Entry
Reader's guide
Entries A-Z
Subject index
Computer Hacking
BEGINNING IN THE 1980s, as new technology made what former Vice President Al Gore called the Information Superhighway possible, the world has become smaller and more vulnerable. Any computer that is connected to the internet or to a network opens a line of communication that can be accessed by computer hackers around the world. Computer hackers have been responsible for threats to national security, credit-card and identity theft, software piracy, financial fraud, trade-secrets theft, information theft, denial of service attacks, wanton destruction of data, software, and hardware, and various other malicious behaviors.
It is difficult to estimate the full extent of the damage caused by computer hackers because of under-reporting. Estimates of annual costs have ranged from $555 million and $13 billion. When government agencies or businesses are attacked, costs include downtime, lost business opportunities, salaries for staff who spend time repairing damage, and fees for consultants and lawyers. Homeowners who have been maliciously hacked may have to replace a damaged hard drive or even an entire computer.
Originally, the term hacker was used to identify anyone who gained entry into another computer without the consent of the owner. The typical hacker was curious about the way that computers worked and how they communicated with each other. This sort of hacker has also been called “benign” or a “white hat.” Some companies have hired these hackers to test their systems and to find and plug holes in operating systems such as Unix or Windows or to protect confidential information and products. When most people refer to computer hackers, they are referring to what is also known as “crackers” or “black hats.”
Unlike the traditional hacker, the cracker is interested in accessing other computers for malicious or criminal purposes. This individual is generally profiled as a young, male computer genius. He is often characterized as precocious, curious, and persistent. He may be delinquent, hyperactive, or a drug or alcohol abuser. The cracker is also known to lie, cheat, steal, and exaggerate. A network of hackers has developed through online bulletin boards, 2600 magazine, and through other less formal means of communication. Networking allows hackers to communicate with one another, to trade hacking techniques, to identify holes in operating systems and other software, and to brag about their exploits to one another. The more professional hackers who belong to this network are critical of uninitiated hackers who are called “script kiddies” who may download hacking software from the internet rather than calling on their own skills and initiative to engage in computer hacking.
Hackers enter computers for a number of reasons and may come from either inside or outside a company, agency, or network. Inside hacking is generally performed by employees or former employees who illegally or unethically try to access privileged information or attempt to manipulate or destroy information. They may also hack simply out of spite or revenge. Outside hackers may be interested in stealing proprietary information such as user passwords that allow access to entire networks, or in stealing trade secrets or source codes or financial records. Others may be looking for personal information to pave the way for identity theft. Still others may be interested in setting up denial of services attacks that have been known to crash the entire systems of government entities and large corporations, or the hackers might just enjoy snooping or acting maliciously.
...
- Business Fraud & Crimes
- Advertising Fraud
- Antitrust
- Arbitrage
- Bank Fraud
- Bankruptcy Fraud
- Bid Rigging
- Boycott
- Campaign Finance
- Canadian Mining Scandals
- Charity Fraud
- Cigarette Advertising
- Computer Hacking
- Copyright Infringement
- Corporate Criminal Liability
- Corporate Dumping
- Corporate Raiding
- Direct-Mail Fraud
- Economic Espionage
- Free Enterprise System
- Greenmail
- Hoarding
- Illegal Competition
- Industrial Espionage
- Insurance Fraud
- Interlocking Directorates
- Internet Fraud
- Kickbacks
- Labor Crimes
- Mail Fraud
- Market Manipulation
- Marketing Fraud
- Outside Directors
- Patent Infringement
- Predatory Practices
- Price Discrimination
- Price Fixing
- Puffery
- Redlining
- Revolving Door
- Small-Business Fraud
- Tariff Crimes
- Tax Evasion
- Trademark Infringement
- Tying Arrangements
- Unfair Trade Practices
- Unions
- Wire Fraud
- Companies
- A. H. Robins
- AAMCO
- Adelphia Communications
- Allied Chemical
- Allied Irish Banks
- American Cyanamid
- American Hospital Supply
- American Motors
- Anheuser-Busch
- Archer Daniels Midland
- Arthur Andersen
- AT&T
- B. F. Goodrich
- Banco Ambrosiano
- Bank of Credit and Commerce International
- Banker's Trust
- Barings Bank
- BASF
- Beech Aircraft
- Beech-Nut Nutrition
- Board of Directors
- Bre-X
- Canadian Mining Scandals
- Carl Karcher Enterprises
- Cendant
- Centennial Savings and Loan
- Chem-Bio
- Chevron
- Conoco
- Crédit Lyonnais
- Daiwa Bank
- Dow Chemical
- Drexel Burnham Lambert
- E. F. Hutton
- Eli Lilly
- Enron Corporation
- Film Recovery Systems
- Firestone Tires
- Fisher-Price
- G. D. Searle
- General Dynamics
- General Electric
- General Motors
- Georgia Pacific
- Global Crossing
- Great Electrical Equipment Conspiracy
- Gulf Oil Corporation
- IBM
- Imperial Food Products
- Investors Overseas Services
- ITT
- Johns-Manville
- Kerr-McGee
- Kidder, Peabody
- Lloyds of London
- Lockheed
- Madison Guaranty
- Merrill Lynch
- Metallgesellschaft
- Microsoft
- Morgan Grenfell
- Morton-Thiocol
- National Medical Enterprises
- NatWest Markets
- Northrop Grumman
- Owens Corning
- Pharmaceutical Industry
- Procter and Gamble, Inc.
- Revco
- Rite Aid
- Rockwell International
- Salomon Smith Barney
- Standard Oil
- Sumitomo
- Teledyne Industries
- Tyco International
- Unisys
- United American Bank
- United Fruit
- United States Steel
- Waste Management, Inc.
- WorldCom
- Consumers
- Advance Fee Scam
- Age Discrimination
- Automobile
- Bait and Switch
- Bank Fraud
- Beech-Nut Nutrition
- Bendectin
- Better Business Bureaus
- Breast Implants
- Caveat Emptor
- Charity Fraud
- Cigarette Advertising
- Consumer Deaths
- Contractor Fraud
- Credit Card Fraud
- Cyberstalking
- Dalkon Shield
- Direct-Mail Fraud
- Fertility Fraud
- Fisher-Price
- Gambling and Lotteries
- Identity Theft
- Impersonation
- Infant Formula
- Public Citizen Health Research Group
- Tampons and Toxic Shock
- Telemarketing Fraud
- Tobacco Industry
- Countries & Regions
- Africa
- Arab Nations
- Argentina
- Asia
- Australia
- Brazil
- Canada
- Canadian Mining Scandals
- Caribbean Islands
- Central America
- China
- Cuba
- Eastern Europe
- France
- Germany
- Greece
- Hong Kong
- Indonesia
- Ireland
- Israel
- Italy
- Japan
- Luxembourg
- Mexico
- Middle East
- Poland
- Russia
- Saudi Arabia
- Scandinavia
- Singapore
- South America
- South America
- Spain
- Switzerland
- Thailand
- United Kingdom
- United States
- Criminology & Justice
- Age Discrimination
- Ancient Mercantile Crime
- Art Fraud
- Board of Directors
- Bribery
- Capitalism
- Caveat Emptor
- Civil Forfeiture
- Class-Action Lawsuits
- Conflict Theory
- Consequences of White-Collar Crime
- Conspiracy
- Corporate Criminal Liability
- Corruption
- Crime Seriousness
- Critical Theory
- Differential Association
- Drug Trafficking
- Elite Crime
- Ethics
- Fear of Crime
- Felony
- Forensic Auditing
- Forgery
- Gender Discrimination
- Global Warming
- Globalization
- Hartung-Burgess Debate
- Human Trafficking
- Investigation Techniques
- Juries and Awards
- Justice, Department of
- Knapp Commission
- Legal Malpractice
- Military-Industrial Complex
- Misappropriation Theory
- Mollen Commission
- Money Laundering
- Multinational Corporations
- National White-Collar Crime Center
- Negligence
- Oligopoly
- Organized Crime
- Perjury
- Police Brutality
- Police Corruption
- Political Assassinations
- Pornography
- Prosecution
- Prostitution
- Public Corruption
- Racial Discrimination
- Racketeering
- Religious Fraud
- Respondeat Superior
- Risk Analysis
- Self-Control Theory
- Sutherland-Tappan Debate
- Techniques of Neutralization
- Financial & Securities Fraud
- Accounting Fraud
- Arbitrage
- Bad Checks
- Banco Ambrosiano
- Bank Fraud
- Bank of Credit and Commerce International
- Banker's Trust
- Bankruptcy Fraud
- Barings Bank
- Bendix Corporation
- Boesky, Ivan
- Bond Fraud
- Centennial Savings and Loan
- Check Kiting
- Commodity Fraud
- Counterfeiting
- Credit Card Fraud
- Currency Fraud
- Debt Restructuring Fraud
- Drexel Burnham Lambert
- Embezzlement
- Equity Funding Scandal
- Extortion
- Fiduciary Fraud
- Flaming Ferraris
- Insider Trading
- Investment Trust Fraud
- Nonprofit Organization Fraud
- Offshore Bank Accounts
- Offshore Entities
- Savings & Loan Fraud
- Securities Fraud
- Stock Fraud
- Teamsters Pension Fund
- Vatican Bank
- Government
- Bid Rigging
- Bribery
- Commodities Futures Trading Commission
- Corruption
- Defense Industry Fraud
- Environmental Protection Agency
- Federal Deposit Insurance Corporation
- Federal Trade Commission
- Food and Drug Administration
- Government Contract Fraud
- Government Procurement Fraud
- Graft
- HUD Scandals
- Iran-Contra
- Prisoners
- Securities and Exchange Commission
- Sentencing Guidelines.
- Tailhook Scandal
- Teapot Dome Scandal
- Laws
- Antitrust
- Bank Secrecy Act
- Boland Amendments
- Campaign Finance
- Celler-Kefauver Act
- Clayton Antitrust Act
- Clean Air Act
- Clean Water Act
- Comprehensive Thrift Act
- Computer Fraud and Abuse Act
- Consumer Product Safety Act
- Ethics Reform Act
- Fair Housing Act
- False Claims Act
- Federal Trade Commission Act
- Financial Crime Kingpin Statute
- Foreign Corrupt Practices Act
- Hart-Scott-Rodino Act
- Hobbs Act
- Insider Trading Sanctions Act
- Interstate Commerce Act
- Major Fraud Act
- Meat Inspection Act
- Occupational Carcinogens
- Occupational Safety and Health Act
- Pure Food, Drug and Cosmetics Act
- Racketeer Influenced Corrupt Organizations (RICO)
- Robinson-Patman Act
- Sherman Antitrust Act
- Toxic Substances Control Act
- Truth in Labeling
- Truth in Lending Act
- Witness and Victim Protection Act
- Medical & Healthcare Fraud
- People
- Agnew, Spiro
- Anderson, Jack
- Bakker, Jim and Tammy
- Benson, Michael L.
- Boesky, Ivan
- Braithwaite, John
- Bush, George H. W.
- Bush, George W.
- Butcher Brothers
- Capone, Alphonse
- Carnegie, Andrew
- Carson, Rachel
- Carter, Jimmy
- Clinard, Marshall
- Clinton, William J.
- Coffee, John C., Jr.
- Cohen, Albert K.
- Coleman, James W.
- Coolidge, Calvin
- Cressey, Donald
- Cullen, Francis T.
- Domhoff, G. William
- Edelhertz, Herbert
- Eisenhower, Dwight D.
- Fisse, Brent
- Ford, Gerald R.
- Frankel, Martin
- Geis, Gilbert
- Giuliani, Rudy
- Grant, Ulysses S.
- Green, Mark J.
- Holley, Louis Malcolm
- Hoover, Herbert
- Irving, Clifford
- Jesilow, Paul
- Jett, Joseph
- Johnson, Lyndon B.
- Keating Five
- Keating, Charles
- Kennedy, Robert F.
- Leeson, Nick
- Levi, Michael
- Levine, Dennis
- Madison, James
- Maxwell, Robert
- Milken, Michael
- Morgan, J. P.
- Nader, Ralph
- Nixon, Richard M.
- North, Oliver
- Pontell, Henry
- Reagan, Ronald
- Rich, Marc
- Roberts, Oral
- Rockefeller, John D.
- Roosevelt, Franklin D.
- Roosevelt, Theodore
- Ross, Edward
- Rusnak, John
- Short, James F. Jr.
- Shover, Neal
- Silkwood, Karen
- Simpson, Sally
- Sinclair, Upton
- Spitzer, Elliot
- Stanford, Leland, Sr.
- Stavisky, Serge
- Steffens, Lincoln
- Stewart, Martha
- Sutherland, Edwin H.
- Truman, Harry S.
- Vaughan, Diane
- Weisburd, David
- Wheeler, Stanton
- Whistleblowers
- Political Scandals
- Pollution
- Products
- Regulation
- Scams & Swindles
- Advance Fee Scam
- Art Fraud
- Bad Checks
- Bait and Switch
- Better Business Bureaus
- Bid Rigging
- Bond Fraud
- Charity Fraud
- Computer Hacking
- Consumer Product Safety Commission Act
- Contractor Fraud
- Counterfeiting
- Currency Fraud
- Daisy Chains
- Direct-Mail Fraud
- Grifters
- Home-Stake Swindle
- Nigerian 419
- Ponzi Schemes
- Real Estate Investments
- Scams
- Securities Fraud
- Stock Churning
- Sweepstakes Fraud
- War-Profiteering
- Work-Related Crimes
- Loading...
Get a 30 day FREE TRIAL
-
Watch videos from a variety of sources bringing classroom topics to life
-
Read modern, diverse business cases
-
Explore hundreds of books and reference titles
Sage Recommends
We found other relevant content for you on other Sage platforms.
Have you created a personal profile? Login or create a profile so that you can save clips, playlists and searches