Chapter 4. Inside a Hacker Sting Operation…

“Set a thief to catch a thief.”

Anonymous

We can make a clear distinction between two different kinds of hackers. First, we have the show-offs who love to draw attention to themselves. They choose flashy names and use them to sign their intrusions. They like to break into a computer and announce it to all its users, as if to prove to the world how great they are. These are the ones that are relatively easy to catch. This is covered in more detail in Chapter 7, “Why Do Hackers Hack?”

However, there is a second group of high-tech criminals that are in it for the profits and not the prestige. They are very discreet and want their exploits to pass unnoticed. They are just looking to beat the system, and ...

Get HIGH-TECH CRIMES REVEALED: CYBERWAR STORIES FROM THE DIGITAL FRONT now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.