Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

By GREGORY CONTI, Guest Editor

HACKING AND
INNOVATION
Why computer science should pay serious attention to the
hacking community and its passion for pushing the limits of technology
and its role as a counterbalance to its misuse.

T here is a passionate and independent-minded global


community of highly skilled technical experts that fre-
quently functions outside the mainstream of computer
product develop- I L L U S T R A T I O N B Y J E A N -F R A N Ç O I S P O D E V I N
ment and conven-
tional technology research. Sometimes called the
hacker community, these experts are responsible for
innovation that pushes the limits of technology, some-
times in unintended or uncomfortable ways, as well as
for prescient warnings about the threats of both tech-
nology and the government’s technology-related policy
and regulations. Computer scientists have much to learn about innova-
tion and nontraditional problem solving by listening to and working
with them.

COMMUNICATIONS OF THE ACM June 2006/Vol. 49, No. 6 33


MY AIM IS TO CLOSE THE GAP
BETWEEN THE COMMUNITIES OF COMPUTER
PROFESSIONALS AND COMPUTER HACKING.

Whether inside or outside the mainstream, hackers needs of humanity, either through our own research
are less constrained by conventional thinking, and or when we serve as technical advisors to legislative
their work often complements (and sometimes con- and technology policy decision makers. Ultimately,
flicts with) its counterpart in traditional industrial each of our scientific contributions should be weighed
organizations, academic departments, and govern- on the merit of the related ideas, not on academic cre-
ment agencies. In many cases dentials, institutional affilia-
their research is ahead of what’s tion, or age of the source.
being done in these organizations
but with results that are unlikely
to ever appear in academic jour-
nals and conferences due to dif-
O ur goal here is to
listen to the authentic and
fering ways of disseminating expert voice of hacking—a
information. task more difficult than it
Their passion is especially might appear. The loose-
noteworthy. From Nguyen knit hacker community has
Phuoc Huy, a medical doctor no formal leaders. Hacking
from the Mekong Delta region of is diverse and by its nature
Vietnam who built his own resists formal definition. We
endoscope out of a low-cost Web have sought out a sample
camera [5], to the Shmoo collec- from among the best and
tive’s Wired Equivalent Privacy the brightest. To this end,
(WEP)-cracking robot (see Fig- these articles were written by
ure 1), to Ward Christensen’s and individuals who routinely
Randy Suess’s construction of the challenge convention,
first electronic bulletin board sys- whether from inside the
tem (see Figure 2) in 1978, the professional computing
contributions are diverse and sig- community or from within
nificant. the computer underground.
Some computer scientists con- Many have never published
sider it a high honor to be Figure 1. The in the scientific literature before. This fact does not,
Shmoo collective’s
described as a hacker; to others WEP-cracking robot however, diminish the value of their words but should
it’s a base insult. For many com- (photograph by instead make us listen even more attentively.
Declan McCullagh,
puter scientists, as well as the www.mccullagh.org). The hacker community possesses an extensive
general public, the word hacker body of work, but instead of lying in repositories
has a connotation reflecting the (such as ACM and IEEE digital libraries), results are
sensationalized stereotype often seen in mainstream presented at such conferences as Black Hat,
media. Objective accounts are rare [1–4]. Perhaps due CanSecWest, the Chaos Computer Congress, DEF-
to this perception, two disjoint, typically mistrustful, CON, HOPE, Interz0ne, ShmooCon, and Toorcon
technology-focused communities—professional com- or published in such magazines as 2600, BinRev, and
puting and hacking—have emerged. Despite having Phrack (see the sidebar “Hacking Sources”). The fact
only infrequent interactions, they are often at odds, that the ideas exist in circles less traveled by the acad-
ultimately frustrating one another’s efforts. As the emic community does not relieve us of the responsi-
world increasingly depends on technology, we all bility of exploring them to research related work. You
must move beyond the semantics and etymology of may be surprised to find that your “new” idea was
the word hacker [6] to address the true risks and promulgated years ago at a hacker conference or in a

34 June 2006/Vol. 49, No. 6 COMMUNICATIONS OF THE ACM


hacker publication. Almost without exception, these thought processes when approaching problems. Joe
articles, presentations, and other artifacts are freely Grand peels back the covers on hardware to reveal
available online. approaches to modifying technology in ways unin-
I have been profoundly influenced by Orson Scott tended by its designers. Bruce Potter, founder of the
Card’s portrayal of youthful prodigies in his 1985 sci- Shmoo Group of security professionals, well-known
ence fiction novel Ender’s Game in which Ender’s sib- for its annual security conference Shmoocon,
lings, Peter and Valentine, were prodigies too young, describes how wireless hotspots break down the tra-
despite their great intelligence, to be accepted by the ditional security trust model, leaving the typical end
great thinkers and leaders of their day. Despite this user, as well as many power users and even many
impediment, they nevertheless rose to prominence on global corporations, underprotected from potential
the merit of their ideas alone by using anonymous malicious attack.
online personas to promulgate their thoughts. Simi- Felix “FX” Lindner examines the similarity of the
larly, when seeking appropriate and authentic voices software engineering and security disciplines, finding
for this section, I sought out
deep thinkers and gifted tech-
nical experts, who, through
the power of their words
alone, could describe serious
personal experience and
insights so compelling that vir-
tually any reader from either
community would acknowl-
edge the value of their mes-
sage, even if that reader does
not fully agree. My aim is to
close the gap between the
communities of computer
professionals and computer
hacking.

T he section has two


main components: personal
viewpoints and in-depth tech-
nical articles. I challenged the
viewpoint authors to discuss
some of the most significant Figure 2. The first electronic that, despite that similarity, different approaches and
trends and threats they saw bulletin board system (1978)
built by Ward Christensen terminology result in less-secure systems. Finally,
emerging in the worldwide (software) and Randy Seuss Dan Kaminsky explores key aspects of request for
Internet-based environment. (hardware), both members comment-compliant Domain Name System (DNS)
of the Chicago Area
Tom Cross, creator of the Computer Hobbyists’ protocol hacking, by probing DNS servers world-
MemeStreams semantic blog- Exchange (photograph wide in order to notify DNS operators of their vul-
by Jason Scott,
ging system, which helps peo- www.bbsdocumentary.com). nerabilities. He also shares his work mapping the
ple share information about global spread of the recent Sony rootkit that put a vis-
what’s worth reading on the ible face on the magnitude and location of those
Web, starts us off by exploring the troubling decline infected, helping raise a public outcry against Sony’s
in the right of individual experimenters to freely intrusion.
investigate technology. Steve Bono et al. then address Hacking is more about innovation and less about
the use of the courts, legislation, and government reg- computer security. Hacking and computer science are
ulation to prevent discourse about vulnerabilities in so intertwined it is a travesty the two communities do
software and hardware products. not share greater respect for and cooperation with one
I challenged the technical article writers to explore another. To promote the sharing of common interests
three facets of hacking—software, hardware, and net- the hacking story must be told accurately in all its
works—and explain their personal methods and sometimes contradictory aspects. Communications

COMMUNICATIONS OF THE ACM June 2006/Vol. 49, No. 6 35


represents the public record for the professional com-
The views expressed here are those of the author and do not reflect the official policy
puter science community. This section is our or position of the United States Military Academy, the Department of the Army, the
attempt to add to this record a glimpse of the heart Department of Defense, or the U.S. Government.

and soul of the hacker ethic in its members’ own


words. References
1. Caloyannides, M. Enhancing security: Not for the conformist. IEEE
There is a narrow path for success that will help Security and Privacy 2, 6 (Nov./Dec. 2004).
foster collaboration between the two sides of the 2. Conti, G. Why computer scientists should attend hacker conferences.
divide. Antagonists and critics from both sides are Commun. ACM 48, 3 (Mar. 2005), 23–24.
3. Cowan, C., Arnold, S., Beattie, S., Wright, C., and Viega, J. Defcon
waiting to pounce, but the potential for success capture the flag: Defending vulnerable code from intense attack. In Pro-
makes the risk worthwhile. To move beyond com- ceedings of DARPA DISCEX III (Washington, D.C., Apr. 22–24). IEEE
Computer Society Press, Los Alamitos, CA, 2003.
mon stereotypes, we may work together to advance 4. Graham, P. The Word Hacker. Posted on a personal Web site. (Apr.
the interests of human knowledge. The main mes- 2004); www.paulgraham.com/gba.html.
sage we hope to impart is that you should feel free to 5. Le, H. Vietnam medic makes DIY endoscope. BBC News Online (Aug.
22 2005); news.bbc.co.uk/1/hi/technology/4145984.stm.
challenge convention, explore the work done by 6. Raymond, E. The Jargon File 4.4.7. (Dec. 29, 2003);
these researchers, and seek opportunities to collabo- www.catb.org/~esr/jargon/html/H/hacker.html.
rate with the hacking community. I ask that you sus-
pend your preconceived notions, ponder the Gregory Conti (conti@acm.org) is an Academy Professor of
Computer Science at the United States Military Academy, West Point,
arguments and expertise, and, perhaps, adjust your NY, and currently at the Georgia Institute of Technology, Atlanta, on
personal perspective. I daresay you will be more a Department of Defense Fellowship.
warmly received in their world than they would in
ours. Perhaps we can change that. c © 2006 ACM 0001-0782/06/0600 $5.00

HACKING SOURCES
The following sources of information are a great starting point for learning about the
hacking community:
Conferences
Blackhat (Las Vegas, NV) RuxCon (Sydney, Australia) Phrack
www.blackhat.com www.ruxcon.org.au www.phrack.org

CanSecWest (Vancouver, Shmoocon (Washington, D.C.) Books


British Columbia) www.shmoocon.org Hackers and Painters (2004) by
www.cansecwest.com Paul Graham
ToorCon (San Diego, CA)
Chaos Computer Congress www.toorcon.org Silence on the Wire by (2005)
(Berlin, Germany) Michal Zalewski
www.ccc.de What the Hack (Den Boesch,
The Netherlands) Video
DEFCON (Las Vegas, NV) www.whatthehack.org BBS Documentary
www.defcon.org www.bbsdocumentary.com
Magazines and Journals
Hack.lu (Luxembourg/Kirchberg) 2600 Magazine Regularly Scheduled Meetings
www.hack.lu www.2600.com (open to all)
2600 Meetings
Interz0ne (Atlanta, GA) BinRev www.2600.com/meetings
www.interz0ne.com www.binrev.com
Defcon Groups
PACSEC (Tokyo) Hacker Japan www.defcon.org/html/defcon-
www.pacsec.jp www.byakuya-shobo.co.jp/hj groups/dc-groups-index.html

RECON (Montreal, Canada) Make Magazine


www.recon.cx www.makezine.com

36 June 2006/Vol. 49, No. 6 COMMUNICATIONS OF THE ACM

You might also like