Sunday 22 December 2013

Famous Hackers

There are many hackers in this world but who is the person who plays the roles of Hero which giving a helping hand and yet who is the hacker that harms to society.According to Jacob Silverman on Discovery Communication (2013), he has mentioned that the term of hacker now is defined where anyone who breaks into computer network and often carries out negative connotation. Some have broken the law but also some have gone on productive roles in computer industry which is legally.
Image of Kevin Mitnick
Image link:blogs.voxeo.com

Jacob Silverman has discovered some famous hackers:
Kevin Mitnick 
He is accused in break the law and become target of FBI manhunts during his hacking. He was jailed in 1998 and the second time was from 1995-2000. He was also not allowed to use internet for three years but only managed to send or received e-mail. He then has been subject to several books including 'Takedown' which became a movie and screen on cinema.
                                                                  
                                                                                     


Adrian Lamo
Image of Adrian Lamo
image link:www.huffingtonpost.co.uk
He is known as "The homeless hacker" as he sometimes works in abandoned building.Adrian Lamo has hack into famous organisations such as Google, Microsoft, Yahoo, and MCI WorldCom but he is not hack for personal benefit where he has contacted the companies and report about the problem of security holes and he also helps them to fix the problem without any compensation. He is one the example of White Hat Hacker. In recent years, he was in the news about report Bardley Manning to police. ( According to Julia Tate(1996-2013)  has stated in National Security that Pfc. Bradley Manning judged 35years in prison which he faces his most serious charges---aiding the enemy for leaking hundreds of thousands of classified document to the anti-secrecy group Wikileaks). Adrian Lamo also diagnosed Asperger in April 2010
What is Asperger?
According to The National Autistic Society, Asperger Syndrome is a form of autism which is a lifelong disabilities that affects how a person makes sense of the world, processes information and relates to other people.


                                          
                                                                               
                                                               
Robert Tappan Morris
He is professor at MIT Computer Science and Artificial Intelligence Laboratory but before that he is claimed   
as the computer world's most renowned hacker. He released first computer 'worm', or known as virus to 6000 computer and caused a serious damage on them. He is not done it purposely so convicted under act as he not intend to cause the damage.

Image of Robert Tappan MorrisImage link: pdos.csail.mit.edu
Kevin Poulsen
He was hunted by FBI but eventually he went straight and giving up hacking but he has working as journalist and has positioned as senior editor at Wired Magazine. He often writes the stuff about hacker.He is also in charge with Kingpin where he wrote his unmatched access and expertise in the book form and gripping cat and mouse narrative and also unprecedented view into 21st century signature of organised cybercrime. It also traces of this new generation of for-profit hacker wreaking havoc on internet today- a breed of professional computer outlaws far remove from the teenager who come with the word "hacker".  




Image of Kevin Pouls
Image Linkwww.wired.com
Image of Kingpin
Image link:http://kingpin.cc/
DEF CON
Is organised in 1993 which a party for member of Platinum Net, a Fido protocol based hacking network out of Canada.It has been one of the world's largest gathering of hackers. The event featured lectures, hacking contest and etc.There are also many well known hackers and computer security specialist attended this event. 

                                                                                     Official page of DEF CON 
                                                                                     link: www.pearltrees.com 
                                                           Video:The story of DEF CON
                                            link:http://www.youtube.com/watch?v=lg6bQMTjHCE

References link:
Silverman,J.(2013) 10 Famous Hackers and Hack.Discovery Communication, LLC. Available at:http://dsc.discovery.com/tv-shows/curiosity/topics/10-famous-hackers-hacks.htm [Accessed 22 December 2013]

DEF CON Communication, Inc. (1996-2013) What is DEC FON? Available at:http://www.defcon.org/html/links/dc-about.html [Accessed 22 December 2013]

Sterling, B. (2011) Wired: Kingpin by Kevin Poulsen. Available at: http://www.wired.com/beyond_the_beyond/2011/02/kingpin-by-kevin-poulsen/ 
[Accessed 22 December 2013]

The National Autistic Society (2013) What is Asperger Syndrome? Available at:http://www.autism.org.uk/about-autism/autism-and-asperger-syndrome-an-introduction/what-is-asperger-syndrome.aspx [Accessed 22 December 2013]

Tate, J. (2013) National Security: Judge sentences Bradley Manning to 35 years. Available at:http://www.washingtonpost.com/world/national-security/judge-to-sentence-bradley-manning-today/2013/08/20/85bee184-09d0-11e3-b87c-476db8ac34cd_story.html [Accessed 22 December 2013]

The story of DEC FON (2007) Directed by help net security. Available at: http://www.youtube.com/watch?v=lg6bQMTjHCE [Accessed 22 December 2013]


                                         



1 comment:

  1. Good sources and identification of major sectors, concepts, and experts.

    So focus on an angle and issue and it'll help you find a side on the issue.

    Most hacking seem to focus on the political or business world. Can you find some intersection between hacking and art/design then see if hackers are doing good/bad work in these creative fields?

    Curious, did you identify non-American experts?

    One of the hackers you highlighted was inspiration for some films on hacking. That might be a way to explore the issue too. It's like the science fiction question, but instead of using sci-fi and comparing it to real technology or circumstances, you take a fictional movie (which tends to feature hackers as heroes - i think in the first Transformer movie) then compare them to the real individuals or similar cases.

    Cheers.

    ReplyDelete