Difference between revisions of "Hacking"

From Wikispooks
Jump to navigation Jump to search
m (rewording)
m (link to 'hacker' (should maybe be merged))
Line 2: Line 2:
 
|wikipedia=https://en.wikipedia.org/wiki/Hacker
 
|wikipedia=https://en.wikipedia.org/wiki/Hacker
 
|image=
 
|image=
|constitutes
+
|interests=hacker
 +
|constitutes=
 
|description=Breaking and entering computer systems
 
|description=Breaking and entering computer systems
 
}}
 
}}
Line 9: Line 10:
 
==By intelligence agencies==
 
==By intelligence agencies==
 
The difficulty of proving (or even of detecting) hacking by [[intelligence agencies]] has given them a more or less free hand in their hacking. Recently, however, they have sought to consolidate this ''de facto'' ability by claiming the legal right. The [[2016 Investigatory Powers Act]] awarded [[GCHQ]] the legal right to hack anyone it chose to.<ref>https://www.alphr.com/security/1010321/gchq-now-has-the-power-to-legally-hack-anyone</ref>
 
The difficulty of proving (or even of detecting) hacking by [[intelligence agencies]] has given them a more or less free hand in their hacking. Recently, however, they have sought to consolidate this ''de facto'' ability by claiming the legal right. The [[2016 Investigatory Powers Act]] awarded [[GCHQ]] the legal right to hack anyone it chose to.<ref>https://www.alphr.com/security/1010321/gchq-now-has-the-power-to-legally-hack-anyone</ref>
 +
 +
See also:
 +
{{FA|hacker}}
  
 
{{SMWDocs}}
 
{{SMWDocs}}

Revision as of 11:15, 29 May 2021

Concept.png Hacking Rdf-entity.pngRdf-icon.png
Interest of• Joseph Felter
• Guccifer
• Rogue Media Labs
• Dragos Ruiu
Breaking and entering computer systems

Hacking means gaining access to a computer system, or any other electronic system, for example via malware or zero day exploits.

By intelligence agencies

The difficulty of proving (or even of detecting) hacking by intelligence agencies has given them a more or less free hand in their hacking. Recently, however, they have sought to consolidate this de facto ability by claiming the legal right. The 2016 Investigatory Powers Act awarded GCHQ the legal right to hack anyone it chose to.[1]

See also:

Full article: hacker


 

An example

Page nameDescription
"Advanced persistent threat"A computer attack in which a person or group gains unauthorized access to a computer network and remains undetected for an extended period.

 

Related Documents

TitleTypePublication dateAuthor(s)Description
Document:CyberGuardian Cyber Security Education Programme for Children and Young Peoplebrainwashing concept paper30 January 2016Integrity InitiativeII puts lots of thought into how the military can train British children for cyberwarfare.
Document:Executive Summary Cyber Security Education Programme for Children and Young Peoplebrainwashing concept paper executive summary26 February 2016Integrity InitiativeII sums up its thought on how the military can train British children for cyberwarfare
Document:Hacker Generationsarticle23 August 2011Richard ThiemeOn the origins and real meaning of "Hacker"; a term which, in company with "conspiracy-theory", "Holocaust-denial" and many others has been co-opted/invented by Establishments to marginalise research deemed most threatening to the Official Narratives that define "Consensus trance" reality.
Document:Hacking on a Scale you can Barely Imaginearticle6 December 2012John PilgerOn the glaring omissions and hypocrisies of the Leveson Inquiry into Press standards, noting especially the vast covert programs of interception and permanent storage of every item of electronic communication on the planet for later data-mining wherever the state might deem it expedient to re-construct the life and movements of targetted individuals.
File:ICA 2017 01.pdfReport6 January 2017Director of National IntelligenceA 25 page report on joint US intelligence agencies assessment of alleged Russian interference in the 2016 Presidential election.
File:JAR 16-20296.pdfReport29 December 2016FBIJoint analysis report on alleged efforts by the Russian state to affect the outcome of the 2016 presidential election by means of computer hacking.
Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.



References


57px-Notepad icon.png This is a page stub. Please add to it.