StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Secret History of Hacking - Research Paper Example

Cite this document
Summary
The Secret History of Hacking Today nearly everyone familiar with computers is familiar with the notion of hacking. Strictly speaking hacking refers to the process where an individual gains illegal access to a computer network through manipulating computer code…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful
The Secret History of Hacking
Read Text Preview

Extract of sample "The Secret History of Hacking"

The Secret History of Hacking Today nearly everyone familiar with computers is familiar with the notion of hacking. Strictly speaking hacking refersto the process where an individual gains illegal access to a computer network through manipulating computer code. Hacking, however, has increasingly come to refer to broader ranging notions of a computer subculture. Indeed, one considers that social media giant Facebook host regular ‘hackathons,’ where computer programmers stay up all night programming code that will potentially be used for the website.

With the widespread cultural use of the term hacking, one considers the history of this subculture. This essay examines the ‘secret history of hacking’. While most individuals associate hacking with computers, hacking previously was linked to telecommunications. In the 1970s ‘phone phreaking’ became a phenomenon among some technologically literate people. This was a process where phones could be rigged to make free long-distance telephone calls. This specifically occurred through an individual using a whistle to match a necessary frequency that triggered access to the telephone line.

Phone phreaking is today recognized as a precursor to computer hacking, because of the monstrous complexity of the phone system. Although it’s difficult to label a specific starting point for computer hacking, among the most prominent hackers in the early era of personal computers are Steve Wozniak and Kevin Mitnick. Wozniak became inspired by an article written about phone phreaking and worked at making his own phone boxes. Wozniak then sought out John Draper, one of the progenitors of phone phreaking.

With the advent of the personal computer, however, the hacking focus shifted from telecommunications to computing. The Homebrew Computer Club was formed to explore the personal computer and subsequent hacking information. During this period individuals would bring personal computers in and the members of the computing club would explore their technological potential. In this way, hacking these machines directly contributed to the development of the personal computer. It was during this era that Wozniak began experimenting with developing his own computer components.

Wozniak went on to develop his ideal computer. Later referred to as the Apple I, Wozniak was not concerned with marketing the product, but rather constructing it so that it met his needs and expectations as a computer hobbyist. Wozniak would partner with Steve Jobs and these hacking inventions would turn into a multi-billion dollar business. While Steve Wozniak’s early exploits in hacking would result in a successful business, the same is not true of Kevin Mitnik. Mitnik’s hacking would eventually land him in serious trouble with the Federal Bureau of Investigation (FBI).

Mitnik’s early adventures included sneaking into a telephone company and stealing important manuals to assist in their phone phreaking efforts. Mitnik's involvement in computer hacking occurred at a significant transition period for American culture. During this period the perspective of hacking shifted from one of embracement, as evidenced in the efforts of Steve Wozniak, to one of fear. No doubt this shift was partially contributed to by films such as War Games that positioned hacking as potentially catastrophic for national security.

Additionally, there was the need to secure computer networks as businesses recognized the potentials of electronic commerce. Increasingly the FBI became aware of cyber-crime and took efforts to stop it. Despite recognizing the dangers of his efforts, Mitnik continued to engage in hacking of classified information. Mitnik would spend a year in jail. After his release he again became involved in hacking efforts. He began gathering information on government individuals that were watching him. When the government came to arrest him, Mitnik went on the run.

He built fake references and an identity by again computer hacking. Still, the FBI would eventually track Mitnik down, arrest him and accuse him of stealing over $80 million dollars of software and information. Eventually Mitnik would be sentenced to five years in jail and then given supervised release. Ultimately, his story demonstrates the recognition of the potential dangers of computer hacking. In conclusion, this essay has examined the history of computer hacking. In this context of understanding it’s demonstrated that computer hacking has its roots in the phone phreaking that occurred in the 1970s.

The complexity and challenges of these efforts naturally lead to the similar complex challenges posed by the personal computer. Both Steve Wozniak and Kevin Mitnik experimented with phone phreaking before hacking. Wozniak’s computer hacking efforts would lead to the development of the Apple Computer. Conversely, Mitnik’s efforts would lead to his five year imprisonment. These divergent paths demonstrate the divergent paths of the hacking subculture in late 20th century American society.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Secret History of Hacking Research Paper Example | Topics and Well Written Essays - 750 words”, n.d.)
The Secret History of Hacking Research Paper Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1456738-the-secret-history-of-hacking-re
(The Secret History of Hacking Research Paper Example | Topics and Well Written Essays - 750 Words)
The Secret History of Hacking Research Paper Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1456738-the-secret-history-of-hacking-re.
“The Secret History of Hacking Research Paper Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1456738-the-secret-history-of-hacking-re.
  • Cited: 3 times

CHECK THESE SAMPLES OF The Secret History of Hacking

Hacking: A Modern Dilemma That Calls for Modern Solutions

On the other hand, these new realities also brought new problems like hacking.... Who are the hackers What are they capable of Why are they hacking It is also imperative for people and societies to look upon other options to combat this problem and thereby discourage any further hacking endeavors. This paper shall dwell and tackle the different issues that confront the Internet community today as regards the hacking problem....
9 Pages (2250 words) Essay

What Is Wikileaks Website

Wikileaks is a website that publishes submissions of private, secret and… Wikileaks mainly publishes original source material information alongside news stories from within so that readers can see the evidential truth.... It provides new methods and anonymous ways to leak information to the public....
17 Pages (4250 words) Essay

The Knights Templar: Saints or Sinners

All the answers to these baffling questions lie somewhere in history.... Did they take possession of the Holy Shroud, the Ark of the Covenant, and the Holy Grail, defend a believed descendant of Jesus Christ, have supernatural abilities, engage in alchemy, bury a colossal treasure, or discovering the New World before Columbus?...
13 Pages (3250 words) Research Paper

Swiss Bank Secrecy under Attack

In February 2009, for the first time in the history of Swiss banks, UBS, the world's biggest private bank and one of the two Switzerland's largest banks agreed to disclose 4,450 personal accounts of American citizens to the U.... The history-breaking deal between the U....
9 Pages (2250 words) Case Study

Current Cyber Attacks & Its Countermeasures

hellip; history is the witness that no nation has succeeded in completely eliminating any kind of crime from the globe and same is the case with cybercrime or attack.... The inflictions of attacks on the government institutions or private institutions are motivated by the gathering of inside and secret organizational information....
7 Pages (1750 words) Coursework

Should All Hacking Be Banned

However, despite the negative publicity associated with hacking, there are commendable aspects of hacking that have proved effective in establishing loopholes within computer systems.... Ethical hacking is considered as a positive entity of hacking as it helps in the identification of computer lapses and areas that require improvement in order to enhance the security of software and institution networks.... This coursework "Should All hacking Be Banned" seeks to highlight positive aspects associated with hacking and how they serve society....
7 Pages (1750 words) Coursework

How has Hacking and the Motivation of Attackers Evolved

hacking today constitutes one of the greatest cybercrimes across the world, and has profound effects on the society, individuals etc.... Earlier well known, MIT students became experts in hacking operations since their access to and study of computing after 1960s.... hacking today constitutes one of the greatest cybercrimes across the world, and has profound effects on the society, individuals, organizations and governments at large.... Gone are the times when hacking was considered benign; computer systems or networks today are built to withstand hacking and the risks attackers pose....
12 Pages (3000 words) Research Paper

The Societys Response on Internet Hackers

The major aim of this research paper is to provide knowledge about the effects of hacking on society and how society has responded or tried to minimize or solve such effects.... This is because; as long as there is the development of the security tools, more development of sophisticated attacks of hacking has also been invented.... Definition of hacking According to the Oxford English Dictionary, hacking is defined as “.... The tendency of internet hacking is so prevalent in countries such as the United States, Russia, Germany, Tunisia, Brazil, and Australia....
12 Pages (3000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us