site: http://www.case.edu/orgs/sigmataudelta/submissions/romerelaxweunderstand. htm; Sterling, B. (1994). The hacker crackdown: Law and disorder on the electronic frontier. New York: Bantam Spectra Books.


Posted

in

,

by

Tags:

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *