Daniel Blanchette December 1st 2009 Dedicated to Susan Phillips (1978-2009)

Slides:



Advertisements
Similar presentations
UNIT 20 The ex-hacker.
Advertisements

Extreme Programming Alexander Kanavin Lappeenranta University of Technology.
1. What does it mean to think critically about something? 2. What is the role of critical thinking in education? 3. How does (or doesn’t) critical thinking.
Internet Safety May 2014 – KS3 AIMS  To find out what you know about staying safe online  To improve on your knowledge on internet safety  To be clear.
Bill Gates ─10207 Ariel. Family & Early Childhood On October 28, 1955, shortly after 9:00 p.m., William Henry Gates III was born. He was born into a family.
Copyright Law & Your Websites Computer Science 201 November 21, 2005 Sarah Garner, J.D., M.L.I.S. Law Library Director,
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Open Source and the Bazaar Method. History of Software Development 1944, Harvard and IBM build first computer bundling Hardware and Software together.
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property,
Prepared by: Nahed Al-Salah
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
Computers in Society Week 8: Computer Security and Hacking.
1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.
A Research and Resource Repository. A reverse-chronologically ordered sequence of entries on a particular topic or concept. Individual entries written,
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Open Access Publishing And Open Source Software. Open Access Publishing Peer-reviewed journal literature available on the internet at no charge Users.
April 7, 2011 Copyright Law. Copyright Infringement?
Terms: Test (Case) vs. Test Suite
Computer ethics.
Scenario testing Tor Stålhane. Scenario testing – 1 There are two types of scenario testing. Type 1 – scenarios used as to define input/output sequences.
 Copyright is a form of protection given to authors/creators of original works.  This property right can be sold or transferred to others.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Do Now 1)What was the Cold War? 2)Why did the United States used covert operations during the Cold War?
Introduction Computers and English Matt Barton. What is this course all about? This course is designed to introduce you to the field of Computers and.
Communicating Information about the Initiative to Gain Support from Key Audiences.
Becoming A Writer By: Eric Herrera. Top 5 Colleges CUNY Hunter College CUNY Hunter College Creative Writing and English & Literature Majors Creative Writing.
SECTION 22.3 POPULAR CULTURE OF THE 1950’S. DID YOU KNOW! AS AMERICAN CULTURE CHANGED DURING THE 1950’S, NEW WORDS AND TERMS EMERGED, INCLUDING HOT ROD,
CIS 197 Computers in Society Professor John Peterson Philosophy Week!
The Basics of Copyright William Cross Austin, TexasJune 21, 2013 ACRL Scholarly Communications Roadshow INTELLECTUAL PROPERTY: ©
Intellectual Property Software Piracy. Copying of software in large quantities for resale Illegal copying by businesses and individuals for their own.
WIRESCRIPT1 WIRESCRIPT Web Interactive REview of Scientific Culture, Research, Innovation Policy and Technology.
Digital Citizenship Project Jared Smith ED 505. Netiquette on Social Media Sites  Netiquette on Social Media Sites is “the social code of using social.
Decades Presentation 1960’s BY: AMY, JUSTIN, JAKE.
Nagwa Abdel Salam Fahmy Prof of Journalism Mass Communication Dep. Faculty of Arts, Ain Shams University.
Ethics, Computing, and the Internet
Lecture 21 Computer Security Ethics
Life After Grad School Craig Knoblock. Outline Academia Academia Research labs Research labs Large Companies Large Companies Startups Startups Starting.
Copyright © 2014 by The University of Kansas Communicating Information about the Initiative to Gain Support from Key Audiences.
The HACKER. TECHNOLOGY: Hacker (computer security) someone who accesses a computer system by circumventing its security system. Hacker (hobbyist) who.
Unit 9.  Lets finish strong in Unit 9 discussions  Alternative seminars  Final submission of work – Tuesday, October 9 th at midnight.
Rights Of Library Users By Keao White Rationale for this Workshop The purpose of this workshop is to give an in depth presentation covering the rights.
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
What is The Internet?. Internet Vs Intranet Internet –Computers connected throughout the world. PUBLIC Network Intranet- Secure connected computers within.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
Teacher Rooming Equipment Rules / Expectations Login / Passwords Technical Issues Homework Printing.
1.The Nature, Impact, and Issue of Information Technology 1.5Basic Legal Framework relating to the Use of IT.
Turn Down the Dial on Cyberbullying and Online Cruelty.
Hacker Ethic in a Networked Society This document uses the GNU Free Documentation License (v1.2 or newer). PSI 2007 Kaido Kikkas.
+ The Use of Databases in the Instructional Program Increasing Rigor and Inquiry Throughout the Curriculum Donna Dick, Jacob Gerding, and Michelle Phillips.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
2003 (E) Task reference to Lily Chan’s letter Interviewing relatives 56. bring up different things from usual family discussions 57. learn a lot.
 Associated Press News Service  Reporter’s task to report a news story.
Internet and World Wide Web
Computer Security By Duncan Hall.
HACKERS: HEROES OF THE COMPUTER REVOLUTION 25 TH ANNIVERSARY By: Brett Delaney Living in a Networked World: The Good, the Bad, and the Ugly CS 408 Section.
Why aren’t we doing it already? Programming the Future.
Hackers: Heroes of the Computer Revolution By: Steven Levy.
Hacking and Its Mysteries By: Nancy Reyes. Table of Contents  Hacking, Good or Bad?  Hackers and Their Origins  Society/Media and Hackers  Government.
SocratesSocrates BCE BCE. Today you will learn: Who Socrates was. What the main ideas of his Philosophy (thinking) were all about. Who Socrates.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
JOB SEARCHING Liz Robertson Careers Consultant CAREERS TRAINING PROGRAMME.
The Children’s Society Black Country Advocacy Service “The Children’s Society Black Country Advocacy Service is an independent, confidential service in.
The system of numeration we use today is derived from an ancient Hindu system. It was picked up and developed by Arab traders in the ninth and tenth centuries.
Hacker Ethic in a Networked Society
Presented by: Kevin Regaldo Phillip Dai
CS 115: COMPUTING FOR The Socio-Techno Web
ECE 103 Engineering Programming Chapter 1 Introduction
Presentation transcript:

Daniel Blanchette December 1st 2009 Dedicated to Susan Phillips ( )

Hackers!!

Book Information Hacker Culture by Douglas Adams An exploration of literature, movies, music and events relevant to hacker culture Good idea but wrong approach

Hackers v.1 Late 50’s to early 70’s Concerned with solving computer problems elegantly Mostly all found working at University computer labs funded by ARPA (Now DARPA) Made possible the major advancements in computing –Look up the Rosebowl Prank as I have no time to discuss it. DO IT! I’m talking to YOU! Yeah, YOU!

Phreaking Subculture dedicated to the study and exploration of telecommunications network The first group of people that can be argued to cause harm to society JOYBUBBLES!! and the Captain Crunch Whistle –CAPTAIN CRUNCH!! And Blue boxing

Hacker Code Access to Computers and anything that might teach you something about the way the world works should be unlimited and total All Information should be free

Hacker Code Mistrust Authority - Promote Decentralization Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race or position You can create art and beauty on a computer Computers can change your life for the better

Sharing Information Code made available for everyone

The Altair Basic Incident The Homebrew Computer Club, 1975 Dan Sokol gave away copies of Altair Basic Bill Gates responded by writing an open letter published in the Homebrew Computer Club’s newsletter equating this philosophy to theiving

Sharing Information Code made available for everyone Hacker profiles on BBS Hacker periodicals –TAP

TAP Abbie Hoffman and Al Bell founded the Technical Assistance Party Initially served as official Yippie newsletter Became a hacker periodical that contained detailed phreaking information and many cues to social engineering Later turned into Controversial books (I.e Steal this Book)

Hackers v.2 Post early 70’s to late 90’s Came about as a shift between generations Hackers are now mostly computer enthusiasts, mostly composed of teenagers and young adults Now shifted away from Major Universities

Hackers v.2 Uses computer systems made possible by previous hackers Hacking done in secret within secret societies –Legion of Doom –Masters of Deception Boy Culture has taken over –“Rebels” against authority figures

Hacker Derivitives White Hacker: –Uses Hacking in order to find bugs in programs and fix them. Usually fixes the bug and releases detailed documentation for the fix Black Hacker: –Uses Hacking in order to determine bugs, secrets or any relevant information the Hacker wishes to know. Usually keeps the secret to himself but sometimes releases profiles about his exploits

Hacker Derivatives Derivative Hacker: –Uses the discoveries of another hacker, usually a white or black hacker in order to gain access to systems and or secrets without knowledge of what they are doing. –Usually causing damage to the system unintentionally – A Main focus of the media and societies fears

Hacker Derivatives Script Kiddies –Uses pre-made executable programs in order to gain access to a system, usually made by a white or black Hacker. (e.g SATAN) –Are a sub-culture of Hacker Derivative –A Major part of media sensalization of Hackers comes from this group (e.g Use of SATAN on the Pentagon’s accounting servers)

Hacker Code Mostly same code as before Believes that previous hackers have gone against the “code” Uses Information secrecy as a weapon

Language Language becomes more and more culturally significant for hackers Some believe that language is a form of technology and can be hacked in the same way –Plato –Knight Lightning –Mentor

Language Computer Lingo becomes standard Substitution of letters to form a hacker dialogue (e.g 3l1t3 means elite) Creation of derivative words (e.g uber) and use of unusual suffixes

Information BBS become more popular and hacker periodicals become synonymous with the rise of a well known handle Rise of the amount of technical guides released and even release of manifestos providing philosophies for Hackers (e.g The Hacker Manifesto, The Uni-Bomber Manifesto etc) TAP begins to publish more infrequently

PHRACK New Periodical released in 1985 by Knight Lightning First regularly published periodical to be distributed digitally Quickly became a Hacker Phenomenon Releases Technical guides, cultural news, significant events, hacker profiles and warnings Read by FBI, CIA, Microsoft, Apple –Look up the copyright incident OR ELSE!

PHRACK Articles are submitted by every day hackers and an editor selects which article will be published Harassed on multiple occasions by government officials –A violation of the First Amendment

Hacker v.3 Post late 90’s to today Not enough time to talk about them so HOMEWORK!!