Responses: 31
Fight hackers with hackers. Anonymous could do the job, and they'll accept payment in bitcoins.
(0)
(0)
Computer hackers are the new breed of criminals that can negatively affect a whole mass of people from the comfort of their garage/living room/office...with a few key strokes. As a society, can we really consider their criminal activities any less disruptive or less violent, given the effect they can have on an ordinary person' life.
Why not treat them as we do bank robbers since many tend to go after our savings and our identities and worse. Anyone who has been the victim of identity theft will tell you of the horrendous ordeal they had or are still going through simply trying to get on with their lives.
Give them prison terms commensurate with their crime.
Why not treat them as we do bank robbers since many tend to go after our savings and our identities and worse. Anyone who has been the victim of identity theft will tell you of the horrendous ordeal they had or are still going through simply trying to get on with their lives.
Give them prison terms commensurate with their crime.
(0)
(0)
If caught, charge them with some type of treason. Also, our computer guru's should embed a Trojan horse or other type virus, that when hacked erases the hackers hard drive. If not the hard drive at least make the information he gets unusable.
(0)
(0)
Search out and identify hackers, if they are internal remove their user ID and passwords form the systems, charge them and try them, if guilty give them an other than honorable discharge with forfeiture of pay and allowances and reduction to E-2. If the hacker is a U.S. citizen and is disrupting systems or destroying or misusing data, they should be confined without computer or smartphone access, tried for their unlawful activity. If found guilty, they should be incarcerated with no computer, or smartphone access for duration of their sentence.
If the hacker originates their activity from outside the U. S., and is a private citizen,diplomatic discussions should start to contain this activity. If it is initiated by foreign government agencies including their military, locate the source of the hacking, and take immediate action. Either warn the nation to cease and desist, or if necessary destroy the hacker sites.
If the hacker originates their activity from outside the U. S., and is a private citizen,diplomatic discussions should start to contain this activity. If it is initiated by foreign government agencies including their military, locate the source of the hacking, and take immediate action. Either warn the nation to cease and desist, or if necessary destroy the hacker sites.
(0)
(0)
DOD has created a nightmare for Federal employees using their network as it is and yet they don't seem able to figure out a security system that will stop hackers. We seem to be able to identify where they are hacking from. Maybe we should deploy drones to attack them? Just a humorous thought.
(0)
(0)
Also get up to date equipment. My computer at home that was two years old was newer than the computers in our units
(0)
(0)
Read This Next

Hacking
Cyber
Security
