The Hacker Manifesto
Written January 8, 1986
Another one got caught today, it’s all over the papers. “Teenager Arrested in Computer Crime Scandal”, “Hacker Arrested after Bank Tampering”…
Damn kids. They’re all alike.
But did you, in your three-piece psychology and 1950’s technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him?
I am a hacker, enter my world…
Mine is a world that begins with school… I’m smarter than most of the other kids, this crap they teach us bores me…
Damn underachiever. They’re all alike.
I’m in junior high or high school. I’ve listened to teachers explain for the fifteenth time how to reduce a fraction. I understand it. “No, Ms. Smith, I didn’t show my work. I did it in my head…”
Damn kid. Probably copied it. They’re all alike.
I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it’s because I screwed it up. Not because it doesn’t like me… Or feels threatened by me.. Or thinks I’m a smart ass.. Or doesn’t like teaching and shouldn’t be here…
Damn kid. All he does is play games. They’re all alike.
And then it happened… a door opened to a world… rushing through the phone line like heroin through an addict’s veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought… a board is found. “This is it… this is where I belong…” I know everyone here… even if I’ve never met them, never talked to them, may never hear from them again… I know you all…
Damn kid. Tying up the phone line again. They’re all alike…
You bet your ass we’re all alike… we’ve been spoon-fed baby food at school when we hungered for steak… the bits of meat that you did let slip through were pre-chewed and tasteless. We’ve been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us willing pupils, but those few are like drops of water in the desert.
This is our world now… the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn’t run by profiteering gluttons, and you call us criminals. We explore… and you call us criminals. We seek after knowledge… and you call us criminals. We exist without skin color, without nationality, without religious bias… and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it’s for our own good, yet we’re the criminals.
Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for.
I am a hacker, and this is my manifesto. You may stop this individual, but you can’t stop us all… after all, we’re all alike.
Today is “Ada Lovelace Day“.
It is an international day of blogging (videologging, podcasting, comic drawing etc.!) to draw attention to the achievements of women in technology and science.
Women’s contributions often go unacknowledged, their innovations seldom mentioned, their faces rarely recognised. We want you to tell the world about these unsung heroines, whatever they do.
I decided to take part in helping to promote the achievements of women in fields they do not normally get the credit the deserve in. Deciding to take part was easy, its the actual doing something about it that’s hard. I have spent the last four hours trying to decide who to write about.
Its easy to say “I was not influenced or inspired by particular woman to the point I can post about it“, Yet the more I consider it, the more stupid that statement is. Part of my job entails writing Programs, Scripts, etc. And The first computer Programmer was a lady, and a Lady lady at that. Lady Ada Lovelace (Who today’s named after.)
So who to pick? I then considered maybe using a Character from TV/Film that’s a role model showing you can be cool, feminine, and geeky. Only I could not decide on one of them, either. I have decided to face the fact that I’m useless.
So Instead I will just Raise a pint, and tip my hat to a lost community. “Female Hackers”
Raven Alder, a network administrator at Maryland-based company Intermedia, was utterly boggled by an unexpected question at a hacker convention where she’d just presented a paper. “A reporter asked me how it felt to be the world’s first female hacker,” she recalled. “What the hell?” she spluttered in response. She knew of many other women hackers at the conference, and she was certainly not the first. But the reporter’s question revealed the dilemma facing most women hackers today.
EvilGrrl, a member of the notorious GhettoHackers crew (who won Capture the Flag three years running at Defcon), has noticed this “not existing” problem too. “At conferences, lots of people assume I’m somebody’s girlfriend,” she said, laughing. “I usually just reply that I’m a GhettoHacker and no, I’m not a girlfriend.”
So lets all the Men take a step back, and take today to acknowledge our Female counterparts.
Any in the North Wales area let me know, I’ll get you a pint (or drink of choice)
NOTE: The Title of the Post is a quote from the Character “Acid Burn” from the film Hackers. I’ve never really considered it before, But she really is a poor example of Women in Technology. Looking back on the film, she was the only female in the hacking community shown. I believe in the clips at the end, where the worlds hackers unite, there’s possibly a female hacker shown. Amongst the main group and extended community she is the only one, The other female characters are mothers, or Bimbos. So I appologise, its just that I like the Character, Like the Quote, and Like the Young Angelina Jolie.
Unless you have been living in a small cave half way up an inhospitable mounting for the last month you would have heard of the News of the World (NotW) Phone Hacking Scandal. It’s especially bad if you live in the UK.
If you are that cave dwelling hermit let me say “How the frak are you reading this post? Did you follow the article on reading blogs on kindles? How have you got internet access? inquiring minds want to know!” *relax* I mean to say, that this scandal is about slime masquerading as reports who accessed a vast (possible 4,000) number of people’s (Celebrity’s, Sports Stars, Politicians, Victims of Crime) answer phone messages. Now there was such an amount of this going on that the paper has closed down after 168years in print.
I have no intention of writing about the incident itself, or any of the fallout, or anything directly in relation to this case. That has been covered in depth all over the Internet & Surviving media. What I would like to address is the term thrown about “Phone Hacking Scandal“. Why must everyone insist on calling it Hacking?
*NOTE: Phone Hacking is referred to as Phreaking
No where in any of the reports is any activity mentioned that even faintly falls into the category of “Hacking” under any definition. Even if you take the original definition of Hacking, as in using some piece of technology or item in a way that was different to the intended use. Or knowing or wanting to learn about the inner working of different things, you still can not fit the term “Hacker” or “Hacking” to what the NotW reporters actually did.
What they did was to access peoples voicemail’s. Yes this is wrong, its an intrusion of privacy, it’s probably illegal as “unauthorised to personal communication” but it is not Hacking. They phoned up the voicemail number, and using the Victims phone number, and the generic default pin number accessed they voice mail system in the way it was intended to, in the way we all access it, they just did it without the Victims permission.
Surely it should be called “illegal phone tapping” or “illegal access to mail” or by whatever legal term it is for the crime they committed. The media like using the term Hacker to scare the public about these faceless super-criminals with secret abilities that let them to do almost anything. I think its time to stop the mass-hysteria and excessive incorrect use of this term.
We do not call someone who sticks a plaster on a small graze a Doctor, We do not call the small child playing with a plastic gun in the street a terrorist, and we should not call someone who phones up a publicised phone number and follows the instructions the recorded message tells them a Hacker.
Come on Media People, Your reputation is tarnished over this NotW incident, don’t make it worse by not doing your homework, and just falling into your old scaremongering ways.
The Three Ninjas saying a few words about the misappropriation of the term “Hacker“. To quote Randal from Clerks II. “I’m taking it back”
We here at the Ninja Temple love nothing more than finding new ways to use Technology, Or Ways to use it in a different manner to that which it was intended. We also like finding legal ways of doing things for free, that would normally cost money.
So what was the first thing we did when we got our hands on one of Amazons Kindles? We decided it would be nice if we could read our favorite Blogs & News sites directly off the Kindle in weekly digests. Unfortunately Amazon charges for this service, Which is OK I guess since some of the money can go to the Bloggers who write the sites.
No we do not want to cost fellow Bloggers Money, BUT if you think about it, you can use the Kindle’s web browser to read free Blogs for Free, so If you could get it sent directly to your device for free, its only really saving you time.
So heres the procedure we followed to get Weekly Digests of our Favorite blogs sent directly to the Kindle. (NOTE: If you really enjoy someones Blog consider supporting it with some comments, or some other way to show your thanks)
toy useful tool at the Ninja Temple is a nice little 7inch Android tablet. Now, being new to the Android OS, it was not long before the question was raised. “Is it as easy to Root a ‘Droid as it is to Jailbreak an iPhone?”
It was not long after this question was asked that we put life & limb on the line (well we risked bricking the new
toy tool) to find out the answer. For those of you interested its Stupidly easy.
This is a walk-through of how we rooted out 7inch scroll tablet (and unlike the iPhone Walk-through no beer was involved).
Once again the Media forces miss appropriate the word “Hacker”. This time in an article posted on the IT based site The Register, the article is titled “UK hacker fined for personnel database mischief” and the full article can be read here.
Now this could be fair I guess, lets see what the guy did. According to the article he “gained unauthorised access to staff contracts containing salary details and emailed this to around 400 workers at his ex-employer” Now, I can see why gaining unauthorised access to digital information could be associated to Hacking, Only lets read some more.
How did he manage to bypass the companies security and gain access? When he was sacked he stole his bosses laptop, and emailed out information he found on there. Yes. That’s right! The Mad 1337 h4x0r skillz this guy used was 1)theft of a object, 2)The ability to send an email. Wow.
The title should be X-employees fined for theft and breaking the Data Protection Act. Only the Media likes its word Hacker.