Difference between revisions of "Re-defining and Understanding True Hacking"
Mikepinder (Talk | contribs) |
Mikepinder (Talk | contribs) (→Hacker Mind-sets) |
||
Line 1: | Line 1: | ||
− | ===Hacker | + | ===Hacker mind-sets=== |
In order to understand the hacker mind-set and ethical underpinnings, it is vital to establish the underlying beliefs that ground attitudes towards capitalism and the wider modern economic system surrounding it. | In order to understand the hacker mind-set and ethical underpinnings, it is vital to establish the underlying beliefs that ground attitudes towards capitalism and the wider modern economic system surrounding it. |
Revision as of 13:54, 30 August 2014
Contents
Hacker mind-sets
In order to understand the hacker mind-set and ethical underpinnings, it is vital to establish the underlying beliefs that ground attitudes towards capitalism and the wider modern economic system surrounding it.
The network society in which hackers fundamentally operate, organise, innovate and disrupt can be traced back to through proceeding scientific revolutions and emerged at a very specific moment in history. Thomas Kuhn describes technological paradigms as a conceptual pattern that sets standards for performance by organising the available range of technologies around a nucleus that enhances the performance of each [Kuhn, 1962]. In his view the industrial revolution firstly enabled humans to generate power and distribute energy via human ingenuity and artefacts without being solely dependent upon the natural environment in its existing natural state. Energy generation in this sense enables activities by powering-over nature and overcoming the limiting conditions of own individual existence. Water, steam, electric and nuclear power allowed for new forms of production, consumption and social organisation for the evolving industrial society. The avant-garde today being the post-industrialist knowledge economies found in the West in which hacking primarily functions.
The industrial society is comprised of factories, corporations, bureaucracy, and the phasing-out of traditional agricultural labour in place of large-scale urbanisation; international transportations systems, centralised social systems, mass-media and-mass communications. The rise of mass communications and the Internet in particular made fundamental changes to the control of knowledge and information and have challenged the way in which wealth, power and meaning is generated. Information processing, communication and innovation technologies (computer micro chips, network connectivity and associated costs) essentially impact upon the industrialist paradigm itself; specifically on how the generation, control and application of knowledge occurs.
The value in the Internet today comes from linking-up of artefacts in the virtual and real world into new combinations, built upon and extending the configurations of its original architect in modular forms. This re-combinatorial and reconfigurable nature of intellectual property artefacts provides a key source of innovation in the post industrialist networked society. The process of innovation is also subject to recombination and reconfiguration, particularly in the latter stages of the product life cycle (PLC) via acts of hacking to create new artefact combinations or arrangements that in turn support further spirals of meaningful knowledge and information for the system as a whole. The hacker entity freely facilitates this recombination and reconfiguration irrespective of prior intellectual property rights and law that are perceived as a perverse abstraction unto itself; a concept claiming private ownership rights over nature, whether supported and justified by post-industrialist legal regimes or not. In this sense, the configuration of social structures supporting the organisational arrangement of human relationships to production, consumption and power (framed by culture) is unrestrictedly subverted, distorted and reconfigured by hackers.
Information society
The information driven society was partly invented and developed by a culture of open data sharing, collaboration and cooperation found within ARPAnet experiments and scientific as well as academic research communities. Researchers were free to examine others findings as well as test and further develop others ideas. Self professed hackers designed and built the technologies underpinning the Internet (Unix, Linux, communications protocols, sockets and layers) that make the Internet work and they believed in simply building things for societal value, not destroying them as the popular media would have us presume. Hacker ethics originating at MIT in the generative context, only to have meaning subverted by continued usage referring to computer criminals in the early 1980’s when students broke into rooms that housed campus mainframe computers in order to test out new programs and written code. They believed in freedom of information and voluntary mutual help. In their eyes, legal and institutional barriers only prevented a good solution to a creative problem from being found and simply forced people to re-invent wheels. They believed a solution to a problem should not have to be solved twice and intellectual property and private ownership rights simply create barriers to creative problem solving, resulting in epistemological and idealistic confrontations with the establishment, culminating in a spectrum of hackers acts along an illegal-to- legal dimension.
Hacker culture is a fundamental concept grounded in a specific set of ethical foundations that underpin the networked, post industrialist society and is embedded in a set of cultural beliefs, values and general world economic view. Whilst widely misinterpreted in popular culture, hackers can provide vital sources of innovation that are instinctively and habitually disregarded as simply disruptive, illegal, dangerous and irrelevant to organisations activities.
A wider contextual understanding of hacker activities is needed, devoid of misleading popular connotations and bias, to draw attention to the ways in which hacking acts can generate sources of important value for the innovating firm. By demonstrating how hackers can be vitally beneficial to firms, not simply disruptive and counter productive, it is hoped that general attitudes and policymaking will reflect the subtly changing attitudes to hacker activities already slowly taking place. In so doing should allow both private ownership and open ownership property regimes to exist more complimentarily in a mutually beneficial and reciprocal relationship towards the same goals.
Hackers ethics, passion and the roots of work
The underlying roots of hacker ethics and mind set can be traced back to direct challenges to the idea of the protestant work ethic (Weber, 1905). Weber argued that the capitalist spirit is found in the implicit obligation individuals feel towards undertaking productive work, enforced by religion and God. Members of society are made to feel obliged to work and to find contentment in professional working activities as one’s natural God given duty. For hackers, motivations to work are entirely different. The driving force behind value creation in life comes from the passion to create artefacts of great social value, rather than merely for money and capital generation. The same ideals and vision carefully crafted and communicated to consumers by large innovative corporations who go to great lengths (and cost) to emphasise corporate social responsibility and a wider societal purpose in the world. It has long been established that firms who understand consumer’s driving passions (legal or illegal), are far better suited to creating relevant innovations and value, if they are closely aligned and directly connected to underlying consumer passions.
Basic work ethics and organisational factors for hackers do not originate primarily from work or capital gain per se, but from passion and desire to create something socially valuable. This explains the predominant view of firms such as Microsoft as the enemy of hackers with its focus on wealth generation, closed code, proprietary systems and appropriation rents from its patent portfolio and strict licensing model (in spite of a recent strategic shift towards financing and encouraging the development of Open Source software). For hackers, when profit, growth and wealth generation are the dominant focus for a firm, passion is no longer the central driving force behind innovation and creation, therefore something to be entirely wary of. Hackers also believe that innovators should directly profit from their socially beneficial efforts, but not profiting from closed information to others.
The term hacker has a broad and general definition that spans the illegal to legal dimension but essentially encompass all hacker classes as an expert or enthusiast of any kind [Himanen, 2001]. This term generally applies to anyone with a passionate interest in any domain in the information age. Unlike most typical users who see computers, networks and devices as black boxes that can enhance productivity; hackers see computers, networks and devices as sources of entertainment just like any other personal hobby. They are driven to understand and master a technology because it personally interests them and provides pleasure, joy and excitement, not merely as something that reduces uncertainty in performing a desired task in the workplace [Rogers, 1995].
[Hackers are] people who love and understand the technology they use. These are people who can "hack" together a solution to a problem with a soldering iron and a few paper clips. People who modify operating systems because they don't like the way they work [Robson, 1999].
Hackers have a strong sense of play; are prepared to take risks in exploring a technology and care deeply and passionately about their interests.[1] As Burrel Smith of Apple stated: ‘you can be a hacker carpenter... It has to do with craftsmanship and caring about what you’re doing.”
Apple is an example of a habitually innovative and disruptive firm, marketing itself upon core countercultural ethics, similar to those found in hacker communities. Technology in their eyes should be used for your own purposes outside the control of large firms. Apple wishes to outwardly express its image as a group of freethinking rebels, troublemakers and technological radicals, akin to popular hacker culture. This may have reverberated with consumers when Apple was fighting against market domination by the likes of Microsoft and IBM, but becomes somewhat contradictory when it is now Apple who dominates markets as the most valuable company in history. The philosophy behind the hippy chique becomes hippy control freak within closed systems, gated communities, centralised control and vertically integrated products that lock users into proprietary platforms. Rather than echoing radical rebelliousness, vertically integrated software and hardware screams instead, proprietary claims to private ownership and ‘a firm knows best’ attitude most strongly detested within hacker ethics.
By adopting a closed strategy, firms like Apple lock out the possibility for social product development inherently generated within the network society. There is no desire to be more responsive to the external environment because the environment does not know yet what it wants and Apple intuitively does. This has been made clear one successful and dominant design product launch after another. Firms like Apple however are somewhat rare and demonstrates an uncanny ability to develop truly radical unknown innovation for consumer needs that do not yet exist. The hacker ethic is sacrificed in order to create a seamless and simple mass-appealing interface, but in so doing resists any form of user empowerment and flies in the face of the fundamental nature of networked information technologies themselves. Habitual behaviour by industry innovation leaders deliberately closes-off external boundaries in the competitive landscape, dismissing it as externally generated noise that serves only to blur internal creative vision and direction in the fuzzy front end of the design and innovation process as it only creates fragmentation. However for those firms more at the bleeding edge of innovation leadership, external ideas, resources and hacking have the potential to provide vital waypoints, design trajectories and market direction to help reduce uncertainty in innovation management. 
Extant hacker typology
Currently understood hacker types and sub types will now be discussed in order to distinguish potentially generative innovation sources for firms and brief case studies giving real world examples.
The extant typology of hacking within literature provides a slightly broader conception of popular understandings into three hacker types:
- Computer Security Crackers
- Computer Hobbyist Hackers
- Enthusiast Programmer Hackers
Pressures to differentiate one form of hacking initially emerged with the introduction of new laws and legislation seeking to criminalise activities involving computer cracking acts, resulting in three types above.[2] Within these categories several sub-categories classify the actual type of activity performed along an illegal to legal dimension and spans from data theft and mere property vandalism to state sponsored hacking and IP regime infringements.[3]
The three types or classes define cracking or hacking in a pejorative, negative, illegal and destructive light, based on stereotypical profiling in popular media and culture. It is rarely used in a positive, innovative and generative sense. Hacking acts are instinctively and implicitly assumed to be counterproductive and solicited with selfish and destructive or politically motivated intentions that serve countercultural or even extremist views in the pursuit property theft or disturbing the establishment in some way: entirely negative consequences of the structure and nature of a competitive market-driven economy.
Computer Security Crackers
The first class defines a person who seeks-out weaknesses in computer security systems in order to exploit them and is motivated by financial gain or as a stimulating personal challenge by a third party to a computer system or network infrastructure. More accurately known in computing circles as a cracker, this type consists of several sub-groupings including: black hats, grey hats and white hats. All classes involve some form of criminal behaviour via intrusion, theft, or otherwise causing disruption to a computer and/or a network in some way.
Security cracker sub-types
Black-hats (cracker)
This sub-group is deemed the most disruptive and involves someone who intentionally violates computer security for personal gain by destroying or stealing data and/or rendering a network inoperable by its authorised users. Example tactics for black hat hacking include, writing of malicious code, deploying viruses, trojans, use of bot nets, rootkits, denial of service attacks (DDoS), remote file inclusions, spyware or other means to illegally infiltrate security systems with the intention of causing harm to it.
Further sub-classes of black hat crackers include:
- Elite (l33t) or rogue hackers – skilled hackers engaged in general malicious hacking through malicious means and intentions.
- Neophyte or ‘newbie’ – someone who attempts hacking with little or no understanding of the underlying technology used.
- Script kiddie – a non-expert crackers who uses the tools of others (with little or no working knowledge) to perform hacking acts.
- Spammers, adware and social engineering crackers (phishers, cyber criminals, fraudsters and organised criminal gangs.
- Corporate spies – competitor intellectual property and competitive information gathering
- Blue hats – a security expert cracker brought in to the firm to find security holes before a product or service is launched to the general public.
Black hat hackers are typically the source of demonisation in popular media and wider culture. For example, in a recent BBC Television adaptation of the Sherlock Holmes novels, the archenemy character, Moriarty is portrayed as a hacker and cyber-criminal mastermind, claiming the ability to “...open any door, anywhere with a few tiny lines of computer code... There is no such thing as a private bank account now” [BBC, 2012]. Playing on the illegal computer security black hat end of the stereotype extreme and inline with popular media usage, such contemporary hacking portrayals reinforce the general perception of cracking and hacking involving potential national security breaches, threats to privacy and personal data theft. These portrayals play upon a mysterious and unknown (zero-day) set of black box elite programming skills and capabilities to manipulate and exploit security weaknesses in computer systems for personal financial gain, that are as yet unknown security holes and weaknesses to administrators. Actual methods and practices are rarely revealed or explained and are left open to factual scrutiny (and generally superfluous to the narrative). There is however, an assumption that computer weaknesses can and do exist and are freely and easily exploitable by anyone in possession of the appropriate black box skills needed to compile and deploy devious and destructive code for a desired outcome.
Black-hat institutional hacking
Hacking in the computer security cracker sense, is not merely confined to cyber criminals, vandals and data thieves, but also applies to hackers of legitimised origins in activities commonly undertaken by nation states, governments and security agencies around the world; even international media organisations.
Lawful interception, as it is often labelled, refers to sanctioned and authorised cracking by government sponsored security agencies, for example:
- UK Global Communication Head Quarters (GCHQ); MI5; MI6.
- US National Security Agency (NSA); Central Intelligence Agency (CIA);
- Federal Bureau of Investigation (FBI)
- Bahrain National Security Apparatus (NSA)
- Israeli Institute for Intelligence and Special Operations (MOSSAD)
Institutional hacking includes: surveillance and spying of citizens and nation states by cracking digital devices, computers and smartphones by intercepting or hijacking emails, instant messages and chat service monitoring (Skype, Google Talk and other IP telephony services), bugging conversations, GPS tracking; even deploying viruses and spyware in some cases.[4]
Footnotes
- ↑ Impassioned hackers who care deeply about the technologies they use and develop, ironically, are key attributes employers search for when interviewing potential candidates because it increases the likelihood
- ↑ United States Federal Computer Fraud and Abuse Act 1986.
- ↑ For an overview of the current hacker typology, please see diagram
- ↑ It emerged in 2010, when activists raided state security offices, that a UK based firm called Gamma International had offered ‘security services’ to Hosni Mubarak’s regime in Egypt, allowing intrusion software to be deployed to enable authorities to monitor communications technologies such as Skype.
References
- [Kuhn, 1962] ^ Kuhn, T. (1962). The structure of scientific revolutions. Chicago, The University of Chicago Press.
- [Weber, 1905] Weber, M. (1905). The Protestant Ethic and the Spirit of Capitalism Munich.
- [Himanen, 2001] ^ Himanen, P. (2001). The Hacker Ethic and the Spirit of the Information Age. New York, Random House.
- [Rogers, 1995] ^ Rogers, E. M. (1995). Diffusion of Innovations. New York, The Free Press.
- [Robson, 1999] ^ Robson, G. (1999). "How to Become a Hacker in 2473 easy lessons." Retrieved
March 20, 2012, from http://users.telenet.be/mydotcom/library/index.htm.
- [BBC, 2012] ^ "Two men bailed over computer-hacking probe." from http://www.bbc.co.uk/news/uk-17161804.
- [BBC, 2012] ^ "News Corp profits increase as hacking scandal costs soar." from http://www.bbc.co.uk/news/business-16964528.
- [BBC, 2012] ^ "BBC (2012). "Inside 'dirty lab' hacking to beat hackers." Technology News. from http://www.bbc.co.uk/news/technology-17123857.