FREE BOOKS

Author's List




PREV.   NEXT  
|<   55   56   57   58   59   60   61   62   63   64   65   66   67   68   69   70   71   72   73   74   75   76   77   78   79  
80   81   82   83   84   85   86   87   88   89   90   91   92   93   94   95   96   97   98   99   100   101   102   103   104   >>   >|  
ctivity had not yet been publicized, much less criminalized. In the 1960s, definitions of "property" and "privacy" had not yet been extended to cyberspace. Computers were not yet indispensable to society. There were no vast databanks of vulnerable, proprietary information stored in computers, which might be accessed, copied without permission, erased, altered, or sabotaged. The stakes were low in the early days--but they grew every year, exponentially, as computers themselves grew. By the 1990s, commercial and political pressures had become overwhelming, and they broke the social boundaries of the hacking subculture. Hacking had become too important to be left to the hackers. Society was now forced to tackle the intangible nature of cyberspace-as-property, cyberspace as privately-owned unreal-estate. In the new, severe, responsible, high-stakes context of the "Information Society" of the 1990s, "hacking" was called into question. What did it mean to break into a computer without permission and use its computational power, or look around inside its files without hurting anything? What were computer-intruding hackers, anyway--how should society, and the law, best define their actions? Were they just BROWSERS, harmless intellectual explorers? Were they VOYEURS, snoops, invaders of privacy? Should they be sternly treated as potential AGENTS OF ESPIONAGE, or perhaps as INDUSTRIAL SPIES? Or were they best defined as TRESPASSERS, a very common teenage misdemeanor? Was hacking THEFT OF SERVICE? (After all, intruders were getting someone else's computer to carry out their orders, without permission and without paying). Was hacking FRAUD? Maybe it was best described as IMPERSONATION. The commonest mode of computer intrusion was (and is) to swipe or snoop somebody else's password, and then enter the computer in the guise of another person--who is commonly stuck with the blame and the bills. Perhaps a medical metaphor was better--hackers should be defined as "sick," as COMPUTER ADDICTS unable to control their irresponsible, compulsive behavior. But these weighty assessments meant little to the people who were actually being judged. From inside the underground world of hacking itself, all these perceptions seem quaint, wrongheaded, stupid, or meaningless. The most important self-perception of underground hackers--from the 1960s, right through to the present day--is that they are an ELITE. The day-to-day
PREV.   NEXT  
|<   55   56   57   58   59   60   61   62   63   64   65   66   67   68   69   70   71   72   73   74   75   76   77   78   79  
80   81   82   83   84   85   86   87   88   89   90   91   92   93   94   95   96   97   98   99   100   101   102   103   104   >>   >|  



Top keywords:
computer
 

hacking

 

hackers

 
cyberspace
 

permission

 

inside

 

stakes

 

important

 
property
 
privacy

underground

 

society

 

defined

 

computers

 

Society

 

password

 

IMPERSONATION

 

intrusion

 

commonest

 
intruders

common
 

teenage

 
misdemeanor
 

TRESPASSERS

 

INDUSTRIAL

 

SERVICE

 

orders

 
paying
 
COMPUTER
 

perceptions


quaint
 

wrongheaded

 

stupid

 

judged

 

meaningless

 

present

 

perception

 

people

 

Perhaps

 

medical


metaphor

 

person

 

commonly

 
ESPIONAGE
 

weighty

 

assessments

 

behavior

 

compulsive

 

ADDICTS

 

unable