Professional Documents
Culture Documents
EARLY HISTORY
During the 1960s, the word "hacker" grew to prominence describing a person
with strong computer skills, an extensive understanding of how computer
programs worked, and a driving curiosity about computer systems. Hacking,
however, soon became nearly synonymous with illegal activity. While the
first incidents of hacking dealt with breaking into phone systems, hackers
also began diving into computer systems as technology advanced.
AT&T Corp., Griffith Air Force Base, NASA, and the Korean Atomic Research
Institute all fell prey to hackers in the early 1990s. Federal World Wide Web
sites, including those of the U.S. Department of Justice, the U.S. Air Force,
and the CIA, were also attacked by hackers and defaced. During 1995 alone,
U.S. Defense Department computers dealt with 250,000 hacker attacks. As
technology advanced and business transactions conducted over the Internet
increased, malicious hackers became even more destructive. Popular Web
sites such as Yahoo!, America Online, eBay, and Amazon.com were hacked,
costing millions and leaving online shoppers doubtful about security on these
sites; a 16-year-old Canadian boy operating under the name Mafiaboy was
arrested for these attacks, as well as for breaking into both Harvard's and
Yale's university computer systems. Under the terms of his parole, Mafiaboy
was not allowed to use the Internet or go into stores that sold computers,
and his computer use was limited to that which was supervised by a teacher
at school.
The most popular forms of network hacking are denial of service (DoS)
attacks and mail bombs. DoS attacks are designed to swamp a computer
network, causing it to crash. Mail bombs act in a similar fashion, but attack
the network's mail servers. When eBay was attacked in February 2000, its
Web server was bombarded with fake requests for Web pages, which
overloaded the site and caused it to crash. Network hackers also try to break
into secure areas to find sensitive data. Once a network is hacked, files can
be removed, stolen, or erased. A group of teens in Wichita, Kansas, for
example, hacked into AOL and stole credit card numbers that they then used
to buy video games.
Hackers that create viruses, logic bombs, worms, and Trojan horses are
involved in perhaps the most malicious hacking activities. A virus is a
program that has the potential to attack and corrupt computer files by
attaching itself to a file to replicate itself. It can also cause a computer to
crash by utilizing all of the computer's resources. For example, e-mail
systems were inundated with the "ILOVEYOU" and the "Love Bug" viruses in
May of 2000, and the damage to individuals, businesses, and institutions was
estimated at roughly $10 billion.
Similar to viruses, logic bombs are designed to attack when triggered by a
certain event like a change in date. Worms attack networks in order to
replicate and spread. In July of 2001, a worm entitled "Code Red" began
attacking Microsoft Internet Information Server (IIS) systems. The worm
infected servers running Windows NT 4, Windows 2000, Windows XP, and IIS
4.0 and defaced Web sites, leaving the phrase "Welcome
to www.worm.com Hacked by Chinese!" Finally, a Trojan horse is a program
that appears to do one thing, but really does something else. While a
computer system might recognize a Trojan horse as a safe program, upon
execution, it can release a virus, worm, or logic bomb.
Hacker attitudes
Paul A. Taylor quotes Steven Levy when describing the hacker ethic as:
White hat
Grey hat
Black Hat
Cyberterrorist
Script kiddie
Hacktivist