Image of Kevin Mitnick Image link:blogs.voxeo.com |
Jacob Silverman has discovered some famous hackers:
Kevin Mitnick
He is accused in break the law and become target of FBI manhunts during his hacking. He was jailed in 1998 and the second time was from 1995-2000. He was also not allowed to use internet for three years but only managed to send or received e-mail. He then has been subject to several books including 'Takedown' which became a movie and screen on cinema.
Adrian Lamo
Image of Adrian Lamo image link:www.huffingtonpost.co.uk |
What is Asperger?
According to The National Autistic Society, Asperger Syndrome is a form of autism which is a lifelong disabilities that affects how a person makes sense of the world, processes information and relates to other people.
Robert Tappan Morris
He is professor at MIT Computer Science and Artificial Intelligence Laboratory but before that he is claimed
as the computer world's most renowned hacker. He released first computer 'worm', or known as virus to 6000 computer and caused a serious damage on them. He is not done it purposely so convicted under act as he not intend to cause the damage.
He was hunted by FBI but eventually he went straight and giving up hacking but he has working as journalist and has positioned as senior editor at Wired Magazine. He often writes the stuff about hacker.He is also in charge with Kingpin where he wrote his unmatched access and expertise in the book form and gripping cat and mouse narrative and also unprecedented view into 21st century signature of organised cybercrime. It also traces of this new generation of for-profit hacker wreaking havoc on internet today- a breed of professional computer outlaws far remove from the teenager who come with the word "hacker".
Image of Kevin Pouls Image Linkwww.wired.com |
Image of Kingpin Image link:http://kingpin.cc/ |
Is organised in 1993 which a party for member of Platinum Net, a Fido protocol based hacking network out of Canada.It has been one of the world's largest gathering of hackers. The event featured lectures, hacking contest and etc.There are also many well known hackers and computer security specialist attended this event.
Official page of DEF CON
link:
Video:The story of DEF CON
link:http://www.youtube.com/watch?v=lg6bQMTjHCE
References link:
Silverman,J.(2013) 10 Famous Hackers and Hack.Discovery Communication, LLC. Available at:http://dsc.discovery.com/tv-shows/curiosity/topics/10-famous-hackers-hacks.htm [Accessed 22 December 2013]
DEF CON Communication, Inc. (1996-2013) What is DEC FON? Available at:http://www.defcon.org/html/links/dc-about.html [Accessed 22 December 2013]
Sterling, B. (2011) Wired: Kingpin by Kevin Poulsen. Available at: http://www.wired.com/beyond_the_beyond/2011/02/kingpin-by-kevin-poulsen/
[Accessed 22 December 2013]
The National Autistic Society (2013) What is Asperger Syndrome? Available at:http://www.autism.org.uk/about-autism/autism-and-asperger-syndrome-an-introduction/what-is-asperger-syndrome.aspx [Accessed 22 December 2013]
Tate, J. (2013) National Security: Judge sentences Bradley Manning to 35 years. Available at:http://www.washingtonpost.com/world/national-security/judge-to-sentence-bradley-manning-today/2013/08/20/85bee184-09d0-11e3-b87c-476db8ac34cd_story.html [Accessed 22 December 2013]
The story of DEC FON (2007) Directed by help net security. Available at: http://www.youtube.com/watch?v=lg6bQMTjHCE [Accessed 22 December 2013]
link:http://www.youtube.com/watch?v=lg6bQMTjHCE
References link:
Silverman,J.(2013) 10 Famous Hackers and Hack.Discovery Communication, LLC. Available at:http://dsc.discovery.com/tv-shows/curiosity/topics/10-famous-hackers-hacks.htm [Accessed 22 December 2013]
DEF CON Communication, Inc. (1996-2013) What is DEC FON? Available at:http://www.defcon.org/html/links/dc-about.html [Accessed 22 December 2013]
Sterling, B. (2011) Wired: Kingpin by Kevin Poulsen. Available at: http://www.wired.com/beyond_the_beyond/2011/02/kingpin-by-kevin-poulsen/
[Accessed 22 December 2013]
The National Autistic Society (2013) What is Asperger Syndrome? Available at:http://www.autism.org.uk/about-autism/autism-and-asperger-syndrome-an-introduction/what-is-asperger-syndrome.aspx [Accessed 22 December 2013]
Tate, J. (2013) National Security: Judge sentences Bradley Manning to 35 years. Available at:http://www.washingtonpost.com/world/national-security/judge-to-sentence-bradley-manning-today/2013/08/20/85bee184-09d0-11e3-b87c-476db8ac34cd_story.html [Accessed 22 December 2013]
The story of DEC FON (2007) Directed by help net security. Available at: http://www.youtube.com/watch?v=lg6bQMTjHCE [Accessed 22 December 2013]
Good sources and identification of major sectors, concepts, and experts.
ReplyDeleteSo focus on an angle and issue and it'll help you find a side on the issue.
Most hacking seem to focus on the political or business world. Can you find some intersection between hacking and art/design then see if hackers are doing good/bad work in these creative fields?
Curious, did you identify non-American experts?
One of the hackers you highlighted was inspiration for some films on hacking. That might be a way to explore the issue too. It's like the science fiction question, but instead of using sci-fi and comparing it to real technology or circumstances, you take a fictional movie (which tends to feature hackers as heroes - i think in the first Transformer movie) then compare them to the real individuals or similar cases.
Cheers.