A rough framework on how I present this argument. Question 6: Hackers are the heroes of the 21st Century. Argue for or against this statement. Introduction
Description about hacker.
History ( When, Who, What, How)
Type & Technique of hack
Arguement
Why hacker are the heroes
Individual/ Group hacker
Cyber feminist
Will the hero being caught?
What punishment will they get?
Conclusion
Self opinion
How to decrease hacking cases happen
What government should do to prevent leakage of information
For my opinion, I generally thinks that the white hat hacker, David Kennedy is right, he encourage the Obama administration to take the Healthcare.gov offline until the privacy vulnerabilities are addressed and detection capabilities are improved. After testing, he says that hackers could use critical flaws to detach sensitive information like personal information. Government should make sure that websites which need user's personal information must be offline or fully protected to keep away from hackers because it either being aimed by hackers or will be take over soon. They have the responsibility to guarantee that the personal information collected by government is safe and fully secure. Although hackers are the heroes of the 21st century, but they are only hero for computer technology and they do not help everyone.
Eventually, I've
discussed about types of hack, techniques of hack, who is behind everything and
what is their motive. There's a question after all, which is, why they can
exist for a period and don't get caught by government? What is their punishment
if they were caught?
Here is the fact,
hackers exist everywhere in this virtual world and they have ordinary life like
normal people. Therefore, they were specified as the heroes of 21st century
because it is not easy to catch them by their appearance. However, hackers are
still being hunt for years. Government had warned them throughout a
cyber-attack and they try to control their movement so that the number leakage
information could be control and decrease. According to the U.S News, The
National Security Agency warns Anonymous Group to have the ability to control
their outage of cyber-attack. Cyber-criminal is a serious case especially when
it's related with leakage of private information. Once black hat hacker had
been caught, heavy punishment will be given such as penalty or jail for years.
In 2013, U.S, five hackers from Russia and Ukraine been arrested on charging
biggest cyber-crime data breach case. This costs the companies more than 300
million by stealing credit card numbers.
Previously, hacking used
to be a male's hobby while females have less relation with computer technology.
However, females are upgrading themselves year after years and soon they gets
more relation with computer technology and involves in some hacking cases. They
are minority female group that have relation with social hacking cases, cyber
feminist. At first, most of the people don't believes that woman could be a
hacker although they join the group meeting because they believe that woman
only involve in hacking-crime or else, there must be a boy telling them how
exciting it was. Until then, it was an urban myth of 80's and 90's that woman involve in the
political dimension.
Cyber feminist
Gail Thackeray, a women hacker who is one of the members
of Special Counsel for Technology Crimes. She builds a computer crime unit
and hated by hacking community because defeating the early 90's hackers.
Reputation and money is the reason why she was an expert in computer
technology system. She explains that, most people hack in computer games
to assume control the system but never get caught because seldom people is
working on this. In the real world, most of the hackers are using tools
that have been created.
Susan Thunder, a cyberpunk and also a member of Roscoe
in early 80's. She has an impressive capability which is feel other people
physically, besides she is a specialist in armed force computers. First,
Roscoe hacked the telephone system to make free calls and tap into
people's call. Susan was attracted with computers that contain primal and
private information about armed force project. Later, she quit hacking
activities and became a security adviser. After she demonstrate her
talents and the ability of hack a system in twenty minutes, she quit
everything about computer and telephone system then starts up a career as
a professional poker player.
These two women show
that women do not have any self-motivation to break into computer system other
than money, or affected by people. It is also important that, women should perform cyber feminist thinking on social and political realities. However, it was false that women don't have motivation to hack. Minority of them spend their time like the males, spending most of their time on social life than rest.
Mohri Yuko is a Japanese artist from Kanagawa, lives and works at Tokyo, 1980. Mohri is a mixed media artist who combines kinetic sculpture, sound, light or any found materials. She uses those mixed media to do installation that specific on physical phenomena to show the relation between artifact and nature.
Here is one of her group sound installation work,Vexations, with Soichiro Mihara, in year 2005. Vexation is a product from the mixed of computer, printer, speaker and etc. They both get inspiration from the original vexation by Eric Satie. It produces sound around the area by computer technology that makes loop which includes audial, sonic, noise and musical parameter. This work had won awards in year 2006, Prix Arts Electronica and Transmediale award. It attracts people by the sound and curiosity of how and where the sound come from.
Vexation- 2005 by Mohri Yuko & Soichiro Mihara
Besides, there's also another interesting project of Mohri Yuko, I/ O, 2011 which includes bell- lyras, duster, roll paper, bamboo charcoal, and etc. It is an installation work that can change shape and movement that depends on the environment condition and creates organic Eco system. I/O is to show how the object create catching the space and creates organic environment.
There was an international hacker group, called Anonymous. They masked themselves and do not reveals their identity as a hacker. They create unlimited access to information, corporate activities, transparency in government and develop freedom of speech. This Anonymous group involves in hacking cases since 2011 and help people to get into internet and cut off government. There were also an open group in a social website for everyone to share and chat about hack.
However, Anonymous's hacker quit the group and reveals his identity. According to the hacker's post, saying that he thought Anonymous was helping people but through out the years, everything has change, they receive comments that they are not helping anyone but hurting themselves. Some even say that they were cyber-attack.
During the past, hacking used to be an individual to a company or any computer systems case. After years, hackers used to cooperate with each other to form a group whereas most of the hackers wanted to improves skill and they believe that the code should be open to public. Most of them found out that when they do it in group, it's not only for learning but fun.
Double S Time
Sleep and Social time is the main reason why number of hackers increasing recently. In the past, people used to sleep early because they need to work next day, but recently people used to have less sleeping time yet they spend majority of their time on social life than usual to learn new things or discover more and some even earn part time money. Therefore, hackers are primitive community nowadays. When a professional code hacker combines with another professional hacker, it might produce a professional group that able to hack in a short time with an easier way. The best things when hackers forms into group are, they can recognize good idea from others and yet they can combine each other skills to create powerful hacking group. By these, positions of hackers are becoming more and more stable in the global because there are more newbie hacker individual and groups.
There are numerous techniques of hack. Key logger, computer worm and computer virus is the main hacking techniques that happen nowadays.
Key Loggers
Key logger is a tool to record every keystroke on an damaged machine for restoration. The purpose of key loggers is to allow the user to gain access to restricted information typed on the machine like user password and further private data. Virus-, trojan- and rootkit- are the methods that used by some key loggers to stay active but invisible. Nevertheless, some key loggers used legitimate ways or enhance computer security.
Computer Worm
Computer worm is kind of virus for self- replicating program that generate through computer networks without user intervention.
Computer Virus
It is also a self-replicating program that develops by placing copies of itself into other inconceivable code or documents. Thus, the viruses develop like biological virus whereby inserting itself into living cells.
There will be more new hacking techniques appear as new machinery products were made and hacking techniques are non-stop upgrading to creep into one medium. Lately, there's even a hack in cables that majority happens in modem. Ryan Harris, a cable-modem hacker reveals the method of hacking firmware by uncapped a cable modem to let the user to remove bandwidth filters imposed to increase the speed of modem and get free service.
Sources:
Hacker (computer security) - Wikipedia, the free encyclopedia. 2014. Hacker (computer security) - Wikipedia, the free encyclopedia. [ONLINE] Available at: http://en.wikipedia.org/wiki/Hacker_(computer_security) [Accessed: 13rd December 2013]
Alleged Accomplice of Accused Cable-modem Hacker Testifies Against Him. Threat Level. Wired.com. 2014. Alleged Accomplice of Accused Cable-modem Hacker Testifies Against Him. Threat Level. Wired.com. [ONLINE] Available at: http://www.wired.com/threatlevel/2012/02/ryan-harris-trial/ [Accessed: 15th January 2014]
Each of everything has its negative and positive sides. Nevertheless, not all hackers are bad and not all of them are trying to hack for negative reason, some of them are good too. Every hacker has a motivation for them about what they do and why they do. They were differentiate into color of hats. Here are two main types, which are black and white.
White Hat
A white hat hacker is a computer security experts who breaks into security for harmless reasons like, testing their security while working for a security software company. They are the professional IT security who help the society to secure from hacking by creating or upgrading firewall softwares. Example of softwares are Kaspersky and Asterisk. Therefore, they are the good hacker.
Black Hat
Black hacker also known as "cracker" is a plain hacker who breaks into computer network or creates computer viruses. These bad people apply patches to fix the system so that they can keep control the systems. They are the criminal hacker who hack purposely just to get paid.
It has been a century since hacking cases exist around the global. Hackers is a busy job in the past 35 years as some teenagers hack the authorities of a brand new phone system in 1870's.
In the early 1960's, large mainframe computers like MIT's artificial intelligence lab are staging the ground for hackers. A person with a mastery of computers who could push program farther than what they were asked to do.
Youth International Party Line (YIPL) is a technical program that help phone hackers to make long-distance phone calls. John Draker, a legendary computer programmer and also a former phone phreak, makes a long- distance phone call for free by blowing a clear-cut tone into the phone to open the phone line. After that, he has been known as "Captain Crunch" when he discovered the whistle as a gift in a children's cereal in 1970's.
John Draker makes long-distance phone call
Captain Crunch
After 1990's, hackers succeed to break into federal websites, includes U.S Department of Justice, U.S Air Force, CIA, NASA and etc. Soon, anti- hacker commercial runs as Network Associate ads. In year 1998, National Infrastructure Protection Center accepted a mission from U.S Justice Department to support the society telecommunication, machinery and shipment system from hackers.