SlideShare a Scribd company logo
1 of 31
MAC129 / MED102

1
Overview
 Origins
 ‘Golden Age’
 Criminality
 Hacktivism today?

2
 Jim Thomas (2005) ‘The moral ambiguity of

social control in cyberspace: a retroassessment of the ‘golden age’ of hacking’
 Paul Taylor (2005) ‘From hackers to

hacktivists: speed bumps on the global
superhighway?’
 Both in New Media & Society, Vol 7, No 5
3
 Hackers Wanted (aka Can

You Hack It?)

Click

4
From then to today…
 Nissenbaum (2004: 196) claims hackers were

once seen as:

 ‘ardent (if quirky) programmers capable of

brilliant, unorthodox feats of machine
manipulation’

5
Origins…
 1946
 Tech Model Railway

Club
 Massachusetts Institute
of Technology (MIT)
 Hackers Wanted

6
 Robert Bickford (1986) defined a hacker as
 ‘any person who derives joy from discovering

ways to circumvent limitations.’

7
Steve Wozniak clip

8
 Sherry Turkle (1984: 232) defined

the hack as being:

 ‘the Holy Grail. It is a concept which

exists independently of the
computer and can best be presented
through an example using another
technology complex enough to
support its own version of hacking
and hackers’

9
Phone-Phreaking
 John Draper (aka

Captain Crunch)
 The Woz and The Blue Box

See: http://myoldmac.net/FAQ/TheBlueBox-1.htm

10
1980s…
 Hierarchies develop

Elite hackers

lamerz
11
Trophies
 ‘Computer Underground’ (Meyer, 1989)
 Darknets?
 Hackers began to be perceived as ‘cultural

deviants, law-breaking miscreants or
renegade sociopaths’ (Thomas, 2005: 603).

12
13
Phrack
editor…

 “A subtle modification about p0f [passive OS

fingerprinting] which [sic] made me finding
documents that I wasn't supposed to find. Some
years ago, I had a period when each month I tried to
focus on the security of one country. One of those
countries was South-Korea where I owned a big ISP
[Internet service provider]. After spending some
time to figure out how I could leave the DMZ [a
‘neutral’ network zone] and enter in the LAN [local
area network], I succeed thanks to a cisco
modification (I like default passwords). Once in the
LAN and after hiding my activity (userland >
kernelland), I installed a slightly modification of p0f.”
14
Phrack
editor…

 “The purpose if this version was to scan

automatically all the windows box found on the
network, mount shared folders and list all files in
these folders. Nothing fantastic. But one of the
computers scanned contained a lot of files about the
other Korea... North Korea. And trust me, there
were files that I wasn't supposed to find. I couldn't
believe it. I could do the evil guy and try to sell these
files for money, but I had (and I still have) a hacker
ethic. So I simply added a text file on the desktop to
warn the user of the "flaw". After that I left the
network and I didn't come back. It was more than 5
years ago so don't ask me the name of the ISP I can't
remember”
15
Golden Age of Hacking
(1980-1990)

16
High profile arrests
 1982 – Roscoe gang (associates

of Kevin Mitnick)
 1983 – Inner Circle
 1984 – ‘414s’

17
Publications
 1984 - 2600: The Hacker Quarterly
 1985 - Phrack
 1987 - Legion of Doom/H Technical Journal
 1988 - P/Hun
 1989 - PIRATE
 1990 - Computer underground Digest (aka

CuD)

18
Bulletin Board Systems
(BBSs)









Plover-Net
Swap Shop
Private Sector
Demon Roach
Underground
Ripco
Metal Shop
The Phoenix Project
Black Ice








The Mentor
Phiber Optik
Dr Ripco
Taran King
Hatchet Molly
Terminus

19
IRC
 Jarkko Oikarinen
 1988
 ASCII chatrooms

20
Ethical Hacking?
 Mantra of ‘knowledge wants

to be free’ (Stewart Brand)

 Founder of the WELL
 Moral imperative to spread

info and prevent secrecy
(Barlow, 1994)

 Cyber-Robin Hood!
21
Ethical Hacking?
1. Reject the notion businesses are the only

groups entitled to technology
2. Hacking was central to freedom and
resistance to corporate oppression
3. High costs of equipment meant hacking and
phreaking were essential for spreading
computer literacy


(‘Doctor Crash’, 1986)

22
A noble pursuit?
 It is a full time hobby, taking countless hours per week to learn,

experiment and execute the art of penetrating multi-user
computers: Why do hackers spend a good portion of their time
hacking? Some might say it is scientific curiosity, others that it is
for mental stimulation. But the true roots of hacker motives run
much deeper than that. In this file I will describe the underlying
motives of the aware hackers, make known the connections
between Hacking, Phreaking, Carding and Anarchy and make
known the ‘techno-revolution’ which is laying seeds in the mind
of every hacker . . . If you need a tutorial on how to perform any
of the above stated methods [of hacking], please read a [Phrack]
file on it. And whatever you do, continue the fight. Whether
you know it or not, if you are a hacker, you are a revolutionary.
[D]on’t worry, you’re on the right side.


(‘Doctor Crash’, 1986)

23
Criminality
 Hacking as a ‘moral panic’
 Mass media pivotal in changing the meaning

of the term ‘hacker’

24
Media witch-hunts

25
Police raids

26
Craig ‘Knight Lightning’
Neidorf

27
1990s onwards
 First internet worm released in 1988

(!) by Robert Morris
 Hacking became synonymous with
computer crime
 May 2007 – Estonia hacked –

Russia?
 June 2010 – Stuxnet worm in Iran –
Israel?
28
Hacktivism
 Hackers with a political

conscious
 Subverting big business or
corrupt authorities
 Criminal or moral?

29
Different shades

- The script kiddie

30
To consider
 How have the media dealt with or portrayed

recent hacking stories?
 Gary McKinnon?
 George Hotz?
 Anonymous?
 Lulzsec?
 Stuxnet?

31

More Related Content

Viewers also liked

Data Managment
Data ManagmentData Managment
Data Managmentnikatmalik
 
Best practices data collection
Best practices data collectionBest practices data collection
Best practices data collectionSherry Lake
 
Share Your Knowledge: Creative Commons and Wikipedia for Cultural Institutions
Share Your Knowledge: Creative Commons and Wikipedia for Cultural InstitutionsShare Your Knowledge: Creative Commons and Wikipedia for Cultural Institutions
Share Your Knowledge: Creative Commons and Wikipedia for Cultural InstitutionsIolanda Pensa
 
European Research Funders and data sharing: an overview of current practices
European Research Funders and data sharing: an overview of current practicesEuropean Research Funders and data sharing: an overview of current practices
European Research Funders and data sharing: an overview of current practicesDCC-info
 
Institutional Support for Research Data Management- Why, what and where next?...
Institutional Support for Research Data Management- Why, what and where next?...Institutional Support for Research Data Management- Why, what and where next?...
Institutional Support for Research Data Management- Why, what and where next?...The University of Edinburgh
 
Data Management - Basic Concepts
Data Management - Basic ConceptsData Management - Basic Concepts
Data Management - Basic ConceptsSr Edith Bogue
 
Best practices data management
Best practices data managementBest practices data management
Best practices data managementSherry Lake
 
Institutional research
Institutional researchInstitutional research
Institutional researchMiles Capp
 
Data management basics, for UC Davis EDU 292
Data management basics, for UC Davis EDU 292Data management basics, for UC Davis EDU 292
Data management basics, for UC Davis EDU 292Phoebe Ayers
 
IBOR Data Management - Standardization
IBOR Data Management - StandardizationIBOR Data Management - Standardization
IBOR Data Management - StandardizationBurak S. Arikan
 
Data Quality Management - Data Issue Management & Resolutionn / Practical App...
Data Quality Management - Data Issue Management & Resolutionn / Practical App...Data Quality Management - Data Issue Management & Resolutionn / Practical App...
Data Quality Management - Data Issue Management & Resolutionn / Practical App...Burak S. Arikan
 
Why Master Data Management matters
Why Master Data Management mattersWhy Master Data Management matters
Why Master Data Management mattersOliver Baasch
 
Introduction to Data Management
Introduction to Data ManagementIntroduction to Data Management
Introduction to Data ManagementCloudbells.com
 
Introduction to Data Management Maturity Models
Introduction to Data Management Maturity ModelsIntroduction to Data Management Maturity Models
Introduction to Data Management Maturity ModelsKingland
 
Data Management Support at Leiden University
Data Management Support at Leiden UniversityData Management Support at Leiden University
Data Management Support at Leiden UniversityLIBER Europe
 
What is Metadata?
What is Metadata?What is Metadata?
What is Metadata?Adgistics
 

Viewers also liked (20)

Why managedata
Why managedataWhy managedata
Why managedata
 
Data Managment
Data ManagmentData Managment
Data Managment
 
Best practices data collection
Best practices data collectionBest practices data collection
Best practices data collection
 
Share Your Knowledge: Creative Commons and Wikipedia for Cultural Institutions
Share Your Knowledge: Creative Commons and Wikipedia for Cultural InstitutionsShare Your Knowledge: Creative Commons and Wikipedia for Cultural Institutions
Share Your Knowledge: Creative Commons and Wikipedia for Cultural Institutions
 
European Research Funders and data sharing: an overview of current practices
European Research Funders and data sharing: an overview of current practicesEuropean Research Funders and data sharing: an overview of current practices
European Research Funders and data sharing: an overview of current practices
 
Preparing Your Research Material for the Future - 2016-11-16 - Humanities Div...
Preparing Your Research Material for the Future - 2016-11-16 - Humanities Div...Preparing Your Research Material for the Future - 2016-11-16 - Humanities Div...
Preparing Your Research Material for the Future - 2016-11-16 - Humanities Div...
 
Institutional Support for Research Data Management- Why, what and where next?...
Institutional Support for Research Data Management- Why, what and where next?...Institutional Support for Research Data Management- Why, what and where next?...
Institutional Support for Research Data Management- Why, what and where next?...
 
Jisc eCollections Terms of Use
Jisc eCollections Terms of UseJisc eCollections Terms of Use
Jisc eCollections Terms of Use
 
Data Management - Basic Concepts
Data Management - Basic ConceptsData Management - Basic Concepts
Data Management - Basic Concepts
 
Best practices data management
Best practices data managementBest practices data management
Best practices data management
 
Institutional research
Institutional researchInstitutional research
Institutional research
 
Data management basics, for UC Davis EDU 292
Data management basics, for UC Davis EDU 292Data management basics, for UC Davis EDU 292
Data management basics, for UC Davis EDU 292
 
Writing a Research Data Management Plan - 2016-11-09 - University of Oxford
Writing a Research Data Management Plan - 2016-11-09 - University of OxfordWriting a Research Data Management Plan - 2016-11-09 - University of Oxford
Writing a Research Data Management Plan - 2016-11-09 - University of Oxford
 
IBOR Data Management - Standardization
IBOR Data Management - StandardizationIBOR Data Management - Standardization
IBOR Data Management - Standardization
 
Data Quality Management - Data Issue Management & Resolutionn / Practical App...
Data Quality Management - Data Issue Management & Resolutionn / Practical App...Data Quality Management - Data Issue Management & Resolutionn / Practical App...
Data Quality Management - Data Issue Management & Resolutionn / Practical App...
 
Why Master Data Management matters
Why Master Data Management mattersWhy Master Data Management matters
Why Master Data Management matters
 
Introduction to Data Management
Introduction to Data ManagementIntroduction to Data Management
Introduction to Data Management
 
Introduction to Data Management Maturity Models
Introduction to Data Management Maturity ModelsIntroduction to Data Management Maturity Models
Introduction to Data Management Maturity Models
 
Data Management Support at Leiden University
Data Management Support at Leiden UniversityData Management Support at Leiden University
Data Management Support at Leiden University
 
What is Metadata?
What is Metadata?What is Metadata?
What is Metadata?
 

Similar to Mac129 med102 hackers lecture

Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
The Hacker Perspective
The Hacker PerspectiveThe Hacker Perspective
The Hacker Perspectivejjtay
 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxshericehewat
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Umang Patel
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Peter Ludlow
 
Secrets of a super hacker
Secrets of a super hackerSecrets of a super hacker
Secrets of a super hackerDecarl Decarl
 
Regulatory Theory in Social Media Society
Regulatory Theory in Social Media SocietyRegulatory Theory in Social Media Society
Regulatory Theory in Social Media SocietyMathias Klang
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 

Similar to Mac129 med102 hackers lecture (20)

Powerpoint
PowerpointPowerpoint
Powerpoint
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
The Hacker Perspective
The Hacker PerspectiveThe Hacker Perspective
The Hacker Perspective
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docx
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Secrets of a super hacker
Secrets of a super hackerSecrets of a super hacker
Secrets of a super hacker
 
Hacking
HackingHacking
Hacking
 
Regulatory Theory in Social Media Society
Regulatory Theory in Social Media SocietyRegulatory Theory in Social Media Society
Regulatory Theory in Social Media Society
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 

More from Rob Jewitt

Med332 marketing albums in digital era
Med332 marketing albums in digital era Med332 marketing albums in digital era
Med332 marketing albums in digital era Rob Jewitt
 
Mac201 post-truth media and fake news
Mac201 post-truth media and fake newsMac201 post-truth media and fake news
Mac201 post-truth media and fake newsRob Jewitt
 
Mac114 week 12 effecetive social media campaigns
Mac114 week 12 effecetive social media campaignsMac114 week 12 effecetive social media campaigns
Mac114 week 12 effecetive social media campaignsRob Jewitt
 
Mac114 week 11 fomo the fear of missing out
Mac114 week 11 fomo the fear of missing outMac114 week 11 fomo the fear of missing out
Mac114 week 11 fomo the fear of missing outRob Jewitt
 
Mac201 essay advice 2016 7
Mac201 essay advice 2016 7Mac201 essay advice 2016 7
Mac201 essay advice 2016 7Rob Jewitt
 
Mac114 social video & personality branding
Mac114 social video & personality brandingMac114 social video & personality branding
Mac114 social video & personality brandingRob Jewitt
 
Mac114 The business of blogging and blogging for business
Mac114 The business of blogging and blogging for businessMac114 The business of blogging and blogging for business
Mac114 The business of blogging and blogging for businessRob Jewitt
 
The death of blogging
The death of bloggingThe death of blogging
The death of bloggingRob Jewitt
 
Mac114 week 2 lecture social media and journalism
Mac114 week 2 lecture social media and journalismMac114 week 2 lecture social media and journalism
Mac114 week 2 lecture social media and journalismRob Jewitt
 
Mac201 2016 7 week 1 lecture1 introtomodule sem2
Mac201 2016 7 week 1 lecture1 introtomodule sem2Mac201 2016 7 week 1 lecture1 introtomodule sem2
Mac201 2016 7 week 1 lecture1 introtomodule sem2Rob Jewitt
 
Mac114 week 1 lecture intro to module
Mac114 week 1 lecture intro to moduleMac114 week 1 lecture intro to module
Mac114 week 1 lecture intro to moduleRob Jewitt
 
Med332 Digital disruption in the music industry
Med332 Digital disruption in the music industryMed332 Digital disruption in the music industry
Med332 Digital disruption in the music industryRob Jewitt
 
Mac201 2016 7 week 1 lecture1 introtomodule sem1
Mac201 2016 7 week 1 lecture1 introtomodule sem1Mac201 2016 7 week 1 lecture1 introtomodule sem1
Mac201 2016 7 week 1 lecture1 introtomodule sem1Rob Jewitt
 
Med312 Journalistic sources in the networked era: protecting and framing
Med312 Journalistic sources in the networked era: protecting and framingMed312 Journalistic sources in the networked era: protecting and framing
Med312 Journalistic sources in the networked era: protecting and framingRob Jewitt
 
Mac201 television constructing the public
Mac201 television constructing the publicMac201 television constructing the public
Mac201 television constructing the publicRob Jewitt
 
Med332 women and pop
Med332 women and popMed332 women and pop
Med332 women and popRob Jewitt
 
Med332 glamorous indie rock and roll
Med332 glamorous indie rock and rollMed332 glamorous indie rock and roll
Med332 glamorous indie rock and rollRob Jewitt
 
Med211 gamergate: actually, its about ethics in games journalism
Med211 gamergate: actually, its about ethics in games journalismMed211 gamergate: actually, its about ethics in games journalism
Med211 gamergate: actually, its about ethics in games journalismRob Jewitt
 
Mac201 arab spring
Mac201 arab springMac201 arab spring
Mac201 arab springRob Jewitt
 
Mac201 big data
Mac201 big dataMac201 big data
Mac201 big dataRob Jewitt
 

More from Rob Jewitt (20)

Med332 marketing albums in digital era
Med332 marketing albums in digital era Med332 marketing albums in digital era
Med332 marketing albums in digital era
 
Mac201 post-truth media and fake news
Mac201 post-truth media and fake newsMac201 post-truth media and fake news
Mac201 post-truth media and fake news
 
Mac114 week 12 effecetive social media campaigns
Mac114 week 12 effecetive social media campaignsMac114 week 12 effecetive social media campaigns
Mac114 week 12 effecetive social media campaigns
 
Mac114 week 11 fomo the fear of missing out
Mac114 week 11 fomo the fear of missing outMac114 week 11 fomo the fear of missing out
Mac114 week 11 fomo the fear of missing out
 
Mac201 essay advice 2016 7
Mac201 essay advice 2016 7Mac201 essay advice 2016 7
Mac201 essay advice 2016 7
 
Mac114 social video & personality branding
Mac114 social video & personality brandingMac114 social video & personality branding
Mac114 social video & personality branding
 
Mac114 The business of blogging and blogging for business
Mac114 The business of blogging and blogging for businessMac114 The business of blogging and blogging for business
Mac114 The business of blogging and blogging for business
 
The death of blogging
The death of bloggingThe death of blogging
The death of blogging
 
Mac114 week 2 lecture social media and journalism
Mac114 week 2 lecture social media and journalismMac114 week 2 lecture social media and journalism
Mac114 week 2 lecture social media and journalism
 
Mac201 2016 7 week 1 lecture1 introtomodule sem2
Mac201 2016 7 week 1 lecture1 introtomodule sem2Mac201 2016 7 week 1 lecture1 introtomodule sem2
Mac201 2016 7 week 1 lecture1 introtomodule sem2
 
Mac114 week 1 lecture intro to module
Mac114 week 1 lecture intro to moduleMac114 week 1 lecture intro to module
Mac114 week 1 lecture intro to module
 
Med332 Digital disruption in the music industry
Med332 Digital disruption in the music industryMed332 Digital disruption in the music industry
Med332 Digital disruption in the music industry
 
Mac201 2016 7 week 1 lecture1 introtomodule sem1
Mac201 2016 7 week 1 lecture1 introtomodule sem1Mac201 2016 7 week 1 lecture1 introtomodule sem1
Mac201 2016 7 week 1 lecture1 introtomodule sem1
 
Med312 Journalistic sources in the networked era: protecting and framing
Med312 Journalistic sources in the networked era: protecting and framingMed312 Journalistic sources in the networked era: protecting and framing
Med312 Journalistic sources in the networked era: protecting and framing
 
Mac201 television constructing the public
Mac201 television constructing the publicMac201 television constructing the public
Mac201 television constructing the public
 
Med332 women and pop
Med332 women and popMed332 women and pop
Med332 women and pop
 
Med332 glamorous indie rock and roll
Med332 glamorous indie rock and rollMed332 glamorous indie rock and roll
Med332 glamorous indie rock and roll
 
Med211 gamergate: actually, its about ethics in games journalism
Med211 gamergate: actually, its about ethics in games journalismMed211 gamergate: actually, its about ethics in games journalism
Med211 gamergate: actually, its about ethics in games journalism
 
Mac201 arab spring
Mac201 arab springMac201 arab spring
Mac201 arab spring
 
Mac201 big data
Mac201 big dataMac201 big data
Mac201 big data
 

Recently uploaded

ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 

Recently uploaded (20)

ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 

Mac129 med102 hackers lecture

  • 2. Overview  Origins  ‘Golden Age’  Criminality  Hacktivism today? 2
  • 3.  Jim Thomas (2005) ‘The moral ambiguity of social control in cyberspace: a retroassessment of the ‘golden age’ of hacking’  Paul Taylor (2005) ‘From hackers to hacktivists: speed bumps on the global superhighway?’  Both in New Media & Society, Vol 7, No 5 3
  • 4.  Hackers Wanted (aka Can You Hack It?) Click 4
  • 5. From then to today…  Nissenbaum (2004: 196) claims hackers were once seen as:  ‘ardent (if quirky) programmers capable of brilliant, unorthodox feats of machine manipulation’ 5
  • 6. Origins…  1946  Tech Model Railway Club  Massachusetts Institute of Technology (MIT)  Hackers Wanted 6
  • 7.  Robert Bickford (1986) defined a hacker as  ‘any person who derives joy from discovering ways to circumvent limitations.’ 7
  • 9.  Sherry Turkle (1984: 232) defined the hack as being:  ‘the Holy Grail. It is a concept which exists independently of the computer and can best be presented through an example using another technology complex enough to support its own version of hacking and hackers’ 9
  • 10. Phone-Phreaking  John Draper (aka Captain Crunch)  The Woz and The Blue Box See: http://myoldmac.net/FAQ/TheBlueBox-1.htm 10
  • 12. Trophies  ‘Computer Underground’ (Meyer, 1989)  Darknets?  Hackers began to be perceived as ‘cultural deviants, law-breaking miscreants or renegade sociopaths’ (Thomas, 2005: 603). 12
  • 13. 13
  • 14. Phrack editor…  “A subtle modification about p0f [passive OS fingerprinting] which [sic] made me finding documents that I wasn't supposed to find. Some years ago, I had a period when each month I tried to focus on the security of one country. One of those countries was South-Korea where I owned a big ISP [Internet service provider]. After spending some time to figure out how I could leave the DMZ [a ‘neutral’ network zone] and enter in the LAN [local area network], I succeed thanks to a cisco modification (I like default passwords). Once in the LAN and after hiding my activity (userland > kernelland), I installed a slightly modification of p0f.” 14
  • 15. Phrack editor…  “The purpose if this version was to scan automatically all the windows box found on the network, mount shared folders and list all files in these folders. Nothing fantastic. But one of the computers scanned contained a lot of files about the other Korea... North Korea. And trust me, there were files that I wasn't supposed to find. I couldn't believe it. I could do the evil guy and try to sell these files for money, but I had (and I still have) a hacker ethic. So I simply added a text file on the desktop to warn the user of the "flaw". After that I left the network and I didn't come back. It was more than 5 years ago so don't ask me the name of the ISP I can't remember” 15
  • 16. Golden Age of Hacking (1980-1990) 16
  • 17. High profile arrests  1982 – Roscoe gang (associates of Kevin Mitnick)  1983 – Inner Circle  1984 – ‘414s’ 17
  • 18. Publications  1984 - 2600: The Hacker Quarterly  1985 - Phrack  1987 - Legion of Doom/H Technical Journal  1988 - P/Hun  1989 - PIRATE  1990 - Computer underground Digest (aka CuD) 18
  • 19. Bulletin Board Systems (BBSs)         Plover-Net Swap Shop Private Sector Demon Roach Underground Ripco Metal Shop The Phoenix Project Black Ice       The Mentor Phiber Optik Dr Ripco Taran King Hatchet Molly Terminus 19
  • 20. IRC  Jarkko Oikarinen  1988  ASCII chatrooms 20
  • 21. Ethical Hacking?  Mantra of ‘knowledge wants to be free’ (Stewart Brand)  Founder of the WELL  Moral imperative to spread info and prevent secrecy (Barlow, 1994)  Cyber-Robin Hood! 21
  • 22. Ethical Hacking? 1. Reject the notion businesses are the only groups entitled to technology 2. Hacking was central to freedom and resistance to corporate oppression 3. High costs of equipment meant hacking and phreaking were essential for spreading computer literacy  (‘Doctor Crash’, 1986) 22
  • 23. A noble pursuit?  It is a full time hobby, taking countless hours per week to learn, experiment and execute the art of penetrating multi-user computers: Why do hackers spend a good portion of their time hacking? Some might say it is scientific curiosity, others that it is for mental stimulation. But the true roots of hacker motives run much deeper than that. In this file I will describe the underlying motives of the aware hackers, make known the connections between Hacking, Phreaking, Carding and Anarchy and make known the ‘techno-revolution’ which is laying seeds in the mind of every hacker . . . If you need a tutorial on how to perform any of the above stated methods [of hacking], please read a [Phrack] file on it. And whatever you do, continue the fight. Whether you know it or not, if you are a hacker, you are a revolutionary. [D]on’t worry, you’re on the right side.  (‘Doctor Crash’, 1986) 23
  • 24. Criminality  Hacking as a ‘moral panic’  Mass media pivotal in changing the meaning of the term ‘hacker’ 24
  • 28. 1990s onwards  First internet worm released in 1988 (!) by Robert Morris  Hacking became synonymous with computer crime  May 2007 – Estonia hacked – Russia?  June 2010 – Stuxnet worm in Iran – Israel? 28
  • 29. Hacktivism  Hackers with a political conscious  Subverting big business or corrupt authorities  Criminal or moral? 29
  • 30. Different shades - The script kiddie 30
  • 31. To consider  How have the media dealt with or portrayed recent hacking stories?  Gary McKinnon?  George Hotz?  Anonymous?  Lulzsec?  Stuxnet? 31

Editor's Notes

  1. http://www.youtube.com/watch?v=vSBzKEdSPMY&list=PLB9553BBB47542B77&index=7
  2. http://www.youtube.com/watch?v=vSBzKEdSPMY&list=PLB9553BBB47542B77&index=8
  3. http://www.youtube.com/watch?v=0PtmVRDE2NM&list=PLB9553BBB47542B77&index=9
  4. http://www.youtube.com/watch?v=shQR85Xyau0&list=PLB9553BBB47542B77&index=12