Jump to content

Hacker: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
No edit summary
m Reverted 1 edit by Shyguy100 identified as vandalism to last revision by Echuck215. using TW
Line 2: Line 2:


{{Copyedit|article|date=May 2007}}
{{Copyedit|article|date=May 2007}}
'''Hacker''', as it relates to computers, has several common meanings. Hacker is often used by the [[mass media]] to refer to a person who engages in [[Hacker (computer security)|computer cracking]] and is also often by those in [[computer|computing]] fields to refer to a person who is a computer enthusiast. At least three major hacker subcultures, characterized by their largely distinct historical development, use the term in their [[jargon]] for self-identification.<ref>http://webzone.k3.mah.se/k3jolo/HackerCultures/origins.htm</ref> They are centered around different, but partially overlapping aspects of computers and have conflicting ideas about who may legitimately be called a hacker (see [[hacker definition controversy]]). In computer security, a hacker is someone who focuses on security mechanisms. In common use, which was popularized by the mass media, that refers to someone who illegally breaks into computer and network systems. However, parts of the subculture see their aim in correcting security problems and use the word in a positive sense. This use is contrasted by the different understanding of the word as a person who follows a spirit of playful cleverness and loves programming. It is found in an originally academic movement unrelated to computer security and most visibly associated with [[free software]] and [[open source]]. In a third meaning, the term refers to computer hobbyists who push the limits of their software or hardware.
'''g00ns''', now g00ns will try to piss you of by sayin you got "owned" as a form of speech, a shitty form of speech that only gets a point that there inmature kids that have no life except think there gettin throw to the masses wih there "hacking" they think the internet is theres for the taking, and its all wronge, by the way, why the fuck would you hack waytoomany.com, there a weed and alcohol site. how did they piss u off?! fuckin idiots.

fuck z3r0, hes a fag. WAHAH MOTHA FUCKA.
==Computer security hackers==
{{main|Hacker (computer security)}}

In [[computer security]], a hacker is a person who specializes in work with the security mechanisms for computer and network systems. The subculture around such hackers is termed network hacker subculture, hacker scene or computer underground. While including those who endeavor to strengthen such mechanisms, it is more often used by the [[mass media]] and popular culture to refer to those who seek access despite these security measures. Accordingly, the term bears strong connotations that may be favorable or pejorative.

The network hacker subculture initially developed by callum context of [[phreaking]] during the 1960s and the microcomputer [[Bulletin board system|BBS scene]] of the 1980s. It is implicated with ''[[2600: The Hacker Quarterly]]'' and the ''[[alt.2600]]'' newsgroup.

By [[1983]], hacking in the sense of breaking computer security had already been in use as computer jargon,<ref>See the [http://www.catb.org/jargon/oldversions/jarg1-81-MM-DD.txt 1981 version of the ''Jargon File''], entry "hacker", last meaning.</ref> but there was no public awareness about such activities.<ref>{{cite paper|title=Computer hacking: Where did it begin and how did it grow?|publisher=WindowSecurity.com|date=Oct 16, 2002|url=http://www.windowsecurity.com/whitepapers/Computer_hacking_Where_did_it_begin_and_how_did_it_grow_.html}}</ref> However, the release of the movie ''[[WarGames]]'' that year raised the public belief that computer security hackers (especially teenagers) could be a threat to national security. This concern became real when a gang of teenage hackers in [[Milwaukee, Wisconsin]] known as [[The 414s]] broke into computer systems throughout the [[United States]] and [[Canada]], including those of [[Los Alamos National Laboratory]], [[Memorial Sloan-Kettering Cancer Center|Sloan-Kettering Cancer Center]] and [[Security Pacific Bank]]. The case quickly grew media attention<ref>{{Citation|newspaper=[[Detroit Free Press]]|year=1983|date=September 27, 1983}}</ref><ref>{{Citation|last=Elmer-DeWitt|first=Philip|title=The 414 Gang Strikes Again|newspaper=[[Time magazine]]|pages=p. 75|year=1983|date=Aug. 29, 1983|url=http://www.time.com/time/magazine/article/0,9171,949797,00.html}}</ref>, and 17-year-old Neal Patrick emerged as the spokesman for the gang, including a cover story in ''[[Newsweek]]'' entitled "Beware: Hackers at play", with Patrick's photograph on the cover. <ref>{{Citation|title=Beware: Hackers at play|newspaper=[[Newsweek]]|pages=pp. 42-46,48|year=1983|date=September 5, 1983}}</ref> The Newsweek article appears to be the first use of the word ''hacker'' by the mainstream media in the pejorative sense.

As a result of news coverage, congressman [[Dan Glickman]] called for an investigation and new laws about computer hacking. <ref>{{cite web|publisher=Washington Post|url=http://www.washingtonpost.com/wp-dyn/articles/A50606-2002Jun26.html|year=2002|accessdate=2006-04-14|title=Timeline: The U.S. Government and Cybersecurity}}</ref>
Neal Patrick testified before the [[U.S. House of Representatives]] on [[September 26]] [[1983]] about the dangers of computer hacking, and six bills concerning computer crime were introduced in the House that year. <ref>David Bailey, "Attacks on Computers: Congressional Hearings and Pending Legislation," sp, p. 180, 1984 IEEE Symposium on Security and Privacy, 1984.</ref> As a result of these laws against computer criminality, [[white hat]], [[grey hat]] and [[black hat]] hackers try to distinguish themselves from each other, depending on the legality of their activities.

Computer pioneer [[Ken Thompson]] reflected on the above events during his 1983 [[Turing Award]] lecture. Thompson noted that it is possible to add code to the [[UNIX]] "login" command that would accept either the intended encrypted [[password]] or a particular known password, allowing a back door into the system with the latter password. He named his invention the "[[Trojan horse (computing)|Trojan horse]]." Furthermore, Thompson argued, the [[Compiler|C compiler]] itself could be modified to automatically generate the rogue code, to make detecting the modification even harder. Because the compiler is itself a program generated from a compiler, the Trojan horse could also be automatically installed in a new compiler program, without any detectable modification to the source of the new compiler. Yet Thompson also chastised the press in his lecture: "I would like to criticize the press in its handling of the 'hackers,' the 414 gang, the Dalton gang, etc. The acts performed by these kids are vandalism at best and probably trespass and theft at worst. ... I have watched kids testifying before Congress. It is clear that they are completely unaware of the seriousness of their acts." <ref>{{cite conference|first=Ken|last=Thompson|title=Reflections on Trusting Trust|booktitle=1983 Turing Award Lecture|publisher=[[ACM]]|date=October 1983|url=http://www.acm.org/awards/article/a1983-thompson.pdf|format=[[PDF]]}}</ref>

===Personalities===
*[[Loyd Blankenship]] (also known as [[The Mentor]]) &mdash; Former [[Legion of Doom (hacking)|LOD]] member. Author of [[Hacker Manifesto|The Conscience of a Hacker (Hacker's Manifesto)]].

*[[Eric Gorden Corley|Eric Corley]] (also known as [[Emmanuel Goldstein]]) &mdash; Long standing publisher of [[2600 The Hacker Quarterly|2600: The Hacker Quarterly]] and founder of the [[H.O.P.E.]] conferences. He has been part of the hacker community since the late '70s.

*[[Cult of the Dead Cow|CULT OF THE DEAD COW]] &mdash; A high profile hacker group that has both made news and been consulted by the media on numerous occasions.

*[[Brian Dorsett]] &mdash; Reverse-engineered the [[NDS Group|NDS]] satellite access smartcard known as the [[DirecTV#Access card history|HU card]]. Currently imprisoned at [[Federal Detention Center, Miami|Miami FDC]]. Records a daily podcast from prison titled {{dlw-inline|http://bdorsett.mypodcast.com/|title=Prisoncast|date=June 2007}}

* [[Patrick K. Kroupa]] (also known as [[Lord Digital]]) &mdash; Former [[Legion of Doom (hacking)|LOD]] member, co-founder of [[MindVox]], author of Phantom Access programs, and MindVox: The Overture. Appears in over 20 books and hundreds of media and press articles.

*[[Gary McKinnon]] &mdash; accused of hacking into 97 [[Military of the United States|United States military]] and [[NASA]] computers in 2001 and 2002 . [http://news.bbc.co.uk/1/hi/technology/4757375.stm]

*[[Kevin Mitnick]] &mdash; A former computer criminal who now (since his release from prison in 2000) speaks, consults, and authors books about [[social engineering (security)|social engineering]] and network security.

*Neal Patrick and [[The 414s]] &mdash; teenage hackers who gained brief but widespread media coverage in [[1983]].

==Academic hackers==
{{main|Hacker (academia)}}

In the academic hacker culture, a computer hacker is a person who enjoys designing software and building programs with a sense for aesthetics and playful cleverness.

According to [[Eric S. Raymond]],<ref>Eric S. Raymond: [http://www.catb.org/~esr/writings/hacker-history/hacker-history.html A Brief History of Hackerdom] (2000)</ref> the academic hacker subculture developed in the 1960s among hackers working on early [[minicomputer]]s in academic [[computer science]] environments. After 1969 it fused with the technical culture of the pioneers of the [[Internet]]. One [[PDP-10]] machine at [[MIT]] connected to the Internet provided an early hacker meeting point. It was called AI and ran [[Incompatible Timesharing System|ITS]]. After 1980 the subculture coalesced with the culture of [[Unix]], and after 1987 with elements of the early [[microcomputer]] hobbyists that themselves had connections to radio amateurs in the 1920s. Since the mid-1990s, it has been largely coincident with what is now called the [[free software movement]] and the [[open source movement]].

Many programmers have been labeled "great hackers,"<ref>{{cite web | url=http://www.paulgraham.com/gh.html | title=Great Hackers | author=[[Paul Graham|Graham, Paul]] | year=2004}}</ref> but the specifics of who that label applies to is a matter of opinion. Certainly major contributors to [[computer science]] such as [[Edsger Dijkstra]] and [[Donald Knuth]], as well as the inventors of popular software such as [[Linus Torvalds]] ([[Linux]]), and [[Dennis Ritchie]] and [[Ken Thompson (computer programmer)|Ken Thompson]] (the [[C (programming language)|C programming language]]) are likely to be included in any such list; see also [[List of programmers]]. People primarily known for their contributions to the consciousness of the academic hacker culture include [[Richard Stallman]], the founder of the free software movement and the [[GNU project]], president of the [[Free Software Foundation]] and author of the famous [[Emacs]] text editor as well as the [[GNU Compiler Collection|GNU Compiler Collection (GCC)]], and [[Eric S. Raymond]], one of the founders of the [[Open Source Initiative]] and writer of the famous text [[The Cathedral and the Bazaar]] and many other essays, maintainer of the [[Jargon File]] (which was previously maintained by [[Guy L. Steele, Jr.]]).

Within the academic hacker culture, the term hacker is also used for a programmer who reaches a goal by employing a series of modifications to extend existing [[source code|code]] or resources. In this sense, it can have a negative connotation of using [[kludge]]s to accomplish programming tasks that are ugly, inelegant, and inefficient. This derogatory form of the noun "[[Hack (technology slang)|hack]]" is even used among users of the positive sense of "hacker" (some argue that it should not be, due to this negative meaning; others argue that some kludges can, for all their ugliness and imperfection, still have "hack value"). In a very universal sense, a hacker also means someone who makes things work beyond perceived limits in a clever way in general, for example [[reality hacker]]s.<ref>See for example the [http://hacks.mit.edu/ MIT Gallery of Hacks]</ref>

===Personalities===
*[[Bruce Perens]] &mdash; one of the founders of the [[Open Source Initiative]]. He was the former [[Debian GNU/Linux]] Project Leader, and is the primary author of the [[Open Source Definition]].

*[[Eric S. Raymond]] &mdash; also one of the founders of the [[Open Source Initiative]]. He wrote the famous text [[The Cathedral and the Bazaar]] and many other essays. He also maintains the [[Jargon File]] for the [[Hacker culture]], which was previously maintained by [[Guy L. Steele, Jr.]].

*[[Richard Stallman]] &mdash; founder of the free software movement and the [[GNU project]], and president of the [[Free Software Foundation]]. Author of the famous [[Emacs]] text editor and the [[Gnu Compiler Collection]] (GCC).

==Hobby Hackers==
{{main|Hacker (hobbyist)}}

The hobby hacking subculture relates to hobbyist home computing of the late 1970s, beginning with the availability of [[MITS Altair]]. An influential organization was the [[Homebrew Computer Club]].

The parts that didn't fuse with the academic hacker subculture focus mainly on commercial [[Video game|computer and video games]], [[software cracking]] and exceptional computer programming ([[demo scene]]), but also to the modification of computer hardware and other electronic devices, see [[modding]].

===Personalities===

*[[Steve Wozniak]] &mdash; Computer engineer who created the [[Apple I]] and [[Apple II series]] computers and, with [[Steve Jobs]], founded Apple Computer (now [[Apple Inc.]]). He is known in the hacker community as "Woz" or "The other Steve." Woz came up with some ingenious hardware hacks to bring those machines to completion. He also had a background in the network hacker subculture before this and did [[blue box]]ing.

*[[Bill Gates|William Henry Gates III]] (Bill Gates) &mdash; is the co-founder and chairman of [[Microsoft]] Corporation. Although he personally demonstrated considerable personal coding skill early in his company's history <ref>Article from The Register [http://www.theregister.co.uk/2001/05/15/could_bill_gates_write_code/]</ref><ref>Archive.org cache of discussion of Altair Basic source code [http://web.archive.org/web/20020102173701/http://www.rjh.org.uk/altair/ian.htm]</ref>, he is most widely recognizable today as the world's 2nd richest individual. Formerly CEO, in June 2006 he also stepped down as chief software architect, with the intention of stepping down as chairman in July 2008.<ref>Microsoft Press release June 2006 [http://www.microsoft.com/presspass/press/2006/jun06/06-15CorpNewsPR.mspx]</ref>

== Overlaps and differences ==
The main basic difference between academic and computer security hackers is their separate historical origin and development. The ''Jargon File'' reports that although considerable overlap existed for the early phreaking at the beginning of the 1970s, it quickly started to break when people joined in the activity who did it in a less responsible way.<ref>http://www.catb.org/~esr/jargon/html/P/phreaking.html</ref>

Academic hackers usually work openly and use their real name, while computer security hackers prefer secretive groups and identity-concealing aliases. Also, their activities in practice are largely distinct. The former focus on creating new and improving existing infrastructure (especially the software environment they work with), while the latter primarily and strongly emphasize the general act of circumvention of security measures, with the effective use of the knowledge (which can be to report and help fixing the security bugs, or exploitation for criminal purpose) being only rather secondary. The most visible difference in these views was in the design of the MIT hackers' [[Incompatible Timesharing System]], which deliberately didn't have any security measures.

There are some subtle overlaps, however, since basic knowledge about computer security is also common within the academic hacker community. It sees secondary circumvention of security mechanisms as legitimate if it is done to get practical barriers out of the way for doing actual work. In special forms, that can even be an expression of playful cleverness.<ref>http://gnu.mirrorspace.org/philosophy/rms-hack.html</ref> However, the systematic and primary engagement in such activities is not one of one of the actual interests of the academic hacker subculture and it doesn't have significance in its actual activities, either.<ref>http://www.catb.org/~esr/jargon/html/C/cracker.html</ref> A further difference is that, historically, academic hackers were working at academic institutions and used the computing environment there. In contrast, the prototypical computer security hacker had access exclusively to a home computer and a modem.

Since the mid-1980s, there are some overlaps in ideas and members with the computer security hacking community. The most prominent case is Robert T. Morris, who was a user of MIT-AI, yet wrote the [[Morris worm]]. The ''Jargon File'' hence calls him "a true hacker who blundered".[http://www.catb.org/jargon/html/pt03.html#bibliography] Nevertheless, members of the academic subculture have a tendency to look down and disassociate from these overlaps. They commonly refer disparagingly to people in the computer security subculture as crackers, and refuse to accept any definition of hacker that encompasses such activities (see the [[Hacker definition controversy]]). The computer security hacking subculture on the other hand tends not to distinguish between the two subcultures as harshly, instead acknowledging that they have much in common including many members, political and social goals, and a love of learning about technology. They restrict the use of the term cracker to their categories of [[script kiddie]]s and [[black hat]] hackers instead.

There is also overlap into the other direction. Since the mid-1990s, with home computers that could run Unix-like operating systems and with inexpensive internet home access being available for the first time, many people from outside of the academic world started to take part in the academic hacking subculture.

All three subcultures have relations to hardware modifications. In the early days of network hacking, phreaks were building [[blue box]]es and various variants. The academic hacker culture has stories about several hardware hacks in its folklore, such as a mysterious 'magic' switch attached to a PDP-10 computer in MIT's AI lab, that, when turned off, crashed the computer.<ref>http://www.catb.org/~esr/jargon/html/magic-story.html</ref> The early hobbyist hackers built their home computers themselves, from construction kits. However, all these activities have died out during the 1980s, when the phone network switched to digitally controlled switchboards, causing network hacking to shift to dialling remote computers with modems, when preassembled inexpensive home computers were available, and when academic institutions started to give individual mass-produced workstation computers to scientists instead of using a central timesharing system. The only kind of widespread hardware modification nowadays is [[case modding]].

An encounter of the academic and the computer security hacker subculture occurred at the end of the 1980s, when a group of hackers, sympathizing with the Chaos Computer Club (who disclaimed any knowledge in these activities), broke into computers of American military organizations and academic institutions. They sold data from these machines to the Soviet secret service, one of them in order to fund his drug addiction. The case could be solved when scientists from the environment of the academic hacker subculture found ways to log the attacks and to trace them back. ''[[23 (film)|23]]'', a German film adaption with ficitional elements, shows the events from the attackers' perspective. [[Clifford Stoll]], one of the system administrators who helped to catch them, described the case in his book ''[[The Cuckoo's Egg (book)|The Cuckoo's Egg]]'' and in the TV documentary ''The KGB, the Computer, and Me'' from the other perspective.

== See also ==
* [[Hack (technology)]]
* [[:Category:Computer hacking]]
*[[History of free software]]

== References ==
{{reflist}}

== Related books ==
;Computer security hacking
<div class="references-small">
* Logik Bomb: [http://insecure.org/stf/hackenc.txt Hacker's Encyclopedia] (1997)
* {{cite book | authorlink = Bruce Sterling | last = Sterling | first = Bruce | url = http://www.mit.edu/hacker/hacker.html | title = The Hacker Crackdown | year = 1992 | id = ISBN 0-553-08058-X | publisher = Bantam }}
* {{cite book | last = Slatalla | first = Michelle | coauthors = Joshua Quittner | title = [[Masters of Deception]]: The Gang That Ruled Cyberspace | year = 1995 | id = ISBN 0-06-017030-1 | publisher = HarperCollins }}
* {{cite book | last = Dreyfus | first = Suelette | url = http://www.underground-book.com/ | title = Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier | year = 1997 | id = ISBN 1-86330-595-5 | publisher = Mandarin }}
* {{cite book | last = Verton | first = Dan | title = The Hacker Diaries : Confessions of Teenage Hackers | year = 2002 | id = ISBN 0-07-222364-2 | publisher = McGraw-Hill Osborne Media }}
</div>

;Academic hacking
<div class="references-small">
* Eric S. Raymond, Guy L. Steele (Eds.): ''[[Jargon File|The New Hacker's Dictionary]]'' (The MIT Press, 1996), ISBN 0262680920
* {{cite book | authorlink = Steven Levy | last = Levy | first = Steven | title = [[Hackers: Heroes of the Computer Revolution]] | year = 1984 | id = ISBN 0-385-19195-2 | publisher = Doubleday }}
*[[Sherry Turkle|Turkle, Sherry]] (1984),''The Second Self: Computers and the Human Spirit'' , New Edition: MIT Press 2005, ISBN 0262701111
* {{cite book | autherlink = Paul Graham | last = Graham | first = Paul | title = [[Hackers and Painters]] | year = 2004 | id = ISBN 0-59-600662-4 }}
</div>

==External links==
{{Sisterlinks|Hacker}}
* [http://chaosradio.ccc.de/cri011.html Interview with Steven Levy]: About the different hacker subcultures and their relations.
* [http://www.paulgraham.com/gba.html The Word "Hacker"]
* [http://www.xakep.ru/ Russian magazine "Hacker"]

;Computer security hacking
*[http://www.casoabierto.com/Actualidad/Reportajes/The-Ten-Biggest-Legends-of-the-Hacker-Universe.html The Ten Biggest Legends of the Hacker Universe]
* [http://web.archive.org/web/20010708111438/http://www.claws-and-paws.com/personal/hacking/17steps.shtml Hacking in 17 easy steps], by Doug Mclean.

;Academic hacking
*[http://www.softpanorama.org/People/index.shtml Portraits of Open Source Pioneers]
*[http://www.catb.org/~esr/faqs/hacker-howto.html How To Become A Hacker] by [[Eric S. Raymond]]
*[http://gnu.mirrorspace.org/philosophy/rms-hack.html The Hacker Community and Ethics]: An interview with [[Richard Stallman|Richard M. Stallman]], 2002
[[Category:Computer hacking]]
[[Category:Computing culture]]

[[ar:قرصان الحاسوب]]
[[ast:Hacker]]
[[az:Haker]]
[[bs:Hacker]]
[[ca:Hacker]]
[[cs:Hacker]]
[[da:Hacker]]
[[de:Hacker]]
[[et:Häkker]]
[[es:Hacker]]
[[eo:Kodumulo]]
[[eu:Hacker]]
[[fa:هکر]]
[[fr:Hacker]]
[[gl:Hacker]]
[[ko:해커]]
[[id:Peretas]]
[[it:Hacker]]
[[he:האקר]]
[[ka:ჰაკერი]]
[[lt:Hakeris]]
[[hu:Hacker]]
[[nl:Hacker]]
[[ja:ハッカー]]
[[no:Hacker]]
[[pl:Haker (slang komputerowy)]]
[[pt:Hacker]]
[[ru:Хакер]]
[[simple:Hacker]]
[[sk:Hacker]]
[[sl:Heker]]
[[sr:Хакер]]
[[fi:Hakkeri]]
[[sv:Hackare]]
[[th:แฮกเกอร์]]
[[vi:Hacker]]
[[tr:Hacker]]
[[uk:Гакер]]
[[yi:העקער]]
[[zh:黑客]]

Revision as of 04:13, 22 July 2007

Hacker, as it relates to computers, has several common meanings. Hacker is often used by the mass media to refer to a person who engages in computer cracking and is also often by those in computing fields to refer to a person who is a computer enthusiast. At least three major hacker subcultures, characterized by their largely distinct historical development, use the term in their jargon for self-identification.[1] They are centered around different, but partially overlapping aspects of computers and have conflicting ideas about who may legitimately be called a hacker (see hacker definition controversy). In computer security, a hacker is someone who focuses on security mechanisms. In common use, which was popularized by the mass media, that refers to someone who illegally breaks into computer and network systems. However, parts of the subculture see their aim in correcting security problems and use the word in a positive sense. This use is contrasted by the different understanding of the word as a person who follows a spirit of playful cleverness and loves programming. It is found in an originally academic movement unrelated to computer security and most visibly associated with free software and open source. In a third meaning, the term refers to computer hobbyists who push the limits of their software or hardware.

Computer security hackers

In computer security, a hacker is a person who specializes in work with the security mechanisms for computer and network systems. The subculture around such hackers is termed network hacker subculture, hacker scene or computer underground. While including those who endeavor to strengthen such mechanisms, it is more often used by the mass media and popular culture to refer to those who seek access despite these security measures. Accordingly, the term bears strong connotations that may be favorable or pejorative.

The network hacker subculture initially developed by callum context of phreaking during the 1960s and the microcomputer BBS scene of the 1980s. It is implicated with 2600: The Hacker Quarterly and the alt.2600 newsgroup.

By 1983, hacking in the sense of breaking computer security had already been in use as computer jargon,[2] but there was no public awareness about such activities.[3] However, the release of the movie WarGames that year raised the public belief that computer security hackers (especially teenagers) could be a threat to national security. This concern became real when a gang of teenage hackers in Milwaukee, Wisconsin known as The 414s broke into computer systems throughout the United States and Canada, including those of Los Alamos National Laboratory, Sloan-Kettering Cancer Center and Security Pacific Bank. The case quickly grew media attention[4][5], and 17-year-old Neal Patrick emerged as the spokesman for the gang, including a cover story in Newsweek entitled "Beware: Hackers at play", with Patrick's photograph on the cover. [6] The Newsweek article appears to be the first use of the word hacker by the mainstream media in the pejorative sense.

As a result of news coverage, congressman Dan Glickman called for an investigation and new laws about computer hacking. [7] Neal Patrick testified before the U.S. House of Representatives on September 26 1983 about the dangers of computer hacking, and six bills concerning computer crime were introduced in the House that year. [8] As a result of these laws against computer criminality, white hat, grey hat and black hat hackers try to distinguish themselves from each other, depending on the legality of their activities.

Computer pioneer Ken Thompson reflected on the above events during his 1983 Turing Award lecture. Thompson noted that it is possible to add code to the UNIX "login" command that would accept either the intended encrypted password or a particular known password, allowing a back door into the system with the latter password. He named his invention the "Trojan horse." Furthermore, Thompson argued, the C compiler itself could be modified to automatically generate the rogue code, to make detecting the modification even harder. Because the compiler is itself a program generated from a compiler, the Trojan horse could also be automatically installed in a new compiler program, without any detectable modification to the source of the new compiler. Yet Thompson also chastised the press in his lecture: "I would like to criticize the press in its handling of the 'hackers,' the 414 gang, the Dalton gang, etc. The acts performed by these kids are vandalism at best and probably trespass and theft at worst. ... I have watched kids testifying before Congress. It is clear that they are completely unaware of the seriousness of their acts." [9]

Personalities

  • CULT OF THE DEAD COW — A high profile hacker group that has both made news and been consulted by the media on numerous occasions.
  • Patrick K. Kroupa (also known as Lord Digital) — Former LOD member, co-founder of MindVox, author of Phantom Access programs, and MindVox: The Overture. Appears in over 20 books and hundreds of media and press articles.
  • Kevin Mitnick — A former computer criminal who now (since his release from prison in 2000) speaks, consults, and authors books about social engineering and network security.
  • Neal Patrick and The 414s — teenage hackers who gained brief but widespread media coverage in 1983.

Academic hackers

In the academic hacker culture, a computer hacker is a person who enjoys designing software and building programs with a sense for aesthetics and playful cleverness.

According to Eric S. Raymond,[10] the academic hacker subculture developed in the 1960s among hackers working on early minicomputers in academic computer science environments. After 1969 it fused with the technical culture of the pioneers of the Internet. One PDP-10 machine at MIT connected to the Internet provided an early hacker meeting point. It was called AI and ran ITS. After 1980 the subculture coalesced with the culture of Unix, and after 1987 with elements of the early microcomputer hobbyists that themselves had connections to radio amateurs in the 1920s. Since the mid-1990s, it has been largely coincident with what is now called the free software movement and the open source movement.

Many programmers have been labeled "great hackers,"[11] but the specifics of who that label applies to is a matter of opinion. Certainly major contributors to computer science such as Edsger Dijkstra and Donald Knuth, as well as the inventors of popular software such as Linus Torvalds (Linux), and Dennis Ritchie and Ken Thompson (the C programming language) are likely to be included in any such list; see also List of programmers. People primarily known for their contributions to the consciousness of the academic hacker culture include Richard Stallman, the founder of the free software movement and the GNU project, president of the Free Software Foundation and author of the famous Emacs text editor as well as the GNU Compiler Collection (GCC), and Eric S. Raymond, one of the founders of the Open Source Initiative and writer of the famous text The Cathedral and the Bazaar and many other essays, maintainer of the Jargon File (which was previously maintained by Guy L. Steele, Jr.).

Within the academic hacker culture, the term hacker is also used for a programmer who reaches a goal by employing a series of modifications to extend existing code or resources. In this sense, it can have a negative connotation of using kludges to accomplish programming tasks that are ugly, inelegant, and inefficient. This derogatory form of the noun "hack" is even used among users of the positive sense of "hacker" (some argue that it should not be, due to this negative meaning; others argue that some kludges can, for all their ugliness and imperfection, still have "hack value"). In a very universal sense, a hacker also means someone who makes things work beyond perceived limits in a clever way in general, for example reality hackers.[12]

Personalities

Hobby Hackers

The hobby hacking subculture relates to hobbyist home computing of the late 1970s, beginning with the availability of MITS Altair. An influential organization was the Homebrew Computer Club.

The parts that didn't fuse with the academic hacker subculture focus mainly on commercial computer and video games, software cracking and exceptional computer programming (demo scene), but also to the modification of computer hardware and other electronic devices, see modding.

Personalities

  • Steve Wozniak — Computer engineer who created the Apple I and Apple II series computers and, with Steve Jobs, founded Apple Computer (now Apple Inc.). He is known in the hacker community as "Woz" or "The other Steve." Woz came up with some ingenious hardware hacks to bring those machines to completion. He also had a background in the network hacker subculture before this and did blue boxing.
  • William Henry Gates III (Bill Gates) — is the co-founder and chairman of Microsoft Corporation. Although he personally demonstrated considerable personal coding skill early in his company's history [13][14], he is most widely recognizable today as the world's 2nd richest individual. Formerly CEO, in June 2006 he also stepped down as chief software architect, with the intention of stepping down as chairman in July 2008.[15]

Overlaps and differences

The main basic difference between academic and computer security hackers is their separate historical origin and development. The Jargon File reports that although considerable overlap existed for the early phreaking at the beginning of the 1970s, it quickly started to break when people joined in the activity who did it in a less responsible way.[16]

Academic hackers usually work openly and use their real name, while computer security hackers prefer secretive groups and identity-concealing aliases. Also, their activities in practice are largely distinct. The former focus on creating new and improving existing infrastructure (especially the software environment they work with), while the latter primarily and strongly emphasize the general act of circumvention of security measures, with the effective use of the knowledge (which can be to report and help fixing the security bugs, or exploitation for criminal purpose) being only rather secondary. The most visible difference in these views was in the design of the MIT hackers' Incompatible Timesharing System, which deliberately didn't have any security measures.

There are some subtle overlaps, however, since basic knowledge about computer security is also common within the academic hacker community. It sees secondary circumvention of security mechanisms as legitimate if it is done to get practical barriers out of the way for doing actual work. In special forms, that can even be an expression of playful cleverness.[17] However, the systematic and primary engagement in such activities is not one of one of the actual interests of the academic hacker subculture and it doesn't have significance in its actual activities, either.[18] A further difference is that, historically, academic hackers were working at academic institutions and used the computing environment there. In contrast, the prototypical computer security hacker had access exclusively to a home computer and a modem.

Since the mid-1980s, there are some overlaps in ideas and members with the computer security hacking community. The most prominent case is Robert T. Morris, who was a user of MIT-AI, yet wrote the Morris worm. The Jargon File hence calls him "a true hacker who blundered".[5] Nevertheless, members of the academic subculture have a tendency to look down and disassociate from these overlaps. They commonly refer disparagingly to people in the computer security subculture as crackers, and refuse to accept any definition of hacker that encompasses such activities (see the Hacker definition controversy). The computer security hacking subculture on the other hand tends not to distinguish between the two subcultures as harshly, instead acknowledging that they have much in common including many members, political and social goals, and a love of learning about technology. They restrict the use of the term cracker to their categories of script kiddies and black hat hackers instead.

There is also overlap into the other direction. Since the mid-1990s, with home computers that could run Unix-like operating systems and with inexpensive internet home access being available for the first time, many people from outside of the academic world started to take part in the academic hacking subculture.

All three subcultures have relations to hardware modifications. In the early days of network hacking, phreaks were building blue boxes and various variants. The academic hacker culture has stories about several hardware hacks in its folklore, such as a mysterious 'magic' switch attached to a PDP-10 computer in MIT's AI lab, that, when turned off, crashed the computer.[19] The early hobbyist hackers built their home computers themselves, from construction kits. However, all these activities have died out during the 1980s, when the phone network switched to digitally controlled switchboards, causing network hacking to shift to dialling remote computers with modems, when preassembled inexpensive home computers were available, and when academic institutions started to give individual mass-produced workstation computers to scientists instead of using a central timesharing system. The only kind of widespread hardware modification nowadays is case modding.

An encounter of the academic and the computer security hacker subculture occurred at the end of the 1980s, when a group of hackers, sympathizing with the Chaos Computer Club (who disclaimed any knowledge in these activities), broke into computers of American military organizations and academic institutions. They sold data from these machines to the Soviet secret service, one of them in order to fund his drug addiction. The case could be solved when scientists from the environment of the academic hacker subculture found ways to log the attacks and to trace them back. 23, a German film adaption with ficitional elements, shows the events from the attackers' perspective. Clifford Stoll, one of the system administrators who helped to catch them, described the case in his book The Cuckoo's Egg and in the TV documentary The KGB, the Computer, and Me from the other perspective.

See also

References

  1. ^ http://webzone.k3.mah.se/k3jolo/HackerCultures/origins.htm
  2. ^ See the 1981 version of the Jargon File, entry "hacker", last meaning.
  3. ^ "Computer hacking: Where did it begin and how did it grow?". WindowSecurity.com. Oct 16, 2002. {{cite journal}}: Cite journal requires |journal= (help)
  4. ^ Detroit Free Press, September 27, 1983 {{citation}}: Missing or empty |title= (help)CS1 maint: date and year (link)
  5. ^ Elmer-DeWitt, Philip (Aug. 29, 1983), "The 414 Gang Strikes Again", Time magazine, pp. p. 75 {{citation}}: |pages= has extra text (help); Check date values in: |date= (help)CS1 maint: date and year (link)
  6. ^ "Beware: Hackers at play", Newsweek, pp. pp. 42-46, 48, September 5, 1983 {{citation}}: |pages= has extra text (help)CS1 maint: date and year (link)
  7. ^ "Timeline: The U.S. Government and Cybersecurity". Washington Post. 2002. Retrieved 2006-04-14.
  8. ^ David Bailey, "Attacks on Computers: Congressional Hearings and Pending Legislation," sp, p. 180, 1984 IEEE Symposium on Security and Privacy, 1984.
  9. ^ Thompson, Ken (October 1983). "Reflections on Trusting Trust" (PDF). 1983 Turing Award Lecture. ACM. {{cite conference}}: Unknown parameter |booktitle= ignored (|book-title= suggested) (help)
  10. ^ Eric S. Raymond: A Brief History of Hackerdom (2000)
  11. ^ Graham, Paul (2004). "Great Hackers".
  12. ^ See for example the MIT Gallery of Hacks
  13. ^ Article from The Register [1]
  14. ^ Archive.org cache of discussion of Altair Basic source code [2]
  15. ^ Microsoft Press release June 2006 [3]
  16. ^ http://www.catb.org/~esr/jargon/html/P/phreaking.html
  17. ^ http://gnu.mirrorspace.org/philosophy/rms-hack.html
  18. ^ http://www.catb.org/~esr/jargon/html/C/cracker.html
  19. ^ http://www.catb.org/~esr/jargon/html/magic-story.html
Computer security hacking
Academic hacking
Computer security hacking
Academic hacking