Hacktivism: an Analysis of the Motive to Disseminate

Total Page:16

File Type:pdf, Size:1020Kb

Hacktivism: an Analysis of the Motive to Disseminate HACKTIVISM: AN ANALYSIS OF THE MOTIVE TO DISSEMINATE CONFIDENTIAL INFORMATION THESIS Presented to the Graduate Council of Texas State University-San Marcos in Partial Fulfillment of the Requirements for the Degree Master of SCIENCE by Warren V. Held, B.A. San Marcos, TX December 2012 HACKTIVISM: AN ANALYSIS OF THE MOTIVE TO DISSEMINATE CONFIDENTIAL INFORMATION Committee Members Approved: ______________________________ Jay D. Jamieson, Chair ______________________________ J. Pete Blair ______________________________ Jeffrey M. Cancino Approved: ____________________________ J. Michael Willoughby Dean of the Graduate College COPYRIGHT by Warren V. Held 2012 FAIR USE AND AUTHOR’S PERMISSION STATEMENT Fair Use This work is protected by the Copyright Laws of the United States (Public Law 94-553, section 107). Consistent with fair use as defined in the Copyright Laws, brief quotations from this material are allowed with proper acknowledgment. Use of this material for financial gain without the author’s express written permission is not allowed. Duplication Permission As the copyright holder of this work I, Warren V. Held, authorize duplication of this work, in whole or in part, for educational or scholarly purposes only. ACKNOWLEDGEMENTS I would like to thank the family members, friends, professors, and others who have lent support, assistance, and guidance throughout the course of my education. This manuscript was submitted on October 26th, 2012. v TABLE OF CONTENTS Page ACKNOWLEDGEMENTS ................................................................................................ v LIST OF TABLES ............................................................................................................. ix LIST OF FIGURES .............................................................................................................x CHAPTER I: INTRODUCTION ................................................................................................1 II: LITERATURE REVIEW ..................................................................................10 Expansionists and Instrumentalists ............................................................10 Hackers ......................................................................................................12 Hacktivists..................................................................................................19 Cyber Terrorists .........................................................................................20 Government Profiles ..................................................................................23 III: HISTORY ........................................................................................................28 IV: PROBLEM AND RESEARCH QUESTIONS ...............................................73 V: METHODOLOGY ...........................................................................................76 Stages 1 & 2: Data Sourcing and Transcription – Creating the Basis for Qualitative Analysis .................................................................78 Stage 3: Unitization – Choosing the Unit of Analysis and Dividing the Material into Coding Units ............................................................78 Stage 4: Categorization – Developing a Scheme of Categories Relevant to the Research Problem ...............................................................80 Stage 5: Coding – Assigning Category Codes to Text Units .....................82 VI: ANALYSIS .....................................................................................................83 Stage 1 & 2: Data Sourcing and Transcription ..........................................83 Stage 3: Unitization....................................................................................92 vi Stage 4: Categorization ..............................................................................94 Stage 5: Coding ..........................................................................................97 Analysis of Final Output ..........................................................................100 VII: DISCUSSION ..............................................................................................109 Research Questions ..................................................................................109 Expansionists and Instrumentalists ..........................................................110 Hackers and Hacktivism ..........................................................................112 Cyber Terrorism and Policy Implications ................................................112 VIII: CONCLUSION ...........................................................................................114 APPENDIX ......................................................................................................................117 Appendix A: X Factor Leaked Contestants Database..........................................118 Appendix B: Untitled [Fox Hack]........................................................................119 Appendix C: [LulzSec] Fox.com leakage phase 0/1/2/3 .....................................120 Appendix D: [ATM leak] ~LulzSec ....................................................................122 Appendix E: LulzSec hates Sony too...................................................................124 Appendix F: LulzSec Hack PBS.ORG ................................................................125 Appendix G: Re: "LulzSec Exposed" ..................................................................127 Appendix H: Sownage ........................................................................................128 Appendix I: Fuck FBI Fridayâ„¢ (FFF) ...............................................................130 Appendix J: RE: Unveillance...............................................................................132 Appendix K: Sownage 2 .....................................................................................133 Appendix L: Bethesda Internal Data ....................................................................134 Appendix M: LulzSec versus Bethesda & Senate.gov ........................................136 Appendix N: LulzSec - 1000th tweet statement .................................................138 Appendix O: Operation Anti-Security .................................................................140 Appendix P: LulzSec 2011 census released .........................................................141 Appendix Q: Snitches getting various stitches ....................................................143 Appendix R: Chinga La Migra ............................................................................144 Appendix S: 50 Days of Lulz...............................................................................145 Appendix T: Antisec01 ........................................................................................147 Appendix U: Chinga La Migra II.........................................................................148 Appendix V: Chinga La Migra III .......................................................................150 Appendix W: Turkish Takedown Thursday ........................................................151 Appendix X: Fuck FBI Friday II: IRC Federal ....................................................153 Appendix Y: Military Meltdown Monday: Mangling Booz Allen Hamilton ......154 Appendix Z: A message to PayPal, its customers, and our friends .....................158 Appendix AA: Fuck FBI Friday III: ManTech Mayhem .....................................159 Appendix BB: Shooting Sheriffs Saturday ..........................................................161 Appendix CC: Corrupt Brazil (Satiagraha) .........................................................164 Appendix DD: Fuck FBI Friday IV – Vanguard Defense Industries ..................167 Appendix EE: Texas Takedown Thursday: Chinga La Migra IV .......................169 vii Appendix FF: Fuck FBI Friday V: IACS Cybercrime Investigators Owned ......172 Appendix GG: International Association of Chiefs of Police Owned .................174 Appendix HH: AntiSec teaser 12/26....................................................................178 Appendix II: AntiSec teaser 12/29 (legit) ............................................................181 Appendix JJ: AntiSec teaser 12/29 ......................................................................183 Appendix KK: CSLEA Hacked/Defaced or some rubbish, happy new year ......186 Appendix LL: Puckett & Faraj Lawfirm – Hadidtha ...........................................195 Appendix MM: Boston Police Department Defacement .....................................197 Appendix NN: FTC JACKHAMMERBUTTRAEPD BY ANONYMOUS ANTISEC .....................................................................................198 LITERATURE CITED ....................................................................................................201 viii LIST OF TABLES Table Page Table 1: Intercoder Consistency Comparisons ................................................................. 94 Table 2: Final Category Hierarchy Scheme ...................................................................... 95 Table 3: Example of Assigning Thought Units a Category .............................................. 97 Table 4: Intercoder Consistency-Matrix ........................................................................... 99 Table 5: High and Mid Level Categories Frequencies ..................................................
Recommended publications
  • (U//Fouo) Assessment of Anonymous Threat to Control Systems
    UNCLASSIFIED//FOR OFFICIAL USE ONLY A‐0020‐NCCIC / ICS‐CERT –120020110916 DISTRIBUTION NOTICE (A): THIS PRODUCT IS INTENDED FOR MISION PARTNERS AT THE “FOR OFFICIAL USE ONLY” LEVEL, ACROSS THE CYBERSECURITY, CRITICAL INFRASTRUCTURE AND / OR KEY RESOURCES COMMUNITY AT LARGE. (U//FOUO) ASSESSMENT OF ANONYMOUS THREAT TO CONTROL SYSTEMS EXECUTIVE SUMMARY (U) The loosely organized hacking collective known as Anonymous has recently expressed an interest in targeting inDustrial control systems (ICS). This proDuct characterizes Anonymous’ capabilities and intent in this area, based on expert input from DHS’s Control Systems Security Program/Industrial Control Systems Cyber Emergency Response Team (ICS‐CERT) in coordination with the other NCCIC components. (U//FOUO) While Anonymous recently expressed intent to target ICS, they have not Demonstrated a capability to inflict Damage to these systems, instead choosing to harass and embarrass their targets using rudimentary attack methoDs, readily available to the research community. Anonymous does have the ability to impact aspects of critical infrastructure that run on common, internet accessible systems (such as web‐based applications and windows systems) by employing tactics such as denial of service. Anonymous’ increased interest may indicate intent to Develop an offensive ICS capability in the future. ICS‐CERT assesses that the publically available information regarding exploitation of ICS coulD be leveraged to reDuce the amount of time to develop offensive ICS capabilities. However, the lack of centralized leadership/coordination anD specific expertise may pose challenges to this effort. DISCUSSION (U//FOUO) Several racist, homophobic, hateful, and otherwise maliciously intolerant cyber and physical inciDents throughout the past Decadea have been attributeD to Anonymous, though recently, their targets and apparent motivations have evolved to what appears to be a hacktivist1 agenda.
    [Show full text]
  • Identifying Threats Associated with Man-In-The-Middle Attacks During Communication Between a Mobile Device and the Back End Server in Mobile Banking Applications
    IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. IX (Mar-Apr. 2014), PP 35-42 www.iosrjournals.org Identifying Threats Associated With Man-In-The-Middle Attacks during Communication between a Mobile Device and the Back End Server in Mobile Banking Applications Anthony Luvanda1,*Dr Stephen Kimani1 Dr Micheal Kimwele1 1. School of Computing and Information Technology, Jomo Kenyatta University of Agriculture and Technology, PO Box 62000-00200 Nairobi Kenya Abstract: Mobile banking, sometimes referred to as M-Banking, Mbanking or SMS Banking, is a term used for performing balance checks, account transactions, payments, credit applications and other banking transactions through a mobile device such as a mobile phone or Personal Digital Assistant (PDA). Mobile banking has until recently most often been performed via SMS or the Mobile Web. Apple's initial success with iPhone and the rapid growth of phones based on Google's Android (operating system) have led to increasing use of special client programs, called apps, downloaded to the mobile device hence increasing the number of banking applications that can be made available on mobile phones . This in turn has increased the popularity of mobile device use in regards to personal banking activities. Due to the characteristics of wireless medium, limited protection of the nodes, nature of connectivity and lack of centralized managing point, wireless networks tend to be highly vulnerable and more often than not they become subjects of attack. This paper proposes to identify potential threats associated with communication between a mobile device and the back end server in mobile banking applications.
    [Show full text]
  • * "What Tech Skills Are Hot for 2006
    Ειδήσεις για την ΑΣΦΑΛΕΙΑ στις ΤΠΕ απ’ όλο τον κόσμο... Δελτίο 91 23 Σεπτέμβρη 2007 UM Software Tools May Key Successful Antiterrorism, Military and Diplomatic Ac- tions, University of Maryland (09/13/07), L. Tune The University of Maryland Institute for Advanced Computer Studies (UMIACS) has deve- loped computer analysis software to provide rapid information on terrorists and the cultural and political climate on the ground in areas of critical interest. The new computer models and databases could help policymakers and military leaders predict the behavior of political, eco- nomic, and social groups. UMIACS director and professor of computer science V. Subrah- manian says US commanders probably knew where Osama bin Laden was, but were unable to capture him because troops on the group did not have enough cultural knowledge to suc- cessfully negotiate with the locals. Subrahmanian says such failures can be avoided if decisi- on makers have access to pertinent data and accurate models of behavior. The software tools developed by Subrahmanian and his colleagues track information on foreign groups in a vari- ety of sources, including news sources, blogs, and online video libraries. The software can al- most instantly search the entire Internet for information and links on a terrorist suspect or ot- her particular person, group, or other topic of interest. Additionally, with help from social scientists at the University of Maryland, UMIACS computer scientists developed methods to obtain rules governing the behaviors of different groups in foreign areas, including about 14,000 rules on Hezbollah alone. Scientists Use the "Dark Web" to Snag Extremists and Terrorists Online National Science Foundation (09/10/07) University of Arizona Artificial Intelligence Lab researchers have created the Dark Web pro- ject with the intention of systematically collecting and analyzing all terrorist-generated con- tent on the Web.
    [Show full text]
  • Protecting Sensitive and Personal Information from Ransomware-Caused Data Breaches
    Protecting Sensitive and Personal Information from Ransomware-Caused Data Breaches OVERVIEW Over the past several years, the Cybersecurity and Infrastructure Security Ransomware is a serious and increasing threat to all government and Agency (CISA) and our partners have responded to a significant number of private sector organizations, including ransomware incidents, including recent attacks against a U.S. pipeline critical infrastructure organizations. In company and a U.S. software company, which affected managed service response, the U.S. government providers (MSPs) and their downstream customers. launched StopRansomware.gov, a centralized, whole-of-government Ransomware is malware designed to encrypt files on a device, rendering webpage providing ransomware files and the systems that rely on them unusable. Traditionally, malicious resources, guidance, and alerts. actors demand ransom in exchange for decryption. Over time, malicious actors have adjusted their ransomware tactics to be more destructive and impactful. Malicious actors increasingly exfiltrate data and then threaten to sell or leak it—including sensitive or personal information—if the ransom is not paid. These data breaches can cause financial loss to the victim organization and erode customer trust. All organizations are at risk of falling victim to a ransomware incident and are responsible for protecting sensitive and personal data stored on their systems. This fact sheet provides information for all government and private sector organizations, including critical infrastructure organizations, on preventing and responding to ransomware-caused data breaches. CISA encourages organizations to adopt a heightened state of awareness and implement the recommendations below. PREVENTING RANSOMWARE ATTACKS 1. Maintain offline, encrypted backups of data and regularly test your backups.
    [Show full text]
  • Post-Truth Protest: How 4Chan Cooked Up...Zagate Bullshit | Tuters
    5/5/2019 Post-Truth Protest: How 4chan Cooked Up the Pizzagate Bullshit | Tuters | M/C Journal M/C JOURNAL Home > Vol 21, No 3 (2018) > Tuters ARTICLE TOOLS HOME Post-Truth Protest: How 4chan Cooked Up the Pizzagate Bullshit PRINT THIS ARTICLE Marc Tuters, Emilija Jokubauskaitė, Daniel Bach CURRENT ISSUE INDEXING METADATA HOW TO CITE ITEM UPCOMING ISSUES Introduction FINDING REFERENCES ARCHIVES On 4 December 2016, a man entered a Washington, D.C., pizza parlor armed with an AR­15 assault rifle in an attempt to save the victims of an alleged satanic pedophilia ring run by EMAIL THIS ARTICLE CONTRIBUTORS prominent members of the Democratic Party. While the story had already been discredited (LOGIN REQUIRED) (LaCapria), at the time of the incident, nearly half of Trump voters were found to give a ABOUT M/C JOURNAL measure of credence to the same rumors that had apparently inspired the gunman (Frankovic). EMAIL THE AUTHOR Was we will discuss here, the bizarre conspiracy theory known as "Pizzagate" had in fact (LOGIN REQUIRED) USER HOME originated a month earlier on 4chan/pol/, a message forum whose very raison d’être is to protest against “political correctness” of the liberal establishment, and which had recently ABOUT THE AUTHORS JOURNAL CONTENT become a hub for “loose coordination” amongst members the insurgent US ‘alt­right’ movement Marc Tuters SEARCH (Hawley 48). Over a period of 25 hours beginning on 3 November 2016, contributors to the /pol/ forum combed through a cache of private e­mails belonging to Hillary Clinton’s campaign https://oilab.eu manager John Podesta, obtained by Russian hackers (Franceschi­Bicchierai) and leaked by University of Amsterdam SEARCH SCOPE Julian Assange (Wikileaks).
    [Show full text]
  • About the Sony Hack
    All About the Sony Hack Sony Pictures Entertainment was hacked in late November by a group called the Guardians of Peace. The hackers stole a significant amount of data off of Sony’s servers, including employee conversations through email and other documents, executive salaries, and copies of unreleased January/February 2015 Sony movies. Sony’s network was down for a few days as administrators worked to assess the damage. According to the FBI, the hackers are believed have ties with the North Korean government, which has denied any involvement with the hack and has even offered to help the United States discover the identities of the hackers. Various analysts and security experts have stated that it is unlikely All About the Sony Hack that the North Korean government is involved, claiming that the government likely doesn’t have the Learn how Sony was attacked and infrastructure to succeed in a hack of this magnitude. what the potential ramifications are. The hackers quickly turned their focus to an upcoming Sony film, “The Interview,” a comedy about Securing Your Files in Cloud two Americans who assassinate North Korean leader Kim Jong-un. The hackers contacted Storage reporters on Dec. 16, threatening to commit acts of terrorism towards people going to see the Storing files in the cloud is easy movie, which was scheduled to be released on Dec. 25. Despite the lack of credible evidence that and convenient—but definitely not attacks would take place, Sony decided to postpone the movie’s release. On Dec. 19, President risk-free. Obama went on record calling the movie’s cancelation a mistake.
    [Show full text]
  • “Hackers and Hacking Attacks”- Magician and Their Magic Wand For
    ISSN XXXX XXXX © 2019 IJESC Research Article Volume 9 Issue No. 5 “Hackers and Hacking Attacks”- Magician and Their Magic Wand for Security Breech Manish JitendrabhaiVankani Department of SOE – MCA RK University, Rajkot, Gujarat, India Abstract: In Modern era, each and every data is available online. Any person across the world can access that data very easily. Some people use this data to gain the information while other people use this data to fulfil their malicious intent. There are lots of methods used for protection of data but the hacker is far more intelligent to hack the security. There are main two types of hackers that are different from each other on the basis of their purpose. The one who tries to break the computer system’s security with malicious intention is known as bad hacker or cracker. The other one who has good purpose is known as ethical hacker because he uses his skills to provide security to sensitive data of big firms.In this paper I describe the types of Hackers,Ethical hacking,typesof Hacking attacks and Hacking tools. Keywords: Ethical hackers, Hacking, cracker. I. INTRODUCTION: hardware as well as software. Hacker is a computer dedicated and expert in a programming language, security, and networks. As the computer technology enhances, it has its darker side He is kind of person who loves to gain knowledge ofdifferent also. In modern era the need of the internet is growing rapidly. technologies, details of the computer system and enhances his Enormous amount of data is moving online, therefore, data capability and skills.
    [Show full text]
  • Download Download
    Proceedings of the Fifteenth International AAAI Conference on Web and Social Media (ICWSM 2021) A Large Open Dataset from the Parler Social Network Max Aliapoulios1, Emmi Bevensee2, Jeremy Blackburn3, Barry Bradlyn4, Emiliano De Cristofaro5, Gianluca Stringhini6, Savvas Zannettou7 1New York University, 2SMAT, 3Binghamton University, 4University of Illinois at Urbana-Champaign, 5University College London, 6Boston University, 7Max Planck Institute for Informatics [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] Abstract feasible in technical terms to create a new social media plat- Parler is as an “alternative” social network promoting itself form, but marketing the platform towards specific polarized as a service that allows to “speak freely and express yourself communities is an extremely successful strategy to bootstrap openly, without fear of being deplatformed for your views.” a user base. In other words, there is a subset of users on Twit- Because of this promise, the platform become popular among ter, Facebook, Reddit, etc., that will happily migrate to a new users who were suspended on mainstream social networks platform, especially if it advertises moderation policies that for violating their terms of service, as well as those fearing do not restrict the growth and spread of political polariza- censorship. In particular, the service was endorsed by several tion, conspiracy theories, extremist ideology, hateful and vi- conservative public figures, encouraging people to migrate olent speech, and mis- and dis-information. from traditional social networks. After the storming of the US Capitol on January 6, 2021, Parler has been progressively de- Parler.
    [Show full text]
  • The Watergate Story (Washingtonpost.Com)
    The Watergate Story (washingtonpost.com) Hello corderoric | Change Preferences | Sign Out TODAY'S NEWSPAPER Subscribe | PostPoints NEWS POLITICS OPINIONS BUSINESS LOCAL SPORTS ARTS & GOING OUT JOBS CARS REAL RENTALS CLASSIFIEDS LIVING GUIDE ESTATE SEARCH: washingtonpost.com Web | Search Archives washingtonpost.com > Politics> Special Reports 'Deep Throat' Mark Felt Dies at 95 The most famous anonymous source in American history died Dec. 18 at his home in Santa Rosa, Calif. "Whether ours shall continue to be a government of laws and not of men is now before Congress and ultimately the American people." A curious crime, two young The courts, the Congress and President Nixon refuses to After 30 years, one of reporters, and a secret source a special prosecutor probe release the tapes and fires the Washington's best-kept known as "Deep Throat" ... the burglars' connections to special prosecutor. A secrets is exposed. —Special Prosecutor Archibald Cox after his Washington would be the White House and decisive Supreme Court firing, Oct. 20, 1973 changed forever. discover a secret taping ruling is a victory for system. investigators. • Q&A Transcript: John Dean's new book "Pure Goldwater" (May 6, 2008) • Obituary: Nixon Aide DeVan L. Shumway, 77 (April 26, 2008) Wg:1 http://www.washingtonpost.com/wp-srv/politics/special/watergate/index.html#chapters[6/14/2009 6:06:08 PM] The Watergate Story (washingtonpost.com) • Does the News Matter To Anyone Anymore? (Jan. 20, 2008) • Why I Believe Bush Must Go (Jan. 6, 2008) Key Players | Timeline | Herblock
    [Show full text]
  • S.C.R.A.M. Gazette
    MARCH EDITION Chief of Police Dennis J. Mc Enerney 2017—Volume 4, Issue 3 S.c.r.a.m. gazette FBI, Sheriff's Office warn of scam artists who take aim at lonely hearts DOWNTOWN — The FBI is warning of and report that they have sent thousands of "romance scams" that can cost victims dollars to someone they met online,” Croon thousands of dollars for Valentine's Day said. “And [they] have never even met that weekend. person, thinking they were in a relationship with that person.” A romance scam typically starts on a dating or social media website, said FBI spokesman If you meet someone online and it seems "too Garrett Croon. A victim will talk to someone good to be true" and every effort you make to online for weeks or months and develop a meet that person fails, "watch out," Croon relationship with them, and the other per- Croon said. warned. Scammers might send photos from son sometimes even sends gifts like flowers. magazines and claim the photo is of them, say Victims can be bilked for hundreds or thou- they're in love with the victim or claim to be The victim and the other person are never sands of dollars this way, and Croon said the unable to meet because they're a U.S. citizen able to meet, with the scammer saying they most common victims are women who are 40 who is traveling or working out of the coun- live or work out of the country or canceling -60 years old who might be widowed, di- try, Croon said.
    [Show full text]
  • The Elders Call on the World to Wake up to the Threats of Nuclear War and Climate Disaster As They Unveil the 2020 Doomsday Clock
    The Elders call on the world to wake up to the threats of nuclear war and climate disaster as they unveil the 2020 Doomsday Clock WASHINGTON D.C., 23 January 2020 Mary Robinson, Chair of The Elders and former President of Ireland, and Ban Ki-moon, Deputy Chair of The Elders and former United Nations Secretary-General, today joined experts from the Bulletin of Atomic Scientists for the unveiling of the Doomsday Clock in Washington DC, an annual assessment of the existential risks faced by humanity. The Clock’s hands were moved forward to 100 seconds to midnight - the closest to midnight they have been since they were first set in 1947. The decision takes into account the precarious state of nuclear arms controls, the growing threat of climate disaster, and how these can be compounded by disruptive new technologies. “Our planet faces two concurrent existential threats: the climate crisis and nuclear weapons. We are faced by a gathering storm of extinction-level consequences, and time is running out,” Mary Robinson said. The Elders specifically called on President Trump to respond to Russian President Vladimir Putin’s offer to open negotiations on New START, which will expire in February 2021 unless the agreement between Washington and Moscow is extended. Following the termination of the Intermediate-Range Nuclear Forces (INF) Treaty in July 2019, the end of New START would mean there was no remaining arms control treaty in force between the United States and Russia, raising the prospect of a new nuclear arms race. The Elders reiterated their proposals for a “nuclear minimisation”i agenda as the best way of making progress towards complete disarmament by the five Permanent Members of the UN Security Council and all other nuclear powers.
    [Show full text]
  • Black Hat Hacker White Hat Hacker Gray Hat Hacker
    Crackers or Malicious Hackers: System crackers attempt to access computing facilities for which they have not been authorized. Cracking a computer's defenses is seen as the ultimate victimless crime. The perception is that nobody is hurt or even endangered by a little stolen machine time. Crackers enjoy the simple challenge of trying to log in, just to see whether it can be done. Most crackers can do their harm without confronting anybody, not even making a sound. In the absence of explicit warnings not to trespass in a system, crackers infer that access is permitted. Others attack for curiosity, personal gain, or self-satisfaction. And still others enjoy causing chaos, loss, or harm. There is no common profile or motivation for these attackers. Classification of Hackers: Hackers can be classified broadly into three different categories: 1. Black Hat Hacker 2. White Hat Hacker 3. Grey Hat Hacker Black Hat Hacker Black-hat Hackers are also known as an Unethical Hacker or a Security Cracker. These people hack the system illegally to steal money or to achieve their own illegal goals. They find banks or other companies with weak security and steal money or credit card information. They can also modify or destroy the data as well. Black hat hacking is illegal. White Hat Hacker White hat Hackers are also known as Ethical Hackers or a Penetration Tester. White hat hackers are the good guys of the hacker world. These people use the same technique used by the black hat hackers. They also hack the system, but they can only hack the system that they have permission to hack in order to test the security of the system.
    [Show full text]