Here are entered works on the practice of breaking into computer systems and using techniques such as defacing or disabling Web sites, redirects, denial-of-service attacks, information theft, Web site parodies, etc., for politically or socially motivated purposes.