This website uses cookies to ensure you have the best experience. Learn more

Hacking Sweeps The Nation Essay

2641 words - 11 pages

“We cannot defend ourselves with a weapon…but we can do this with their cars, homes, bars, brothels and everything else in their possession. It won’t be difficult; we all know who they are and where they are located.” Quoted from an Anonymous member. (Schiller, A.6.) Computer hacking began in the 1950s with an individual looking out for his own personal gains; like free phone calls for instance. The perception of hackers ever since has become very negative. Hacking has evolved over time, with many modern hackers following their own set of values that they believe are, arguably positive motives.
In the early days, many hackers were individuals, looking out for their own personal gains. Student hackers were able to expand computers, and they to made them play music and video games. In 1971, the programmer John Draper discovered that a little whistle that comes in a Captain Crunch cereal box had the same frequency as Phone Company’s used to send calls. His findings allowed him to make free phone calls anywhere in the world. (Clemmit, 767) When the 1980s began, younger hackers actually became professionals in breaching computer networks, this started and uproar of cyber crime incidents in the 1990s. From the 1990s to the 2000s, hackers started to really be recognized as a threat as they hacked into many federal government websites and large companies. This brought great controversy about what approach to take in stopping computer crimes. In the 2000s, hackers managed to make a huge name for themselves and became a main attraction to the public they were able to shut down a nuclear power plant in Ohio by unleashing a worm that disabled important safety systems. (Clemmit, 767)
As time went by the amount of cyber threats increased. In 2009 the hacker group Anonymous (Anon) started to arise, and very shortly went global with group members from almost every single country. From 2009 to present 2011 Anon made many confrontations with very powerful corporations, cartels, and government sites. The rise of these attacks has sparked global attention, that these hackers have already began to cause huge problems. As hackers continued to strengthen their bonds, people began to feel much more threatened. However, forming these groups is what has revolutionized hacking.
A great achievement for hackers was when the group Cult of the Dead Cow, or CDC, discovered the massive flaws in Microsoft Windows operating systems. The CDC was able to make a hacking tool, called BO2K (Meyerson, A.3). This tool utilized the holes in the operating system and was in turn able to gain control of a computer or a network from a remote location. What this means is basically you could use someone else's computer from your own. When the CDC discovered this, all they did was show it to Microsoft at the DefCon convention in Las Vegas. Microsoft actually rejected the idea of fixing it, by Monday of the following week Appalled by a hacking group reveling this to them. “Our position is that...

Find Another Essay On Hacking sweeps the nation

Cyber Security Essay

1295 words - 5 pages and hacking them. This way security can gain access to their files to help locate their position and arrest them. However the threat of cyber terrorism is still growing. In order to eliminate the threat of cyber terrorism the government needs to hire more people who are trained in cyber security. Cyber Terrorism Cyber terrorism is a major threat that goes unannounced to the American public that must be addressed. Imagine if you were an employee

Computer Crime Essay

1822 words - 7 pages to deploy in order to protect our land, some of the worlds most vicious and dangerous criminals invade our homes and our country’s borders each day almost without a trace. Computer crime and terrorism are plaguing our nation, and our “leaders” continue to march the nation into the criminal’s hands. Today, more and more, computer crime has made its way into the headlines, the evening news, and major newspapers. In recent years, we have

Literature Review Wrong Turn in America's Counterinsurgency

802 words - 4 pages Colonel Gian Gentile is a retired U.S. Army seasoned combat battalion commander. He served in the Iraq War. Has taught history for the United States Military Academy at West Point. Presently, acts as senior historian for the Rand Corporation in his book Wrong Turn: America’s Deadly Embrace of Counterinsurgency questioned, “The necessity and efficacy of the doctrine of counterinsurgency (COIN) which is essentially armed nation-building


3835 words - 15 pages Hackers It is the weekend you have nothing to do so you decide to play around on your computer . You turn it and than start up , calling people with your modem , conneciting to another world with people. This is all fine but what happens when you start getting into other people’s computer files , then it becomes a crime and who are the criminals. To begin i will start with hacking and hackers. Hacking is the act of

The Rational Choice Theory: Criminology by Frank Schmalleger

1885 words - 8 pages ). Hacking in its simplest form is cyber-trespassing. The same way that trespassing on the property of an abandoned house was popular with teens of a different era, hacking is the new “coming of age” test of courage. “Casual hacking is almost as established a part of teenage life as downloading music to an iPod” (Richet, 2013, p.56). Teenage hacking can be something as innocuous as hijacking someone’s e-mail, Facebook, or other social media

Enabling Hackers to do Good

2285 words - 9 pages classes of hackers over a lifetime. In his book Ghost in the Wires: My Adventures as the World's Most Wanted Hacker, Mitnick tells how, in his youth, he began hacking by using a technique called phreaking. His “Original Sin” as he puts it, was to use this social engineering technique to defraud the DMV and gather information about people (20). At this stage of his life, Mitnick was not interested in doing “good” for others nor was he interested in

Hackers vs. Crackers

3212 words - 13 pages system (Mizrach). Statistics Who are Hackers? Hacker Incident Examples Summary Base on the previous descriptions of hackers and examples of what they have done, the government does not like hackers. They believe that we, as a nation, should fear hackers. They believe that all hackers are criminal; hacking into a site is illegal, even if it is for intellectual reasons. Because of all of this, the government believes that there is

Martin Luther King And Patrick Henry: Cry For Freedom

494 words - 2 pages , and rhetorical questions. Both speakers use these devices well. Martin Luther King, Jr. is infamous for using parallelism when he states, "Free at last, free at last, thank God Almighty, we are free at last!" Martin Luther King, Jr. also alludes to the Declaration of independence many times in his speech. "I have a dream that one day this nation will rise up and live out the true meaning of its creed, ‘We hold these truths


1665 words - 7 pages Hacking The Technology Age, and the Downfall of the U.S. In today's society, people are always trying to improve technology, but in doing so, are they creating something that can be used to create mass destruction for the United States? Everyday computers get faster, new programs are written, or some scientist finds a way to make a job be done quicker. For most people, they welcome the advancement of science to ease their lives, but it

Cyber Terrorism

1619 words - 6 pages also be used to create havoc, and destroy human beings.The United States is finding out that being a world power, other countries are jealous. Most understand the word terrorism to mean bombs, and mass murders, but with the evolution of the computer age, terrorism is taking on a whole new meaning. No longer is computer hacking something from a movie, or a sci-fi flick; it is now a real danger to the United States. This new technology is being

A Literature Review Wrong Turn America's Counterinsurgency

1463 words - 6 pages this was not an interagency publication but it did bring, “together a mix of serving and retired military officers and a handful of civilian military scholars.” Today the definition has created a strong doctrine as such, “American counterinsurgency, as codified in Marine/Army Field Manual 3-24, is armed nation building by a foreign occupying power. The primary objective is to provide the host population an infrastructure, governance, security

Similar Essays

Hacking Controversey Essay

1780 words - 7 pages When the public hears the term hacking, they often think of theft, defacement, crime, and other words associated with criminal activities. Nowadays, this view is, in a way correct, but it is not entirely true. It is safe to say that quite a few hackers are bad, but that is because we are in the 21st century. We are the most technological advanced generation to date. The good hackers do far out ways the bad that some individuals commit. The view

Mass Surveillance And Its Role In Promoting National Security

1622 words - 7 pages by the NSA was released to the public. It is the duty of Americans to sacrifice for the well being of the nation. It is obvious that “the threat of terrorism is real and unrelenting” and that “our intelligence techniques must adapt to a rapidly changing world” (End the Phone Data Sweeps). Those opposed to mass surveillance must realize that compared to the government’s conduct towards citizens in countries, they are not subject to anything too

Cyber Crime: What Is Hacking? Essay

1313 words - 6 pages control of a portion of their life, unresolved anger, a dislike of who they are in the real world, and recognition from the media.” (Rennie et al) With the aforesaid driving forces being on the milder side of the cyber crime spectrum, there are those who taking hacking to the next level and focus their skills and resources on the destruction of a foreign nation. Cyber terrorists, as they are referred to as, tend to target higher profile targets, such

Should The Internet Be Censored?? Essay

2685 words - 11 pages Internet. Censorship of such things as hacking would only be possible if each individual Internet provider was legally forced to filter or block out selected web sites with the offending material. Not only would this be a costly venture but one that would have to be constantly monitored with the influx of web sites. In the United States we are protected by the First Amendment in which freedom of speech is protected. Censoring the Internet in regards to cyber-porn and hacking would be revoking this staple of our country. This nation was founded on the freedom of choice and consequently if the Internet is censored then that ethos will come crashing down.