{"id":39114,"date":"2014-06-18T04:00:30","date_gmt":"2014-06-17T18:00:30","guid":{"rendered":"http:\/\/www.saipantribune.com\/?p=39114"},"modified":"2014-06-18T04:00:30","modified_gmt":"2014-06-17T18:00:30","slug":"good-hacking-bad-hacking","status":"publish","type":"post","link":"https:\/\/www.saipantribune.com\/index.php\/good-hacking-bad-hacking\/","title":{"rendered":"Good hacking, bad hacking"},"content":{"rendered":"<p>Good Uncle Sam made a fine distinction of hacking for national security and hacking for business advantage. It is unapologetic on the first, and we know how extensive that is. The claims to keep business advantage as not a legitimate option is not convincing especially when used to indict five Chinese military personnel for not making that distinction.<\/p>\n<p>Encryption technology is a revered science, and the method of keeping others from peering into protected digitized databases is big business. The more sophisticated the layers are to provide swiftness of access and shield to one\u2019s \u201ccloud\u201d computing, the better the system is in the scale of desirability in cyberspace.<\/p>\n<p>The subject on when accessing data generated by others is good or bad is, in the case of the United States, a \u201ccloudy\u201d political judgment, pun intended. Converted into ethical scales, the \u201cgoodness\u201d or the \u201cbadness\u201d of the effort is purely subjective. As to the act of accessing data generated by others, anyone with the time, the geekiness, and the technological means can generate considerable output, even business.<\/p>\n<p>Hacking in the United States for personal data is only .99 cents away on the first glance and about $25 per month for curious captives. The services I bothered to peruse sweeps through all public records to reveal criminal and ordinary registration data on history and domicile, relations and recorded proclivities. In a culture that protects its privacy as a matter of law, cyberspace opens doors, perhaps even to the malicious. Many times, I get a notice inviting me to check on who had been online checking my personal record, so the disclaimer that whoever I look up will never know who checked is a farce.<\/p>\n<p>In addition to the distinction on hacking for national security and for business advantage, a sly move that no one I know particularly trusts (my techie daughter has a team that folks who include in their r\u00e9sum\u00e9, business intelligence!), our President and our Secretary of State has been taking the line of requiring others, Putin of Russia particularly, for \u201cmore steps to be taken,\u201d when the Russian leader claims doing something that is consonant to our wishes. In short, we are never pleased with anyone, though we never use the same tone when gauging business interests of our own, e.g., the effect of tar sands and fracking to acquire more fossil fuel for energy use.<\/p>\n<p>I am not particularly enamored with Putin, nor am I a rah-rah boy for the comrades in Beijing (though Xi Jinping and Li Keqiang have yet to make me raise an eyebrow), but this U.S. preachy stance, irritating and unhelpful from the perspective of those not in the good graces of our State Department, is not surprising. Some among us still articulate that we culturally and militarily operate out of a deep sense of \u201cAmerican exceptionalism,\u201d both as a religious belief in being the New Promised Land of the chosen ones, or as a secular power that needs to protect itself from unfriendly forces in our chosen task of being the police force of the world.<\/p>\n<p>OK. \u201cHacking\u201d is a pejorative term that writers should shy away from, but we said the same of \u201cnigger\u201d and the folks that were denigrated with the term decided to use it with pride and distinction. In our time, in \u201chacking\u201d we trust!<\/p>\n<p>Which brings \u201cprivacy\u201d to the fore. With our pretension at erudition camouflaged in Latin, privatus that refers to \u201cseparation from the rest,\u201d and privo, \u201cto deprive,\u201d gets us the sense of selective information and secluding one\u2019s self from the prying eyes of others. We also have \u201cbody integrity\u201d as when I once tried to tap the head of a friend\u2019s daughter in my 6th grade class, and I got the stern warning of \u201cDon\u2019t touch me!\u201d With today\u2019s sense of security, the issue has gone legal.<\/p>\n<p>I hacked a bio-profile early this year for my grandchildren so they can know their other grandpa who lives quite a distance. The first narrative produced a meditation so I shared the methodology. An inquiry method invites two persons to casually but directly ask each other in turn, \u201cWho are you?\u201d The inquirer does not get much in the exercise other than as a voyeur to self-reflection, but the narrator gets a chance at contemplation, which can only add to one\u2019s awareness and selfhood. I\u2019ve added a \u201cone page, one year\u201d exercise to my methods\u2019 basket, producing an entire \u201cone moment in time\u201d narrative, a whole journey from womb to tomb, written from the perspective of a dead man walking on the other side of the grave!<\/p>\n<p>It used to be cumbersome writing a journal in cursive or script. Hacking on the keyboard has made the task easier. The output is neither bad nor good. It just is, reflective of one\u2019s state of being at the moment of reflection, and if one in the doing is more concerned with honesty and authenticity rather than privacy and security, so much the better. Happy hacking!<\/p>\n<p>(My bio-profile is a work-in-progress for the next seven years and along with other writings, semi-annually edited, so send me a request if you are interested in getting a digitized copy of an output, no charge; not so you can know me better, silly, but so you can do likewise.)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Good Uncle Sam made a fine distinction of hacking for national security and hacking for&#8230;<\/p>\n","protected":false},"author":39,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[56,309,455,57],"class_list":["post-39114","post","type-post","status-publish","format-standard","hentry","category-opinion","tag-business-3","tag-ok","tag-russia","tag-united-states"],"_links":{"self":[{"href":"https:\/\/www.saipantribune.com\/index.php\/wp-json\/wp\/v2\/posts\/39114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.saipantribune.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.saipantribune.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.saipantribune.com\/index.php\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.saipantribune.com\/index.php\/wp-json\/wp\/v2\/comments?post=39114"}],"version-history":[{"count":0,"href":"https:\/\/www.saipantribune.com\/index.php\/wp-json\/wp\/v2\/posts\/39114\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.saipantribune.com\/index.php\/wp-json\/wp\/v2\/media?parent=39114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.saipantribune.com\/index.php\/wp-json\/wp\/v2\/categories?post=39114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.saipantribune.com\/index.php\/wp-json\/wp\/v2\/tags?post=39114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}