ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

hacktivist - Hacker School Attacked

Updated on August 20, 2013

The Hacker Jon Story -- ending and beginnings


Well written code contains no flourishes.




Billy Goodman: Ethical Hacker, Privacy Technician

The trilogy starts with a lone hacktivist in cyberbattle.

Three Hacker School students join the experienced teenage hacktivist to escape the destruction of Hacker School. Human rights demand these teenagers challenge a malevolent dictatorship.

They accept. To stop General Johnstone's genocide they outline a desperate viral mission.

These Hacker School cyberwarriors decide they must revolutionize hacktivism to succeed. They join their talents to ignite an explosive cyberwar. The cost will likely be their young lives.

network security is a myth
network security is a myth

* hacktivist * Index

Network Security Key: direct links to story chapters

*The beginning of the trilogy*

Chapter 1 - We Are Being Hacked!

Chapter 2 - human rights hacktivist

Chapter 3 - Generic Hacker - new name: [last, first]

Chapter 4 - softrap

Chapter 5 - *hactivist betrayed*

Chapter 6 - Viral Avalanche, hacker avenged

hidden is better than strong, all network security has weaknesses
hidden is better than strong, all network security has weaknesses


Your crime? Intent to support human rights.

"We need you."

Billy speaks his reply to the air. "Not now, we're being hacked, from inside."

"Drop it, there is no time."

He'd been whistling as he hacked when he got the message. The timing of the request to leave his lab is too convenient for someone. When he steps out of his lab into his office he is whistling again. A file name worm has just been planted in the attacker's system. It will be a short journey to the Admin inner sanctum to answer questions, then back to hack the attack.

"All classes are canceled except grad class, all other students are already being transported off property into hiding. We are talking to professors about volunteering to lead grad hacker teams, you need to talk to the hackers class and get them ready to run." These admin guys had earned their hacking chops during a time the world was falling apart, billions dying. They are not easily excited.

I don't want to give up the hacking battle. "Someone inside is trying to get information out. They are better than students, they will get through my static defenses if I don't stop them."

"How long will what you have in place hold?"

"A half hour at least if they've studied me, maybe another six hours if not. I can hold them off and discover who they are if I fight them."

The Hacker School Administrators look at the Dean. "His defenses are enough." He smiles, "Billy always underestimates his abilities."

I try again, "But a highly placed inside agent will know those abilities."

The admin team looks at each other, then seem to agree. "There are always risks in hacking. We will be physically invaded, tomorrow at the latest. You have our backing on anything you tell the grad students. Do as you see fit, but do it now." A blank check.

The Dean Looks at me. "Come to my office when you are done and let me know how hacker school has been committed. There is one grad team that brought this on, they've done a great job on a tyrant involved in genocide, send them home to live another day."

"If they want to keep hacking at the root of evil?"

"You are the only one left that can lead them, As good as you are, all of you would probably die. It would be you four against a powerful government. Being in the right does not change your terrible odds. It is sure to be a nasty death for three promising hacktivists and yourself."

I look back at the administration board. "I'll do this, then I'll destroy our onsite data and equipment before I leave." Time to get to work. I wave goodbye. "Next time, at a new Hacker School." As I leave they all express farewells.

Download *hacktivist* in eBook or eReader format

You can inexpensively download *hacktivist* alone; or as a better value download it as part of the trilogy.

Click the above -Ch 2- link to keep reading *hacktivist* on Squidoo for free.


How To Hack... - take things apart and study them. Put them back together your way.

"Any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke.

Discover how things work. If you're a hacker, you'll soon be changing something or creating something new.

hacktivist -- on the side of human rights
hacktivist -- on the side of human rights

*enjoy life*

To contact the author or re-read this lens:

Return to top of page.

To continue reading this story, go to chapter two.

This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License

100% of direct income from my lenses goes to micro-finance solutions for world poverty provided by the Grameen Foundation. The Grameen Foundation is creating a rising tide of positive influence upon our world. Help decrease poverty, by enabling the poor to support themselves.

Will YOUR life be based on what you want to use it to accomplish, or by random urges of what you want to do?

"Bastiat Free University is not being built to segment and distribute information - BFU already exists as a catalyst to reignite your love of learning." - Allan R. Wallace

Salvation or Destruction?

Some say hackers represent a grave risk to humanity.

Others say mankind is always close to an extinction event that only creative individualists can prevent.

I say: You can't escape risk, you can only seek to understand and manage it.

Hack the future -- save us.

This short story is free on the web and open content. After writing the first chapter of the free online novel Complicit Simplicity: Hackers End Game, I wrote an online summation of the Complicity Universe. My goal was to create a stable platform for artistic crafting, by myself or any one else. I'm glad I did. This clarifies the character's motivations, especially when they diverge from my plots into their own.

" Cypherpunks write code. We know that someone has to write software to defend privacy, and since we can't get privacy unless we all do, we're going to write it. We publish our code so that our fellow Cypherpunks may practice and play with it. Our code is free for all to use, worldwide. We don't much care if you don't approve of the software we write. We know that software can't be destroyed and that a widely dispersed system can't be shut down."

Eric Hughes, in his 1993 Cypherpunk Manifesto

The characters collaborated on this Billy Goodman's short story prequel, after I thought I was done.

I've since rewritten and added material and formatted these stories into print and DRM free eBooks. Enjoy them, share them, and if you can't afford them -- pirate them.

Feedback, Hackers Passwords, Back Patting, & Stab-A-Back - Whatcha thinkin'?

    0 of 8192 characters used
    Post Comment
    • profile image


      7 years ago

      just got my new interest story.... great sources !

    • profile image


      7 years ago

      Interesting article. Nice and easy to read.

    • profile image


      8 years ago

      Very interesting lens, so well put together. I learned something new. Glad you shared this.

    • profile image


      9 years ago

      Great story


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
    ClickscoThis is a data management platform studying reader behavior (Privacy Policy)