The document provides a history of hacking from the 1960s to the late 1990s. It describes how the original meaning of "hack" referred to clever programming at MIT. It discusses early phone phreaks and the discovery that a toy whistle could be used to hack phone systems. Over time, hacking groups formed, magazines were published, and laws were passed to criminalize hacking activities. Famous hackers like Kevin Mitnick were arrested. By the late 1990s, hacking became more serious and targeted major websites and banks. The document then defines terms like hackers, crackers, and ethical hackers who perform authorized security assessments.
Old School Hackers:History of Hacking PREHISTORY 1960s: The Dawn of Hacking Original meaning of the word "hack" started at MIT; meant elegant, witty or inspired way of doing almost anything; hacks were programming shortcuts ELDER DAYS (1970-1979) 1970s: Phone Phreaks and Cap'n Crunch: One phreak, John Draper (aka "Cap'n Crunch"), discovers a toy whistle inside Cap'n Crunch cereal gives 2600-hertz signal, and can access AT&T's long-distance switching system.
4.
Old School Hackers:History of Hacking Draper builds a "blue box" used with whistle allows phreaks to make free calls. Steve Wozniak and Steve Jobs, future founders of Apple Computer, make and sell blue boxes. THE GOLDEN AGE (1980-1991) 1980: Hacker Message Boards and Groups Hacking groups form; such as Legion of Doom (US), Chaos Computer Club (Germany). 1983: Kids' Games Movie "War Games" introduces public to hacking.
5.
Old School Hackers:History of Hacking THE GREAT HACKER WAR Legion of Doom vs Masters of Deception; online warfare; jamming phone lines. 1984: Hacker 'Zines Hacker magazine 2600 publication; online 'zine Phrack. CRACKDOWN (1986-1994) 1986: US Congress passes Computer Fraud and Abuse Act; crime to break into computer systems. 1988: The Morris Worm Robert T. Morris, Jr., launches self-replicating worm on ARPAnet.
6.
Old School Hackers:History of Hacking 1989: The Germans , the KGB and Kevin Mitnick. German Hackers arrested for breaking into U.S. computers; sold information to Soviet KGB. Hacker "The Mentor“ arrested; publishes Hacker's Manifesto. Kevin Mitnick convicted; first person convicted under law against gaining access to interstate network for criminal purposes.
7.
Old School Hackers:History of Hacking 1993: Why Buy a Car When You Can Hack One? Radio station call-in contest; hacker-fugitive Kevin Poulsen and friends crack phone; they allegedly get two Porsches, $20,000 cash, vacation trips; Poulsen now a freelance journalist covering computer crime. First Def Con hacking conference in Las Vegas ZERO TOLERANCE (1994-1998) 1995: The Mitnick Takedown: Arrested again; charged with stealing 20,000 credit card numbers.
8.
Old School Hackers:History of Hacking 1995: Russian Hackers Siphon $10 million from Citibank; Vladimir Levin, leader. Oct 1998 teenager hacks into Bell Atlantic phone system; disabled communication at airport disables runway lights. 1999 hackers attack Pentagon, MIT, FBI web sites. 1999: E-commerce company attacked; blackmail threats followed by 8 million credit card numbers stolen. (www.blackhat.info; www.h2k2.net; www.slais.ubc.ca/; www.sptimes.com; www.tlc.discovery.com)
9.
A Brief Historyof Hacking 1980s -Cyberspace coined -414 arrested -Two hacker groups formed -2600 published 1990s - National Crackdown on hackers -Kevin Mitnick arrested -Microsoft’s NT operating system pierced
10.
A Brief Historyof Hacking 2001 In one of the biggest denial-of-service attack, hackers launched attacks against eBay, Yahoo!, CNN.com., Amazon and others. 2007 Bank hit by “biggest ever” hack. Swedish Bank, Nordea recorded nearly $1 Million has been stolen in three months from 250 customer account.
11.
Famous Hackers inHistory Ian Murphy Kevin Mitnick Johan Helsinguis Mark Abene Linus Torvalds Robert Morris
Hackers are here.Where are you? The explosive growth of the Internet has brought many good things…As with most technological advances, there is also a dark side: criminal hackers. The term “hacker” has a dual usage in the computer industry today. Originally, the term was defined as: HACKER noun. 1. A person who enjoys learning the details of computer systems and how to stretch their capabilities…. 2. One who programs enthusiastically or who enjoys programming rather than just theorizing about programming.
14.
What is Hacking? Hacking refers to an array of activities which are done to intrude some one else’s personal information space so as to use it for malicious, unwanted purposes. Hacking is a term used to refer to activities aimed at exploiting security flaws to obtain critical information for gaining access to secured networks.
15.
What is CrackingCracking is almost the same as hacking because they both get into peoples servers and accounts illegally. But a cracker destroys the information and software that they get into.
16.
Misunderstanding Hacking Manypeople get mixed up between Hacking and Cracking because they don’t know what a cracker is or they think it is the same thing.
17.
Why do PeopleHack or Crack People hack to Explore or Create new software. But Crackers want to destroy things on the software.
18.
What is aHacker? Old School Hackers: 1960s style Stanford or MIT hackers. Do not have malicious intent, but do have lack of concern for privacy and proprietary information. They believe the Internet was designed to be an open system. Script Kiddies or Cyber-Punks: Between 12-30; predominantly white and male; bored in school; get caught due to bragging online; intent is to vandalize or disrupt systems.
19.
What is aHacker? Professional Criminals or Crackers: Make a living by breaking into systems and selling the information. Coders and Virus Writers: See themselves as an elite; programming background and write code but won’t use it themselves; have their own networks called “zoos”; leave it to others to release their code into “The Wild” or Internet. (www.tlc.discovery.com)
20.
Hacker and Ethicalhacker Hackers Access computer system or network without authorization Breaks the law; can go to prison Ethical hacker Performs most of the same activities but with owner’s permission Employed by companies to perform penetration tests
21.
HACKER DEFINITIONS AHacker is someone who has achieved some level of expertise with computers. A Cracker is someone who breaks into systems without permission. A Script Kiddie is someone who uses scripts or programs from someone else to do his/her cracking. Other terms are leech , warez puppy, warez d00d, lamer and rodent. A Phreaker is a hacker who specializes in telephone systems. A White Hat is someone who professes to be strictly a good guy. A Black Hat is someone who is viewed as a bad guy. A Grey Hat is someone who falls in between White and black
22.
What is EthicalHacking? Ethical hacking – defined “methodology adopted by ethical hackers to discover the vulnerabilities existing in information systems’ operating environments.” With the growth of the Internet, computer security has become a major concern for businesses and governments.
23.
What is EthicalHacking? In their search for a way to approach the problem, organizations came to realize that one of the best ways to evaluate the intruder threat to their interests would be to have independent computer security professionals attempt to break into their computer systems.
24.
Who are EthicalHackers? “One of the best ways to evaluate the intruder threat is to have an independent computer security professionals attempt to break their computer systems” Successful ethical hackers possess a variety of skills. First and foremost, they must be completely trustworthy.
25.
Who are EthicalHackers? Ethical hackers typically have very strong programming and computer networking skills. They are also adept at installing and maintaining systems that use the more popular operating systems (e.g., Linux or Windows) used on target systems. These base skills are augmented with detailed knowledge of the hardware and software provided by the more popular computer and networking hardware vendors.
26.
What do EthicalHackers do? An ethical hacker’s evaluation of a system’s security seeks answers to these basic questions: What can an intruder see on the target systems? What can an intruder do with that information? Does anyone at the target notice the intruder’s at tempts or successes? What are you trying to protect? What are you trying to protect against? How much time, effort, and money are you willing to expend to obtain adequate protection?
What You CanDo Legally As an ethical hacker, be aware of what is allowed and what is not allowed Laws involving technology change as rapidly as technology itself Find what is legal for you locally Laws change from place to place Some hacking Tools on your computer might be illegal to possess Contact local law enforcement agencies before installing hacking tools
29.
Is Port ScanningLegal? Government does not see it as a violation it is legal As noninvasive or nondestructive in nature Not always the case Read your ISP’s “Acceptable Use Policy”
30.
Laws Computer crimelaws are getting more specific Cover cybercrimes and intellectual property issues Computer Hacking and Intellectual Property (CHIP) New government branch to address cybercrimes and intellectual property issues
31.
IT Act, 2000Enacted on 17 th May 2000- India is 12th nation in the world to adopt cyber laws IT Act is based on Model law on e-commerce adopted by UNCITRAL
32.
Objectives of theIT Act To provide legal recognition for transactions:- Carried out by means of electronic data interchange, and other means of electronic communication, commonly referred to as "electronic commerce“ To facilitate electronic filing of documents with Government agencies and E-Payments To amend the Indian Penal Code, Indian Evidence Act,1872, the Banker’s Books Evidence Act 1891,Reserve Bank of India Act ,1934
33.
Extent of applicationExtends to whole of India and also applies to any offence or contravention there under committed outside India by any person {section 1 (2)} read with Section 75- Act applies to offence or contravention committed outside India by any person irrespective of his nationality , if such act involves a computer, computer system or network located in India
34.
Cybercrime provisions underIT Act,2000 Offences & Relevant Sections under IT Act Tampering with Computer source documents Sec.65 Hacking with Computer systems, Data alteration Sec.66 Publishing obscene information Sec.67 Un-authorized access to protected system Sec.70 Breach of Confidentiality and Privacy Sec.72 Publishing false digital signature certificates Sec.73
35.
TYPES OF CYBERCRIMES Cyber terrorism Cyber pornography Defamation Cyber stalking (section 509 IPC) Sale of illegal articles-narcotics, weapons, wildlife Online gambling Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of computer source code Email spoofing Forgery Phising Credit card frauds Crime against property Crime against Government Crime against persons
What You CannotDo Legally Accessing a computer without permission is illegal Other illegal actions Installing worms or viruses Denial of Service attacks Denying users access to network resources
38.
What You CannotDo Legally As an independent contractor (ethical hacker), using a contract is just good business Contracts may be useful in court Internet can also be a useful resource Have an attorney read over your contract before sending or signing it
Required Skills ofan Ethical Hacker Routers: knowledge of routers, routing protocols, and access control lists Microsoft: skills in operation, configuration and management. Linux: knowledge of Linux/Unix; security setting, configuration, and services. (Source: http://www.examcram.com )
41.
Required Skills ofan Ethical Hacker Firewalls: configurations, and operation of intrusion detection systems. Mainframes Network Protocols: TCP/IP; how they function and can be manipulated. Project Management: knowledge of leading, planning, organizing, and controlling a penetration testing team. (Source: http://www.examcram.com )
Anatomy of anAttack Reconnaissance – attacker gathers information; can include social engineering. Scanning – searches for open ports (port scan) probes target for vulnerabilities. Gaining access – attacker exploits vulnerabilities to get inside system; used for spoofing IP.
45.
Anatomy of anAttack Maintaining access – creates backdoor through use of Trojans; once attacker gains access makes sure he/she can get back in. Covering tracks – deletes files, hides files, and erases log files. So that attacker cannot be detected or penalized.
46.
Classes of HackersBlack hats – highly skilled, malicious, destructive “crackers” White hats – skills used for defensive security analysts Gray hats – offensively and defensively; will hack for different reasons, depends on situation.
Hactivism Hacktivism isthe writing of code , or otherwise manipulating bits, to promote political ideology. Taking Lessig's message to heart, hacktivism believes that proper use of code will have leveraged effects similar to regular activism (or civil disobedience ). Fewer people can write code, but code affects more people. Hacking for social and political cause.
49.
Hactivism The Internethas altered the landscape of political discourse and advocacy since the 1990s, particularly for those wishing to have a more universal means of influencing national and foreign policies. With the Internet’s availability to mainstream society came a growth in the political fever among both the White Hats and the Black Hats'—a fever known as “hacker activism” or “hacktivism.”
50.
Hactivism Those whoengage in hacktivism are known as the hacktivists—individuals pairing their needs for activism with their hacking skills to advance free speech worldwide—if they are White Hats—or to carry off some political mission that may have damaging effects to the Websites targeted—if they are Black Hats.
51.
Hactivism The operationscommonly used in hacktivism include browsing the Web for information; constructing Websites and posting information on them; transmitting electronic publications and letters through email; and using the Internet to discuss issues, form coalitions, and plan and coordinate activities.
52.
HACKER MOTIVATION PsychologicalNeed/Recognition. Desire to Learn/Curiosity. Revenge/Maliciousness. Experimentation. Gang Mentality. Misguided trust in other individuals. Altruistic reasons. Self-gratification. Desire to Embarrass. Joyriding. Scorekeeping. Espionage. Cyber-Warrior
53.
TYPICAL HACKER ATTACKSInsider Attack. Social Engineering. Virus Infiltration. Denial of Service. Software Bug. Password Infiltration. Lack of Security Infiltration. IP Spoofing. Trojan Horse. Stealth Infiltration. Brute Force. TCP/IP Protocol Flaw. Worms and viruses
54.
Some Statistics 49%are inside employees or contractors on the internal network. 17% come from dial-up from inside employees. 34% are from the Internet. The major financial loss is internal hacking.
How to Becomea Hacker Looking for advice on learning to crack passwords, sabotage systems, mangle websites, write viruses, and plant Trojan horses? You came to the wrong place.
57.
How to Becomea Hacker Looking for advice on how to learn the guts and bowels of a system or network, get inside it, and become a real expert? Maybe I can help there. How you use this knowledge is up to you. I hope you'll use it to contribute to computer science and hacking (in its good sense), not to become a cracker or vandal.
58.
Be Curious Takethings apart. Look under the hood. Dig through your system directories and see what's in there. View the files with hex editors. Look inside your computer. Wander around computer stores and look at what's there.
59.
Read Everything inSight If you can afford it, buy lots of books. If you can't, spend time in libraries and online. Borrow books from friends. Go through tutorials. Read the help files on your system. If you're using Unix/Linux, read the man files. Check out the local college bookstores and libraries. And as you're reading, try things.
60.
Experiment Don't beafraid to change things, just to see what'll happen. Do this long enough, of course, and you'll wipe out your system (see next slide), but that's part of becoming a hacker. Try command options and switches you've never tried before. Look for option menus on programs and see what they can do. In Windows, tweak your registry and see what happens. Change settings in .INI files. In Unix, dig around in the directories where you don't normally go. On the Macintosh, play around in the system folder.
61.
Make Backups Ifyou start mucking around with system files, registries, password files, and such, you will eventually destroy your system. Have a backup ready. If you can afford it, have a system you use just for experimenting, ready to reload on a moment's notice, and do your serious work (or serious gaming!) on a different computer.
62.
Don't Limit YourselfWho says a computer or network is the only place to hack? Take apart your telephone. Figure out your television (careful of the high voltage around the picture tube - if you fry yourself, it's not my fault) and VCR. Figure out how closed captioning works. Take apart your printer.
63.
Don't Limit YourselfTake apart your printer. Pick up the latest issues of Nuts & Volts and Midnight Engineer (you've obviously made a good start if you're reading Blacklisted! 411 ). (Download it)Take apart the locks on your doors. Figure out how your radio works. Be insatiably curious and read voraciously. There are groups you can learn from. There are whole Web sites devoted to hacking TiVo units, for example.
64.
Get Some RealTools You can't cut a board in half with a screwdriver. Well, maybe you can, but it'll take a long time. Dig around and find the proper tools for the operating systems you're using. They're out there on the Web. You can get some pretty good stuff as shareware or freeware (especially on Linux).
65.
Get Some RealTools The serious power tools often cost serious money. What kinds of tools? Hex file editors. Snoopers that analyze system messages and network traffic. Compilers and APIs for programming. Scripting tools. Disk editors/formatters. Disassemblers. When you get good, write some of your own.
66.
Learn to ProgramIf you want to be a hacker, you're going to have to learn to program. The easiest way to start depends on the operating system you're using. The choice of language is very individual. It's almost a religious thing. Suggest a programming language to a beginner, and someone will disagree.
67.
Learn to ProgramHeck, you'll probably get flamed for it in a newsgroup. In Unix, I'd suggest getting started with Perl. Buy a copy of the camel book ( Programming Perl ) and the llama book ( Learning Perl ). You'll have the fundamentals of programming really fast! The best part is that the language itself is free.
68.
Learn to ProgramIn Windows, you can get started quickly using a visual development environment like Visual Basic or Java. No matter what the system, if you want to get serious, you'll eventually need to learn C (or C++ or C# or some other variant). Real hackers know more than one programming language, anyway, because no one language is right for every task.
69.
Learn to TypeHackers spend a lot of time at their keyboards. HackingWiz (of hackers.com and Hacker's Haven BBS fame) says he can type 140+ wpm. The typing tutor may be boring, but it pays off.
70.
Use Real OperatingSystems Windows 95/98/Me is a shell on top of a 32-bit patch to a 16-bit DOS. Get some real operating systems (Linux, Windows NT, Mac OS, OS/2...) and learn them. You can't call yourself a linguist if you only know one language, and you certainly can't call yourself a hacker if you only know one OS. Linux is a hacker's dream. All the source code is freely available. Play with it, analyze it, learn it. Eventually, perhaps you can make a contribution to Linux yourself. Who knows, you might even have a chance to write your own OS.
71.
Talk to PeopleIt's hard to learn in a vacuum. Take classes. Join users groups or computer clubs. Talk to people on IRC or newsgroups or Web boards until you find people to learn with. That can take a while. Every third message on newsgroups like alt.hack* is "teach me to hack." Sigh. The best way to be accepted in any group is to contribute something. Share what you learn, and others will share with you.
72.
Do Some ProjectsIt's important to pick some projects and work until you've finished them. Learning comes from doing, and you must follow the project through start to finish to really understand it. Start really simple. Make an icon. Customize your system (the startup screen on Win95, or the prompt on Unix). Make a script that performs some common operation. Write a program that manipulates a file (try encrypting something).
73.
Learn to ReallyUse the Internet Start with the Web. Read the help for the search engines. Learn how to use Boolean searches. Build up an awesome set of bookmarks. Then move on to other Internet resources. Get on Usenet. Find some underground BBSs. Get on IRC. You'll find useful information in the strangest places. Get to the point where you can answer your own questions. It's a whole lot faster than plastering them all over various newsgroups and waiting for a serious answer.
74.
Learn to ReallyUse the Internet Once you've gone through these steps, go out and contribute something. The Internet was built by hackers. Linux was built by hackers. Usenet was built by hackers. Sendmail was built by hackers. Be one of the hackers that builds something.
What is FootPrintingFootprinting is the process of accumulating data regarding a specific network environment, usually for the purpose of finding ways to intrude into the environment. Footprinting can reveal system vulnerabilities and improve the ease with which they can be exploited
79.
What is FootPrintingFootprinting begins by determining the location and objective of an intrusion. Once this is known, specific information about the organization is gathered using non-intrusive methods. For example, the organization's own Web page may provide a personnel directory or employee bios, which may prove useful if the hacker needs to use social engineering to reach the objective. Conducting a whois query on the Web provides the domain names and associated networks related to a specific organization.
80.
What is FootPrintingOther information obtained may include learning the Internet technologies being used; the operating system and hardware being used; IP addresses; e-mail addresses and phone numbers; and policies and procedures.
Scanning and EnumerationNetwork Enumeration is the process of identifying domain names and associated networks. The process is performing various queries on the many whois databases found on the internet. The result is the hacker now having the information needed to attack the system they are learning about. Companie's domain names are listed with registrars, and the hacker would simply query the registrar to obtain the information they are looking for. The hacker simply needs to know which registrar the company is listed with. There are five types of queries which are as follows:
87.
Scanning and EnumerationRegistrar Query: This query gives information on potential domains matching the target. Organizational Query: This is searching a specific registrar to obtain all instances of the target's name. The results show many different domains associated with the company.
88.
Scanning and EnumerationDomain Query: A domain query is based off of results found in an organizational query. Using a domain query, you could find the company's address, domain name, administrator and his/her phone number, and the system's domain servers. The administrative contact could be very useful to a hacker as it provides a purpose for a war dialer. This is also where social engineering comes into play. But that's a talk for another time. Many administrators now post false phone numbers to protect themselves from this.
89.
Scanning and EnumerationNetwork Query: The fourth method one could use the American Registry for Internet Numbers is to discover certain blocks owned by a company. It's good to use a broad search here, as well as in the registrar query. POC Query: This query finds the many IP addresses a machine may have.
System Hacking Hackingoperating systems (OSs) is a preferred method of the bad guys. OSs comprise a large portion of hacker attacks simply because every computer has one and so many well-known exploits can be used against them.
98.
System Hacking Occasionally,some operating systems that are more secure out of the box — such as Novell NetWare and the flavors of BSD UNIX — are attacked, and vulnerabilities turn up. But hackers prefer attacking operating systems like Windows and Linux because they are widely used and better known for their vulnerabilities.
99.
System Hacking Hereare some examples of attacks on operating systems: Exploiting specific protocol implementations Attacking built-in authentication systems Breaking file-system security Cracking passwords and encryption mechanisms
Trojans and BackdoorsMalicious software packages exist on the Internet that attempt to gain complete control over computer systems. These programs, sometimes called Remote Access Trojans (RAT) or Backdoor Software (named as the software opens a "back door" on your computer in which it can tell your machine what to do), are sometimes attached to Trojan Horses, viruses, worms, and spyware exploits. If your system is infected, there is virtually no limit to what these programs can do:
Sniffers A programto capture data across a computer network. Used by hackers to capture user id names and passwords. Software tool that audits and identifies network traffic packets. Is also used legitimately by network operations and maintenance personnel to troubleshoot network problems. is a software program that is installed to monitor network traffic. Sniffers typically correct a certain number of characters at the beginning of ... Software that monitor activities over the network (private or public).
SQL Injection Allowsa remote attacker to execute arbitrary database commands Relies on poorly formed database queries and insufficient input validation Often facilitated, but does not rely on unhandled exceptions and ODBC error messages Impact: MASSIVE. This is one of the most dangerous vulnerabilities on the web.
What is PhreakingPhreaking is basically hacking with a telephone. Using different "boxes" and "tricks" to manipulate the phone companies and their phones, you gain many things, two of which are: knowledge about telephones and how they work, and free local and long distance phone calls.
133.
Why Phreak Phreaking,like hacking, is used to gather information about telephones, telephone companies, and how they work. There are other benefits as well. As stated above, you also get free phone calls. But, these are used mainly to gather more information about the phones, and to allow us free access to all information.
134.
Boxes and whatthey do Red Box generates tones for free phone calls Black Box when called, caller pays nothing Beige Box lineman's handset Green Box generates coin return tones Cheese Box turns your phone into a payphone Acrylic Box steal 3-way calling and other services Aqua Box stops F.B.I. lock-in-trace Blast Box phone microphone amplifier Blotto Box shorts out all phones in your area Blue Box generates 2600hz tone Brown Box creates party line Bud Box tap neighbors phone Chatreuse Box use electricity from phone
135.
Boxes and whatthey do Chrome Box manipulates traffic signals Clear Box free calls Color Box phone conversation recorder Copper Box causes crosstalk interference Crimson Box hold button Dark Box re-route calls Dayglo Box connect to neighbors phone line Divertor Box re-route calls DLOC Box create party line Gold Box dialout router Infinity Box remote activated phone tap Jack Box touch-tone key pad Light Box in-use light
136.
Boxes and whatthey do Lunch Box AM transmitter Magenta Box connect remote phone line to another Mauve Box phone tap without cutting into the line Neon Box external microphone Noise Box creates line noise Olive Box external ringer Party Box creates party line Pearl Box tone generator Pink Box creates party line Purple Box hold button Rainbow Box kill trace Razz Box tap neighbors phone
137.
Boxes and whatthey do Rock Box add music to phone line Scarlet Box causes interference Silver Box create DTMF tones for A,B,C, and D Static Box raises voltage on phone line Switch Box add services Tan Box phone conversation recorder TV Cable Box see sound waves on TV Urine Box create disturbance on phone headset Violet Box stop payphone from hanging up White Box DTMF key pad Yellow Box add line extension
#29 In UK and Germany, Using or writing real hacking tools like Nessus, Metasploit, Hydra, Amap, John, other exploits are fairly telltale illegal Some people against this idea claim that “If you own a crow bar, a favored tool for breaking through locked doors, that’s fine. If you own a baseball bat, a wonderful tool which many put to use bashing in people’s skulls, that’s fine. Own a piece of software that can port scan, and you break the law.”
#49Â - Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist . A hacktivist uses the same tools and techniques as a hacker , but does so in order to disrupt services and bring attention to a political or social cause. For example, one might leave a highly visible message on the home page of a Web site that gets a lot of traffic or which embodies a point-of-view that is being opposed. Or one might launch a denial-of-service attack to disrupt traffic to a particular site. A recent demonstration of hacktivism followed the death of a Chinese airman when his jet fighter collided with a U.S. surveillance plane in April 2001. Chinese and American hacktivists from both countries hacked Web sites and used them as "blackboards" for their statements. Whether hacktivism is a crime may be debated. Opponents argue that hacktivism causes damage in a forum where there is already ample opportunity for nondisruptive free speech. Others insist that such an act is the equivalent of a protest and is therefore protected as a form of free speech.