The war on cyberspace w88 online live casino, cybercrime and how pirate history is influencing the future of cybersecurity

Cannons sticking out from the side a Spanish galleon sailing ship

The war on cyberspace w88 online live casino

w88 online live casino, cybercrime and how pirate history is influencing the future of cybersecurity

You wouldn&w88 online live casino;t leave your wallet on the table at a coffee shop for anyone to access, so why would you leave your computer or phone unlocked and vulnerable? University of Nevada, Reno cybersecurity expert Christopher Church posed this real-life connection to help people understand cyberspace isn&w88 online live casino;t wholly separate from physical space.

While the technologies have changed over time in how we protect our personal information and secure our valuables, the methods criminals use to break in bear some striking resemblances to the high seas crime of yesteryear. From maritime pirates scavenging for treasure to today&w88 online live casino;s hackers scouring the internet for weaknesses to steal data, piracy is alive and well, and the war isn&w88 online live casino;t ending soon.

The physical aspects of cybersecurity

“The world&w88 online live casino;s trade is migrating from the physical space of the high seas to virtual networks,” said Church, an associate professor of history in the College of Liberal Arts and a faculty member of the Cybersecurity Center on campus. He also teaches a course as part of the cybersecurity minor called Pirates and Hackers. He emphasizes that while technology has driven the history of cybercrime, it&w88 online live casino;s also influenced by social, cultural and economic impacts. “What&w88 online live casino;s going on in cyberspace is not determined by the technology – it&w88 online live casino;s influenced by tech, but that didn&w88 online live casino;t start it.” Cybercrime, Church says, is not just a technological problem but also a social one.

Looking at centuries past, humans have always desired more – more sugar, more textiles, more slaves, more money. Goods have always been traded, stolen and sold. w88 online live casino, the same desires still exist, but the goods have changed some, the methods used to steal them have been modernized and, in many cases, the stakes have been raised.

In Ukraine in 2015, the electrical grid was hacked in the middle of winter. The grid&w88 online live casino;s physical infrastructure was overloaded. It went down. People lost electricity and heat, and deaths occurred because of the extreme cold. A crime committed virtually took a hefty physical toll.

"What&w88 online live casino;s going on in cyberspace is not determined by the technology."

w88 online live casino United States, with proof of international election interference taking place across digital platforms and worry about fraudulent results, cybersecurity often makes headlines, particularly when the presidency is up for the vote.

In these cases, it&w88 online live casino;s easy to trust that the good side will simply win out with better technology than the bad guys, but the arms race between law and order and the criminal element is a tale as old as time. “If we only focus on it as a technological issue, then we won&w88 online live casino;t be able to solve it,” Church said.

The history of w88 online live casino

Though cyberspace is relatively new, what drives the crime within it has much deeper roots. Church argues that to understand hacker culture, you should look at early modern protests against the growth of trade. There are many parallels in early modern piracy to today&w88 online live casino;s hackers. Like the priates of yore, they&w88 online live casino;re often people who feel marginalized in society and left behind in a rapidly changing economy. Pirates used to map trade networks and attack vulnerabilities in the route – hackers do this in cyberspace.

The offical flag w88 online live casino DEF CON hacker convention bears a striking resemblence to popular pirate iconography.

Church said people typically think of pirates as raising their flags on their ships to set sail on the high seas and have dramatic battles on the hunt to find buried treasure chests filled with gold and jewels. “Most of the time that&w88 online live casino;s not what happened. With the swashbucklers and buccaneers – there was as much conflict and battles on land as there was at sea. They identified the weak points in travel. They were hacking a network in the same mental framework as someone who&w88 online live casino;s trying to get illegal access to something online today.”

In the early modern period, maritime trade traveled through the same circular networks we have now, and the pirates continually tried to hack those networks. Church, who is writing a book on the topic, said you can&w88 online live casino;t have piracy without trade, so you need to follow the trade networks to find the pirates. Since the early modern period, trade networks have increasingly become transatlantic and even global. Church said the largest transformation in the world&w88 online live casino;s trade networks took place between the 15 th and 18 th centuries. “This is where most of the world&w88 online live casino;s piracy comes from.”

"They were hacking a network in the same mental framework as someone who&w88 online live casino;s trying to get illegal access to something online today."

As the w88 online live casino moved from the late 19 th century to the present, the trade transformation has become more and more virtual, starting with telegraphs, moving to telephones and eventually to fiber optics and cloud computing. At one point in history, pirates moved textiles, sugar and slaves and held them for ransom – similarly today, hackers will lock down a computer – or an electrical grid – for ransom money. Church said it&w88 online live casino;s not accidental that virtual data is now one of the most profitable goods. “While the players have changed, the game has structurally remained the same.”

In the early 2000s Somalian pirates, who initially called themselves the Volunteer Somali Coastguard, hijacked international fishing vessels for disrupting the local trade networks. What started as pushback against globalization, gradually lost its high-minded ideals. Somalian pirates found their tactics were successful and quite profitable and continued capturing large transport vessels purely out of financial gain. If you remove the technology, Church says, what&w88 online live casino;s left is human behavior.

One of the biggest economic ties between historical piracy to the present-day hacker is that piracy is profoundly disruptive. In the earlier periods, piracy was often used to the benefit of the state – or rather to the detriment of a given state&w88 online live casino;s enemies. Queen Elizabeth I hired pirates to disrupt Spanish trade. Church said the shift in piracy becoming a general economic threat (as opposed to a targeted one) happened at the turn of the 18 th century, when the w88 online live casino with the New World focused on plantation slavery and sugar. When the pirates started working for the highest bidder and stopped calling any one nation home, the powers that be ran a massive propaganda campaign against piracy.

DEFCON conference badge
The conference badge from the world&w88 online live casino;s largest hacking conference, DEF CON changes every year and is programmed as an interactive web of decisions that participants need to make that define what kind of hacker they are and impacts and changes the individuals participants associate with.

Church noted a similar process starting to take place today with cybercrime and hacking. Hackers were once seen as helping the little guy – the only opposition to large corporations and monopolies. Now, people are starting to see hackers as enemies of society. Church said the tipping point will come at some point in the future because of massive losses to the world&w88 online live casino;s economy. Although, he said it&w88 online live casino;s too early to tell if it will end as a revolution against corporate monopolies or as a backlash against public hackers. “Historians are loath to make projections.”

By understanding how w88 online live casino has progressed and evolved since the 15 th century and looking at how it&w88 online live casino;s changing today, it&w88 online live casino;s possible to see patterns emerge, and while we can&w88 online live casino;t say for certain just how things will play out, it&w88 online live casino;s undeniable that they&w88 online live casino;re escalating, growing in complexity right alongside our global trade networks.

“In the cyber world, if we just treat the economic and technical side of security and don&w88 online live casino;t look at the social side or bring in the political and cultural side, then we&w88 online live casino;re only addressing one small piece of cybercrime,” Church said.

Modern day technology and w88 online live casino

Church points out that if you were to look at a map of fiber optic lines today and compare that to maritime trade routes and the railroads, the two look eerily similar. Data is travelling the same routes, something end users don&w88 online live casino;t often consider when logging into a coffee shop&w88 online live casino;s network. “Wi-Fi invites this ‘in the cloud&w88 online live casino; feeling – but there&w88 online live casino;s a physical there that evolved with maritime trade,” Church said.

“It&w88 online live casino;s not insignificant that the parties in Europe fighting for net neutrality today call themselves ‘pirate parties.&w88 online live casino; They&w88 online live casino;re pulling on what they see as a counterculture, as to what existed in the past,” Church said.

Within this countercultural movement, as with the noble-minded pirates of days past, is a hint of altruism, a belief that piracy and hacking serve a common good. Church says our world thrives on using what someone else created and making it better. Getting access to those things someone else created, especially when they&w88 online live casino;re kept under lock and key, might involve less than strictly legal tactics.

"It&w88 online live casino;s not insignificant that the parties in Europe fighting for net neutrality today call themselves ‘pirate parties.&w88 online live casino;"

The hacker community wanted to draw a distinction between criminal activity and &w88 online live casino;legitimate” hacking. To that end, the w88 online live casino ethics were created. They state that authority isn&w88 online live casino;t to be trusted, that all bureaucracies are flawed systems, that all data should be free and accessible to all because without that it is impossible to repair or rethink and reinvent these systems. The list goes on, and notably, every ethic and principle is a kind of altruism, an emphasis on world improvement.

Four &w88 online live casino;Gray Areas” magazines spread out on a table featuring cartoon artwork
The quarterly magazineGray Areas from the 1990s discussed subcultures and was a resource for w88 online live casino.

To hack a system is to make it do that which it wasn&w88 online live casino;t intended to do, to find workarounds. Church said hacking is merely an activity, not good or bad on its face. But systems generally don&w88 online live casino;t appreciate being hacked – or at least their creators don&w88 online live casino;t. Hacking is and has been maligned. The line between strictly criminal behavior and that which is rooted in the hacker ethic is blurry at best.

“Ambiguity is deeply embedded in pirate culture,” w88 online live casino. To measure whether the hacking is unethical, you need to analyze its effects.

Surviving the war

Rather than the imperial trade routes of yore, today&w88 online live casino;s pirates disrupt networks – and on the shoulders of today&w88 online live casino;s networks rest the global economy, basic utilities and national security. Innocent people died when pirates used cannons to “hack” trade routes. The weapons of cyber pirates are more insidious.

A port sniffer search engine, for example, is a relatively new piece of technology that finds all the routers in a localized area and tells a hacker which systems a default password of &w88 online live casino;admin,” the equivalent of leaving that wallet unguarded on the coffee shop table.

Church demonstrates in his classes how critical infrastructure, including water control systems and other utilities, are often exposed on the internet to cybersecurity breaches. A lot of equipment used in the last couple of decades sits on networks that were never designed to be on the open internet. Now that they&w88 online live casino;re plugged into routers, the antiquated systems are sitting ducks for the morally ambiguous hacker.

Through his research, Church analyzed how society&w88 online live casino;s outcasts continue to respond to the advancements and globalization of today&w88 online live casino;s economy, mostly negatively. He sees the importance of investing in better technology and smarter, safer and stronger systems – but he also sees that this won&w88 online live casino;t be enough. “If we&w88 online live casino;re going to try to stop it,” Church said, “building better locks isn&w88 online live casino;t going to do it. We need to study the past.”