More than 30% of computers are infected by viruses created by hackers. Hackers breach systems for a variety of reasons such as stealing information, harming others, or disrupting networks. Modern technology allows hackers to work remotely from anywhere in the world. Key problems caused by hackers include crippling government systems through prolonged probing to find weaknesses, creating viruses that damage computers and leave backdoors, and organized hacking groups that are difficult for experts to counter. While there are no permanent solutions, methods to prevent hacking include using hackers' own tools to strengthen defenses, increasing cybersecurity funding, and reformatting infected systems. The outlook on preventing widespread hacking is pessimistic as hackers continue to innovate faster than defenses.
1. Perrin 1
Luke Perrin
Mrs. Lester
Advance Composition
11 October 2011
Hacking Plague
More than 30 percent of computers are infected by hacker-made viruses (“China Issues”).
Hackers are an international threat that breach computers to gain information, to harm others,
to make a profit, or to cripple a system. Hackers steal anything that might give them what they
specifically want. This threat has increased to the severity that hacking threatens corporations
and governments. Unfortunately, the hacking epidemic is rapidly spreading, but in order to
counter hacking, one must examine and pinpoint the problems, while analyzing the solutions and
outlook.
In order to counter hacking, one must have an understanding of what hacking is.
As discussed by Dr. Mizrach, “Hackers are just like people, and hold their own beliefs and
ethics.” Many people think of hackers under the stereotype of the overweight, hygienically
challenged, antisocial being. However, hackers have evolved into the polar opposite appearance
and blend in with normal people. Hackers have rules, regulations, and laws that they follow.
Each set is similar to many organizations. Unlike past efforts, hackers do not have to be at their
target to hack it; rather, they can be anywhere in the world, as long as they have their computers
(“Cyber Tension”). Hackers are not stationary anymore, but work from laptops and other mobile
computers. Modern technology has allowed many hackers the ability to work from a laptop in
nearly any location. The world communication has created the downfall of secure, computerized
information through the use of the Internet, networks, satellites, and other modern innovations.
2. Perrin 2
Hackers do not need a direct hook to the source of information to steal it. They can break into the
systems through nearly any means (phone lines, Internet, etc). The technological advances of the
modern era have created the developing downfall of mass communication. Similarly Dr. Mizrach
stated, “Don't leave a trail or trace of [hacker’s] presence; don't call attention to [hacker] or
[hacking] exploits.” For instance, Hackers use tricks, viruses, and other techniques to break
through security systems. These tricks often disguise themselves as “working” programs, but
slowly steal information from the victim. Hackers cover their “tracks” through the use of viruses
which often cause havoc on the victim’s computer. Often the viruses create more back doors for
the hacker to return through later. Although the overall definition of hacking is diverse, the
specific problems with hacking are a more dominant matter.
The hacking epidemic can be linked through several key problems caused by
hackers. Unfortunately, hackers, independent or military, are capable of attacking strong
government servers if given time to test the system (Yam). Hackers can and have crippled entire
government -run installations. A prime example is the series of attacks on the Pentagon and
Lockheed Martin which resulted in stolen military data (“Report: Stolen”). Hackers are not
reckless, and they probe entire systems for weaknesses. These probes take weeks, or even years,
to successfully accomplish. Many of these weaknesses are not realized by the installations and
can cause severe damage to the facility. Another issue is that hackers create viruses, as stated by
Dr. Mizrach: “These are people who write code which attempts to a) reproduce itself on other
systems without authorization and b) often has a side effect, whether that be to display a
message, play a prank, or trash a hard drive.” These viruses create havoc, which allows the
hackers to easily breach security. Some examples are Trojan (which leaves back doors open),
Botnet (which allows for hacker control), and false programs or advertisements (Mizrach).
3. Perrin 3
Viruses also weaken the computers, and, if handled poorly, cripple entire networks. Hackers
craft viruses to make their breaches easier, while allowing for a clean escape. Another problem
comes from organized groups of hackers, like Anonymous or LolzSec (Saporito). Hackers, as
individuals, are a dangerous threat to any computer; however, an organized group of hackers is a
potentially fatal threat to entire networks. These groups are usually professional hackers and
know exactly where to find weaknesses in firewalls or security in computers. These attacks have
crippled military, government, civilian infrastructure, and even home entertainment. These
hackers are capable of breaching all levels of security, and only a few experts can accurately
counter these attacks. Hackers are a threat to all levels of technological use, unfortunately there
is no permanent solution.
Although there are not any permanent solutions, there are several methods of
preventions to hacking. Unknown to most, the tools created by hackers to break into systems can
also be used in a reverse method. The tools can be used to find security holes, back doors, and
other areas of weakness (Lemos). The very tools used by hackers can provide an antidote to
hacking. These tools allow companies or governments to improve their own defenses. However,
this temporary solution requires companies to work hand in hand with those that would cause
harm to their systems. Yet, not all hackers conduct illegal activities. Many work as Information
Technology specialists, or white caps, and help prevent hackers from breaking into the systems.
Currently, the focus is not just on traditional warfare, but on a larger cyber war. Hackers across
the world are involved in the attacks on different countries. Primarily, the United States and
China appear to be the forefront of the war (Yam). The United States and China can and do hack
each other. Their attacks steal everything from blueprints to meaningless emails. On the
contrary, the real issue here is the lack of funding governments put into IT, and the results of this
4. Perrin 4
deficit being a lack of ability to counter hacks. Governments are steadily increasing in their
activities revolving around the cyber war. Many governments have hired hackers as soldiers to
counter and attack other governments. Through this method, hackers are controlled by the
government and are focused on national enemies instead of civilians. Although a hacker has
been removed from a system, the operating system can still be infected. Computers need to be
reformatted, and the operating system reinstalled to prevent the hacker from reentering the
system (“Crucial Paradigm”). The computer can never return to a safe status once it has been
hacked. By reinstalling the system, the computer is given a clean slate against hackers. Hackers
can return to the computer like a common cold if actions are not made to prevent the attacks
again. Users have to re-secure the computer after an attack, and then reformat the computer to
make it stronger against hackers. Hackers are an incurable disease, and the future of hacking is
morbidly ill.
The outlook of preventing the hacking epidemic is not encouraging and without
any traces of a simple end. For example, the Conficker virus is a rapidly spreading virus that has
already infected nearly 30 percent of the computers internationally (“China Issues”). This virus
spreads across the Internet, and it is capable of hiding itself in multiple places across a computer.
It is just one example of how many computers can be affected by one hacker-made virus. The
Conficker virus is not a simple Trojan, but a combination of the strongest malware in the
Internet. It uses this combination to move quickly into thousands of computers every day and
across 200 countries total. As reported by Robert Lemos, “...but [hacker’s tools] can also be used
to secure them.” Hackers will always be around, so long as technology advances. Although
hackers can not be defeated, their tools can be reverse engineered to provide methods to counter
hackers. Yet, hackers are able to counter every attempt made to stop them through their own
5. Perrin 5
programming abilities. This programming war is impossible to win, since there is no end to the
increasing number of hackers. As stated earlier, hackers across the world are involved in the
attacks on different countries. Hackers are a fast rising threat to governments, yet few take the
initiative to combat it. Governments can barely counter attacks, and they have decreasing
budgets to improve these defenses. The rise in cyber warfare is shifting the way spying,1 or
espionage, is conducted. Now hackers are capable of stealing from facilities in all branches of
the government, and they face little repercussions for it. The government’s focus is on physical
warfare when the real threat comes from a cyber-based enemy. The outlook for hacking is a
tragedy in the making, and without any signs of a permanent end.
In spite of hacking, future generations need to go into computer programming because
the world demands people with the ability to program. Although hackers will never go away, this
issue should not deter any individual from this field. Computers are used in nearly every field
of work, and in order to get an edge on other workers, people need to have the ability to work
fluently with a computer. The future of many jobs will be in computer technology, and the job
fields will only increase from this change. Society changes with the flow of technology, which is
constantly evolving into more sophisticated ideas. Programmers will be at the forefront of these
changes and will provide the backbone of future ideas. Yet, Programmers will also be the wall
standing between hackers and the rest of the world. Programmers are the antibody to the hacking
disease, and the only applicable means of stopping hackers. Technology will always advance so
long as there are new ideas or inventions. Programmers provide the blood of these innovations,
and the ability to code will be essential. Programming is just like many fields, and shares the
same risk as any other job; however, the rewards from programming are sufficiently better.
6. Perrin 6
Works Cited
“China Issues Legal Interpretation to Tighten Grip on Hacking.” Xinhua. N.p., 29 Aug. 2011.
Web. 10 Sept. 2011. <http://news.xinhuanet.com/english2010/china/2011-08/29/
c_131082389.htm>.
“Hacking Attacks - Prevention.” Crucial Paradigm. N.p., n.d. Web. 28 Sept. 2011. <http://
www.crucialp.com/resources/tutorials/website-web-page-site-optimization/hacking-
attacks-prevention.php>.
Lemos, Robert. “Shades of gray at security conference.” CNET News. N.p., 2 May 2002. Web.
11 Sept. 2011. <http://news.cnet.com/2100-1001-897596.html?tag=txt>.
Mick, Jason. “Cyber Tension Flare Amoungst U.S., Chinese Military.” Daily
Tech. N.p., 12 Mar. 2008. Web. 8 Sept. 2011. <http://www.dailytech.com/
Cyber+Tensions+Flare+Amongst+US+Chinese+Military/article11045.htm>.
Mick, Jason.“Reports: Hackers Use Stolen RSA Information to Hack Lockheed Martin.”
Daily Tech. N.p., 30 May 2011. Web. 6 Sept. 2011. <http://www.dailytech.com/
Reports+Hackers+Use+Stolen+RSA+Information+to+Hack+Lockheed+Martin/
article21757.htm>.
Mizrach, Steven. “Is there a Hacker Ethic for 90s Hackers?” Old and New Hacker Ethics. N.p.,
n.d. Web. 11 Sept. 2011. <http://www2.fiu.edu/~mizrachs/hackethic.html>.
Saporito, Bill. “Hack Attack.” Time 4 July 2011: n. pag. Academic Search Complete. Web. 9
Sept. 2011. <http://proxygsu-sche.galileo.usg.edu/login?url=http://search.ebscohost.com/
login.aspx?direct=true&db=a9h&AN=61963642&site=ehost-live>.
Yam, Marcus. “Chinese Military Suspected of Hack on Pentagon.” Daily Tech.