Hacking is a way to manage someone’s electronics without their permission, and often

times without their knowledge. At its simplest, hacking is using one’s own computer to manipulate another person’s computer. More specifically, hacking is using one’s computer to change another computer’s code to run specific scripts that will force the other computer to run programs that harm it, or host Artificial Intelligence that will then control the process. Hacking can also be highly useful to governments that need information on people (like drug-dealers), such as how they use the internet, what they do with it, and where.

There are laws that discourage hacking and laws that criminalize hacking, but they should be more specific. For example, the worm is one of the most common forms of hack that holds onto a file download, drops it off at your computer than goes into your email and sends itself to everyone else. According to Christopher Reinhart, it is classified as a fraudulent act to transmit these viruses across machines.  Laws against hacking should either control what is and isn’t allowed, because things like the worm that happened last year might occur less often. Last year,

There are too many types of hack to determine them, but generalizing it makes it seem like a lighter issue than it is. In today’s world, hacking is actually very common, and as technology evolves, so do the hacking capabilities, so big companies like Google have been constantly suffering from these attacks, even though they have Artificial Intelligence to look for Trojans and Worms on their network, and destroy them.

According to Dan Surma, a Gmail developer, when you click the “report spam” button, your topic gets added or raised in the spam list. If someone (or a bot) were to send out 500 emails that are spam, and 300 people click the report spam button, then your report will go higher in google’s rankings, and they will work from the top down to take them off of the list. Since google accounts are free to create, bots can automate the process and create about 50 accounts a minute if they are good enough and have enough RAM (random access memory).

This is an issue in the hacking world, because Google doesn’t want to take accounts away from people that are harmless and could be needed for people’s jobs. Google will delete the accounts associated with the IP and ISP that they were created on if 500 accounts were created over one server. Technologies like VPN that tunnel you to another IP and avoid your ISP can be blocked, but are harder because often they switch every minute or two, or shut off once the emails have been sent, so there is no way to track the owner. Countries with barely any form of citations (like China) have a harder time with tracking who originally created a virus, because anyone can claim anyone else’s work as their own, and it can get lost easier.

On the other hand, hacking can be useful. Almost all governments use hacking to spy on people if they are a suspect of a crime. This is good for them because it allows them to track anyone discretely when their guard is down, and they aren’t prepared. Governments can track the location of specific people, and see where they are, even if you have all connections turned off. Banks create dummy accounts and attempt to hack their own system, so they can find possible points of entry, and fix that issue so their real cardholders can remain safe.

According to Bloomberg.com, the government takes 2 petabytes (1 million gigabytes) from users every hour, and stores it in their database for examination. Internet Service Providers (ISPs) like Charter, and Time Warner Cable send data to the government about how their users use the internet, and if they are on banned sites through a VPN.

In the case that someone manages to destroy someone else’s physical components for example making the fan stop, has different levels of crime depending on what was destroyed, and how much the total cost of the computer was. According to criminal.laws.com, “Destruction of property is considered a criminal act in which a person intentionally destroys property, whether private or public, for the purpose of vandalism.”

Once the technology to track hacking can be strengthened, then the hackers will continue to make viruses to break open software and spill out the source code.

Artificial intelligence can be used to create hacks that evolve over time, and can adapt to their ‘environment’. These can evolve over time, learn how a user uses and manages their computer, and relay that information back to the creator for directions. These AI based viruses can be especially bad when they disguise themselves as harmless files, or even virus-fighting software.

Public shaming is the choice that some countries are taking to act against hackers, and it sends a message to others saying “don’t do this, or you will be shamed” and in most cases that is all that people need to stop what they are doing.