SlideShare una empresa de Scribd logo
1 de 29
MAC129 / MED102
1
Overview
 Origins
 ‘Golden Age’
 Criminality
 Hacktivism today?
2
 Jim Thomas (2005) ‘The moral ambiguity of
social control in cyberspace: a retro-
assessment of the ‘golden age’ of hacking’
 Paul Taylor (2005) ‘From hackers to
hacktivists: speed bumps on the global
superhighway?’
 Both in New Media & Society, Vol 7, No 5
3
 Hackers Wanted (aka Can
You Hack It?)
4
Click
From then to today…
 Nissenbaum (2004: 196) claims hackers were
once seen as:
 ‘ardent (if quirky) programmers capable of
brilliant, unorthodox feats of machine
manipulation’
5
Origins…
 1946
 Tech Model Railway
Club
 Massachusetts Institute
of Technology (MIT)
6
Steve Wozniak clip
7
 Robert Bickford (1990) defined a hacker as
 ‘any person who derives joy from discovering
ways to circumvent limitations.’
8
 Sherry Turkle (1984: 232) defined the hack as
being:
 ‘the Holy Grail. It is a concept which exists
independently of the computer and can best be
presented through an example using another
technology complex enough to support its own
version of hacking and hackers’
9
Phone-Phreaking
 John Draper (aka Captain Crunch)
 The Woz and The Blue Box
10
1980s…
 Hierarchies develop
11
Elite hackers
lamerz
Trophies
 ‘Computer Underground’ (Meyer, 1989)
 Darknets?
 Hackers began to be perceived as ‘cultural
deviants, law-breaking miscreants or
renegade sociopaths’ (Thomas, 2005: 603).
12
13
 “A subtle modification about p0f [passive OS
fingerprinting] which [sic] made me finding
documents that I wasn't supposed to find. Some
years ago, I had a period when each month I tried to
focus on the security of one country. One of those
countries was South-Korea where I owned a big ISP
[Internet service provider]. After spending some
time to figure out how I could leave the DMZ [a
‘neutral’ network zone] and enter in the LAN [local
area network], I succeed thanks to a cisco
modification (I like default passwords). Once in the
LAN and after hiding my activity (userland >
kernelland), I installed a slightly modification of p0f.”
14
Phrack
editor…
Phrack
editor…
 “The purpose if this version was to scan
automatically all the windows box found on the
network, mount shared folders and list all files in
these folders. Nothing fantastic. But one of the
computers scanned contained a lot of files about the
other Korea... North Korea. And trust me, there
were files that I wasn't supposed to find. I couldn't
believe it. I could do the evil guy and try to sell these
files for money, but I had (and I still have) a hacker
ethic. So I simply added a text file on the desktop to
warn the user of the "flaw". After that I left the
network and I didn't come back. It was more than 5
years ago so don't ask me the name of the ISP I can't
remember”
15
Golden Age of Hacking
(1980-1990)
16
High profile arrests
 1982 – Roscoe gang (associates
of Kevin Mitnick)
 1983 – Inner Circle
 1984 – ‘414s’
17
Publications
 1984 - 2600: The Hacker Quarterly
 1985 - Phrack
 1987 - Legion of Doom/H Technical Journal
 1988 - P/Hun
 1989 - PIRATE
 1990 - Computer underground Digest (aka
CuD)
18
Bulletin Board Systems
(BBSs)
 Plover-Net
 Swap Shop
 Private Sector
 Demon Roach
Underground
 Ripco
 Metal Shop
 The Phoenix Project
 Black Ice
 The Mentor
 Phiber Optik
 Dr Ripco
 Taran King
 Hatchet Molly
 Terminus
19
IRC
 Jarkko Oikarinen
 1988
 ASCII chatrooms
20
Ethical Hacking?
 Mantra of ‘knowledge wants
to be free’ (Stewart Brand)
 Founder of theWELL
 Moral imperative to spread
info and prevent secrecy
(Barlow, 1994)
 Cyber-Robin Hood!
21
Ethical Hacking?
1. Reject the notion businesses are the only
groups entitled to technology
2. Hacking was central to freedom and
resistance to corporate oppression
3. High costs of equipment meant hacking and
phreaking were essential for spreading
computer literacy
 (‘Doctor Crash’, 1986)
22
A noble pursuit?
 It is a full time hobby, taking countless hours per week to learn,
experiment and execute the art of penetrating multi-user
computers: Why do hackers spend a good portion of their time
hacking? Some might say it is scientific curiosity, others that it is
for mental stimulation. But the true roots of hacker motives run
much deeper than that. In this file I will describe the underlying
motives of the aware hackers, make known the connections
between Hacking, Phreaking, Carding and Anarchy and make
known the ‘techno-revolution’ which is laying seeds in the mind
of every hacker . . . If you need a tutorial on how to perform any
of the above stated methods [of hacking], please read a [Phrack]
file on it. And whatever you do, continue the fight. Whether
you know it or not, if you are a hacker, you are a revolutionary.
[D]on’t worry, you’re on the right side.
 (‘Doctor Crash’, 1986)
23
Criminality
 Hacking as a ‘moral panic’
 Mass media pivotal in changing the meaning
of the term ‘hacker’
24
Media witch-hunts
25
Police raids
26
Craig ‘Knight Lightning’
Neidorf
27
1990s onwards
 First internet worm released in 1988 (!) by
Robert Morris
 Hacking became synonymous with computer
crime
 May 2007 – Estonia hacked – Russia?
 June 2010 – Stuxnet worm in Iran – Israel?
28
Hacktivism
 Hackers with a political conscious
 Subverting big business or corrupt authorities
 Criminal or moral?
29

Más contenido relacionado

Destacado

Mac373 Reporting War 2009
Mac373 Reporting War 2009Mac373 Reporting War 2009
Mac373 Reporting War 2009Rob Jewitt
 
Med312 reporting riots
Med312 reporting riotsMed312 reporting riots
Med312 reporting riotsRob Jewitt
 
Cultural Logic of the Remix
Cultural Logic of the RemixCultural Logic of the Remix
Cultural Logic of the RemixRob Jewitt
 
Mac201 2013-14 assessment 1 overview
Mac201 2013-14 assessment 1 overviewMac201 2013-14 assessment 1 overview
Mac201 2013-14 assessment 1 overviewRob Jewitt
 
Mac201 2014 15 week 1 lecture1 introtomodule
Mac201 2014 15 week 1 lecture1 introtomoduleMac201 2014 15 week 1 lecture1 introtomodule
Mac201 2014 15 week 1 lecture1 introtomoduleRob Jewitt
 
Med122 participatory culture
Med122 participatory cultureMed122 participatory culture
Med122 participatory cultureRob Jewitt
 

Destacado (6)

Mac373 Reporting War 2009
Mac373 Reporting War 2009Mac373 Reporting War 2009
Mac373 Reporting War 2009
 
Med312 reporting riots
Med312 reporting riotsMed312 reporting riots
Med312 reporting riots
 
Cultural Logic of the Remix
Cultural Logic of the RemixCultural Logic of the Remix
Cultural Logic of the Remix
 
Mac201 2013-14 assessment 1 overview
Mac201 2013-14 assessment 1 overviewMac201 2013-14 assessment 1 overview
Mac201 2013-14 assessment 1 overview
 
Mac201 2014 15 week 1 lecture1 introtomodule
Mac201 2014 15 week 1 lecture1 introtomoduleMac201 2014 15 week 1 lecture1 introtomodule
Mac201 2014 15 week 1 lecture1 introtomodule
 
Med122 participatory culture
Med122 participatory cultureMed122 participatory culture
Med122 participatory culture
 

Similar a Mac129 med102 hackers lecture

Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Umang Patel
 
The Hacker Perspective
The Hacker PerspectiveThe Hacker Perspective
The Hacker Perspectivejjtay
 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxshericehewat
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and HackersFarwa Ansari
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Peter Ludlow
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...Hackito Ergo Sum
 

Similar a Mac129 med102 hackers lecture (20)

Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
Hacking
HackingHacking
Hacking
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
The Hacker Perspective
The Hacker PerspectiveThe Hacker Perspective
The Hacker Perspective
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docx
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
 

Más de Rob Jewitt

Med332 marketing albums in digital era
Med332 marketing albums in digital era Med332 marketing albums in digital era
Med332 marketing albums in digital era Rob Jewitt
 
Mac201 post-truth media and fake news
Mac201 post-truth media and fake newsMac201 post-truth media and fake news
Mac201 post-truth media and fake newsRob Jewitt
 
Mac114 week 12 effecetive social media campaigns
Mac114 week 12 effecetive social media campaignsMac114 week 12 effecetive social media campaigns
Mac114 week 12 effecetive social media campaignsRob Jewitt
 
Mac114 week 11 fomo the fear of missing out
Mac114 week 11 fomo the fear of missing outMac114 week 11 fomo the fear of missing out
Mac114 week 11 fomo the fear of missing outRob Jewitt
 
Mac201 essay advice 2016 7
Mac201 essay advice 2016 7Mac201 essay advice 2016 7
Mac201 essay advice 2016 7Rob Jewitt
 
Mac114 social video & personality branding
Mac114 social video & personality brandingMac114 social video & personality branding
Mac114 social video & personality brandingRob Jewitt
 
Mac114 The business of blogging and blogging for business
Mac114 The business of blogging and blogging for businessMac114 The business of blogging and blogging for business
Mac114 The business of blogging and blogging for businessRob Jewitt
 
The death of blogging
The death of bloggingThe death of blogging
The death of bloggingRob Jewitt
 
Mac114 week 2 lecture social media and journalism
Mac114 week 2 lecture social media and journalismMac114 week 2 lecture social media and journalism
Mac114 week 2 lecture social media and journalismRob Jewitt
 
Mac201 2016 7 week 1 lecture1 introtomodule sem2
Mac201 2016 7 week 1 lecture1 introtomodule sem2Mac201 2016 7 week 1 lecture1 introtomodule sem2
Mac201 2016 7 week 1 lecture1 introtomodule sem2Rob Jewitt
 
Mac114 week 1 lecture intro to module
Mac114 week 1 lecture intro to moduleMac114 week 1 lecture intro to module
Mac114 week 1 lecture intro to moduleRob Jewitt
 
Med332 Digital disruption in the music industry
Med332 Digital disruption in the music industryMed332 Digital disruption in the music industry
Med332 Digital disruption in the music industryRob Jewitt
 
Mac201 2016 7 week 1 lecture1 introtomodule sem1
Mac201 2016 7 week 1 lecture1 introtomodule sem1Mac201 2016 7 week 1 lecture1 introtomodule sem1
Mac201 2016 7 week 1 lecture1 introtomodule sem1Rob Jewitt
 
Med312 Journalistic sources in the networked era: protecting and framing
Med312 Journalistic sources in the networked era: protecting and framingMed312 Journalistic sources in the networked era: protecting and framing
Med312 Journalistic sources in the networked era: protecting and framingRob Jewitt
 
Mac201 television constructing the public
Mac201 television constructing the publicMac201 television constructing the public
Mac201 television constructing the publicRob Jewitt
 
Med332 women and pop
Med332 women and popMed332 women and pop
Med332 women and popRob Jewitt
 
Med332 glamorous indie rock and roll
Med332 glamorous indie rock and rollMed332 glamorous indie rock and roll
Med332 glamorous indie rock and rollRob Jewitt
 
Med211 gamergate: actually, its about ethics in games journalism
Med211 gamergate: actually, its about ethics in games journalismMed211 gamergate: actually, its about ethics in games journalism
Med211 gamergate: actually, its about ethics in games journalismRob Jewitt
 
Mac201 arab spring
Mac201 arab springMac201 arab spring
Mac201 arab springRob Jewitt
 
Mac201 big data
Mac201 big dataMac201 big data
Mac201 big dataRob Jewitt
 

Más de Rob Jewitt (20)

Med332 marketing albums in digital era
Med332 marketing albums in digital era Med332 marketing albums in digital era
Med332 marketing albums in digital era
 
Mac201 post-truth media and fake news
Mac201 post-truth media and fake newsMac201 post-truth media and fake news
Mac201 post-truth media and fake news
 
Mac114 week 12 effecetive social media campaigns
Mac114 week 12 effecetive social media campaignsMac114 week 12 effecetive social media campaigns
Mac114 week 12 effecetive social media campaigns
 
Mac114 week 11 fomo the fear of missing out
Mac114 week 11 fomo the fear of missing outMac114 week 11 fomo the fear of missing out
Mac114 week 11 fomo the fear of missing out
 
Mac201 essay advice 2016 7
Mac201 essay advice 2016 7Mac201 essay advice 2016 7
Mac201 essay advice 2016 7
 
Mac114 social video & personality branding
Mac114 social video & personality brandingMac114 social video & personality branding
Mac114 social video & personality branding
 
Mac114 The business of blogging and blogging for business
Mac114 The business of blogging and blogging for businessMac114 The business of blogging and blogging for business
Mac114 The business of blogging and blogging for business
 
The death of blogging
The death of bloggingThe death of blogging
The death of blogging
 
Mac114 week 2 lecture social media and journalism
Mac114 week 2 lecture social media and journalismMac114 week 2 lecture social media and journalism
Mac114 week 2 lecture social media and journalism
 
Mac201 2016 7 week 1 lecture1 introtomodule sem2
Mac201 2016 7 week 1 lecture1 introtomodule sem2Mac201 2016 7 week 1 lecture1 introtomodule sem2
Mac201 2016 7 week 1 lecture1 introtomodule sem2
 
Mac114 week 1 lecture intro to module
Mac114 week 1 lecture intro to moduleMac114 week 1 lecture intro to module
Mac114 week 1 lecture intro to module
 
Med332 Digital disruption in the music industry
Med332 Digital disruption in the music industryMed332 Digital disruption in the music industry
Med332 Digital disruption in the music industry
 
Mac201 2016 7 week 1 lecture1 introtomodule sem1
Mac201 2016 7 week 1 lecture1 introtomodule sem1Mac201 2016 7 week 1 lecture1 introtomodule sem1
Mac201 2016 7 week 1 lecture1 introtomodule sem1
 
Med312 Journalistic sources in the networked era: protecting and framing
Med312 Journalistic sources in the networked era: protecting and framingMed312 Journalistic sources in the networked era: protecting and framing
Med312 Journalistic sources in the networked era: protecting and framing
 
Mac201 television constructing the public
Mac201 television constructing the publicMac201 television constructing the public
Mac201 television constructing the public
 
Med332 women and pop
Med332 women and popMed332 women and pop
Med332 women and pop
 
Med332 glamorous indie rock and roll
Med332 glamorous indie rock and rollMed332 glamorous indie rock and roll
Med332 glamorous indie rock and roll
 
Med211 gamergate: actually, its about ethics in games journalism
Med211 gamergate: actually, its about ethics in games journalismMed211 gamergate: actually, its about ethics in games journalism
Med211 gamergate: actually, its about ethics in games journalism
 
Mac201 arab spring
Mac201 arab springMac201 arab spring
Mac201 arab spring
 
Mac201 big data
Mac201 big dataMac201 big data
Mac201 big data
 

Último

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 

Último (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 

Mac129 med102 hackers lecture

  • 2. Overview  Origins  ‘Golden Age’  Criminality  Hacktivism today? 2
  • 3.  Jim Thomas (2005) ‘The moral ambiguity of social control in cyberspace: a retro- assessment of the ‘golden age’ of hacking’  Paul Taylor (2005) ‘From hackers to hacktivists: speed bumps on the global superhighway?’  Both in New Media & Society, Vol 7, No 5 3
  • 4.  Hackers Wanted (aka Can You Hack It?) 4 Click
  • 5. From then to today…  Nissenbaum (2004: 196) claims hackers were once seen as:  ‘ardent (if quirky) programmers capable of brilliant, unorthodox feats of machine manipulation’ 5
  • 6. Origins…  1946  Tech Model Railway Club  Massachusetts Institute of Technology (MIT) 6
  • 8.  Robert Bickford (1990) defined a hacker as  ‘any person who derives joy from discovering ways to circumvent limitations.’ 8
  • 9.  Sherry Turkle (1984: 232) defined the hack as being:  ‘the Holy Grail. It is a concept which exists independently of the computer and can best be presented through an example using another technology complex enough to support its own version of hacking and hackers’ 9
  • 10. Phone-Phreaking  John Draper (aka Captain Crunch)  The Woz and The Blue Box 10
  • 12. Trophies  ‘Computer Underground’ (Meyer, 1989)  Darknets?  Hackers began to be perceived as ‘cultural deviants, law-breaking miscreants or renegade sociopaths’ (Thomas, 2005: 603). 12
  • 13. 13
  • 14.  “A subtle modification about p0f [passive OS fingerprinting] which [sic] made me finding documents that I wasn't supposed to find. Some years ago, I had a period when each month I tried to focus on the security of one country. One of those countries was South-Korea where I owned a big ISP [Internet service provider]. After spending some time to figure out how I could leave the DMZ [a ‘neutral’ network zone] and enter in the LAN [local area network], I succeed thanks to a cisco modification (I like default passwords). Once in the LAN and after hiding my activity (userland > kernelland), I installed a slightly modification of p0f.” 14 Phrack editor…
  • 15. Phrack editor…  “The purpose if this version was to scan automatically all the windows box found on the network, mount shared folders and list all files in these folders. Nothing fantastic. But one of the computers scanned contained a lot of files about the other Korea... North Korea. And trust me, there were files that I wasn't supposed to find. I couldn't believe it. I could do the evil guy and try to sell these files for money, but I had (and I still have) a hacker ethic. So I simply added a text file on the desktop to warn the user of the "flaw". After that I left the network and I didn't come back. It was more than 5 years ago so don't ask me the name of the ISP I can't remember” 15
  • 16. Golden Age of Hacking (1980-1990) 16
  • 17. High profile arrests  1982 – Roscoe gang (associates of Kevin Mitnick)  1983 – Inner Circle  1984 – ‘414s’ 17
  • 18. Publications  1984 - 2600: The Hacker Quarterly  1985 - Phrack  1987 - Legion of Doom/H Technical Journal  1988 - P/Hun  1989 - PIRATE  1990 - Computer underground Digest (aka CuD) 18
  • 19. Bulletin Board Systems (BBSs)  Plover-Net  Swap Shop  Private Sector  Demon Roach Underground  Ripco  Metal Shop  The Phoenix Project  Black Ice  The Mentor  Phiber Optik  Dr Ripco  Taran King  Hatchet Molly  Terminus 19
  • 20. IRC  Jarkko Oikarinen  1988  ASCII chatrooms 20
  • 21. Ethical Hacking?  Mantra of ‘knowledge wants to be free’ (Stewart Brand)  Founder of theWELL  Moral imperative to spread info and prevent secrecy (Barlow, 1994)  Cyber-Robin Hood! 21
  • 22. Ethical Hacking? 1. Reject the notion businesses are the only groups entitled to technology 2. Hacking was central to freedom and resistance to corporate oppression 3. High costs of equipment meant hacking and phreaking were essential for spreading computer literacy  (‘Doctor Crash’, 1986) 22
  • 23. A noble pursuit?  It is a full time hobby, taking countless hours per week to learn, experiment and execute the art of penetrating multi-user computers: Why do hackers spend a good portion of their time hacking? Some might say it is scientific curiosity, others that it is for mental stimulation. But the true roots of hacker motives run much deeper than that. In this file I will describe the underlying motives of the aware hackers, make known the connections between Hacking, Phreaking, Carding and Anarchy and make known the ‘techno-revolution’ which is laying seeds in the mind of every hacker . . . If you need a tutorial on how to perform any of the above stated methods [of hacking], please read a [Phrack] file on it. And whatever you do, continue the fight. Whether you know it or not, if you are a hacker, you are a revolutionary. [D]on’t worry, you’re on the right side.  (‘Doctor Crash’, 1986) 23
  • 24. Criminality  Hacking as a ‘moral panic’  Mass media pivotal in changing the meaning of the term ‘hacker’ 24
  • 28. 1990s onwards  First internet worm released in 1988 (!) by Robert Morris  Hacking became synonymous with computer crime  May 2007 – Estonia hacked – Russia?  June 2010 – Stuxnet worm in Iran – Israel? 28
  • 29. Hacktivism  Hackers with a political conscious  Subverting big business or corrupt authorities  Criminal or moral? 29