On January 30, 2019, the “Professional Prosecutor of the United States” Robert Mueller stated in a document submitted to the District of Columbia Court that Russian hackers had obtained more than 1,000 materials and evidence from the “Russian Gate” investigation. These materials and false information are mixed together and spread through the Internet, in an attempt to make people doubt the credibility of the investigation.
The British “Guardian” said that the FBI traced the source of the documents and found that the uploaded IP address is located in Russia. The leaked documents were allegedly related to the Russian oligarchy Prigozin.
In recent years, hacker news is mostly a “miniature version” of the struggle between countries; unlike the “failure” of the Internet territory, hackers have the ideal of establishing a state of Grand Theft Auto. For example, in the early years, there were rumors on the Internet that hackers did not serve the country and never attacked non-profit sites.
All these are bloodless destruction and resistance, only 20 years of history. Virtual space is different from our reality. It is a bit like “Different World” in Alice in Wonderland, following secret emotions and laws. This “different world” belonging to the program was first discovered by science fiction.
In 1982, Steven Lisberger’s film “Electronic World Hegemony” first created the concept of “cyberspace”. This concept is proposed two years later than William Gibson’s “cyberpunk” in the science fiction “Nerve Waves”.
In “Electronic World War”, the protagonist Kevin Flynn is a genius programmer. He developed several game programs, but he was stolen by a bad colleague, who also used the official title. Ke Wenqi, however, left the former company’s host to find evidence after leaving the job, but found that there is a strong master program MCP in the host.
The MCP, like the HAL in 2001 Space Odyssey, is preparing to subvert human domination. Kevin hurriedly teamed up with colleague Allen to use the Tron program developed by the latter to control the MCP. But the MCP was aware of the danger, sucking Kevin into the program space and turning him into a small program. Kevin and Tron joined forces to resist the enemy and finally destroyed the MCP with a command.
a modern civilization that seems to be omnipotent,
After the destruction of the electronic world, there is no way to fight back.
Today, this story is nothing new. But you have to know that in the year of “Electronic World Hegemony”, most people around the world have not heard of computer viruses. How do you imagine using “one instruction” to destroy powerful master programs?
The world’s first widely spread PC virus “elk cloner” was produced in 1982 by a 15-year-old American high school student. The virus is spread by disk. After the computer is infected, it will display a small poem every time it starts 50 times. Two of them are: “It will enter all your disks / it will penetrate into your chip.”
At this time, most people in the world know little about computers. This year, the “Mashima War” just ended, the Soviet Union bid farewell to the Brezhnev era, the British Prime Minister “Iron Lady” Thatcher came to Beijing to discuss the Hong Kong issue … “Electronic World Hegemony” told the world in advance: In the electronic world, there are risks and motivations for destruction.
In 2009, William Foch’s science fiction “One Second Later” was thought to depict the end of the world in which the electronic world was destroyed, the difference being that the destruction was from the outside – electromagnetic pulses destroyed all sensitive electronic instruments, making the United States Directly regressed to the pre-industrial era.
Assange, editor-in-chief of WikiLeaks
It has been one of the main leaders of the “Punk Punk” campaign.
“After a second” describes that the quiet and peaceful Montenegro town has slowly fallen into a hellish situation without any awareness: power outages, lack of water, food shortages, communication disruptions, traffic jams, disease rampages, riots …The modern civilization that seems to be omnipotent has no power to fight back after the destruction of the electronic world.
Many sci-fi stories depicting the virtual electronic world are like a rewrite of the 1939 movie The Wizard of Oz: the same person falls into another world, the protagonist must defeat the black wizard, and then return To your own world.
This is also a fairly “structuralist” paradigm. In a structure similar to “myth”, new elements emerged: computers, programs. The discovery, utilization and transformation of cyberspace have greatly broadened the scope of people’s cognition: in addition to robots and aliens, there is finally an invisible “subject” that surfaced.
The early electronic world “hegemony”, in most cases, is an imaginary doomsday disaster story. However, when the “cypherpunk” appeared, the real political struggle began.
“Password” advocates the use of cryptography and similar means to achieve social and political reforms. This movement was formed in the early 1990s and was most active during the “Crypt Wars” of the 1990s and the “Internet Spring” of 2011. In 2006, the term “password punk” was included in the Oxford English Dictionary.
Julian Assange, editor and founder of WikiLeaks, has been one of the main leaders of the “Punk Punk” movement. The work of WikiLeaks is to publicize the “password punk” creed that “the weak must be private and the strong should be transparent”, to protect freedom of speech and promote the transparency of the authority, and at the same time, to violate the privacy of the state and the company. The behavior is sharply attacked.
In the beginning, it was hard to realize the meaning of “freedom.” Until 2013, Snowden made the National Security Agency’s monitoring plan (prism program) document public, and people recalled the importance of “password punk.” Needless to say, in March 2018, Facebook leaked more than 50 million user information, causing panic to social media users.
Participants in “password punk” believe in anarchism. In their eyes, cyberspace is a “new heaven and new earth” belonging to the free, and people use encryption technology to maintain “anonymity.” Digging into its movements, we can easily find the “bitcoin” and “blockchain” that were once hotly burned – their original intention is not to arbitrage, but to support “password punk” to computers, A beautiful utopian ideal for the web.
They do not hesitate to “legislize” for this, hoping that they, like the founding fathers of the United States, will make the cyberspace “independent” and let everyone have complete “freedom.”
Assange said: “The new world of the Internet has emerged from the old world of ruthless atoms and is eager for independence. However, the state and its allies have acted to control our control of the new world by controlling the material basis of the Internet. The state will infiltrate the meridians of our new society, devour every relationship of expression and communication, engulf every page that people read, every message sent, and every concept of search, intercepting billions of messages every day, and then The information that these powers dream of is permanently stored in a huge confidential warehouse.”
Next, the state will mine these “treasures” once and for all. The intellectual creation of these collected human individuals continues to widen the imbalance between the interceptor and the world of the intercepted. Finally, the state will use the interceptors to learn from the real world, to launch drone attacks, to manipulate trade and the United Nations, to benefit the huge network of industry, insiders and friends.
Therefore, Assange believes that only “encryption” can guarantee the freedom of the individual; only cryptography is the ultimate form of non-violent direct action. Even if a country with nuclear power can impose unlimited violence on millions of people, strong cryptography means that a country that can impose unlimited violence cannot break the will of individuals to keep secrets—any violence can’t solve a math problem.
Hackers like to be outspoken. They believe that the network provided by ordinary people to ordinary people is not the Internet at all, but a network that has been filtered or censored. These words are really offensive people, but they still have the means to open their activities and enjoy themselves.
For example, “Chaotic Computer Club” has always maintained the middle identity of its “grey hat hacker”. At the same time, attention to freedom of information, privacy, digital technology, culture, politics, etc. is the main reason for their name “chaos”, but from organization to behavior, the club has maintained the consistent style of the Germans.
“Doing something” is the consistent pursuit of club members. They like to use “prank” to remind the public. In 2008, the club published in its magazine “Data Slingshot” a sample of 4,000 copies of Germany’s then Minister of the Interior Wolfgang Schaeuble, all from the water cups used by Ibrahim. The purpose of this action is to oppose the growing popularity of electronic biometric devices: fingerprints can also be easily stolen and stolen.
Today, the club is often invited to testify at government hearings, providing expert evidence on regulation, IT legislation, and data retention, rather than being seen as a “criminal” with ulterior motives, as reported by US media in hackers. There is also a female hacker group “Die Haecksen”, composed of 100 women, with the goal of giving women a chance to enjoy technical discourse.
“Chaotic Computer Club” advocates a decentralized way of thinking and organizes friendly cooperation between hackers in various countries. When Italian hackers participated in the event, they liked to do a lot of delicious things, especially the hacking conference in Italy, which is almost the same as the food conference.
The joyful “Chaos Club” conference is actually part of the hacker’s political practice. They are not a homogenous group, there are many different opinions, sitting together and discussing, and will not get the best answer right away. However, they ask questions and put their different ideas on the table so that they can collide to judge their respective pursuits and bottom lines, and stimulate new ideas and new imaginations.
The practice of such hackers is not just the self-entertainment of a group of elites. They support a variety of free expressions, political systems, and believe that if there is only one utopia, it can only be a dystopian. They are like knights who are “hidden and famous” and are eager to create the “real utopia” of the cyber world.