Sunday, 19 January 2014

Framework Proposal (Essay)

A rough framework on how I present this argument.
Question 6: Hackers are the heroes of the 21st Century. Argue for or against this statement.

Introduction

  •  Description about hacker. 
  •  History ( When, Who, What, How)
  •  Type & Technique of hack


Arguement

  • Why hacker are the heroes 
  • Individual/ Group hacker
  • Cyber feminist
  • Will the hero being caught?
  • What punishment will they get?

Conclusion

  • Self opinion
  • How to decrease hacking cases happen
  • What government should do to prevent leakage of information







Solution

For my opinion, I generally thinks that the white hat hacker, David Kennedy is right, he encourage the Obama administration to take the Healthcare.gov offline until the privacy vulnerabilities are addressed and detection capabilities are improved. After testing, he says that hackers could use critical flaws to detach sensitive information like personal information. Government should make sure that websites which need user's personal information must be offline or fully protected to keep away from hackers because it either being aimed by hackers or will be take over soon. They have the responsibility to guarantee that the personal information collected by government is safe and fully secure. Although hackers are the heroes of the 21st century, but they are only hero for computer technology and they do not help everyone.


Source(s):

Security Experts Warn Healthcare. gov Is Vulnerable to Hacking - ABC News. 2014. Security Experts Warn Healthcare. gov Is Vulnerable to Hacking - ABC News. [ONLINE] Available at: http://abcnews.go.com/blogs/politics/2013/11/security-experts-warn-healthcare-gov-is-vulnerable-to-hacking/ [Accessed: 15th January 2013]

Behind the scene.Punishment

Eventually, I've discussed about types of hack, techniques of hack, who is behind everything and what is their motive. There's a question after all, which is, why they can exist for a period and don't get caught by government? What is their punishment if they were caught?

Here is the fact, hackers exist everywhere in this virtual world and they have ordinary life like normal people. Therefore, they were specified as the heroes of 21st century because it is not easy to catch them by their appearance. However, hackers are still being hunt for years. Government had warned them throughout a cyber-attack and they try to control their movement so that the number leakage information could be control and decrease. According to the U.S News, The National Security Agency warns Anonymous Group to have the ability to control their outage of cyber-attack. Cyber-criminal is a serious case especially when it's related with leakage of private information. Once black hat hacker had been caught, heavy punishment will be given such as penalty or jail for years. In 2013, U.S, five hackers from Russia and Ukraine been arrested on charging biggest cyber-crime data breach case. This costs the companies more than 300 million by stealing credit card numbers.
Visa credit cards are displayed in Washington October 27, 2009. REUTERS/Jason Reed


Source(s):

Five hackers charged in the biggest cyber crime case in U.S. history. 2014. Five hackers charged in the biggest cyber crime case in U.S. history. [ONLINE] Available at: http://www.insidecounsel.com/2013/07/26/five-hackers-charged-in-biggest-cyber-crime-case-i [Accessed: 10th January 2014]

U.S. indicts hackers in biggest cyber fraud case history. Reuters. 2014. U.S. indicts hackers in biggest cyber fraud case history. Reuters. [ONLINE] Available at: http://www.reuters.com/article/2013/07/25/us-usa-hackers-creditcards-idUSBRE96O0RI20130725 [Accessed: 10th January 2014]

. . 2014. [ONLINE] Available at: http://live.wsj.com/video/us-warns-on-hacking-group-anonymous/66EFD4D7-D177-4519-A5EA-556AD861F351.html#!66EFD4D7-D177-4519-A5EA-556AD861F351 [Accessed: 15th January 2014]

Saturday, 18 January 2014

ONLY male hacker or.. ?

Previously, hacking used to be a male's hobby while females have less relation with computer technology. However, females are upgrading themselves year after years and soon they gets more relation with computer technology and involves in some hacking cases. They are minority female group that have relation with social hacking cases, cyber feminist. At first, most of the people don't believes that woman could be a hacker although they join the group meeting because they believe that woman only involve in hacking-crime or else, there must be a boy telling them how exciting it was. Until then, it was an urban myth of 80's and 90's that woman involve in the political dimension.

Cyber feminist

  • Gail Thackeray, a women hacker who is one of the members of Special Counsel for Technology Crimes. She builds a computer crime unit and hated by hacking community because defeating the early 90's hackers. Reputation and money is the reason why she was an expert in computer technology system. She explains that, most people hack in computer games to assume control the system but never get caught because seldom people is working on this. In the real world, most of the hackers are using tools that have been created. 
  • Susan Thunder, a cyberpunk and also a member of Roscoe in early 80's. She has an impressive capability which is feel other people physically, besides she is a specialist in armed force computers. First, Roscoe hacked the telephone system to make free calls and tap into people's call. Susan was attracted with computers that contain primal and private information about armed force project. Later, she quit hacking activities and became a security adviser. After she demonstrate her talents and the ability of hack a system in twenty minutes, she quit everything about computer and telephone system then starts up a career as a professional poker player.
These two women show that women do not have any self-motivation to break into computer system other than money, or affected by people. It is also important that, women should perform cyber feminist thinking on social and political realities. However, it was false that women don't have motivation to hack. Minority of them spend their time like the males, spending most of their time on social life than rest.



Source(s):

Women Hackers -- Research. 2014. Women Hackers -- Research. [ONLINE] Available at: http://www.obn.org/hackers/text1.htm#women [Accessed: 13rd January 2014] 

Media Art Kitchen. MOHRI YUKO

Mohri Yuko is a Japanese artist from Kanagawa, lives and works at Tokyo, 1980. Mohri is a mixed media artist who combines kinetic sculpture, sound, light or any found materials. She uses those mixed media to do installation that specific on physical phenomena to show the relation between artifact and nature.
https://www.google.com/search?q=mohri+yuko+vexation+description&source=lnms&tbm=isch&sa=X&ei=-t3aUvb2NYjJiAfn4YCQCQ&ved=0CAcQ_AUoATgK&biw=1366&bih=666#facrc=_&imgdii=dSpj6Dop8ALd6M%3A%3B20xTwVwQQ2mW9M%3BdSpj6Dop8ALd6M%3A&imgrc=dSpj6Dop8ALd6M%253A%3BMjdL_TTfDUNBVM%3Bhttp%253A%252F%252Fb.vimeocdn.com%252Fts%252F182%252F870%252F182870750_640.jpg%3Bhttp%253A%252F%252Fvimeo.com%252F6681196%3B640%3B480

Here is one of her group sound installation work,Vexations, with Soichiro Mihara, in year 2005. Vexation is a product from the mixed of computer, printer, speaker and etc. They both get inspiration from the original vexation by Eric Satie. It produces sound around the area by computer technology that makes loop which includes audial, sonic, noise and musical parameter. This work had won awards in year 2006, Prix Arts Electronica and Transmediale award. It attracts people by the sound and curiosity of how and where the sound come from.

Vexation- 2005 by Mohri Yuko & Soichiro Mihara

Besides, there's also another interesting project of Mohri Yuko, I/ O, 2011 which includes bell- lyras, duster, roll paper, bamboo charcoal, and etc. It is an installation work that can change shape and movement that depends on the environment condition and creates organic Eco system. I/O is to show how the object create catching the space and creates organic environment.
https://www.google.com/search?q=mohri+yuko+vexation+description&source=lnms&tbm=isch&sa=X&ei=-t3aUvb2NYjJiAfn4YCQCQ&ved=0CAcQ_AUoATgK&biw=1366&bih=666#facrc=_&imgdii=_&imgrc=BlVXYxs6ZhgtFM%253A%3BCEDWcO0qMQEDGM%3Bhttp%253A%252F%252Fwaitingroom.jp%252Fjapanese%252Fexhibitions%252F2013%252Fyuko_mohri%252FIO.jpg%3Bhttp%253A%252F%252Fwaitingroom.jp%252Fenglish%252Fexhibitions%252F2013%252Fyuko_mohri2013%252Fyuko_mohri.e.html%3B350%3B233

https://www.google.com/search?q=mohri+yuko+vexation+description&source=lnms&tbm=isch&sa=X&ei=-t3aUvb2NYjJiAfn4YCQCQ&ved=0CAcQ_AUoATgK&biw=1366&bih=666#q=mohri%20yuko&tbm=isch&facrc=_&imgdii=_&imgrc=bhS1YHko66pI9M%253A%3Bz0LFmRaBN6Uq_M%3Bhttp%253A%252F%252Ffarm6.staticflickr.com%252F5129%252F5208836554_f18372c342_o.jpg%3Bhttp%253A%252F%252Fwww.flickr.com%252Fphotos%252Ffomalhaut%252F5208836554%252F%3B1000%3B665

I/O - Mohri Yuko. 2011

Source(s):

MEDIA/ART KITCHEN - ARTIST. 2014. MEDIA/ART KITCHEN - ARTIST. [ONLINE] Available at: http://mediaartkitchen.tumblr.com/artists/#/mohri-yuko [Accessed: 11th January 2014]

videos. 2014. videos. [ONLINE] Available at: http://www.mohrizm.net/videos.html [Accessed: 11th January 2014]

Yuko MOHRI. 2014. Yuko MOHRI. [ONLINE] Available at: http://www.mohrizm.net/YUKOMOHRI_eng2013.pdf [Accessed: 11th January 2014]

Anonymous Group

There was an international hacker group, called Anonymous. They masked themselves and do not reveals their identity as a hacker. They create unlimited access to information, corporate activities, transparency in government and develop freedom of speech. This Anonymous group involves in hacking cases since 2011 and help people to get into internet and cut off government. There were also an open group in a social website for everyone to share and chat about hack.

However, Anonymous's hacker quit the group and reveals his identity. According to the hacker's post, saying that he thought Anonymous was helping people but through out the years, everything has change, they receive comments that they are not helping anyone but hurting themselves. Some even say that they were cyber-attack.
http://bgr.com/2011/08/19/anonymous-hacker-quits-calls-groups-members-hypocrites-and-its-efforts-fruitless/












Link:


Source(s):

. 2014. . [ONLINE] Available at: https://www.facebook.com/AnonymousHackersGroups [Accessed: 7th January 2014]

'Anonymous' hacker quits, call group's member hypocrites and its efforts fruitless. BGR. 2014. 'Anonymous' hacker quits, call group's member hypocrites and its efforts fruitless. BGR. [ONLINE] Available at: http://bgr.com/2011/08/19/anonymous-hacker-quits-calls-groups-members-hypocrites-and-its-efforts-fruitless/ [Accessed: 7th January 2014]

Anonymous (Internet Group) - The New York Times. 2014. Anonymous (Internet Group) - The New York Times. [ONLINE] Available at: http://topics.nytimes.com/top/reference/timestopics/organizations/a/anonymous_internet_group/ [Accessed: 7th January 2014]

. 2014. .[ONLINE] Available at: https://www.facebook.com/groups/AnonymousHackersGroups [Accessed: 8th January 2014]




Hacker's power. Double S Time

During the past, hacking used to be an individual to a company or any computer systems case. After years, hackers used to cooperate with each other to form a group whereas most of the hackers wanted to improves skill and they believe that the code should be open to public. Most of them found out that when they do it in group, it's not only for learning but fun. 

Double S Time 

Sleep and Social time is the main reason why number of hackers increasing recently. In the past, people used to sleep early because they need to work next day, but recently people used to have less sleeping time yet they spend majority of their time on social life than usual to learn new things or discover more and some even earn part time money. Therefore, hackers are primitive community nowadays. When a professional code hacker combines with another professional hacker, it might produce a professional group that able to hack in a short time with an easier way. The best things when hackers forms into group are, they can recognize good idea from others and yet they can combine each other skills to create powerful hacking group. By these, positions of hackers are becoming more and more stable in the global because there are more newbie hacker individual and groups.


Source(s):

. 2014. .[ONLINE] Available at: ftp://mirror.linux.org.au/pub/linux.conf.au/2003/papers/Hemos/Hemos.pdf [Accessed: 5th January 2014]

Friday, 17 January 2014

Techniques of Hack

There are numerous techniques of hack. Key logger, computer worm and computer virus is the main hacking techniques that happen nowadays.

Key Loggers
Key logger is a tool to record every keystroke on an damaged machine for restoration. The purpose of key loggers is to allow the user to gain access to restricted information typed on the machine like user password and further private data. Virus-, trojan- and rootkit- are the methods that used by some key loggers to stay active but invisible. Nevertheless, some key loggers used legitimate ways or enhance computer security.

Computer Worm
Computer worm is kind of virus for self- replicating program that generate through computer networks without user intervention.

Computer Virus
It is also a self-replicating program that develops by placing copies of itself into other inconceivable code or documents. Thus, the viruses develop like biological virus whereby  inserting itself into living cells.

There will be more new hacking techniques appear as new machinery products were made and hacking techniques are non-stop upgrading to creep into one medium. Lately, there's even a hack in cables that majority happens in modem. Ryan Harris, a cable-modem hacker reveals the method of hacking firmware by uncapped a cable modem to let the user to remove bandwidth filters imposed to increase the speed of modem and get free service.

Sources:

Hacker (computer security) - Wikipedia, the free encyclopedia. 2014. Hacker (computer security) - Wikipedia, the free encyclopedia. [ONLINE] Available at: http://en.wikipedia.org/wiki/Hacker_(computer_security) [Accessed: 13rd December 2013]

Alleged Accomplice of Accused Cable-modem Hacker Testifies Against Him. Threat Level. Wired.com. 2014. Alleged Accomplice of Accused Cable-modem Hacker Testifies Against Him. Threat Level. Wired.com. [ONLINE] Available at: http://www.wired.com/threatlevel/2012/02/ryan-harris-trial/ [Accessed: 15th January 2014]


Black Hat White Hat. Which type are you?


https://www.google.com/search?q=black+and+white+hat&source=lnms&tbm=isch&sa=X&ei=EBnZUt6DDcj_rQePrIGABQ&ved=0CAcQ_AUoAQ&biw=1366&bih=666#facrc=_&imgdii=_&imgrc=yVs_f2Q4YynwNM%253A%3Bb_nlqdtvXjUOCM%3Bhttp%253A%252F%252Fhellboundbloggers.com%252Fwp-content%252Fuploads%252F2010%252F08%252Fwhitehatvsblackhat-300x256.jpg%3Bhttp%253A%252F%252Fhellboundbloggers.com%252F2010%252F08%252F25%252Fwebsite-authority-tips-by-matt-cutts%252F%3B300%3B256
Each of everything has its negative and positive sides. Nevertheless, not all hackers are bad and not all of them are trying to hack for negative reason, some of them are good too. Every hacker has a motivation for them about what they do and why they do. They were differentiate into color of hats. Here are two main types, which are black and white.

White Hat
A white hat hacker is a computer security experts who breaks into security for harmless reasons like, testing their security while working for a security software company. They are the professional IT security who help the society to secure from hacking by creating or upgrading firewall softwares. Example of softwares are Kaspersky and Asterisk. Therefore, they are the good hacker.

Black Hat
Black hacker also known as "cracker" is a plain hacker who breaks into computer network or creates computer viruses. These bad people apply patches to fix the system so that they can keep control the systems. They are the criminal hacker who hack purposely just to get  paid.


Source(s):

7 Types of Hacker Motivations McAfee. 2014. 7 Types of Hacker Motivations McAfee. 2014. [ONLINE] Available at: http://blogs.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations [Accessed: 13rd December 2013]


History Time ._.

It has been a century since hacking cases exist around the global. Hackers is a busy job in the past 35 years as some teenagers hack the authorities of a brand new phone system in 1870's.

In the early 1960's, large mainframe computers like MIT's artificial intelligence lab are staging the ground for hackers. A person with a mastery of computers who could push program farther than what they were asked to do.

Youth International Party Line (YIPL)  is a technical program that help phone hackers to  make long-distance phone calls. John Draker, a legendary computer programmer and also a former phone phreak, makes a  long- distance phone call for free by blowing a clear-cut tone into the phone to open the phone line. After that, he has been known as "Captain Crunch" when he discovered  the whistle as a gift in a children's cereal in 1970's.
John Draker makes long-distance phone call

https://www.google.com/search?q=captain+crunch&source=lnms&tbm=isch&sa=X&ei=mTzbUsqDB6fYigeh7ICIBg&sqi=2&ved=0CAcQ_AUoAQ&biw=1366&bih=666#q=captain+crunch+john+draper&tbm=isch&facrc=_&imgdii=_&imgrc=bXCnKQX6RPqKWM%253A%3BZuzfOh7or24JUM%3Bhttp%253A%252F%252Fwww.mf-planet.de%252Ftextfiles%252Fcomputer%252Fcapn_crunch_files%252Fcap'n%252520crunch%252520(john%252520draper)%252520special.jpg%3Bhttp%253A%252F%252Fwww.mf-planet.de%252Ftextfiles%252Fcomputer%252Fcapn_crunch.php%3B720%3B502
Captain Crunch
After 1990's, hackers succeed to break into federal websites, includes U.S Department of Justice, U.S Air Force, CIA, NASA and etc. Soon, anti- hacker commercial runs as Network Associate ads. In year 1998, National Infrastructure Protection Center accepted a mission from U.S Justice Department to support the society telecommunication, machinery and shipment system from hackers.




1998 Anti-hack commercial during Super Bowl XXXII
Link: http://www.youtube.com/watch?v=sSybkhr9Ce0


Source(s):

1998 Anti- Hacker Commercial during Super Bowl XXXII (1/25/98) -  Youtube. 2014. 1998 Anti- Hacker Commercial during Super Bowl XXXII (1/25/98) - Youtube. [ONLINE] Available at: http://www.youtube.com/watch?v=sSybkhr9Ce0 [Accessed: 4th December 2013]

A history of hacking. 2014. A history of hacking. [ONLINE] Available at: http://www.sptimes.com/Hackers/history.hacking.html [Accessed: 4th December 2013]