SlideShare ist ein Scribd-Unternehmen logo
1 von 32
#MED122
1
Overview
 Origins
 ‘Golden Age’
 Criminality
 Hacktivism today?
2
 Jim Thomas (2005) ‘The moral ambiguity of
social control in cyberspace: a retro-
assessment of the ‘golden age’ of hacking’
 Paul Taylor (2005) ‘From hackers to
hacktivists: speed bumps on the global
superhighway?’
 Both in New Media & Society, Vol 7, No 5
3
 Hackers Wanted (aka Can
You Hack It?)
4
Click
From then to today…
 Nissenbaum (2004: 196) claims hackers were
once seen as:
 ‘ardent (if quirky) programmers capable of
brilliant, unorthodox feats of machine
manipulation’
5
Origins…
 1946
 Tech Model Railway
Club
 Massachusetts Institute
of Technology (MIT)
 Hackers Wanted
6
 Robert Bickford (1986) defined a hacker as
 ‘any person who derives joy from discovering
ways to circumvent limitations.’
7
Steve Wozniak clip
8
 Sherry Turkle (1984: 232) defined
the hack as being:
 ‘the Holy Grail. It is a concept which
exists independently of the
computer and can best be presented
through an example using another
technology complex enough to
support its own version of hacking
and hackers’
9
Phone-Phreaking
 John Draper (aka
Captain Crunch)
 The Woz and The Blue Box
10See: http://myoldmac.net/FAQ/TheBlueBox-1.htm
1980s…
 Hierarchies develop
11
Elite hackers
lamerz
Trophies
 ‘Computer Underground’ (Meyer, 1989)
 Darknets?
 Hackers began to be perceived as ‘cultural
deviants, law-breaking miscreants or
renegade sociopaths’ (Thomas, 2005: 603).
12
13
 “A subtle modification about p0f [passive OS
fingerprinting] which [sic] made me finding
documents that I wasn't supposed to find. Some
years ago, I had a period when each month I tried to
focus on the security of one country. One of those
countries was South-Korea where I owned a big ISP
[Internet service provider]. After spending some
time to figure out how I could leave the DMZ [a
‘neutral’ network zone] and enter in the LAN [local
area network], I succeed thanks to a cisco
modification (I like default passwords). Once in the
LAN and after hiding my activity (userland >
kernelland), I installed a slightly modification of p0f.”
14
Phrack
editor…
Phrack
editor…
 “The purpose if this version was to scan
automatically all the windows box found on the
network, mount shared folders and list all files in
these folders. Nothing fantastic. But one of the
computers scanned contained a lot of files about the
other Korea... North Korea. And trust me, there
were files that I wasn't supposed to find. I couldn't
believe it. I could do the evil guy and try to sell these
files for money, but I had (and I still have) a hacker
ethic. So I simply added a text file on the desktop to
warn the user of the "flaw". After that I left the
network and I didn't come back. It was more than 5
years ago so don't ask me the name of the ISP I can't
remember”
15
Golden Age of Hacking
(1980-1990)
16
High profile arrests
 1982 – Roscoe gang (associates
of Kevin Mitnick)
 1983 – Inner Circle
 1984 – ‘414s’
17
Publications
 1984 - 2600: The Hacker Quarterly
 1985 - Phrack
 1987 - Legion of Doom/H Technical Journal
 1988 - P/Hun
 1989 - PIRATE
 1990 - Computer underground Digest (aka
CuD)
18
Bulletin Board Systems
(BBSs)
 Plover-Net
 Swap Shop
 Private Sector
 Demon Roach
Underground
 Ripco
 Metal Shop
 The Phoenix Project
 Black Ice
 The Mentor
 Phiber Optik
 Dr Ripco
 Taran King
 Hatchet Molly
 Terminus
19
IRC
 Jarkko Oikarinen
 1988
 ASCII chatrooms
20
Ethical Hacking?
 Mantra of ‘knowledge wants
to be free’ (Stewart Brand)
 Founder of theWELL
 Moral imperative to spread
info and prevent secrecy
(Barlow, 1994)
 Cyber-Robin Hood!
21
Ethical Hacking?
1. Reject the notion businesses are the only
groups entitled to technology
2. Hacking was central to freedom and
resistance to corporate oppression
3. High costs of equipment meant hacking and
phreaking were essential for spreading
computer literacy
 (‘Doctor Crash’, 1986)
22
A noble pursuit?
 It is a full time hobby, taking countless hours per week to learn,
experiment and execute the art of penetrating multi-user
computers: Why do hackers spend a good portion of their time
hacking? Some might say it is scientific curiosity, others that it is
for mental stimulation. But the true roots of hacker motives run
much deeper than that. In this file I will describe the underlying
motives of the aware hackers, make known the connections
between Hacking, Phreaking, Carding and Anarchy and make
known the ‘techno-revolution’ which is laying seeds in the mind
of every hacker . . . If you need a tutorial on how to perform any
of the above stated methods [of hacking], please read a [Phrack]
file on it. And whatever you do, continue the fight. Whether
you know it or not, if you are a hacker, you are a revolutionary.
[D]on’t worry, you’re on the right side.
 (‘Doctor Crash’, 1986)
23
Criminality
 Hacking as a ‘moral panic’
 Mass media pivotal in changing the meaning
of the term ‘hacker’
24
Media witch-hunts
25
Police raids
26
Craig ‘Knight Lightning’
Neidorf
27
1990s onwards
 First internet worm released in 1988
(!) by Robert Morris
 Hacking became synonymous with
computer crime
 May 2007 – Estonia hacked –
Russia?
 June 2010 – Stuxnet worm in Iran –
Israel?
28
Hacktivism
 Hackers with a political
conscious
 Subverting big business or
corrupt authorities
 Criminal or moral?
29
Different shades
30
- The script kiddie
To consider
 How have the media dealt with or portrayed
recent hacking stories?
 Gary McKinnon?
 George Hotz?
 Anonymous?
 Lulzsec?
 Stuxnet?
31
Questions
1. Have you ever had an electronic account hacked? If so,
we really want to hear what happened and how it felt
2. Have you ever 'hacked' a piece of software or hardware
to make it do something it shouldn't? Why (not)?
3. Have you ever took to the internet to get involved in
any kind of protest movement?
4. To what extent do you think online activism is helpful
for bringing about real word change? Try to come up
with some examples
32

Weitere ähnliche Inhalte

Was ist angesagt?

Deep web
Deep webDeep web
Deep webV C
 
Covering wikileaks
Covering wikileaksCovering wikileaks
Covering wikileaksangrygoat
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Peter Ludlow
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! newsMarioEliseo3
 
Psychology of the Insider Threat
Psychology of the Insider ThreatPsychology of the Insider Threat
Psychology of the Insider ThreatDavid Sweigert
 
Hacker organizations
Hacker organizationsHacker organizations
Hacker organizationsMarioEliseo3
 
FOSS and activism
FOSS and activismFOSS and activism
FOSS and activismsky croeser
 
2.7 workshop-on-intelligence-Steele on future
2.7 workshop-on-intelligence-Steele on future2.7 workshop-on-intelligence-Steele on future
2.7 workshop-on-intelligence-Steele on futureRobert David Steele Vivas
 
Amanda's questions for where did that come from
Amanda's questions for where did that come fromAmanda's questions for where did that come from
Amanda's questions for where did that come from'Atheana' mmmmmhumm
 

Was ist angesagt? (13)

Deep web
Deep webDeep web
Deep web
 
Covering wikileaks
Covering wikileaksCovering wikileaks
Covering wikileaks
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! news
 
Psychology of the Insider Threat
Psychology of the Insider ThreatPsychology of the Insider Threat
Psychology of the Insider Threat
 
Haaretz
HaaretzHaaretz
Haaretz
 
Hacker organizations
Hacker organizationsHacker organizations
Hacker organizations
 
Hacking
HackingHacking
Hacking
 
Army global io 28 slides 3.2 (2011)
Army global io 28 slides 3.2 (2011)Army global io 28 slides 3.2 (2011)
Army global io 28 slides 3.2 (2011)
 
FOSS and activism
FOSS and activismFOSS and activism
FOSS and activism
 
2.7 workshop-on-intelligence-Steele on future
2.7 workshop-on-intelligence-Steele on future2.7 workshop-on-intelligence-Steele on future
2.7 workshop-on-intelligence-Steele on future
 
NSA Mass Spying and the Law
NSA Mass Spying and the LawNSA Mass Spying and the Law
NSA Mass Spying and the Law
 
Amanda's questions for where did that come from
Amanda's questions for where did that come fromAmanda's questions for where did that come from
Amanda's questions for where did that come from
 

Andere mochten auch

Med332 progressive rock lecture
Med332 progressive rock lectureMed332 progressive rock lecture
Med332 progressive rock lectureRob Jewitt
 
Mac281 photos online
Mac281 photos onlineMac281 photos online
Mac281 photos onlineRob Jewitt
 
Whac-a-mole web censorship: pirates, proxies and pointlessness
Whac-a-mole web censorship: pirates, proxies and pointlessnessWhac-a-mole web censorship: pirates, proxies and pointlessness
Whac-a-mole web censorship: pirates, proxies and pointlessnessRob Jewitt
 
Med332 disco and dancing
Med332 disco and dancingMed332 disco and dancing
Med332 disco and dancingRob Jewitt
 
Mac351 from dub to disco electronic music production and creativity
Mac351 from dub to disco electronic music production and creativityMac351 from dub to disco electronic music production and creativity
Mac351 from dub to disco electronic music production and creativityRob Jewitt
 
Med312 spies and whistleblowers lecture
Med312 spies and whistleblowers lectureMed312 spies and whistleblowers lecture
Med312 spies and whistleblowers lectureRob Jewitt
 
Med 332 black british music - edit
Med 332 black british music - editMed 332 black british music - edit
Med 332 black british music - editRob Jewitt
 
Med122 native advertising
Med122 native advertisingMed122 native advertising
Med122 native advertisingRob Jewitt
 
MED332 introduction to the module
MED332 introduction to the moduleMED332 introduction to the module
MED332 introduction to the moduleRob Jewitt
 
Med332 post punk or rip it up and start again
Med332 post punk or rip it up and start againMed332 post punk or rip it up and start again
Med332 post punk or rip it up and start againRob Jewitt
 
Mac201 2016 7 week 1 lecture1 introtomodule sem1
Mac201 2016 7 week 1 lecture1 introtomodule sem1Mac201 2016 7 week 1 lecture1 introtomodule sem1
Mac201 2016 7 week 1 lecture1 introtomodule sem1Rob Jewitt
 
Mac281 big data & journalism lecture 2014
Mac281 big data &  journalism lecture 2014Mac281 big data &  journalism lecture 2014
Mac281 big data & journalism lecture 2014Rob Jewitt
 
Med312 Journalistic sources in the networked era: protecting and framing
Med312 Journalistic sources in the networked era: protecting and framingMed312 Journalistic sources in the networked era: protecting and framing
Med312 Journalistic sources in the networked era: protecting and framingRob Jewitt
 
Med122 2014 week 1 intro to the module
Med122 2014 week 1 intro to the moduleMed122 2014 week 1 intro to the module
Med122 2014 week 1 intro to the moduleRob Jewitt
 
Med332 roots, rocks, reggae the politics of bob marley
Med332 roots, rocks, reggae  the politics of bob marleyMed332 roots, rocks, reggae  the politics of bob marley
Med332 roots, rocks, reggae the politics of bob marleyRob Jewitt
 
Med332 black popular music (1920-1970)
Med332 black popular music (1920-1970)Med332 black popular music (1920-1970)
Med332 black popular music (1920-1970)Rob Jewitt
 
Med332 heavy metal
Med332 heavy metal Med332 heavy metal
Med332 heavy metal Rob Jewitt
 
Mac201 2014 week 1 lecture 1 intro to module
Mac201 2014 week 1 lecture 1 intro to moduleMac201 2014 week 1 lecture 1 intro to module
Mac201 2014 week 1 lecture 1 intro to moduleRob Jewitt
 
Med332 the birth of the rock and roll consumer
Med332 the birth of the rock and roll consumerMed332 the birth of the rock and roll consumer
Med332 the birth of the rock and roll consumerRob Jewitt
 
Med332 afrobeat the politics of Fela Kuti
Med332 afrobeat the politics of Fela KutiMed332 afrobeat the politics of Fela Kuti
Med332 afrobeat the politics of Fela KutiRob Jewitt
 

Andere mochten auch (20)

Med332 progressive rock lecture
Med332 progressive rock lectureMed332 progressive rock lecture
Med332 progressive rock lecture
 
Mac281 photos online
Mac281 photos onlineMac281 photos online
Mac281 photos online
 
Whac-a-mole web censorship: pirates, proxies and pointlessness
Whac-a-mole web censorship: pirates, proxies and pointlessnessWhac-a-mole web censorship: pirates, proxies and pointlessness
Whac-a-mole web censorship: pirates, proxies and pointlessness
 
Med332 disco and dancing
Med332 disco and dancingMed332 disco and dancing
Med332 disco and dancing
 
Mac351 from dub to disco electronic music production and creativity
Mac351 from dub to disco electronic music production and creativityMac351 from dub to disco electronic music production and creativity
Mac351 from dub to disco electronic music production and creativity
 
Med312 spies and whistleblowers lecture
Med312 spies and whistleblowers lectureMed312 spies and whistleblowers lecture
Med312 spies and whistleblowers lecture
 
Med 332 black british music - edit
Med 332 black british music - editMed 332 black british music - edit
Med 332 black british music - edit
 
Med122 native advertising
Med122 native advertisingMed122 native advertising
Med122 native advertising
 
MED332 introduction to the module
MED332 introduction to the moduleMED332 introduction to the module
MED332 introduction to the module
 
Med332 post punk or rip it up and start again
Med332 post punk or rip it up and start againMed332 post punk or rip it up and start again
Med332 post punk or rip it up and start again
 
Mac201 2016 7 week 1 lecture1 introtomodule sem1
Mac201 2016 7 week 1 lecture1 introtomodule sem1Mac201 2016 7 week 1 lecture1 introtomodule sem1
Mac201 2016 7 week 1 lecture1 introtomodule sem1
 
Mac281 big data & journalism lecture 2014
Mac281 big data &  journalism lecture 2014Mac281 big data &  journalism lecture 2014
Mac281 big data & journalism lecture 2014
 
Med312 Journalistic sources in the networked era: protecting and framing
Med312 Journalistic sources in the networked era: protecting and framingMed312 Journalistic sources in the networked era: protecting and framing
Med312 Journalistic sources in the networked era: protecting and framing
 
Med122 2014 week 1 intro to the module
Med122 2014 week 1 intro to the moduleMed122 2014 week 1 intro to the module
Med122 2014 week 1 intro to the module
 
Med332 roots, rocks, reggae the politics of bob marley
Med332 roots, rocks, reggae  the politics of bob marleyMed332 roots, rocks, reggae  the politics of bob marley
Med332 roots, rocks, reggae the politics of bob marley
 
Med332 black popular music (1920-1970)
Med332 black popular music (1920-1970)Med332 black popular music (1920-1970)
Med332 black popular music (1920-1970)
 
Med332 heavy metal
Med332 heavy metal Med332 heavy metal
Med332 heavy metal
 
Mac201 2014 week 1 lecture 1 intro to module
Mac201 2014 week 1 lecture 1 intro to moduleMac201 2014 week 1 lecture 1 intro to module
Mac201 2014 week 1 lecture 1 intro to module
 
Med332 the birth of the rock and roll consumer
Med332 the birth of the rock and roll consumerMed332 the birth of the rock and roll consumer
Med332 the birth of the rock and roll consumer
 
Med332 afrobeat the politics of Fela Kuti
Med332 afrobeat the politics of Fela KutiMed332 afrobeat the politics of Fela Kuti
Med332 afrobeat the politics of Fela Kuti
 

Ähnlich wie Med122 hackers lecture

Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Umang Patel
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxshericehewat
 
The Hacker Perspective
The Hacker PerspectiveThe Hacker Perspective
The Hacker Perspectivejjtay
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...Hackito Ergo Sum
 

Ähnlich wie Med122 hackers lecture (20)

Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
 
Hacking
HackingHacking
Hacking
 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docx
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
The Hacker Perspective
The Hacker PerspectiveThe Hacker Perspective
The Hacker Perspective
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
 

Mehr von Rob Jewitt

Med332 marketing albums in digital era
Med332 marketing albums in digital era Med332 marketing albums in digital era
Med332 marketing albums in digital era Rob Jewitt
 
Mac201 post-truth media and fake news
Mac201 post-truth media and fake newsMac201 post-truth media and fake news
Mac201 post-truth media and fake newsRob Jewitt
 
Mac114 week 12 effecetive social media campaigns
Mac114 week 12 effecetive social media campaignsMac114 week 12 effecetive social media campaigns
Mac114 week 12 effecetive social media campaignsRob Jewitt
 
Mac114 week 11 fomo the fear of missing out
Mac114 week 11 fomo the fear of missing outMac114 week 11 fomo the fear of missing out
Mac114 week 11 fomo the fear of missing outRob Jewitt
 
Mac201 essay advice 2016 7
Mac201 essay advice 2016 7Mac201 essay advice 2016 7
Mac201 essay advice 2016 7Rob Jewitt
 
Mac114 social video & personality branding
Mac114 social video & personality brandingMac114 social video & personality branding
Mac114 social video & personality brandingRob Jewitt
 
Mac114 The business of blogging and blogging for business
Mac114 The business of blogging and blogging for businessMac114 The business of blogging and blogging for business
Mac114 The business of blogging and blogging for businessRob Jewitt
 
The death of blogging
The death of bloggingThe death of blogging
The death of bloggingRob Jewitt
 
Mac114 week 2 lecture social media and journalism
Mac114 week 2 lecture social media and journalismMac114 week 2 lecture social media and journalism
Mac114 week 2 lecture social media and journalismRob Jewitt
 
Mac201 2016 7 week 1 lecture1 introtomodule sem2
Mac201 2016 7 week 1 lecture1 introtomodule sem2Mac201 2016 7 week 1 lecture1 introtomodule sem2
Mac201 2016 7 week 1 lecture1 introtomodule sem2Rob Jewitt
 
Mac114 week 1 lecture intro to module
Mac114 week 1 lecture intro to moduleMac114 week 1 lecture intro to module
Mac114 week 1 lecture intro to moduleRob Jewitt
 
Med332 Digital disruption in the music industry
Med332 Digital disruption in the music industryMed332 Digital disruption in the music industry
Med332 Digital disruption in the music industryRob Jewitt
 
Mac201 television constructing the public
Mac201 television constructing the publicMac201 television constructing the public
Mac201 television constructing the publicRob Jewitt
 
Med332 women and pop
Med332 women and popMed332 women and pop
Med332 women and popRob Jewitt
 
Med332 glamorous indie rock and roll
Med332 glamorous indie rock and rollMed332 glamorous indie rock and roll
Med332 glamorous indie rock and rollRob Jewitt
 
Med211 gamergate: actually, its about ethics in games journalism
Med211 gamergate: actually, its about ethics in games journalismMed211 gamergate: actually, its about ethics in games journalism
Med211 gamergate: actually, its about ethics in games journalismRob Jewitt
 
Mac201 arab spring
Mac201 arab springMac201 arab spring
Mac201 arab springRob Jewitt
 
Mac201 big data
Mac201 big dataMac201 big data
Mac201 big dataRob Jewitt
 
Mac201 impartiality regulation 2015
Mac201 impartiality regulation 2015Mac201 impartiality regulation 2015
Mac201 impartiality regulation 2015Rob Jewitt
 
Mac201 Objectivity, impartiality, balance lecture 2015
Mac201  Objectivity, impartiality, balance lecture 2015Mac201  Objectivity, impartiality, balance lecture 2015
Mac201 Objectivity, impartiality, balance lecture 2015Rob Jewitt
 

Mehr von Rob Jewitt (20)

Med332 marketing albums in digital era
Med332 marketing albums in digital era Med332 marketing albums in digital era
Med332 marketing albums in digital era
 
Mac201 post-truth media and fake news
Mac201 post-truth media and fake newsMac201 post-truth media and fake news
Mac201 post-truth media and fake news
 
Mac114 week 12 effecetive social media campaigns
Mac114 week 12 effecetive social media campaignsMac114 week 12 effecetive social media campaigns
Mac114 week 12 effecetive social media campaigns
 
Mac114 week 11 fomo the fear of missing out
Mac114 week 11 fomo the fear of missing outMac114 week 11 fomo the fear of missing out
Mac114 week 11 fomo the fear of missing out
 
Mac201 essay advice 2016 7
Mac201 essay advice 2016 7Mac201 essay advice 2016 7
Mac201 essay advice 2016 7
 
Mac114 social video & personality branding
Mac114 social video & personality brandingMac114 social video & personality branding
Mac114 social video & personality branding
 
Mac114 The business of blogging and blogging for business
Mac114 The business of blogging and blogging for businessMac114 The business of blogging and blogging for business
Mac114 The business of blogging and blogging for business
 
The death of blogging
The death of bloggingThe death of blogging
The death of blogging
 
Mac114 week 2 lecture social media and journalism
Mac114 week 2 lecture social media and journalismMac114 week 2 lecture social media and journalism
Mac114 week 2 lecture social media and journalism
 
Mac201 2016 7 week 1 lecture1 introtomodule sem2
Mac201 2016 7 week 1 lecture1 introtomodule sem2Mac201 2016 7 week 1 lecture1 introtomodule sem2
Mac201 2016 7 week 1 lecture1 introtomodule sem2
 
Mac114 week 1 lecture intro to module
Mac114 week 1 lecture intro to moduleMac114 week 1 lecture intro to module
Mac114 week 1 lecture intro to module
 
Med332 Digital disruption in the music industry
Med332 Digital disruption in the music industryMed332 Digital disruption in the music industry
Med332 Digital disruption in the music industry
 
Mac201 television constructing the public
Mac201 television constructing the publicMac201 television constructing the public
Mac201 television constructing the public
 
Med332 women and pop
Med332 women and popMed332 women and pop
Med332 women and pop
 
Med332 glamorous indie rock and roll
Med332 glamorous indie rock and rollMed332 glamorous indie rock and roll
Med332 glamorous indie rock and roll
 
Med211 gamergate: actually, its about ethics in games journalism
Med211 gamergate: actually, its about ethics in games journalismMed211 gamergate: actually, its about ethics in games journalism
Med211 gamergate: actually, its about ethics in games journalism
 
Mac201 arab spring
Mac201 arab springMac201 arab spring
Mac201 arab spring
 
Mac201 big data
Mac201 big dataMac201 big data
Mac201 big data
 
Mac201 impartiality regulation 2015
Mac201 impartiality regulation 2015Mac201 impartiality regulation 2015
Mac201 impartiality regulation 2015
 
Mac201 Objectivity, impartiality, balance lecture 2015
Mac201  Objectivity, impartiality, balance lecture 2015Mac201  Objectivity, impartiality, balance lecture 2015
Mac201 Objectivity, impartiality, balance lecture 2015
 

Kürzlich hochgeladen

CHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxCHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxAneriPatwari
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptxAneriPatwari
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxAnupam32727
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 

Kürzlich hochgeladen (20)

CHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxCHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptx
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 

Med122 hackers lecture

  • 2. Overview  Origins  ‘Golden Age’  Criminality  Hacktivism today? 2
  • 3.  Jim Thomas (2005) ‘The moral ambiguity of social control in cyberspace: a retro- assessment of the ‘golden age’ of hacking’  Paul Taylor (2005) ‘From hackers to hacktivists: speed bumps on the global superhighway?’  Both in New Media & Society, Vol 7, No 5 3
  • 4.  Hackers Wanted (aka Can You Hack It?) 4 Click
  • 5. From then to today…  Nissenbaum (2004: 196) claims hackers were once seen as:  ‘ardent (if quirky) programmers capable of brilliant, unorthodox feats of machine manipulation’ 5
  • 6. Origins…  1946  Tech Model Railway Club  Massachusetts Institute of Technology (MIT)  Hackers Wanted 6
  • 7.  Robert Bickford (1986) defined a hacker as  ‘any person who derives joy from discovering ways to circumvent limitations.’ 7
  • 9.  Sherry Turkle (1984: 232) defined the hack as being:  ‘the Holy Grail. It is a concept which exists independently of the computer and can best be presented through an example using another technology complex enough to support its own version of hacking and hackers’ 9
  • 10. Phone-Phreaking  John Draper (aka Captain Crunch)  The Woz and The Blue Box 10See: http://myoldmac.net/FAQ/TheBlueBox-1.htm
  • 12. Trophies  ‘Computer Underground’ (Meyer, 1989)  Darknets?  Hackers began to be perceived as ‘cultural deviants, law-breaking miscreants or renegade sociopaths’ (Thomas, 2005: 603). 12
  • 13. 13
  • 14.  “A subtle modification about p0f [passive OS fingerprinting] which [sic] made me finding documents that I wasn't supposed to find. Some years ago, I had a period when each month I tried to focus on the security of one country. One of those countries was South-Korea where I owned a big ISP [Internet service provider]. After spending some time to figure out how I could leave the DMZ [a ‘neutral’ network zone] and enter in the LAN [local area network], I succeed thanks to a cisco modification (I like default passwords). Once in the LAN and after hiding my activity (userland > kernelland), I installed a slightly modification of p0f.” 14 Phrack editor…
  • 15. Phrack editor…  “The purpose if this version was to scan automatically all the windows box found on the network, mount shared folders and list all files in these folders. Nothing fantastic. But one of the computers scanned contained a lot of files about the other Korea... North Korea. And trust me, there were files that I wasn't supposed to find. I couldn't believe it. I could do the evil guy and try to sell these files for money, but I had (and I still have) a hacker ethic. So I simply added a text file on the desktop to warn the user of the "flaw". After that I left the network and I didn't come back. It was more than 5 years ago so don't ask me the name of the ISP I can't remember” 15
  • 16. Golden Age of Hacking (1980-1990) 16
  • 17. High profile arrests  1982 – Roscoe gang (associates of Kevin Mitnick)  1983 – Inner Circle  1984 – ‘414s’ 17
  • 18. Publications  1984 - 2600: The Hacker Quarterly  1985 - Phrack  1987 - Legion of Doom/H Technical Journal  1988 - P/Hun  1989 - PIRATE  1990 - Computer underground Digest (aka CuD) 18
  • 19. Bulletin Board Systems (BBSs)  Plover-Net  Swap Shop  Private Sector  Demon Roach Underground  Ripco  Metal Shop  The Phoenix Project  Black Ice  The Mentor  Phiber Optik  Dr Ripco  Taran King  Hatchet Molly  Terminus 19
  • 20. IRC  Jarkko Oikarinen  1988  ASCII chatrooms 20
  • 21. Ethical Hacking?  Mantra of ‘knowledge wants to be free’ (Stewart Brand)  Founder of theWELL  Moral imperative to spread info and prevent secrecy (Barlow, 1994)  Cyber-Robin Hood! 21
  • 22. Ethical Hacking? 1. Reject the notion businesses are the only groups entitled to technology 2. Hacking was central to freedom and resistance to corporate oppression 3. High costs of equipment meant hacking and phreaking were essential for spreading computer literacy  (‘Doctor Crash’, 1986) 22
  • 23. A noble pursuit?  It is a full time hobby, taking countless hours per week to learn, experiment and execute the art of penetrating multi-user computers: Why do hackers spend a good portion of their time hacking? Some might say it is scientific curiosity, others that it is for mental stimulation. But the true roots of hacker motives run much deeper than that. In this file I will describe the underlying motives of the aware hackers, make known the connections between Hacking, Phreaking, Carding and Anarchy and make known the ‘techno-revolution’ which is laying seeds in the mind of every hacker . . . If you need a tutorial on how to perform any of the above stated methods [of hacking], please read a [Phrack] file on it. And whatever you do, continue the fight. Whether you know it or not, if you are a hacker, you are a revolutionary. [D]on’t worry, you’re on the right side.  (‘Doctor Crash’, 1986) 23
  • 24. Criminality  Hacking as a ‘moral panic’  Mass media pivotal in changing the meaning of the term ‘hacker’ 24
  • 28. 1990s onwards  First internet worm released in 1988 (!) by Robert Morris  Hacking became synonymous with computer crime  May 2007 – Estonia hacked – Russia?  June 2010 – Stuxnet worm in Iran – Israel? 28
  • 29. Hacktivism  Hackers with a political conscious  Subverting big business or corrupt authorities  Criminal or moral? 29
  • 30. Different shades 30 - The script kiddie
  • 31. To consider  How have the media dealt with or portrayed recent hacking stories?  Gary McKinnon?  George Hotz?  Anonymous?  Lulzsec?  Stuxnet? 31
  • 32. Questions 1. Have you ever had an electronic account hacked? If so, we really want to hear what happened and how it felt 2. Have you ever 'hacked' a piece of software or hardware to make it do something it shouldn't? Why (not)? 3. Have you ever took to the internet to get involved in any kind of protest movement? 4. To what extent do you think online activism is helpful for bringing about real word change? Try to come up with some examples 32

Hinweis der Redaktion

  1. http://www.youtube.com/watch?v=vSBzKEdSPMY&list=PLB9553BBB47542B77&index=7
  2. http://www.youtube.com/watch?v=vSBzKEdSPMY&list=PLB9553BBB47542B77&index=8
  3. http://www.youtube.com/watch?v=0PtmVRDE2NM&list=PLB9553BBB47542B77&index=9
  4. http://www.youtube.com/watch?v=shQR85Xyau0&list=PLB9553BBB47542B77&index=12