Download presentation
Presentation is loading. Please wait.
Published byDennis Owen Modified over 9 years ago
1
Hacking and Hacktivism Elizabeth Guerry John Medzerian Patrick Thomas
2
What is Hacking? Marriam-Webster gives 2 definitions: ▫to write computer programs for enjoyment ▫to gain access to a computer illegally The definition has changed through the years. Originally was synonymous with tinkering. Due to cyber-crimes, hacking garnered a negative connotation. “computer criminals”
3
“This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals. We explore... and you call us criminals. We seek after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals.” The Mentor, “The Conscience of a Hacker”, January 8, 1986
4
Three Types of Hackers ▫Various HacksVarious Hacks ▫Computer Security hackers Focused on bypassing or infiltrating security systems Blacks Hats Grey Hats White Hats Common Techniques: Phishing Password Cracking Viruses/Worms/Trojan Social Engineering Keylogging Examples Adam Botbyl – Conspiracy to Steal CC# from Lowes Samy Kamkar – “Samy is my hero” Myspace worm Hacktivists DEFCON 18 DEFCON 18
5
Three Types of Hackers ▫Programmers Playful cleverness Ideology grew out of academia MIT Influence of the Internet Non-malicious “Open source” Steven Levy and the Hacker Ethic Sharing Openness Decentralization Free Access to Computers World Improvement Refer to computer security hackers as “crackers”
6
Three Types of Hackers ▫Hobbyists Also playful cleverness Improving or changing technology Hacker art Lile Elam Barnsley’s fern
7
Hacktivism Hack+Activism Reasons ▫Protest ▫Promote political ends Common Techniques ▫DDOS ▫Sit-in ▫Defacement ▫Doxxing
8
Notable Hacktivist Groups Electronic Disturbance Theater ▫Founded in late ‘90s Cyber activists and performance artists Non-violence ▫FloodNet Zapatistas ▫EDT 2.0 Transborder Immigrant Tool
9
Notable Hacktivist Groups Anonymous ▫Anti-censorship, freedom of information, transparency in government ▫Guy Fawkes masks ▫The Low Orbit Ion Cannon ▫Megaupload ▫Playstation Network ▫Mexican Drug Cartel ▫Church of ScientologyChurch of Scientology
10
What next? Where will hacking and hacktivism go from here? What future techniques will be used? What future technologies will be hacked and for what purpose? What are the potential benefits and/or consequences of hacking?
11
Sources The Mentor. "The Conscience of a Hacker." phrack.org. 8 Jan. 1986. Web. 10 Feb. 2013.. Löwgren, Jonas. "Hacker culture(s): Origins." mah.se. 23 Feb. 2000. Web. 10 Feb. 2013.. "Beware: Hackers at play." Newsweek 5 Sept. 1983: 42-46, 48. Print. Raymond, Eric S. "Jargon File: Cracker." Online posting. n.d. Web. 10 Feb. 2013.. "Words to Avoid (or Use with Care) Because They Are Loaded or Confusing." Online posting. GNU. gnu.org. n.d. Web. 10 Feb. 2013.. Solfrank, Cornelia. "Hacking Seductions as Art." thing.net. 25 July 2000. Web. 10 Feb. 2013..
12
Sources (cont’d) Stallman, Richard. "On Hacking." Stallman.org. 2002. Web. 10 Feb. 2013.. Chaney, Allison. "Hack Value." Princeton.edu. n.d. Web. 10 Feb. 2013.. Garrett, Marc. "Revisiting the Curious World of Art & Hacktivism." Furtherfield.org. 3 Feb. 2012. Web. 10 Feb. 2013.. Ludlow, Peter. "What is a 'Hacktivist'?" New York Times Opinionator. n.p., 13 Jan. 2013. Web. 10 Feb. 2013.. Bird, Lawrence. "Global Positioning: An Interview with Ricardo Domingues."Furtherfield.org. n.p., 15 Oct. 2011. Web. 10 Feb. 2013..
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.