“We can't defend ourselves with a gun... but we can do it with their cars, houses, bars, brothels and everything in their possession. It won't be difficult; we all know who they are and where they are." Quoted by an anonymous member. (Schiller, A.6.) Computer hacking began in the 1950s with an individual seeking his own personal gain; such as free phone calls. Since then the perception of hackers has become very negative. Hacking has evolved over time, with many modern hackers following their own set of values that they believe are likely positive motivations. In the beginning, many hackers were individuals seeking their own personal benefits. Student hackers were able to expand computers and make them play music and video games. In 1971, programmer John Draper discovered that a small whistle in a box of Captain Crunch cereal had the same frequency used by the Phone Company to send calls. His discoveries allowed him to make free phone calls anywhere in the world. (Clemmit, 767) In the early 1980s, younger hackers actually became professionals at breaking into computer networks, starting a flurry of cybercrime incidents in the 1990s. From the 1990s to the 2000s, hackers started to really be recognized as a threat as they hacked into many federal government and large corporate websites. This has sparked great controversy over the approach that should be taken to stop cybercrime. In the 2000s, hackers managed to make a huge name for themselves and became a major attraction for the public, managing to shut down a nuclear power plant in Ohio by releasing a worm that disabled important security systems. (Clemmit, 767) As time goes by the amount of cyber threats has increased. In......middle sheet......Schiller, Dane. “Hackers Threaten to Reveal Cartel.” Beaumont Enterprise: A.6 ProQuest HHHHCentral. October 30, 2011. Web. November 21, 2011 Taylor, Jerome. “Police admit cybercrime is 'deeply concerning' as Essex Teen faces HHHH charges.” The Independent: 8. ProQuest Central. June 23, 2011. Web. Nov. 21. HHHH2011"What is hacktivism? - Definition from Whatis.com." Information Security HHHHInformation, news and tips - SearchSecurity.com. TechTarget. Network. November 30 HHHH2011.Ziff, Davis. "Anonymous threatens to expose drug cartel." MARVEL, Maine State HHHHLibrary: List of full-text electronic journals. PC Magazine Online, October 31, 2011. HHHHWeb. November 21st. 2011.
tags