Hacking, Hackers, and Hacktivism: Difference between revisions
Line 25: | Line 25: | ||
== Optional Readings == | == Optional Readings == | ||
* [http://www.intelligencesquaredus.org/debates/past-debates/item/576-the-cyber-war-threat-has-been-grossly-exaggerated Intelligence Squared Debate: "The Cyberwar Threat Has Been Grossly Exaggerated"] (an [http://en.wikipedia.org/wiki/Oxford-Style_debate#Oxford-Style_debate Oxford-style debate] with Marc Rotenberg, Bruce Schneier, Mike McConnell, and Jonathan Zittrain) | * [http://www.intelligencesquaredus.org/debates/past-debates/item/576-the-cyber-war-threat-has-been-grossly-exaggerated Intelligence Squared Debate: "The Cyberwar Threat Has Been Grossly Exaggerated"] (an [http://en.wikipedia.org/wiki/Oxford-Style_debate#Oxford-Style_debate Oxford-style debate] with Marc Rotenberg, Bruce Schneier, Mike McConnell, and Jonathan Zittrain; watch the video of the debate) | ||
* [https://torrentfreak.com/pirate-parties-use-influence-to-halt-operation-payback-101120/ TorrentFreak, Pirate Parties Use Influence to Halt Anonymous’ Operation Payback] | * [https://torrentfreak.com/pirate-parties-use-influence-to-halt-operation-payback-101120/ TorrentFreak, Pirate Parties Use Influence to Halt Anonymous’ Operation Payback] |
Revision as of 12:03, 5 April 2013
April 9
Spend five minutes with anyone who studies “hackers” and you will quickly learn that the term is used to define a wide array of discrete subcultures, from homebrew computer programmers all the way through to military-industrial network vulnerability experts. If there is one unifying characteristic amongst all of these cultures (and there may not be), it is most likely the acknowledgement between these groups that the limitations imposed by code as a mode of regulating behavior can, and should, be subverted. Today we look to hackers, who they are, what they do, and what rules and norms govern those who do not recognize code as a governing influence.
Our guest speaker this week will be Molly Sauter, a student at MIT's Comparative Media Studies program and researcher at MIT's Center for Civic Media, who has written and spoken extensively about cultural perception of hackers.
Readings
- Molly Sauter, Activist DDOS Campaigns: When Similes and Metaphors Fail (video, watch from to 1:56 to 21:44)
- United States Department of Justice, Prosecuting Computer Crimes (read pages 1-11: Introduction to the Computer Fraud and Abuse Act and Key Definitions)
Optional Readings
- Intelligence Squared Debate: "The Cyberwar Threat Has Been Grossly Exaggerated" (an Oxford-style debate with Marc Rotenberg, Bruce Schneier, Mike McConnell, and Jonathan Zittrain; watch the video of the debate)
- Benjamen Walker, Doing it for the LULZ (from Too Much Information) (11:00 to 22:45 only, language at times is NSFW)