Reviews Clifford Stoll's journal article "Stalking the Wily Hacker" about the hacker attack on the Lawrence Berkeley Laboratory (LBL) beginning in 1986, now a part of computer and Internet history.
# 149967 | 1,895 words | 7 sources | APA | 2012 |
Published on Jan 16, 2012 in English (Analysis) , Computer and Technology (Internet) , Criminology (General)
$19.95 Buy and instantly download this paper now
This paper relates that Clifford Stoll's article "Stalking the Wily Hacker", which begins before the full commercialization of the Internet, underscores that the new generation of information technologist and computer engineers should appreciate the security tools that they now have as compared to their forebears. Next, the author analyzes Stoll's questions as to why an intruder would hit Lawrence Berkeley Laboratory (LBL) when it did not handle any classified programs and would use no new methods for breaking operating systems but rather repeatedly applied techniques documented elsewhere. The paper stresses that many lessons can be learned from this article that are applicable today, such as hackers are persistent because the rewards today are not only fame or glory in the hacker world but also financial.
From the Paper:"To truly appreciate the Stoll's story it is important to go back first to the mid-1980s and know what the social, political, environmental and economic conditions were. The event began in August 1986 and concluded in late 1987. At that time, Ronald Reagan was the President of the United States and it was still the height of the Cold War. Two despotic rulers, Jean-Claude Duvalier of Haiti and Ferdinand Marcos of the Philippines fell from power and went on exile to escape the wrath of the nations they enslaved. One of the worst nuclear accidents occurred in Chernobyl, USSR in April 1986. Klaus Barbie was given a life sentence in France for his war crimes during World War II. The USS Stark was attack by Iranian missiles in the Persian Gulf during May 1987. Since it was the height of the Cold war, there can be no mistake that espionage activities are rampant from opposing forces. Not only did spying occur against bitter enemies but allies as well especially when a former U.S. Navy analyst in the name of Jonathan Pollard was caught in the mid 1986 of spying for Israel."
Sample of Sources Used:
- Cornwall, H. (1985) The hacker's handbook. London, Century Communications Ltd.
- Godlove, T. (2009) Information security against theft and disruption, Part 1. The Security Journal, 28(3), Summer [Internet], Security Horizon. Available from: <http://www.securityhorizon.com/journal/TSJ-2009-03-summer.pdf> [Accessed 19 August 2009].
- Hirt, A. & Aycock, J. (2005) Anonymous and malicious. Virus Bulletin Conference, October [Internet], University of Calgary. Available from: <http://pages.cpsc.ucalgary.ca/~aycock/papers/vb2005.pdf> [Accessed 19 August 2009].
- Palmer, C.C. (2001) Ethical hacking. IBM Systems Journal, 40(3), July, pp. 769-780.
- Pethia, R.D. & van Wyk, K. (1992) Computer emergency response - An international problem [Internet], Computer Emergency Response Team/Coordination Center, Software Engineering Institute, Carnegie Mellon University. Available from: <http://www.csrc.nist.gov/publications/secpubs/certresp.ps> [Accessed 19 August 2009].
Cite this Article Review:
Clifford Stoll's "Stalking the Wily Hacker" (2012, January 16) Retrieved June 02, 2020, from https://www.academon.com/article-review/clifford-stoll-stalking-the-wily-hacker-149967/
"Clifford Stoll's "Stalking the Wily Hacker"" 16 January 2012. Web. 02 June. 2020. <https://www.academon.com/article-review/clifford-stoll-stalking-the-wily-hacker-149967/>