Professional Documents
Culture Documents
Hacking and Innovation: Gregory Conti
Hacking and Innovation: Gregory Conti
HACKING AND
INNOVATION
Why computer science should pay serious attention to the
hacking community and its passion for pushing the limits of technology
and its role as a counterbalance to its misuse.
Whether inside or outside the mainstream, hackers needs of humanity, either through our own research
are less constrained by conventional thinking, and or when we serve as technical advisors to legislative
their work often complements (and sometimes con- and technology policy decision makers. Ultimately,
flicts with) its counterpart in traditional industrial each of our scientific contributions should be weighed
organizations, academic departments, and govern- on the merit of the related ideas, not on academic cre-
ment agencies. In many cases dentials, institutional affilia-
their research is ahead of what’s tion, or age of the source.
being done in these organizations
but with results that are unlikely
to ever appear in academic jour-
nals and conferences due to dif-
O ur goal here is to
listen to the authentic and
fering ways of disseminating expert voice of hacking—a
information. task more difficult than it
Their passion is especially might appear. The loose-
noteworthy. From Nguyen knit hacker community has
Phuoc Huy, a medical doctor no formal leaders. Hacking
from the Mekong Delta region of is diverse and by its nature
Vietnam who built his own resists formal definition. We
endoscope out of a low-cost Web have sought out a sample
camera [5], to the Shmoo collec- from among the best and
tive’s Wired Equivalent Privacy the brightest. To this end,
(WEP)-cracking robot (see Fig- these articles were written by
ure 1), to Ward Christensen’s and individuals who routinely
Randy Suess’s construction of the challenge convention,
first electronic bulletin board sys- whether from inside the
tem (see Figure 2) in 1978, the professional computing
contributions are diverse and sig- community or from within
nificant. the computer underground.
Some computer scientists con- Many have never published
sider it a high honor to be Figure 1. The in the scientific literature before. This fact does not,
Shmoo collective’s
described as a hacker; to others WEP-cracking robot however, diminish the value of their words but should
it’s a base insult. For many com- (photograph by instead make us listen even more attentively.
Declan McCullagh,
puter scientists, as well as the www.mccullagh.org). The hacker community possesses an extensive
general public, the word hacker body of work, but instead of lying in repositories
has a connotation reflecting the (such as ACM and IEEE digital libraries), results are
sensationalized stereotype often seen in mainstream presented at such conferences as Black Hat,
media. Objective accounts are rare [1–4]. Perhaps due CanSecWest, the Chaos Computer Congress, DEF-
to this perception, two disjoint, typically mistrustful, CON, HOPE, Interz0ne, ShmooCon, and Toorcon
technology-focused communities—professional com- or published in such magazines as 2600, BinRev, and
puting and hacking—have emerged. Despite having Phrack (see the sidebar “Hacking Sources”). The fact
only infrequent interactions, they are often at odds, that the ideas exist in circles less traveled by the acad-
ultimately frustrating one another’s efforts. As the emic community does not relieve us of the responsi-
world increasingly depends on technology, we all bility of exploring them to research related work. You
must move beyond the semantics and etymology of may be surprised to find that your “new” idea was
the word hacker [6] to address the true risks and promulgated years ago at a hacker conference or in a
HACKING SOURCES
The following sources of information are a great starting point for learning about the
hacking community:
Conferences
Blackhat (Las Vegas, NV) RuxCon (Sydney, Australia) Phrack
www.blackhat.com www.ruxcon.org.au www.phrack.org