50 Shades of Hacking: How IT and Cybersecurity Industry Actors Perceive Good, Bad, and Former Hackers
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
BUGS in the SYSTEM a Primer on the Software Vulnerability Ecosystem and Its Policy Implications
ANDI WILSON, ROSS SCHULMAN, KEVIN BANKSTON, AND TREY HERR BUGS IN THE SYSTEM A Primer on the Software Vulnerability Ecosystem and its Policy Implications JULY 2016 About the Authors About New America New America is committed to renewing American politics, Andi Wilson is a policy analyst at New America’s Open prosperity, and purpose in the Digital Age. We generate big Technology Institute, where she researches and writes ideas, bridge the gap between technology and policy, and about the relationship between technology and policy. curate broad public conversation. We combine the best of With a specific focus on cybersecurity, Andi is currently a policy research institute, technology laboratory, public working on issues including encryption, vulnerabilities forum, media platform, and a venture capital fund for equities, surveillance, and internet freedom. ideas. We are a distinctive community of thinkers, writers, researchers, technologists, and community activists who Ross Schulman is a co-director of the Cybersecurity believe deeply in the possibility of American renewal. Initiative and senior policy counsel at New America’s Open Find out more at newamerica.org/our-story. Technology Institute, where he focuses on cybersecurity, encryption, surveillance, and Internet governance. Prior to joining OTI, Ross worked for Google in Mountain About the Cybersecurity Initiative View, California. Ross has also worked at the Computer The Internet has connected us. Yet the policies and and Communications Industry Association, the Center debates that surround the security of our networks are for Democracy and Technology, and on Capitol Hill for too often disconnected, disjointed, and stuck in an Senators Wyden and Feingold. unsuccessful status quo. -
BUGS in the SYSTEM a Primer on the Software Vulnerability Ecosystem and Its Policy Implications
ANDI WILSON, ROSS SCHULMAN, KEVIN BANKSTON, AND TREY HERR BUGS IN THE SYSTEM A Primer on the Software Vulnerability Ecosystem and its Policy Implications JULY 2016 About the Authors About New America New America is committed to renewing American politics, Andi Wilson is a policy analyst at New America’s Open prosperity, and purpose in the Digital Age. We generate big Technology Institute, where she researches and writes ideas, bridge the gap between technology and policy, and about the relationship between technology and policy. curate broad public conversation. We combine the best of With a specific focus on cybersecurity, Andi is currently a policy research institute, technology laboratory, public working on issues including encryption, vulnerabilities forum, media platform, and a venture capital fund for equities, surveillance, and internet freedom. ideas. We are a distinctive community of thinkers, writers, researchers, technologists, and community activists who Ross Schulman is a co-director of the Cybersecurity believe deeply in the possibility of American renewal. Initiative and senior policy counsel at New America’s Open Find out more at newamerica.org/our-story. Technology Institute, where he focuses on cybersecurity, encryption, surveillance, and Internet governance. Prior to joining OTI, Ross worked for Google in Mountain About the Cybersecurity Initiative View, California. Ross has also worked at the Computer The Internet has connected us. Yet the policies and and Communications Industry Association, the Center debates that surround the security of our networks are for Democracy and Technology, and on Capitol Hill for too often disconnected, disjointed, and stuck in an Senators Wyden and Feingold. unsuccessful status quo. -
Software Assurance
Information Assurance State-of-the-Art Report Technology Analysis Center (IATAC) SOAR (SOAR) July 31, 2007 Data and Analysis Center for Software (DACS) Joint endeavor by IATAC with DACS Software Security Assurance Distribution Statement A E X C E E C L I L V E R N E Approved for public release; C S E I N N I IO DoD Data & Analysis Center for Software NF OR MAT distribution is unlimited. Information Assurance Technology Analysis Center (IATAC) Data and Analysis Center for Software (DACS) Joint endeavor by IATAC with DACS Software Security Assurance State-of-the-Art Report (SOAR) July 31, 2007 IATAC Authors: Karen Mercedes Goertzel Theodore Winograd Holly Lynne McKinley Lyndon Oh Michael Colon DACS Authors: Thomas McGibbon Elaine Fedchak Robert Vienneau Coordinating Editor: Karen Mercedes Goertzel Copy Editors: Margo Goldman Linda Billard Carolyn Quinn Creative Directors: Christina P. McNemar K. Ahnie Jenkins Art Director, Cover, and Book Design: Don Rowe Production: Brad Whitford Illustrations: Dustin Hurt Brad Whitford About the Authors Karen Mercedes Goertzel Information Assurance Technology Analysis Center (IATAC) Karen Mercedes Goertzel is a subject matter expert in software security assurance and information assurance, particularly multilevel secure systems and cross-domain information sharing. She supports the Department of Homeland Security Software Assurance Program and the National Security Agency’s Center for Assured Software, and was lead technologist for 3 years on the Defense Information Systems Agency (DISA) Application Security Program. Ms. Goertzel is currently lead author of a report on the state-of-the-art in software security assurance, and has also led in the creation of state-of-the-art reports for the Department of Defense (DoD) on information assurance and computer network defense technologies and research. -
Coleman-Coding-Freedom.Pdf
Coding Freedom !" Coding Freedom THE ETHICS AND AESTHETICS OF HACKING !" E. GABRIELLA COLEMAN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright © 2013 by Princeton University Press Creative Commons Attribution- NonCommercial- NoDerivs CC BY- NC- ND Requests for permission to modify material from this work should be sent to Permissions, Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TW press.princeton.edu All Rights Reserved At the time of writing of this book, the references to Internet Web sites (URLs) were accurate. Neither the author nor Princeton University Press is responsible for URLs that may have expired or changed since the manuscript was prepared. Library of Congress Cataloging-in-Publication Data Coleman, E. Gabriella, 1973– Coding freedom : the ethics and aesthetics of hacking / E. Gabriella Coleman. p. cm. Includes bibliographical references and index. ISBN 978-0-691-14460-3 (hbk. : alk. paper)—ISBN 978-0-691-14461-0 (pbk. : alk. paper) 1. Computer hackers. 2. Computer programmers. 3. Computer programming—Moral and ethical aspects. 4. Computer programming—Social aspects. 5. Intellectual freedom. I. Title. HD8039.D37C65 2012 174’.90051--dc23 2012031422 British Library Cataloging- in- Publication Data is available This book has been composed in Sabon Printed on acid- free paper. ∞ Printed in the United States of America 1 3 5 7 9 10 8 6 4 2 This book is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE !" We must be free not because we claim freedom, but because we practice it. -
Firebrand Waves of Digital Activism 1994-2014: the Rise and Spread of Hacktivism and Cyberconflict (Prepublication Copy) Athina Karatzogianni
University of Leicester From the SelectedWorks of Athina Karatzogianni Fall September 1, 2015 Firebrand Waves of Digital Activism 1994-2014: The Rise and Spread of Hacktivism and Cyberconflict (Prepublication Copy) Athina Karatzogianni This work is licensed under a Creative Commons CC_BY-NC-SA International License. Available at: https://works.bepress.com/athina_karatzogianni/25/ [Please note: This document was the original manuscript submitted to Palgrave Macmillan in January 2015 and is shared here openly. The published book is copyedited, has alterations, amendments and corrections, and has undergone a standard production process, therefore is considerably different to this bepress document. The book Karatzogianni, A. (2015) Firebrand Waves of Digital Activism 1994-2014: The Rise and Spread of Hacktivism and Cyberconflict, Basingstoke: Palgrave Macmillan ISBN 978-1-137-31793-3 can be bought online on ebook or hard/paperback here: http://www.palgrave.com/la/book/9780230242463. If you choose to reference this document and not the published book, please reference appropriately by using the bepress link]. Firebrand Waves of Digital Activism 1994-2014: The Rise and Spread of Hacktivism and Cyberconflict Athina Karatzogianni Associate Perofessor Media and Communication University of Leicester E: [email protected] or [email protected] Preface and Acknowledgements Introduction: Four Phases of Digital Activism and Cyberconflict Chapter One: Origins and Rise of Digital Activism (1994-2007) 1.1 First Phase (1994-2001): The Origins of Digital Activism 1. 2 Second Phase (2001-2007): The Rise of Digital Activism Chapter Two: The Third Phase (2007-2010): Spread of Digital Activism 2.1 Russia-related Cyberconflicts 2.2. -
Dissecting the 'Hacker Manifesto'
Dissecting the ‘Hacker Manifesto’ S.M.Furnell, P.Dowland and P.W.Sanders Network Research Group School of Electronic, Communication and Electrical Engineering University of Plymouth Plymouth United Kingdom e-mail : [email protected] Abstract Twelve years ago, a text was written within the hacking community which is widely referred to as the ‘Hacker Manifesto’. This text, and the opinions that it offers, have since been widely embraced by the hacker community and the document is referenced from numerous sites on the Internet. This paper sets out to examine the content of the Manifesto and considers the validity of many of the messages that it imparts. The Manifesto is considered to present an undoubtedly pro-hacker message, without acknowledging other perspectives or the wider implications of the activities that it is advocating. The paper explores some of these issues, examining both the consequences of the Manifesto’s dissemination and ways in which security professionals and society at large should respond. It is concluded that whilst the Manifesto obviously cannot bear the sole responsibility for promoting and encouraging hacker activity, it at best sends out an incomplete message that should be balanced with appropriate counter-argument. Keywords : Hackers, Computer Abuse, Information Society. Introduction The definition of the term ‘hacker’ has changed considerably over the last 30 years. In the 1960s, hackers were the dedicated software and hardware gurus, and the term largely referred to persons capable of implementing elegant / technically advanced solutions to technologically complex problems. In the 1990s, however, the moniker implies something rather different and is commonly used to refer to persons dedicated to entering systems by identifying and exploiting security weaknesses. -
Security Versus Security: Balancing Encryption, Privacy, and National Secuirty
SECURITY VERSUS SECURITY: BALANCING ENCRYPTION, PRIVACY, AND NATIONAL SECUIRTY Jackson Stein (TC 660H or TC 359T) Plan II Honors Program The University of Texas at Austin 05/04/2017 __________________________________________ Robert Chesney Director of Robert Strauss Center Supervising Professor __________________________________________ Mark Sainsbury Department of Philosophy Second Reader ABSTRACT Author: Jackson Stein Title: Security vs. Security: Balancing Encryption, Data Privacy, and Security Supervising Professors: Robert Chesney, Mark Sainsbury This paper analyzes the current debate over encryption policy. Through careful evaluation of possible solutions to ‘going dark’ as well has weighting the costs and benefits of each solution, we found exceptional access to information more harmful than helpful. Today, there seems to be no singular leading answer to the going dark problem. Exceptional access to data and communications is a simple solution for a simple problem, however going dark is very complex, and requires a multifaceted and refined solutions. Widespread encryption forces those listening—whether it is the NSA, FBI, foreign governments, criminals or terrorist—to be much more targeted. As for the going dark metaphor, it seems as though we are not entirely “going dark”, and yet we are not completely bright either. There are dark and bright spots coming and going across the technological landscape battling in a perpetual technological arms race. The findings of this paper, ultimately determine there to be no policy that doesn’t come without some cost. That said, there are a number of ways in which law enforcement can track criminals and terrorist without weakening encryption, which we determine to be the best direction in any win lose situation. -
Supreme Court of the United States
No. 19-783 IN THE Supreme Court of the United States NATHAN VAN BUREN, Petitioner, v. UNITED STATES, Respondent. ON WRIT OF CERTIORARI TO THE UNITED STATES CouRT OF APPEALS FOR THE ELEVENTH CIRcuIT BRIEF OF AMICI CURIAE COMPUTER SECURITY RESEARCHERS, ELECTRONIC FRONTIER FOUNDATION, CENTER FOR DEMOCRACY & TECHNOLOGY, BUGCROWD, RAPID7, SCYTHE, AND TENABLE IN SUPPORT OF PETITIONER ANDREW CROCKER Counsel of Record NAOMI GILENS ELECTRONic FRONTIER FOUNDATION 815 Eddy Street San Francisco, California 94109 (415) 436-9333 [email protected] Counsel for Amici Curiae 296514 A (800) 274-3321 • (800) 359-6859 i TABLE OF CONTENTS Page TABLE OF CONTENTS..........................i TABLE OF CITED AUTHORITIES ..............iii INTEREST OF AMICI CURIAE ..................1 SUMMARY OF ARGUMENT .....................4 ARGUMENT....................................5 I. The Work of the Computer Security Research Community Is Vital to the Public Interest...................................5 A. Computer Security Benefits from the Involvement of Independent Researchers ...........................5 B. Security Researchers Have Made Important Contributions to the Public Interest by Identifying Security Threats in Essential Infrastructure, Voting Systems, Medical Devices, Vehicle Software, and More ...................10 II. The Broad Interpretation of the CFAA Adopted by the Eleventh Circuit Chills Valuable Security Research. ................16 ii Table of Contents Page A. The Eleventh Circuit’s Interpretation of the CFAA Would Extend to Violations of Website Terms of Service and Other Written Restrictions on Computer Use. .................................16 B. Standard Computer Security Research Methods Can Violate Written Access Restrictions...........................18 C. The Broad Interpretation of the CFAA Discourages Researchers from Pursuing and Disclosing Security Flaws ...............................22 D. Voluntary Disclosure Guidelines and Industry-Sponsored Bug Bounty Programs A re Not Sufficient to Mitigate the Chill . -
An Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St
University of Missouri, St. Louis IRL @ UMSL Dissertations UMSL Graduate Works 11-22-2005 Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St. Louis, [email protected] Follow this and additional works at: https://irl.umsl.edu/dissertation Part of the Criminology and Criminal Justice Commons Recommended Citation Holt, Thomas Jeffrey, "Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers" (2005). Dissertations. 616. https://irl.umsl.edu/dissertation/616 This Dissertation is brought to you for free and open access by the UMSL Graduate Works at IRL @ UMSL. It has been accepted for inclusion in Dissertations by an authorized administrator of IRL @ UMSL. For more information, please contact [email protected]. Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers by THOMAS J. HOLT M.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2003 B.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2000 A DISSERTATION Submitted to the Graduate School of the UNIVERSITY OF MISSOURI- ST. LOUIS In partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSOPHY in Criminology and Criminal Justice August, 2005 Advisory Committee Jody Miller, Ph. D. Chairperson Scott H. Decker, Ph. D. G. David Curry, Ph. D. Vicki Sauter, Ph. D. Copyright 2005 by Thomas Jeffrey Holt All Rights Reserved Holt, Thomas, 2005, UMSL, p. ii ABSTRACT This dissertation examines both the subculture and social organization practices of computer hackers. The concept of normative orders (Herbert, 1998: 347) is used to explore hacker subculture in different contexts. -
Forecasting the Future
VIRTUAL EVEN T FORECASTING #predict2019 THE FUTURE Tuesday, December 18, 2018 10:00 AM ET - 4 PM E T AGENDA All sessions are scheduled in Eastern Standard Time (EST) 10:00 - 10:30am - Keynote by Micro Hering: Looking towards 2019 – will we have AIOps take over DevOps 10:30 - 11:00am - Keynote by Chenxi Wang: Cloud Transformation Drives Security Roadmap 11:00 - 11:30pm - Panel: Making DevOps More Ops-friendly 11:30 - 12:00pm - How to Manage Open Source 11:30 - 12:00pm - Panel: The Business Risk within the DevOps Delivery Model Value of Value Stream Mapping 12:00 - 12:30pm - Panel: Ubiquitous Open 12:00 - 12:30pm - The Future of DevOps; Source Makes for Security Challenges Predictions from NS1 12:30 - 1:00pm - Charting the Course to AIOps 12:30 - 1:00pm - Seeing DevOps 2020 1:00 - 1:30pm - Visit the Exhibitors 1:30 - 2:00pm - Panel: Cloud Security in 2019 2:00 - 2:30pm - Panel: Continuous 2:00 - 2:30pm - Accelerate software delivery: Testing Equals Quality How to make 2019 your cloud-native year 2:30 - 3:00pm - Keynote by Rich Mogull: DevSecOps Predicts 2019 3:00 - 3:30pm - Keynote by John Willis 10am - 10:30am Keynote: Looking towards 2019 – will we have AIOps take over DevOps - Mirco Hering, Principal Director – APAC DevOps and Agile, Accenture 2018 has seen a huge uptake in DevOps across Enterprises. There were lots of good news but we also learned new failure patterns. In this keynote Mirco will look back at 2018 and what he learned over the year and then look to 2019 and what the new year will bring for DevOps. -
Dissecting the ``Hacker Manifesto''
Dissecting the ``Hacker Manifesto'' S.M. Furnell Research Co-ordinator, Network Research Group, School of Electronic, Communication and Electrical Engineering, University of Plymouth, Plymouth, UK P.S. Dowland Research Student, Network Research Group, School of Electronic, Communication and Electrical Engineering, University of Plymouth, Plymouth, UK P.W. Sanders Visiting Professor, Network Research Group, School of Electronic, Communication and Electrical Engineering, University of Plymouth, Plymouth, UK Keywords as the ``Hacker Manifesto''. This was Computer security, Hacking, Introduction written in 1986 by a hacker who operated Information society The definition of the term ``hacker'' has under the pseudonym of ``The Mentor'' Abstract changed considerably over the last 30 years. and who was a member of the notorious Twelve years ago, a text was In the 1960s, hackers were the dedicated hacking group the Legion of Doom (Sterling, written within the hacking com- software and hardware gurus, and the term 1992). The full text is reproduced in munity which is widely referred to largely referred to persons capable of imple- Figure 1. as the ``Hacker Manifesto''. This text, and the opinions that it menting elegant/technically advanced solu- The Manifesto is still widely accessible, offers, have since been widely tions to technologically complex problems. In some 12 years after it was originally written. embraced by the hacker commu- the 1990s, however, the name implies some- Ordinarily, this could be considered no great nity and the document is refer- thing rather different and is commonly used feat for a piece of literature. However, it is enced from numerous sites on the Internet. This paper sets out to to refer to people dedicated to entering possibly more significant in the context of examine the content of the Mani- systems by identifying and exploiting the technology field, where the pace of festo and considers the validity of security weaknesses. -
Building Hacker Collective Identity One Text Phile at a Time: Reading Phrack
Media History Monographs 11:2 (2008-2009) ISSN 1940-8862 Building Hacker Collective Identity One Text Phile at a Time: Reading Phrack Brett Lunceford University of South Alabama Research concerning computer hackers generally focuses on how to stop them; far less attention is given to the texts they create. Phrack, an online hacker journal that has run almost continuously since 1985, is an important touchstone in hacker literature, widely read by both hackers and telephone and network security professionals. But beyond its instantiation as a compendium of illicit technical knowledge, Phrack was, above all, a rhetorical publication. The files in each issue of Phrack created a shared rhetorical vision concerning the place of the hacker underground within society and in relation to law enforcement officials, as well as what it means to be a hacker. This essay examines two important events in the evolution of the hacker movement through the lens of Phrack—Operation Sundevil and the arrest of Kevin Mitnick. How these events were framed in Phrack both shaped and reflected emerging shifts in hacker collective identity. ©2009 Brett Lunceford Media History Monographs 11:2 Lunceford: Reading Phrack Building Hacker Collective Identity One Text Phile at a Time: Reading Phrack Stephen Segaller describes the formation of Managers that Helps Protect Corporate Data the Internet as “one of the twentieth century’s from Assaults by the Hackers” and “The most productive accidents,” explaining that the World of Data Confronts the Joy of Hacking,” “seeds of the Internet were planted by the U.S. which begins, “The recent electronic government in the wake of nationwide concern escapades of a group of Milwaukee youths over the Soviet launch of Sputnik.”44 Hackers have brought national attention to the growing were an integral part of the construction of this problem of computer security,”47 demonstrate network.