Professional Documents
Culture Documents
Full Download Why Hackers Win Power and Disruption in The Network Society 1St Edition Patrick Burkart Ebook Online Full Chapter PDF
Full Download Why Hackers Win Power and Disruption in The Network Society 1St Edition Patrick Burkart Ebook Online Full Chapter PDF
https://ebookmeta.com/product/network-basics-for-hackers-1st-
edition-occupytheweb/
https://ebookmeta.com/product/rebel-power-why-national-movements-
compete-fight-and-win-1st-edition-peter-krause/
https://ebookmeta.com/product/data-disruption-digital-leadership-
how-to-win-the-innovation-game-philipp-futterknecht-tobias-
hertfelder/
https://ebookmeta.com/product/gambling-on-development-why-some-
countries-win-and-others-lose-1st-edition-stefan-dercon/
Corporate Governance and Effectiveness Why Companies
Win or Lose 1st Edition Dipak R. Basu
https://ebookmeta.com/product/corporate-governance-and-
effectiveness-why-companies-win-or-lose-1st-edition-dipak-r-basu/
https://ebookmeta.com/product/tear-down-the-walls-white-
radicalism-and-black-power-in-1960s-rock-1st-edition-patrick-
burke/
https://ebookmeta.com/product/digital-disruption-implications-
and-opportunities-for-economies-society-policy-makers-and-
business-leaders-1st-edition-bharat-vagadia/
https://ebookmeta.com/product/art-and-nuclear-power-the-role-of-
culture-in-the-environmental-debate-environment-and-society-1st-
edition-volkmar/
Why Hackers Win
Why Hackers Win
Power and Disruption in
the Network Society
List of Illustrations ix
Preface xi
Acknowledgments xix
Notes 135
References 155
Index 187
illustr ations
tables
1. Security software and vendor revenue, worldwide 79
2. Tiers of commodification in cyber markets 86
3. Selected data spills 91
figures
1. Data breaches and records exposure 92
ix
pr eface
xi
xii / Preface
systems: the buggy software, the unprotected account access, and the
availability of personally identifying information to others on the inter-
net. Although hacking ostensibly undermines their own security, corpo-
rations and states paradoxically use hacking for gain. Hacking can suit a
broad spectrum of purposes, including gathering intelligence, managing
crises, and accumulating competitive advantages over rivals. Some
“exfiltration” hacks have successfully stolen data such as business plans,
while some failed episodes have landed spies in jail (Landau 2013). The
“hack-back,” an attempt by victims of cyberattacks to get into the hack-
er’s computer, can try to ascertain the fallout from the initial breach, as
well as knowledge about any new schemes and risks of future breaches.
While examining abuses of power through computer vulnerabilities and
exploits, we have not found “master conspiracies” of surveillance and
espionage, or even a systematic imposition of will, in coordinated hack-
ing campaigns. Instead, we see a proliferation of agents contributing to
offenses and defenses played in long games and embedded in global net-
works. In our view hacking has become a mundane, “business as usual”
application of force for many enterprises.
The development of hacking and cybersecurity together also fore-
grounds paradoxes for social systems. Hacking is now integrated into
state and corporate activities, especially where business or security
interests are invested in maintaining trusted systems. Organizations
may hack for advantages over rivals by exploiting vulnerabilities in
trusted systems. At the same time organizations may hack their own
trusted systems or invite others to hack them (sometimes called
penetration testing or “pen testing”) for purposes of cybersecurity. “Red
Team v. Blue Team” exercises take pen testing to active warfare levels—
one team trying to break in while the other defends. (In cybersecurity
gospel “Red team ALWAYS wins eventually. Blue just holds on as long
as they can.”) “Red teaming” is embraced and institutionalized by the
U.S. Department of Defense, where “in the cyber world, offense and
defense stemmed from the same tools and techniques” (Kaplan 2016,
260). In all these scenarios hacking activity provides recursive knowl-
Preface / xv
levels of risk for society as a whole. This is in part because hacking and
data breaches are not just episodic bugs; rather, they are routine and
institutionalized features of the system. The growth of cybersecurity
software and related industries also impact these institutions and rou-
tines, contributing social effects in the process.
Although social-technical systems for media, business and finance,
and defense are increasingly globalized, the nation-state still provides
the basis for law and policy governing hacking. But the coherence and
continuity of law and policy within nation-states can fall on a contin-
uum from anarchic to totalitarian. Hacking therefore illustrates “gov-
ernance in areas of limited statehood” (Risse 2013). The relative depend-
ence or independence of hacking on law and policy can turn on a
variety of factors. Why Hackers Win addresses cases where new laws on
hacking have conflicted with both received policy traditions and emer-
gent policy regimes and where hacking still occupies legal gray areas.
Judicial review is not fully incorporated into many decision-making
processes; broad categories of hacking remain the privilege of the state
and therefore are exempted from the rule of law. Even hacking by pri-
vate firms may be absolved by the state (such as when telecommunica-
tions carriers received retroactive immunity from illegal wiretapping
violations).5 Secrecy and self-regulation are the rule for states and
firms, with little concern for values and norms for personal privacy.
Numerous national and international legal systems have categorized
piracy and hacking as cybercrimes, which has intertwined their history
and led us to consider them as distinct but related aspects of communica-
tive social action. As with piracy, the conflicts surrounding trusted sys-
tems center on issues of ownership and control, based on the right to
share private property or exclude others from access. It remains as
unlikely today as it did in 2006, when we wrote Digital Music Wars, that a
universal standard for digital-rights management will be adopted by even
a single industry. But the reprising of digital-rights–management models
for managing cybersecurity risks and the securitization of intellectual
property in military cybersecurity policy suggest that guidelines for
Preface / xvii
xix
cha pter on e
1
2 / On the Structures and Functions of Hacking
Bucharest want to steal from a bank in Omaha, they might first pene-
trate a server in Kalamazoo, and from there one in Liverpool, and from
there one in Perth, and so on, until their trail is thoroughly obscured. . . .
A sophisticated hacker . . . might hop as many as thirty times before
unleashing an attack” (Schmidle 2018). Cyberattacks are relatively inex-
pensive and cost-effective. According to the chief technology officer of
the cybersecurity firm Splunk, Snehan Antani, “The cost of cyber-
attacks is 1/10th to 1/100th the cost of cyber defense. . . . This is because
attack tools are freely distributed, the computing resources are stolen,
and because the labour costs in state-sponsored attacks are typically
low” (qtd. in D. Williams 2016).
Since cyber warfare is based in code, it lacks the manufacturing,
warehousing, and deployment costs associated with traditional weapons.
The sole expense is the labor of coders, and this expense stands to fall
with “cloud” sharing and mobile technologies. While criminal hacks
may seek a quick financial return, state-based attacks may be more pre-
cisely targeted with a specific goal, such as gaining strategic or technical
information that may later be employed for disruptive purposes. Yet
intent may be as difficult to ascertain as origin: “When a Russian crimi-
nal group with ties to Russian intelligence was detected attacking U.S.
banks in 2014, for instance, the security community debated whether it
was regular old cybercrime, or an attack linked to Russian state inter-
ests, designed as a response to the sanctioning of the regime for its inva-
sion of Ukraine. But even then, was the attack a retaliation that got
caught? Or was it akin to a nuclear test in a crisis, a signal intended to be
detected, a warning of greater consequences if the United States pushed
further?” (Singer 2015).
Attacks are not necessarily waged between individual entities (such
as single nation versus single nation), and both criminal and state hack-
ers may use similar means and methods of attack, making them harder
to differentiate. Reflecting the growing alliance of state and corporate
actors, methods used by states may trickle down to private firms, while
states may buy and stockpile exploits from hackers and brokers or
On the Structures and Functions of Hacking / 5
(Very Good.)
Flavour pleasantly with and cinnamon, a pint of rich cream, after
having taken from it as much as will mix smoothly to a thin batter
four teaspoonsful of the finest flour; sweeten it with six ounces of
well-refined sugar in lumps; place it over a clear fire in a delicately
clean saucepan, and when it boils stir in the flour, and simmer it for
four or five minutes, stirring it gently without ceasing; then pour it out,
and when it is quite cold mix with it by degrees the strained juice of
two moderate-sized and very fresh lemons. Take a quarter of a
pound of macaroons, cover the bottom of a glass dish with a portion
of them, pour in a part of the cream, lay the remainder of the
macaroons upon it, add the rest of the cream, and ornament it with
candied citron sliced thin. It should be made the day before it is
wanted for table. The requisite flavour may be given to this dish by
infusing in the cream the very thin rind of a lemon, and part of a stick
of cinnamon slightly bruised, and then straining it before the flour is
added; or, these and the sugar may be boiled together with two or
three spoonsful of water, to a strongly flavoured syrup, which, after
having been passed through a muslin strainer, may be stirred into
the cream. Some cooks boil the cinnamon and the grated rind of a
lemon with all the other ingredients, but the cream has then to be
pressed through a sieve after it is made, a process which it is always
desirable to avoid. It may be flavoured with vanilla and maraschino,
or with orange-blossoms at pleasure; but is excellent made as
above.
Rich cream, 1 pint; sugar, 6 oz.; rind, 1 lemon; cinnamon, 1
drachm; flour, 4 teaspoonsful; juice, 2 lemons; macaroons, 4 oz.;
candied citron, 1 to 2 oz.
TIPSY CAKE, OR BRANDY TRIFLE.
Chantilly Basket.
FILLED WITH WHIPPED CREAM AND FRESH STRAWBERRIES.
Take a mould of any sort that will serve to form the basket on, just
dip the edge of some macaroons into melted barley sugar, and
fasten them together with it; take it out of the mould, keep it in a dry
place until wanted, then fill it high with whipped strawberry cream
which has been drained on a sieve from the preceding day, and stick
very fine ripe strawberries over it. It should not filled until just before
it is served.
VERY GOOD LEMON CREAMS MADE WITHOUT CREAM.
Pour over the very thin rinds of two moderate-sized but perfectly
sound fresh lemons and six ounces of sugar, half a pint of spring
water, and let them remain for six hours: then add the strained juice
of the lemons, and five fresh eggs well beaten and also strained;
take out the lemon-rind, and stir the mixture without ceasing over a
gentle fire until it has boiled softly from six to eight minutes: it will not
curdle as it would did milk supply the place of the water and lemon-
juice. The creams are, we think, more delicate, though not quite so
thick, when the yolks only of six eggs are used for them. They will
keep well for nearly a week in really cold weather.
Rinds of lemons, 2; sugar, 6 oz. (or 8 when a very sweet dish is
preferred); cold water, 1/2 pint: 6 hours. Juice of lemons, 2; eggs, 5:
to be boiled softly 6 to 8 minutes.
Obs.—Lemon creams may, on occasion, be more expeditiously
prepared, by rasping the rind of the fruit upon the sugar which is
used for them; or, by paring it thin, and boiling it for a few minutes
with the lemon-juice, sugar, and water, before they are stirred to the
eggs.
FRUIT CREAMS, AND ITALIAN CREAMS.
These are very quickly and easily made, by mixing with good
cream a sufficient proportion of the sweetened juice of fresh fruit, or
of well-made fruit jelly or jam, to flavour it: a few drops of prepared
cochineal may be added to deepen the colour when it is required for
any particular purpose. A quarter of a pint of strawberry or of
raspberry jelly will fully flavour a pint of cream: a very little lemon-
juice improves almost all compositions of this kind. When jam is
used it must first be gradually mixed with the cream, and then
worked through a sieve, to take out the seed or skin of the fruit. All
fresh juice, for this purpose, must of course, be cold; that of
strawberries is best obtained by crushing the fruit and strewing sugar
over it. Peaches, pine-apple, apricots, or nectarines, may be
simmered for a few minutes in a little syrup, and this, drained well
from them, will serve extremely well to mix with the cream when it
has become thoroughly cold: the lemon-juice should be added to all
of these. When the ingredients are well blended, lightly whisk or mill
them to a froth; take this off with a skimmer as it rises, and lay it
upon a fine sieve reversed, to drain, or if it is to be served in glasses,
fill them with it at once.
Italian creams are either fruit-flavoured only, or mixed with wine
like syllabubs, then whisked to a stiff froth and put into a perforated
mould, into which a muslin is first laid; or into a small hair-sieve
(which must also first be lined with the muslin), and left to drain until
the following day, when the cream must be very gently turned out,
and dished, and garnished, as fancy may direct.
VERY SUPERIOR WHIPPED SYLLABUBS.
Weigh seven ounces of fine sugar and rasp on it the rinds of two
fresh sound lemons of good size, then pound or roll it to powder, and
put it into a bowl with the strained juice of the lemons, two large
glasses of sherry, and two of brandy; when the sugar is dissolved
add a pint of very fresh cream, and whisk or mill the mixture well;
take off the froth as it rises, and put it into glasses. These syllabubs
will remain good for several days, and should always be made if
possible, four-and-twenty hours before they are wanted for table.
The full flavour of the lemon-rind is obtained with less trouble than in
rasping, by paring it very thin indeed, and infusing it for some hours
in the juice of the fruit.
Sugar, 7 oz.; rind and juice of lemons, 2; sherry, 2 large
wineglassesful; brandy, 2 wineglassesful; cream, 1 pint.
Obs.—These proportions are sufficient for two dozens or more of
syllabubs: they are often made with almost equal quantities of wine
and cream, but are considered less wholesome without a portion of
brandy.
BLANC-MANGES.
(Author’s Receipt.)
Infuse for an hour in a pint
and a half of new milk the very
thin rind of one small, or of half a
large lemon and four or five
bitter almonds, blanched and
bruised,[162] then add two
ounces of sugar, or rather more
for persons who like the blanc-
mange very sweet, and an
ounce and a half of isinglass. Blanc-mange or Cake Mould.
Boil them gently over a clear
fire, stirring them often until this last is dissolved; take off the scum,
stir in half a pint, or rather more, of rich cream, and strain the blanc-
mange into a bowl; it should be moved gently with a spoon until
nearly cold to prevent the cream from settling on the surface. Before
it is moulded, mix with it by degrees a wineglassful of brandy.
162. These should always be very sparingly used.
New milk, 1-1/2 pint; rind of lemon, 1/2 large or whole small; bitter
almonds, 8: infuse 1 hour. Sugar, 2 to 3 oz.; isinglass, 1-1/2 oz.: 10
minutes. Cream, 1/2 pint; brandy, 1 wineglassful.
RICHER BLANC-MANGE.
Pour on the very thin rind of a large lemon and half a pound of
sugar broken small, a pint of water, and keep them stirred over a
gentle fire until they have simmered for three or four minutes, then
leave the saucepan by the side of the stove that the syrup may taste
well of the lemon. In ten or fifteen minutes afterwards add two
ounces of isinglass, and stir the mixture often until this is dissolved,
then throw in the strained juice of four sound moderate-sized
lemons, and a pint of sherry; mix the whole briskly with the beaten
yolks of eight fresh eggs, and pass it through a delicately clean hair-
sieve: next thicken it in a jar or jug placed in a pan of boiling water,
turn it into a bowl, and when it has become cool and been allowed to
settle for a minute or two, pour it into moulds which have been laid in
water. Some persons add a small glass of brandy to it, and deduct
so much from the quantity of water.
Rind of 1 lemon; sugar, 8 oz.; water, 1 pint: 3 or 4 minutes.
Isinglass, 2 oz.; juice, 4 lemons; yolks of eggs, 8; wine, 1 pint;
brandy (at pleasure), 1 wineglassful.
EXTREMELY GOOD STRAWBERRY BLANC-MANGE, OR
BAVARIAN CREAM.
(Delicious.)
This, if carefully made, and with ripe quinces, is one of the most
richly-flavoured preparations of fruit that we have ever tasted; and
the receipt, we may venture to say, will be altogether new to the
reader. Dissolve in a pint of prepared juice of quinces (see page
456), an ounce of the best isinglass; next, add ten ounces of sugar,
roughly pounded, and stir these together gently over a clear fire,
from twenty to thirty minutes, or until the juice jellies in falling from
the spoon. Remove the scum carefully, and pour the boiling jelly
gradually to half a pint of thick cream, stirring them briskly together
as they are mixed: they must be stirred until very nearly cold, and
then poured into a mould which has been rubbed in every part with
the smallest possible quantity of very pure salad oil, or if more
convenient, into one that has been dipped into cold water.
Obs.—This blanc-manger which we had made originally on the
thought of the moment for a friend, proved so very rich in flavour,
that we inserted the exact receipt for it, as we had had it made on
our first trial; but it might be simplified by merely boiling the juice,
sugar, and isinglass, together for a few minutes, and then mixing
them with the cream. An ounce and a half of isinglass and three-
quarters of a pint of cream might then be used for it. The juice of
other fruit may be substituted for that of the quinces.
Juice of quinces, 1 pint; isinglass, 1 oz.: 5 to 10 minutes. Sugar, 10
oz.: 20 to 30 minutes. Cream, 1/2 pint.
QUINCE BLANC-MANGE, WITH ALMOND CREAM.