Question 6: Hackers are the heroes of the 21st Century. Argue for or against this statement.
Essay Framework Proposal
This is a essay framework proposal. But, i am still not sure whether i will change some of the topic if there's more interesting thing to say about.
Introduction:
1. Subject matter: Hackers. Introduce type of hackers in 21st century.
2. Research Objective: To identify whether hackers are heroes of the 21st century.
3. Research Questions: How hacker affect our lifestyle in this 21st century.
4. Relevance of research:
- To understand what does hacking means, and what type of hacker in this 21st century is more famous.
- To understand hacking can use in what terms.
Body:
-Introducing what does hackers actually do in this 21st century.
-Talk about group hacking and individual hacking.
-Analysis FB community about "hacking".
-Brings out the "cyberfeminism" (Female in hacking).
-Woman hacking and psychology problem
-White-hat hacking (Games+ Hacking)
-Female Hackathon
Conclusion:
-Sumary of why they are the heroes of 21st century.
-What they actually have contribute to this world.
-How they changed the future world
-Concluding statement
References
Appendix
Sunday, January 19, 2014
Female Hackathon
Hack is not only about hack into computer system, there's also some other meaning on hack.For example, it can be create some apps etc. ESPN has held a public hackathon whereby to brought all the female hackers and college athletes together to create apps combining sports and tech. For my own opinion, having this kind of hackathon is actually a good way to make every hacker can communicate to each other and know more details about different way og hacking of different idea. One of the winning hacks are "management platform" for sport leagues named "the pack is here". It uses Google calender, Twilio and Twitter to monitor league communication, schedule practices and games, and communicate with multiple teams. It gets supported by one of the team members Margaret Morris's friends by tweeting to the hashtag #espnwderby.
I like the way Espn using hacking to introduce their own channel by organized some of this kind of "Hack" event. With this, hacker can become a more useful person by help those channel or company to make some apps etc.
References:
1) Tony, M. (2012) Female hackers represent well at first espnW Hackathon. Available at: https://www.twilio.com/blog/2012/11/female-hackers-represent-well-at-first-espn-hackathon.html
[Accessed: 17th Juanuary, 2014].
2) Twilio blog images (2012) App photos-Does parking suck? [Online] Available at: https://www.twilio.com/blog/2012/11/female-hackers-represent-well-at-first-espn-hackathon.html [Accessed: 17th January, 2014].
3)Twilio blog images (2012) App photos-Strength is beautiful [Online] Available at: https://www.twilio.com/blog/2012/11/female-hackers-represent-well-at-first-espn-hackathon.html [Accessed: 17th January, 2014].
4) You tube (2012) First espnW "Hack day" is huge success. Available at: https://www.youtube.com/watch?feature=player_embedded&v=A1Ty2hchpzc [Accessed: 17th January, 2014].
I like the way Espn using hacking to introduce their own channel by organized some of this kind of "Hack" event. With this, hacker can become a more useful person by help those channel or company to make some apps etc.
This is one of the Espn API , it uses to tell u that is your town going to hold up a traffic if there's a game in your town.
Source: Twilio blog image (2012)
Figure 1: Does parking suck?
This is a web app for weight training tutorials and its free!
Source: Twilio blog image (2012)
Figure 2: Strength is beautiful.
References:
1) Tony, M. (2012) Female hackers represent well at first espnW Hackathon. Available at: https://www.twilio.com/blog/2012/11/female-hackers-represent-well-at-first-espn-hackathon.html
[Accessed: 17th Juanuary, 2014].
2) Twilio blog images (2012) App photos-Does parking suck? [Online] Available at: https://www.twilio.com/blog/2012/11/female-hackers-represent-well-at-first-espn-hackathon.html [Accessed: 17th January, 2014].
3)Twilio blog images (2012) App photos-Strength is beautiful [Online] Available at: https://www.twilio.com/blog/2012/11/female-hackers-represent-well-at-first-espn-hackathon.html [Accessed: 17th January, 2014].
4) You tube (2012) First espnW "Hack day" is huge success. Available at: https://www.youtube.com/watch?feature=player_embedded&v=A1Ty2hchpzc [Accessed: 17th January, 2014].
Saturday, January 18, 2014
Trained to become a white-hat hackers
I realize that, hacker can actually trained to become a white-hat hacker which is can help out all the big company or government agencies in the future. Through this, peoples will change their mind that hacker is actually a hero and no longer a bad people anymore. I found out that, in New York, there's students who trained to become a white-hat hackers. They are trained to help out the government and company to protect their data from cyber attacks. They are so called "new espionage". The professor and industry even created their very own hacking exercise for those students, because students cant simply hack into others webpage just to learn how to hack. Other than that, i've found out a very interesting white-hat hackers case study. He is actually a black-hat hacker at first, but he was caught by FBI and spent 5 years in the prison. After he came out, he decided to become a white -hat hackers. His name is Kevin Mitnick. The way he hacked system is nothing to do with computer skills but language skills. A professional white-hat hackers have to know all the skills though, for example, network, hardware or software hacking skills. Kevin Mitnick after that teamed up with Steve Jackson Games and come up with a Control-Alt-Hack. Its a game that pretend you're an ethical white-hat hacker working for an elite security company. The game is fun, but in the other side, you can also learn the ethical hacking at the same time. It will help a lot to let people become a white-hat hacker in the future if they are interest in hacking.
References:
1) Jake, P. (2013) Inside the cybersecurity, 'white-hat hacker' University Network. Available at: http://www.huffingtonpost.com/2013/04/11/cybersecurity-hacker-network-college_n_3064465.html [Accessed: 17th January, 2014].
2) Queen Mary (2011) Ninja white hat hacking. Available at: http://www.cs4fn.org/security/controlalthack.php [Accessed: 17th January, 2014].
3) Seth,Rosenblatt (2012) Hacking, the card game, debuts at black hats. [Online]. Available at: http://news.cnet.com/8301-1009_3-57480269-83/hacking-the-card-game-debuts-at-black-hat/ [Accessed: 17th January, 2014].
4) Tamara Denning (2014) Tools and Projects. [Online]. Available at: http://homes.cs.washington.edu/~tdenning/publications.html [Accessed: 17th January, 2014].
Figure 1 above (Seth Rosenblatt, 2012) Control-Alt-Hack games
Figure 2 above (Tamara Denning, 2014) White-hat hacking for fun and profit
1) Jake, P. (2013) Inside the cybersecurity, 'white-hat hacker' University Network. Available at: http://www.huffingtonpost.com/2013/04/11/cybersecurity-hacker-network-college_n_3064465.html [Accessed: 17th January, 2014].
2) Queen Mary (2011) Ninja white hat hacking. Available at: http://www.cs4fn.org/security/controlalthack.php [Accessed: 17th January, 2014].
3) Seth,Rosenblatt (2012) Hacking, the card game, debuts at black hats. [Online]. Available at: http://news.cnet.com/8301-1009_3-57480269-83/hacking-the-card-game-debuts-at-black-hat/ [Accessed: 17th January, 2014].
4) Tamara Denning (2014) Tools and Projects. [Online]. Available at: http://homes.cs.washington.edu/~tdenning/publications.html [Accessed: 17th January, 2014].
woman white-hat hacker
From my research, i found out that there's a white-hat hacker woman that i think is interesting to talk about. Her name is Natasha Grigori (Net handle based upon a US cartoon character). She had ran a bulletin board system for software pirates in the early 1990s and she is now the founder of an anti paedophile hacker group entitled antichildporn.org. The reason why this white-hat hacker group is exist is because they want to use their skills to track kiddie-porn distributors and pass the information on to law enforcement. For my analysis, i realize that in this 20th century, there's so many of so called porn thing spreading around in the internet. But, nobody can even stop all the spreading of porn videos. Through this organization, they can help a lot, they can even cooperate with other white-hat hackers to stop this kind of porn spreading around. For me, they are the hero who rescue all the victim who been framed or trapped to appear in the porn video.
Reference:
1) Sascha, S. (2013) Female of the spacies. Available at: http://www.dvara.net/hk/fewbutstrong.asp [Accessed: 16th January, 2014].
2) Yvonne,J. (2002) "Dot.cons" Crime, deviance and identity on the internet. [Online] Available at: http://books.google.com.my/books?id=RYUKahFT2mIC&pg=PA144&lpg=PA144&dq=courtnee+hacker+based+in+the+pacific+northwest&source=bl&ots=9vpG4qGyc3&sig=GbmyCjV1JvDg4O7HH36gMI29qbE&hl=en&sa=X&ei=hizbUqC8JaetiAfKjYDIBQ&ved=0CDIQ6AEwAg#v=onepage&q=courtnee%20hacker%20based%20in%20the%20pacific%20northwest&f=false [Accessed: 16th January, 2014].
Reference:
1) Sascha, S. (2013) Female of the spacies. Available at: http://www.dvara.net/hk/fewbutstrong.asp [Accessed: 16th January, 2014].
2) Yvonne,J. (2002) "Dot.cons" Crime, deviance and identity on the internet. [Online] Available at: http://books.google.com.my/books?id=RYUKahFT2mIC&pg=PA144&lpg=PA144&dq=courtnee+hacker+based+in+the+pacific+northwest&source=bl&ots=9vpG4qGyc3&sig=GbmyCjV1JvDg4O7HH36gMI29qbE&hl=en&sa=X&ei=hizbUqC8JaetiAfKjYDIBQ&ved=0CDIQ6AEwAg#v=onepage&q=courtnee%20hacker%20based%20in%20the%20pacific%20northwest&f=false [Accessed: 16th January, 2014].
woman hacking and psychology problem
From the last post, i've talk about the "cyberfeminism" which is the word that i found out is interesting. So, for this post, i decided to go further on the female hacking. Most of the woman who will participate in hacking is because they don't really satisfied with their own life. Most of them are highly educated and financially independent, that's why they use the different way to wreak their dissatisfaction. When we talk about hacking, male will come to our mind then female first, so, i found out that female who hack into internet have their own personal reason. From my research, i realize that hacking have involved some psychology problem. For example, case of Susan Headly. She was a very talented hacker. She are willing to learn just to show her own status in this community. She hacked into her lover, Roscoe phone and computer, because Roscoe decided to marry other girl but not her. Susan decided to revenge him by collected all this document to prove that he is actually a hacker. From this, i can see that hacking is not only just an interest for those hackers, but,it have relationship with some psychology things. How if we can change those bad sentiment into a positive energy for those hackers. For my own opinion, i feel that government can train those woman which have the desire to make themselves have more status in both real world and virtual world by let them be a white-hat hacker, and let them become a hero of hacker in the future. Normally, there's just a few female which have interest in hacking, but, most of these female have their own reason why they have interest in hacking. For my analysis, hacking can let people wreak their own dissatisfaction and we can call them the hero, because they are actually change their negative mind into something which is useful for this virtual world.
Reference:
1)Tina, H. (1999) Woman Hackers. Available at: http://www.obn.org/hackers/text1.htm [Accessed: 15th January, 2014].
2) Writanker, M. (2007) Women taking to cyber crime to large nos. Available at: http://articles.economictimes.indiatimes.com/2007-06-23/news/28434010_1_cyber-crime-women-employees-mukund-pawar [Accessed: 15th January, 2014].
Reference:
1)Tina, H. (1999) Woman Hackers. Available at: http://www.obn.org/hackers/text1.htm [Accessed: 15th January, 2014].
2) Writanker, M. (2007) Women taking to cyber crime to large nos. Available at: http://articles.economictimes.indiatimes.com/2007-06-23/news/28434010_1_cyber-crime-women-employees-mukund-pawar [Accessed: 15th January, 2014].
Friday, January 17, 2014
Female in internet culture hacking
Not only male know how to hack and know things about internet culture, but same goes to female too. The only difference is the percentage of male that have interest on it is more than female. Through my analysis, female nowadays not only have to be strong in reality world, but also in a virtual world, which what we called it internet culture or computing. Most of the peoples always thought that female are not really know how to use computer or do internet stuff, but, i have realize that, once they are willing to learn, it will be totally difference. There is a word that i found out very interesting, that is " cyberfeminism". This " cyberfeminism" started in '60s and '70s. It address the status of woman within the technoculture, and woman who interested in digital or internet stuff.
Through this, i found out a very famous female hacker, her name is Susan Headly and born in 1959. She is a hacker during late 1970s and early 80s. She is a member of so called Cyberpunk. She worked as a prostitute before. The reason why she join hacking is so that she could feel the power and this is the only way where she could feel her self-esteem because she had been mistreated as a kid, her life was not that good. Only she can feel the pride through hacking, because this is her strengths. Through her story, i feel that hacking is actually not really a bad thing, sometimes, it can give someone who is very good in hacking no matter you are white hat hacker or black hat hacker feel the positive energy if you are not really good in anything else other than hacking. You can feel your own presence in this community and you can also contribute something to this world.
Reference:
1)Daniel Amrup (2013) Female hackers? Available at: http://denis.salem.free.fr/EXTRA_ST0RAGE/mirroir/copyrightdoesnotexist/ch14web.htm [Accessed: 15th January, 2014].
2) Charlie Gere (2002) Digital Culture. 2nd edn. UK: London.
Through this, i found out a very famous female hacker, her name is Susan Headly and born in 1959. She is a hacker during late 1970s and early 80s. She is a member of so called Cyberpunk. She worked as a prostitute before. The reason why she join hacking is so that she could feel the power and this is the only way where she could feel her self-esteem because she had been mistreated as a kid, her life was not that good. Only she can feel the pride through hacking, because this is her strengths. Through her story, i feel that hacking is actually not really a bad thing, sometimes, it can give someone who is very good in hacking no matter you are white hat hacker or black hat hacker feel the positive energy if you are not really good in anything else other than hacking. You can feel your own presence in this community and you can also contribute something to this world.
Reference:
1)Daniel Amrup (2013) Female hackers? Available at: http://denis.salem.free.fr/EXTRA_ST0RAGE/mirroir/copyrightdoesnotexist/ch14web.htm [Accessed: 15th January, 2014].
2) Charlie Gere (2002) Digital Culture. 2nd edn. UK: London.
Digital Art
This is artist Pauline Saglio's " Rewind" installation. For this installation, what that artist want to express is time is precious. Nowadays, most of the new generations keeo open up their phone to play games or see some things on the phone, but, nobody would experience the process of time in an in-depth manner. So this artist, Pauline Saglio make this collection of interactive clock so that everyone can experience the process of time. Since the digital evolution, nobody will realize the time passing. Through this installation, people can actually know how the time process and enjoy the processing of the time.
Reference:
1)Steve Coast(2013) GPS Art Poster. Available at: http://www.kickstarter.com/projects/237731198/gps-art-poster?ref=discovery [Accessed: 9th January, 2014].
2) Zach Sokol(2013) With "rewind" installation, Time is Literally in your hand. Available at: http://thecreatorsproject.vice.com/blog/time-is-in-your-hands-literally [Accessed: 9th January, 2014].
Figure 1 above (Zach Sokol, 2013) "rewind installation"
Another project that interesting is GPS Art Poster by Steve Coast. This is different from the traditional map that we seen usually. They using paper, software and print to make this art poster. I like the idea of they make this map more lively, its like we can know how many peoples will go to certain place through the poster. They used many effort on drawing the map, so, we can see the line and place very details and clearly. It makes all the city in the poster interesting, its not like a dead city which means that it doesn't look like just a drawing of a city.
Figure 2 above ( Steve Coast,2013) GPS Art Poster
1)Steve Coast(2013) GPS Art Poster. Available at: http://www.kickstarter.com/projects/237731198/gps-art-poster?ref=discovery [Accessed: 9th January, 2014].
2) Zach Sokol(2013) With "rewind" installation, Time is Literally in your hand. Available at: http://thecreatorsproject.vice.com/blog/time-is-in-your-hands-literally [Accessed: 9th January, 2014].
Thursday, January 16, 2014
Fb community
Hacking is like a virus which spread around the world in a very fast speed. For my analysis, hacking doesn't just meant by hack into people's computer or website, but, it also can be use in term of 'virus'.
For example, internet Memes. Internet memes is actually a creativity of human. It is very popular in this generation. Memes is originally came from a term of biology. Spread of memes can be defined as spread of virus. It is because everyone's kept sharing this memes to each other especially when they are commenting on facebook, this is what FB community popular nowadays. For example:
They'll put in the memes whenever they are commenting on friends status or they'll just share the memes on their facebook page. This is the reason why it spread to person in person so fast. For my opinion, i think this memes is a good way to let everyone to communicate some issue and have a more deep memory on those issue. This is a good virus compared with the hacking which hack into others facebook to post bad virus.
References:
1) Halorlz (2013) Facebook Memes [Online]. Available at: http://www.funnyjunk.com/funny_pictures/4361131/Facebook+Memes/ [Accessed: 8th January, 2014]
2) Shuajaa Imran (2012) Sending Memes to your friend on any IOS device [Online]. Available at: http://applegeniuses.blogspot.com/2012/08/sending-memes-to-your-friends-on-any.html [Accessed:8th January, 2014]
3) Paul Gil (2014) What is a 'Meme'? What are examples modern Internet Memes? Available at: http://netforbeginners.about.com/od/weirdwebculture/f/What-Is-an-Internet-Meme.htm [Accessed: 8th January, 2014]
For example, internet Memes. Internet memes is actually a creativity of human. It is very popular in this generation. Memes is originally came from a term of biology. Spread of memes can be defined as spread of virus. It is because everyone's kept sharing this memes to each other especially when they are commenting on facebook, this is what FB community popular nowadays. For example:
Figure 1 above (Halorlz, 2013) Facebook Memes
Figure 2 above ( Shuajaa Imran, 2012) sending memes to your friend on any IOS device.
References:
1) Halorlz (2013) Facebook Memes [Online]. Available at: http://www.funnyjunk.com/funny_pictures/4361131/Facebook+Memes/ [Accessed: 8th January, 2014]
2) Shuajaa Imran (2012) Sending Memes to your friend on any IOS device [Online]. Available at: http://applegeniuses.blogspot.com/2012/08/sending-memes-to-your-friends-on-any.html [Accessed:8th January, 2014]
3) Paul Gil (2014) What is a 'Meme'? What are examples modern Internet Memes? Available at: http://netforbeginners.about.com/od/weirdwebculture/f/What-Is-an-Internet-Meme.htm [Accessed: 8th January, 2014]
Monday, January 13, 2014
Group hacking
Hacking is actually a cyber crime nowadays, which means that there are lots of cyber terrorism would like to hack into either big company or government website which have useful information or secret for them etc. But, sometimes, they will have difficulty to hack into those big company or government website by their own. So, now they are more organized and powerful, which they will group up together to break the security wall. Hacking is not only hack within their own country, but is between different country. They would like to arrange some hackers to other country which we called that as 'economic espionage' (spy) to stole some useful information or secrets. They can just make this hacking as an easy job if they cooperate to stole it in different country, they can either exchange their information or collect all together. For my analysis, through this action, they can even earn more money in a short time and also get more information or secret. Other than that, there is also war between hackers, which we called it Net Wars. This is something like they are fight between each other, this is always happened in between white-hat hacker and black-hat hackers. Government or big company will always have professional hackers there to help them cope the terrorism hacker. This is something like cyber attacks.
Conclusion, i feel that hackers have their own economy which is like they are actually doing business too, but its just in a different way with the actual business in this cyber age. They can actually make hacking as a good activities like the video of Cyber Security Challenge UK on BBC One Show. This is a good way to train teenagers to become a white hat hackers which help to cope with the cyber
war.With this, they can make hacking as a proper job, and make everyone change the mind that hackers is actually a hero. Through this kind of activity, they can learned a lot from each other and have communication with each other but not only sit infront the computer and do their own hacking.
Links:
1)J,Silverman.Could hackers devastate the U.S. economy?Available at http://computer.howstuffworks.com/die-hard-hacker.htm [Accessed 3rd January, 2014]
2)You Tube (2012) Cyber Security Challenge UK on BBC One Show. Available at: http://www.youtube.com/watch?v=XvlL2eGohq0 [Accessed 3rd January, 2014]
Conclusion, i feel that hackers have their own economy which is like they are actually doing business too, but its just in a different way with the actual business in this cyber age. They can actually make hacking as a good activities like the video of Cyber Security Challenge UK on BBC One Show. This is a good way to train teenagers to become a white hat hackers which help to cope with the cyber
war.With this, they can make hacking as a proper job, and make everyone change the mind that hackers is actually a hero. Through this kind of activity, they can learned a lot from each other and have communication with each other but not only sit infront the computer and do their own hacking.
1)J,Silverman.Could hackers devastate the U.S. economy?Available at http://computer.howstuffworks.com/die-hard-hacker.htm [Accessed 3rd January, 2014]
2)You Tube (2012) Cyber Security Challenge UK on BBC One Show. Available at: http://www.youtube.com/watch?v=XvlL2eGohq0 [Accessed 3rd January, 2014]
Subscribe to:
Comments (Atom)



