History
Hacking can trace its roots as far back to the ancestor of the internet known as the ARPAnet, which was the very first global computer network. The culture of hacking was born in 1961 in the Massachusetts Institute of Technology (or MIT for short). MIT students obtained the first PDP-1, the Programmed Data Processor-1, was “the first commercial, interactive computer (“The Machine”) and the Tech Model Railroad Club took a liking to the machine, causing the TMRC to program new terms and tools surrounding that are still exist today within the culture. With the ARPAnet, collaborative work across the world soon took hold of the current knowledge of the technology and expanded it exponentially, further increasing technological advances as well. When the Jargon File came across the screens of these hackers, the culture had finally set its mark as officially existent (Raymond, 2000).
As the expansions of processors and networks continue to grow, the more modern term of hacking (better known as cracking) is born. In the early 70’s, John “Captain Crunch” Draper learns how to make free long distance calls by whistling a specific tone into the phone by a give-away from a cereal box (hence his nickname). These phone hackers, or phreaks, begin to create “blue boxes” to help themselves with their exploits. Moving onto towards the 80’s, one of the first publically known arrests of computer cracking occurs. The group known as the “414s” is accused for 60 hacks into various networks. Later on in the decade, the Computer Fraud and Abuse Act as well as the Computer Emergency Response Team were created by the U.S. (Trigaux 2000).
Going on towards the late 90’s and early 2000’s, Napster, a peer to peer file sharing program (mostly focused towards music), is created. Although short lived (1999 – 2001) the program was one of the first few to promote P2P sharing and leaves a legacy (Lamont 2013). Two years later after Napster was shut down, the infamous torrent file sharing website, The Pirate Bay, is founded (Graham 2009).
As the expansions of processors and networks continue to grow, the more modern term of hacking (better known as cracking) is born. In the early 70’s, John “Captain Crunch” Draper learns how to make free long distance calls by whistling a specific tone into the phone by a give-away from a cereal box (hence his nickname). These phone hackers, or phreaks, begin to create “blue boxes” to help themselves with their exploits. Moving onto towards the 80’s, one of the first publically known arrests of computer cracking occurs. The group known as the “414s” is accused for 60 hacks into various networks. Later on in the decade, the Computer Fraud and Abuse Act as well as the Computer Emergency Response Team were created by the U.S. (Trigaux 2000).
Going on towards the late 90’s and early 2000’s, Napster, a peer to peer file sharing program (mostly focused towards music), is created. Although short lived (1999 – 2001) the program was one of the first few to promote P2P sharing and leaves a legacy (Lamont 2013). Two years later after Napster was shut down, the infamous torrent file sharing website, The Pirate Bay, is founded (Graham 2009).