Misplaced Pages

Hacker: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editNext edit →Content deleted Content addedVisualWikitext
Revision as of 21:38, 24 December 2007 view sourcePengo (talk | contribs)Administrators19,329 editsm Reverted edits by Andrew81446 (talk) to last version by Pengo← Previous edit Revision as of 20:22, 26 December 2007 view source Andrew81446 (talk | contribs)229 edits Removed bias in article and added further evidence of usage of "hacker" (Australia)Next edit →
Line 1: Line 1:
{{dablink|This article is about computer hacking. For other uses, see ] and ].}} {{dablink|This article is about computer hacking. For other uses, see ] and ].}}

'''Hacker''' has several common meanings, the unifying characteristic of which is only that it refers to a person who is an avid computer ]. It is most commonly used as a ] by the ] to refer to a person who engages in illegal ] remotely via some sort of communications network (e.g., the Internet, a ] or a dial-up network); its original meaning referred to an unauthorized user of the telephone company network (now called a ]) but it can also refer to people engaged in ethical computer hacking (e.g., debugging or fixing security problems), to the members of the open source and free software community, or to home computer hobbyists.<ref name="shapiro">Fred Shapiro: . ''American Dialect Society Mailing List'' (13. Juni 2003)</ref>

A '''Hacker''' is a general term in computing that refers to a computer programmer who takes advantage of the faults in the design of computer software or hardware (commonly referred to as "weaknesses") in order to:

# gain further knowledge about the internal workings of the software or hardware,
# gain access to some previously locked or hidden function of the software or hardware,
# disable some previously functioning part of the software or hardware so that it no longer works in the way it was originally intended, or
# command the software or hardware to perform an additional task that it was not originally designed to do.

As a hacker's activities commonly (but not always) involve reverse engineering{{ref label|reverseengineer|Note 8|8}} or direct modification of the software or hardware without the manufacturer's knowledge or authorisation, hacking often violates existing Copyright and Patent laws<ref name="copyrights">United States Department of Justice - </ref> in many countries. A hacker's activities also frequently include the exploitation of a weakness in software or hardware to, for example, command the software or hardware to perform a malicious action against an individual or organisation. While reverse engineering software or hardware to gain further knowledge about its internal may not be considered a crime, malicious acts arising from the exploitation of any weaknesses found are considered crimes and are even considered as terrorist acts in some countries<ref name="terrorhack">United Kingdom Office of Public Sector Information - </ref>. For these reasons, hacking, the activity of a hacker, is considered a crime under law in most countries especially . Numerous hackers have been, and continue to be, prosecuted<ref name="prevcases">United States Department of Justice, Computer Crime & Intellectual Property Section - </ref><ref name="pressreleases">United States Department of Justice, Computer Crime and Intellectual Property Section - </ref> for their actions, some even becoming infamous through the reporting of their activities in the media.

The word '''Hacker''' is a general term within the field of computing and there are more specific terms in use, particularly just within the United States, to describe the different types of hackers and the different kinds of software and hardware that they find weaknesses in. These different types of hackers are listed briefly in '''Section 6''' of this arcticle, however, to read in detail about these different kinds of hackers, please consult ] or ].



__TOC__




==Overview== ==Overview==
The hacker of the late 1950s to the early 1970s was originally known for applying expertise and skill to getting the maximum benefit out of hardware and software. These hackers were computer enthusiasts who were highly respected and their skills helped the software and hardware industries to advance very quickly in the early days of computing. However, hackers in general quickly became associated with crime as some of them applied their considerable expertise to illegal activities such as:
At least three major hacker subcultures, characterized by their largely distinct historical development, use the term 'Hacker' in their ] for self-identification.<ref>{{cite web|url=http://webzone.k3.mah.se/k3jolo/HackerCultures/origins.htm|title=webzone.k3.mah.se/k3jolo/HackerCultures/origins.htm<!--INSERT TITLE-->}}</ref> They are centered around different, but partially overlapping aspects of computers and have conflicting ideas about who may legitimately be called a hacker (see ]).


* the theft of assets (e.g. money<ref name="chicago70m"> - USA Today Newspaper Archives, 19th May 1988</ref> or information<ref name="hackoftheyear_1"> - The Sydney Morning Herald, 15th November, 2007</ref>)
In computer security, a hacker is someone who focuses on security mechanisms. In common use, which was popularized by the mass media, that refers to someone who illegally breaks into computer and network systems. That is, the media portrays the 'hacker' as a villain. Nevertheless, parts of the subculture see their aim in correcting security problems and use the word in a positive sense. They operate under a code of the ], in which it's acknowledged that breaking into other people's computers is bad, but that discovering and exploiting security mechanisms and breaking into computers is nevertheless an interesting aspect that can be done in an ethical and legal way.
* the use of services (e.g. telephones) without paying, and
* performing malicious deeds against, or causing material damage to, corporations and government institutions (e.g. espionage<ref name="MarkusHess_Ref">Dangerous Decisions: Problem Solving in Tomorrow's World - Enum Mumford. ISBN-13: 978-0306461439. Pages 161-165 (paperback)</ref>{{ref label|MarkusHess_Note|Note 3|3}}).


Within the Computer User clubs and IT-related Universities in the United States of America, there is currently a debate about the usage of the word ''hacker'' within US Academia and there is a proposal that it should only be associated with its original expertise-oriented meaning. To read in detail about this debate, and the issues involved, please see the article ].
This use is contrasted by the different understanding of the word as a person who follows a spirit of playful cleverness and loves programming. It is found in an originally academic movement unrelated to computer security and most visibly associated with ] and ]. It also has a ], based on the idea that writing software and sharing the result is a good idea, but only on a voluntary basis, and that information should be free, but that it's not up to the hacker to make it free by breaking into private computer systems. Academic hackers disassociate from the mass media's pejorative use of the word 'hacker' referring to computer security, and usually prefer the term 'cracker' for that meaning. In a third meaning, the term refers to computer hobbyists who push the limits of their software or hardware.


==Computer security hackers==
{{main|Hacker (computer security)}}


], author of ]]]


==The Dawn of the Hacker==
In ], a hacker is a person who specializes in work with the security mechanisms for computer and network systems. The subculture around such hackers is termed network hacker subculture, hacker scene or computer underground. While including those who endeavor to strengthen such mechanisms, it is more often used by the ] and popular culture to refer to those who seek access despite these security measures. Accordingly, the term bears strong connotations that may be favorable or pejorative.
As early as the mid 1940s, the American Government was sponsoring projects to build huge mainframe computers to forward research into processors and possible applications of those processors. One such project was a US Navy contract initiated during World War II for a flight simulator computer. The computer took so long to design that, by the time the designs were completed, the war was over and the US Navy had lost interest in the project<ref name="whirlwind"/>. However, the ] (MIT) in Cambridge, Massachusetts, USA, took over the designs and built just the computer. The result was the computer. The MIT Whirwind computer is said to have been the first ever computer to have a full-screen graphical display and it was this feature that led programmers of the huge mainframe (four floors of a two-storey building) to exercise their skills and stretch the capabilities of the computer to perform tasks that it was not originally designed to do. One such programmer, George Yale Cherlin, Ph.D, became famous amongst the Whirlwind project's 175 staff when he and some colleagues together managed to use the military-designed mainframe to create a graphical, real-time, simulation of the physics of a bouncing rubber ball<ref name="whirlwind">Edward Cherlin, and son of George Yale Cherlin, Ph.D, courtesy of </ref>. Cherlin's expertise in programming at that time can certainly be considered one of the earliest acts of hacking in the original good sense of the word.


The network hacker subculture initially developed in the context of ] during the 1960s and the microcomputer ] of the 1980s. It is implicated with '']'' and the '']'' newsgroup.


By ], hacking in the sense of breaking computer security had already been in use as computer jargon,<ref>See the , entry "hacker", last meaning.</ref> but there was no public awareness about such activities.<ref>{{cite paper|title=Computer hacking: Where did it begin and how did it grow?|publisher=WindowSecurity.com|date=October 16, 2002|url=http://www.windowsecurity.com/whitepapers/Computer_hacking_Where_did_it_begin_and_how_did_it_grow_.html}}</ref> However, the release of the movie '']'' that year raised the public belief that computer security hackers (especially teenagers) could be a threat to national security. This concern became real when a gang of teenage ] in ] known as ] broke into computer systems throughout the ] and ], including those of ], ] and ]. The case quickly grew media attention,<ref>{{Citation|newspaper=]|year=1983|date=September 27, 1983}}</ref><ref>{{Citation|last=Elmer-DeWitt|first=Philip|title=The 414 Gang Strikes Again|newspaper=]|pages=p. 75|year=1983|date=Aug. 29, 1983|url=http://www.time.com/time/magazine/article/0,9171,949797,00.html}}</ref> and 17-year-old Neal Patrick emerged as the spokesman for the gang, including a cover story in '']'' entitled "Beware: Hackers at play", with Patrick's photograph on the cover.<ref>{{Citation|title=Beware: Hackers at play|newspaper=]|pages=pp. 42-46,48|year=1983|date=September 5, 1983}}</ref> The Newsweek article appears to be the first use of the word ''hacker'' by the mainstream media in the pejorative sense.


==The First Hardware Hackers==
As a result of news coverage, congressman ] called for an investigation and new laws about computer hacking.<ref>{{cite web|publisher=Washington Post|url=http://www.washingtonpost.com/wp-dyn/articles/A50606-2002Jun26.html|year=2002|accessdate=2006-04-14|title=Timeline: The U.S. Government and Cybersecurity}}</ref>
While US universities, like MITs Artifical Intelligence Laboratory, continued to push the boundaries of processors and the software running on those processors, industrial applications of the new technology were also being pushed. However, while software was advancing at a very fast pace, the first recorded hacking attempts were on simpler electronic machines that were designed to perform only a single task. Among the first such machines were the part electronic/part mechanical US telephone exchanges and it was in the late 1950s that a young boy called Joe Engressia{{ref label|engressia|Note 4|4a}} first managed to hack one of these exchanges.<ref name="joybubbles">New York Times, 20th August 2007 - "JoyBubbles, 58, Peter Pan of Phone Hackers, Dies" (: delete cookies before viewing)</ref>
Neal Patrick testified before the ] on ] ] about the dangers of computer hacking, and six bills concerning computer crime were introduced in the House that year.<ref>David Bailey, "Attacks on Computers: Congressional Hearings and Pending Legislation," sp, p. 180, 1984 IEEE Symposium on Security and Privacy, 1984.</ref> As a result of these laws against computer criminality, ], ] and ] hackers try to distinguish themselves from each other, depending on the legality of their activities.


Engressia was born in 1949 and was blind from birth<ref name="idletone"/>. As a result of this, however, he was endowed with other amazing talents, one of which was Perfect Pitch. Perfect Pitch is the ability to be able to repeatedly, and exactly, generate a tone of any frequency through singing or whistling. He discovered by accident at the age of just eight years old that the US long-distance{{ref label|longdistance|Note 1|1}} telephone exchanges responded to a special "line-idle tone", a 2600Hz frequency tone internal to exchanges that indicated a long-distance line was available for use<ref name="idletone"> - Gary Robson</ref>. The tone was important as it was used by the exchanges to detect when calls had finished, and therefore was used to calculate telephone bills. If a freephone{{ref label|freephone|Note 5|5}} number was dialled, the local exchange would search for an available long-distance line and mark the call as free. Once the long-distance line had been found, generating the 2600Hz idle tone would make the long-distance exchange think the line was idle and it would stop billing the call. However, the local exchange was still connected and any number dialled would then not be billed. Every time Engressia wanted to make a free long-distance call, he would simply whistle into the telephone receiver and receive his free call.
==Open Source and Free Software hackers==
{{main|Hacker (academia)}}


Soon after, in the early 1970s, another man called discovered the same tone was generated by a toy whistle that came free with boxes of breakfast cereal<ref name="draper">John Draper by , software programmer and Co-Chair of </ref>. Draper blew the whistle into a telephone receiver and also received free calls. Draper become somewhat infamous for envanglesing the technology to be able to cheat the telephone companies without actually using the technology himself. He even gave hacking classes and workshops to his fellow inmates whilst in jail and gave practical demonstrations of his hacking techniques using prison telephones<ref name="draper"/>.
In the Open Source and Free Software hacker culture, a computer hacker is a person who enjoys designing software and building programs with a sense for aesthetics and playful cleverness.


Both Engressia and Draper were arrested and convicted (Draper on multiple occasions) for their hacking of US telephone exchanges and even became infamous in the local newspapers of the time. Engressia died on August 8th, 2007<ref name="joybubbles"/>{{ref label|engressia|Note 4|4b}}, however, both Engressia's and Draper's activities inspired a whole division of hacking focussed on telephone systems that would later be called ].
According to ],<ref>Eric S. Raymond: (2000)</ref> the Open source and Free Software hacker subculture developed in the 1960s among ‘academic hackers’<ref>{{cite web|url=http://www.faqs.org/docs/artu/ch20s06.html|title=www.faqs.org/docs/artu/ch20s06.html<!--INSERT TITLE-->}}</ref> working on early ]s in ] environments. After 1969 it fused with the technical culture of the pioneers of the ]. The ] machine AI at ], which was running the ] operating system and was connected to the Arpanet, provided an early hacker meeting point. After 1980 the subculture coalesced with the culture of ], and after 1987 with elements of the early ] hobbyists that themselves had connections to radio amateurs in the 1920s. Since the mid-1990s, it has been largely coincident with what is now called the ] and ].


Many programmers have been labeled "great hackers,"<ref>{{cite web | url=http://www.paulgraham.com/gh.html | title=Great Hackers | author=] | year=2004}}</ref> but the specifics of who that label applies to is a matter of opinion. Certainly major contributors to ] such as ] and ], as well as the inventors of popular software such as ] (]), and ] and ] (the ]) are likely to be included in any such list; see also ]. People primarily known for their contributions to the consciousness of the academic hacker culture include ], the founder of the free software movement and the ], president of the ] and author of the famous ] text editor as well as the ], and ], one of the founders of the ] and writer of the famous text ] and many other essays, maintainer of the ] (which was previously maintained by ]).


Within the academic hacker culture, the term hacker is also used for a programmer who reaches a goal by employing a series of modifications to extend existing ] or resources. In this sense, it can have a negative connotation of using ]s to accomplish programming tasks that are ugly, inelegant, and inefficient. This derogatory form of the noun "]" is even used among users of the positive sense of "hacker" (some argue that it should not be, due to this negative meaning; others argue that some kludges can, for all their ugliness and imperfection, still have "hack value"). In a very universal sense, a hacker also means someone who makes things work beyond perceived limits in a clever way in general, for example ]s.<ref>See for example the </ref>


==Emergence of Software Hackers==
==Home computer hackers==
During the 1960s and 1970s, computers were too expensive to buy for the majority of normal people. However, this all changed in the late 1970s and the 1980s with the worldwide home computer revolution. Corporations and individuals alike rushed to create machines for hobbyists to use and experiment with in their own homes and many brands like ], ], and ] were born. Many hobbyists rushed out to buy a computer and one such person was a young boy called Kevin Mitnick.
{{Expand-section|date=August 2007}}
{{main|Hacker (hobbyist)}}


Long before he used a computer, Mitnick had already been involved in hacking when in 1976, at the age of just 13, he managed to hack the bus ticket system in his hometown of Los Angeles, USA to get free bus rides<ref name="mitnick_cnn"> - CNN Special Report, 1999</ref>. The system relied on tickets with punched holes in them and Mitnick, using his own specially-made hole punch, was able to cheat ticket machines and travel to any destination he wanted within the Los Angeles area free of charge. By 1982, at the age of 19, he was proficient enough with a computer to be able to hack into the US Government's North American Aerospace Defense Command system (NORAD), a military surveillance system<ref name="mitnick_cnn"/>. Although no damage was done and no criminal charges were brought, it is this incident that is widely believed to have been the inspiration for the 1983 film ''WarGames'', a story about a young boy who hacks into a government computer and accidentally starts a launch countdown for some nuclear missiles. In 1988, however, Mitnick went one step further and hacked into the computers of an IT company and illegally downloaded $1m of the computer company's software<ref name="mitnick_bio"> - Courtesy of Takedown.com</ref>. The case, brought to court by the computer manufacturer ], was sucessfully prosecuted and Mitnick received one year in prison in 1989 for his crime.
The home computer hacking subculture relates to the hobbyist home computing of the late 1970s, beginning with the availability of ]. An influential organization was the ].


Mitnick has been jailed on multiple occasions<ref name="mitnick_cnn"/> and his reputation as a hacker, plus the rumour that the 1983 film ''WarGames'' was based on Mitnick's own experiences, has turned him into a cult figure. Mitnick, having served his sentences, now provides his skill and expertise as a security consultant for is own legitimate internet security firm. However, Mitnick has found himself, ironically, the victim of several successful hacking attempts<ref name="mitnick_hacked"> - BBC News Online, 11th February, 2003</ref>, bringing much embarassment to the person they once used to call "the most wanted computer hacker in the world"<ref name="mitnick_cnn"/>.
The areas that did not fit together with the academic hacker subculture focus mainly on commercial ], ] and exceptional computer programming (]), but also to the modification of computer hardware and other electronic devices, see ].


== Overlaps and differences ==
The main basic difference between academic and computer security hackers is their mostly separate historical origin and development. However, the ''Jargon File'' reports that considerable overlap existed for the early phreaking at the beginning of the 1970s. An article from MIT's student paper ''The Tech'' used the term hacker in this context already in 1963 in its pejorative meaning for someone messing with the phone system.<ref name=shapiro/> The overlap quickly started to break when people joined in the activity who did it in a less responsible way.<ref>http://www.catb.org/~esr/jargon/html/P/phreaking.html</ref> This was the case after the publication of an article exposing the activities of Draper and Engressias.


Academic hackers usually work openly and use their real name, while computer security hackers prefer secretive groups and identity-concealing aliases. Also, their activities in practice are largely distinct. The former focus on creating new and improving existing infrastructure (especially the software environment they work with), while the latter primarily and strongly emphasize the general act of circumvention of security measures, with the effective use of the knowledge (which can be to report and help fixing the security bugs, or exploitation for criminal purpose) being only rather secondary. The most visible difference in these views was in the design of the MIT hackers' ], which deliberately didn't have any security measures.


==Difficulties in Prosecuting Hackers==
There are some subtle overlaps, however, since basic knowledge about computer security is also common within the academic hacker community. For example, Ken Thompson noted during his 1983 ] lecture that it is possible to add code to the ] "login" command that would accept either the intended encrypted ] or a particular known password, allowing a back door into the system with the latter password. He named his invention the "]." Furthermore, Thompson argued, the ] itself could be modified to automatically generate the rogue code, to make detecting the modification even harder. Because the compiler is itself a program generated from a compiler, the Trojan horse could also be automatically installed in a new compiler program, without any detectable modification to the source of the new compiler. However, Thompson disassociated himself strictly from the computer security hackers: "I would like to criticize the press in its handling of the 'hackers,' the 414 gang, the Dalton gang, etc. The acts performed by these kids are vandalism at best and probably trespass and theft at worst. ... I have watched kids testifying before Congress. It is clear that they are completely unaware of the seriousness of their acts." <ref>{{cite journal|first=Ken|last=Thompson|title=Reflections on Trusting Trust|journal=Communications of the ACM|volume=27|issue=8|date=August 1984|url=http://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf}}</ref>
The 1980s and the 1990s saw a revolutionisation in the computer industry that resulted in computers filling every office and touching every aspect of our lives. Whilst technology has continued to advance to bring the world faster and cheaper computers that are in everything from car engines to mobile phones, and the software security to protect those computers has also been advancing, the hackers have also been evolving their techniques to break the new, stronger security.


In August 2007, a 17-year old teenager named George Hotz hacked a mobile phone so that the software restricting its use to a single mobile phone network was disabled, enabling the phone to be used on any rival mobile phone network<ref name="hotz"> - BBC News Online, 25th August, 2007</ref>. Apple Inc.'s iPhone mobile phone handset was announced in an exclusive partnership will US mobile network provider AT&T Wireless{{ref label|cingular|Note 6|6}} in January 2007<ref name="iphone_announce">Apple Inc. Press Releases - , January 7th 2007</ref>. Although software in the handset made sure that the iPhone could only operate on AT&T Wireless's network, the phone presented a challenge to hackers who wanted to use the phone on other providers' networks. Hotz was the first person to hack the phone using a combination of software and hardware modifications and he demonstrated his modified iPhone handset working on AT&T Wireless's rival ]'s network.
The academic hacker community sees secondary circumvention of security mechanisms as legitimate if it is done to get practical barriers out of the way for doing actual work. In special forms, that can even be an expression of playful cleverness.<ref>http://gnu.mirrorspace.org/philosophy/rms-hack.html</ref> However, the systematic and primary engagement in such activities is not one of the actual interests of the academic hacker subculture and it doesn't have significance in its actual activities, either.<ref>http://www.catb.org/~esr/jargon/html/C/cracker.html</ref> A further difference is that, historically, academic hackers were working at academic institutions and used the computing environment there. In contrast, the prototypical computer security hacker had access exclusively to a home computer and a modem. However since the mid-1990s, with home computers that could run Unix-like operating systems and with inexpensive internet home access being available for the first time, many people from outside of the academic world started to take part in the academic hacking subculture.


Whilst Hotz was congratulated by hacking communities everywhere, Apple and AT&T Wireless were not happy, although Hotz appears to have been spared going to court when he stated in interviews that he didn't want to sell his hack<ref name="hotz"/>. Instead, he was consulted by Apple as to the nature of the hack and Apple soon released an update to the phone's software that was claimed not to include the weaknesses that Hotz had managed to exploit. However, companies and other hacking firms that did try and sell Hotz's hack were approached by Apple's lawyers who successfully blocked the firms from selling the hack citing copyright infringment and reverse engineering<ref name="iphone_hack"> - BBC News Online, 28th August 2007</ref>, something that is considered illegal through such legislation as the United States ] <ref name="dmca">
Since the mid-1980s, there are some overlaps in ideas and members with the computer security hacking community. The most prominent case is Robert T. Morris, who was a user of MIT-AI, yet wrote the ]. The ''Jargon File'' hence calls him "a true hacker who blundered".<ref>http://www.catb.org/jargon/html/pt03.html#bibliography</ref> Nevertheless, members of the academic subculture have a tendency to look down on and disassociate from these overlaps. They commonly refer disparagingly to people in the computer security subculture as crackers, and refuse to accept any definition of hacker that encompasses such activities (see the ]). The computer security hacking subculture on the other hand tends not to distinguish between the two subcultures as harshly, instead acknowledging that they have much in common including many members, political and social goals, and a love of learning about technology. They restrict the use of the term cracker to their categories of ]s and ] hackers instead.
, U.S. Copyright Office Summary - Library of Congress</ref>.


Hotz's actions highlighted the difficulties that software and hardware companies face when trying to prevent hackers from reverse engineering their work. While corporations struggle to protect their inventions and business strategies, hackers everywhere are struggling equally hard to try and reverse engineer those inventions for their own profit or gain. One of the reasons why Hotz wasn't brought to trial was because of sections of the US Digital Millenium Copyright Act<ref name="dmca"/> that appear to permit software or hardware to be reverse engineered and modified without the original manufacturer's consent, where the modification allows the product to interoperate with other programs<ref name="dmca_reverse">
All three subcultures have relations to hardware modifications. In the early days of network hacking, phreaks were building ]es and various variants. The academic hacker culture has stories about several hardware hacks in its folklore, such as a mysterious 'magic' switch attached to a PDP-10 computer in MIT's AI lab, that, when turned off, crashed the computer.<ref>http://www.catb.org/~esr/jargon/html/magic-story.html</ref> The early hobbyist hackers built their home computers themselves, from construction kits. However, all these activities have died out during the 1980s, when the phone network switched to digitally controlled switchboards, causing network hacking to shift to dialling remote computers with modems, when preassembled inexpensive home computers were available, and when academic institutions started to give individual mass-produced workstation computers to scientists instead of using a central timesharing system. The only kind of widespread hardware modification nowadays is ].
, U.S. Copyright Office Summary - Library of Congress. Page 5, exception 2</ref> ''in the manner for which it was originally intended''{{ref label|fairuse|Note 2|2}}<ref name="fairuse">Library of Congress, United States Copyright Office - </ref>. This was important, as Apple's iPhone was originally designed to be used on every provider's network in the world although ''this design was limited to AT&T's network'' using special security software. Thus, as Hotz's modifications to the iPhone did not change the iPhone's original purpose, and the modifications allowed the phone to interoperate with another provider's network, both Apple and AT&T found it difficult to prosecute the teenager, a situation that neither corporation was happy about.


An encounter of the academic and the computer security hacker subculture occurred at the end of the 1980s, when a group of computer security hackers, sympathizing with the Chaos Computer Club (who disclaimed any knowledge in these activities), broke into computers of American military organizations and academic institutions. They sold data from these machines to the Soviet secret service, one of them in order to fund his drug addiction. The case could be solved when scientists from the environment of the academic hacker subculture found ways to log the attacks and to trace them back. '']'', a German film adaption with fictional elements, shows the events from the attackers' perspective. ], one of the system administrators who helped to catch them, described the case in his book '']'' and in the TV documentary ''The KGB, the Computer, and Me''<ref>http://www.youtube.com/watch?v=5NbURDW6CZY http://www.youtube.com/watch?v=9qZCzcGLNN8 http://www.youtube.com/watch?v=qV-HJDTifGQ http://www.youtube.com/watch?v=WnjAm17IfCA http://www.youtube.com/watch?v=C8FgvjkmkSQ http://www.youtube.com/watch?v=fJKyHNgrLNw</ref> from the other perspective.


Often hackers with similar interests join groups and collaborate their intuitive minds to achieve often extraordinary results. They develop jargon which is "incomprehensible to outsiders" (Levy 1984, p.9). The academic text 'Hackers: Heroes of the computer revolution' author Stephen Levy writes about a group of university student hackers which use their own terms to conceal their works. In this group's case 'losing' is "when a piece of equipment is not working" (Levy 1984, p.9) and 'munged' is "when a piece of equipment is ruined" (Levy 1984, p.9).
Hackers of the computer security sort are forever attempting to impress or shock. They may be impressing their fellow hackers or shocking the administrators of the program they have just successfully hacked by cracking what was once considered to be the 'uncrackable'.


==The Evolution of the Hacker==
The term ] can be coined to many different meanings however it can be traced back to "describe the elaborate college pranks that...students would regularly devise" (Levy, 1984 p.10. To be considered a 'hack' was an honour among like-minded peers as "to qualify as a hack, the feat must be imbued with innovation, style and technical virtuosity" (levy, 1984 p.10. Many of these talented college students choose to follow their hobby to either become an academic hacker and go on to work for large companies maintaining and continually protecting their highly secretive data. Constantly attempting to 'crack' the security barriers of the company they work for before external threats can. Once they have found the crack they then work to rectify the potential security breach. Due to the dynamic nature of the internet this is a never-ending task which requires great skill and talent. There is always a way around even the latest and most advance internet or ] security system. Corporations spend large amounts of money protecting their data, however often the best money spent is on the staff hired to constantly challenge their systems and therefore improving its security.
As the software industry has evolved over time, it has become an industry with many different areas of expertise. Along with the expansion of the industry has come an expansion in the number of specific terms in use, particularly just within the United States, to describe the different types of hackers and the different kinds of software and hardware that they focus on.
- Computer security hackers are the opposite of the academic hacker in that these are exactly who companies are attempting to prevent. They work covertly forever attempting to conceal one's identity and enter another's database. Mostly such hackers are merely 'proving a point' by showing they are able to enter a system that they are not authorised to do so. This may be simply for the reason of impressing their fellow hacker counterparts. Others operate with the intention of severe criminal activity, perhaps entering a bank's highly secretive data system and transferring money out of one's account without even leaving their home PC. This action is just like physically robbing a bank though all performed through a computer. Thankfully examples such as this are becoming very infrequent as companies quickly improve their systems.


The different types of hacker that exist today are listed in the table below.
== See also ==
* ]
* ]
* ]
* ]



== References ==

{| cellpadding="10"
|+
! Hacker&nbsp;Type !! Explanation
|-
| ]
| A Phreaker concentrates on finding, and exploiting, the weaknesses in telephone systems.
|-
| ]
| A Black Hat hacker concentrates on finding, and exploiting, the weaknesses in systems in order to perform malicious acts or to cause some kind of injury. All activities of the Black Hat hackers are considered crimes and so, where possible, prosecutions have, and continue to be, brought against this kind of hacker.
|-
| ]
| A White Hat hacker concentrates on finding the weaknesses in systems in order that the systems themselves may be fixed. These hackers are sometimes hired by corporations to find weaknesses in the corporation's own products and so are not prosecuted for their work.
|-
| Cracker
| A Cracker is a person who concentrates on finding weakesses in the security-related parts of software and hardware in order to disable the security and allow unauthorised use. Most activities of the cracker are illegal, however, they often go unprosecuted as the people whose software has been compromised have neither the resources nor the time to persue them.
|}



As the number of hackers has increased, and the seriousness of the hacker's crimes has also increased, groups of programmers within US Academia and the homebrew clubs{{ref label|homebrew|Note 7|7}} have been trying to distiguish and distance themselves from the criminal hackers and the criminal image of hacking. These groups are trying to reestablish the use of the general word "hacker" in its original sense - i.e. as a person who exercises great skill in creating or modifying software and getting the maximum benefit out of it. To read about this discussion in detail, please read ].



==Techniques of the Hacker==
There are many techniques that the Hacker uses to engage in his or her activities, and new methods are being continuously being devised and discovered. Each method is designed to exploit a particular kind of weakness and a hacker may use one method, or many methods in combination with each other, to achieve their objective.

Although there are many different techniques and technologies, most techniques can be split into a small number of distinct categories which are listed below:


{| cellpadding="10"
! Technique !! Explanation
|-
! Trojan&nbsp;Horse
|
{| class="wikitable"
|-
| What&nbsp;is&nbsp;it?
| A Trojan Horse is any piece of software that gives the impression it is doing a particular task when, in fact, it is secretly performing a much more malicious task. The software will often look appealing and is designed to be welcoming, however this is merely a trick to divert the attention of the user while the real malicous work is being secretly being performed. The hacker typically uses a Trojan Horse when something needs to be illegally installed on a user's computer, or something needs to be illegally acquired from a user's computer.
|-
| Why&nbsp;the&nbsp;name?
| In Greek Mythology<ref name="mythology>The Library of Greek Mythology - Apollodorus (translation by Robin Hard) ISBN-13: 978-0192839244</ref>, a long war was fought at a city called Troy. The army trying to gain entrance to the city were on a mission to rescue a lady called Helen who was being kept a hostage within the city. After nine years and still no success, a man called ], a member of the army trying to enter the city, had the idea to build a large wooden horse and offer it as a "gift" to the people of Troy to convince the city's leaders that they had given up. When the horse was completed, it was left outside Troy's city walls and the attacking army returned to their ships and left. Seeing the ships leave, Troy's leaders accepted the horse. However, Odysseus had hidden a group of the army's best soldiers inside the horse. Once inside the city's defensive walls, the soldiers jumped out of the horse and sprung their attack on the city from the inside, surprising their opposition and rescuing Helen. Thus, software that copies Odysseus's technique of using a disguise to hide the real task to be done is called a Trojan Horse.
|-
| Example
| Spyware is a common type of Trojan Horse. Spyware is software that gives the impression it is offering some kind of (often free) service but is actually secretly stealing personal information from the user's computer and transmitting it over the internet to another location. After the hacker steals the information, they either use it to perform more malicous deeds against the user or they just sell it on for profit.
|}
|-
! Virus
|
{| class="wikitable"
|-
| What&nbsp;is&nbsp;it?
| A virus is a piece of software that can copy itself and then transmit itself to another computer, where it then copies itself again. The virus is normally embedded into another piece of software (the ''host software'') and is therefore hidden from view. Once embedded inside the host software, the virus uses the normal functions of the host software to copy itself, only becoming visible when the copies of the virus are transmitted to other computers. The chain of replication is normally very difficult to break and the number of computers that become infected with such software can increase very rapidly. As a virus relies on the host software to function, viruses can be very small programs and can be very simple to create. The hacker favours viruses when small size and simplicity are desired.
|-
| Why&nbsp;the&nbsp;name?
| In the human body, viruses operate by hiding inside cells so that they become hidden from the view of the body's natural defences<ref name="virus"> - Craig C. Freudenrich, Ph.D. Courtesy of </ref>. They either copy themselves inside the cell, or they sleep and are copied when the cell naturally copies itself. After the virus has been copied many times through either method, each separate copy of the virus leaves its host cell and then goes to find a new cell, starting the cycle again. The virus only becomes visible when the copies exit the host cell, not while it's being copied. This means the body's natural defenses are sometimes not able to detect the virus until copies of the virus are too numerous to stop.
|-
| Example
| Email "Address Book" viruses were, and still are, amongst the most common of software viruses. The virus uses the address book of a user's email application to target users that it will infect next. The virus then attaches itself to an email and uses the normal functions of the email application to email a copy of itself to each selected target. When the virus email is received, the virus relies on the email application to copy itself again (for example, when the user opens the email). Users who often believe they are safe by not opening the email's contents (e.g. an attachment) unknowingly help the virus to spread just by opening the email. A hacker uses a virus to deliver some kind of message or program to the largest number of computers in the smallest amount of time. After the computers have been infected, the hacker may use the delivered messages or programs to perform additional damage to infected computers.
|}
|-
! Worms
|
{| class="wikitable"
|-
| What&nbsp;is&nbsp;it?
| A worm is a piece of software that can copy itself and then transmit itself to another computer, where it copies itself again. A worm is different from a virus in that it does not need to rely on host software to spread. A worm contains all of the copying function within itself. A hacker uses a worm to alter or disable a computer's functions without causing the computer to stop or display any kind of physical problem and this means that the effects of a worm can go unnoticed for a significant amount of time. During this time, the computer may become vulnerable to, or a participant in, an external attack by the hacker who is then able to exploit the computer to gain unauthorised access or to perform some other malicious action.
|-
| Why&nbsp;the&nbsp;name?
| John Brunner wrote a novel in 1975 called ] <ref name="shockwave_rider">The Shockwave Rider - John Brunner ISBN-13: 978-0345324313</ref>, in which he described the idea of a Computer Tapeworm based on the biological Tapeworm parasite. Brunner's worms entered a computer system and lived invisibly within a computer, spreading themselves by attaching to any kind of data that was transmitted to another machine. In 1978<ref name="xerox_parc">Xerox Parc - </ref>, two reseachers at ], in Palo Alto, California, USA, actually wrote a worm program to usefully utilise a computer system's "spare" resources at the times when a system was not 100% busy<ref name="xerox_paper">The "Worm" Programs - early experience with a distributed computation. Shoch, J.F and Hupp, J.A. </ref>. The worm used only the spare resources to do useful work, and to spread itself to other computers so that more work could be done. However, now worms often use a computer's spare resources in order to perform malicous tasks like launching attacks on other computers, or consuming more resources than are actually available (causing the infected computer to operate many times slower).
|-
| Example
| In 2003, a worm called Blaster<ref name="blaster">Symantec Corporation: Security Responses - </ref> was created which copied itself when the computer was connected to the internet, even if the user was not actually performing an internet-related action. The worm activities went unnoticed on millions of users' computers as most of the time it did no real work; the worm was just waiting until a pre-programmed time. The actual effect of the worm was that computers infected with the worm waited until August 15th 2003 at which time they all attacked ]'s Online Update website in unison in order to try and disrupt Microsoft's services.
|}
|}



==The Influence of Hackers on Everyday Society==
The effect of hackers on the way we live our lives has been significant. Software, although reliable at performing the same task identically millions and millions of times, now has to be protected against hackers who want to modify it so it repeatedly performs a different, often malicious, task. Furthermore, as the protection that is used is itself a target for the hackers, technology that can automatically detect when the security has been broken has also had to be developed (for example, a CD player detects when a copy of a CD is being played instead of the original purchased CD).

In the modern world, software is operating every minute of every day making sure that actions performed by machines on behalf of individuals are only performed when properly authorised to do so. For example, the action of withdrawing money from a bank using a card must only be done by the authorised card holder, and special software in the form of ] attempts to protect stolen bank cards from being used. Another example might be a company who wants to protect the copyright of its products and in this case the software could be protecting the product from being copied illegally, or from being used in a manner that the company explicitly forbids (like using a mobile phone handset on another company's network). At the same time, however, hackers are trying their best to devise new techniques based on Trojan Horses, Viruses, and Worms to find and exploit weaknesses in software so that they can use your stolen bank card or they can use that mobile phone on another provider's network. Thanks to the skill and expertise of engineers in the IT industry, though, this conflict remains largely hidden and does not affect normal people in all but the most extreme cases.

As hackers' techniques advance further still, software design is also advancing so that software can withstand the attempts of hackers to reverse engineer or modify the software. One of the biggest challenges facing all sections of the computer industry is how to implement software so that the copyright of works, or access to personal information, can be protected from hackers without making software products so complicated that they become unusable, bringing the lives and jobs of ordinary people to a standstill.



==References==
{{reflist}} {{reflist}}


== Related books ==
<div class="references-small">
* Michael Hasse: (1994).
</div>


{{wikibooks|Hacking}}
=== Computer security hacking books ===
<div class="references-small">
* Logik Bomb: (1997)
* Katie Hafner & John Markoff: ''Cyberpunk: Outlaws and Hackers on the Computer Frontier'' (Simon & Schuster, 1991), ISBN 0-671-68322-5.
* {{cite book | authorlink = Bruce Sterling | last = Sterling | first = Bruce | url = http://www.mit.edu/hacker/hacker.html | title = The Hacker Crackdown | year = 1992 | id = ISBN 0-553-08058-X | publisher = Bantam }}
* {{cite book | last = Slatalla | first = Michelle | coauthors = Joshua Quittner | title = ]: The Gang That Ruled Cyberspace | year = 1995 | id = ISBN 0-06-017030-1 | publisher = HarperCollins }}
* {{cite book | last = Dreyfus | first = Suelette | title = ] | year = 1997 | id = ISBN 1-86330-595-5 | publisher = Mandarin }}
* {{cite book | last = Verton | first = Dan | title = The Hacker Diaries : Confessions of Teenage Hackers | year = 2002 | id = ISBN 0-07-222364-2 | publisher = McGraw-Hill Osborne Media }}
</div>


==Notes==
=== Free Software/Open Source hacking books ===
*{{note label|longdistance||1}} Long-distance telephone calls are calls made within the United States where the number being called is in a different state to the caller's number. See ] for more information.
<div class="references-small">
*{{note label|fairuse||2}} US Copyright Law, of which the ] is an extension, states "fair use" as using a work (in this case, the iPhone hardware and software) in a way that does not infringe the way in which the original author (in this case, Apple Inc.) "expressed themselves". The modified iPhone was identical is appearance, features, and function to the original iPhone, so use of the modified iPhone could have been argued to constitute "fair use".
* Eric S. Raymond, Guy L. Steele (Eds.): '']'' (The MIT Press, 1996), ISBN 0262680920
*{{note label|MarkusHess_Note||3}} ], a German hacker who lived in Hanover, Germany, breached the security of at least 24 US military computers between 1986 and 1989. He was jailed for stealing United States military secrets and for later selling the secrets, and the hacking techniques used to steal those secrets, to the KGB in return for money.
* {{cite book | first = Eric S. | last = Raymond | title = ] | publisher = Prentice Hall International | year = 2003 | id = ISBN 0131429019}}
*{{note label|engressia||4a}}{{note label|engressia||4b}} Joe Engressia's legal name was "JoyBubbles" as from 1991.
* {{cite book | authorlink = Steven Levy | last = Levy | first = Steven | title = ] | year = 1984 | id = ISBN 0-385-19195-2 | publisher = Doubleday }}
*{{note label|freephone||5}} Freephone (United Kingdom, Australia), Freecall (New Zealand) or Toll Free (United States, Canada) numbers are telephone numbers that can be dialled free of charge. Typically, these numbers contain the sequence 800 in the code. These numbers are commonly used by companies to provide complementary services, and by governments to provide information and support.
*] (1984),''The Second Self: Computers and the Human Spirit'' , New Edition: MIT Press 2005, ISBN 0262701111
*{{note label|cingular||6}} Users of the iPhone in the United States actually make their contracts with AT&T Wireless. However, the alliance to develop and market the iPhone was between Apple Inc. and Cingular, a US mobile network provider who bought AT&T Wireless in February, 2004. ().
* {{cite book | authorlink = Paul Graham | last = Graham | first = Paul | title = ] | year = 2004 | id = ISBN 0-59-600662-4 }}
*{{note label|homebrew||7}} A ''homebrew club'' is a term used in the United States to describe a club for computer hobbyists. The name ''homebrew'' is taken from the name of the most famous computer club in the US, the ], where such people as Steve Jobbs and Steve Wozniak (co-founders of ]) were members.
* Karim R. Lakhani, Robert G Wolf: . In J. Feller, B. Fitzgerald, S. Hissam, and K. R. Lakhani(Eds.): ''Perspectives on Free and Open Source Software'' (MIT Press, 2005)
*{{note label|reverseengineer||8}} The opposite of engineering. ''Reverse Engineering'' is the process of examining a finished software or hardware product and taking it apart in order to find out it was originally constructed.
</div>




==External links== ==External Links==
* - The Old Computer Museum (history of most computers manufactured from 1951-1995)
{{Sisterlinks|Hacker}}
* Symantec Corporation
* : About the different hacker subcultures and their relations.
*


=== Computer security hacking weblinks ===
*
* , by Doug Mclean.
* , by Gary D. Robson.


=== Free Software/Open Source hacking weblinks ===
*
* by ], open source perspective
*, Free Software perspective
*: An interview with ], 2002


] ]
] ]
]
]


] ]

Revision as of 20:22, 26 December 2007

This article is about computer hacking. For other uses, see Hacker (disambiguation) and Hacking.


A Hacker is a general term in computing that refers to a computer programmer who takes advantage of the faults in the design of computer software or hardware (commonly referred to as "weaknesses") in order to:

  1. gain further knowledge about the internal workings of the software or hardware,
  2. gain access to some previously locked or hidden function of the software or hardware,
  3. disable some previously functioning part of the software or hardware so that it no longer works in the way it was originally intended, or
  4. command the software or hardware to perform an additional task that it was not originally designed to do.

As a hacker's activities commonly (but not always) involve reverse engineering or direct modification of the software or hardware without the manufacturer's knowledge or authorisation, hacking often violates existing Copyright and Patent laws in many countries. A hacker's activities also frequently include the exploitation of a weakness in software or hardware to, for example, command the software or hardware to perform a malicious action against an individual or organisation. While reverse engineering software or hardware to gain further knowledge about its internal may not be considered a crime, malicious acts arising from the exploitation of any weaknesses found are considered crimes and are even considered as terrorist acts in some countries. For these reasons, hacking, the activity of a hacker, is considered a crime under law in most countries especially United States Law. Numerous hackers have been, and continue to be, prosecuted for their actions, some even becoming infamous through the reporting of their activities in the media.

The word Hacker is a general term within the field of computing and there are more specific terms in use, particularly just within the United States, to describe the different types of hackers and the different kinds of software and hardware that they find weaknesses in. These different types of hackers are listed briefly in Section 6 of this arcticle, however, to read in detail about these different kinds of hackers, please consult Hacker (disambiguation) or Hacking.



Overview

The hacker of the late 1950s to the early 1970s was originally known for applying expertise and skill to getting the maximum benefit out of hardware and software. These hackers were computer enthusiasts who were highly respected and their skills helped the software and hardware industries to advance very quickly in the early days of computing. However, hackers in general quickly became associated with crime as some of them applied their considerable expertise to illegal activities such as:

  • the theft of assets (e.g. money or information)
  • the use of services (e.g. telephones) without paying, and
  • performing malicious deeds against, or causing material damage to, corporations and government institutions (e.g. espionage).

Within the Computer User clubs and IT-related Universities in the United States of America, there is currently a debate about the usage of the word hacker within US Academia and there is a proposal that it should only be associated with its original expertise-oriented meaning. To read in detail about this debate, and the issues involved, please see the article Hacker Definition Controversy.


The Dawn of the Hacker

As early as the mid 1940s, the American Government was sponsoring projects to build huge mainframe computers to forward research into processors and possible applications of those processors. One such project was a US Navy contract initiated during World War II for a flight simulator computer. The computer took so long to design that, by the time the designs were completed, the war was over and the US Navy had lost interest in the project. However, the Massachusetts Institute of Technology (MIT) in Cambridge, Massachusetts, USA, took over the designs and built just the computer. The result was the MIT Whirlwind computer. The MIT Whirwind computer is said to have been the first ever computer to have a full-screen graphical display and it was this feature that led programmers of the huge mainframe (four floors of a two-storey building) to exercise their skills and stretch the capabilities of the computer to perform tasks that it was not originally designed to do. One such programmer, George Yale Cherlin, Ph.D, became famous amongst the Whirlwind project's 175 staff when he and some colleagues together managed to use the military-designed mainframe to create a graphical, real-time, simulation of the physics of a bouncing rubber ball. Cherlin's expertise in programming at that time can certainly be considered one of the earliest acts of hacking in the original good sense of the word.


The First Hardware Hackers

While US universities, like MITs Artifical Intelligence Laboratory, continued to push the boundaries of processors and the software running on those processors, industrial applications of the new technology were also being pushed. However, while software was advancing at a very fast pace, the first recorded hacking attempts were on simpler electronic machines that were designed to perform only a single task. Among the first such machines were the part electronic/part mechanical US telephone exchanges and it was in the late 1950s that a young boy called Joe Engressia first managed to hack one of these exchanges.

Engressia was born in 1949 and was blind from birth. As a result of this, however, he was endowed with other amazing talents, one of which was Perfect Pitch. Perfect Pitch is the ability to be able to repeatedly, and exactly, generate a tone of any frequency through singing or whistling. He discovered by accident at the age of just eight years old that the US long-distance telephone exchanges responded to a special "line-idle tone", a 2600Hz frequency tone internal to exchanges that indicated a long-distance line was available for use. The tone was important as it was used by the exchanges to detect when calls had finished, and therefore was used to calculate telephone bills. If a freephone number was dialled, the local exchange would search for an available long-distance line and mark the call as free. Once the long-distance line had been found, generating the 2600Hz idle tone would make the long-distance exchange think the line was idle and it would stop billing the call. However, the local exchange was still connected and any number dialled would then not be billed. Every time Engressia wanted to make a free long-distance call, he would simply whistle into the telephone receiver and receive his free call.

Soon after, in the early 1970s, another man called John Draper discovered the same tone was generated by a toy whistle that came free with boxes of breakfast cereal. Draper blew the whistle into a telephone receiver and also received free calls. Draper become somewhat infamous for envanglesing the technology to be able to cheat the telephone companies without actually using the technology himself. He even gave hacking classes and workshops to his fellow inmates whilst in jail and gave practical demonstrations of his hacking techniques using prison telephones.

Both Engressia and Draper were arrested and convicted (Draper on multiple occasions) for their hacking of US telephone exchanges and even became infamous in the local newspapers of the time. Engressia died on August 8th, 2007, however, both Engressia's and Draper's activities inspired a whole division of hacking focussed on telephone systems that would later be called Phreaking.


Emergence of Software Hackers

During the 1960s and 1970s, computers were too expensive to buy for the majority of normal people. However, this all changed in the late 1970s and the 1980s with the worldwide home computer revolution. Corporations and individuals alike rushed to create machines for hobbyists to use and experiment with in their own homes and many brands like Apple, Commodore, and Tandy/Radio Shack were born. Many hobbyists rushed out to buy a computer and one such person was a young boy called Kevin Mitnick.

Long before he used a computer, Mitnick had already been involved in hacking when in 1976, at the age of just 13, he managed to hack the bus ticket system in his hometown of Los Angeles, USA to get free bus rides. The system relied on tickets with punched holes in them and Mitnick, using his own specially-made hole punch, was able to cheat ticket machines and travel to any destination he wanted within the Los Angeles area free of charge. By 1982, at the age of 19, he was proficient enough with a computer to be able to hack into the US Government's North American Aerospace Defense Command system (NORAD), a military surveillance system. Although no damage was done and no criminal charges were brought, it is this incident that is widely believed to have been the inspiration for the 1983 film WarGames, a story about a young boy who hacks into a government computer and accidentally starts a launch countdown for some nuclear missiles. In 1988, however, Mitnick went one step further and hacked into the computers of an IT company and illegally downloaded $1m of the computer company's software. The case, brought to court by the computer manufacturer Digital Equipment Corporation, was sucessfully prosecuted and Mitnick received one year in prison in 1989 for his crime.

Mitnick has been jailed on multiple occasions and his reputation as a hacker, plus the rumour that the 1983 film WarGames was based on Mitnick's own experiences, has turned him into a cult figure. Mitnick, having served his sentences, now provides his skill and expertise as a security consultant for is own legitimate internet security firm. However, Mitnick has found himself, ironically, the victim of several successful hacking attempts, bringing much embarassment to the person they once used to call "the most wanted computer hacker in the world".


Difficulties in Prosecuting Hackers

The 1980s and the 1990s saw a revolutionisation in the computer industry that resulted in computers filling every office and touching every aspect of our lives. Whilst technology has continued to advance to bring the world faster and cheaper computers that are in everything from car engines to mobile phones, and the software security to protect those computers has also been advancing, the hackers have also been evolving their techniques to break the new, stronger security.

In August 2007, a 17-year old teenager named George Hotz hacked a mobile phone so that the software restricting its use to a single mobile phone network was disabled, enabling the phone to be used on any rival mobile phone network. Apple Inc.'s iPhone mobile phone handset was announced in an exclusive partnership will US mobile network provider AT&T Wireless in January 2007. Although software in the handset made sure that the iPhone could only operate on AT&T Wireless's network, the phone presented a challenge to hackers who wanted to use the phone on other providers' networks. Hotz was the first person to hack the phone using a combination of software and hardware modifications and he demonstrated his modified iPhone handset working on AT&T Wireless's rival T-Mobile's network.

Whilst Hotz was congratulated by hacking communities everywhere, Apple and AT&T Wireless were not happy, although Hotz appears to have been spared going to court when he stated in interviews that he didn't want to sell his hack. Instead, he was consulted by Apple as to the nature of the hack and Apple soon released an update to the phone's software that was claimed not to include the weaknesses that Hotz had managed to exploit. However, companies and other hacking firms that did try and sell Hotz's hack were approached by Apple's lawyers who successfully blocked the firms from selling the hack citing copyright infringment and reverse engineering, something that is considered illegal through such legislation as the United States Digital Millennium Copyright Act .

Hotz's actions highlighted the difficulties that software and hardware companies face when trying to prevent hackers from reverse engineering their work. While corporations struggle to protect their inventions and business strategies, hackers everywhere are struggling equally hard to try and reverse engineer those inventions for their own profit or gain. One of the reasons why Hotz wasn't brought to trial was because of sections of the US Digital Millenium Copyright Act that appear to permit software or hardware to be reverse engineered and modified without the original manufacturer's consent, where the modification allows the product to interoperate with other programs in the manner for which it was originally intended. This was important, as Apple's iPhone was originally designed to be used on every provider's network in the world although this design was limited to AT&T's network using special security software. Thus, as Hotz's modifications to the iPhone did not change the iPhone's original purpose, and the modifications allowed the phone to interoperate with another provider's network, both Apple and AT&T found it difficult to prosecute the teenager, a situation that neither corporation was happy about.


The Evolution of the Hacker

As the software industry has evolved over time, it has become an industry with many different areas of expertise. Along with the expansion of the industry has come an expansion in the number of specific terms in use, particularly just within the United States, to describe the different types of hackers and the different kinds of software and hardware that they focus on.

The different types of hacker that exist today are listed in the table below.


Hacker Type Explanation
Phreaker A Phreaker concentrates on finding, and exploiting, the weaknesses in telephone systems.
Black Hat A Black Hat hacker concentrates on finding, and exploiting, the weaknesses in systems in order to perform malicious acts or to cause some kind of injury. All activities of the Black Hat hackers are considered crimes and so, where possible, prosecutions have, and continue to be, brought against this kind of hacker.
White Hat A White Hat hacker concentrates on finding the weaknesses in systems in order that the systems themselves may be fixed. These hackers are sometimes hired by corporations to find weaknesses in the corporation's own products and so are not prosecuted for their work.
Cracker A Cracker is a person who concentrates on finding weakesses in the security-related parts of software and hardware in order to disable the security and allow unauthorised use. Most activities of the cracker are illegal, however, they often go unprosecuted as the people whose software has been compromised have neither the resources nor the time to persue them.


As the number of hackers has increased, and the seriousness of the hacker's crimes has also increased, groups of programmers within US Academia and the homebrew clubs have been trying to distiguish and distance themselves from the criminal hackers and the criminal image of hacking. These groups are trying to reestablish the use of the general word "hacker" in its original sense - i.e. as a person who exercises great skill in creating or modifying software and getting the maximum benefit out of it. To read about this discussion in detail, please read Hacker Definition Controversy.


Techniques of the Hacker

There are many techniques that the Hacker uses to engage in his or her activities, and new methods are being continuously being devised and discovered. Each method is designed to exploit a particular kind of weakness and a hacker may use one method, or many methods in combination with each other, to achieve their objective.

Although there are many different techniques and technologies, most techniques can be split into a small number of distinct categories which are listed below:


Technique Explanation
Trojan Horse
What is it? A Trojan Horse is any piece of software that gives the impression it is doing a particular task when, in fact, it is secretly performing a much more malicious task. The software will often look appealing and is designed to be welcoming, however this is merely a trick to divert the attention of the user while the real malicous work is being secretly being performed. The hacker typically uses a Trojan Horse when something needs to be illegally installed on a user's computer, or something needs to be illegally acquired from a user's computer.
Why the name? In Greek Mythology, a long war was fought at a city called Troy. The army trying to gain entrance to the city were on a mission to rescue a lady called Helen who was being kept a hostage within the city. After nine years and still no success, a man called Odysseus, a member of the army trying to enter the city, had the idea to build a large wooden horse and offer it as a "gift" to the people of Troy to convince the city's leaders that they had given up. When the horse was completed, it was left outside Troy's city walls and the attacking army returned to their ships and left. Seeing the ships leave, Troy's leaders accepted the horse. However, Odysseus had hidden a group of the army's best soldiers inside the horse. Once inside the city's defensive walls, the soldiers jumped out of the horse and sprung their attack on the city from the inside, surprising their opposition and rescuing Helen. Thus, software that copies Odysseus's technique of using a disguise to hide the real task to be done is called a Trojan Horse.
Example Spyware is a common type of Trojan Horse. Spyware is software that gives the impression it is offering some kind of (often free) service but is actually secretly stealing personal information from the user's computer and transmitting it over the internet to another location. After the hacker steals the information, they either use it to perform more malicous deeds against the user or they just sell it on for profit.
Virus
What is it? A virus is a piece of software that can copy itself and then transmit itself to another computer, where it then copies itself again. The virus is normally embedded into another piece of software (the host software) and is therefore hidden from view. Once embedded inside the host software, the virus uses the normal functions of the host software to copy itself, only becoming visible when the copies of the virus are transmitted to other computers. The chain of replication is normally very difficult to break and the number of computers that become infected with such software can increase very rapidly. As a virus relies on the host software to function, viruses can be very small programs and can be very simple to create. The hacker favours viruses when small size and simplicity are desired.
Why the name? In the human body, viruses operate by hiding inside cells so that they become hidden from the view of the body's natural defences. They either copy themselves inside the cell, or they sleep and are copied when the cell naturally copies itself. After the virus has been copied many times through either method, each separate copy of the virus leaves its host cell and then goes to find a new cell, starting the cycle again. The virus only becomes visible when the copies exit the host cell, not while it's being copied. This means the body's natural defenses are sometimes not able to detect the virus until copies of the virus are too numerous to stop.
Example Email "Address Book" viruses were, and still are, amongst the most common of software viruses. The virus uses the address book of a user's email application to target users that it will infect next. The virus then attaches itself to an email and uses the normal functions of the email application to email a copy of itself to each selected target. When the virus email is received, the virus relies on the email application to copy itself again (for example, when the user opens the email). Users who often believe they are safe by not opening the email's contents (e.g. an attachment) unknowingly help the virus to spread just by opening the email. A hacker uses a virus to deliver some kind of message or program to the largest number of computers in the smallest amount of time. After the computers have been infected, the hacker may use the delivered messages or programs to perform additional damage to infected computers.
Worms
What is it? A worm is a piece of software that can copy itself and then transmit itself to another computer, where it copies itself again. A worm is different from a virus in that it does not need to rely on host software to spread. A worm contains all of the copying function within itself. A hacker uses a worm to alter or disable a computer's functions without causing the computer to stop or display any kind of physical problem and this means that the effects of a worm can go unnoticed for a significant amount of time. During this time, the computer may become vulnerable to, or a participant in, an external attack by the hacker who is then able to exploit the computer to gain unauthorised access or to perform some other malicious action.
Why the name? John Brunner wrote a novel in 1975 called The Shockwave Rider , in which he described the idea of a Computer Tapeworm based on the biological Tapeworm parasite. Brunner's worms entered a computer system and lived invisibly within a computer, spreading themselves by attaching to any kind of data that was transmitted to another machine. In 1978, two reseachers at Xerox, in Palo Alto, California, USA, actually wrote a worm program to usefully utilise a computer system's "spare" resources at the times when a system was not 100% busy. The worm used only the spare resources to do useful work, and to spread itself to other computers so that more work could be done. However, now worms often use a computer's spare resources in order to perform malicous tasks like launching attacks on other computers, or consuming more resources than are actually available (causing the infected computer to operate many times slower).
Example In 2003, a worm called Blaster was created which copied itself when the computer was connected to the internet, even if the user was not actually performing an internet-related action. The worm activities went unnoticed on millions of users' computers as most of the time it did no real work; the worm was just waiting until a pre-programmed time. The actual effect of the worm was that computers infected with the worm waited until August 15th 2003 at which time they all attacked Microsoft Corporation's Online Update website in unison in order to try and disrupt Microsoft's services.


The Influence of Hackers on Everyday Society

The effect of hackers on the way we live our lives has been significant. Software, although reliable at performing the same task identically millions and millions of times, now has to be protected against hackers who want to modify it so it repeatedly performs a different, often malicious, task. Furthermore, as the protection that is used is itself a target for the hackers, technology that can automatically detect when the security has been broken has also had to be developed (for example, a CD player detects when a copy of a CD is being played instead of the original purchased CD).

In the modern world, software is operating every minute of every day making sure that actions performed by machines on behalf of individuals are only performed when properly authorised to do so. For example, the action of withdrawing money from a bank using a card must only be done by the authorised card holder, and special software in the form of smart cards attempts to protect stolen bank cards from being used. Another example might be a company who wants to protect the copyright of its products and in this case the software could be protecting the product from being copied illegally, or from being used in a manner that the company explicitly forbids (like using a mobile phone handset on another company's network). At the same time, however, hackers are trying their best to devise new techniques based on Trojan Horses, Viruses, and Worms to find and exploit weaknesses in software so that they can use your stolen bank card or they can use that mobile phone on another provider's network. Thanks to the skill and expertise of engineers in the IT industry, though, this conflict remains largely hidden and does not affect normal people in all but the most extreme cases.

As hackers' techniques advance further still, software design is also advancing so that software can withstand the attempts of hackers to reverse engineer or modify the software. One of the biggest challenges facing all sections of the computer industry is how to implement software so that the copyright of works, or access to personal information, can be protected from hackers without making software products so complicated that they become unusable, bringing the lives and jobs of ordinary people to a standstill.


References

  1. United States Department of Justice - 18 U.S.C §§1831-1839 Theft of Commercial Trade Secrets
  2. United Kingdom Office of Public Sector Information - Terrorism Act 2006 ¶16
  3. United States Department of Justice, Computer Crime & Intellectual Property Section - Summary of Computer Crime Cases
  4. United States Department of Justice, Computer Crime and Intellectual Property Section - Press Releases
  5. $70M bank scam foiled; 7 charged - USA Today Newspaper Archives, 19th May 1988
  6. Police Swoop on 'hacker of the year' - The Sydney Morning Herald, 15th November, 2007
  7. Dangerous Decisions: Problem Solving in Tomorrow's World - Enum Mumford. ISBN-13: 978-0306461439. Pages 161-165 (paperback)
  8. ^ Edward Cherlin, Simputer Evangelist and son of George Yale Cherlin, Ph.D, courtesy of www.oldcomputers.com
  9. ^ New York Times, 20th August 2007 - "JoyBubbles, 58, Peter Pan of Phone Hackers, Dies" (Online Version: delete cookies before viewing)
  10. ^ Origins of Phreaking - Gary Robson
  11. ^ John Draper interviewed in early 1995 by Tom Barbalet, software programmer and Co-Chair of Intellectual Property Rights Special Interest Group
  12. ^ The Trials of Kevin Mitnick - CNN Special Report, 1999
  13. Biography of Kevin Mitnick - Courtesy of Takedown.com
  14. Prominent Hacker Mitnick Hacked - BBC News Online, 11th February, 2003
  15. ^ Teenage Hacker Unlocks the iPhone - BBC News Online, 25th August, 2007
  16. Apple Inc. Press Releases - Apple Chooses Cingular as Exclusive US Carrier for Its Revolutionary iPhone, January 7th 2007
  17. Legal Threats Halt iPhone Crack - BBC News Online, 28th August 2007
  18. ^ The Digital Millenium Copyright Act of 1998, U.S. Copyright Office Summary - Library of Congress
  19. The Digital Millenium Copyright Act of 1998, U.S. Copyright Office Summary - Library of Congress. Page 5, exception 2
  20. Library of Congress, United States Copyright Office - Fair Use
  21. The Library of Greek Mythology - Apollodorus (translation by Robin Hard) ISBN-13: 978-0192839244
  22. How Viruses Work - Craig C. Freudenrich, Ph.D. Courtesy of How Stuff Works
  23. The Shockwave Rider - John Brunner ISBN-13: 978-0345324313
  24. Xerox Parc - Innovation Milestones
  25. The "Worm" Programs - early experience with a distributed computation. Shoch, J.F and Hupp, J.A. Palo Alto Research Center NY: ACM; 1999; 19-27
  26. Symantec Corporation: Security Responses - W32.Blaster.Worm


Notes

  • Long-distance telephone calls are calls made within the United States where the number being called is in a different state to the caller's number. See Long Distance (US) for more information.
  • US Copyright Law, of which the DMCA is an extension, states "fair use" as using a work (in this case, the iPhone hardware and software) in a way that does not infringe the way in which the original author (in this case, Apple Inc.) "expressed themselves". The modified iPhone was identical is appearance, features, and function to the original iPhone, so use of the modified iPhone could have been argued to constitute "fair use".
  • Markus Hess, a German hacker who lived in Hanover, Germany, breached the security of at least 24 US military computers between 1986 and 1989. He was jailed for stealing United States military secrets and for later selling the secrets, and the hacking techniques used to steal those secrets, to the KGB in return for money.
  • Joe Engressia's legal name was "JoyBubbles" as from 1991.
  • Freephone (United Kingdom, Australia), Freecall (New Zealand) or Toll Free (United States, Canada) numbers are telephone numbers that can be dialled free of charge. Typically, these numbers contain the sequence 800 in the code. These numbers are commonly used by companies to provide complementary services, and by governments to provide information and support.
  • Users of the iPhone in the United States actually make their contracts with AT&T Wireless. However, the alliance to develop and market the iPhone was between Apple Inc. and Cingular, a US mobile network provider who bought AT&T Wireless in February, 2004. (CNN Money news report).
  • A homebrew club is a term used in the United States to describe a club for computer hobbyists. The name homebrew is taken from the name of the most famous computer club in the US, the Homebrew Computer Club, where such people as Steve Jobbs and Steve Wozniak (co-founders of Apple Inc.) were members.
  • The opposite of engineering. Reverse Engineering is the process of examining a finished software or hardware product and taking it apart in order to find out it was originally constructed.


External Links

Categories: