Hacker

A hacker (in the original sense) is somebody particularly skilled at computer programming. The term was popular among early computer users grouped around university computer labs in the 1960s and 1970s. The possible origin was the term "hack" at the Massachusetts Institute of Technology, meaning a well thought out and elaborate prank.

Someone is wrong on
The Internet
Log in:
v - t - e

History of the term

The term Hacker probably originated in the 1960's to describe a small community of computer programers at MIT and the Massachusetts Tech Model Railroad Club. In the 1970s the term was applied to hobbyist computer programers, including famously, Steve Jobs, Steve Wozniak and Bill Gates.

Around the time of the 1983 movie WarGames, the media seized on the term to mean young computer users who broke into computer systems illegally, and this remains the most common definition today, much to the chagrin of the older generation of computer programmers. Those who objected to the term being used for illegal activity proposed the term "cracker" for the latter, which has not caught on in the mainstream media.

"Hackers" today are a Big Scary Threat lurking out there in cyberspace, writing computer viruses, breaking into government computers, phishing for your bank account numbers, speaking a fluent 1337, and reading 2600 Magazine.[1] Still, there are plenty of hackers in the original sense who proudly use the term, who are also a Big Scary Threat (to Microsoft and the Church of Scientology, at least) due to their advocacy of free software, open source, Linux, and strong cryptography, and their wizard-like programming skills.

Script kiddies

A script kiddie (alternatively, click kiddie, to take into account the growing inability of the people in question even to run a script) is a 1337 h@xx0r5 that uses programs written by actual hackers to DDoS or otherwise harass people in cyberspace. When encountering a script kiddie it is important to remind them that using programs like Low Orbit Ion CannonFile:Wikipedia's W.svg is hardly more challenging than using MS Paint, and therefore does not make them 1337.

Not a hacker/hacking

Have you ever received an email from somebody that was rude, racist, profane or sexual in nature, only to have received another one from that same somebody later saying "That wasn't me, someone hacked my email?" The truth is that they weren't hacked -- rather, they left their workstation logged in while they were away from their desk, someone walked in and sent the message as a joke.

The phrase "someone hacked my account" is currently being overly - and improperly - used to describe the situation where someone at a library or Apple Store posted a status update on the Facebook profile of someone who logged in there to check messages and forgot to log out.

While in both of these cases the user violated basic acceptable use policies in leaving their accounts unprotected, the perpetrator of the jokes was not a hacker -- simply a troll in the right place at the right time. The fact that access to the accounts was already open and did not have to be "cracked" makes these instances specifically not hacking. It's like calling someone who walks in your open front door a lockpicking artist.

Privacy concerns and security

Hacking is so widespread that year after year, governments attempt to create new laws to combat hacking, especially from other nations. While it is generally a refined mixture of bullshit and loaded language, a considerable part of it all is a serious concern. If motivated by a goal, a hacker could possibly hack into a serious system, like a bank. Even though most hackers would be content with stealing codes and movies and filling websites with thousands of litres of porn, a hacker could potentially cause mass damage if they wanted. One could, for example, hack into the system that controls traffic lights, cause water purification plants to fail, tamper with a plane's navigation system, or even hack into the cable network and have it play nothing but infomercials.

Until we get an ex-hacker in the government, we have to deal with the aroma of said bullshit and 9/11 references.

Hacktivism

Hacktivism is the practice of using hacking techniques for political purposes. It can take various forms including:

  • Using denial-of-service (DoS) and other attacks to take down a website you disagree with or which belongs to someone you find objectionable. As early as 1994, activists protesting against John Major's restrictions on outdoor raves launched DoS attacks on British government websites.[2] In 2007, Russian nationalists protesting Estonia's removal of a Russian war memorial launched large-scale distributed denial-of-service (DDoS) attacks on Estonian websites.[2]
  • Hacking email and computer systems to find damaging information on your opponents, e.g. for doxxing. Examples include the hacking of Hillary Clinton's email by political opponents.[3] AntiSec, an offshoot of Anonymous, hacked Texas private security company Stratfor in December 2011, stealing 200 GB of data including emails, which it passed to Wikileaks.[4] Aaron SwartzFile:Wikipedia's W.svg hacked the systems of academic publisher JSTOR out of a belief that academic papers should not be paywalled, freely releasing a huge number of papers online.[2] Other material such as credit card details and membership lists of far-right organisations have also been obtained and posted online.
  • Infecting systems with viruses, worms, etc, such as Worms Against Nuclear Killers (WANK) which was used in 1989 to deliberately infect NASA computers to protest the launch of nuclear-powered spacecraft.[5]
  • Defacing websites, or redirecting them. In 2004, hackers protested SCO's lawsuits against the Linux community by defacing SCO's website.[6]
  • Black faxing, a pre-internet technique where entirely black pages are faxed to an organisation, wasting paper and ink.[7]
  • The term is also sometimes applied to the development of tools for online privacy, anonymous communication, and to overcome censorship, such as Tor, encryption software, and Wikileaks.[8] This isn't generally illegal, and doesn't involve obtaining illlicit access to computers, in contrast to most of the other methods listed above.

The best-known proponent may be Anonymous, which has targetted the Church of Scientology, the Chinese government, and credit card companies that blocked cash transfers to Wikileaks. The Texan hacker group Cult of the Dead Cow reportedly coined the word "hacktivism" in 1996.[2]

gollark: No, I removed those last week, they were cluttering my computer.
gollark: Well, it would DISprove it if there was a small counterexample, but there may not be.
gollark: IT'S GOLLARIOUS, YOU :BEES: :BISMUTH1: :SMALL_STELLATED_DODECAHEDRON:.
gollark: You should clearly implement AES also.
gollark: Isn't RSA mostly just used to exchange symmetric encryption keys?

See also

References

  1. And, occasionally, shutting down whole countries like Estonia.
  2. Hacktivism: A Short History, Foreign Policy, 29 Apr 2013
  3. The Dramatic Rise in Hacktivism, TechCrunch, 22 Feb 2017
  4. See the Wikipedia article on 2012–13 Stratfor email leak.
  5. What is Hactivism?, IT Pro, 9 Aug, 2018
  6. Hackers deface SCO site, CNET, 29 Nov 2004
  7. See the Wikipedia article on Black fax.
  8. See the Wikipedia article on Hacktivism.
This article is issued from Rationalwiki. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.