The definition of hacking has undergone some changes in the past few years. At first it identified people “who enjoys modifying and subverting system, whether technological bureaucratic or sociological.” (Lemos, 2002) In the last decade hacking has evolved to describe “those people with a hands-on interest in computer security and circumventing such security. (lemos 2002) As you explore deeper into the digital landscape it becomes clearer that these hackers are sub divided into three groups of intermingling individuals classified by a system of hats.
Myth of the Hacker
The 1960s hacker, a term that was originally a referent to a good person with computer wizardry, has come full circle into the 1990s. Through media representations and the formation of hacker icons, modern hackers are mythologized as the good hacker.
The original hackers of MIT belonged to a group of privileged individuals; they operated during a time when computers were not a household item. Hacking, for this generation, began as an intellectual pursuit as well as a way to pull elaborate pranks. The progression of hacking was limited because computer networking had not been completely implemented into society.
Hackers and the Internet
Internet Security covers a broad list of topics. I have chosen to cover hackers and their history. I will go through who hackers are and how we define hackers. I will also cover the history of how hackers got started. This was a very interesting topic and may surprise a lot of people who have had misconceptions of what hackers do due to how the are covered by the media.
Hacking has historically been associated with shady behavior or criminal connotations. It is very rare that a person condones hacking or thinks of it as anything other than a crime. However, in his article “Academic Freedom and the Hacker Ethic”, Tom Cross challenges us to redefine a hacker and what they actually do. He forces the audience to think as he states that “knowing how to do something that might be harmful is not the same as causing harm” (Cross, 38). Using this powerful statement, Cross uses his article to give the reader a new take on hacking. He proceeds to explain that often times, the information that we receive as a public is a result of hacking into government systems. He provides us with a new perspective as he divulges the
The art of hacking
The world of hacking cannot be placed into clearly defined positive or negative categories. When people hear the word hacker they tend to think about someone that defies or breaks the law. Everything in life has two sides of it the good and the bad, that is how people can understand a subject if they see both sides. Hackers can cause havoc around the world within the systems they get into just to get what they wish. On the other hand hackers are an essential help when we are in trouble and someone needs to find info inside a cellphone to try and help if someone is missing.
Dissecting the Hack is a great book for any technological geared individual. Whether one is a seasoned hacker or an average-Joe from off the street this book will give the individual new information to build on their repertoire. I highly recommend this book for this reason and many others. This book is unlike most other books on cyber crime, it is a fictional story that incorporates real hacks that is very much within the realm of possibility. If a reader becomes stumped after a technical word or hack is used, the book will refer the reader to the second section, which will explain it in more detail. The world is full of criminal activity and with the advancement of technology in today’s world this makes crime a more than ever dangerous reality.
The issue of public information has always been a controversy in our world. One of our country’s founding arguments was based on the necessity of free speech and free information. Many now believe that our government is being overly restrictive on information, blocking and controlling some aspects of free speech that first amendment advocates feel are necessary to maintain our American society. These advocates of free information have been using the nickname “hackers” for over twenty years, but improper use by the media has stretched the word to slanderous levels. Hackers are now stereotyped as mindless vandals and miscreants, although the word “hacker” has been used as a term for computer programmers and technicians since the late 1970s. Modern-day hackers refer to themselves as intelligent socio-political activists who want to raise social awareness of threatening problems. Governments worldwide are trying to persecute hackers when vandals, not hackers, are most often the ones breaking laws and causing damage. The conflict between hackers and the American public is a deeply rooted standoff, caused by misinformation and sensationalism from the media and the government.
... that how everyone refers to them as; and what qualifies being a hacker? Someone who can rob your bank account in under a minute when your naïve child clicks a link some random person sent you? Having had personal experiences on both ‘ends of the stick’ I have realized just how interesting yet dangerous things can get. Hacking has its perks, whether it is to gain invincibility on a computer game or to make a mockery of America’s defense and try to prove aliens exist. It however, can be very, very serious though when both lives and money are on the line; so how do we stop it? Or is it too late?
Although, hackers can damage a person psychologically, emotionally, and financially, hacking almost never leads to direct physical violence. I believe that hacking is one of those unique tools of life that is considered good or bad depending on what it is being used for. I believe that anything that falls into the right hands and is used for a genuine purpose, can help progress society in a positive light even if the thing in question is deemed bad. For instance, in June of 2013, Edward Snowden, an American computer professional, leaked classified information from the National Security Agency (NSA) to the mainstream media in Hong Kong by using the helpfulness social engineering approach, which help him obtain confidential information without physically taken it from the person. Although this was detrimental for the US government’s reputation, simultaneously it was an event that lead to the improvement of security. In addition, if the US had hired Edward Snowden that could use his wrong doing for a right cause. We all have our thoughts about what is wrong and right, but in reality those who are in power of wealth determine what is deemed acceptable and unacceptable. With this in mind, I state the claim that from a creativity aspect no matter whether a product is deemed good or bad,
The Hacker Crackdown: Law and Disorder on the Electronic Frontier by Bruce Sterling is a book that focuses on the events that occurred on and led up to the AT&T long-distance telephone switching system crashing on January 15, 1990. Not only was this event rare and unheard of it took place in a time when few people knew what was exactly going on and how to fix the problem. There were a lot of controversies about the events that led up to this event and the events that followed because not only did it happen on Martin Luther King Day, but few knew what the situation truly entailed. There was fear, skepticism, disbelief and worry surrounding the people that were involved and all of the issues that it incorporated. After these events took place the police began to crackdown on the law enforcement on hackers and other computer based law breakers. The story of the Hacker Crackdown is technological, sub cultural, criminal, and legal. There were many raids that took place and it became a symbolic debate between fighting serious computer crime and protecting the civil liberties of those involved.