|
. | . |
|
by Staff Writers San Francisco (AFP) Oct 10, 2014
Hackers are shaking off their reputations as nerdy, loner basement dwellers and rebranding themselves on the world stage as members of Internet age tribes with offbeat codes of conduct and capricious goals. Clans of hackers such as Anonymous, LulzSec and Lizard Squad have caused havoc -- and made news -- in recent years, but the legacy of the online community stretches back decades. "People think of hackers as non-social people who live in the basement; that is not true at all," said Nico Sell, chief executive of the encrypted messaging service Wickr and the longtime organizer of the DEF CON hacking conference. "To be good at hacking, you have to understand how society and people work. These geeks are not your normal geeks." Rebels united by their hacking prowess and identified by sassy pseudonyms have been divided into "white hat" groups that use software skills for good and their "black hat" rivals intent on anything from pranks and political upheaval to espionage or crimes of profit. Hackers share their stories and skills at forums like DEF CON and in Internet chat venues such an privacy-guarding 4Chan, according to Gabriella Coleman, who holds the Wolfe Chair in Scientific and Technological Literacy at McGill University in Canada. "There are many reasons one can call hackers a community," said Coleman, whose book "Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous" will be released in November. "One layer is just their craft: they are building stuff or breaking stuff. The technology is so complex you rely on the help of others to get things done in a serious way," she told AFP. Next year will mark the 23rd annual DEF CON gathering in Las Vegas. The event -- considered the world's biggest hacker conference -- was started by Jeff Moss, known by the handle Dark Tangent, as a farewell party for a hacker friend about to leave the country. - Valuing craftiness, humor - In hacker groups such as Anonymous, amazing code or stunning exploits are revered and personal glory-seeking abhorred, according to Coleman. Humor -- cracking jokes, pulling pranks and even embedding jokes in source code -- is common. "There is a love of craftiness and cleverness, and displaying it is a marker defining their identity and binding them together," Coleman said. Ritualized ways of displaying humility in hacker tribes include leaving it to others to brand one a hacker -- never taking the name for oneself. There is a high value placed on weirdness. Taboos include being an informant. DEF CON has long had a "Spot The Fed" game with prizes to those who finger undercover police infiltrating the gathering. Working for the computer security industry is not frowned on, but doing shoddy work certainly is. The pseudo-anonymous nature of Anonymous allows for a diverse array of people to belong -- some in roles with nothing to do with coding, such as tweeting, making videos or organizing rallies. "There are people from radically different classes and ethnic backgrounds, and a strong ethic not to seek fame and recognition for your actions is heavily enforced," Coleman said. - From 'trolling' to activism - Coleman traced the roots of Anonymous to 4Chan, where bonds forged over sharing the funny, offensive or grotesque grew from "trolling" to underground activism. "There is a sense of being in the trenches together, battling," Coleman said. Anonymous evolved into a platform for launching political operations, with high-value targets related to censorship, corruption and privacy. The group "was known for pranking and hell-raising, and now it is known for activism," Coleman said. It combined technical prowess with Hollywood presentation, and adopted the Guy Fawkes mask -- seen in the film "V for Vendetta" -- as its symbol. Hackers often run in groups but tend to be a giving community -- as apt to teach visitors to pick locks or create educational games as they are to hack a major firm's network to prove it is flawed. "You don't have the same posturing you do in other societies, because you are judged on your merits," Sell said. "The rock stars are the ones who have brought great things to everybody -- for free." DEF CON hacker creed includes not hurting anyone needlessly, and giving software makers time to patch chinks in their armor before making vulnerabilities public. "Hackers don't always follow the rules, but that is different from having integrity and ethics," Sell said. Defenders of the hacker culture maintain a defining credo is to push systems until they break and then find compelling new ways to put them back together. Facebook co-founder Mark Zuckerberg made the hacker mindset a theme at the leading social network's campus in Silicon Valley, where the street address is One Hacker Way.
China court moves to tighten grip over 'disorderly Internet' The move by the Supreme People's Court, outlined in a judicial guideline issued Thursday, is the latest effort by the Communist Party to exert control over China's popular online social networks. According to the state-run China Daily newspaper, the country's highest court is also moving to curb paid Internet postings and deletions -- tactics that Beijing itself employs in seeking to "guide public opinion" and tamp down on dissent. "Some posters, as well as workers at network service providers, often use their computer skills to make money, and that leads to a disorderly Internet," court spokesman Sun Jungong told the paper. Personal information such as home addresses, health conditions and crime records must also not be posted online, the paper said, although it did not give further details. China maintains a tight grip on information, with the media controlled by the government and online social networks subject to heavy censorship. Hundreds of bloggers and journalists have since last year been rounded up in a government-backed campaign against "Internet rumours". According to the official Xinhua news agency, the Supreme People's Court has called for the punishment of Internet service providers that refuse to hand over the real names, IP addresses and other information of users who have committed "rights violations". The court also deemed that well-known Internet commenters -- dubbed "Big Vs" -- will be held to a higher standard than ordinary online posters. "If you are a verified celebrity, your obligations when re-posting online information are greater than those of the general public," senior SPC judge Yao Hui told Xinhua. In addition to legions of censors, Chinese authorities employ "wu mao" (50-cent) web commenters paid by the message to spread the official party line. In 2010, the state-run Global Times newspaper reported that Gansu province alone was looking to recruit 650 full-time web commentators "to guide public opinion on controversial issues". Private companies that seek to do the same, however, will be punished according to the new court regulation. Such paid Internet postings "can boost reputations by creating the impression that the online voices are genuine, when in truth the voices are purchased," the China Daily reported.
Related Links Cyberwar - Internet Security News - Systems and Policy Issues
|
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service. |