Difference between revisions of "Hacking"
Jump to navigation
Jump to search
m (rewording) |
(correction) |
||
(2 intermediate revisions by 2 users not shown) | |||
Line 2: | Line 2: | ||
|wikipedia=https://en.wikipedia.org/wiki/Hacker | |wikipedia=https://en.wikipedia.org/wiki/Hacker | ||
|image= | |image= | ||
− | |constitutes | + | |interests=hacker |
+ | |constitutes= | ||
|description=Breaking and entering computer systems | |description=Breaking and entering computer systems | ||
}} | }} | ||
'''Hacking''' means gaining access to a [[computer|computer system]], or any other electronic system, for example via [[malware]] or [[zero day]] exploits. | '''Hacking''' means gaining access to a [[computer|computer system]], or any other electronic system, for example via [[malware]] or [[zero day]] exploits. | ||
+ | |||
+ | ==As a tool of statecraft== | ||
+ | [[Millie Weaver]]'s documentary ''[[ShadowGate]]'' explains how [[The Deep State]] uses "hacks" as cover for illegal disclosure of information. | ||
==By intelligence agencies== | ==By intelligence agencies== | ||
The difficulty of proving (or even of detecting) hacking by [[intelligence agencies]] has given them a more or less free hand in their hacking. Recently, however, they have sought to consolidate this ''de facto'' ability by claiming the legal right. The [[2016 Investigatory Powers Act]] awarded [[GCHQ]] the legal right to hack anyone it chose to.<ref>https://www.alphr.com/security/1010321/gchq-now-has-the-power-to-legally-hack-anyone</ref> | The difficulty of proving (or even of detecting) hacking by [[intelligence agencies]] has given them a more or less free hand in their hacking. Recently, however, they have sought to consolidate this ''de facto'' ability by claiming the legal right. The [[2016 Investigatory Powers Act]] awarded [[GCHQ]] the legal right to hack anyone it chose to.<ref>https://www.alphr.com/security/1010321/gchq-now-has-the-power-to-legally-hack-anyone</ref> | ||
+ | |||
+ | ==Hackers== | ||
+ | {{FA|hacker}} | ||
+ | "Hacker" is a contested term. | ||
{{SMWDocs}} | {{SMWDocs}} | ||
− | |||
==References== | ==References== | ||
{{reflist}} | {{reflist}} | ||
− |
Latest revision as of 22:59, 26 August 2021
Hacking | |
---|---|
Interest of | • Joseph Felter • Guccifer • Rogue Media Labs • Dragos Ruiu |
Breaking and entering computer systems |
Hacking means gaining access to a computer system, or any other electronic system, for example via malware or zero day exploits.
Contents
As a tool of statecraft
Millie Weaver's documentary ShadowGate explains how The Deep State uses "hacks" as cover for illegal disclosure of information.
By intelligence agencies
The difficulty of proving (or even of detecting) hacking by intelligence agencies has given them a more or less free hand in their hacking. Recently, however, they have sought to consolidate this de facto ability by claiming the legal right. The 2016 Investigatory Powers Act awarded GCHQ the legal right to hack anyone it chose to.[1]
Hackers
- Full article: hacker
- Full article: hacker
"Hacker" is a contested term.
An example
Page name | Description |
---|---|
"Advanced persistent threat" | A computer attack in which a person or group gains unauthorized access to a computer network and remains undetected for an extended period. |
Related Documents
Title | Type | Publication date | Author(s) | Description |
---|---|---|---|---|
Document:CyberGuardian Cyber Security Education Programme for Children and Young People | brainwashing concept paper | 30 January 2016 | Integrity Initiative | II puts lots of thought into how the military can train British children for cyberwarfare. |
Document:Executive Summary Cyber Security Education Programme for Children and Young People | brainwashing concept paper executive summary | 26 February 2016 | Integrity Initiative | II sums up its thought on how the military can train British children for cyberwarfare |
Document:Hacker Generations | article | 23 August 2011 | Richard Thieme | On the origins and real meaning of "Hacker"; a term which, in company with "conspiracy-theory", "Holocaust-denial" and many others has been co-opted/invented by Establishments to marginalise research deemed most threatening to the Official Narratives that define "Consensus trance" reality. |
Document:Hacking on a Scale you can Barely Imagine | article | 6 December 2012 | John Pilger | On the glaring omissions and hypocrisies of the Leveson Inquiry into Press standards, noting especially the vast covert programs of interception and permanent storage of every item of electronic communication on the planet for later data-mining wherever the state might deem it expedient to re-construct the life and movements of targetted individuals. |
File:ICA 2017 01.pdf | Report | 6 January 2017 | Director of National Intelligence | A 25 page report on joint US intelligence agencies assessment of alleged Russian interference in the 2016 Presidential election. |
File:JAR 16-20296.pdf | Report | 29 December 2016 | FBI | Joint analysis report on alleged efforts by the Russian state to affect the outcome of the 2016 presidential election by means of computer hacking. |
Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.