You don’t need to be a hacker in order to exploit the systems. It takes lesser than that in most the cases. If you are a well-established fairly profiting or non-profiting organization, the hackers are the last threats to the information of asset of your organization. He who steals is not a hacker. He is a burglar.
‘There seems to be somewhat of a misconception about hackers being like burglars. Imagine a guy who breaks into the house but does not steal or break anything. Instead he leaves a note on the fridge suggesting that you lock the door and that ‘1234’ is not the best security code. That’s what a real hacker is like.”
For the respect I hold for the hackers I therefor stop calling the burglars ‘hackers’. The one you know as ‘hackers’ fellows, may or may not be hackers. It’s all about intentions. It’s all about the intentions that you tend to skim through my dears getting distracted by the end results of the event that has occurred.
“In today’s society understanding the term “hacker” is complicated because it has many different definitions. The term can be traced back to MIT . MIT was the first institution to offer a course in computer programming and computer science and it is here in 1960 where a group of MIT students taking a lab on artificial intelligence first coined this word. These students called themselves hackers because they were able to take programs and have them perform actions not intended for that program. “The term was developed on the basis of a practical joke and feeling of excitement because the team member would “hack away” at the keyboard hours at a time.”
The hacker is not the one who does something for a material benefit. No, he is not the one to do that. There are some things that you tend to conclude on basis of what the governments say about them. Do you even realize the things that you read/believe about hackers are simply on the basis of what you have seen/read/heard in media? On the other hand there are federal governments, FBI and so on after the ‘hackers’. People who have done no bad I refuse to believe them. I refuse to adhere to it even. I also refuse to believe in the categories ‘black hat’, ‘white hat’ or ‘Grey hat’. It is as simple as a ‘yes’ or a ‘no’. The guy IS a hacker or he IS NOT. It is as clear as that.
Read this letter. For you have to. Period.
The following was written shortly after my arrest…
/The Conscience of a Hacker//
Written on January 8, 1986=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Another one got caught today, it’s all over the papers. “TeenagerArrested in Computer Crime Scandal”, “Hacker Arrested after Bank Tampering”… Damn kids. They’re all alike.
But did you, in your three-piece psychology and 1950’s technobrain,ever take a look behind the eyes of the hacker? Did you ever wonder whatmade him tick, what forces shaped him, what may have molded him? I am a hacker, enter my world… Mine is a world that begins with school… I’m smarter than most ofthe other kids, this crap they teach us bores me… Damn underachiever. They’re all alike.
I’m in junior high or high school. I’ve listened to teachers explainfor the fifteenth time how to reduce a fraction. I understand it. “No, Ms.Smith, I didn’t show my work. I did it in my head…” Damn kid. Probably copied it. They’re all alike.
I made a discovery today. I found a computer. Wait a second, this iscool. It does what I want it to. If it makes a mistake, it’s because Iscrewed it up. Not because it doesn’t like me… Or feels threatened by me… Or thinks I’m a smart ass… Or doesn’t like teaching and shouldn’t be here… Damn kid. All he does is play games. They’re all alike.
And then it happened… a door opened to a world… rushing throughthe phone line like heroin through an addict’s veins, an electronic pulse issent out, a refuge from the day-to-day incompetencies is sought… a board isfound. “This is it… this is where I belong…” I know everyone here… even if I’ve never met them, never talked tothem, may never hear from them again… I know you all… Damn kid. Tying up the phone line again. They’re all alike…
You bet your ass we’re all alike… we’ve been spoon-fed baby food atschool when we hungered for steak… the bits of meat that you did let slipthrough were pre-chewed and tasteless. We’ve been dominated by sadists, orignored by the apathetic. The few that had something to teach found us will-ing pupils, but those few are like drops of water in the desert.
This is our world now… the world of the electron and the switch, thebeauty of the baud. We make use of a service already existing without payingfor what could be dirt-cheap if it wasn’t run by profiteering gluttons, andyou call us criminals. We explore… and you call us criminals. We seekafter knowledge… and you call us criminals. We exist without skin color,without nationality, without religious bias… and you call us criminals.You build atomic bombs, you wage wars, you murder, cheat, and lie to usand try to make us believe it’s for our own good, yet we’re the criminals.
Yes, I am a criminal. My crime is that of curiosity. My crime isthat of judging people by what they say and think, not what they look like.My crime is that of outsmarting you, something that you will never forgive mefor.
I am a hacker, and this is my manifesto. You may stop this individual,but you can’t stop us all… after all, we’re all alike.
Anonymous and Defcon for 8-16 years old (happened recently) …. Take a bow.
Reference and further reading for the curious ones:
- Hacker group anonymous brings peaceful revolution to america: Will engage in civil disobedience until bernanke steps down. 2011. Phil’s Stock World [Phil’s Stock World – BLOG] (Mar 13): n/a, http://search.proquest.com/docview/856699713?accountid=12629 (accessed August 8, 2011).
- Mitnick, Kevin. 2000. The world’s most hunted hacker. Time. Feb 21, http://search.proquest.com/docview/212792177?accountid=12629; magazine/article/0,9171,996126,00.html (accessed August 8, 2011).
- Moore, Robert (2006). Cybercrime: Investigating High-Technology Computer Crime (1st ed.). Cincinnati, Ohio: Anderson Publishing.
- The Mentor (1986). Hacker Menifesto. Retrieved from: http://www.phrack.org/issues.html?issue=7&id=3&mode=txt