Free Republic
Browse · Search
Topics · Post Article

Skip to comments.

Young Hacktivists Worse Than DOJ Drone Killers? ^ | March 25, 2013 | Katie Kieffer

Posted on 03/25/2013 10:20:51 AM PDT by Kaslin

Pause and reflect on this hypocrisy: The Department of Justice prosecutes young hackers who use computers to promote free speech while highly educated adults within the DOJ threaten to use lethal drone force against American citizens without due process. Which is worse?

Certainly, I do not condone hacking. However, you and I need to start talking about the best way to handle cyber-attacks while also recognizing that the same government officials we trust to protect us are assaulting our constitutional freedoms.

Last month, cyber security firm Mandiant released an explosive, 76-page report indicating that the Chinese government is most likely sanctioning and responsible for a bulk of the cyber-attacks against the U.S. government and American companies.

This month, the New York Times reported top U.S. intelligence official James Clapper Jr. alerting Congress: “a major cyber-attack on the U.S. could cripple the country’s infrastructure and economy … such attacks now pose the most dangerous immediate threat to the U.S., even more pressing than an attack by global terrorist networks, such as al-Qaida.”

Cyber-attacks are becoming a menace and we need to find a better way to prevent them.

Steve Jobs Was a Hacker
One thing that you should know about the computer, tablet or smart phone and the internet that you are using to read this column: They would not exist if an intelligent young person had not broken rules in order to advance technology.

Did you know that Apple co-founders Steve Jobs and Steve Wozniak were famous pranksters? Wozniak spent a night in a juvenile detention center for one prank and Jobs was suspended from school more than once.

Jobs and Wozniak were also hackers. In fact, if it were not for a hacking prank they played that allowed them to manipulate AT&T’s infrastructure, iPads would not exist. In 1971, Wozniak and Jobs discovered an article on hackers in Esquire that gave them clues into creating Blue Box technology to override AT&T’s network and make free long-distance calls.

Wozniak and Jobs followed the clues in the Esquire article to a technical journal article on the tones that route phone calls in the Stanford Linear Accelerator Center’s library. Armed with these two articles, rebellion and raw intelligence, Wozniak created the first digital Blue Box.

Jobs told his biographer Walter Isaacson: “If it hadn’t been for the Blue Boxes, there wouldn’t have been an Apple. I’m 100% sure of that. Woz and I learned how to work together and we gained the confidence that we could solve technical problems and actually put something into production. …You cannot believe how much confidence that gave us.” Isaacson adds: “They had created a device with a little circuit board that could control billions of dollars’ worth of infrastructure.”

Around the same time that Jobs and Woz were up to trouble, a teenager named Bill Joy was up to his own “trouble” in the University of Michigan’s Computer Center. Computers were brand-new, gigantic and insanely expensive to “play on” per hour. Joy and his prodigy friends discovered: “…that if you put in ‘time equals’ and then a letter, like t equals k, they wouldn’t charge you [for programming time]. It was a bug in the software. You could put in t equals k and sit there forever,” Joy tells Malcolm Gladwell in the book, Outliers.

Since he was a smart little prankster, Joy was able to accrue thousands of hours of programming time for free and his knowledge ended up benefitting society. Gladwell explains: “…Joy took on the task of rewriting UNIX, which was a software system developed by AT&T for mainframe computers. Joy’s version was very good. It was so good, in fact, that it became—and remains—the operating system on which literally millions of computers around the world run.”

Joy, Jobs and Wozniak were “productive pranksters.” Here is the question I am asking you to consider: Is there a way for us productively leverage the talent of hacktivists to combat foreign cyber-attacks?

Pentagon Failing to Harness Hacking Talent
The Pentagon is currently partnering with defense contractors to sponsor events that educate young people to become the future defensive hackers of America with contests for students like the CyberLympics.

But if you are a smart prankster like Jobs, Joy or Wozniak, the Pentagon will kick you out. Discovery News reports: “A recent Pentagon report called for tripling the number of workers at the U.S. Cyber Command, but there's one big hitch. To become a cyber professional working in government, potential employees have to have exceptionally clean records. That means no arrests or expulsions for hacking into school computers or shutting down websites.”

American (not Chinese) hacktivists are currently facing 10, 15 or 124-year maximum sentences if convicted. One of the world’s top-ranking hacktivists, Christopher Doyon, faces 15 years for a 30-minute online protest against Santa Cruz County’s website and is now seeking temporary asylum in Canada. Why don’t we figure out a way to leverage this talent in a positive way?

Throwing smart, talented hackers in jail or sending them scurrying to Canada will likely incite more cyber-attacks. Perhaps we could offer these young hackers immunity from prosecution in exchange for a position protecting U.S. infrastructure, cellphone networks and utilities from foreign cyber-attacks. They might refuse the offer but it seems worth a shot.

Additionally, a proactive measure Washington could take against cyber-attacks would be to stop trying to unconstitutionally squash internet freedom (think the Protect IP Act or PIPA, the Stop Online Piracy Act or SOPA and net neutrality regulations.)

The federal government has no business, per the Constitution, hyper-regulating our free speech or commerce on the internet. Hacker groups like Anonymous oppose excessive government intrusion and will continue to disrupt sites like the Department of Justice until our government starts reforming its ways.

Certainly, I am not saying that hackers have the right to take down government websites. But our politicians routinely pass unconstitutional laws and executive orders that threaten lethal drone force without due process against American citizens, attack private technology, force employers to pay for contraception coverage and stonewall the internet. Isn’t it a tad hypocritical for hackers go to jail while politicians receive praise for doing much worse?

The Department of Justice should not be shocked if smart young people utilize hacking as a last-ditch effort to get the government’s attention and make the statement that Americans will not quietly hand over their natural rights of free speech and private property.

I also think our government should try to peacefully and productively harness the incredible talent in these young hackers instead of letting it go to waste in a prison cell. I am not saying we should reward hacktivists for damaging pranks. Hacking is wrong. However, I am sure most Americans are glad that Steve Jobs, Bill Joy and Steve Wozniak did not waste their youth and talent in prison because they were smart and bold enough to experiment with hacking. Plus, don’t you question the integrity of DOJ officials who propose using drones against American citizens while acting like they are heroes for hunting down teenage programmers?

TOPICS: Culture/Society; Editorial; Government
KEYWORDS: cybersecurity; doj; foreignaffairs; hacking

1 posted on 03/25/2013 10:20:51 AM PDT by Kaslin
[ Post Reply | Private Reply | View Replies]

To: Kaslin

Well, it seems as though all the government can do is get hot, bothered and hypocritical and sentence these smart kids. They should hire these kids to hack the Chi-coms, NorKors, Rooskies and Mullah-heads. BUT NO they would rather use that $$$$$$$ to keep US pop in submission. I though islam was the religion of submission—it seems as though a new “god” has emananted among us—OBALLAH- to whose regime we have to submit.

2 posted on 03/25/2013 10:34:28 AM PDT by brooklyn dave (1st commandment THOU SHALT NOT BELIEVE THY GOVERNMENT)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kaslin

“Hacking” used to mean sitting in a dorm room for hours overnight debugging and programming code to make it work.

Nowadays hacking means breaking and entering into computer systems to steal information.

I was a “hacker” in college insomuch as I was often up until 5 AM debugging a piece of crap FORTRAN or assembly subroutine that would not output what was expected.

Contemporary hackers are your modern day Robin-Hoods. They steal information for use against the corrupt, for the most part. The government will never attract the talented hackers of the world, because those kids often know that working for the government means blacklisting by widespread communities of undercover or covert hackers across the globe. It’s a world from which I’m glad to have escaped, but today’s world of hackers are far more sophisticated than any of the crap we used to pull.

3 posted on 03/25/2013 10:38:37 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kaslin

Productive “pranksters” are not the problem. Destructive ones are. I still suspect that the anti-virus companies are paying people to create new problems for them to “prevent” or “fix”. I’d like to be proven wrong.

4 posted on 03/25/2013 12:05:04 PM PDT by JimRed (Excise the cancer before it kills us; feed &water the Tree of Liberty! TERM LIMITS, NOW & FOREVER!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kaslin
Jobs told his biographer Walter Isaacson: “If it hadn’t been for the Blue Boxes, there wouldn’t have been an Apple. I’m 100% sure of that.

And if it hadn't been for Papa Kennedy's corrupt sources of income, the Kennedy Klan wouldn't have held sway in Massachusetts (or national) politics.

5 posted on 03/25/2013 1:04:55 PM PDT by a fool in paradise (America 2013 - STUCK ON STUPID)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rarestia
Contemporary hackers are your modern day Robin-Hoods. They steal information for use against the corrupt, for the most part.

How many of them have bothered to make Obama's shielded history more "transparent"?

6 posted on 03/25/2013 1:06:18 PM PDT by a fool in paradise (America 2013 - STUCK ON STUPID)
[ Post Reply | Private Reply | To 3 | View Replies]

To: a fool in paradise

In my opinion, it’s hard to find something that doesn’t exist.

His records have been professionally cleansed. And even if they haven’t, they’re like the Bellagio in Ocean’s Eleven. They’re so well-guarded, so protected, so encrypted and hashed that it would take legions of professional hackers years to put it all together. If they’ve put the best CIA, NSA, and FBI computer spooks on it, you can bet those records are wrapped up tighter than our nukes.

7 posted on 03/25/2013 5:52:43 PM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: rarestia

We also were made aware of collusion between media personalities on Journolist yet I don’t think we know half the stories they collaborated on the talking points for these news items.

Leaking Obama’s texts from 9-11-2012 might be damning.

Plenty of rocks for “hackivists” to uncover if they weren’t such liberal partisan hacks.

8 posted on 03/25/2013 8:36:09 PM PDT by a fool in paradise (America 2013 - STUCK ON STUPID)
[ Post Reply | Private Reply | To 7 | View Replies]

To: a fool in paradise

I think you’d be surprised how many hackers are truly conservative. I’ve been to black hat events and work with several very popular and noteworthy “Certified Ethical Hackers,” and they are among the most trustworthy people I know.

That being said, perhaps the problem is that people who do have the power to get into his records don’t wish to get caught and jailed for doing so. We’ll likely have to rely on foreign entities and agencies to do the dirty work. I doubt an American would risk his life to a Presidentially-ordered drone strike.

9 posted on 03/26/2013 3:51:18 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 8 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794 is powered by software copyright 2000-2008 John Robinson