Hacking, Hackers, and Hacktivism: Difference between revisions

From Technologies and Politics of Control
Jump to navigation Jump to search
Line 32: Line 32:


* [http://www.intelligencesquaredus.org/debates/past-debates/item/576-the-cyber-war-threat-has-been-grossly-exaggerated Intelligence Squared Debate: "The Cyberwar Threat Has Been Grossly Exaggerated"] (an [http://en.wikipedia.org/wiki/Oxford-Style_debate#Oxford-Style_debate Oxford-style debate] with Marc Rotenberg, Bruce Schneier, Mike McConnell, and Jonathan Zittrain; watch the video of the debate)
* [http://www.intelligencesquaredus.org/debates/past-debates/item/576-the-cyber-war-threat-has-been-grossly-exaggerated Intelligence Squared Debate: "The Cyberwar Threat Has Been Grossly Exaggerated"] (an [http://en.wikipedia.org/wiki/Oxford-Style_debate#Oxford-Style_debate Oxford-style debate] with Marc Rotenberg, Bruce Schneier, Mike McConnell, and Jonathan Zittrain; watch the video of the debate)
* [http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?_r=0 Nicole Perlroth, Hackers in China Attacked The Times for Last 4 Months (''New York Times'')]


* [https://torrentfreak.com/pirate-parties-use-influence-to-halt-operation-payback-101120/ TorrentFreak, Pirate Parties Use Influence to Halt Anonymous’ Operation Payback]
* [https://torrentfreak.com/pirate-parties-use-influence-to-halt-operation-payback-101120/ TorrentFreak, Pirate Parties Use Influence to Halt Anonymous’ Operation Payback]
* [https://soundcloud.com/bwalker/doing-it-for-the-lulz Benjamen Walker, Doing it for the LULZ (from ''Too Much Information'')] (11:00 to 22:45 only, language at times is NSFW)


* [https://cyber.law.harvard.edu/interactive/events/2012/10/soghoian Christopher Soghoian, The Growing Trade in Software Security Exploits]
* [https://cyber.law.harvard.edu/interactive/events/2012/10/soghoian Christopher Soghoian, The Growing Trade in Software Security Exploits]
Line 41: Line 41:
* [http://www.dmlp.org/blog/2013/impact-aarons-law-aaron-swartzs-case Andy Sellars, The Impact of "Aaron's Law" on Aaron Swartz's Case]
* [http://www.dmlp.org/blog/2013/impact-aarons-law-aaron-swartzs-case Andy Sellars, The Impact of "Aaron's Law" on Aaron Swartz's Case]


* [http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?_r=0 Nicole Perlroth, Hackers in China Attacked The Times for Last 4 Months (''New York Times'')]


</onlyinclude>
</onlyinclude>

Revision as of 16:07, 16 April 2014

April 22

Spend five minutes with anyone who studies “hackers” and you will quickly learn that the term is used to define a wide array of discrete subcultures, from homebrew computer programmers all the way through to military-industrial network vulnerability experts. If there is one unifying characteristic amongst all of these cultures (and there may not be), it is most likely the acknowledgement between these groups that the limitations imposed by code as a mode of regulating behavior can, and should, be subverted. Today we look to hackers, who they are, what they do, and what rules and norms govern those who do not recognize code as a governing influence.


Readings

Defining hackers, hacking, and hacktivism
  • Sauter uses the term "DDoS" throughout. This is an abbreviation for "distributed denial of service," a specific form of attack to a web server described in more detail here.
Law and law enforcement
Case studies

Optional Readings



Videos Watched in Class

Links

Class Discussion

Please remember to sign your postings by adding four tildes (~~~~) to the end of your contribution. This will automatically add your username and the date/time of your post, like so: Andy 10:28, 17 December 2013 (EST)