Open Access Open Access  Restricted Access Subscription Access

The Professionalization Of The Hacker Industry


Affiliations
1 Syracuse University, United States
 

Society is inextricably dependent on the Internet and other globally interconnected infrastructures used in the provisioning of information services. The growth of information technology (IT) and information systems (IS) over the past decades has created an unprecedented demand for access to information. The implication of wireless mobility are great, and the commercial possibilities of new and innovative wireless flexibility are just beginning to be realized through the emergence of the Internet of Things (IoT). This article takes a look the history of hacking and professionalization of the hacker industry. As the hacker industry becomes more fully professionalized, it is becoming much more adaptive and flexible, making it harder for intelligence and law enforcement to confront. Furthermore, the hacker industry is blurring the distinction between motivated crime and traditional computer security threats - including the disruption of critical infrastructures or the penetration of networks.


User
Notifications
Font Size

  • Abosata, Nasr, Saba Al-Rubaye, Gokhan Inalhan, and Christos Emmanouilidis. "Internet of things for system integrity: a comprehensive survey on security, attacks and countermeasures for industrial applications." Sensors 21, no. 11 (2021): 3654.
  • Alexander, Bryce, and Adrian Baranchuk. "Cybersecurity and cardiac implantable electronic devices." Nature Reviews Cardiology 17, no. 6 (2020): 315-317.
  • Alleyne, Brian, and A. J. Treviño. "Computer hacking as a social problem." The Cambridge Handbook of Social Problems 2 (2018): 127-42.
  • Arief, Budi, and Denis Besnard. "Technical and human issues in computer-based systems security." School of Computing Science Technical Report Series (2003).
  • Beebe, N. L., & Guynes, J. (2006). A model for predicting hacker behavior. AMCIS 2006 Proceedings, 409.
  • Bizeul, David. "Russian business network study." unpublished paper, November 20 (2007).
  • Bradley, Nicholas, Michelle Alvarez, John Kuhn, and David McMillen. "IBM 2015 cyber security intelligence index." IBM Security (2015).
  • Burden, Kit, and Creole Palmer. "Internet crime: Cyber Crime—A new breed of criminal?." Computer Law & Security Review 19, no. 3 (2003): 222-227.
  • Casino, Fran, Nikolaos Totosis, Theodoros Apostolopoulos, Nikolaos Lykousas, and Constantinos Patsakis. "Analysis and correlation of visual evidence in campaigns of malicious office documents." arXiv preprint arXiv:2103.16143 (2021).
  • Chacko, Anil, and Thaier Hayajneh. "Security and privacy issues with IoT in healthcare." EAI Endorsed Transactions on Pervasive Health and Technology 4, no. 14 (2018).
  • Chantzis, Fotios, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou, and Beau Woods. Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things. No Starch Press, 2021.
  • Chettri, Lalit, and Rabindranath Bera. "A comprehensive survey on Internet of Things (IoT) toward 5G wireless systems." IEEE Internet of Things Journal 7, no. 1 (2019): 16-32.
  • Choo, Kim-Kwang Raymond. "Money laundering risks of prepaid stored value cards." Trends and Issues in Crime and Criminal Justice 363 (2008): 1-6.
  • Clark, David D., John Wroclawski, Karen R. Sollins, and Robert Braden. "Tussle in cyberspace: defining tomorrow's internet." In Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 347-356. 2002.
  • Clarke, Richard A., Robert K. Knake, and Cyber War. "The Next Threat to National Security and What to Do About It New York: Ecco, 2010, ss. 290."
  • Coleman, E. Gabriella, and Alex Golub. "Hacker practice: Moral genres and the cultural articulation of liberalism." Anthropological Theory 8, no. 3 (2008): 255-277.
  • Coleman, E. Gabriella. "The social construction of freedom in free and open source software: Hackers, ethics, and the liberal tradition." (2005): 2270-2270.
  • Cordesman, Anthony H., Justin G. Cordesman, and Justin G. Cordesman. Cyber-threats, information warfare, and critical infrastructure protection: defending the US homeland. Greenwood Publishing Group, 2002.
  • Cybenko, George, Annarita Giani, and Paul Thompson. "Cognitive hacking: A battle for the mind." Computer 35, no. 8 (2002): 50-56.
  • Davis, Robert WK, and Scott C. Hutchison. Computer crime in Canada: An introduction to technological crime and related legal issues. Carswell Legal Publications, 1997.
  • Davidson, Ron. "The fight against malware as a service." Network Security 2021, no. 8 (2021): 7-11.
  • Denning, Dorothy E. "Information Warfare and Security, Addsion-Wesley Longman." Inc., Reading, MA USA (1999).
  • Djenna, Amir, and Diamel Eddine Saïdouni. "Cyber attacks classification in IoT-based-healthcare infrastructure." In 2018 2nd Cyber Security in Networking Conference (CSNet), pp. 1-4. IEEE, 2018.
  • Ellis, Ryan, and Yuan Stevens. "Bounty Everything: Hackers and the Making of the Global Bug Marketplace." Available at SSRN 4009275 (2022).
  • Farsole, Ajinkya A., Amurta G. Kashikar, and Apurva Zunzunwala. "Ethical hacking." International Journal of Computer Applications 1, no. 10 (2010): 14-20.
  • Flickenger, Rob. Wireless hacks. " O'Reilly Media, Inc.", 2003.
  • Giani, Annarita. "Detection of attacks on cognitive channels." PhD diss., Dartmouth College, 2006.
  • Hafner, Katie, and John Markoff. Cyberpunk: outlaws and hackers on the computer frontier, revised. Simon and Schuster, 1995.
  • Hartmann, Björn, Scott Doorley, and Scott R. Klemmer. "Hacking, mashing, gluing: a study of opportunistic design and development." Pervasive Computing 7, no. 3 (2006): 46-54.
  • Hoath, Peter, and Tom Mulhall. "Hacking: Motivation and deterrence, part I." Computer Fraud & Security 1998, no. 4 (1998): 16-19.
  • Hollinger, Richard C. "Evidence that Computer Crime Follows a Guttman-Like Progression." Sociology and Social Research 72, no. 3 (1988): 199-200.
  • Holt, Thomas J. Hacks, cracks, and crime: An examination of the subculture and social organization of computer hackers. University of Missouri-Saint Louis, 2005.
  • Kagita, Mohan Krishna, Navod Thilakarathne, Thippa Reddy Gadekallu, Praveen Kumar Reddy Maddikunta, and Saurabh Singh. "A review on cyber crimes on the Internet of Things." In Deep Learning for Security and Privacy Preservation in IoT, pp. 83-98. Springer, Singapore, 2021.
  • Kramp, Thorsten, Rob van Kranenburg, and Sebastian Lange. "Introduction to the Internet of Things." In Enabling Things to Talk, pp. 1-10. Springer, Berlin, Heidelberg, 2013.
  • Lambet, Paul. "Equifax Data Breach, 143 Million Only Tip of the Iceberg." Int'l J. Data Protection Officer, Privacy Officer & Privacy Couns. 1 (2017): 30.
  • Lee, J. C. "Hacking the Nintendo Wii Remote. 2008." IEEE Pervasive Computing 7, no. 3 (2012).
  • Leeson, Peter T., and Christopher J. Coyne. "The economics of computer hacking." JL Econ. & Pol'y 1 (2005): 511.
  • Levy, Steven. Hackers: Heroes of the computer revolution. Vol. 14. Garden City, NY: Anchor Press/Doubleday, 1984.
  • Luiijf, Eric. "Understanding cyber threats and vulnerabilities." Critical infrastructure protection (2012): 52-67.
  • Liu, Simon, and Bruce Cheng. "Cyberattacks: Why, what, who, and how." IT professional 11, no. 3 (2009): 14-21.
  • Jahankhani, Hamid, and Ameer Al-Nemrat. "Global e-security." In International Conference on Global e-Security, pp. 3-9. Springer, Berlin, Heidelberg, 2008.
  • Jasanoff, S. "A sociology of Hackers." The Sociological Review 46, no. 4 (1998): 757-780.
  • Joffee, Rodney. "Cybercrime: the global epidemic at your network door." Network security 2010, no. 7 (2010): 4-7.
  • Matyus, Allison. "Facebook faces another huge data leak affecting 267 million users." Digital Trends 19 (2019).
  • Margolis, Joel, Tae Tom Oh, Suyash Jadhav, Young Ho Kim, and JeongNeyo Kim. "An in-depth analysis of the mirai botnet." In 2017 International Conference on Software Security and Assurance (ICSSA), pp. 6-12. IEEE, 2017.
  • Maurer, Tim. Cyber mercenaries. Cambridge University Press, 2018.
  • Milone, Mark. "Hacktivism: Securing the national infrastructure." Knowledge, Technology & Policy 16, no. 1 (2003): 75-103.
  • Mohurle, Savita, and Manisha Patil. "A brief study of wannacry threat: Ransomware attack 2017." International Journal of Advanced Research in Computer Science 8, no. 5 (2017): 1938-1940.
  • Mugweni, Benison, and Rose Mugweni. "New Patterns in Cyber Crime with the Confluence of IoT and Machine Learning." In ICT and Data Sciences, pp. 117-133. CRC Press, 2022.
  • Morris, Robert G., and George E. Higgins. "Criminological theory in the digital age: The case of social learning theory and digital piracy." Journal of Criminal Justice 38, no. 4 (2010): 470-480.
  • Ngo, Quoc-Dung, Huy-Trung Nguyen, Van-Hoang Le, and Doan-Hieu Nguyen. "A survey of IoT malware and detection methods based on static features." ICT Express 6, no. 4 (2020): 280-286.
  • Peace, A. Graham, Dennis F. Galletta, and James YL Thong. "Software piracy in the workplace: A model and empirical test." Journal of Management Information Systems 20, no. 1 (2003): 153-177.
  • Raymond, Eric S., ed. The new hacker's dictionary. Mit Press, 1996.
  • Rogers, Marc. "Psychological Theories of Crime and" Hacking"." (2000).
  • Sanders, Aaron D. "Teaching tip: Utilizing simple hacking techniques to teach system security and hacker identification." Journal of Information Systems Education 14, no. 1 (2003): 5.
  • Serror, Martin, Sacha Hack, Martin Henze, Marko Schuba, and Klaus Wehrle. "Challenges and opportunities in securing the industrial internet of things." IEEE Transactions on Industrial Informatics 17, no. 5 (2020): 2985-2996.
  • Smith, Katherine Taken, Murphy Smith, and Jacob Lawrence Smith. "Case studies of cybercrime and its impact on marketing activity and shareholder value." Academy of Marketing Studies Journal (2011).
  • Taylor, Paul. Hackers: Crime and the digital sublime. Routledge, 2012.
  • Thomas, Douglas. Hacker culture. U of Minnesota Press, 2002.
  • Tran-Dang, Hoa, Nicolas Krommenacker, Patrick Charpentier, and Dong-Seong Kim. "The Internet of Things for logistics: Perspectives, application review, and challenges." IETE Technical Review (2020): 1-29.
  • Turgeman-Goldschmidt, Orly. "Hackers' accounts: Hacking as a social entertainment." Social Science Computer Review 23, no. 1 (2005): 8-23.
  • Tyagi, Amit Kumar, Gillala Rekha, and N. Sreenath. "Beyond the hype: Internet of things concepts, security and privacy concerns." In Advances in decision sciences, image processing, security and computer vision, pp. 393-407. Springer, Cham, 2020.
  • Verma, Aastha, and Charu Shri. "Cyber Security: A Review of Cyber Crimes, Security Challenges and Measures to Control." Vision (2022): 09722629221074760.
  • Kramer, Franklin D., Stuart H. Starr, and Larry K. Wentz, eds. Cyberpower and national security. Potomac Books, Inc., 2009.
  • Wilson, S., P. Johnson, C. Kelly, J. Cunningham, and P. Markopoulos. "Beyond hacking: a model based approach to user interface design." People and computers (1993): 217-217.
  • Woo, Hyung-Jin. "The hacker mentality: Exploring the relationship between psychological variables and hacking activities." PhD diss., University of Georgia, 2003.
  • Zhang, Yipeng, Zhonghao Sun, Liqun Yang, Zhoujun Li, Qiang Zeng, Yueying He, and Xiaoming Zhang. "A11 your PLCS belong to me: ICS ransomware is realistic." In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 502-509. IEEE, 2020.
  • Zhang, Xiaolu, Oren Upton, Nicole Lang Beebe, and Kim-Kwang Raymond Choo. "IoT botnet forensics: A comprehensive digital forensic case study on Mirai botnet servers." Forensic Science International: Digital Investigation 32 (2020): 300926.
  • Zhao, Wenbing, Shunkun Yang, and Xiong Luo. "On threat analysis of IoT-based systems: A survey." In 2020 IEEE International Conference on Smart Internet of Things (SmartIoT), pp. 205-212. IEEE, 2020.
  • Zhongming, Zhu, Lu Linong, Yao Xiaona, Zhang Wangqiang, and Liu Wei. "How the United States Can Deter Ransomware Attacks." (2021).

Abstract Views: 257

PDF Views: 114




  • The Professionalization Of The Hacker Industry

Abstract Views: 257  |  PDF Views: 114

Authors

Tyson Brooks
Syracuse University, United States

Abstract


Society is inextricably dependent on the Internet and other globally interconnected infrastructures used in the provisioning of information services. The growth of information technology (IT) and information systems (IS) over the past decades has created an unprecedented demand for access to information. The implication of wireless mobility are great, and the commercial possibilities of new and innovative wireless flexibility are just beginning to be realized through the emergence of the Internet of Things (IoT). This article takes a look the history of hacking and professionalization of the hacker industry. As the hacker industry becomes more fully professionalized, it is becoming much more adaptive and flexible, making it harder for intelligence and law enforcement to confront. Furthermore, the hacker industry is blurring the distinction between motivated crime and traditional computer security threats - including the disruption of critical infrastructures or the penetration of networks.


References