Hackers and computer integrity crimes

Hackers and computer integrity crimes
Summary

Have you ever heard of crimes against the machine? Cybercrime attacking computer systems and networks is a crime in its own right – for example, to prevent users from gaining access to a system, or to steal information and ask for a ransom. Who’s behind these types of cybercrimes, and what motivates them? Calling them “hackers” is no longer enough. 

Who are hackers?

You can think of hacking like trespassing on someone’s property line in real life. 

For many years, hackers have been glorified by the media as young geniuses. However, nowadays, there is a defined distinction between White Hat hackers, who stay loyal to ethical principles, and Black Hat hackers, who are driven by criminal intent, financial or personal gain, or revenge. 

The hackers’ panorama, however, is more complex than that. Intermediate categories include Grey Hat, Green Hat, Blue Hat, Red Hat, Purple Hat and even Yellow Hat hackers. 

Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike.

Ethical hackers

Ethical hackers possess a high level of ethical standards with specialized knowledge and a belief in the freedom of accessing public information. They test systems with the purpose of improving their security and achieve higher quality standards.

Over the past two decades, ethical hacking has developed consistent practices that guide the curriculum for training. Ethical hackers are now integral to cybersecurity

Grey Areas
Unethical hacking

Unethical (or black hat) hackers maliciously and illegally search for vulnerabilities in systems to exploit for their personal gain. They are driven by a range of motivations, from financial or political gain, revenge, or simply to attract peer respect with their skills. 

There is a category of hackers that don’t want to be noticed for their skills: cyber-spies conducting political or industrial espionage. Cyber-espionage actors are engaged like mercenaries and can be of different types depending on their scope. 

Cyber-warfare has escalated in recent years, especially since Russia’s special operations in Ukraine in 2014 and 2022. The groups of hackers involved in these operations are ephemeral, often breaking up and forming again. Nation-state actors take advantage of the specific skills of these mercenary hackers, condoning the crime to pursue tactical objectives. 

Cyber-terrorists and information warfare

Cyber-terrorism targets critical physical infrastructure and services. Their purpose is to generate widespread fear and anxiety to manipulate the political agenda of a country. Information warfare is a nuanced version of cyber-terrorism, where the systems and data of a critical organization are held hostage and asked to pay a ransom for their release. A typical case is the Colonial Pipeline Ransomware attack carried out by a Russian-speaking group. 

Hacker tactics

Unlike how the media often portrays hackers, attacks follow a methodology. Cyberattacks are not as easy and spontaneous as they are portrayed. Hackers committing crimes against the machine often use one or a combination of the following techniques: 

Computer integrity crimes have been on the rise over the last decade, as more and more private and public infrastructure is digitized. The event of AI and quantum computing will assist the evolution of these techniques in ways that we still cannot imagine. 

Share this post :

PID Perspectives is migrating to European Servers. Please, let us know if you experience a slow response or technical issues.