This article argues that the hacker is constructed as an information d
eviant and that this image is helpful in providing rules for appropria
te behavior in an information society. The hacker accounts in this art
icle are designed to give the reader an understanding of the types of
things being said about hackers. What is more important, however, is h
ow these narratives are used to support a specific notion of property
ownership and government secrecy. In making this argument, this articl
e traces the development of the narrative about the hacker from harmle
ss computer nerd to terrorist.