The thief, the predator, the innovator: Defining ‘hacker' terms

Information Security Officer
,
OARnet and OH-TECH
Monday, November 16, 2015 - 11:18am

Hackers!!

When you see the word “hacker,” what do you think of?

The mischief-maker: The image of a hacker as a clever, curious, and misguided computer geek has been around at least since the 1983 movie War Games. This kind of hacker took pleasure in breaking into systems as an act of boredom or mischief. They hack into systems for the reason people climb a mountain: because it’s there. For a long time, hackers were mostly an annoyance to the average person. That image soon gave way to more modern variations, such as:

The thief: Hacking into systems is now one of the leading avenues for criminal fraud and theft. It’s not petty thieves either, but organized crime. Cybercrime is estimated by some reports to cost the global economy $400 billion per year. This is a cybercrime economy based on identity theft, compromised passwords, and stolen financial information. The tools this type of hacker uses are highly technical in nature: toolkits for creating viruses, botnets consisting of millions of compromised computers, even sites where you can purchase computer attacks by the hour.  This kind of hacker is better called for what they are: criminals. They hack into systems for the reason Willie Sutton is said to have robbed banks “because that’s where the money is.”

The predator, the hacktivist, the spy: Since so much of 21st-century life is spent online, the criminal threat isn’t confined to the economic sector. Cybercriminals use their tools and knowledge to abuse innocent victims and to target political enemies. Hacking is now a tool of statecraft as well as a weapon of war. Nation-state actors are responsible for a growing amount of illicit activity online. These newer types of hackers have transformed the way we build, use, and protect systems. In turn, this has led to increased spending on better tools, systems, and processes for protecting security and privacy. Higher education is no exception. Throughout the educational sector, we’re working harder than ever to protect students, faculty, and public partners from damage due to the rising tide of computer crime.

Like the autumn weather, the above views of the hacker make for a dark, dismal picture. So I’d like to remind everyone of a much brighter use for that much-maligned word “hacker.”

The innovator: This kind of hacker is “a person who enjoys exploring the details of programmable systems and stretching their capabilities,” not a security breaker. There’s a very positive, collaborative, and innovative nature to this kind of hacker culture. It’s not just about software, but really neat hardware and human interface stuff, too. Code fests and hackathons (like Ohio State’s OHI/O Hackathon and Kent State University’s Kent Hack Enough) are great examples of this kind of creative endeavor. As we at OH-TECH already know, there are innovative, promising students throughout Ohio creating amazing technology “hacks” – in the best sense of the word!

 

If all this “hacker” talk has made you want to take another look at how to protect yourself against cybersecurity threats, be sure to read our last blog for ways to fight off “tricksters.” And remember to follow us on social media where we regularly share tips and articles that will help you stay cybersafe: Facebook, Twitter, LinkedIn