Halting the Hacker: A Practical Guide to Computer Security (2nd Edition)
| I l @ ve RuBoard |
| There are many hackers who don't consider themselves criminals because they are not stealing money, credit cards, computer hardware, or anything made of atoms . Rather, they are only making copies of software and data and utilizing computer resources, CPU, disk, and networking. They seem to believe that since they are not depriving anyone of anything and the original copy of the information is still where it was, unaltered, they are not committing a crime. Since what they are taking is composed of bits, not atoms, and thereby, less tangible, they believe the laws of the tangible world do not apply. Some hackers do not necessarily see their activities as criminal. In fact, many see themselves as defenders of the digital frontier. Some in the hacker community view corporations as evil and hackers as the only ones who can protect the world. They feel that they are being persecuted because they know too much and that their knowledge is somehow threatening to the companies and governments which are persecuting them. Releasing Information
For many, the free flow of ideas and information is the definition of the Internet. It started as a research network interconnecting universities and research institutions to facilitate communications. They see the commercialization of the Internet is the crime, and belive that "information must be free." For them, anyone who is controlling this free flow of information is doing it at the expense of all people.
[27] "U.S. Entertainment Industry Pressured Norwegian Prosecutors," Electronic Frontier Foundation Press Release , 10 January 2002. Releasing Software
Many hackers view the nature of software licensing agreements to be unfairly restrictive . Most licenses will not allow you to have copies of the software on multiple computers even if you are the only one who uses those computers. In retaliation, hackers will crack the licensing codes so the software can be used anywhere by anyone. There is the debate that people who use cracked software cannot afford the licensed version and would not have purchased it anyway. Software companies look at the millions of dollars' worth of illegal software which is being used as lost revenue. Some users make a game of obtaining software for free.
[28] Rosner, Hillary, "Steal This Software," The Industry Standard , 21 June 2000. Consuming Unused Resources
It is common for the hacker to feel that if the resource is not being used, then there is nothing wrong with using it. Network bandwidth, computer cycles, telephone lines, and any resource to which a hacker can get access are likely to be used by the hacker. Of course, the consumption of these resources often leads to the company who owns them having to buy more resources when ample resources are available if they were not being used by hackers. The consumption of unused resources is not always done with malicious intent. Often a hacker feels it is his duty to make these resources available to those who can use them, especially if it seems to be for a worthwile cause.
[29] "Distributed Computing Prosecution Ends with Whimper Not Bang," Electronic Frontier Foundation Media Release, 17 January 2002. Discover and Document Vulnerabilities
There are types of hackers who have taken it upon themselves to disclose the vulnerabilities in systems by making the details of the vulnerabilities as widely known as possible. They will often write programs which exploit the vulnerability as proof of the vulnerability. These scripts rapidly become tools for hackers who do not have the skill to create the tools themselves.
[30] Weiss, Todd, "Security Holes Closed after Hacker Intrusion," Computerworld, 27 February 2002. Finding Fame
Fame is key to many hackers. This is obvious from the number of widespread attacks, such as viruses and website defacements, which do nothing other than draw attention to the attack. These attention- grabbing attacks are a way to prove the skill of the hacker. The more visible the target or the more widespread the victims, the greater the hack and therefore the better the hacker. Some hackers want to gain fame from the technical ability of the hack. They want to show that they are able to do things which no other hacker has been able to do before. Others are hoping to become famous from the cunning of the attack. The selection of the target and the type of attack are key to demonstrating the courage necessary to pull off such an attack. And yet others are looking for as much publicity as possible by making the attack as widespread as possible.
[31] "Famed Hacker to Guest-star on 'Alias'," Zap2it.com, 8 October 2001. |
| I l @ ve RuBoard |