Professional Documents
Culture Documents
There are many advantages associated with technology. Advantages like easy
communication, aids in research, learning and many more.
There are other disadvantages associated with the introduction of technology.
Disadvantages like cybercrime such as hacking people, frauds amongst others.
Let’s look at some of these disadvantages like hacking and its implications on
human and our society.
A SHORT HISTORY ON HACKING
The first known incidence of network penetration hacking took place when
members of a computer club at a suburban Chicago area high school were
provided access to IBM's APL network. In the Fall of 1967, IBM (through
Science Research Associates) approached Evanston Township High School with
the offer of four 2741 Electric teletypewriter-based terminals with dial-up
modem connectivity to an experimental computer system which implemented
an early version of the APL programming language. The APL network system
was structured in Workspaces which were assigned to various clients using the
system.
Hacking is an increasing concern in the 21st century which can lead to grave
consequences if the sensitive information falls in the wrong hands. This
“unauthorized intrusion” into computer networks has given many people
sleepless nights causing a massive monetary and physical damage.
Here are some of the most insane hacking stories ever from around the world
where hackers have done unbelievable things!
When the Federal Bureau of Investigation learned about his trick, they pursued
him and he went underground. He was later found, arrested, and went to
prison for five years. He was the first American ever to be released from prison
with a ban on the use of a computer for three years. When he was featured on
NBC’s Unsolved Mysteries, the phone lines of the show mysteriously crashed.
Poulsen now works as a contributing editor with The Daily Beast and has
distanced himself from his past as a hacker. Recently, he has done several
investigative reports for social good. (1, 2)
Jonathan Joseph James, a hacker, was only 15 when he hacked into the
systems of NASA and the United States Department of Defense (DOD) along
with some private companies and schools in June 1999. A native of Miami who
operated under the nickname of “Comrade,” stole data worth 1.7 million
dollars from 13 computers at NASA. NASA had to shut down its network for 21
days to investigate the breach that cost them an additional 41,000 dollars.
The source code that James stole controlled important elements for
survival aboard the International Space Station including the controlling of
temperature and humidity. NASA had to rewrite that part of the source code.
He also became the first person in the world to crack into the network of
DOD’s Defense Threat Reduction Agency which is a division responsible for
analysing possible threats to the United States. He intercepted 3,000 messages
that gave him access to usernames and passwords of several employees that
also gave him access to ten military computers.
When he was arrested, computer crimes were not fully codified, and since
he was a juvenile, he was charged with two counts of “juvenile delinquency.”
He was placed under a six-month home arrest and asked to write apology
letters to NASA and DOD. If he had committed the crime three years later, he
would have been imprisoned for at least ten years and would have had to pay
a fine of thousands of dollars. (source)
4. Caught with over a 100 cell phone clone codes and several cloned cell
phones, hacker Kevin Mitnick was kept in solitary confinement for eight
months because law enforcement officers told a judge that he could “start a
nuclear war by whistling into a pay phone.”
ROLE OF HACKING
TYPES OF HACKING
The three types of hackers are the white hat hacker, the grey hat hacker and
the black hat hacker. Some have gone ahead and added blue hats, red hats,
and green hats to the categories of hackers based on their beliefs and
behaviours.
Each type of hacker hacks for a different reason, a cause, or both. All have the
required skills needed to accomplish their mission.
China accounts for the world’s highest number of hackers which at the end of
2012 accounted for 41% of the global hacking traffic.
Kevin Mitnick is the world's most famous hacker, bestselling author, and the
top cyber security speaker. Once, one of the FBI's Most Wanted because he
hacked into 40 major corporations just for the challenge, Kevin is now a
trusted security consultant to the Fortune 500 and Governments worldwide.