Hacking back

Last updated

Hacking back is a technique to counter cybercrime by hacking the computing devices of the attacker.

The effectiveness [1] [2] [3] and ethics of hacking back is disputed. [4]

It is also very disputed if it is legal or not, however both participating parties can still be prosecuted for their crimes.

There was a bill proposed in 2017 to make this possible, ended consideration in 2019. In 2022 it reappeared.[ clarification needed ]

Further reading

Related Research Articles

A shock site is a website that is intended to be offensive or disturbing to its viewers, though it can also contain elements of humor or evoke sexual arousal. Shock-oriented websites generally contain material that is pornographic, scatological, racist, antisemitic, sexist, graphically violent, insulting, vulgar, profane, or otherwise of some other provocative nature. Websites that are primarily fixated on real death and graphic violence are particularly referred to as gore sites. Some shock sites display a single picture, animation, video clip or small gallery, and are circulated via email or disguised in posts to discussion sites as a prank. Steven Jones distinguishes these sites from those that collect galleries where users search for shocking content, such as Rotten.com. Gallery sites can contain beheadings, execution, electrocution, suicide, murder, stoning, torching, police brutality, hangings, terrorism, cartel violence, drowning, vehicular accidents, war victims, rape, necrophilia, genital mutilation and other sexual crimes.

<span class="mw-page-title-main">Hacker</span> Person skilled in information technology

A hacker is a person skilled in information technology who achieves goals by non-standard means. The term has become associated in popular culture with a security hacker – someone with knowledge of bugs or exploits to break into computer systems and access data which would otherwise be inaccessible to them. In a positive connotation, though, hacking can also be utilized by legitimate figures in legal situations. For example, law enforcement agencies sometimes use hacking techniques to collect evidence on criminals and other malicious actors. This could include using anonymity tools to mask their identities online and pose as criminals.

<span class="mw-page-title-main">Hacktivism</span> Computer-based activities as a means of protest

Internet activism, hacktivism, or hactivism, is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. With roots in hacker culture and hacker ethics, its ends are often related to free speech, human rights, or freedom of information movements.

<span class="mw-page-title-main">Phishing</span> Form of social engineering

Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim navigates the site, and transverses any additional security boundaries with the victim. As of 2020, it is the most common type of cybercrime, with the FBI's Internet Crime Complaint Center reporting more incidents of phishing than any other type of cybercrime.

A consultant is a professional who provides advice or services in an area of specialization. Consulting services generally fall under the domain of professional services, as contingent work.

<span class="mw-page-title-main">United States Office of Personnel Management</span> United States federal government agency

The United States Office of Personnel Management (OPM) is an independent agency of the United States government that manages the United States federal civil service. The agency provides federal human resources policy, oversight, and support, and tends to healthcare (FEHB), life insurance (FEGLI), and retirement benefits for federal government employees, retirees, and their dependents.

<span class="mw-page-title-main">Free and open-source software</span> Software whose source code is available and which is permissively licensed

Free and open-source software (FOSS) is software that is available under a license that grants the right to use, modify, and distribute the software, modified or not, to everyone free of charge. The public availability of the source code is, therefore, a necessary but not sufficient condition. FOSS is an inclusive umbrella term for free software and open-source software. FOSS is in contrast to proprietary software, where the software is under restrictive copyright or licensing and the source code is hidden from the users.

<span class="mw-page-title-main">Hackathon</span> Event in which groups of software developers work at an accelerated pace

A hackathon is an event where people engage in rapid and collaborative engineering over a relatively short period of time such as 24 or 48 hours. They are often run using agile software development practices, such as sprint-like design wherein computer programmers and others involved in software development, including graphic designers, interface designers, product managers, project managers, domain experts, and others collaborate intensively on engineering projects, such as software engineering.

A smart contract is a computer program or a transaction protocol that is intended to automatically execute, control or document events and actions according to the terms of a contract or an agreement. The objectives of smart contracts are the reduction of need for trusted intermediators, arbitration costs, and fraud losses, as well as the reduction of malicious and accidental exceptions. Smart contracts are commonly associated with cryptocurrencies, and the smart contracts introduced by Ethereum are generally considered a fundamental building block for decentralized finance (DeFi) and non-fungible token (NFT) applications.

Legal status of <i>Salvia divinorum</i> Psychoactive plant, legal in most countries

Salvia divinorum, a psychoactive plant, is legal in most countries. Exceptions, countries where there is some form of control, include Australia, Belgium, Brazil, Canada, Denmark, Estonia, Finland, Germany, Iceland, Ireland, Italy, Japan, South Korea, Norway, Poland, United Kingdom, Ukraine, Spain, Sweden, Vietnam, Armenia and 33 states and territories of the United States.

The ethics of artificial intelligence covers a broad range of topics within the field that are considered to have particular ethical stakes. This includes algorithmic biases, fairness, automated decision-making, accountability, privacy, and regulation. It also covers various emerging or potential future challenges such as machine ethics, lethal autonomous weapon systems, arms race dynamics, AI safety and alignment, technological unemployment, AI-enabled misinformation, how to treat certain AI systems if they have a moral status, artificial superintelligence and existential risks.

<span class="mw-page-title-main">Do-it-yourself biology</span> Biotechnological social movement

Do-it-yourself biology is a biotechnological social movement in which individuals, communities, and small organizations study biology and life science using the same methods as traditional research institutions. DIY biology is primarily undertaken by individuals with limited research training from academia or corporations, who then mentor and oversee other DIY biologists with little or no formal training. This may be done as a hobby, as a not-for-profit endeavor for community learning and open-science innovation, or for profit, to start a business.

Cyberweapons are commonly defined as malware agents employed for military, paramilitary, or intelligence objectives as part of a cyberattack. This includes computer viruses, trojans, spyware, and worms that can introduce malicious code into existing software, causing a computer to perform actions or processes unintended by its operator.

<span class="mw-page-title-main">Kali Linux</span> Debian-based Linux distribution for penetration testing

Kali Linux is a Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security. The software is based on the Debian Testing branch: most packages Kali uses are imported from the Debian repositories. The tagline of Kali Linux and BackTrack is "The quieter you become, the more you are able to hear", which is displayed on some backgrounds.

On December 23, 2015, the power grid in two western oblasts of Ukraine was hacked, which resulted in power outages for roughly 230,000 consumers in Ukraine for 1-6 hours. The attack took place during the ongoing Russo-Ukrainian War (2014-present) and is attributed to a Russian advanced persistent threat group known as "Sandworm". It is the first publicly acknowledged successful cyberattack on a power grid.

Cryptocurrency and crime describe notable examples of cybercrime related to theft of cryptocurrencies and some methods or security vulnerabilities commonly exploited. Cryptojacking is a form of cybercrime specific to cryptocurrencies that have been used on websites to hijack a victim's resources and use them for hashing and mining cryptocurrency.

<span class="mw-page-title-main">2022 Philippine general election</span> National, provincial, and local elections in the country

The 2022 Philippine general election took place on May 9, 2022, for the executive and legislative branches of government at every level – national, provincial, and local – except for the barangay officials.

Regulation of artificial intelligence is the development of public sector policies and laws for promoting and regulating artificial intelligence (AI). It is part of the broader regulation of algorithms. The regulatory and policy landscape for AI is an emerging issue in jurisdictions worldwide, including for international organizations without direct enforcement power like the IEEE or the OECD.

<span class="mw-page-title-main">Russo-Ukrainian cyberwarfare</span> Informatic component of the confrontation between Russia and Ukraine

Cyberwarfare is a component of the confrontation between Russia and Ukraine since the Revolution of Dignity in 2013-2014. While the first attacks on information systems of private enterprises and state institutions of Ukraine were recorded during mass protests in 2013, Russian cyberweapon Uroburos had been around since 2005. Russian cyberwarfare continued with the 2015 Ukraine power grid hack at Christmas 2015 and again in 2016, paralysis of the State Treasury of Ukraine in December 2016, a Mass hacker supply-chain attack in June 2017 and attacks on Ukrainian government websites in January 2022.

References

  1. Kassner, Michael (2021-09-21). "Is hacking back effective, or does it just scratch an evolutionary itch?". TechRepublic. Archived from the original on 2022-11-23. Retrieved 2022-09-25.
  2. Nachreiner, Corey (2022-01-28). "The pros and cons of the proposed hack back bill". SC Media. Archived from the original on 2022-09-25. Retrieved 2022-09-25.
  3. Rundle, James (2021-10-18). "Cyber Private Eyes Go After Hackers, Without Counterattacking". Wall Street Journal. ISSN   0099-9660. Archived from the original on 2024-09-01. Retrieved 2022-09-25.
  4. Holzer, Corey T.; Lerums, James E. (May 2016). "The ethics of hacking back". 2016 IEEE Symposium on Technologies for Homeland Security (HST). pp. 1–6. doi:10.1109/THS.2016.7568877. ISBN   978-1-5090-0770-7. S2CID   27913483. Archived from the original on 2022-09-29. Retrieved 2022-12-23.