Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Effect of cyberspace on adolescents
Hacking in the present world
History of hacking essay
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Effect of cyberspace on adolescents
Hacking and Digital Counter Culture
Hacking was first introduced as a new way to embrace and utilize computer technology. Many of the hackers then saw the technology as a way to demonstrate their independence and aims to share this to the public and they used the computer to achieve this. In the last couple of years however, hacking has been given a new connotation. It became connected with criminal and illegal activities which is totally different from what the hackers had in mind when they initially used and created new technologies.
At present, the use of computer technologies and its related technologies is once again changing and reverting to its original ideals and concept. It is predicted that this new trend shall continue to influence the way and shall set a new course the computer technology is used globally.
This paper looks into the evolution of hacking since its birth in the 50’s and the 60’s to the present. A focus on the cross cultures then and now shall demonstrate how hacking and hackers have become associated with illegal activity. The paper shall answer the question as to whether counter cultures enforced the negativity or whether mainstream culture portrays hacking in a negative way.
I. Definition and Evolution of Hacking
Hacking is defined as 1) “the hobby/profession of working with computers and 2) breaking into computer systems” (Definition). The two definitions is a perfect example of how hacking evolved over the years. The first definition was first used to describe the people who work with computers. They are the ones considered as the first hackers. Although this definition is still being used today, the second definition has become the more acceptable definition of hacking. The action has now b...
... middle of paper ...
...ktion Books Ltd, 2002. 122-123. Print.
Hacking Conventional Computing Infrastructure. Open Compute Project. 2014. Web. 26 April 2014.
Levy, Steven. Hackers. Sebastopol, CA: O'Reilley Media, 2010. 4-6. Print.
Markoff, John. What the Dormouse Said: How the Sixties Counterculture Shaped the Personal Computer Industry. New York: Viking, 2005. Print.
The Net: The Unabomber, LSD and the Internet. Dir. Lutz Dammbeck. 203. Web.
Trigaux, Robert. St. Petersburg Times. 2002. Web. 25 April 2014.
Turkle, Sherry. "Hackers: Loving the Machine for Itself." The Second Self: Computers and the Human Spirit. New York: Simon and Schuster, 1984. 183-218. Print.
Turner, Fred. "Taking the Whole Earth Digital." From Counterculture to Cyberculture Stewart Brand, the Whole Earth Network, and the Rise of Digital Utopianism . Chicago: Chicago University Press, 2006. 103-118. Print.
Hacking has two primary definitions; the first refers to the enthusiastic and skilful use of computers to solve problems (Techterms, 2013); the second, to “gain unauthorized access to data in a system or computer” (Oxford Dictionaries, 2013). In the context of this essay the second definition is more appropriate and will be the meaning inferred throughout. This definition also more closely aligns with legal terminology used in the UK when describing the hacking of computers. The Computer Misuse Act (1990) introduced three criminal offenses:
In reality, most hackers are ordinary people with a great deal of curiosity, above-average skills with a computer, a good understanding of human nature, and plenty of time to kill. Hackers have no distinguishing characteristics. Your next-door neighbor could be a hacker, as could your niece or nephew, one of your co-workers, or even the kid who serves you coffee in the morning. Not all hackers are dangerous and out to destroy business or damage lives. The view of the general public toward hackers is mixed. A recent CNN-poll shows 33% of respondents labeling hackers as "useful," 17% seeing them "as a menace," and the majority (45%) seeing hackers as "both" useful and a menace (CNN, 1999).
Although San Francisco in the present is known as the tech industry and contains some of the largest tech companies all around the world, it has not always been this way. The tech vision insight is told best through a historical group of San Franciscan journalists and entrepreneurs called Stewart Brand and the Whole Earth network. In 1968, this network, according to Turner, was congregated by a group of people and publications who conjoined series of encounters between the San Franciscan bohemian culture, and the technology culture in Silicon Valley and published the document: The Whole Earth Catalog. In 1985, they held the WELL conference which was said to have been “one of the most influential computer conferencing system of the decade” (Turner, 2) The Whole Earth Catalog had the ‘ new communalists working together and turning away from politics but rather towards technology. During the 1970s, the “new communalists” world was peaceful and harmonical according to Turner “ If the American state deployed massive weapons systems in order to destroy faraway people, the New Communalists would deploy small-scale technologies- ranging from axes and hoes to amplifiers……. To bring people together and allow them to experience their common humanity.” (Turner, 3) This part of the counterculture that was involved with the technological world was influential in
In this book Sterling discusses three cyberspace subcultures known as the hacker underworld, the realm of the cyber cops, and the idealistic culture for the cyber civil libertarians. At the beginning of the story Sterling starts out with discussing the birth of cyberspace and how it came about. The Hacker Crackdown informs the readers of the issues surrounding computer crime and the people on all sides of those problems. Sterling gives a brief summary of what cyberspace meant back then and how it impacted society, and he investigates the past, present and future of computer crimes. For instance he explains how the invention of the telephone led to a world that people were scared of because the telephone was something that was able to let people talk to one another without actually being in the same area. People thought that it was so strange and so different because they didn’t understand all of the information behind it. Back then people thought of the telephone as a tool that allowed others to talk to them in a way that was so personal yet impersonal. Sterling then goes on to explain how “phone phreaks” played such an important part in relating the telephones to computer crimes and how they were so closely related back then.
The documentary Rise of the Hackers, focuses on the rising criminal use of hacking and how it is effecting multiple areas of technology. The documentary describes simple and complicated situations concerning hacking, but there still questions that must be answered when it comes to hacking and crime. The main question is in trying to determine why a person would choose to commit computer hacking. There are various theories already present within the criminal justice system that may explain at a micro-level and macro-level. These theories would explain why offenders would commit the crimes, but it may not answer the full scope of the question. The Routine Activities Theory would help to explain why offenders offend, why victims are victimized,
Although, hackers can damage a person psychologically, emotionally, and financially, hacking almost never leads to direct physical violence. I believe that hacking is one of those unique tools of life that is considered good or bad depending on what it is being used for. I believe that anything that falls into the right hands and is used for a genuine purpose, can help progress society in a positive light even if the thing in question is deemed bad. For instance, in June of 2013, Edward Snowden, an American computer professional, leaked classified information from the National Security Agency (NSA) to the mainstream media in Hong Kong by using the helpfulness social engineering approach, which help him obtain confidential information without physically taken it from the person. Although this was detrimental for the US government’s reputation, simultaneously it was an event that lead to the improvement of security. In addition, if the US had hired Edward Snowden that could use his wrong doing for a right cause. We all have our thoughts about what is wrong and right, but in reality those who are in power of wealth determine what is deemed acceptable and unacceptable. With this in mind, I state the claim that from a creativity aspect no matter whether a product is deemed good or bad,
Hackers have a very rich history, despite being most commonly linked to the latest outburst of technology. They've helped excel many of the everyday gadgets a majority of the population owns and uses today. Not only have they established a very well known name today when it comes to computers, but nearly every piece of technology we know today can be linked back to them. They have advanced greatly in both their knowledge of computers as well as their morality concerning what to do with their information, causing a split of both righteous and sinister behavior among their groups. Throughout history, as their knowledge for the working mechanisms continued to grow, hackers have positively advanced entire societies in gigantic leaps with their gift for understanding and utilizing electronics to their max capacities which allowed them to continue to expand on the ways people can use them even to this day.
...late 1980’s, the computer, although commercially available, did not occupy the centre of our culture’s routine and lives. It was not until the late 1990’s when the computer first could be argued took the centre of some people’s lives with the advancement of the sound card, speakers, multi colour screens and printers, as Computers turned into a multimedia machine rather than a high tech novelty. It was not until the mid 2000’s, that computers began to overtake the television as the media centre of our lives. The emergence of the Internet brought about many social media websites including MySpace, and more recently, Facebook. Again, Haddon’s theory of critical-mass effect is evident as it was only through the mass consumption of computers both in the public (work) life, and the private (home) life that society began to domesticate the computer into their lives.
The Web. The Web. 6 Nov. 2013. Judd, Terry. The.
Hacking has been around since the birth of computers. When the term hacking was first used, its meaning was not that of how we think of it today. At the origins of computing, a hacker was considered to be just a "creative programmer (Baase, 2003)." Early forms of computer games as well as the beginnings of operating systems were discovered and created by these original hackers. These hackers plunged into systems as a way of an intellectual challenge and to aspire to gain knowledge (Baase, 2003). Kevin Mitnick believes he falls into this realm of hackers. Hackers in today's era are now looked upon as criminals who invade the privacy rights of individuals and have the ability to deliver worms/viruses. The differences are that hackers today have full intentions of delivering terrible viruses and worms. Mitnick was one of the most infamous hackers during the 1980's. He molded his hacking style around the stupidity of humans and his quest for intellectual knowledge. The ways in which he wiggled his way into computer systems extenuates many of the issues surrounding computer security and privacy.
Hacking was a term established in the 1960s. This word is the concept of unauthorised intrusion of a computer or network with malicious intentions behind them. This includes any technical effort of manipulating or damaging the normal behaviour of network connections/systems or stealing information. In this generation, hacking has become evidently significant and the debate of hacking being considered ethical or unethical arises. Therefore, will hacking ever be justified? The justification (reasonableness) of hacking has become a disputation of mixed opinions and emotions amongst society. These opinions range from hacking being considered immoral due to it being illegal activity and the vast negative impact it has on people. This includes the affirmative opinions on hacking; such as hacking being considered ethical due to the “white hat” hackers.
In Computer security terminology Hacker is a person or group of persons, who exploit, modify and identify weakness in a computer system or network. Hacker may be motivates of reasons such as profit, protest and challenge. based on attitude, belief, and goals hacker groups are categories such as
The term “hacker” has been in use since the early 1980’s due to mass media usage to describe computer criminals. The use of this term is vastly used by the general population and most are not aware that there are different meanings to the word. People within the computing community especially within the programming subculture emphasize the use of the term “crackers” for computer security intruders (cyber criminals). Early hackers rarely used their skills for financial gain as a motivation for their criminal behavior in that time cybercrime was infantile and largely seen as a practical joke or game by those who committed it. Bob Thomas created the first credited computer worm n...
The Art of exploring various security breaches is termed as Hacking.Computer Hackers have been around for so many years. Since the Internet became widely used in the World, We have started to hear more and more about hacking. Only a few Hackers, such as Kevin Mitnick, are well known.In a world of Black and White, it’s easy to describe the typical Hacker. A general outline of a typical Hacker is an Antisocial, Pimple-faced Teenage boy. But the Digital world has many types of Hackers.Hackers are human like the rest of us and are, therefore, unique individuals, so an exact profile is hard to outline.The best broad description of Hackers is that all Hackers aren’t equal. Each Hacker has Motives, Methods and Skills. But some general characteristics can help you understand them. Not all Hackers are Antisocial, PimplefacedTeenagers. Regardless, Hackers are curious about Knowing new things, Brave to take steps and they areoften very Sharp Minded..
Harvey, Brian. A. Computer Hacking and Ethics. Ed. Paul Goodman, P.G., a.k.a. Electrical Engineering and Computer Science.