The Past, Present and Future of Computer Hacking

1923 Words Dec 3rd, 2008 8 Pages
The Past, Present and Future of Computer Hacking

Society relies heavily on technology for many things, but our use of technology opens us up to become victims of cybercrimes, like computer hacking. Hackers can be divided into three main categories: novice, intermediate, and elite. Hacking has been in the information technology (IT) field for a while. The first hackers appeared in the nineteen sixties and hackers have continued to make progress since then. People hack for a variety of reasons including ego, fun, knowledge, and profit. The first major hacking program, SATAN, caused controversy in 1995, and numerous hacking programs exist today. The future of hacking looks bright because people will only continue to rely even
…show more content…
Originally the term ‘hack’ was used to describe what club members did to electric tracks and switches to make them run quicker or better (Lilley 2002, 16). In 1978 Randy Suess and Ward Christiansen created the first online bulletin board system where hackers could exchange tips, information, and stolen passwords and credit card numbers. There are currently over 40,000 bulletins worldwide (Lilley 2002, 16). The United States Congress passed the Computer Fraud and Abuse Act in 1986. The Act recognized “the unauthorized access of federal interest computer with the intention to commit fraudulent theft” and the altering of information to inflict “malicious damage” as felony offences (Lilley 2002, 16). During the Gulf War two teenaged Dutch hackers copied information from the Defense Department systems. Although the US General Accounting Office said that the information was unclassified, it was still sensitive and the teenagers tried to sell the information to the Iraqis. One might ask what the reward is in hacking if any. Some hackers do what they do for knowledge and ego, while others do it for fun and profit. Learning to ‘crack the codes’ of different and more complex websites provides hackers with more knowledge and tricks that can help them make names for themselves as ‘elite hackers’ in the hacking community. Many hackers pick large groups or government entities for attacks “aimed at making a big splash” (Crume 2000, 29). The more high-profile the

More about The Past, Present and Future of Computer Hacking

Open Document