Hacking Culture Hacking Culture

Total Page:16

File Type:pdf, Size:1020Kb

Hacking Culture Hacking Culture Hacking Culture AK 2100 Hacking Culture • Hacking has never been just a technical activity • Hacking is more about the imagination, the creative uses of technology • Should see hacking as a complex subculture • Media tends to focus on the manner in which computers are hacked Hacking & the Media Hacking & the Media Anxiety Basic cultural anxiety about both the complexity of technology and the contemporary culture’s reliance upon that technology The Question of Hacking • Technology should be considered a cultural phenomenon. Tells us something about human relationships • To pose questions with respect to technology is to pose cultural and relational questions • What is hacking? To answer this we must look at the cultural and relational forces that define the context in which hacking takes place Origins • Originally hackers were benign “computer geeks” • Hacker Ethic (Levy) – Access to computers should be unlimited and total – All information should be free – Mistrust authority, promote decentralization – Hackers should be judged by their hacking – You can create art and beauty on a computer – Computers can change your life for the better See also http://www.fiu.edu/~mizrachs/hackethic.html Ethics The "Hacker Ethic" Over many years at MIT, a "code of ethics" has evolved. This informal code is a self-enforced attitude that ensures that hacks will continue to be amusing and well-received both within and without MIT. According to the "hacker ethic," a hack must: * be safe * not damage anything * not damage anyone, either physically, mentally or emotionally * be funny, at least to most of the people who experience it There is no way of enforcing this code, but anything that directly contradicts it will probably not be considered a "hack" by most of the MIT community. Hackers 1960s • A desire to create beauty with computers, to liberate information, to decentralize access to communication • To the 1960s hacker, hacking meant rendering technology benign, making it less threatening and imposing A Genealogy of Secrecy Hackers negotiate the concept of secrecy that has evolved since WWII The Enigma Machine A Genealogy of Secrecy • In the 60s secrecy meant the freedom to share code in the computer lab. A spirit of cooperation where everyone had the right to tinker with the work of others in order to improve it • Roots in leftist political agenda that grew out of the 60s counterculture Hacking the Industry • Understanding the hacker requires some understanding of where, how and why the PC cam into being • The Altair: the first PC. Cost 400 dollars and had to be built • Sharing of information became one of the central tenets of the hacker ethic • With commodification came competition to maintain market share. Suddenly things had to be kept secret. The Hacker Imagination • Hacker tradition grounded in sci fi. • Data as a social fabric, a medium of exchange • Information is now home for hackers and secrecy of information is equivalent to confinement or prison Declaration of Digital Independence We, the computer-literate and technologically superior, in order to break the ignorant chains of those who hold us back, do hereby declare our freedom from those who control what they do not understand. We wish to no longer hear the cries of "pornography-superhighway" and "cyber-patrol". We reject the repulsive nonsense shoved down our throats by all forms of media telling of the dangers of piracy, pornography, and in general, free thought. There are no "cyber-molesters" we cannot stop as a people. If you educate your children like the good parent you should be, they should know what is right and what is wrong, and will be wise, young judges, with free thought and judgement. We cannot simply "block" what we find offensive, on the net, on bulletin boards, and as we all know, in real life. We must learn to deal with the "day to day inadequacies" of life, and we must not simply become mindless drones of those that fight to restrict freedom. We must fight even harder than they, and we must fight to stay free, or all right is lost. If it's not worth fighting for, then you have already been brainwashed. http://bse.die.ms/independece.html War Games & similar films: demonstrate anxiety about technology. Hacker represented as dangerous. But also characterized as a hero War Games brought hacking into the public eye. Great impact of hacking culture War Games & similar films demonstrates anxiety about technology. Hacker represented as dangerous. But also characterized as a hero War Games brought hacking into the public eye. Great impact of hacking culture War Games & similar films demonstrates anxiety about technology. Hacker represented as dangerous. But also characterized as a hero War Games brought hacking into the public eye. Great impact of hacking culture Hackers of Today • More dystopian • Today secrecy is equated with freedom • Hackers and hacking constitute a culture in which the main concern is technology itself and society’s relationship to the concept of technology Hackers of Today • Hacking is about culture in two ways: a set of codes, norms, values and attitudes; the target of hacker’s activity is not machines, people or resources but the relationships among those things. • As culture becomes dependent on certain types of technology, information becomes increasingly commodified. Commodification is the first step in re-valuing information in terms of secrecy The Ubiquity of the PC • Essential curiosity and ethos of hacking and hacker culture overwhelmed by the commercialisation of hacking and hacking culture • White-hat hackers and black hat hackers • Script kiddies • True hack • Derivative hacks http://zdnet.com.com/2100-11-502632.html?legacy=zdnn http://www.time.com/time/europe/magazine/2000/0515/hackers.html http://www.kevinmitnick.com/ Discussion Questions A Sociology of Hackers by Tim Jordan and Paul Taylor This article argues that there is more to hacking than the mainstream media suggests. In other words, not all hackers are pathological extremists bent on world destruction and that the culture of hacking is quite complex and far ranging. With your group, discuss how hacking could be better understood. What are some of the positive effects of hacking, both in terms of approaching computer technology and as a general cultural attitude? Are there ideas, artists, individuals, values, social movements, etc. that you think embody some of the features of hacking, as represented by Jordan and Taylor? Two related questions: why do you think that hacking is so demonized in mainstream media and society? How would you interpret some of the more destructive hackers out there (such as those that just released the so-called “Kama Sutra” worm)?.
Recommended publications
  • Ethics in Security Testing
    Ethics in Security Testing Title Prepared by: Nick Dunn, Managing Security Consultant Table of contents Executive summary ................................................................... 3 Introduction ................................................................................4 Professional ethics .................................................................... 6 The hacker ethic ........................................................................ 9 Reconciling the ethical stances ............................................... 12 Conclusion ............................................................................... 16 References .............................................................................. 18 About NCC Group ................................................................... 20 2 NCC Group Whitepaper ©2018 Executive summary This paper discusses the similarities and differences between professional ethics in the information security industry and ethics in the hacker community. Sources of conflict between the two and shared values of the two are discussed in order to find some reconciliation and come to an understanding of how a shared set of ethics is possible. A reconciled set of ethics allows hackers to function within the corporate world without compromising their principles and allows the commercial world to benefit from some of the more progressive ideas within the hacker community. A reconciled set of ethics allows hackers to function within the corporate world without compromising their principles
    [Show full text]
  • Hacker Culture & Politics
    HACKER CULTURE & POLITICS COMS 541 (CRN 15368) 1435-1725 Department of Art History and Communication Studies McGill University Professor Gabriella Coleman Fall 2012 Arts W-220/ 14:35-17:25 Professor: Dr. Gabriella Coleman Office: Arts W-110 Office hours: Sign up sheet Tuesday 2:30-3:30 PM Phone: xxx E-mail: [email protected] OVERVIEW This course examines computer hackers to interrogate not only the ethics and technical practices of hacking, but to examine more broadly how hackers and hacking have transformed the politics of computing and the Internet more generally. We will examine how hacker values are realized and constituted by different legal, technical, and ethical activities of computer hacking—for example, free software production, cyberactivism and hactivism, cryptography, and the prankish games of hacker underground. We will pay close attention to how ethical principles are variably represented and thought of by hackers, journalists, and academics and we will use the example of hacking to address various topics on law, order, and politics on the Internet such as: free speech and censorship, privacy, security, surveillance, and intellectual property. We finish with an in-depth look at two sites of hacker and activist action: Wikileaks and Anonymous. LEARNER OBJECTIVES This will allow us to 1) demonstrate familiarity with variants of hacking 2) critically examine the multiple ways hackers draw on and reconfigure dominant ideas of property, freedom, and privacy through their diverse moral 1 codes and technical activities 3) broaden our understanding of politics of the Internet by evaluating the various political effects and ramifications of hacking.
    [Show full text]
  • Ethics of Hacktivism by Tennille W
    Ethics of Hacktivism by Tennille W. Scott and O. Shawn Cupp Introduction Do hacktivists have ethics? Some would say yes and others suggest that no, they do not. Are there rules that those who engage in hacking follow or abide by during the conduct of their activities? Does the hacktivist maintain any semblance of actions described under the just war theory? If so, it would seem to be only in jus in bello1 or the just conduct in war, due to the perpetual nature of hacker activities and hacktivist operations. First, what is a hacktivist?2 They are defined as those who through the nonviolent use for political ends of “illegal or legally ambiguous digital tools” like website defacements, information theft, website parodies, denial-of-service attacks, virtual sit-ins, and virtual sabotage.3 This provides the basis for understanding more about where hacktivists’ motivations come from and what kinds of ideologies they may exhibit. Nevertheless, hacktivists must conform to some sort of norm. Based upon the nature of hacktivist activities, there must be a way to categorize or identify their overarching ethic. Understanding the motivation of this group is a huge undertaking because of the great variance and diversity of the people who make up the hacktivist collective. Unlike cyberterrorists, who typically belong to a hierarchical group structure and have a common cause, hacktivists are not bound in the same way, which makes them more dynamic and difficult to analyze. A prime example is the hacktivist group known as Anonymous and its spinoff group, Lulz Security (LulzSec), who eventually participated in different activities with different motives.
    [Show full text]
  • Hacked: a Radical Approach to Hacker Culture and Crime by Kevin F.Steinmetz Richard A
    International Social Science Review Volume 93 | Issue 2 Article 10 Book Review: Hacked: A Radical Approach to Hacker Culture and Crime by Kevin F.Steinmetz Richard A. Almeida Francis Marion University Follow this and additional works at: https://digitalcommons.northgeorgia.edu/issr Part of the Anthropology Commons, Communication Commons, Economics Commons, Geography Commons, International and Area Studies Commons, Political Science Commons, and the Public Affairs, Public Policy and Public Administration Commons Recommended Citation Almeida, Richard A. () "Book Review: Hacked: A Radical Approach to Hacker Culture and Crime by Kevin F.Steinmetz," International Social Science Review: Vol. 93 : Iss. 2 , Article 10. Available at: https://digitalcommons.northgeorgia.edu/issr/vol93/iss2/10 This Book Review is brought to you for free and open access by Nighthawks Open Institutional Repository. It has been accepted for inclusion in International Social Science Review by an authorized editor of Nighthawks Open Institutional Repository. Almeida: Book Review: Hacked Steinmetz, Kevin F. Hacked: A Radical Approach to Hacker Culture and Crime. 2016. New York: New York University Press. xv + 285 pages. Paperback, $28. “Hackers” and “hacking” occupy a complicated place in twenty-first century American life. Images of misfit teenagers, sinister manipulators of the democratic process, and monomaniacally-focused corporate intruders abound. Kevin Steinmetz acknowledges that those archetypes have some legitimacy but makes a convincing case that “craftsperson,” “guild member,” and “exploited proletarian” should be added to the iconography of hacking. On his account, hackers and hacker culture occupy an interesting and important place in American culture and the post-Fordist economy, one that can be fruitfully explored with a “radical” (Marx- inspired) approach.
    [Show full text]
  • Free As in Freedom (2.0): Richard Stallman and the Free Software Revolution
    Free as in Freedom (2.0): Richard Stallman and the Free Software Revolution Sam Williams Second edition revisions by Richard M. Stallman i This is Free as in Freedom 2.0: Richard Stallman and the Free Soft- ware Revolution, a revision of Free as in Freedom: Richard Stallman's Crusade for Free Software. Copyright c 2002, 2010 Sam Williams Copyright c 2010 Richard M. Stallman Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License." Published by the Free Software Foundation 51 Franklin St., Fifth Floor Boston, MA 02110-1335 USA ISBN: 9780983159216 The cover photograph of Richard Stallman is by Peter Hinely. The PDP-10 photograph in Chapter 7 is by Rodney Brooks. The photo- graph of St. IGNUcius in Chapter 8 is by Stian Eikeland. Contents Foreword by Richard M. Stallmanv Preface by Sam Williams vii 1 For Want of a Printer1 2 2001: A Hacker's Odyssey 13 3 A Portrait of the Hacker as a Young Man 25 4 Impeach God 37 5 Puddle of Freedom 59 6 The Emacs Commune 77 7 A Stark Moral Choice 89 8 St. Ignucius 109 9 The GNU General Public License 123 10 GNU/Linux 145 iii iv CONTENTS 11 Open Source 159 12 A Brief Journey through Hacker Hell 175 13 Continuing the Fight 181 Epilogue from Sam Williams: Crushing Loneliness 193 Appendix A { Hack, Hackers, and Hacking 209 Appendix B { GNU Free Documentation License 217 Foreword by Richard M.
    [Show full text]
  • Open Source and Journalism: Toward New Frameworks for Imagining News
    MCS35510.1177/0163443713485494Media, Culture & SocietyLewis and Usher 4854942013 Article Media, Culture & Society 35(5) 602 –619 Open source and journalism: © The Author(s) 2013 Reprints and permissions: toward new frameworks for sagepub.co.uk/journalsPermissions.nav DOI: 10.1177/0163443713485494 imagining news innovation mcs.sagepub.com Seth C Lewis University of Minnesota, USA Nikki Usher George Washington University, USA Abstract Journalists and technologists increasingly are organizing and collaborating, both formally and informally, across major news organizations and via grassroots networks on an international scale. This intersection of so-called ‘hacks and hackers’ carries with it a shared interest in finding technological solutions for news, particularly through open- source software programming. This article critically evaluates the phenomenon of open source in journalism, offering a theoretical intervention for understanding this phenomenon and its potential implications for newswork. Building on the literature from computer science and journalism, we explore the concept of open source as both a structural framework of distributed development and a cultural framework of pro- social hacker ethics. We identify four values of open-source culture that connect with and depart from journalism—transparency, tinkering, iteration, and participation—and assess their opportunities for rethinking journalism innovation. Keywords computational journalism, data, hackers, innovation, journalism studies, online journalism, open source, participation,
    [Show full text]
  • The Digital Revolution and the Hackers Culture
    The Digital Revolution and the Hackers Culture. Elective course 3rd module (Feb-Mar) 2019 Fabio Grazioso Introduction Aims of the Course • To study of the history and evolution of digital technologies • To learn the details of some examples of digital technologies and digital media • To read authors who have contributed to the debate on digital technologies • To develop critical thinking with regards to technology (in particular digital technology) Digital Technology • Computers • Computer Networks • Mobile phones • eBooks • Podcasts • Music • Movies Digital Technology • Computers • Computer Networks • Mobile phones • eBooks • Podcasts • Music • Movies Digital Technology • Computers • Computer Networks • Mobile phones • eBooks • Podcasts • Music • Movies Digital Technology • Computers • Computer Networks • Mobile phones • eBooks • Podcasts • Music • Movies Digital Technology • Computers • Computer Networks • Mobile phones • eBooks • Podcasts • Music • Movies some consequences of digital technology • easy to copy • easy to transmit (error correction) • question identity • question reality • digital is “less natural” (e.g. writing) question identity => identity theft question reality => Philip K. Dick New “questions” • ownership • authenticity Postmodernism From Wikipedia: «[…] postmodernism is generally defined by an attitude of skepticism, irony, or rejection toward the meta-narratives and ideologies of modernism, often calling into question various assumptions of Enlightenment rationality. Consequently, common targets of postmodern critique include universalist notions of objective reality, morality, truth, human nature, reason, language, and social progress.» postmodernism is generally defined by an attitude of skepticism, irony, or rejection toward the meta-narratives and ideologies of modernism, often calling into question various assumptions of Enlightenment rationality. Consequently, common targets of postmodern critique include universalist notions of objective reality, morality, truth, human nature, reason, language, and social progress.
    [Show full text]
  • Cyberpunk & Hacker Culture
    Cyberpunk & Hacker Culture - From Fiction to Reality Keren Elazari, CISSP Cyber Security Expert Tel Aviv , Israel Session ID: MASH-W26A Session Classification: General Interest ABOUT +10 Years in Cyber Security Fortune 500 companies Security technology vendors Teaching Fellow, Singularity University www.k3r3n3.com TECHNOLOGY >>> REALITY www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com SCIENCE FICTION >>> REALITY www.k3r3n3.com www.k3r3n3.com BLADE RUNNER - 1982 www.k3r3n3.com NERUOMANCER - 1982 www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com THE MATRIX - 1999 www.k3r3n3.com www.k3r3n3.com THE FUTUROLOGICAL CONGRESS www.k3r3n3.com GIRL WITH THE DRAGON TATTOO www.k3r3n3.com WOMEN IN CYBER FRONTIERS ► Joanna Rutkowska ► Jeri Elseworth ► Limor Fried ► Hilary Mason ► Kaliya Hamlin ► Del Harvey ► Linux Chicks ► “Women Who Code” ► Grace Hopper Celebration of “Women in Computing” www.k3r3n3.com HACKERS OF FICTION NeuroMancer, Case, Molly Millions, Hero Protagonist, YT, Johnny Mnemonic, BioHazard, Spider, V, Neo, Morpheus , Trinity , Zero Cool, CrashOverRide, Cereal Killer , AcidBurn www.k3r3n3.com THIS TEAM MADE CYBERSPACE www.k3r3n3.com HACKERS OF THE WORLD UNITE! www.k3r3n3.com HACKERS OF FAME & FORTUNE THE CAPTAIN KEVIN ANALYZER CRUNCH MITNICK www.k3r3n3.com WARGAMES - 1983 www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com MIND READING MACHINES? www.k3r3n3.com HACKING EMBEDDED DEVICES www.k3r3n3.com www.k3r3n3.com LEPHT ANONYM, A CYBORG www.k3r3n3.com THE FUTURE OF HACKING www.k3r3n3.com CYBERPUNK FICTION HAS INSPIRED HACKER REALITY www.k3r3n3.com HACKING IS THE 21ST CENTURY FORM OF POWER! www.k3r3n3.com HACK THE PLANET www.k3r3n3.com THANK YOU! WWW.K3R3N3.COM Twitter: @k3r3n3 LinkedIn.com/in/kerene .
    [Show full text]
  • Hacking: the Performance of Technology? Cathy Legg Cycorp, University of Melbourne
    Techné 9:2 Winter 2005 Legg, The Performance of Technology? / 151 Hacking: The Performance of Technology? Cathy Legg Cycorp, University of Melbourne Thomas, Douglas. 2002. Hacker Culture. Minneapolis: University of Minnesota Press. The word “hacker” has an interesting double-meaning: one vastly more widespread connotation of technological mischief, even criminality, and an original meaning amongst the tech-savvy as a term of highest approbation. Both meanings, however, share the idea that hackers possess a superior ability to manipulate technology according to their will (and, as with God, this superior ability to exercise will is a source of both mystifying admiration and fear). This book mainly concerns itself with the former meaning. To Thomas this simultaneously mystified and vilified, elusive set of individuals exemplifies “the performance of technology” (xx), showing the way in which “the cultural, social and political history of the computer...is fraught with complexity and contradictions” (ix). In fact, he claims that hacking is more a cultural than a technological phenomenon, citing Heidegger’s, “[t]he essence of technology is not anything technological” (56). In part one of the book, “The Evolution of The Hacker,” Thomas claims secrecy to be the defining issue of “hacker culture.” Society has an ambivalent, contradictory relationship to secrecy, which the pranks of hackers highlight in paradoxical and/or ‘supplementary’ ways. For instance, “[s]ecrets can preserve an institution’s identity, but...they can also prevent a hacker from being identified” (xi). Hackers play with these contradictions (the hacker “both deploys and disturbs the notion of the secret” (189)). Thomas seeks a “genealogy of secrecy” in the Foucauldian sense.
    [Show full text]
  • The Open Source Software Development Phenomenon: an Analysis Based on Social Network Theory
    THE OPEN SOURCE SOFTWARE DEVELOPMENT PHENOMENON: AN ANALYSIS BASED ON SOCIAL NETWORK THEORY Greg Madey Vincent Freeh Computer Science & Engineering Computer Science & Engineering University of Notre Dame University of Notre Dame [email protected] [email protected] Renee Tynan Department of Management University of Notre Dame [email protected] Abstract The OSS movement is a phenomenon that challenges many traditional theories in economics, software engineering, business strategy, and IT management. Thousands of software programmers are spending tremendous amounts of time and effort writing and debugging software, most often with no direct monetary compensation. The programs, some of which are extremely large and complex, are written without the benefit of traditional project management, change tracking, or error checking techniques. Since the programmers are working outside of a traditional organizational reward structure, accountability is an issue as well. A significant portion of internet e-commerce runs on OSS, and thus many firms have little choice but to trust mission-critical e-commerce systems to run on such software, requiring IT management to deal with new types of socio-technical problems. A better understanding of how the OSS community functions may help IT planners make more informed decisions and develop more effective strategies for using OSS software. We hypothesize that open source software development can be modeled as self-organizing, collaboration, social networks. We analyze structural data on over 39,000 open source projects hosted at SourceForge.net involving over 33,000 developers. We define two software developers to be connected — part of a collaboration social network — if they are members of the same project, or are connected by a chain of connected developers.
    [Show full text]
  • How to Become a Hacker
    How To Become A Hacker Eric Steven Raymond Copyright © 2001 Eric S. Raymond Table of Contents Why This Document? What Is a Hacker? The Hacker Attitude 1. The world is full of fascinating problems waiting to be solved. 2. No problem should ever have to be solved twice. 3. Boredom and drudgery are evil. 4. Freedom is good. 5. Attitude is no substitute for competence. Basic Hacking Skills 1. Learn how to program. 2. Get one of the open-source Unixes and learn to use and run it. 3. Learn how to use the World Wide Web and write HTML. 4. If you don't have functional English, learn it. Status in the Hacker Culture 1. Write open-source softwareA 2. Help test and debug open-source software 3. Publish useful information 4. Help keep the infrastructure working 5. Serve the hacker culture itself The Hacker/Nerd Connection Points For Style Historical Note: Hacking, Open Source, and Free Software Other Resources Frequently Asked Questions Why This Document? As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own.
    [Show full text]
  • The Manifestation of Hacker Culture
    The Hackers of New York City By Stig-Lennart Sørensen Thesis submitted as part of Cand. Polit degree at the Department of Social Anthropology, Faculty of Social Science, University of Tromsø. May 2003 The Hackers of New York City - List of Illustrations Contents LIST OF ILLUSTRATIONS .................................................................................................. 3 PREFACE ................................................................................................................................. 4 INTRODUCTION....................................................................................................................5 MY INTENTIONS WITH THIS PAPER.............................................................................. 8 PROBLEM POSITIONING.................................................................................................... 8 ENTERING THE FIELD...................................................................................................... 10 ON THE FIELDWORK .............................................................................................................. 10 ON INFORMANTS ................................................................................................................... 12 FIELDWORK AND FILM ISSUES..................................................................................... 13 PRACTICAL CONCERNS:......................................................................................................... 13 ETHICAL CONCERNS: THIN AND THICK CONTEXTUALIZATION
    [Show full text]