Curiosity is a very defining part of my personality. When ever I would like to learn about something I look it up online. If I am really interested I will look for a book in the library or at a book store. This is the main reason I chose the topic hacktivism, or politically motivated computer hacking. So I could satisfy my curiosity. I first heard about hacktivism when I was in the 7th grade and ever since then have been picking up pieces about it here and there. I personally love the internet because it allows up to access information painlessly. Unlike television, which I despise, there are so many different ideas and plots. Hacktivists seemed like people who wanted to keep it that way. This subject is very interesting but I really wanted to know why these people are hacking, who are they, and what does this mean for my future.
My first question came with many answers. With a large group of people there will be a large variety of motivations. These are the main reasons and or the cause of some of the most famous cases of hacktivism.
The first major motivation of hacktivism is freedom of information. Coleman, an anthropologist who has been studying hacktivism for many years say, “it is a culture committed to freeing information” (Coleman). Hacktivists are fighting for what they believe in, a free internet. Unlike television and other forms of entertainment you do not have to be a billionaire to create a website. The internet is an easy and financially freindly way for people to express their ideas and find information. Hacktivist are often the people who would be most affected in a negative way by a shift in this direction.
The internet is also a place where it is easy to feel like no one can find you, many hac...
... middle of paper ...
... its full extent but, it feels like what fighter planes must have felt like in WWII. This is something new. It is also a concern that weapons like missiles in the future might be hacked into. This ,like many other possibilities would cause major devastation.
I really enjoyed researching this project. Originally I choose this because it was just something that sounded interesting that I had not gotten around to reading about on wikipedia. Also it seem like it would be useful to know about. I was a disappointed that Anonymous was not as ethical as I thought it was but I learned some very interesting things. I learned about how many different types of people where on the internet. Most importantly I learned a lot more about internet safety. This project was defiantly useful for me because the internet is just becoming more and more involved in our lives.
The Ted Talk presented by Catherine Bracy took the word hacking to another level. A new way of looking at a hacker. A hacker meaning much more than a teen behind a computer trying to steal information. The points she brought out is that reaching out to the people can get things done and strengthen relationships between people and an organization and through that relationship both parties are more stable and content. Bracy expressed her experiences with hackers in a government and citizen view, but this can also be applied to personal and
The use of hacking to identify weaknesses in computer security has become an increasingly controversial issue in recent years. Awareness of this issue is important, because our ever increasing reliance on technology means that breaches in computer security have the potential to have wide-ranging and devastating consequences to society, worldwide. This essay will begin by clearly defining the term ‘hacking’ and will examine the type of people who hack and for what reasons. There will then follow a discussion of the moral argument on hacking before examining a few brief examples. The essay will then conclude by arguing against the use of hacking as a means of identifying weaknesses in computer security.
There are probably as many answers to that question as there are hackers (maybe more). It is important to realize that these people are individuals with their own hopes, fears, desires, and everything else that comes with being human. However, there are general patterns to the motivation behind the computer hacker's drive to manipulate technology. The problem of hacker motivation is probably one of the more interesting questions concerning this sub-culture (Hacker-Bible, 1995).
Hacker only has 50 years history, computer hacker crime is one of the mots dangerous crime threat at 21th century. Hacktivism is a new class of hacker has emerged, “the so-called hacktivist, who engages in hacking of computer networks and systems as a form of protest”(Hargrave,2012). Hacker crimes have use computer programming skill to make errors on your computer that control your computer to get information and change your computer system. Since in 1970s, computer hackers are called “phreaks”, which mean by phone hacker. Computer hacker is becoming form phone hacker. In the early 1970, Computer hacker is positive to the society, many of computer programmers were “began looking for ways to get the most out of the machines. “(Deivtt,2001) And then, they are created applications called hacks, which are “applications and allow more tasks to be completed in a shorter time.” (Deivtt,2001).In the early 1980.Hackers using computers and the internet for their own questionable gains. The first computer hacker crime is in the 1983.” six teenagers from
...difficult to try and tell someone that ethics and moral are important for an individual or our society. Hacktivism being a recent adaptation of computer hacking has spread through out the world consistently from years ago. Some are political activists trying to make a point and achieve some goals and getting through tot the people. Hacktivist show society what the new problems are in the world without permission of the law. Some show what could happen if there was a full on cyber terrorism placed against us. In the end, these actions that were used to only show what could happen have turned into being a message that shows us they are just as dangerous as anyone else. The fear people have of hackers is about the same as criminals on the street.
The documentary Rise of the Hackers, focuses on the rising criminal use of hacking and how it is effecting multiple areas of technology. The documentary describes simple and complicated situations concerning hacking, but there still questions that must be answered when it comes to hacking and crime. The main question is in trying to determine why a person would choose to commit computer hacking. There are various theories already present within the criminal justice system that may explain at a micro-level and macro-level. These theories would explain why offenders would commit the crimes, but it may not answer the full scope of the question. The Routine Activities Theory would help to explain why offenders offend, why victims are victimized,
What drives motivation? How far will one go to achieve their goal? Does it mean compromising their ethical beliefs or will they succeed following their ethical compass? For many, they will do just about anything, include being unethical. No boundary, no barrier, no obstacle will stop them. A great example is Margaret Tate, an Executive Editor in Chief of a book publishing firm from the movie “The Proposal”. The movie depicts various management and observation behavior concepts covered in Organizational Behavior such as communication process model, power and counter power, the MARS Model, and values and ethics.
Hacking has been around since the birth of computers. When the term hacking was first used, its meaning was not that of how we think of it today. At the origins of computing, a hacker was considered to be just a "creative programmer (Baase, 2003)." Early forms of computer games as well as the beginnings of operating systems were discovered and created by these original hackers. These hackers plunged into systems as a way of an intellectual challenge and to aspire to gain knowledge (Baase, 2003). Kevin Mitnick believes he falls into this realm of hackers. Hackers in today's era are now looked upon as criminals who invade the privacy rights of individuals and have the ability to deliver worms/viruses. The differences are that hackers today have full intentions of delivering terrible viruses and worms. Mitnick was one of the most infamous hackers during the 1980's. He molded his hacking style around the stupidity of humans and his quest for intellectual knowledge. The ways in which he wiggled his way into computer systems extenuates many of the issues surrounding computer security and privacy.
References to Beddoes’ hacks (Bisson) evoke resentment among readers; they see that black hat hackers gain more by participating in illicit activities than honest citizens do in a year of work, causing them to feel as if it is unfair to themselves because they are stealing from honest citizens like most readers would be. Also, in emphasizing the damages done by black hat hackers and the mysterious backgrounds they often seem to come from, fuel is added to the fire of an already negative connotation. As the other two articles mention, the common perception of hackers is that they are rebellious teenagers out to destroy the world regardless of the channel used. The background described in this article supports those theories when Beddoes speaks of his past as a teenager who started out with an innocent interest in hacking and then transitions into a rebellious malicious hacker after being rejected by the companies that he was trying to assist. Beddoes’ ethos also supports the goal of the article because he is a credible, well-established hacker in recent years. After almost pulling off a multimillion dollar heist, he is a respected yet accessible authority on the topic. Statistics to quantify the amount of data Beddoes stole in his hacking career provide the base to an argument supported by logos. Referring to those numbers also evokes strong emotions in accordance with the amount of people losing money and being victimized by hackers. Readers are inclined to feel sympathy towards the victims of the hackers, evoking an even greater amount of resentment towards the hackers. The content of Bisson’s article effectively supports a negative reaction to
The stories in the book Cyberpunk seems to focus on the life of a hacker. The book follows the life events and trends that a hacker typically goes through. Individuals who are impressed by technology often become wrapped into a technological advancement such as the computer or telephone, and become engulfed in curiosity. However, at this point, these individuals are nothing more than a target market for the product. They not only test the power that comes from understanding what they have in their hands, they become obsessed with it, and even begin to abuse it. Now the person has crossed the line of a fan of a product and entered the realm of hackers. In well-known cases, the individuals who manipulate todays technology for personal gain or pleasure can be related to the villains in science fiction works. Todays hackers are the new generation of pioneers whom we fear because their knowledge gives them control over us. They rationalize their abuse and control over us for the good of technology and feel little or no remorse for any such unscrupulous actions.
The issue with tackling the ethical hacker scenario is that the event is almost entirely action based. There is no end to give meaning to the action and there is no finalized result or indication that it impacted happiness, which many ethical theories depend on. Namely consequentialism, utilitarianism and ethical egotism require an end result in one form or another. There is also no purpose in committing the hackings which makes applying moral theories that deal with motivation and intent, ethical egotism and aspects of virtue ethics, increasingly more difficult to do effectively. Therefore moral theories that apply almost exclusively to the action itself will be utilized in this argument.
The term “hacker” has been in use since the early 1980’s due to mass media usage to describe computer criminals. The use of this term is vastly used by the general population and most are not aware that there are different meanings to the word. People within the computing community especially within the programming subculture emphasize the use of the term “crackers” for computer security intruders (cyber criminals). Early hackers rarely used their skills for financial gain as a motivation for their criminal behavior in that time cybercrime was infantile and largely seen as a practical joke or game by those who committed it. Bob Thomas created the first credited computer worm n...
Hacking was a term established in the 1960s. This word is the concept of unauthorised intrusion of a computer or network with malicious intentions behind them. This includes any technical effort of manipulating or damaging the normal behaviour of network connections/systems or stealing information. In this generation, hacking has become evidently significant and the debate of hacking being considered ethical or unethical arises. Therefore, will hacking ever be justified? The justification (reasonableness) of hacking has become a disputation of mixed opinions and emotions amongst society. These opinions range from hacking being considered immoral due to it being illegal activity and the vast negative impact it has on people. This includes the affirmative opinions on hacking; such as hacking being considered ethical due to the “white hat” hackers.
Wether people find what or whom they are looking for in cyberspace may rely on the individual themselves. With technology advancing every day the internet as a platform for forming relationships is advancing as well. With an ever growing community of online users,
The Art of exploring various security breaches is termed as Hacking.Computer Hackers have been around for so many years. Since the Internet became widely used in the World, We have started to hear more and more about hacking. Only a few Hackers, such as Kevin Mitnick, are well known.In a world of Black and White, it’s easy to describe the typical Hacker. A general outline of a typical Hacker is an Antisocial, Pimple-faced Teenage boy. But the Digital world has many types of Hackers.Hackers are human like the rest of us and are, therefore, unique individuals, so an exact profile is hard to outline.The best broad description of Hackers is that all Hackers aren’t equal. Each Hacker has Motives, Methods and Skills. But some general characteristics can help you understand them. Not all Hackers are Antisocial, PimplefacedTeenagers. Regardless, Hackers are curious about Knowing new things, Brave to take steps and they areoften very Sharp Minded..