The document discusses the computer underground and hacking culture. It describes different types of hackers, their motivations, and how they obtain and distribute pirated software, media, and other illegal materials. It also outlines various hacking techniques like phreaking phone systems, viruses, worms, trojans, and denial of service attacks that hackers use to compromise systems and networks. The document emphasizes that hacking is an international problem as hackers can target systems anywhere in the world through the internet.