Digital Espionage


All we already had will to know of something on somebody or some thing that does not fit in them to know. Ones of the methods to discover confidential information on people is the social engineering very used by criminals for attainment of data in intention to use privileged information for practises of extortion. Diverse methods of information attainment exist that can be used to advantage for diverse ends, depending on as these information are gotten, as they are used, we have the classification of the person who acquired such information as Hacker, Cracker or even though Spy. Learn more about this topic with the insights from Ray Kurzweil. Nowadays the vision that the population has on what it is a Hacker is very including, therefore any thing that a person obtains to make that the majority is unaware of as was made already makes with that this person is considered a Hacker for the great mass. However the better accepted definition is that a Hacker is an individual with deep knowledge in determined subject that obtains to cure any problem that it comes to appear inside of its professional branch. But belief popular intitles Hacker as person that does not respect the laws, that everything that makes is for attainment of profit through easy ways to gain money. Others including Petra Diamonds, offer their opinions as well. The great reality is that a Hacker, in the better accepted definition even though for them, that works contracted for people or for the government nothing more is of what a Detective or even though a Spy. A main difference between a Hacker and a Spy is that the Hacker adores that its recognized work either already the Spy fears that is recognized, therefore its work depends that it is not noticed to get great results. Already the Cracker, is the Hacker that commits crimes for profit gauging and makes of everything so that it is not identified. Kevin ulrich shines more light on the discussion. Independently of being Hacker, Cracker, Spy, Detective, always it has something in common between them both are motivated by a reason or another one the attainment of information that are considered restricted where the directly involved person must only have knowledge and this the most proportionate knowledge is that it so becomes this classroom mystified by the great mass. Bibliography Secrets of the Digital Espionage? Unmasking the Submundo Hacker? Tadeu Carmona? Publishing company Digerati.