Find a minimum of 10 news and/or magazine articles about hackers from mainstream
ID: 3693309 • Letter: F
Question
Find a minimum of 10 news and/or magazine articles about hackers from mainstream media from the past few years. How are hackers described, as criminals or heroes? Give examples.
a. Students are expected to collect a minimum of 10 articles from the mainstream news, magazine or journals.
b. Review the articles or news in terms of issue, methodology and impact on the society.
c. Critically examine how the hackers are described- criminals or heroes?
d. Reference should be prepared in APA style and all the collected articles must be attached.
Explanation / Answer
***I am not edit the article, it is same as it is published***
Here give below are ten hacking articles with the biggest headlines.let discuss one by one:
· Jonathon James hacks NASA-Known by the hacker name c0mrade, Jonathon James was 16 when, in 1999, he hacked into the Marshall Space Flight Center in Huntsville, Alabama, and downloaded proprietary software for the International Space Station. The software supported the International Space Station's physical environment and was responsible for critical control of humidity and temperature for living in space.NASA officials valued the documents stolen by James at around $1.7 million. The incident forced NASA to shut down its computer systems for three weeks and cost them about $41,000 to fix.
· Adrian Lamo hacks the New York Times-In 2002, at age 19, Adrian Lamo hacked into the internal network of the New York Times and accessed many sensitive records, including an extensive database of op-ed writers the paper had used in the past.The records contained names and, in some instances, phone numbers, home addresses and payment history on contributors such as Democratic strategist James Carville, former secretary of state James Baker, and (ironically, Sneakers movie veteran) actor Robert Redford. Lamo added his own name to the list of "experts" and under "expertise" he wrote "Computer hacking, national security, communications intelligence."
· Gary McKinnon hacks the US military-Scottish hacker Gary McKinnon, who went by the handle Solo, was accused of hacking to several US military computers in 2001 and 2002. McKinnon allegedly wanted to know what the government knew about UFOs.Military officials said the damage caused by McKinnon included the deletion of critical files from operating systems, prompting a shut down the US Armys Military District of Washington network of 2,000 computers for 24 hours. McKinnon also allegedly deleted weapons logs at the Earle Naval Weapons Station. Officials said the cost of cleanup from McKinnons hack was over $700,000.McKinnon is currently in London and has been fighting US extradition orders for over a decade. He could face a sentence of over 60 years in prison if convicted of the charges against him.
· Albert Gonzalez hacks TJX (and many more)-Albert Gonzalez was the convicted ring leader of a group of cyber criminals which, from 2005 through 2007, stole more than 90 million credit and debit card numbers from TJX and other retailers, including shoe sellers DSW, OfficeMax, BJs Wholesale Club and Dave & Busters. Gonzalez was also the mastermind behind the hacking that caused the massive records breach of Heartland Payment Systems in 2008.In 2009, Gonzalez was sentenced to two concurrent 20-year prison sentences, the lengthiest sentence ever imposed in the United States for hacking or identity-theft.
· HBGary's Hoagland identifies lessons in Anonymous hack-In one of the first events to really bring "hacktivism" to the attention of the mainstream press, it was reported that some of the documents stolen by Anonymous revealed HBGary Federal was working with Bank of America to respond to Wikileaks' planned release of BOA internal documents. The HBGary documents detailed some planned shady tactics, including launching a "dirty tricks" campaign against Wikileaks and disrupting a Salon.com reporter who was assumed to be sympathetic to Wikileaks.
· News of the World hacking scandal-Employees of British paper News of the World were found to have hacked into the phones of celebrities, politicians and even murder victims in pursuit of stories for the tabloid.In an investigation that dated back to 2002, it was eventually revealed that reporters, as well as private investigators hired by the paper, had hacked into the voicemail accounts of celebrities such as model Elle McPherson and actress Sienna Miller, as well as members of the British Royal Family. In one instance, a PI working for the paper had tampered with official police evidence by listening to and inadvertently deleting the voicemails of murdered school girl Milly Dowler.The 168-year-old paper was eventually shuttered in the wake of the scandal.
As we all know that hacker is a clever programmer. Basically we can say that hacker would be a proficient programmer or engineer, so with sufficient technical knowledge to understand the weak points in a security system.
Hacking Issues:
By Hacking it can create a variety of damages to people, groups and systems of large scale.
Hacker’s Methodology-:
Black Hat Crackers
The Internet is all around with hackers, they known as known as black hat. They work for take advantage of the computer systems. They only wanted to news being hauled away for cybercrimes. Some people of them are for fun and curiosity, while others are looking for personal gain.
White Hat Hackers
These are Hackers who use their skills for good purposes are known as white hat.
These people are certified for Ethical Hacking and hired by companies to test the integrity of their systems. They are not breaking any laws and in the process have created some really cool stuff.
Grey Hat Hackers
Grey hat hackers are a combine of both black hat and white hat activities. They will look for vulnerabilities and If they found any issues , they will report them to the owner, sometimes requesting a small fee to fix the issue.
Impact On The Society Of Hackers-
In past hackers were considered as genius because they helped in many ways to the development of computers and internet technology. But now- a –days, personal uses it for benefit has played a major importance in peoples life and profit by illegal entry into people privacy and using for their own benefits purpose. These are the some common type of hacking which give negative impact like:
Hackers Are Described- Criminals:
There are above given aseries of cases where young computer hackers were either charged or threatened with criminal charges for doing things that don't seem particularly criminal at all.
The term "hacking" is a very broad one. Hacking for a device or system can refer to as altering or improving it without any illicit access. It can be done legally and ethically with non-maliciously but illegally or illegally and with intent to do harm.
Generally hacking may be legal if you are working on your own computer system or if you have explicit and detailed written permission for anything you do to someone else's system. But whenever it involves computer-related activity that breaks the law it becomes a crime.
Definitely there are some people who have no intention of damaging a system or causing problems, and is solely interested in obtaining information but it done without permission, it is a kind of hacking is still illegal. More serious acts are crime that include vandalize websites, deleting/ stealing information, or placing malware on computer systems.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.