Of hacking and hackers … a brief history
The world is full of hackers, or so it seems. In the past few months barely a day has gone by without news of a fresh security breach.
Multi-national companies have been left counting the cost of assaults on their e-mail systems and websites.
Members of the public have had their personal information stolen and pasted all over the internet.
In the early decades of the 21st century the word “hacker” has become synonymous with people who lurk in darkened rooms, anonymously terrorising the internet.
But it was not always that way. The original hackers were benign creatures. Students, in fact.
To anyone attending the Massachusetts Institute of Technology during the 1950s and 60s, a hack was simply an elegant or inspired solution to any given problem.
Many of the early MIT hacks tended to be practical jokes. One of the most extravagant saw a replica of a campus police car put on top of the Institute’s Great Dome.
Over time, the word became associated with the burgeoning computer programming scene, at MIT and beyond. For these early pioneers, a hack was a feat of programming prowess.
Such activities were greatly admired as they combined expert knowledge with a creative instinct.
Those students at MIT also laid the foundations for hacking’s notorious gender divide. Then, as now, it tended to involve mainly young men and teenage boys.
The reason was set out in a book about the first hacker groups written by science fiction author Bruce Sterling.
Young men are largely powerless, he argued. Intimate knowledge of a technical subject gives them control, albeit over machines.
“The deep attraction of this sensation of elite technical power should never be underestimated,” he wrote.
His book, The Hacker Crackdown, details the lives and exploits of the first generation of hackers.
Most were kids, playing around with the telephone network, infiltrating early computer systems and slinging smack talk about their activities on bulletin boards.
This was the era of dedicated hacking magazines, including Phrack and 2600.
The individuals involved adopted handles like Fry Guy, Knight Lightning, Leftist and Urvile.
And groups began to appear with bombastic names, such as the Legion of Doom, the Masters of Deception, and Neon Knights.
As the sophistication of computer hackers developed, they began to come onto the radar of law enforcement.
During the 1980s and 90s, lawmakers in the USA and UK passed computer misuse legislation, giving them the means to prosecute.
A series of clampdowns followed, culminated in 1990 with Operation Sundevil – a series of raids on hackers led by the US Secret Service.
But if Sundevil’s aim was to stamp out hacking in the United States, it failed.
As connected systems became ubiquitous, so novel groups of hackers emerged, keen to demonstrate their skills.
Grandstanding was all part of the job for collectives like L0pht Heavy Industries, the Cult of the Dead Cow, and the Chaos Computer Club, along with individuals such as Kevin Mitnick, Mafiaboy and Dark Dante.
In 1998, L0pht members famously testified to the US Congress that they could take down the internet in 30 minutes.
Mafiaboy showed what he could do by crashing the sites of prominent web firms such as Yahoo, Amazon, Ebay and CNN.
Dark Dante used his knowledge to take over the telephone lines of a radio show so he could be the 102nd caller and win a Porsche 944.
Such actions demonstrate how hackers straddle the line separating the legal and illegal, explained Rik Ferguson, senior security researcher at Trend Micro.
“The groups can be both black or white hat (or sometimes grey) depending on their motivation,” he said.
In hacker parlance, white hats are the good guys, black hats the criminals. But even then the terms are relative.
One man’s hacker could be another’s hacktivist.
If hacking was a business born in the US, it has gone truly global.
“In more recent times, groups emerged around the world in places as far flung as Pakistan and India, where there is fierce competition between the hackers,” said Mr Ferguson.
In Romania groups such as HackersBlog have hit various companies. In China and Russia, many hackers are believed to act as proxies for their governments.
Now, in 2011, it is hacker groups making the headlines once again.
The Lulz Security hacker group pays homage to early computing with an ASCII image on its website
Two in particular, Anonymous and Lulz Security, have come to prominence with high profile attacks on Sony, Fox, HBGary and FBI affiliate Infragard.
“These stunts are being pulled at the same time as national governments are wringing their hands about what to do in the event of a concerted network attack that takes out some critical infrastructure component,” said veteran cyber crime analyst Brian Krebs.
“It’s not too hard to understand why so many people would pay attention to activity that is, for the most part, old school hacking – calling out a target, and doing it for fun or to make some kind of statement, as opposed to attacking for financial gain,” he said.
A current favoured practice is to deface websites, leaving behind a prominent message – akin to the graffiti artist’s tag.
According to Zone-H, a website which monitors such activity, more than 1.5 million defacements were logged in 2010, far more than ever before.
2011 looks like it will at least reach that total.
The sudden growth in the number of hackers in not necessarily down to schools improving their computing classes or an increased diligence on the part of young IT enthusiasts.
Rather, the explosion can likely be attributed to the popularity of Attack Tool Kits (ATKs) – off the shelf programs designed to exploit website security holes. Such software is widely available on the internet.
Bruce Sterling, with his future gazing hat on, has a view of what that will mean.
“If turmoil lasts long enough, it simply becomes a new kind of society – still the same game of history, but new players, new rules,” he wrote.
And perhaps that is where we are now. Society’s rules are changing but we’re not sure who is doing the editing.
2011 high profile hack attacks
6 June – Nintendo hit by Lulz Security
5 June – Sony Pictures Russia database leaked
3 June – Sony Europe database leaked
3 June – 10,000 Iranian government e-mails stolen by Anonymous
2 June – Sony Pictures database leaked
1 June – Defence group L-3 discloses it was hit in attack
1 June – Google reveals Gmail attack
30 May – Fake story about Tupac posted to PBS website
29 May – Honda Canada reveals 283,000 records stolen
27 May – Lockheed Martin reveals it has been hit by a hack attack
24 May – Sony Music Japan hacked
19 May – Nasa loses data to TinKode
Source: BBC News/ Technology
Katika miaka ya karibuni tumekuwa tukisoma au kupokea emails zinazoashiria hacking ya anwani za barua-pepe za watu tunaowafahamu na wale tusiowafahamu. Hackers (wezi wa maneno ya siri ya watu ya kufungua emails, websites na blogs) wamekuwa wakijishughulisha hata katika ulimwengu wetu katika mataifa yanayoendelea. Pengine wapo watu ambao kwa sababu wanazozijua wenyewe huwalipa hackers ili kulenga kuiba taarifa binafsi kutoka kwenye akaunti za barua pepe za watu fulani. Ni vema watunga sheria wakafungua macho na kufikiri namna gani vitendo (hivi vya kihalifu) vithibitiwe. Ipo haja pia ya kukusanya ushahidi wa watu walio na taarifa za binafsi za wengine pasipo wanaohusika kuwa ndiyo waliowapatia kuchunguzwa na hatimaye kufikishwa mbele ya sheria kama hackers. Tufungue macho.