Saturday, May 25, 2013

Team 11, Topic 2, Post 2: Hacking and Hacktivism in the 90's


Introduction

With technology on the rise, the 90's produced many types of hacking and hacktivist groups. During this decade, hacking was not solely based on the curiosity of tech-savvy individuals hungry for the knowledge of how a system functioned, rather, it marked the beginning of defining hacking categorically. The emerging hacking groups described themselves as hacker's, cracker's, and hacktivist's. Some took it a step further, classifying the types of hacking they participated in by using he terms white, grey, and black hats, using color representation as a way of describing the purity of their intentions. The rapid growth of these underground groups made society and the government very uneasy.

This article discusses some of the more influential hacking groups that emerged in the 90's. The focus is primarily on hacktivist groups that used cyberspace as their platform for protest and hacking groups that exposed security holes in systems for non-malicious purposes.

Cult of the Dead Cow (cDc) – the 90's

The Cult of the Dead Cow (cDc) hacking group joined in the mid 80's, however, they did not get media attention until the early to mid nineties. cDc started as a text-files group over a bulletin board-based system called Fidonet, discussing technology plans and day-to-day events (Jordan). As technology advanced, they began hacking together and became known as a hacking group, developing later into a hacktivist group (Jordan). They became popular because of the tools they used but largely because of their willingness to discuss their views with the public (Jordan). The group is committed to “digitally correct hacktivism,” and continues to exemplify that in the stand they take against other hacktivist groups that they believe are in violation of these principles (Jordan).

The Cult of the Dead Cow, they coined the phrase “hacktivism,” and the intended use was to “refer to to the development and use of technology to foster human rights and the open exchange of information (Delio).” The cDc believes in the freedom of information and the freedom to communicate (McCaughey). They were the first underground hacker group to own a Usenet newsgroup in 1995, the alt.fan.cult-dead-cow, which they used for their attempt to achieve “global domination through media saturation (Chiesa).”

cDc vs. the Church of Scientology

It was cDc's strong belief in the elimination of censorship that sparked the “war” they declared on the Church of Scientology in 1995. The Church of Scientology attempted to remove alt.religion.scientology from Usenet, claiming copyright infringement (Poor). The cDc did not react well to the request for removal because they believed it was a form of censorship on the internet and that was the precisely what the cDc is against. In response, the cDc issued a statement to the Church of Scientology, proclaiming war (Poor). Once the statement was released by the cDc, the Usenet group, alt.religion.scientology, became extremely popular due to the publicity, people just wanted to know what was there that made the Church of Scientology want it to be removed. The request to remove alt.religion.scientology was ignored and considered a huge defeat for Scientology.

cDc creates Back Orifice

The cDc also grabbed attention in 1998 when they released the first version of a program called Back Orifice (BO) (Jordan). BO, at first glance, does not seem like a program meant to represent a hacktivist message, but according to the cDc, that was its intention.

BO is an “illicit remote-administration tool for Windows-based networks. (Jordan)” It is available online to the public and has a graphical-user-interface, so even a novice can use it. BO works similarly to a trojan horse, attaching itself to another file or imported to the target computer, it runs and installs itself, and finally, deletes the executable file it created following installation (Jordan). The person who installed the trojan horse has total access to the targeted computer, allowing file extraction, program running, and keystroke recording (Jordan).

The cDc had, largely, two reason for creating the software: to force Microsoft and the user's of their operating systems to address the security issues and to inform the user's that the capabilities BO gives the average person are the capabilities Microsoft already has with anyone using their operating systems (Jordan). Politically, the intended message being delivered by the cDc are concerns of security of access and privacy of information (Jordan). The idea was not to suggest that Microsoft was doing any of the spying in their power, but to publicize the situation through the release of BO.

The Haunting of GeoCities and Jim Townsend 1994

In 1994, came the birth of the start-up GeoCities. They offered one megabyte of computer storage space for anyone that wanted to run a website within any of the “neighborhoods” within GeoCities (McCaughey). Anyone who built a website in one of the neighborhoods was called a “homesteader,” and attracting them was essential to the business model, because the more people building GeoCities space, the more valuable the business became (McCaughey). Initially GeoCities did not require user's to give up space for advertising on or around their web pages, instead they counted on the homesteaders to create an alluring site and neighborhood and GeoCities would include an unoffensive amount of advertisements (McCaughey). The ads, however, kept increasing and began to include pop-ups and other forms of aggressive advertisements, driving users away from the “free” service (McCaughey).

In 1999, Yahoo! purchased GeoCities, changing the structure of the service almost entirely. Instead of the user having a free web site to use for their business or otherwise, Yahoo! changed the terms of service to state that they owned whatever content was on any homestead and could do with it whatever they pleased (McCaughey).

In response to this, the user's began to protest the changes. Jim Townsend, a user and contract software developer, created a website called “cometo/boycottyahoo,” which rallied all the user's that wanted to protest the changes in terms. Since so many of the users were computer savvy, within hours of launching the protest site, people began posting banner ads and graphics to help the cause. Townsend was careful to encourage streamlining the ads to address the intellectual property issues at hand. Suddenly, these banner ads overtook GeoCities pages and became known as “The Haunting of GeoCities,” receiving a lot of public attention in the news. In just 3 days, Jim Townsend's page received over one million hits.

By July 6th, one week after the Haunting began, Yahoo! adjusted their terms of service, ending the boycott. This was only 9 days after they began requiring their users to sign the terms of service revision (McCaughey).

Milw0rm 1998

A group of teenage boys from the UK, US, and New Zealand, hacked into the Bhabha Atomic Research Centre (BARC), a nuclear research facility located in India. The facility had nuclear tests planned that were to occur on May 11th – 13th of 1998 and in protest, the boys broke into the BARC system and claimed to have stolen emails and the data from the tests as well as destroyed two of the eight servers data (Mehta). BARC officials denied the events occurred but the public was already nervous about the possibility, wondering if they could adequately handle the responsibility of nuclear weapons if they allowed their system to get hacked (Mehta).

After the repeated denial of the lost data, the boys of Milw0rm began releasing some of the information they stole from BARC online and showing it individuals that admit to seeing the documents. In addition to the data stolen, the group also replaced their homepage with a mushroom cloud and the words: “If a nuclear war does start, you will be the first to scream...." (Mehta).

The boys were never prosecuted in for the take over of the BARC system. According to this article, India believes the US did know about the attack on their nuclear facility and most likely possessed the information obtained by the hackers. The US denies having had any knowledge of the protest/hack occurring.

Electronic Disturbance Theater (EDT)

The Electronic Disturbance Theater is a group of artists and activists that practice what they call “electronic civil disobedience.” Electronic civil disobedience uses tactics from civil disobedience, a group of people blocking space with their bodies to prevent entry, but instead of occupying physical space, they use the internet to create a block virtually. The EDT achieves one of the first forms of electronic civil disobedience by creating FloodNet, also known as the Swarm, combining political action, theory, and artform (Jordan). (McCaughey)

The first major project of the EDT was supporting the Zapatistas rebels in Chiapas, Mexico. The goal was for the Zapatista Army of National Liberation's voices to be heard by the Mexican Government. EDT targeted websites of authorities that appeared to be in support of the repression of the Zapatista uprising (Jordan). They hacked into the Mexican government website in April of 1998 and left messages for the officials and they overloaded their pages by sending enough requests to slow the site down or crash it completely (Jordan).

In June of 1998, EDT attempted to strike the Mexican government with FloodNet again unsuccessfully. They were prepared for the attack and administered one to counter. Once the Mexican government system detected FloodNet it activated a javascript attack that would open webpages on the computer that initialized the attack until the computer crashed, terminating FloodNet.

Electronic Frontier Foundation (EFF)

With technology and hacker communities on the rise, so did the criminal cases and unwarranted surveillance against the confirmed and perceived hacking groups. Three men in the industry recognized the need for the protection of civil liberties. The Electronic Frontier Foundation was founded in 1990 by John Perry Barlow, Mitch Kapor, and John Gilmore. When they announced the forming of the organization, they also informed the public they would be represented Steven Jackson Games and many other bulletin board service users against the United States Secret Service. (Electronic)

The Secret Service orchestrated sequence of raids against recipients of a classified document, copied illegally, and distributed that outlined the way 911 Emergency System works. Steven Jackson Games was one of the raids, confiscating most of the tools and equipment needed for him to continue his business. The Secret Service never found the document and Steven Jackson was innocent and returned his computers, however, he and his staff discovered that electronic messages they had sent to each other had been deleted. Jackson's business was just about bankrupt and he felt his freedom of speech and privacy rights had been violated. (Electronic)

The Jackson case was important in the development of legal frameworks regarding the internet. Following this case, e-mails were regarded with as much privacy as telephone calls and requires a warrant before seizing them. (Electronic)

Conclusion

The 90's brought many changes in the development of hacking and hacktivism, evident in the evolving execution and public policy. During this decade, the preliminary laws, primarily put in place in the 80's, were updated to include more protection for government agencies and businesses. For example, the Counterfeit Access Device and Computer Fraud and Abuse Act of 1986 would no longer suffice to combat the growing security threats and was updated twice. New laws, such as, the Communications Decency Act of 1996 and the National Information Infrastructure Protection Act of 1996, were also added to legislation.

The Counterfeit Access Device and Computer Fraud and Abuse Act (CFAA) was amended in 1994 and 1996. The amendment in 1996 included “non public” to the terms to cover systems that allow the public to access certain parts but not all areas (Computer). More specifically, even though a person is authorized to enter a system they are not authorized to do anything criminal. The lines had already been clearly defined regarding government agencies and their personnel, but now a policy was in place for other agencies.

The National Information Infrastructure Protection Act was an enacted as, somewhat, and extension of the CFAA, providing federal criminal liability if a person was in violation of entering a system, unauthorized, and causing damages. The act contains several major sections outlining the offenses specifically. The first section criminalizes unauthorized access of electronic files of classified government information. The second section forbids taking electronic information from financial, government, or private agencies used in interstate business. The third section abjures the purposeful and unlawful access of private computers in the US government. Finally, the fourth section prohibits the entry of protected computers without permission and with mal intent, unless the person can prove the damages were less then $5,000. (National)

The government wasn't the only organization defining rights in cyberspace, the EFF's co-founder John Perry Barlow wrote a piece that articulates hacktivism in 1996 entitled, “The Declaration of the Independence of Cyberspace.” Barlow's manifesto is written to our government, letting them know they are not welcome to govern cyberspace, that the internet is government free and no one invited them to join us (Electronic). It also seems to be speaking directly to the passing of the Communications Decency Act, which passed the same year, meant to limit the people's freedom of speech if it was deemed indecent, by saying: “In the United States, you have today created a law, the Telecommunications Reform Act, which repudiates your own Constitution and insults the dreams of Jefferson, Washington, Mill, Madison, DeToqueville, and Brandeis. These dreams must now be born anew in us...” (Electronic).

As time moves on and we explore the 21st century, many more developments regarding hacktivism and public policy will be discussed. Stay tuned...


Works Cited
Chiesa, Raoul, Stefania Ducci, and Silvio Ciappi. Profiling hackers: the science of criminal profiling as applied to the world of hacking. Boca Raton: Auerbach Publications, 2009. Print.

"Communications Decency Act of 1996." EPIC - Electronic Privacy Information Center. EPIC, n.d. Web. 25 May 2013. <http://epic.org/free_speech/cda/cda.html>.

"Computer Fraud and Abuse Act Summary | US Internet Laws." Cyber Law | Defamation Lawyer | Technology Lawyer | Kelly Warner. Kelly/Warner, n.d. Web. 25 May 2013. <http://www.aaronkellylaw.com/computer-fraud-and-abuse-act-us-summary/>.

Delio, Michelle. "Hacktivism and How It Got Here ." wired.com . N.p., 14 July 2004. Web. 21 May 2013. <http://www.wired.com/techbiz/it/news/2004/07/64193?currentPage=all>.

"Electronic Frontier Foundation." Electronic Frontier Foundation: Defending Your Rights In the Digital World. Electronic Frontier Foundation, n.d. Web. 24 May 2013. <https://www.eff.org/>.

Jordan, Tim, and Paul A. Taylor. Hacktivism and cyberwars: rebels with a cause?. London: Routledge, 2004. Print.

McCaughey, Martha, and Michael D. Ayers. Cyberactivism: online activism in theory and practice. New York: Routledge, 2003. Print.

Mehta, Abhay. "Milworm Bites BARC." outlookindia.com, more than just the news magazine from India. N.p., 22 June 1998. Web. 24 May 2013. <http://www.outlookindia.com/article.aspx?205741>.

"National Information Infrastructure Protection Act Act (NIIPA) of (1996) - Computer, Access, Security, and Government ." Free Encyclopedia of Ecommerce . N.p., n.d. Web. 25 May 2013. <http://ecommerce.hostip.info/pages/769/National-Information-Infrastructure-Protection-Act-NIIPA-1996.html>.

"Poor Mojo Newswire: 1995: Cult of the Dead Cow vs. Scientology." Poor Mojo's Almanac(k). N.p., n.d. Web. 23 May 2013. <http://www.poormojo.org/pmjadaily/archives/020713.php>.


No comments:

Post a Comment