Hacking, Hackers, and Hacktivism: Difference between revisions

From Technologies of Politics and Control
Jump to navigation Jump to search
Line 17: Line 17:
* [http://vimeo.com/46450688 Molly Sauter, Activist DDOS Campaigns: When Similes and Metaphors Fail] (video, watch from to 1:56 to 21:44)
* [http://vimeo.com/46450688 Molly Sauter, Activist DDOS Campaigns: When Similes and Metaphors Fail] (video, watch from to 1:56 to 21:44)


** Sauter uses the term "DDoS" throughout. This is an abbreviation for a specific form of attack to a web server described in more detail [https://en.wikipedia.org/wiki/DDos#Distributed_attack here].
:* Sauter uses the term "DDoS" throughout. This is an abbreviation for a specific form of attack to a web server described in more detail [https://en.wikipedia.org/wiki/DDos#Distributed_attack here].


* [http://www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf United States Department of Justice, Prosecuting Computer Crimes] (read pages 1-11: Introduction to the Computer Fraud and Abuse Act and Key Definitions)
* [http://www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf United States Department of Justice, Prosecuting Computer Crimes] (read pages 1-11: Introduction to the Computer Fraud and Abuse Act and Key Definitions)

Revision as of 16:32, 7 April 2013

April 9

Spend five minutes with anyone who studies “hackers” and you will quickly learn that the term is used to define a wide array of discrete subcultures, from homebrew computer programmers all the way through to military-industrial network vulnerability experts. If there is one unifying characteristic amongst all of these cultures (and there may not be), it is most likely the acknowledgement between these groups that the limitations imposed by code as a mode of regulating behavior can, and should, be subverted. Today we look to hackers, who they are, what they do, and what rules and norms govern those who do not recognize code as a governing influence.

Our guest speaker this week will be Molly Sauter, a student at MIT's Comparative Media Studies program and researcher at MIT's Center for Civic Media, who has written and spoken extensively about cultural perception of hackers.


Readings

  • Sauter uses the term "DDoS" throughout. This is an abbreviation for a specific form of attack to a web server described in more detail here.

Optional Readings


Videos Watched in Class

Links

Class Discussion

Please remember to sign your postings by adding four tildes (~~~~) to the end of your contribution. This will automatically add your username and the date/time of your post, like so: Asellars 15:29, 21 January 2013 (EST)