This website uses cookies to ensure you have the best experience. Learn more

Hacking And Digital Counter Culture Essay

2712 words - 11 pages

Hacking and Digital Counter Culture
Hacking was first introduced as a new way to embrace and utilize computer technology. Many of the hackers then saw the technology as a way to demonstrate their independence and aims to share this to the public and they used the computer to achieve this. In the last couple of years however, hacking has been given a new connotation. It became connected with criminal and illegal activities which is totally different from what the hackers had in mind when they initially used and created new technologies.
At present, the use of computer technologies and its related technologies is once again changing and reverting to its original ideals and concept. It is predicted that this new trend shall continue to influence the way and shall set a new course the computer technology is used globally.
This paper looks into the evolution of hacking since its birth in the 50’s and the 60’s to the present. A focus on the cross cultures then and now shall demonstrate how hacking and hackers have become associated with illegal activity. The paper shall answer the question as to whether counter cultures enforced the negativity or whether mainstream culture portrays hacking in a negative way.
I. Definition and Evolution of Hacking
Hacking is defined as 1) “the hobby/profession of working with computers and 2) breaking into computer systems” (Definition). The two definitions is a perfect example of how hacking evolved over the years. The first definition was first used to describe the people who work with computers. They are the ones considered as the first hackers. Although this definition is still being used today, the second definition has become the more acceptable definition of hacking. The action has now become associated with breaking into computer systems and ‘breaking’ comes into different forms, usually in relation to doing illegal activities.
Over the years hacking has evolved quite significantly. From the time hackers used computers to demonstrate their independence and to show a new way of doing things, hackers today can be classified into several groups with their own ideals and agenda. This evolution begun in the 80s and continues today.
During the 80s and the 90s, hackers continued to attack various private and public sites for their own personal reasons. They have learned that their knowledge and skills are powerful tools that they can use freely. Whether the site or systems are restricted or not, they continued to break-in into them. They became renegades and many were arrested. This is the first group of hacker who evolved quite differently from the old hackers of the 50’s and the 60’s; and they have their own set of rules.
In 1997, hackers hit Yahoo. The hackers claimed that unless hacker Kevin Mitnick is released, they would release a virus on PCs of Yahoo users. The following year, they hacked into the United Nation’s Children Fund site and threatened that they will unleash a ‘holocaust’ if Kevin...

Find Another Essay On Hacking and Digital Counter Culture

CBSC301 Midterm Essay

1236 words - 5 pages Companies Specializing in Computer Forensics and Updates on Computer Crime Prosecution Computer forensics is defined as the act of analyzing digital information in an attempt to discover evidence and report the findings in a legally admissible form. Computer forensics teams are highly trained individuals with ongoing training that helps them keep up with the current trends in computer crime. Certifications qualify these individuals to conduct

The Three Hats of Hackers Essay

1500 words - 6 pages The definition of hacking has undergone some changes in the past few years. At first it identified people “who enjoys modifying and subverting system, whether technological bureaucratic or sociological.” (Lemos, 2002) In the last decade hacking has evolved to describe “those people with a hands-on interest in computer security and circumventing such security. (lemos 2002) As you explore deeper into the digital landscape it becomes clearer

the benefit of hacking

1491 words - 6 pages Most people have heard the term “hacking” at least once in this digital age, and most of the time it is in a negative context. The reason for that is the definition of hacking is “gaining unauthorized access to a computer or program that does not belong to you.” That may sound bad, but it can actually be quite beneficial. Hacking can help improve digital security by finding the holes in it or help someone find wrongly hidden information. You see

Hacking in the 21st Century

2740 words - 11 pages themselves and to use their talents for the advancement of society. Nicola Johnson, a senior lecturer at Monash University and author, defines digital insiders as computer experts who are immersed in the technological culture on a daily basis (par 1). Digital newcomers are average people who realize using a computer is essential to their working and personal life and are learning various aspects of a computer as they go along. Digital newcomers are

Cyber Security

1295 words - 5 pages financial world. However cyber security teams are being developed by the FBI to counter act these attacks and protect the valuable data of the government. Hacking Hacking is when a person who secretly gets access to a computer system in order to get information or cause damage. Unlike cyber terrorism which is usually done by terrorist organization that are overseas and are difficult to track because they are in different countries. Hackers are

Computer Hackers and Ethics

1639 words - 7 pages for years. He was arrested in 1981 for stealing manuals from Pacific Bell, in 1982 he was caught hacking into computers at the University of Southern California. At age 25, he was caught hacking into computers at MCI and Digital Equipment. He caused $4 million dollars in damage and stole $1 million dollars in software. In 1992, when police came to question Mitnick on parole violations, he disappeared. He was a fugitive hacker and continued to

technology and security in africa

661 words - 3 pages have unintended outcomes. Looking again at the Westgate Mall siege in Kenya, the lethal innovation was the way that the attackers used modern technology. They communicated via smart phones and satellite phones for communication. In the digital world where in cyberspace we come across insecurity in hacking, fraud and identity theft. Several other insecurities such as sexual harassment of minors also occur in cyberspace. Cybercrime causes

murdoch case

3561 words - 14 pages Student Numbers: z3401738 - z3448730 - z3269051 - z3436762Course Code : MGMT5050UK Phone Hacking ScandalPART A: CASE STUDYThe phone hacking scandal of News of the World (NoW) is perhaps so far the biggest press crisis in Britain. This criminal culture has become clear since July 2011 and has created widespread public controversy which threatened the presence of Rupert Murdoch's global media conglomerate (Bernstein 2011). More importantly, the

Cyber Ethics: Principles to Combat Hacking

2521 words - 10 pages technology field, issue regarding to ethics and professionalism had been given name as cyber ethics. According to ikeepsafe (n.d.), cyber ethics is the discipline of using ethical behaviors and acknowledging moral duties to online environment and digital media. This issue includes hacking, phishing, copyright, downloading, cyber bullying, etc. The issue discussed in this paper, is the most problematic and troublesome - Hack. According to

Kevin Mitnick

1123 words - 5 pages . What He did: During his time the underground culture of phone phreaks had already flourished over the years. He was able to commandeer a phone company’s digital central office switch by remotely dialling in by just using a personal computer and modem. Along with free calls that he had mastered, also used to eavesdrop on the rich and the powerful or even on his own enemies. He later joined in an informal phone phreak gang in Hollywood where they

Hackers vs. Crackers

3212 words - 13 pages this question because the identity of a culture in our society-the hacker culture-is being challenged. It is being defined as good or bad. This good or bad status affects the way Americans use the Internet, the way the government controls or does not control the Internet, and the way technology will grow in the future. Some people say that there is no difference between hackers and crackers; they are both criminals. Others say that there are

Similar Essays

Counter Culture Study: Adam Freeland, Breakbeat Pioneer And Political Activist

2444 words - 10 pages intelligent, soulful music, instead of dance-floor fodder.Counter culture can be loosely defined as deviance from a society's or a scene's expectations. In this essay I will utilise several readings and analytical techniques in order to highlight the counter - cultural actions and perspectives of my chosen artist, Adam Freeland.Adam Freeland - Breaks pioneerBeing hailed as the pioneer of a genre/sound can be considered a counter - cultural

Cyber Crime: What Is Hacking? Essay

1313 words - 6 pages heavy, irregular blows.” This is exactly what cyber criminals are doing today, slicing through counter measures to obtain digital knowledge, which is then sold on the black market or hacking sites with formats similar to eBay. From there, depending on the information, it is used to open up credit card accounts, apply for government benefits, and other forms of identity theft. The means by which they do this is only limited to expertise and

Hacking Nationalism Essay

1676 words - 7 pages , mostly those ending with the `.cn' domain. They hacked into these websites and left vulgar and racist taunts on these web sites. Of which "Poizon Box" was responsible for a significant number. In retaliation, the China-loyal hackers by the names of Hacker Union of China and China Eagle defaced more than 1 000 websites and launched "Denial-of-Service" attacks against the White House and CIA. Hacking in China was given a nationalist twist, with

Hacking Controversey Essay

1780 words - 7 pages When the public hears the term hacking, they often think of theft, defacement, crime, and other words associated with criminal activities. Nowadays, this view is, in a way correct, but it is not entirely true. It is safe to say that quite a few hackers are bad, but that is because we are in the 21st century. We are the most technological advanced generation to date. The good hackers do far out ways the bad that some individuals commit. The view