SlideShare uma empresa Scribd logo
1 de 10
Phreaks, Hackers & Trolls
     The Politics of Transgression
            and Spectacle.
                REMIX



       EMMA THOMPSON
        NATALIE SLACK
1950–1960s: Freaking and Phreaking.


   Phreaking is a slang term used
   which exploits weaknesses in the
   phone system to make long-
   distance calls for free, tap into other
   calls, take control of lines, get free
   phone services.




Joe Engressia, also known as Joy Bubbles, was blind since birth with perfect pich. In 1957,
at the age of eight, he discovered he could “stop” the phone by whistling at a certain pitch,
later discovered to be a 2600 hertz tone, into the receiver. Which the eventually the media
show cased the “whiz kid” which influenced others into his footsteps
By 1961, phreakers no longer had to rely on perfect pitch to make their way into the phone
system. They were using Blue Box. This device was used to replicate the tones used by the
telephone switching system to route calls. enabling Blue Box users to act as if they were a
telephone operator..
1970’s - Phreaking.

Phreaking came into the public lime          John Draper, famously known as
light after a particular article called      "Cap'n Crunch,”. the only link to the
“secrets of the little blue box” it was an   sugary cereal was a plastic toy whistle
instant hit, because it revealed, in         that was once a prize giveaway in
detail, the practices of Phreaking.          each cereal box. In the late sixties, he
                                             had discovered that the Cap'n Crunch
                                             toy whistle's tone perfectly matched
                                             the 2600-hertz long distance trunk
                                             telephone signal. This enabled him to
                                             make free long distance phone calls
                                             around the world.
1980s To Make a Thief, Make an Owner;
   to Create Crime, Create Laws”—Ursula Le Guin.



By the 1980s, Phreaking growing but was increasingly joined by a
growing number of computer enthusiasts, many of them preteens
and teens, who extended the politics of transgression into new
technological terrains.
1990’s – Hackers, Public enemy number 1 in the US.

    Throughout the 1990’s the Hacker underground was thriving, although there was an
     increasing number of these types of hackers being nabbed and criminally prosecututed.
     Case Study – Hacker and phone Phreaker Kevin Mitnick

     Throughout the 1980’s and 1990’s he was arrested and convicted multiple times
     for various crimes which included computer fraud and possession illegal long-
     distance access cods.

     He was eventually placed on the FBI “Most wanted” list and was part of a three
     year manhunt until he was arrested in 1995. He was in jail for five years, four of
     those years were as a pretrial detainee and was placed in solitary confinement
     for one year. Mitnick explained these extreme circumstances were taken
     because a federal prosecutor told the judge he could use the phone to connect to
     North American Aerospace command and launch a ICBM. He never gained
     anything financially for his hacking and believes his harsh treatment was used
     to send a message to the wider hacking community. He was released in 2002.
2000-2010, Good Grief! The masses have come to our
                         internet.


In the year 2000 the floodgates opened with cheap Internet connections. Added to
this a host of new social media technologies, including blogs, wikis, social
networking sites, and video-sharing sites,
were being built and used by geeks and nongeeks to post messages, to share
pictures, to chatter aimlessly, to throw ephemeral thoughts into the virtual wind,
and to post videos and other related Internet memes. Internet memes are viral
images, videos, and catchphrases under constant modification by users, and with a
propensity to travel as fast as the Internet can move them.

During this time post 9/11 mandated stiff punishments for Cybercrimes. This
added to the crackdowns during the 1980’s and 1990’s made a much more
reserved hacker underground. Hackers like Kevin Mitnick are an endangered
species on cultural landscape of North America and Europe.
Trolls

    Trolls have transformed what were more occasional and sporadic
    acts, often focused on virtual arguments called “flaming or “flame
    wars, into a full-blown set of cultural norms and set of linguistic
    practices.

 Trolls work to remind the “masses” that have lapped onto the shores of
the Internet that there is still a class of geeks who, as their name suggests,
will cause Internet grief, hell, and misery; examples of trolling are legion.

 Griefers, one particular subset of troll, who roam in virtual worlds and
    games seeking to jam the normal protocols of gaming, might enact a
    relatively harmless prank, such as programming flying phalluses to pay
    a public visit in the popular virtual world Second Life during a high-
    profile CNET interview.
Trolling Examples

Case Study 1. – World of Warcraft

During a virtual funeral held in the enormously popular massively multiplayer
online game World of Warcraft, for a young player who had passed away in real
life, griefers orchestrated a raid and mercilessly killed the unarmed virtual funeral
entourage.

Case Study 2. – In the winter of 2007 and 2008, one group of trolls, bearing the
name Anonymous, trolled the Church of Scientology after the church attempted to
censor an internal video featuring Tom Cruise that had been leaked. Eventually
what was simply done for the sake of trolling grew into a more traditional protest
movement.
Summary Wordle
References

All content taken from –

Mandiberg, M (2012). The Social Media Reader. New
 York: NYU Press.

Mais conteúdo relacionado

Semelhante a Phreaks, hackers & trolls

Mass communications and its effects on society[2]
Mass communications and its effects on society[2]Mass communications and its effects on society[2]
Mass communications and its effects on society[2]
arthompson10
 
The history of horror
The history of horrorThe history of horror
The history of horror
betsizzle
 
The history of horror betsi marked
The history of horror betsi markedThe history of horror betsi marked
The history of horror betsi marked
betsizzle
 

Semelhante a Phreaks, hackers & trolls (20)

2600 v10 n4 (winter 1993)
2600 v10 n4 (winter 1993)2600 v10 n4 (winter 1993)
2600 v10 n4 (winter 1993)
 
1990s
1990s1990s
1990s
 
Hackers
HackersHackers
Hackers
 
History of internet
History of internetHistory of internet
History of internet
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.
 
the history of horror
the history of horrorthe history of horror
the history of horror
 
HISTORY OF CYBERSECURITY BY NEET.pptx
HISTORY OF CYBERSECURITY BY NEET.pptxHISTORY OF CYBERSECURITY BY NEET.pptx
HISTORY OF CYBERSECURITY BY NEET.pptx
 
Mass communications and its effects on society[2]
Mass communications and its effects on society[2]Mass communications and its effects on society[2]
Mass communications and its effects on society[2]
 
The history of horror
The history of horrorThe history of horror
The history of horror
 
the history of horror
the history of horrorthe history of horror
the history of horror
 
S10_E02_How to Pimp Social Media 101.pptx
S10_E02_How to Pimp Social Media 101.pptxS10_E02_How to Pimp Social Media 101.pptx
S10_E02_How to Pimp Social Media 101.pptx
 
The history of horror betsi marked
The history of horror betsi markedThe history of horror betsi marked
The history of horror betsi marked
 
Internet History
Internet HistoryInternet History
Internet History
 
History of Internet
History of InternetHistory of Internet
History of Internet
 
COMM 101 chapter 7 power point (hoaxes and wotw) (updated6) LUTHER
COMM 101 chapter 7 power point (hoaxes and wotw) (updated6) LUTHERCOMM 101 chapter 7 power point (hoaxes and wotw) (updated6) LUTHER
COMM 101 chapter 7 power point (hoaxes and wotw) (updated6) LUTHER
 
Timeline of Media Memes
Timeline of Media MemesTimeline of Media Memes
Timeline of Media Memes
 
ETHICS06 - Pornography and Abusive Images
ETHICS06 - Pornography and Abusive ImagesETHICS06 - Pornography and Abusive Images
ETHICS06 - Pornography and Abusive Images
 
The hacker crackdown 4 the civil libertarians
The hacker crackdown 4 the civil libertariansThe hacker crackdown 4 the civil libertarians
The hacker crackdown 4 the civil libertarians
 
History's most notorious hackers
History's most notorious hackersHistory's most notorious hackers
History's most notorious hackers
 
Thesis Statement Of 3 Idiots - Homework Directory
Thesis Statement Of 3 Idiots - Homework DirectoryThesis Statement Of 3 Idiots - Homework Directory
Thesis Statement Of 3 Idiots - Homework Directory
 

Mais de EJThompson (6)

Social games conclusion
Social games conclusionSocial games conclusion
Social games conclusion
 
The optical illusion
The optical illusionThe optical illusion
The optical illusion
 
Social Gaming Major Assignment Presentation
Social Gaming Major Assignment PresentationSocial Gaming Major Assignment Presentation
Social Gaming Major Assignment Presentation
 
St george and the dragon digital story
St george and the dragon digital storySt george and the dragon digital story
St george and the dragon digital story
 
Social film and inside experience conclusion
Social film and inside experience conclusionSocial film and inside experience conclusion
Social film and inside experience conclusion
 
Radio communication
Radio communicationRadio communication
Radio communication
 

Phreaks, hackers & trolls

  • 1. Phreaks, Hackers & Trolls The Politics of Transgression and Spectacle. REMIX EMMA THOMPSON NATALIE SLACK
  • 2. 1950–1960s: Freaking and Phreaking. Phreaking is a slang term used which exploits weaknesses in the phone system to make long- distance calls for free, tap into other calls, take control of lines, get free phone services. Joe Engressia, also known as Joy Bubbles, was blind since birth with perfect pich. In 1957, at the age of eight, he discovered he could “stop” the phone by whistling at a certain pitch, later discovered to be a 2600 hertz tone, into the receiver. Which the eventually the media show cased the “whiz kid” which influenced others into his footsteps By 1961, phreakers no longer had to rely on perfect pitch to make their way into the phone system. They were using Blue Box. This device was used to replicate the tones used by the telephone switching system to route calls. enabling Blue Box users to act as if they were a telephone operator..
  • 3. 1970’s - Phreaking. Phreaking came into the public lime John Draper, famously known as light after a particular article called "Cap'n Crunch,”. the only link to the “secrets of the little blue box” it was an sugary cereal was a plastic toy whistle instant hit, because it revealed, in that was once a prize giveaway in detail, the practices of Phreaking. each cereal box. In the late sixties, he had discovered that the Cap'n Crunch toy whistle's tone perfectly matched the 2600-hertz long distance trunk telephone signal. This enabled him to make free long distance phone calls around the world.
  • 4. 1980s To Make a Thief, Make an Owner; to Create Crime, Create Laws”—Ursula Le Guin. By the 1980s, Phreaking growing but was increasingly joined by a growing number of computer enthusiasts, many of them preteens and teens, who extended the politics of transgression into new technological terrains.
  • 5. 1990’s – Hackers, Public enemy number 1 in the US.  Throughout the 1990’s the Hacker underground was thriving, although there was an increasing number of these types of hackers being nabbed and criminally prosecututed. Case Study – Hacker and phone Phreaker Kevin Mitnick Throughout the 1980’s and 1990’s he was arrested and convicted multiple times for various crimes which included computer fraud and possession illegal long- distance access cods. He was eventually placed on the FBI “Most wanted” list and was part of a three year manhunt until he was arrested in 1995. He was in jail for five years, four of those years were as a pretrial detainee and was placed in solitary confinement for one year. Mitnick explained these extreme circumstances were taken because a federal prosecutor told the judge he could use the phone to connect to North American Aerospace command and launch a ICBM. He never gained anything financially for his hacking and believes his harsh treatment was used to send a message to the wider hacking community. He was released in 2002.
  • 6. 2000-2010, Good Grief! The masses have come to our internet. In the year 2000 the floodgates opened with cheap Internet connections. Added to this a host of new social media technologies, including blogs, wikis, social networking sites, and video-sharing sites, were being built and used by geeks and nongeeks to post messages, to share pictures, to chatter aimlessly, to throw ephemeral thoughts into the virtual wind, and to post videos and other related Internet memes. Internet memes are viral images, videos, and catchphrases under constant modification by users, and with a propensity to travel as fast as the Internet can move them. During this time post 9/11 mandated stiff punishments for Cybercrimes. This added to the crackdowns during the 1980’s and 1990’s made a much more reserved hacker underground. Hackers like Kevin Mitnick are an endangered species on cultural landscape of North America and Europe.
  • 7. Trolls  Trolls have transformed what were more occasional and sporadic acts, often focused on virtual arguments called “flaming or “flame wars, into a full-blown set of cultural norms and set of linguistic practices.  Trolls work to remind the “masses” that have lapped onto the shores of the Internet that there is still a class of geeks who, as their name suggests, will cause Internet grief, hell, and misery; examples of trolling are legion.  Griefers, one particular subset of troll, who roam in virtual worlds and games seeking to jam the normal protocols of gaming, might enact a relatively harmless prank, such as programming flying phalluses to pay a public visit in the popular virtual world Second Life during a high- profile CNET interview.
  • 8. Trolling Examples Case Study 1. – World of Warcraft During a virtual funeral held in the enormously popular massively multiplayer online game World of Warcraft, for a young player who had passed away in real life, griefers orchestrated a raid and mercilessly killed the unarmed virtual funeral entourage. Case Study 2. – In the winter of 2007 and 2008, one group of trolls, bearing the name Anonymous, trolled the Church of Scientology after the church attempted to censor an internal video featuring Tom Cruise that had been leaked. Eventually what was simply done for the sake of trolling grew into a more traditional protest movement.
  • 10. References All content taken from – Mandiberg, M (2012). The Social Media Reader. New York: NYU Press.

Notas do Editor

  1. increasing number of these types of hackers were being nabbed and criminally prosecuted.28 Although there are many examples to draw on, the most famous case and set of trials concerns hacker and phone phreaker Kevin Mitnick.29!roughout the 1980s and 1990s, he was arrested and convicted multiple times for various crimes, including computer fraud and possessing illegal long-distance access cods. Eventually the FBI placed him on the FBI’s “Most Wanted” list before they were able to track him down and arrest him in 1995, a&er a three-year manhunt. He was in jail for "veyears, although he spent over four of those as a pretrial detainee, during which time he was placed in solitary con"nement for a year.30Mitnickexplained in an interview why this extreme measure was taken: “because a federal prosecutor told the judge that if I got to a phone I could connect to NORAD (North American Aerospace Command) and somehow launch an ICBM (Intercontinental Ballistic Missile).”31Mitnick was unquestionably guilty of a string of crimes, although he never gained anything "nancially from his hacks. !e extreme nature of his punishment was received as a warning message within the wider hacker community. “I was the guy