Infectious pleasures: Ethnographic perspectives on the production and use of illicit videogame modifications on the Call of Duty franchise | Intellect Skip to content
1981
Volume 5, Issue 1
  • ISSN: 1757-191X
  • E-ISSN: 1757-1928

Abstract

This article explores the phenomenon of illicit modifications known as ‘infection lobbies’ that are created for the Call of Duty (CoD) franchise and deployed on the Xbox 360’s Xbox Live (XBL) gaming network. These modifications have the unique ability to ‘infect’ unmodified systems, altering the settings that control the CoD game space following contact within a multiplayer match, spreading the modification far beyond the reach and control of its instigators. Infection lobbies necessitate the use of hardware hacked Xbox 360 consoles, such as a ‘JTAG’ or ‘Reset Glitch Hack’ (RGH) console, the creation and utilization of which are in violation of access control technology circumvention clauses within the European Directive 2001/29/EC (2001) and the US Digital Millennium Copyright Act (1998) (DMCA). Infection lobbies therefore violate the legal and contractual contexts of play, the rules of the game, and the emergent social contexts of play. As a result infection lobbies constitute illicit modifications, forbidden by law, rules or custom, yet despite this configuration a significant body of players are willing to engage with and utilize them, whether orchestrating and deploying them or by opportunistically utilizing the infected alterations that they contain. Through the conduct of interviews with and participant observation of both those that play within and those that deploy infection lobbies in Activision’s CoD franchise, this article explores not only the process of deployment but what it means to play against the infected, to play alongside the infected and to infect others. In doing so the illicit modification is seen to be interpreted by players in various ways: as egalitarian game-extension, as temporary inversion, as a method of antagonistic dominance, and as a tool for protecting the very core of the game through targeted vigilantism. Through these explorations, this article contributes to contemporary research in the contested space between producer and consumer, and the discourses of legitimization and victimization that surround play.

Loading

Article metrics loading...

/content/journals/10.1386/jgvw.5.1.59_1
2013-03-01
2024-04-19
Loading full text...

Full text loading...

http://instance.metastore.ingenta.com/content/journals/10.1386/jgvw.5.1.59_1
Loading
  • Article Type: Article
Keyword(s): copyright; ethnography; hacking; modding; social structures; videogames
This is a required field
Please enter a valid email address
Approval was a success
Invalid data
An error occurred
Approval was partially successful, following selected items could not be processed due to error