{"id":36864,"date":"2024-04-26T23:01:05","date_gmt":"2024-04-26T23:01:05","guid":{"rendered":"http:\/\/localhost\/branding\/hackers-good-and-evil\/"},"modified":"2024-04-26T23:01:05","modified_gmt":"2024-04-26T23:01:05","slug":"hackers-good-and-evil","status":"publish","type":"post","link":"https:\/\/sheilathewriter.com\/blog\/hackers-good-and-evil\/","title":{"rendered":"Hackers, Good And Evil"},"content":{"rendered":"<p>Hackers, Good And Evil<\/p>\n<p>\u201cGovernments form the industrial world; I come from cyberspace, the new home of mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome here. You have no sovereignty where we gather. You do not know us, nor do you know our world. Cyberspace does not lie within your borders, your legal concepts of property, expression, identity, movement and context do not obey to us. They are all base on matter and there is no matter here.\u201d<\/p>\n<p>John Perry Barlow &#8211; Electronic Frontier Foundation<\/p>\n<p>Cyberspace Declaration of Independence<\/p>\n<p>A war is being fought in the Internet twenty-four hours a day. A team of defenders spread throughout the world, are ready to stop and neutralize every attack. It is the Global Thread Operation Center where all attacks are being monitored; any of which could be the signal for a stronger hit that could generate absolute chaos. The room looks like a set from a futuristic movie. Four huge screens in the front of the room display the process data that is taking place. Several rows of desks and panels fill the room. More than twenty people are moving around, answering and making phone calls, talking to each other, and examining computer screens. They are ready, and waiting. Suddenly, everyone\u2019s attention is focused on a specific screen, where a problem has been detected. One of the major highways of Internet traffic has slowed down considerably due to an assumed hacker assault. What is scary about this attack is that it seems to be moving through the time zones towards the Americas, most likely the United States. So far, it has in some way affected every major network attached to one of the pipelines. If the attack effectively reaches the U.S., it could negatively affect hundreds of companies, businesses, the stock market and millions of people; this would cause a devastating strike on the infrastructure of the Internet itself. The head leader of the team makes a quick check with another station in Asia and as they speak the Internet traffic recovers from the incident as fast as it occurred. The team lightens up and feels good that they were able to catch it on time. This kind of anomaly is what the team most fears, an electronic Pearl Harbor (Hackers: TLC).<\/p>\n<p>Over the past twenty years, our world has evolved into a more complex society and simultaneously people have been evolving as well (Himanen vii). There is an overall, new culture, new technology and different languages that conforms a digital community holding all kinds of people: pirates and thieves, delinquents and law enforcers, dreamers, heroes and villains. Even though they operate all over the world, their true home is cyberspace. \u201cThese diverse breed of people are known as hackers\u201d(TLC). <\/p>\n<p>Unfortunately, the press uses the term hacker incorrectly when describing illicit access on computers with malicious or criminal purpose. The Atlantic Magazine, Feb. 17, 2002 par. 1 \u201cIt has been widely noted that last week\u2019s attack by hackers against the Internet sites Yahoo, Amazon\u2026\u201d and it continues, \u201cthe fact that hackers were able [\u2026] to cripple these major sites\u2026\u201d How can such important magazine permit such barbaric mistake? Many other important publications and periodicals follows the same mistake. \u201c Stopping hackers from malicious breaking into computer networks is often a game of cat and mouse\u201d, \u201cEvery attack on a computer by a hacker leaves traces\u201d said Paul Eng from ABC News.com. <\/p>\n<p>Since the start of the computer era, the term hacker has been used to describe its pioneers, defining their motivation to explore in detail how computer systems and networks function. In the early sixties, small groups of Stanford and MIT\u2019s programmers started to call themselves hackers. Interested only in analyzing systems and writing programming code, they never got involved in any criminal activities, malicious intents or in breaking the rule of privacy and property. On the contrary, they followed the hacker ethic, which tells that \u201cthe search for information and expertise is vital and sharing this knowledge is the hacker\u2019s duty to the community\u201d (\u201cRedHat,\u201d par. 4).<\/p>\n<p>Steven Levy was one of the first writers that got involved with hackers. In his book \u201cHackers: Heroes of the Computer Revolution\u201d Levy recorded the original hacker ethic:<\/p>\n<p>qAccess to computers should be unlimited and total. <\/p>\n<p>qAlways yield to the Hands-On Imperative. <\/p>\n<p>qMistrust authority &#8212; promote decentralization. <\/p>\n<p>qHackers should be judged by their hacking. <\/p>\n<p>qYou can create art and beauty on a computer. <\/p>\n<p>qComputers can change your life for the better.<\/p>\n<p>These seven statements are very clear and precise and many hackers still practice the art of hacking based on this ethic code. Hackers simply enjoy challenges, like for example that of circumventing security controls on computer systems (RedHat par.4). By the mid-eighties when some members of this community began to commit dishonest hacking of systems and networks to inflict damage or obtain personal gain, hackers decided to name them crackers in order to differentiate themselves. Over the years, different levels of distinctions (\u201cblack, white, and gray hat\u201d) where applied to describe the individuals who find and exploit vulnerabilities in computers. Whatever you call them, the fact is that hackers are among us. They are people just like you and me, heroes or villains. Like any group of people, some will be good and some will be bad.<\/p>\n<p>Ian Murphy, also known as Captain Zap, performed one of the first cracker attacks. At a very young age, he targeted the charging system of AT&amp;T telephone Company because the rates were too high. At that time, computerized systems did not have much security. For Captain Zap was easy to get access, it was a game. By changing the clock system around the country, Zap was able to turn discounted night rates into daytime rates. Therefore millions of ATT subscribers started to save money without even knowing about it. Just when the first set of bills started to go out, the company found out. This is considered one of the greatest hacks, and Captain Zap became part of the hall of fame of hackers. Zap himself says that above all he decided to become this \u201ctechno freak\u201d because he seemed to know a lot about it and also because there were no laws to it. Today hackers like Captain Zap are considered as hackers who wear the black hat (TLC).<\/p>\n<p>The hackers, \u201cwearing\u201d the black hat (the crackers,) are those who are not interested in the academic value of breaking into computer systems, instead they used their abilities to steal sensitive private information for their own gain, causing damage and crisis to many organizations and the public. Crackers gave birth to the phrase \u201ccyber-crime\u201d generating serious damage to business and companies, to the social structure in general. Their actions range from credit card fraud, identity theft, to spreading computer viruses. Still, the black hats category can be broken down further. There are the Script Kiddies or Cyber-punks. These kids like Cold Fire and Mafia Boy get bored at school and are very skillful with computers and technology. They tend to use their skills for evil and end up getting caught because they brag about their exploits in order to make a name in the community. Another group is the level of Professional criminals. Private companies, and even the government usually hire crackers since they make the perfect spy (Hacker 101). Lastly there are those who have great abilities writing programming software code and used it to create those malicious programs called viruses.  The Melissa virus is an example of how critical damage crackers cause, with an estimated damage of $80 Million dollars in one million computers across the world. In a response to such acts, tougher laws on cyber crime have been created.<\/p>\n<p>With the appearance of cyber crime, a new profession for hackers came alive. These hackers have their \u201cwhite hats\u201d on, and they are also known as ethical hackers (TLC). A \u201cwhite hat\u201d hacker only attacks systems when authorized by the owner. His purpose is to test and examine the systems and networks performance, to determine how vulnerable it is to intrusion. Very good examples of white hat hackers are academic researchers and professional security consultants (RedHat). Many of the ethical hackers wore the \u201cblack hat\u201d before, but they have switched since the \u201cwhite hats\u201d they get paid, and better yet they are allowed to hack. It is the best reward any hacker can receive.<\/p>\n<p>The white hats first start fighting the bad guys at the Internet Security Services Global Threat Center. Just in one hour, they observe more than 400 pre-attacks, 1500 Denial-of-Service attacks (overload or flood of site\u2019s servers) (TechTV, \u201cWhat Is\u201d) and last year alone they seized approximately 83 million hacker attacks all over the world. The team has to analyze every attack and figure out if it will hit any of the companies they protect and it does, how dangerous can it be? For the last 20 years the battle between the good guys and the bad guys has become greater and the techniques, software and types of attack by the black hats have evolved (TLC).<\/p>\n<p>To keep up, hundreds of the white hats every year register for special classes. These classes are setup to train the system administrators and many others, to think like the bad guy, to outsmart him\/her. One of the notorious \u201chacking schools\u201d is in Los Angeles California called Xtreme Hacking but Florida doesn\u2019t get behind when it opened up the Intense School in Fort Lauderdale (Garcia, \u201cYou too\u201d). Many of the students at these classes worry about their jobs and keeping the intruder out of their systems with vital private information. Students learn how to hack with new methods and also how to protect against these learned new ways. They need to think like the bad guy in order to succeed. After seven days of hacking, there are more white hats ready for possible threats.<\/p>\n<p> A major threat for white hats and the nation itself is that of Info-War and the possibility of ever occurring is real. The year is 1990; U.S government computers were in the scope of hackers that served other nations. A very secret military program was underway, the stealth bomber and it was the target chosen by hackers. Though the existence of the aircraft was known, very little was talked about it. There were no images of it or any specific characteristics; curiosity was the force that began a series of attacks against the projects\u2019 computers. Days later these were discovered and generated panic since it wasn\u2019t known where it was coming from. Due to a process of masking connections used by hackers, where the intruder access several machines across the world, taking control over them and that way hitting the desired target. When an attack is detected and analyzed, only the last IP address, (Internet Protocol) of the chain of computers, is seen so it is very difficult to track it back to where it came from. Later on it was found that this act was cause by teenagers playing with their computers in England (TLC).<\/p>\n<p>Still there are others who also form the hacking community. Last but not least, there are the gray hat hackers, those who have the skills and intents of white hat hackers, in most situations, but use their knowledge for less than noble purposes on occasions. They are white hat hackers who wear occasionally a black hat. Those who intend to stay apart as independent researchers originally created this last level of color. As the other types of hackers discussed before, they gray hat hackers follow another set of hacker ethics. For them, it is acceptable to break into systems as long as the hacker does not commit theft or breach confidentiality. Authorities consider these acts less threatening and merely compared them with graffiti artist on the streets (TLC).<\/p>\n<p>But again the public is given a bad perspective of what the original hacker community is all about. It is important for them to understand the role hackers play in our society, a benign one, and because of those black hats like Mafia Boy and Cold Fire, hackers become the excuse for bad laws, censorship and repression. The future of cyberspace and its rights might be in danger because of this.<\/p>\n<p>Thanks to John Perry Barlow, hackers now count with a force that backs them up. Barlow is the founder of the Electronic Frontier Foundation (EFF), an organization that fights for cyber-rights. \u201cWe are dealing with the battle between the future and the past, between the powers that were and the powers that have yet to be\u201d Barlow says (TLC). He also believes that \u201cthe internet represents a change in history as great as the industrial revolution\u201d and from this philosophy he came about with the creation of a Declaration of Independence for Cyberspace, fearing from the government and lawmakers that want to take over it. In a few words he summarizes:<\/p>\n<p>\u201cGovernments form the industrial world; I come from cyberspace, the new home of mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome here. You have no sovereignty where we gather. You do not know us, nor do you know our world. Cyberspace does not lie within your borders, your legal concepts of property, expression, identity, movement and context do not obey to us. They are all base on matter and there is no matter here\u201d (EFF)<\/p>\n<p>The EFF leads a new hacker battle as John defends one of the most spread and common hacks of the moment, related with the music and the movie industry. With the release of movies in DVD format, movies were capable of being played in computers and now the Entertainment industry was involved in this technological battle. In order to prevent illegal copies of such films, the industry distributes the DVDs with a high Copyright protection but still people find the way to crack them. Matthew Pavlovich was recently involved in a sue hold by \u201cHollywood.\u201d Matthew is the creator of a certain program that allows people to copy the movies in the computer. Since he is an \u201copen source\u201d programmer, others have used his code base in order to crack the encryption files that conform the movies. Originally, the program called DeCSS was created by Pavlovich to allow Linux users to play the movies as well and to remove the many other restrictions that \u201cHollywood\u201d force us to have. Thanks the hard work of the EFF lawyers and staff, the U.S Supreme court dropped the lawsuit in Matthews favor (TehcTV, US). Every day there are many cases like this where the big companies just worry about suing many other people.<\/p>\n<p>Nowadays, there is a conflict in cyberspace between its outlaws and angels. The amount of hackers defending their good harmless ethics will increase at the same time many others choose to practice dark activities. It is important for the cyberspace community to protect the cyber rights and fight those who put in danger its liberties. As a result former hacker Anna Marie Moore has re-written \u201cthe new generation of hacker\u201d ethics: Hacking is an art of poetry and beauty, Cracking is a criminal act; Know the history of the field and what you represent as part of it; do not dishonor that history; Understand in application the original hacker ethic; To live without regrets means doing nothing of which you might later be ashamed; Do not be afraid to have morals and principles in which you believe; Allow those morals to guide your decision-making. If others decide for you, for your stand, ignore them; Do not be stupid; Do not follow those who have lost their vision; everything in life has either a benefit or a consequence. Both are always possible, based on decisions you may make within a split second of time. Chose wisely (Moore). The future of cyberspace is also in hands of the public who needs to accurately differentiate both sides.<\/p>\n<p>Bibliography:<\/p>\n<p>Bibliography<\/p>\n<p>\u201cAlleged Thieves Heist Thousands of Computers.\u201d Computer-related Crime.<\/p>\n<p>\u201cBlame the Hackers.\u201d TechTV. Apri, 2003. <\/p>\n<p>Bridis, Ted. \u201cTo an old hacker, turnabout is fair play.\u201d The Miami Herald \u2013 Herald.com. 8 pars. Feb, 2003. Apri, 2003. <\/p>\n<p>\u201cCriminal Computing\u201d The Atlantic Magazine. Feb, 2000: 6 pars. Apri, 2003 <\/p>\n<p>Dibbell, Jullian. \u201cLost Love. (Computer viruses)\u201d Harper\u2019s Magazine. August (2001): 6 pars. 11 Apr  <\/p>\n<p>EFF Media Advisory. \u201c Us Supreme Court Says Hollywood Can\u2019t sue Texas Resident.\u201d Jan. 2003. <\/p>\n<p>EFF Media Advisory. \u201c Paper Explains Flaw in Videogames Security System.\u201d Augst. 2002. <\/p>\n<p>Elgrably, Jordan. \u201cCyber Crime According to Defense Attorney Jennifer Stisa Granick.\u201d CriminalDefense Weekly. June, 2002 Vol 1, Issue 15. <\/p>\n<p>\u201cExploring the Ethics of Hacking.\u201d TechTV. Apri, 2003. <\/p>\n<p>Gale group. \u201cThe Digital Revolution eats its own (interview)\u201d Haper\u2019s Magazine. 25 pars. Jan. 2000: 10 pars. 11 Apr <\/p>\n<p>Garcia, Bea. \u201cYou too can become a professional hacker.\u201d The Miami Herald \u2013 Herald.com. Apri, 2003. <\/p>\n<p>Garcia, Bea. \u201cHoney Pot set up on the Web to attract hackers.\u201d The Miami Herald \u2013 Herald.com. Mar, 2002. Apri, 2003. <\/p>\n<p>Ghettohackers.net Front Page. March, 2003. <\/p>\n<p>\u201cHacker for Hire.\u201d TechTV. Apri, 2003. <\/p>\n<p>\u201cHackers Develop Anti-Censorship Software.\u201d TechTV. Apri, 2003. <\/p>\n<p>\u201cHackers: Outlaws and Angles.\u201d The Learning Channel TLC. Dec, 2001<\/p>\n<p>\u201cHackers Top 10 Entry Points.\u201d TechTV. Apri, 2003. <\/p>\n<p>\u201cHacktivsm Defended.\u201d TechTV. Apri, 2003. <\/p>\n<p>\u201cHacktivist Promote War Messages.\u201d TechTV. Apri, 2003. <\/p>\n<p>\u201cHannibal Hacker.\u201d TechTV. Apri, 2003. <\/p>\n<p>Hayes, Lindsay. \u201cHackers: A case study analysis.\u201d \u201cCase Study 2, Kevin Mitnick.\u201d Larre, Jason. Hayes, Lyndsay. Fisher, Cindy.2001 <\/p>\n<p>Himanen Pekka Torvalds Linus, Castells Manue,. The hacker ethic and the spirit of the Information Age. New York : Random House, c2001.<\/p>\n<p>\u201cLiberty and Linux for all.\u201d The Atlantic Magazine. Oct, 1998: 8 pars. Apri, 2003. <\/p>\n<p>Kopit, Arthur L. BecauseHeCan : a play. New York : S. French, c2000<\/p>\n<p>\u201cMicrosoft Hackers Reached Key Programs, CEO Says.\u201d TechTV. Apri, 2003. <\/p>\n<p>Moore, Marie Anna a.ka. Starla Pureheart. \u201cThe Art of Hacking.\u201d TechTV-The ScreenSavers Apri, 2003. <\/p>\n<p>Power, Richard. \u201cWhat is a Denial-Of-Service Attack?\u201d TechTV-The ScreenSavers. Apri, 2003. <\/p>\n<p>Quinter, Jeremy. \u201cHackers, Methods of attack and defense.\u201d TLC. 2001. <\/p>\n<p>Quinter, Jeremy. \u201cHackers Psych 101.\u201d TLC. 2001. http:\/\/tlc.discovery.com\/convergence\/hackers\/articles\/psych.html&gt;<\/p>\n<p>Red Hat Linux. \u201cRed Hat Linux 8.0: The Official Red Hat Linux Security Guide.\u201d Chapter 2. Attackers and Risks. Feb, 2003. <\/p>\n<p>\u201cRoughing Up\u2019 Hackers.\u201d TechTV. Apri, 2003. <\/p>\n<p>Sil@Antioffline.com. AntiOffline removing the Dot in Dot.com. \u201cGhetto Hackers.org crew speaks.\u201d March, 2003. <\/p>\n<p>Slatalla, Michelle. \u201cA Brief History of Hacking.\u201d TLC. 2001. http:\/\/tlc.discovery.com\/convergence\/hackers\/articles\/history.html&gt;<\/p>\n<p>\u201cThe Digital Revolution eats its own.\u201d Harper\u2019s Magazine. Jan, 2002. 10 pars. Apri, 2003. <\/p>\n<p>Thomas Douglas. Hacker Culture. Minneapolis: University of Minnesota Press, c2002<\/p>\n<p>\u201cWeb Hacking\u2019s illegal? Who Cares.\u201d TechTV. Apri, 2003. <\/p>\n<p>Whitaker, Barbara. \u201c17 Charged in Satellite TV Case.\u201d The New York Times. 11 pars. Feb, 2003. Apri, 2003. <\/p>\n<p>\u201cWhen Hackers Get Caught: Mitnick Case Study.\u201d Computer-related Crime. Augst, 2002. <\/p>\n<p>\u201cWhy Hacktivsm Doesn\u2019t work.\u201d TechTV. Apri, 2003.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers, Good And Evil \u201cGovernments form the industrial world; I come from cyberspace, the new home of mind. On behalf<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-36864","post","type-post","status-publish","format-standard","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hackers, Good And Evil - sheilathewriter<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sheilathewriter.com\/blog\/hackers-good-and-evil\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers, Good And Evil - sheilathewriter\" \/>\n<meta property=\"og:description\" content=\"Hackers, Good And Evil \u201cGovernments form the industrial world; I come from cyberspace, the new home of mind. On behalf\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sheilathewriter.com\/blog\/hackers-good-and-evil\/\" \/>\n<meta property=\"og:site_name\" content=\"sheilathewriter\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-26T23:01:05+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"16 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/hackers-good-and-evil\/\",\"url\":\"https:\/\/sheilathewriter.com\/blog\/hackers-good-and-evil\/\",\"name\":\"Hackers, Good And Evil - sheilathewriter\",\"isPartOf\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#website\"},\"datePublished\":\"2024-04-26T23:01:05+00:00\",\"author\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab\"},\"breadcrumb\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/hackers-good-and-evil\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sheilathewriter.com\/blog\/hackers-good-and-evil\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/hackers-good-and-evil\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sheilathewriter.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers, Good And Evil\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#website\",\"url\":\"https:\/\/sheilathewriter.com\/blog\/\",\"name\":\"sheilathewriter\",\"description\":\"Custom essay writing\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sheilathewriter.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/opskill.com\/propapers\"],\"url\":\"https:\/\/sheilathewriter.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers, Good And Evil - sheilathewriter","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sheilathewriter.com\/blog\/hackers-good-and-evil\/","og_locale":"en_US","og_type":"article","og_title":"Hackers, Good And Evil - sheilathewriter","og_description":"Hackers, Good And Evil \u201cGovernments form the industrial world; I come from cyberspace, the new home of mind. On behalf","og_url":"https:\/\/sheilathewriter.com\/blog\/hackers-good-and-evil\/","og_site_name":"sheilathewriter","article_published_time":"2024-04-26T23:01:05+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"16 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sheilathewriter.com\/blog\/hackers-good-and-evil\/","url":"https:\/\/sheilathewriter.com\/blog\/hackers-good-and-evil\/","name":"Hackers, Good And Evil - sheilathewriter","isPartOf":{"@id":"https:\/\/sheilathewriter.com\/blog\/#website"},"datePublished":"2024-04-26T23:01:05+00:00","author":{"@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab"},"breadcrumb":{"@id":"https:\/\/sheilathewriter.com\/blog\/hackers-good-and-evil\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sheilathewriter.com\/blog\/hackers-good-and-evil\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sheilathewriter.com\/blog\/hackers-good-and-evil\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sheilathewriter.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Hackers, Good And Evil"}]},{"@type":"WebSite","@id":"https:\/\/sheilathewriter.com\/blog\/#website","url":"https:\/\/sheilathewriter.com\/blog\/","name":"sheilathewriter","description":"Custom essay writing","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sheilathewriter.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/opskill.com\/propapers"],"url":"https:\/\/sheilathewriter.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts\/36864","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/comments?post=36864"}],"version-history":[{"count":0,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts\/36864\/revisions"}],"wp:attachment":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/media?parent=36864"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/categories?post=36864"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/tags?post=36864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}