Hacking, Hackers, and Hacktivism: Difference between revisions

From Technologies and Politics of Control
Jump to navigation Jump to search
Line 23: Line 23:
* [https://en.wikipedia.org/wiki/Operation_Payback Wikipedia, Operation Payback]
* [https://en.wikipedia.org/wiki/Operation_Payback Wikipedia, Operation Payback]


* [http://wagingnonviolence.org/feature/end-anonymity-jeremy-hammond/]
* [http://wagingnonviolence.org/feature/end-anonymity-jeremy-hammond/ Jeremy Hammond]


; Law enforcement responses
; Law enforcement responses

Revision as of 11:28, 17 December 2013

April 22

Spend five minutes with anyone who studies “hackers” and you will quickly learn that the term is used to define a wide array of discrete subcultures, from homebrew computer programmers all the way through to military-industrial network vulnerability experts. If there is one unifying characteristic amongst all of these cultures (and there may not be), it is most likely the acknowledgement between these groups that the limitations imposed by code as a mode of regulating behavior can, and should, be subverted. Today we look to hackers, who they are, what they do, and what rules and norms govern those who do not recognize code as a governing influence.


Readings

Defining hackers, hacking, and hacktivism
  • Sauter uses the term "DDoS" throughout. This is an abbreviation for "distributed denial of service," a specific form of attack to a web server described in more detail here.
Case studies
Law enforcement responses
Emergent concerns

Optional Readings


Videos Watched in Class

Links

Class Discussion

Please remember to sign your postings by adding four tildes (~~~~) to the end of your contribution. This will automatically add your username and the date/time of your post, like so: Asellars 15:29, 21 January 2013 (EST)