1 / 12

Hacking and Hacktivism

Hacking and Hacktivism. Elizabeth Guerry John Medzerian Patrick Thomas. What is Hacking?. Marriam -Webster gives 2 definitions: to write computer programs for enjoyment to gain access to a computer illegally The definition has changed through the years.

thea
Télécharger la présentation

Hacking and Hacktivism

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Hacking and Hacktivism Elizabeth Guerry John Medzerian Patrick Thomas

  2. What is Hacking? • Marriam-Webster gives 2 definitions: • to write computer programs for enjoyment • to gain access to a computer illegally • The definition has changed through the years. • Originally was synonymous with tinkering. • Due to cyber-crimes, hacking garnered a negative connotation. • “computer criminals”

  3. “This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals. We explore... and you call us criminals.  We seek after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals.”The Mentor, “The Conscience of a Hacker”, January 8, 1986

  4. Three Types of Hackers • Various Hacks • Computer Security hackers • Focused on bypassing or infiltrating security systems • Blacks Hats • Grey Hats • White Hats • Common Techniques: • Phishing • Password Cracking • Viruses/Worms/Trojan • Social Engineering • Keylogging • Examples • Adam Botbyl – Conspiracy to Steal CC# from Lowes • SamyKamkar – “Samy is my hero” Myspace worm • Hacktivists • DEFCON 18

  5. Three Types of Hackers • Programmers • Playful cleverness • Ideology grew out of academia • MIT • Influence of the Internet • Non-malicious • “Open source” • Steven Levy and the Hacker Ethic • Sharing • Openness • Decentralization • Free Access to Computers • World Improvement • Refer to computer security hackers as “crackers”

  6. Three Types of Hackers • Hobbyists • Also playful cleverness • Improving or changing technology • Hacker art • Lile Elam • Barnsley’s fern

  7. Hacktivism • Hack+Activism • Reasons • Protest • Promote political ends • Common Techniques • DDOS • Sit-in • Defacement • Doxxing

  8. Notable Hacktivist Groups • Electronic Disturbance Theater • Founded in late ‘90s • Cyber activists and performance artists • Non-violence • FloodNet • Zapatistas • EDT 2.0 • Transborder Immigrant Tool

  9. Notable Hacktivist Groups • Anonymous • Anti-censorship, freedom of information, transparency in government • Guy Fawkes masks • The Low Orbit Ion Cannon • Megaupload • Playstation Network • Mexican Drug Cartel • Church of Scientology

  10. What next? • Where will hacking and hacktivism go from here? • What future techniques will be used? • What future technologies will be hacked and for what purpose? • What are the potential benefits and/or consequences of hacking?

  11. Sources • The Mentor. "The Conscience of a Hacker." phrack.org. 8 Jan. 1986. Web. 10 Feb. 2013. <http://www.phrack.org/issues.html?issue=7&id=3&mode=txt>. • Löwgren, Jonas. "Hacker culture(s): Origins." mah.se. 23 Feb. 2000. Web. 10 Feb. 2013. <http://webzone.k3.mah.se/k3jolo/HackerCultures/origins.htm>. • "Beware: Hackers at play." Newsweek 5 Sept. 1983: 42-46, 48. Print. • Raymond, Eric S. "Jargon File: Cracker." Online posting. n.d. Web. 10 Feb. 2013. <http://catb.org/jargon/html/C/cracker.html>. • "Words to Avoid (or Use with Care) Because They Are Loaded or Confusing." Online posting. GNU. gnu.org. n.d. Web. 10 Feb. 2013. <http://www.gnu.org/philosophy/words-to-avoid.html#Hacker>. • Solfrank, Cornelia. "Hacking Seductions as Art." thing.net. 25 July 2000. Web. 10 Feb. 2013. <http://www.thing.net/~jmarketo/interviews/cornelia.shtml>.

  12. Sources (cont’d) • Stallman, Richard. "On Hacking." Stallman.org. 2002. Web. 10 Feb. 2013. <http://www.stallman.org/articles/on-hacking.html#cracker>. • Chaney, Allison. "Hack Value." Princeton.edu. n.d. Web. 10 Feb. 2013. <http://www.princeton.edu/~achaney/tmve/wiki100k/docs/Hack_value.html>. • Garrett, Marc. "Revisiting the Curious World of Art & Hacktivism." Furtherfield.org. 3 Feb. 2012. Web. 10 Feb. 2013. <http://www.furtherfield.org/features/articles/revisiting-curious-world-art-hacktivism>. • Ludlow, Peter. "What is a 'Hacktivist'?" New York Times Opinionator. n.p., 13 Jan. 2013. Web. 10 Feb. 2013. <http://opinionator.blogs.nytimes.com/2013/01/13/what-is-a-hacktivist/>. • Bird, Lawrence. "Global Positioning: An Interview with Ricardo Domingues."Furtherfield.org. n.p., 15 Oct. 2011. Web. 10 Feb. 2013. <http://www.furtherfield.org/features/interviews/global-positioning-interview-ricardo-dominguez>.

More Related