Most U.S. citizens associate the word hacker with the concepts of cyber criminals, cyber terrorism and cyber warfare. A large percentage of the population list the names of cyber insurgent groups like Anonymous, LulzSec and the Syrian Electronic Army, and almost every American believes that China and their cyber army is a possible threat to American safety. The largest cyber force in existence the Chinese cyber army. Hackers were not originally online scam artists, software thieves, and news website vandalists. At the heart of hacking was a group of people that wanted to test bounds of the computer and cyberspace. Over the past few decades, with the growth of hacking and the lack thereof, court precedence and legislation related to the matter has allowed for many hackers to get away with many malicious cyber-attacks. However, in order to prove its point, the United States courts have caused collateral damage to select individuals in order to make an example of many young hackers with one of those being Kevin Mitnick.
About the Author
Kevin Mitnick was a legendary hacker deemed by one website I read to have been the most wanted hacker through the mid-90s, he is a legendary phone phreaker and social engineer and used to enjoyed collecting stolen software licenses from companies. Mitnick was sentenced to slightly under four years in prison for his mischief. However, there certainly is no need to feel sorry for him as since the termination of his sentence he has become a renowned computer and cyber security consultant for both the private and public sector, and has published three books on hacking and cyber security.
Purpose of this Essay
The most legitimate way for the public to learn about hackers presently is through the reading of black hat hackers turned white hat security professional, for example the writers, Kevin Mitnick (The Art of Deception, The Art of Intrusion, and The Ghost in the Wires) and Chris Hadnagy (Social Engineering: The Art of Human Hacking). These individuals believe in security through education and make a strong case in both of our books that we have much to benefit from understanding the way hackers think in order to both protect ourselves from their attacks as well as learn to be as analytical, ambitious, motivated, dedicated and perseverant as the many different hackers. The purpose of this essay is to educate readers about the qualities of hackers and provide the argument that these qualities are remarkable traits that the entire population could benefit from replicating. The thought process of a hacker is one that welcomes challenges and views them as puzzles that can be cracked by the use of many different methods by many different hackers with unique perspectives and skills that guide them and make them inclined to go about tackling similar puzzles in very different ways. The hacker also like any individual differing degrees of morality and like the student is not always good. And what they do and...