During my previous post, I have provided information on the
different categories of cyber crime. This post will exhibit the role of hacker
in the digital crime. The term hacker is vague to define. Over the years social
media has come up with different terms to define hackers. When we say the word
“hacker” there are different thoughts that comes into our mind. People have
diverse ways to define hacker depending on who that is and what kind of
perception they have over them. So who are these Hackers?
“Hacking is the
practice of modifying the features of a system, in order to accomplish a goal
outside of the creator's original purpose. The person who is consistently
engaging in hacking activities, and has accepted hacking as a lifestyle of their
choice, is called a hacker”. Hackers are master programmers who are skillful in
machine code and computer operating systems. Hacking is used to gain
unauthorized access into the data system. It is a technical effort to maneuver
the normal performance of network connections and connected systems and any
person who is engaged in this is a hacker. Hacking does not include computer
alone, a hacker can hack into phones, servers and websites.
There is a unique relationship between hacker and
technology. Their deep connection between the computer and technology plays a
significant role in their interests and actions. “Hackers are part of a
subculture that is constantly in flux, making it very resistant to mainstream
culture. It is based on the collecting and sharing of information amongst other
hackers in order to find easier solutions to problems within the computer
world”. Many hackers develop an interest in technology before or when they are
adolescent. Hackers have deep connection with computers and the technology and
are driven by increasing knowledge over how computers function and how they can
be manipulated. Their identity is built upon their dedication to learn and
understand the technology.
Hacking itself is not a crime and in several cases hacking
might be perfectly legal, but it becomes a crime or illegal when it is done
without an authorization. “A digital crime is most generally defined as any
criminal act when the perpetrator hacks or breaks into a computer or computer
network in order to illegally obtain sensitive information or disseminate
destructive computer software”. Although hacking could be legal or illegal
those that are illegal have come to controversies because of them being
socially acceptable. Edward Snowden could be considered an example. Snowden’s
hacking was considered illegal because he did this without the authorization
but to many it was socially acceptable because his illegal hacking made all
people aware that their government was doing surveillance on its own citizens
when the 4th and 5th Amendment of the Constitution, Article 12 of the Universal
Declaration of Human Rights forbids such systems of massive, pervasive
surveillance. Sometimes hacking could be perfectly legal and socially
acceptable as well. For example, when the government some how finds out about
gruesome details on future terrorist attack and authorizes a hacker to hack in
to the terrorist’s computer to get any details on the attack so they could stop
it from happening. Here it would be perfectly legal because the hacker received
an authorization and it would be socially acceptable because people would be
open towards a hacking that would stop a terrorist attack.
Many hackers develop an interest in technology before or
when they are adolescent. Hackers have deep connection with computers and the
technology and are driven by increasing knowledge over how computers function
and how they can be manipulated. Their identity is built upon their dedication
to learn and understand the technology. Hacker’s commitment level can be seen
through what category the hacker belongs to. There are three different types of
hackers: black hat, white hat and grey hat.
Black Hat- A Black Hat hacker is basically a “malicious”
hacker. These hackers are basically considered bad. They create viruses so they
can harm people’s computer, hack into people’s mail or bank accounts and gain
profit with it. Their basic motivation is to gain profit off it and it does not
matter to them if the profit is from doing something illegal.
White Hat- A White Hate hacker is “ethical” hacker. White
Hat hacker does not exploit their expertise, but rater use it for a good
purpose. They do software testing by manufactures; develop antivirus,
independent verification of software function and security. Their motivation is
to get better at what they do and create something that would help other people
and go further with the technology.
Grey Hat- A Gray Hat hacker is basically a hacker that acts
ethically most of the time but sometimes violates accepted ethics. They are
recreational hacker or they might violate the ethical code for some profit. For
example, they could just out of curiosity hack into their bosses bank account
to check how much money he/she has but not do anything wrong with the account.
Another example could be a husband paying the hacker to hack into the wife’s
email and bank account to check if she is having an affair with another man.
The hacker here is using his talent to gain monetary profit.
References
Corporate
Author. (2013, n.d n.d). Is hacking
considered a cyber crime? Retrieved February 12, 2016, from whocanisue:
http://cybercrime-defense.whocanisue.com/hacking-considered-cyber-crime/
Corporate Author.
(n.d.). Hacking. Retrieved
February 12, 2016, from what is hacking: http://whatishacking.org/
Douglas, T. (n.d, n.d
n.d). Hacker as Subculture.
Retrieved February 12, 2016, from Wordpress:
http://sincdav.wordpress.com/2012/02/10/hacker-as-subculture/
ON LLC. (2015, n.d
n.d). How to Protect your Gmail
Account: Inside The Mind of A Hacker. Retrieved February 12, 2016, from
ON LLC: http://blog.on.com/how-to-protect-your-gmail-account-inside-the-mind-of-a-hacker/
SecPoint. (2015, n.d
n.d). Types of Hacker.
Retrieved February 12 2016, from SecPoint IT Security Resources:
https://www.secpoint.com/types-of-hacker.html
Smith, M. (2015,
November 08). Photo Credit: Teen
hackers strike again, allegedly gain access to U.S. arrest records database.
Retrieved February 12, 2016, from Network World:
http://www.networkworld.com/article/3002622/security/teen-hackers-strike-again-allegedly-gain-access-to-us-arrest-records-database.html
No comments:
Post a Comment