O'Reilly logo

HIGH-TECH CRIMES REVEALED: CYBERWAR STORIES FROM THE DIGITAL FRONT by Steven Branigan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Know Your Adversary

”Who is the typical hacker?” Come on, be honest…the usual answer that I have heard is “a bright young male who is anti-social and a loner.” This is certainly the type that we usually catch, but there are other types, including the streetwise criminal elements that we met in earlier chapters. Realize that early on, the solvable cases (and the easy arrests) were the ones that left a calling card, such as their own IP addresses in the logs of the systems they had compromised. These hackers were asking to be caught.

Over time, we have improved our ability to catch the more devious hackers. And as we did, we have learned that they are more than just the script-kiddies (a term explained in more detail in Chapter 9) looking to satisfy ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required